Académique Documents
Professionnel Documents
Culture Documents
ETX-5300A
Ethernet Service Aggregation Platform
Version 1.0
ETX-5300A
Ethernet Service Aggregation Platform
Version 1.0
International Headquarters RAD Data Communications Ltd. 24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel: 972-3-6458181 Fax: 972-3-6498250, 6474436 E-mail: market@rad.com
North America Headquarters RAD Data Communications Inc. 900 Corporate Drive Mahwah, NJ 07430, USA Tel: (201) 5291100, Toll free: 1-800-4447234 Fax: (201) 5295777 E-mail: market@radusa.com
Front Matter
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-5300A to be delivered hereunder shall be free of defects in material and workmanship under normal use and service for a period of twelve (12) months following the date of shipment to DISTRIBUTOR. If, during the warranty period, any component part of the equipment becomes defective by reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the event that RAD requests the return of equipment, each party shall pay one-way shipping costs. RAD shall be released from all obligations under its warranty in the event that the equipment has been subjected to misuse, neglect, accident or improper installation, or if repairs or modifications were made by persons other than RAD's own authorized service personnel, unless such repairs by others were made with the written consent of RAD. The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties which extend beyond the face hereof, including, but not limited to, warranties of merchantability and fitness for a particular purpose, and in no event shall RAD be liable for consequential damages. RAD shall not be liable to any person for any special or indirect damages, including, but not limited to, lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale, handling, repair, maintenance or use of the ETX-5300A, and in no event shall RAD's liability exceed the purchase price of the ETX-5300A. DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to ETX-5300A and for ensuring that replacements and other adjustments required in connection with the said warranties are satisfactory. Software components in the ETX-5300A are provided "as is" and without warranty of any kind. RAD disclaims all warranties including the implied warranties of merchantability and fitness for a particular purpose. RAD shall not be liable for any loss of use, interruption of business or indirect, special, incidental or consequential damages of any kind. In spite of the above RAD shall do its best to provide error-free software products and shall offer free Software updates during the warranty period under this Agreement. RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims, demands, or actions arising out of or relating to this Agreement and the ETX-5300A shall not exceed the sum paid to RAD for the purchase of the ETX-5300A. In no event shall RAD be liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been advised of the possibility of such damages. This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste equipment in protecting the environment, the owner of this RAD product is required to refrain from disposing of this product as unsorted municipal waste at the end of its life cycle. Upon termination of the units use, customers should provide for its collection for reuse, recycling or other form of environmentally conscientious disposal.
ii
Front Matter
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential safety hazards regarding product operation or maintenance to operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building protective ground bus.
Warning
Some products may be equipped with a laser diode. In such cases, a label with the laser class and other warnings as applicable will be attached near the optical transmitter. The laser warning symbol may be also attached. Please observe the following precautions: Before turning on the equipment, make sure that the fiber optic cable is intact and is connected to the transmitter. Do not attempt to adjust the laser drive current. Do not use broken or unterminated fiber-optic cables/connectors or look straight at the laser beam. The use of optical devices with the equipment will increase eye hazard.
Use of controls, adjustments or performing procedures other than those specified herein, may result in hazardous radiation exposure. ATTENTION: The laser beam may be invisible! In some cases, the users may insert their own SFP or XFP laser transceivers into the product. Users are alerted that RAD cannot be held responsible for any damage that may result if noncompliant transceivers are used. In particular, users are warned to use only agency approved products that comply with the local laser safety regulations for Class 1 laser products. Always observe standard safety precautions during installation, operation and maintenance of this product. Only qualified and authorized service personnel should carry out adjustment, maintenance or repairs to this product. No installation, adjustment, maintenance or repairs should be performed by either the operator or the user.
iii
Front Matter
Warning
In Finland, Norway and Sweden, the unit is restricted to installation by service personnel in Restricted Access Locations only. FI NO SE Laite on liitettv suojamaadoituskoskettimilla varustettuun pistorasiaan Apparatet m tilkoples jordet stikkontakt Apparaten skall anslutas till jordat uttag
Connecting AC Mains
Make sure that the electrical installation complies with local codes. Always connect the AC plug to a wall socket with a protective ground. The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A for USA and Canada). Always connect the power cord first to the equipment and then to the wall socket. If a power switch is provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed in the building installation. In cases when the power distribution system is IT type, the switch must disconnect both poles simultaneously.
iv
Front Matter
Connecting DC Power
The DC input to the equipment is floating in reference to the ground. Any single pole can be externally grounded. Due to the high current capability of DC power systems, care should be taken when connecting the DC supply to avoid short-circuits and fire hazards. Make sure that the DC power supply is electrically isolated from any AC source and that the installation complies with the local codes. A 25A circuit breaker must be installed for each DC input. The circuit breaker must have a high breaking capacity and must operate at short-circuit current exceeding 60A. Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Switch off both circuit breakers. When connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the positive pole and last the negative pole. Switch the circuit breakers back to the ON position. A readily accessible disconnect device that is suitably rated and approved should be incorporated in the building installation. If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports V.11, V.28, V.35, V.36, RS-530, X.21, 10 BaseT, 100 BaseT, Unbalanced E1, E2, E3, STM, DS-2, DS-3, S-Interface ISDN, Analog voice E&M, Alarm xDSL (without feeding voltage), Balanced E1, T1, Sub E1/T1
Safety Status SELV Safety Extra Low Voltage: Ports which do not present a safety hazard. Usually up to 30 VAC or 60 VDC. TNV-1 Telecommunication Network Voltage-1: Ports whose normal operating voltage is within the limits of SELV, on which overvoltages from telecommunications networks are possible. TNV-2 Telecommunication Network Voltage-2: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are not possible. These ports are not permitted to be directly connected to external telephone and data lines. TNV-3 Telecommunication Network Voltage-3: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are possible.
FXO (Foreign Exchange Office), xDSL (with feeding voltage), U-Interface ISDN
Front Matter
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a qualified safety engineer. Always make sure that the equipment is grounded before connecting telecommunication cables. Do not disconnect the ground connection before disconnecting all telecommunications cables. Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra caution should be exercised during thunderstorms. When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The grounding and bonding of the ground connections should comply with the local codes. The telecommunication wiring in the building may be damaged or present a fire hazard in case of contact between exposed external wires and the AC power lines. In order to reduce the risk, there are restrictions on the diameter of wires in the telecom cables, between the equipment and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line cords.
Attention
Pour rduire les risques sincendie, utiliser seulement des conducteurs de tlcommunications 26 AWG ou de section suprieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such cases, a notice will be given in the installation instructions. Do not attempt to tamper with any carrier-provided equipment or connection hardware.
vi
Front Matter
The equipment is designed to provide adequate protection against electro-static discharge (ESD). However, it is good working practice to use caution when connecting cables terminated with plastic connectors (without a grounded metal hood, such as flat cables) to sensitive data lines. Before connecting such cables, discharge yourself by touching ground or wear an ESD preventive wrist strap.
Avertissement
Achtung
vii
Front Matter
Franais
viii
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques potentiels de scurit pour l'oprateur ou le personnel de service, quant l'opration du produit ou sa maintenance.
Avertissement
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le produit est sous tension ou connect des lignes externes de tlcommunications.
Mise la terre de protection : la cosse ou la borne marque devrait tre connecte la prise de terre de protection du btiment.
Front Matter
Avertissement
Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre optique est intact et qu'il est connect au transmetteur. Ne tentez pas d'ajuster le courant de la commande laser. N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans terminaison et n'observez pas directement un rayon laser. L'usage de priphriques optiques avec l'quipement augmentera le risque pour les yeux.
L'usage de contrles, ajustages ou procdures autres que celles spcifies ici pourrait rsulter en une dangereuse exposition aux radiations. ATTENTION : Le rayon laser peut tre invisible ! Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP/XFP dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par l'agence et conformes la rglementation locale de scurit laser pour les produits laser de classe 1. Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation, d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou l'utilisateur.
ix
Franais
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant, sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut aussi tre joint. Veuillez observer les prcautions suivantes :
Front Matter
Franais
Connexion d'alimentation CC
L'entre CC de l'quipement est flottante par rapport la mise la terre. Tout ple doit tre mis la terre en externe. A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques d'incendie. Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que l'installation est conforme la rglementation locale. Un coupe-circuit de 25A devrait tre install pour chaque entre CC de lquipement. Le coupecircuit devrait disposer dune capacit leve de coupure, et devrait fonctionner sur courant de CC dpassant 60A. Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas sous tension. Localisez les coupe-circuits dans le tableau desservant l'quipement et fixezles en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le ple ngatif. Remettez les coupe-circuits en position ON. Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du btiment. Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC est flottante.
Front Matter
Declaration of Conformity
Manufacturer's Name: Manufacturer's Address: Declares that the product: Product Name Product Options: ETX-5300A All RAD Data Communications Ltd. 24 Raoul Wallenberg St. Tel Aviv 69719 Israel
Conforms to the following standard(s) or other normative document(s): EMC EN 55022:2010 Information technology equipment Radio disturbance characteristics Limits and methods of measurement. Information technology equipment Immunity characteristics Limits and methods of measurement. Electromagnetic compatibility (EMC) - Part 3-2: Limits Limits for harmonic current emissions (equipment input current 16A per phase) Electromagnetic compatibility (EMC) - Part 3-3: Limits Limitation of voltage changes, voltage fluctuations and flicker in public low-voltage supply systems, for equipment with rated current 16A per phase and not subject to conditional connection. Information technology General requirements. equipment Safety Part 1:
EN 55024:2010
EN 61000-3-2:2006
EN 61000-3-3:2008
Safety
Supplementary Information: The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the Low Voltage Directive 2006/95/EC, the R&TTE Directive 99/5/EC for wired equipment and the ROHS Directive 2011/65/EU. The product was tested in a typical configuration. Tel Aviv, 1 January 2013
Nathaniel Shomroni, Homologation Team Leader European Contact: RAD Data Communications GmbH Otto-Hahn-Str. 28-30, 85521 Ottobrunn-Riemerling, Germany
xi
Front Matter
Glossary
Address Agent ANSI APS (Automatic protection switching) AWG Backhaul Balanced Bandwidth A coded representation of the origin or destination of data. In SNMP, this refers to the managed system. American National Standards Institute. An automatic service restoration function by which a network senses a circuit or node failure and automatically switches traffic over an alternate path. The American Wire Gauge System, which specifies wire width. Transporting traffic between distributed sites (typically access points) and more centralized points of presence A transmission line in which voltages on the two conductors are equal in magnitude, but opposite in polarity, with respect to ground. The range of frequencies passing through a given circuit. The greater the bandwidth, the more information can be sent through the circuit in a given amount of time. Unit of signaling speed equivalent to the number of discrete conditions or events per second. If each signal event represents only one bit condition, baud rate equals bps (bits per second). A QoS class in which no specific traffic parameters and no absolute guarantees are provided. Signaling method in E1/T1 representing a binary 1 by alternating positive and negative pulses, and a binary 0 by absence of pulses. The smallest unit of information in a binary system. Represents either a one or zero (1 or 0). A device interconnecting local area networks at the OSI data link layer, filtering and forwarding frames according to media access control (MAC) addresses. A storage device. Commonly used to compensate for differences in data rates or event timing when transmitting from one device to another. Also used to remove jitter. A transmission path or channel. A bus is typically an electrical connection with one or more conductors, where all attached devices receive all transmissions at the same time. A group of bits (normally 8 bits in length). A continuous signal at a fixed frequency that is capable of being modulated with a second (information carrying) signal.
Baud
Buffer
Bus
Byte Carrier
xii
Front Matter
CESoPSN
Structure-aware TDM Circuit Emulation Service over Packet Switched Network. A method for encapsulating structured (NxDS0) Time Division Multiplexed (TDM) signals as pseudo-wires over packet switched networks (PSN). A path for electrical transmission between two or more points. Also called a link, line, circuit or facility. A term, which defines the information rate that the network is committed to provide to the user, under any network conditions. New technology for offering circuit emulation services over packetswitched networks. The service offers traditional TDM trunking (at n x 64 kbps, fractional E1/T1, E1/T1 or E3/T3) over a range of transport protocols, including Internet Protocol (IP), MPLS and Ethernet. Command Line Interface (CLI) is a mechanism for interacting with a RAD product by typing commands in response to a prompt. A term for the source(s) of timing signals used in synchronous transmission. A state in which the network is overloaded and starts to discard user data (frames, cells or packets). A resource and traffic management mechanism to avoid and/or prevent excessive situationthat can cause the network to collapse. Information represented in digital form, including voice, text, facsimile and video. The detection and isolation of a malfunction or mistake in a communications device, network or system. The binary (1 or 0) output of a computer or terminal. In data communications, an alternating, non-continuous (pulsating) signal. A 2.048 Mbps line, common in Europe, that supports thirty-two 64 kbps channels, each of which can transmit and receive data or digitized voice. The line uses framing and signaling to achieve synchronous and reliable transmission. The most common configurations for E1 lines are E1 PRI, and unchannelized E1. The European standard for high speed digital transmission, operating at 34 Mbps. Encapsulating data is a technique used by layered protocols in which a low level protocol accepts a message from a higher level protocol, then places it in the data portion of the lower-level frame. The logistics of encapsulation require that packets traveling over a physical network contain a sequence of headers. Excess Information Rate. The rate that exceeds a specified threshold (CIR) for brief periods of time. A local area network (LAN) technology which has extended into the wide area networks. Ethernet operates at many speeds, including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
E3 Encapsulation
EIR Ethernet
xiii
Front Matter
Ethernet OAM
Ethernet operation, administration and maintenance (OAM) are a set of standardized protocols for measuring and controlling network performance. There are two layers of Ethernet OAM: Service OAM (provides end-to-end connectivity fault management per customer service instance, even in multi-operator networks) and Link or Segment OAM (detailed monitoring and troubleshooting of an individual physical or emulated link). A two-octet field in an Ethernet frame that indicates type of the protocol encapsukated in the Ethernet frame payload Unidirectional traffic entity that connects two physical or logical ports A congestion control mechanism A logical grouping of information sent as a link-layer unit over a transmission medium. The terms packet, datagram, segment, and message are also used to describe logical information groupings. At the physical and data link layers of the OSI model, bits are fit into units called frames. Frames contain source and destination information, flags to designate the start and end of the frame, plus information about the integrity of the frame. All other information, such as network protocols and the actual payload of data, is encapsulated in a packet, which is encapsulated in the frame. A circuit or device permitting transmission in two directions (sending and receiving) at the same time. An ITU standard for the physical and electrical characteristics of various digital interfaces, including those at 64 kbps and 2.048 Mbps. Gateways are points of entrance and exit from a communications network. Viewed as a physical entity, a gateway is that node that translates between two otherwise incompatible networks or network segments. Gateways perform code and protocol conversion to facilitate traffic between data highways of differing architecture. The combined effect of resistance, inductance and capacitance on a transmitted signal. Impedance varies at different frequencies. A shared boundary, defined by common physical interconnection characteristics, signal characteristics, and meanings of exchanged signals. Also known as an Internet address. A unique string of numbers that identifies a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers from 0 to 255, separated by periods (for example, 1.0.255.123). Digital interconnection protocol similar to T1 and E1 used in Japan. The deviation of a transmission signal in time or phase. It can introduce errors and loss of synchronization in high speed synchronous communications. Set of Layer-2 control (slow) protocols that operate across a number of access and aggregation network technologies
Framing
Impedance Interface
IP Address
J1 Jitter
L2CP
xiv
Front Matter
Laser
A device that transmits an extremely narrow and coherent beam of electromagnetic energy in the visible light spectrum. Used as a light source for fiber optic transmission (generally more expensive, shorter lived, single mode only, for greater distances than LED). The time between initiating a request for data and the beginning of the actual data transfer. Network latency is the delay introduced when a packet is momentarily stored, analyzed and then forwarded. A technique that distributes network traffic along parallel paths in order to maximize the available network bandwidth while providing redundancy. The addition of inductance to a line in order to minimize amplitude distortion. Used commonly on public telephone lines to improve voice quality, it can make the lines impassable to high speed data, and baseband modems. A type of diagnostic test in which the transmitted signal is returned to the sending device after passing through all or part of a communications link or network. An application that receives Simple Network Management Protocol (SNMP) information from an agent. An agent and manager share a database of information, called the Management Information Base (MIB). An agent can use a message called a traps-PDU to send unsolicited information to the manager. A manager that uses the RADview MIB can query the RAD device, set parameters, sound alarms when certain conditions appear, and perform other administrative tasks. In telecommunications, this means the presence of a signal. A mark is equivalent to a binary 1. A mark is the opposite of a space (0). The source of timing signals (or the signals themselves) that all network stations use for synchronization. Modular interfaces enable field-changeable conversion. At one end of a communications link, a device that combines several lower speed transmission channels into a single high speed channel. A multiplexer at the other end reverses the process. Sometimes called a mux. See Bit Interleaving/Multiplexing. (1) An interconnected group of nodes. (2) A series of points, nodes, or stations connected by communications channels; the collection of equipment through which connections are made between data stations. A point of interconnection to a network. The name of the BTS for 3G cellular traffic The Network Time Protocol, a protocol for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. NTP uses UDP on port 123 as its transport layer.
Latency
Load Balancing
Loading
Loopback
Manager
Network
xv
Front Matter
Packet Parameters
An ordered group of data and control signals transmitted through a network, as a subset of a larger message. Parameters are often called arguments, and the two words are used interchangeably. However, some computer languages such as C define argument to mean actual parameter (i.e., the value), and parameter to mean formal parameter. In RAD CLI, parameter means formal parameter, not value. Layer 1 of the OSI model. The layer concerned with electrical, mechanical, and handshaking procedures over the interface connecting a device to the transmission medium. A method for verifying that the incoming traffic complies with the users service contract. See Multidrop. The physical interface to a computer or multiplexer, for connection of terminals and modems. Also called CoS (class of service), classifies traffic into categories such as high, medium, and low. The lower the priority, the more drop eligible is a packet. When the network gets busy, prioritization ensures critical or high-rated traffic is passed first, and packets from the lowest categories may be dropped. One or more characters in a command line interface to indicate that the computer is ready to accept typed input. A formal set of conventions governing the formatting and relative timing of message exchange between two communicating systems. Point-to-point connections set up to emulate (typically Layer 2) native services like TDM, or SONET/SDH over an underlying common packetswitched network (Ethernet, MPLS or IP) core. Pseudowires are defined by the IETF PWE3 (pseudowire emulation edge-to-edge) working group. Technique used in the QoS architecture during periods of congestion. The packets are held in queues for subsequent processing. After being processed by the router, the packets are then sent to their destination based on priority. Strict priority and Weighted Fair queuing methods are used for traffic differentiation. See MAC-in-MAC. An authentication, authorization and accounting protocol for applications such as network access or IP mobility. Many network services require the presentation of security credentials (such as a username and password or security certificate) in order to connect to the network. Before access to the network is granted, this information is passed to a network access server (NAS) device over the link-layer protocol, then to a RADIUS server over the RADIUS protocol. The RADIUS server checks that the information is correct using authentication schemes like PAP, CHAP or EAP.
Physical Layer
Queuing
xvi
Front Matter
Router
An interconnection device that connects individual LANs. Unlike bridges, which logically connect at OSI Layer 2, routers provide logical paths at OSI Layer 3. Like bridges, remote sites can be connected using routers over dedicated or switched lines to create WANs. The process of selecting the most efficient circuit path for a message. Able to be changed in size or configuration to suit changing conditions. For example, a scalable network can be expanded from a few nodes to thousands of nodes. Describing an optical wave-guide or fiber that is designed to propagate light of only a single wavelength (typically 5-10 microns in diameter). Structure-Agnostic Time Division Multiplexing (TDM) over Packet. A method for encapsulating Time Division Multiplexing (TDM) bitstreams (T1, E1, T3, E3) that disregards any structure that may be imposed on these streams, in particular the structure imposed by the standard TDM framing. A North American standard for using optical media as the physical transport for high speed long-haul networks. SONET basic speeds start at 51.84 Mbps and go up to 2.5 Gbps. In telecommunications, the absence of a signal. Equivalent to a binary 0. A network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. A logical port used for binding flows to bridge ports, router interfaces or Layer-2 TDM pseudowires See Synchronous Transmission. Communcation standard for data logging. It collects heterogeneous data into a single data repository, providing system administrators with a single point of management for collecting, distributing and processing audit data. The Syslog operation is standartized by RFC 3164 and RFC 5674. A digital transmission link with a capacity of 1.544 Mbps used in North America. Typically channelized into 24 DS0s, each capable of carrying a single voice conversation or data stream. Uses two pairs of twisted pair wires. A digital transmission link with a capacity of 45 Mbps, or 28 T1 lines. The virtual terminal protocol in the Internet suite of protocols. It lets users on one host access another host and work as terminal users of that remote host. Instead of dialing into the computer, the user connects to it over the Internet using Telnet. When issuing a Telnet session, it connects to the Telnet host and logs in. The connection enables the user to work with the remote machine as though a terminal was connected to it.
Routing Scalable
Single Mode
SAToP
T1
T3 Telnet
xvii
Front Matter
Throughput
The amount of information transferred through the network between two users in a given period, usually measured in the number of packets per second (pps). A portion of a serial multiplex of timeslot information dedicated to a single channel. In E1 and T1, one timeslot typically represents one 64 kbps channel. Set of actions and operations performed by the network to guarantee the operability of the network, exercised in the form of traffic control and flow control. Mechanism whereby any traffic which violates the traffic contract agreed to at connection setup, is detected and discarded. A method for smoothing the bursty traffic rate that might arrive on an access virtual circuit so as to present a more uniform traffic rate on the network. A single circuit between two points, both of which are switching centers or individual distribution points. A trunk usually handles many channels simultaneously. A device that is doing the Layer 2 bridging according to the VLAN tag in addition to the standard bridging parameters. A VLAN-aware device will not strip or add any VLAN header. A technique that lets carriers offer multiple virtual LANs over a single circuit. In essence, the carrier creates an Ethernet virtual private network to tunnel customer VLANs across its WAN; this helps avoid name conflicts among customers of service providers who connect to the carrier. Stacking works by assigning two VLAN IDs to each frame header. One is a "backbone" VLAN ID used by the service provider; the other one has up to 4,096 unique 802.1Q VLAN tags. Technique used to ensure a minimum density of marks.
Timeslot
Traffic Management
Trunk
VLAN-Aware
VLAN Stacking
Zero suppression
xviii
1.
Perform the following steps to install the unit: 1. Determine the required configuration of ETX-5300A, according to your application. 2. Connect the main and I/O card ports as required for the application. 3. Connect the ASCII terminal to the CONTROL DCE port on an E4-MC-4 card. 4. Connect power to the unit.
Notes
purchased.
Lock the wire latch of each XFP or SFP module by lifting it up until it clicks into
Connecting to a Terminal
To connect the unit to a terminal: 1. Connect the male DB-9 connector of terminal cable to the 9-pin D-type female connector on E4-MC-4 card, designated CONTROL DCE. 2. Connect the other side of the cable to the ASCII terminal equipment.
Caution
Pay attention to polarity. For each source, connect the positive lead first, and the negative lead second. Refer to the Connection of DC Mains section at the beginning of this manual. 2. Use a narrow blade screwdriver to release the terminal screw. 3. Push the lead into the terminal up to its insulating sleeve. 4. When the lead is in position, fasten the screw to secure the lead. 5. Verify that the lead is securely held by pulling on it lightly. 6. Insert the plug into the socket of the E5-PIM/DC module. 7. Secure the plug by tightening the two screws. 8. Connect the cable to the DC power source.
2.
8. To log in, enter your user name (su for full configuration and monitoring access) and your password. 9. The device prompt appears: ETX-5300A# You can now type the necessary CLI commands.
Note
RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud rate (9.6 kbps) to 115.2 kbps. 11. Configure the PC communication port parameters to a baud rate of 115.2 kbps to match the new ETX-5300A setting. 12. Continue with product configuration.
The following script provides all necessary configuration steps. Replace IP addresses and entity names with values relevant for your network environment.
#*******************************Adding_SVI*********************************** config port svi 99 router exit all #**********************************End*************************************** #***************************Adding Classifier_Profiles*********************** config flows classifier-profile classall match-any match all exit all config flows classifier-profile classutg match-any match untagged exit all #*********************************End**************************************** #***************************Configuring_Flows******************************** config flows flow mng_in classifier classutg ingress-port mng-ethernet main-a/0 egress-port svi 99 no shutdown exit all config flows flow mng_out classifier classall ingress-port svi 99 egress-port mng-ethernet main-a/0 no shutdown exit all #**********************************End*************************************** #*********************Configuring_Router_Interface*************************** configure router 1 interface 1 address 172.18.219.116/24 bind svi 99 no shutdown exit static-route 0.0.0.0/0 address 172.18.219.1 exit all #**********************************End*************************************** #*********************Configuring_SNMP_View/Mask/Type************************ configure management snmp view internet 1 mask 1 type included no shut exit all #**********************************End*************************************** #*********************Configuring_SNMP_Access_Group************************ configure management snmp access-group initial usm no-auth-no-priv context-match prefix
exit all #**********************************End*************************************** #**************************Configring_SNMP_Traps***************************** configure management snmp target-params p message-processing-model snmpv3 version usm security name initial level no-auth-no-priv no shutdown exit target a target-params p tag-list unmasked address udp-domain 172.17.176.35 no shutdown exit notify unmasked tag unmasked no shutdown exit all #**********************************End************************************
3.
Saving Configuration
Type save in any level to save your configuration in startup-config.
4.
Verifying Connectivity
At the ASCII terminal, ping the IP address assigned to management router interface and verify that replies are received. If there is no reply to the ping, check your configuration and make the necessary corrections.
Verifying Connectivity
5.
Configuring Services
Proceed with service configuration. Chapter 5 details different scenarios for provisioning supported Ethernet services.
Configuring Services
Contents
Chapter 1. Introduction 1.1 Overview .............................................................................................................................. 1-1 Product Options ................................................................................................................. 1-1 Applications ....................................................................................................................... 1-1 Features ............................................................................................................................ 1-2 Carrier-Class Layer 2 Aggregation Switch ...................................................................... 1-2 Forwarding Schemes ..................................................................................................... 1-3 Remote Provisioning and Traffic Management............................................................... 1-3 Hardware-Based Ethernet OAM and Performance Monitoring ....................................... 1-3 Service Resiliency and Protection .................................................................................. 1-4 Synchronization and Timing over Packet ....................................................................... 1-4 Management and Security ............................................................................................. 1-4 Physical Description ............................................................................................................. 1-4 Front Panel ........................................................................................................................ 1-5 Rear Panel ......................................................................................................................... 1-6 Available Modules .............................................................................................................. 1-6 Functional Description .......................................................................................................... 1-6 System Structure ............................................................................................................... 1-6 Main Card .......................................................................................................................... 1-7 10GbE Interface ............................................................................................................ 1-9 Packet Processor ........................................................................................................... 1-9 Timing Subsystem ....................................................................................................... 1-10 Management Subsystem ............................................................................................. 1-11 Ethernet Service Cards ..................................................................................................... 1-12 GbE and 10GbE Interfaces ........................................................................................... 1-13 Packet Processor ......................................................................................................... 1-13 Timing Subsystem ....................................................................................................... 1-14 SDH/SONET Card .............................................................................................................. 1-14 STM-1/OC-3 Interfaces ................................................................................................ 1-15 Pseudowire Services .................................................................................................... 1-16 Adaptive Timing .......................................................................................................... 1-19 Timing Subsystem ....................................................................................................... 1-19 Timing Mechanism ........................................................................................................... 1-20 Physical Port Clock ...................................................................................................... 1-21 External (BITS) Clock.................................................................................................... 1-22 IEEE 1588v2 Clock ....................................................................................................... 1-22 GPS Clock .................................................................................................................... 1-23 Technical Specifications...................................................................................................... 1-23
1.2
1.3
1.4
Chapter 2. Installation and Setup Safety ................................................................................................................................ 2-1 Grounding .......................................................................................................................... 2-2 Laser Safety ....................................................................................................................... 2-3 Protection against ESD .................................................................................................. 2-3 Proper Handling of Modules .......................................................................................... 2-4 Site Requirements and Prerequisites .................................................................................... 2-4 Power ................................................................................................................................ 2-4 AC Power ...................................................................................................................... 2-5 DC Power ...................................................................................................................... 2-5
i
2.1
Table of Contents
2.6 2.7
2.8
2.9
2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 2.19 2.20 2.21
Panel Clearance ................................................................................................................. 2-5 Ambient Requirements ...................................................................................................... 2-6 Electromagnetic Compatibility Considerations .................................................................... 2-6 Package Contents................................................................................................................. 2-6 Required Equipment ............................................................................................................. 2-6 Installing AC Power Supply Modules ...................................................................................... 2-7 Installing the ETX-5300A Enclosure ...................................................................................... 2-7 Installing Cable Managers ................................................................................................... 2-7 Installing ETX-5300A in Racks ............................................................................................ 2-8 Installing a Fan Tray ........................................................................................................... 2-10 Installing Power Inlet Modules ............................................................................................ 2-11 E5-PIM/AC Module............................................................................................................ 2-12 E5-PIM/DC Modules .......................................................................................................... 2-12 Installing PI Modules ........................................................................................................ 2-12 Installing the Main Card ...................................................................................................... 2-12 Inserting the Main Card .................................................................................................... 2-13 Removing the Main Card .................................................................................................. 2-13 Replacing a Main Card during Equipment Operation ......................................................... 2-14 ETX-5300A Chassis with two CONTROL Modules ......................................................... 2-14 ETX-5300A Chassis with Single Main Card ................................................................... 2-14 Connecting to Power .......................................................................................................... 2-15 Grounding ........................................................................................................................ 2-15 Connecting to AC Power .................................................................................................. 2-15 Connecting to DC Power .................................................................................................. 2-15 Installing I/O Cards ............................................................................................................. 2-16 Installing Blank Panels ........................................................................................................ 2-17 Installing SFP or XFP Modules ............................................................................................. 2-17 Connecting to 10Gb Ethernet Equipment ........................................................................... 2-18 Connecting to Gigabit Ethernet Equipment ......................................................................... 2-19 Connecting to STM-1/OC-3 Equipment ............................................................................... 2-19 Connecting to External Clock Devices ................................................................................. 2-20 Connecting to GPS Clock Devices ........................................................................................ 2-20 Connecting to a Terminal ................................................................................................... 2-21 Connecting to a Network Management Station .................................................................. 2-22 Connecting to an External Alarm Device ............................................................................. 2-22 Labeling Cable .................................................................................................................... 2-22
Chapter 3. Operation 3.1 3.2 3.3 Turning On the Unit ............................................................................................................. 3-1 Indicators ............................................................................................................................. 3-2 Startup ................................................................................................................................. 3-3 Configuration and Application Software Files ..................................................................... 3-3 Loading Sequence .............................................................................................................. 3-4 Using a Custom Configuration File ........................................................................................ 3-5 Saving Configuration Changes .............................................................................................. 3-5 Confirming the Configuration File ......................................................................................... 3-5 Handling Configuration File Errors ........................................................................................ 3-6 Turning Off the Unit ............................................................................................................. 3-6
Chapter 4. Management and Security 4.1 CLI-Based Configuration ....................................................................................................... 4-2 Working with Terminal ....................................................................................................... 4-2
ii
Table of Contents
Working with Telnet and SSH ............................................................................................. 4-2 Login ................................................................................................................................. 4-3 Using the CLI ...................................................................................................................... 4-3 Command Tree .................................................................................................................. 4-5 4.2 GUI-Based Configuration .................................................................................................... 4-27 Preconfiguring ETX-5300A for SNMP Management ........................................................... 4-27 Working with RADview ..................................................................................................... 4-30 Working with 3rd Party Network Management Systems ................................................... 4-30 4.3 Management Access Methods ............................................................................................ 4-31 Layer-2 Management Access ....................................................................................... 4-31 Layer-3 Management Access ....................................................................................... 4-31 4.4 Services for Management Traffic ........................................................................................ 4-33 4.5 Terminal Control Port ......................................................................................................... 4-33 Factory Defaults .............................................................................................................. 4-33 Configuring Control Port Parameters ................................................................................ 4-33 4.6 User Access ........................................................................................................................ 4-34 Factory Defaults .............................................................................................................. 4-34 Example Defining Users................................................................................................. 4-34 Example Displaying Users .............................................................................................. 4-36 4.7 SNMP Management ............................................................................................................ 4-36 Standards ........................................................................................................................ 4-36 Benefits ........................................................................................................................... 4-37 Functional Description ..................................................................................................... 4-37 SNMP Engine ID ........................................................................................................... 4-38 SNMPv3 Message Processing ....................................................................................... 4-38 User-Based Security Model (USM) ............................................................................... 4-39 View-Based Access Control Model (VACM) ................................................................... 4-39 SNMP Security Level .................................................................................................... 4-40 SNMPv3 Administrative Features ................................................................................. 4-40 Factory Defaults .............................................................................................................. 4-40 SNMPv3 Configuration ..................................................................................................... 4-41 Example ........................................................................................................................... 4-48 4.8 Management Access........................................................................................................... 4-51 Factory Defaults .............................................................................................................. 4-51 Configuring Management Access...................................................................................... 4-51 4.9 Access Policy ...................................................................................................................... 4-51 Factory Defaults .............................................................................................................. 4-51 Configuring Access Policy ................................................................................................. 4-52 4.10 Authentication via RADIUS Server ....................................................................................... 4-52 Standards ........................................................................................................................ 4-53 Benefits ........................................................................................................................... 4-53 Functional Description ..................................................................................................... 4-53 Factory Defaults .............................................................................................................. 4-53 Configuring RADIUS Parameters ....................................................................................... 4-53 Displaying RADIUS Status ................................................................................................. 4-54 Displaying RADIUS Statistics............................................................................................. 4-54 4.11 Authentication via TACACS+ Server..................................................................................... 4-55 Standards ........................................................................................................................ 4-56 Benefits ........................................................................................................................... 4-56 Factory Defaults .............................................................................................................. 4-56 Functional Description ..................................................................................................... 4-56 Components................................................................................................................ 4-56 Accounting .................................................................................................................. 4-57 Defining TACACS+ Server ................................................................................................. 4-57
ETX-5300A Ver. 1.0 iii
Table of Contents
Configuring Accounting Groups ........................................................................................ 4-58 Example Defining Server ............................................................................................... 4-59 Example Defining Accounting Group .............................................................................. 4-59 Displaying Statistics ......................................................................................................... 4-60 Defining Accounting Groups ............................................................................................. 4-61 4.12 Syslog ................................................................................................................................ 4-61 Standards and MIBs ......................................................................................................... 4-61 Benefits ........................................................................................................................... 4-61 Factory Defaults .............................................................................................................. 4-62 Functional Description ..................................................................................................... 4-62 Elements ..................................................................................................................... 4-62 Transport Protocol ...................................................................................................... 4-62 Message Format .......................................................................................................... 4-62 Facilities and Severities ............................................................................................... 4-63 Syslog Configuration ........................................................................................................ 4-63 Example ...................................................................................................................... 4-65 Configuration Errors .................................................................................................... 4-65 4.13 Programming Cards ............................................................................................................ 4-66 Displaying Card Summary ................................................................................................. 4-66 Provisioning I/O Cards ...................................................................................................... 4-67 Resetting I/O Cards .......................................................................................................... 4-68 Displaying Card Status ..................................................................................................... 4-68 Configuration Errors ......................................................................................................... 4-69 Chapter 5. Services 5.1 Service Elements .................................................................................................................. 5-1 Profiles .............................................................................................................................. 5-1 Scheduling and Shaping Entities......................................................................................... 5-2 Physical Ports .................................................................................................................... 5-2 Logical Ports ...................................................................................................................... 5-3 Forwarding Entities ............................................................................................................ 5-4 Flows ............................................................................................................................ 5-5 Bridge ........................................................................................................................... 5-5 Router........................................................................................................................... 5-5 E-Line Service ....................................................................................................................... 5-6 I/O-to-Main Path ................................................................................................................ 5-6 Main-to-I/O Path ................................................................................................................ 5-9 I/O-to-I/O Path................................................................................................................. 5-11 Main-to-Main Path ........................................................................................................... 5-13 E-LAN Service ..................................................................................................................... 5-15 Routing Services ................................................................................................................. 5-18 I/O-to-Main via Router Path ............................................................................................. 5-18 Router-to-Bridge Path ..................................................................................................... 5-21 Pseudowire Services ........................................................................................................... 5-24 Point-to-Point L2 Pseudowire Service .............................................................................. 5-25 L2 Pseudowire Service over Bridge ................................................................................... 5-27 L3 Pseudowire Service ..................................................................................................... 5-30
5.2
5.3 5.4
5.5
Chapter 6. Ports 6.1 Ethernet Ports ...................................................................................................................... 6-1 Standards and MIBs ........................................................................................................... 6-1 Benefits ............................................................................................................................. 6-1
iv
Table of Contents
6.2
6.3
Factory Defaults ................................................................................................................ 6-1 Functional Description ....................................................................................................... 6-1 Autonegotiation ............................................................................................................ 6-1 Flow Control .................................................................................................................. 6-2 Jumbo Frames ............................................................................................................... 6-2 Ethertype ...................................................................................................................... 6-2 L2CP Handling ............................................................................................................... 6-2 Classification Key .......................................................................................................... 6-3 Queue Group Profile ...................................................................................................... 6-3 Configuring Ethernet Ports................................................................................................. 6-3 Displaying Port Status ........................................................................................................ 6-4 Displaying Statistics ........................................................................................................... 6-5 Displaying Optical Link SFP/XFP Status ............................................................................... 6-9 Example ........................................................................................................................... 6-10 Configuration Errors ......................................................................................................... 6-11 SDH/SONET Ports ............................................................................................................... 6-11 Standards and MIBs ......................................................................................................... 6-11 Benefits ........................................................................................................................... 6-11 Factory Defaults .............................................................................................................. 6-12 Functional Description ..................................................................................................... 6-12 SDH Implementation Principles .................................................................................... 6-12 General Structure of SDH Signals ................................................................................ 6-13 SDH Frame Organization ............................................................................................. 6-14 VC Assembly/Disassembly Process ............................................................................... 6-15 STM-1 Frame Structure ............................................................................................... 6-16 Pointers ...................................................................................................................... 6-17 SDH Overhead Data .................................................................................................... 6-17 SDH Tributary Units ..................................................................................................... 6-22 SDH Maintenance Signals and Response to Abnormal Conditions ................................ 6-25 SONET Environment .................................................................................................... 6-28 SDH/SONET Port Diagnostics ....................................................................................... 6-29 Configuring SDH/SONET Interfaces................................................................................... 6-30 Configuring AUG/OC-3 Interfaces ..................................................................................... 6-31 Configuring TUG3/AU3/STS-1 Inerfaces ............................................................................ 6-32 Configuring VC-12/VC-11/VT-1.5 Inerfaces ....................................................................... 6-33 Configuring SOH Profile ................................................................................................... 6-34 Configuring Path Profile ................................................................................................... 6-35 Example ........................................................................................................................... 6-36 Displaying Status ............................................................................................................. 6-37 Displaying Statistics ......................................................................................................... 6-39 Testing SDH/SONET Ports ................................................................................................ 6-42 Configuration Errors ......................................................................................................... 6-43 E1 Ports ............................................................................................................................. 6-45 Standards and MIBs ......................................................................................................... 6-45 Factory Defaults .............................................................................................................. 6-45 Functional Description ..................................................................................................... 6-45 E1 Line Signal Characteristics ...................................................................................... 6-45 E1 Signal Structure ...................................................................................................... 6-46 Timeslot 0 ................................................................................................................... 6-46 Multiframes ................................................................................................................. 6-47 Channel Associated Signaling ...................................................................................... 6-48 CRC-4 Error Detection ................................................................................................. 6-48 E1 Alarm Conditions .................................................................................................... 6-49 E1 Port Diagnostics ..................................................................................................... 6-49
v
Table of Contents
6.4
6.5
6.6
Configuring Internal E1 Interfaces .................................................................................... 6-51 Displaying Status ............................................................................................................. 6-52 Displaying Statistics ......................................................................................................... 6-53 Testing Internal E1 Ports .................................................................................................. 6-54 Running Loopbacks ..................................................................................................... 6-54 BER Testing ................................................................................................................. 6-55 Example ........................................................................................................................... 6-55 Configuration Errors ......................................................................................................... 6-56 T1 Ports ............................................................................................................................. 6-56 Standards and MIBs ......................................................................................................... 6-56 Factory Defaults .............................................................................................................. 6-57 Functional Description ..................................................................................................... 6-57 T1 Line Signal .............................................................................................................. 6-57 T1 Signal Structure ...................................................................................................... 6-58 T1 Alarm Conditions .................................................................................................... 6-59 T1 Port Diagnostics ..................................................................................................... 6-59 Configuring Internal T1 Interfaces .................................................................................... 6-62 Displaying Status ............................................................................................................. 6-63 Displaying Statistics ......................................................................................................... 6-64 Example ........................................................................................................................... 6-65 Configuration Errors ......................................................................................................... 6-65 Service Aggregation Group (SAG) ....................................................................................... 6-66 Benefits ........................................................................................................................... 6-66 Factory Defaults .............................................................................................................. 6-66 Functional Description ..................................................................................................... 6-66 Configuring SAGs ............................................................................................................. 6-67 Example ........................................................................................................................... 6-67 Configuration Errors ......................................................................................................... 6-68 Service Virtual Interface (SVI) ............................................................................................. 6-68 Factory Defaults .............................................................................................................. 6-68 Functional Description ..................................................................................................... 6-68 Configuring SVIs ............................................................................................................... 6-69 Example ........................................................................................................................... 6-70 Configuration Errors ......................................................................................................... 6-70
Chapter 7. Resiliency 7.1 Main Card Redundancy ......................................................................................................... 7-1 Benefits ............................................................................................................................. 7-1 Functional Description ....................................................................................................... 7-1 Configuring Main Card Redundancy .................................................................................... 7-2 Displaying Main Card Protection Status .............................................................................. 7-2 Configuration Errors ........................................................................................................... 7-3 Ethernet Link Aggregation (LAG) .......................................................................................... 7-3 Standards and MIBs ........................................................................................................... 7-3 Benefits ............................................................................................................................. 7-3 Factory Defaults ................................................................................................................ 7-3 Functional Description ....................................................................................................... 7-3 Intra-Card LAG............................................................................................................... 7-4 Inter-Card LAG .............................................................................................................. 7-4 Configuring LAG ................................................................................................................. 7-5 LACP Traffic ................................................................................................................... 7-5 Special Considerations for I/O Cards .............................................................................. 7-6 Deleting the LAG .............................................................................................................. 7-10
ETX-5300A Ver. 1.0
7.2
vi
Table of Contents
7.3
7.4
Displaying LAG Status ...................................................................................................... 7-11 Displaying LACP Status ..................................................................................................... 7-11 Displaying LACP Statistics ................................................................................................ 7-12 Example ........................................................................................................................... 7-13 Inter-Card LAG between Two Main Cards..................................................................... 7-13 Inter-Card LAG between Two I/O Cards ....................................................................... 7-15 Configuration Errors ......................................................................................................... 7-18 Ethernet Ring Protection (ERP) ........................................................................................... 7-19 Standards ........................................................................................................................ 7-20 Benefits ........................................................................................................................... 7-20 Factory Defaults .............................................................................................................. 7-20 Functional Description ..................................................................................................... 7-20 Ring Topology ............................................................................................................. 7-20 R-APS Messaging ......................................................................................................... 7-21 Mechanism of Operation ............................................................................................. 7-21 Timers ......................................................................................................................... 7-22 Administrative Commands ........................................................................................... 7-22 Multiple Rings.............................................................................................................. 7-22 Configuring ERP ............................................................................................................... 7-24 Displaying ERP Status....................................................................................................... 7-26 Displaying ERP Statistics .................................................................................................. 7-27 Example ........................................................................................................................... 7-28 Configuration Errors ......................................................................................................... 7-35 Automatic Protective Switching (APS) ................................................................................ 7-38 Standards and MIBs ......................................................................................................... 7-38 Benefits ........................................................................................................................... 7-38 Factory Defaults .............................................................................................................. 7-38 Functional Description ..................................................................................................... 7-38 APS Architecture ......................................................................................................... 7-39 Automatic Switchover Conditions ................................................................................ 7-40 Manual Switching Commands ...................................................................................... 7-40 Configuring I/O Card Protection ....................................................................................... 7-41 Configuring APS ............................................................................................................... 7-42 Displaying APS Status ...................................................................................................... 7-43 Example ........................................................................................................................... 7-43 Intra-Card APS ............................................................................................................. 7-43 Inter-Card APS ............................................................................................................. 7-43 Configuration Errors .................................................................................................... 7-44
Chapter 8. Networking 8.1 Flows ................................................................................................................................... 8-1 Benefits ............................................................................................................................. 8-1 Factory Defaults ................................................................................................................ 8-1 Functional Description ....................................................................................................... 8-1 I/O Ingress Flows ........................................................................................................... 8-2 Other Flow Types .......................................................................................................... 8-2 Flow Processing ............................................................................................................ 8-2 Drop Action ................................................................................................................... 8-3 Flow Counters ............................................................................................................... 8-4 RFC-2544 Loopback Responder ..................................................................................... 8-5 Classifier Profiles ............................................................................................................... 8-6 Examples ....................................................................................................................... 8-7 Error Messages ............................................................................................................. 8-7
vii
Table of Contents
8.2
8.3
8.4
8.5
8.6
Configuring Flows .............................................................................................................. 8-8 Examples ......................................................................................................................... 8-11 Multiple CoS Point-to-Point Service ............................................................................. 8-11 Multipoint Service ....................................................................................................... 8-16 Statistics .......................................................................................................................... 8-20 Configuration Errors ......................................................................................................... 8-21 Ethertype ........................................................................................................................... 8-25 Standards and MIBs ......................................................................................................... 8-25 Benefits ........................................................................................................................... 8-25 Factory Defaults .............................................................................................................. 8-25 Functional Description ..................................................................................................... 8-25 Configuring Ethertype ...................................................................................................... 8-25 Example ........................................................................................................................... 8-25 Configuration Errors ......................................................................................................... 8-25 Layer 2 Control Protocol (L2CP).......................................................................................... 8-26 Standards ........................................................................................................................ 8-26 Benefits ........................................................................................................................... 8-26 Factory Defaults .............................................................................................................. 8-26 Functional Description ..................................................................................................... 8-26 Adding Layer 2 Control Processing Profiles ...................................................................... 8-27 Deleting Layer 2 Control Processing Profiles .................................................................... 8-27 Configuring Layer 2 Control Processing Profile Parameters .............................................. 8-27 Example ........................................................................................................................... 8-28 Configuration Errors ......................................................................................................... 8-28 Peer ................................................................................................................................... 8-29 Factory Defaults .............................................................................................................. 8-29 Benefits ........................................................................................................................... 8-29 Functional Description ..................................................................................................... 8-29 Configuring Remote Peers ............................................................................................... 8-29 Example ........................................................................................................................... 8-30 Configuration Errors ......................................................................................................... 8-31 TDM Pseudowires ............................................................................................................... 8-31 Standards ........................................................................................................................ 8-31 Factory Defaults .............................................................................................................. 8-32 Benefits ........................................................................................................................... 8-32 Functional Description ..................................................................................................... 8-32 Pseudowire Packet Processing Subsystem ................................................................... 8-33 Jitter Buffer ................................................................................................................. 8-39 Packet Loss ................................................................................................................. 8-40 ToS ............................................................................................................................. 8-40 OAM Protocol .............................................................................................................. 8-40 Alarm Indications and Fault Propagation ..................................................................... 8-41 Adaptive Timing .......................................................................................................... 8-44 Configuring Pseudowires .................................................................................................. 8-45 Displaying PW Statistics ................................................................................................... 8-47 Clearing Statistics ............................................................................................................ 8-49 Viewing the Pseudowire Status and Summary .................................................................. 8-49 Example ........................................................................................................................... 8-50 Configuration Errors ......................................................................................................... 8-51 Cross-Connection ............................................................................................................... 8-52 Factory Defaults .............................................................................................................. 8-52 Benefits ........................................................................................................................... 8-52 Functional Description ..................................................................................................... 8-53 Configuring Cross-Connection .......................................................................................... 8-53
ETX-5300A Ver. 1.0
viii
Table of Contents
8.7
8.8
8.9
Examples ......................................................................................................................... 8-53 Cross-Connection ........................................................................................................ 8-53 Pseudowire Service ..................................................................................................... 8-54 Configuration Errors ......................................................................................................... 8-56 Bridge ................................................................................................................................ 8-57 Standards ........................................................................................................................ 8-57 Benefits ........................................................................................................................... 8-57 Factory Defaults .............................................................................................................. 8-57 Functional Description ..................................................................................................... 8-57 Bridge Model ............................................................................................................... 8-58 VLAN Editing at Bridge Port Ingress and Egress ........................................................... 8-59 Deleting Bridge Elements ............................................................................................ 8-60 Configuring Bridge ........................................................................................................... 8-60 Displaying MAC Address Table .......................................................................................... 8-61 Displaying VLAN Information ............................................................................................ 8-62 Displaying Bridge Port Status ........................................................................................... 8-62 Example ........................................................................................................................... 8-63 Configuration Errors ......................................................................................................... 8-63 Router ................................................................................................................................ 8-64 Standards ........................................................................................................................ 8-64 Benefits ........................................................................................................................... 8-64 Factory Defaults .............................................................................................................. 8-64 Functional Description ..................................................................................................... 8-64 Connection to Physical and Bridge Ports ..................................................................... 8-65 Management ............................................................................................................... 8-65 Loopback Router Interfaces ........................................................................................ 8-65 Routing and ARP Tables .............................................................................................. 8-66 Configuring Router ........................................................................................................... 8-66 Displaying ARP Table ........................................................................................................ 8-67 Displaying Routing Table .................................................................................................. 8-67 Displaying Interface Table ................................................................................................ 8-68 Displaying Router Interface Status ................................................................................... 8-68 Example ........................................................................................................................... 8-68 Configuration Errors ......................................................................................................... 8-72 Quality of Service (QoS) ..................................................................................................... 8-74 Standards ........................................................................................................................ 8-74 Benefits ........................................................................................................................... 8-74 Factory Defaults .............................................................................................................. 8-74 Functional Description ..................................................................................................... 8-74 Traffic Management ......................................................................................................... 8-74 Shaper ........................................................................................................................ 8-75 Congestion Avoidance (WRED) .................................................................................... 8-76 Internal Queue ............................................................................................................ 8-78 Queue Block ................................................................................................................ 8-80 Queue Group............................................................................................................... 8-81 CoS Mapping .................................................................................................................... 8-84 Factory Defaults .......................................................................................................... 8-85 Configuring CoS Mapping ............................................................................................ 8-85 Example ...................................................................................................................... 8-85 Configuration Errors .................................................................................................... 8-85 Color Mapping .................................................................................................................. 8-86 Factory Defaults .......................................................................................................... 8-86 Configuring Color Mapping .......................................................................................... 8-86 Example ...................................................................................................................... 8-86
ix
Table of Contents
Configuration Errors .................................................................................................... 8-87 Policing ............................................................................................................................ 8-87 Factory Defaults .......................................................................................................... 8-87 Configuring Policer Profile ........................................................................................... 8-88 Configuring Policer Aggregate Profile .......................................................................... 8-88 Example ...................................................................................................................... 8-89 Configuration Errors .................................................................................................... 8-89 Marking ............................................................................................................................ 8-89 Factory Defaults .......................................................................................................... 8-90 Configuring Color-Blind Marking Profile ....................................................................... 8-90 Configuring Color-Aware Marking Profile ..................................................................... 8-90 Example ...................................................................................................................... 8-90 Configuration Errors .................................................................................................... 8-91 Priority Queue Mapping ................................................................................................... 8-91 Example ........................................................................................................................... 8-91 8.10 Ethernet OAM .................................................................................................................. 8-101 Standards ...................................................................................................................... 8-101 Factory Defaults ............................................................................................................ 8-101 Functional Description ................................................................................................... 8-101 OAM Elements........................................................................................................... 8-101 OAM Functions .......................................................................................................... 8-102 OAM Connectivity ...................................................................................................... 8-102 MEPs and Services ..................................................................................................... 8-103 MIPs .......................................................................................................................... 8-106 Messaging System ..................................................................................................... 8-107 Performance Monitoring............................................................................................ 8-111 Configuring OAM ............................................................................................................ 8-111 Configuring Maintenance Domains ............................................................................ 8-112 Configuring Maintenance Associations ...................................................................... 8-113 Configuring Maintenance Endpoints .......................................................................... 8-113 Configuring Maintenance Intermediary Points ........................................................... 8-115 Configuring Maintenance Endpoint Services .............................................................. 8-117 Configuring Destination NEs ...................................................................................... 8-118 Displaying OAM Statistics .......................................................................................... 8-119 Performing OAM Loopback ........................................................................................ 8-121 Performing OAM Link Trace ....................................................................................... 8-121 Examples ....................................................................................................................... 8-122 Example 1. Down MEP between Main Card Ports ....................................................... 8-122 Example 2. Down MEP between Main and I/O Card Ports ........................................... 8-124 Example 3. Up MEP between Main Card and Bridge Ports .......................................... 8-128 Configuration Errors ....................................................................................................... 8-132 Chapter 9. Timing and Synchronization 9.1 Clock Selection ..................................................................................................................... 9-1 Standards and MIBs ........................................................................................................... 9-1 Benefits ............................................................................................................................. 9-1 Factory Defaults ................................................................................................................ 9-1 Functional Description ....................................................................................................... 9-2 Clock Domain ................................................................................................................ 9-3 SEC Module ................................................................................................................... 9-6 Input Sources ................................................................................................................ 9-8 Redundancy ................................................................................................................ 9-10 Configuring the Clock ....................................................................................................... 9-11
ETX-5300A Ver. 1.0
Table of Contents
9.2
Configuring the Clock Domain ..................................................................................... 9-12 Configuring the Clock Sources ..................................................................................... 9-14 Configuring Station Clock ............................................................................................ 9-18 Configuring Y-Cable Protection .................................................................................... 9-20 Example ...................................................................................................................... 9-21 Configuration Errors .................................................................................................... 9-23 1588v2 Timing ................................................................................................................... 9-23 Standards and MIBs ......................................................................................................... 9-24 Benefits ........................................................................................................................... 9-24 Factory Defaults .............................................................................................................. 9-24 Functional Description ..................................................................................................... 9-25 1588v2 Master Mode .................................................................................................. 9-25 1588v2 Slave Mode ..................................................................................................... 9-28 Configuring 1588v2 Master Clock ..................................................................................... 9-29 Displaying Status......................................................................................................... 9-30 Displaying Statistics .................................................................................................... 9-32 Configuration Errors .................................................................................................... 9-33 Configuring 1588v2 Slave Clock Configuration ................................................................. 9-33 Defining 1588v2 Slave Entity ...................................................................................... 9-34 Configuring a Peer 1588v2 Master .............................................................................. 9-35 Displaying Status......................................................................................................... 9-36 Displaying Statistics .................................................................................................... 9-37 Configuration Errors .................................................................................................... 9-39 Configuring ToD Clock ...................................................................................................... 9-40 Example ........................................................................................................................... 9-41
Chapter 10. Administration 10.1 Administrative Information ................................................................................................. 10-1 10.2 Date and Time.................................................................................................................... 10-2 Standards and MIBs ......................................................................................................... 10-2 Benefits ........................................................................................................................... 10-2 Factory Defaults .............................................................................................................. 10-3 Functional Description ..................................................................................................... 10-3 Transport Protocol ...................................................................................................... 10-3 Client Operation Mode ................................................................................................ 10-3 Configuring Date and Time............................................................................................... 10-3 Displaying the Date and Time .......................................................................................... 10-4 Example ........................................................................................................................... 10-4 SNTP Configuration .......................................................................................................... 10-4 Defining SNTP Servers ................................................................................................. 10-5 Configuring SNTP Server Parameters ........................................................................... 10-5 Example ...................................................................................................................... 10-6 10.3 Inventory............................................................................................................................ 10-6 Displaying Inventory Information ..................................................................................... 10-6 Displaying Inventory Component Information .................................................................. 10-7 Displaying Manufacture Information ................................................................................ 10-7 Setting Administrative Inventory Information ................................................................... 10-8 Example ........................................................................................................................... 10-9 10.4 Downloading/Uploading Files ........................................................................................... 10-10 Example Download via SFTP ........................................................................................ 10-11 Example Upload via SFTP ............................................................................................. 10-11 10.5 Copying Files within ETX-5300A ....................................................................................... 10-11 File Names in the Unit.................................................................................................... 10-12
ETX-5300A Ver. 1.0 xi
Table of Contents
Displaying Files within ETX-5300A.................................................................................. 10-13 Displaying the List of Configuration Files and their Contents ......................................... 10-14 Example Displaying the List of Configuration Files .................................................. 10-15 Example Displaying the Contents of startup-config File .......................................... 10-15 Example Displaying the Contents of Application Files ............................................. 10-15 Deleting Files ............................................................................................................ 10-16 Saving the Configuration ........................................................................................... 10-16 10.6 Resetting ETX-5300A ....................................................................................................... 10-17 Resetting to Factory Defaults ........................................................................................ 10-17 Resetting to User Defaults ............................................................................................. 10-17 Rebooting the ETX-5300A Chassis ................................................................................. 10-17 Rebooting the Module ................................................................................................... 10-18 Chapter 11. Monitoring and Diagnostics 11.1 Detecting Problems ............................................................................................................ 11-1 Indicators......................................................................................................................... 11-1 Alarms and Traps ............................................................................................................. 11-1 Statistic Counters ............................................................................................................ 11-1 Configuration Error Messages .......................................................................................... 11-2 11.2 Handling Events ................................................................................................................. 11-2 Masking ........................................................................................................................... 11-2 Alarm Buffer .................................................................................................................... 11-3 Alarm Relays .................................................................................................................... 11-3 Configuring Alarm Reporting ............................................................................................ 11-4 Examples ..................................................................................................................... 11-5 Working with the Alarm and Event Logs ........................................................................... 11-6 Example 1: Displaying Active Alarms ............................................................................ 11-7 Example 2. Displaying Active Alarms Details ................................................................ 11-7 Example 3: Displaying Information of LOF alarm on SDH/SONET port .......................... 11-8 Example 4. Alarm Log .................................................................................................. 11-8 Example 5. Alarm List .................................................................................................. 11-9 Example 7. Displaying Brief Log ................................................................................. 11-10 Clearing Alarms ......................................................................................................... 11-10 Alarm List ...................................................................................................................... 11-10 Event List ....................................................................................................................... 11-14 Trap List......................................................................................................................... 11-19 11.3 Running Diagnostic Tests ................................................................................................. 11-26 Running a Ping Test ....................................................................................................... 11-26 Tracing the Route .......................................................................................................... 11-26 11.4 Technical Support ............................................................................................................. 11-27 Chapter 12. Software Upgrade 12.1 Impact ................................................................................................................................ 12-1 12.2 Software Upgrade Options ................................................................................................. 12-1 12.3 Prerequisites ...................................................................................................................... 12-1 Software Files .................................................................................................................. 12-2 System Requirements ...................................................................................................... 12-2 12.4 Upgrading Software using the CLI....................................................................................... 12-2 Using SFTP ....................................................................................................................... 12-2 Pinging the PC .................................................................................................................. 12-3 Activating the SFTP Server ............................................................................................... 12-3 Downloading the New Software Release File to ETX-5300A Flash Disk ............................ 12-3
xii
Table of Contents
Installing the New Software Release File from the Flash Disk........................................... 12-5 Confirmation of Software Application File ........................................................................ 12-6 Displaying Software Upgrade Status ................................................................................ 12-7 12.5 Upgrading Software via the Boot Menu .............................................................................. 12-8 Starting Boot Manager ..................................................................................................... 12-9 Using the FTP Protocol ................................................................................................... 12-11 12.6 Verifying the Upgrade Results .......................................................................................... 12-13 12.7 Restoring the Previous Software Version.......................................................................... 12-18
xiii
Table of Contents
xiv
Chapter 1 Introduction
1.1 Overview
ETX-5300A is a 10G Carrier Ethernet access platform for aggregating SLA-based business Ethernet, legacy TDM and mobile backhaul services. ETX-5300A Carrier Ethernet aggregator enables advanced rate policing and shaping, and performs class of service differentiation through traffic editing. MEF-9, MEF-14, MEF-22 and MEF-26 certified for E-Line (EPL, EVPL) and E-LAN (EPLAN, EVPLAN) services, ETX-5300A ensures five nines (99.999%) service reliability and exact service level agreement (SLA) management. Its automatic fault localization capabilities also help carriers and service providers to reduce operational costs and minimize expensive truck rolls. In addition, ETX-5300A delivers high-quality E1/T1 and STM-1/OC-3 streams, using Circuit Emulation Services (CES). The ETX-5300A system also features advanced Timing over Packet capabilities, allowing for clock synchronization over packet switched networks. Clocking mechanisms include Precision Time Protocol (IEEE 1588-2008), Synchronous Ethernet and adaptive clock recovery. These Timing over Packet features, combined with powerful Carrier Ethernet service delivery attributes, make the ETX-5300A an ideal solution for LTE mobile backhaul applications.
Product Options
ETX-5300A is available with the following interface cards: GbE card with 20 copper or fiber optic GbE ports 10GbE card with two 10GbE ports. STM-1/OC-3 card with up to four channelized STM-1/OC3 ports.
Applications
In a typical service aggregation application, ETX-5300A concentrates SLA-based traffic coming from RADs or third-party Ethernet NTUs. It performs class of service differentiation through traffic editing, uses advanced rate policing and shaping techniques to ensure service reliability and exact service level agreement (SLA) management.
Overview
1-1
Chapter 1 Introduction
Copper GbE
GbE Media Converter FO 10GbE GbE/10GbE G.8032 Ring ETX-5300A TDM STM-1/OC-3 ETX-2xxA ETX-203AX, ETX-36 ETX-205A GbE
PSN
GbE ETX-2xxA
PE
GbE
ETX-5300A PCRF MME GbE G.8023v2 10GbE Ring ETX-5300A GbE, 10GbE P-GW S-GW TDM G.8023v2 10GbE Ring ETX-5300A ETX GbE, 10GbE TDM BTS/Node B DSLAM
RNC
BSC
Features
ETX-5300A aggregates SLA-based business Ethernet, mobile backhaul and legacy TDM services. It combines high-capacity aggregation and carrier-grade performance, enabling cost optimization and freeing up expensive capacity at the PE (provider edge). With efficient traffic management techniques, hardwarebased OAM and performance monitoring, carrier-grade service resiliency and strong Timing over Packet capabilities, ETX-5300A represents a robust multifunctional Ethernet service delivery platform.
1-2
Overview
Chapter 1 Introduction
E-Line (EPL and EVPL) for LAN-to-LAN, VoIP and IP-VPN connectivity, as well as for storage and dedicated Internet access E-LAN (EP-LAN and EVP-LAN) for multipoint Layer 2 VPN, transparent LAN services and multicast networks E-Access for reaching the service providers out-of-franchise subscriber locations as part of providing an end-to-end service 2G, 3GPP and LTE transport.
The 3U modular system features high port density for space-restricted facilities, delivering up to 120 Gbps of user throughput via the following interfaces: Two redundant main cards, each housing four 10GbE network ports Up to four service cards, each housing either 20 UTP/SFP 1-GbE tributary ports, or four channelized STM-1/OC-3 ports, or two 10GbE ports or their combinations.
Forwarding Schemes
Traffic forwarding is performed using point-to-point (E-Line), bridge (E-LAN) or static router mechanisms.
Overview
1-3
Chapter 1 Introduction
ETX-5300As SyncToP capabilities also include a built-in input/output clock interface and support for multiple clock domains. These provide exceptional value for wholesale mobile backhaul service providers, ensuring the required service quality such as 16 ppb (parts per billion) accuracy while eliminating the need for costly dedicated hardware.
1.2
Physical Description
Figure 1-3 shows a general front view of an ETX-5300A chassis. The ETX-5300A
chassis is modular, and has a height of 3U. The chassis is intended for installation in 19-inch (ANSI) and ETSI racks using rack mounting kits available from RAD (not shown in Figure 1-3), however it can also be installed on shelves. Air intake and discharge vents are located on the side walls.
1-4
Physical Description
Chapter 1 Introduction
Front Panel
The front side of the chassis has physical slots in which plug-in modules are installed to obtain the desired equipment configuration: The main and power inlet modules, and the fan tray, are always installed in dedicated chassis slots, called system slots GbE, 10GbE and SDH/SONET service modules are installed in the other chassis slots (called I/O slots).
All the external connections are made to connectors located on the plug-in modules.
Figure 1-4 shows typical ETX-5300A rear views, and identify the functions of the various slots.
Main Cards
1 2 10GbE 3 4 EXT CLK EXT CLK IN OUT GPS TOD MNG 1PPS MNG ETH CONTROL PRI FLT CLK RMV
RAD
ETX-5300A
LINK E5-MC-4 1
ACT
LINK 2
ACT
LINK 3
ACT
LINK 4
10MHz
10GbE
E5-PIM ALARM CRITICAL MAJOR MINOR TEST LED FAN 20 FLT LINK 4 RMV
F I L T E R PS-B MAIN-B MAIN-A PS-A F A I/O 2 I/O 4 N I/O 1 I/O 3
ACT
LINK
ACT
LINK
ACT
LINK
10MHz
DCE
OK FLT
FLT LOS
LINK 1
FLT LOS
LINK 3
FLT LOS
E5-cTDM-4
E5-FAN
Fan Tray
Physical Description
1-5
Chapter 1 Introduction
Rear Panel
The ETX-5300A rear panel may have mechanical extension for housing two AC power supplies.
Available Modules
Table 1-1 lists the modules currently available for the ETX-5300A, their functions,
and ETX-5300A system capacity.
1.3
Functional Description
This section provides a functional description of the ETX-5300A system that supplements the information above.
System Structure
The ETX-5300A is a fully redundant 3U chassis for Ethernet aggregation applications. The chassis accommodates four I/O cards and two main cards.
1-6
Functional Description
Chapter 1 Introduction
System modules (power inlets and AC power supplies, fan module) provide DC or AC power to the system and cool the chassis.
4 x 10GbE
4 x 10GbE
Main Card
Main Card
Timing
Timing
Packet Processor
Common Logic
Packet Processor
Common Logic
Power
Fans ETX-5300A
Main Card
The main card (E5-MC-4) performs three main functions: Control functions: Interfacing with the network management stations, supervision terminals, and Telnet hosts. Control of ETX-5300A system operation. Storage of application software, which determines the capabilities and features provided by the ETX-5300A. Storage of configuration databases. Collection of operational history (alarms, performance statistics, etc.).
Functional Description
1-7
Chapter 1 Introduction
10GbE interface function: E5-MC-4 card provides the interface to 10GbE packet-switched networks for the ETX-5300A packet traffic. It has four external ports, which can be ordered with XFP transceivers with optical interfaces. Clock and timing generation functions: generates nodal clock signals for the ETX-5300A system, locked to user-selected internal or external sources.
Only one main card is required per ETX-5300A chassis; however, the chassis has two slots dedicated to this type of module. The second slot is used to install a redundant main card, thereby providing a hot-standby capability for the ETX5300A 10GbE, system control and timing functions. When a second card is installed, the two cards operate as an active/standby pair; one module is the active card, and the other serves as a hot standby. The four 10GB ports of the standby card can be used without any limitation, exactly as the active main card ports. Only the active card communicates with the management station/terminal and actively manages the ETX-5300A system. The standby card is automatically updated by the active card with all the configuration and status data, and therefore the standby can take over at any time without disrupting system operation. The standby card communicates only with the master module. Moreover, the transmit line in the standby serial port connectors is disabled, to enable physical connection in parallel (e.g., by means of a Y cable) to a management facility.
4 x 10GbE XFPs
Packet Processor
Chapter 1 Introduction
10GbE Interface
ETX-5300A main cards provide four interfaces (10GBase-SR, 10GBase-LR, 10GBase-ER) for full duplex connection to 10GbE packet-switched networks. The card supports IP and Ethernet networks, and is capable of processing data at wire speed. Each 10GbE port of the module has its own MAC address, and can be assigned its own IP address for Layer-3 forwarding. In addition to forwarding user data, the 10GbE interfaces of the E5-MC-4 cards distribute synchronous Ethernet timing (master and slave mode).
Packet Processor
With 100 Gbps full duplex performance, the packet processor (PP) located on the E5-MC-4 cards, serves as: Main engine for point-to-point (E-Line), bridging (E-LAN) and routing (Layer3) forwarding schemes Post-forwarding scheduler and shaper (see Figure 1-7, Figure 1-8 and
Figure 1-9)
Hardware-based OAM utility.
Note
For details on system architecture and traffic management techniques, see Appendix B.
With 2- or 3-levels hierarchical scheduler, multiple queues per shaper, strict and WFQ priorities, WRED congestion avoidance, the egress traffic management (TM) mechanism consists of three queue group types:
Level-0 SEs CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 Up to 8 CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 WFQ 7 WFQ 8 Up to 8 WFQ 1 WFQ 2 WFQ 3 WFQ 4 WFQ 5 WFQ 6 CIR Shaper Level-1 SE CIR/EIR Shapers
Functional Description
1-9
Chapter 1 Introduction
Level-0 SEs CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 CIR/EIR Shapers
Level-2 SE WFQ 1 WFQ 383 WFQ 384 Up to 384 Up to 64 WFQ 1 WFQ 2 WFQ 63 WFQ 64 Up to 64
WFQ 3 WFQ 4 Up to 384 CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4
WFQ 2
CIR Shaper
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes supported by ETX-5300A.
1-10
Functional Description
Chapter 1 Introduction
Management Subsystem
The main functions of the management subsystem located on the main card module are as follows: Interfacing with external management and monitoring functions. The following options are available: Supervision terminal: ASCII terminal or a PC running a terminal emulation program, connected directly to ETX-5300A. This terminal can perform all the ETX-5300A supervision and configuration functions, and in particular the preliminary system configuration. Telnet: by means of any host capable of IP communication with ETX5300A. The functions available under the Telnet protocol are similar to those available from a supervisory terminal. SSH: secure access using the SSH (Secure Shell) protocol, using any standard SSH client utility running on a PC or laptop capable of IP communication with ETX-5300A. SNMP: ETX-5300A includes an internal SNMP agent that enables full SNMP management by SNMP-based network management, for example, the RADview family of management stations for element and network management available from RAD. Syslog: ETX-5300A supports automatic event notification to user-specified Syslog servers in accordance with the Syslog protocol per RFC 3164. ETX-5300A can report all the supported traps and alarms, but also enables configuring the minimal severity level for reporting to each Syslog server.
To protect network operations against unauthorized access, ETX-5300A supports a wide range of security features for every management facility: RADIUS authentication for supervision terminal and Telnet access, SSH for secure Telnet access, and SNMP management with authentication and privacy per SNMPv3 using selectable security models, with support for SNMPv1 and SNMPv2. To record and track information on device operation and user activity on it, ETX-5300A supports TACACS+ client application. The application provides shell, system and command accounting. Control of ETX-5300A system operation. Storage of application software, which determines the capabilities and features provided by the ETX-5300A. This software can be remotely downloaded and updated through the management link without taking the equipment off-line. The stored software includes both system software, run by the main card, and software for the other modules installed in the chassis. Storage of configuration databases (factory-default, running, startup or userdefault). See Chapter 3 for explanation of startup procedure and different types of configuration databases. Collection of operational history (alarms, performance statistics, etc.), and of internal chassis temperature, as read by an internal temperature sensor. The collected information can be read by maintenance personnel through the management link.
Functional Description 1-11
Chapter 1 Introduction
A real-time clock provides time stamps for all the collected information. The real-time clock can be set either manually or automatically, using the NTP (Network Time Protocol). A network operator can use NTP to periodically synchronize the local equipment time within the managed network to the accurate time provided by the worldwide network of NTP time servers, and thus is able to reliably correlate alarm reports from different sources. To use NTP, it is necessary to configure the IP address of the desired NTP server, and select a time zone. The performance statistics collected for the modules installed in the chassis are also synchronized to the real-time clock.
Serial Port
The supervisory port of the ETX-5300A has a serial RS-232 asynchronous DCE interface terminated in a 9-pin D-type female connector, designated CONTROL DCE. This port is connected directly to terminals using the CBL-DB9F-DB9M-STR cable available from RAD.
The cards provide physical connection to user equipment, perform packet processing and distribute synchronous Ethernet timing (master and slave mode).
1-12
Functional Description
Chapter 1 Introduction
Physical Interface
Packet Processor
Timing
CPU
Packet Processor
Packet processor (PP) located on the E5-GbE-20 and E5-10GbE-2 cards serves for classification, CoS/color mapping, policing and pre-forwarding traffic management (Figure 1-11).
Functional Description
1-13
Chapter 1 Introduction
Level-0 SEs SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 Up to 50 SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 Up to 50 CIR Shapers
WFQ 49 WFQ 50
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes supported by ETX-5300A.
SDH/SONET Card
The E5-cTDM-4 card operates as a quad-port SDH/SONET terminal multiplexer for the ETX-5300A chassis that terminates STM-1/OC-3 links and their overhead. The module has four independent channelized STM-1/OC-3 ports, where each port is capable of multiplexing up to 63 E1 or 84 T1 internal streams into one STM-1 or OC-3 data stream. The card uses pseudowire emulation to deliver E1/T1 streams over packet-switched networks (UDP/IP or Ethernet). Figure 1-12 illustrates the E5-cTDM-4 card block diagram.
1-14
Functional Description
Chapter 1 Introduction
4 x STM-1/OC-3 SFPs
Timing
CPU
E5-cTDM-4
STM-1/OC-3 Interfaces
The TDM interfacing subsystem provides interfaces to the TDM users equipment or network. The physical STM-1/OC-3 ports support a wide variety of SFP transceivers with optical interfaces for meeting a wide range of operational requirements.
SDH Interface
The SDH interface provides physical STM-1 interfaces for direct access to the Synchronous Digital Hierarchy (SDH) transmission cores at the STM-1 level (155.520 Mbps), and also handle the TDM traffic flow between ETX-5300A internal E1 ports, and the SDH network. Total module capacity is 252 E1 data streams. E1/T1 mapping to STM-1 is performed using the G.707 mapping scheme: E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 > STM-1 T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1.
Functional Description
1-15
Chapter 1 Introduction
SONET Interface
SONET interface provides physical OC-3 interfaces for direct access to the Synchronous Digital Hierarchy (SONET) transmission cores at the OC-3 level (155.520 Mbps), and also handles the TDM traffic flow between ETX-5300A internal T1 ports, and the SONET network. Total module capacity of 336 T1 data streams. T1 mapping to OC-3 is performed using the G.707 mapping scheme: T1 > VT1.5 > VT group > STS-1 > OC-3.
Pseudowire Services
The pseudowire processing subsystem performs the conversion between the circuit-switched (TDM) and packet-switched networks, using pseudowire emulation technology. The main steps of the circuit emulation procedure are the following: SDH/SONET payload received via STM-1/OC-3 interfaces is processed by the framer to extract timing information and separate E1/T1 timeslots (the framer creates an internal E1/T1 port, which is connected through the mapper to the SDH/SONET link). The resulting payload is provided to packet processor. The packet processor converts the payload into packets suitable for transmission over the packetswitched network. The resulting packets are encapsulated in Ethernet frames and sent to the main card for analyses and forwarding to the UDP/IP or Ethernet (MEF-8) network.
ETX-5300A uses the following payload encapsulation techniques during packet processing: CESoPSN transports raw TDM data, that is, packets are formed by inserting a user-specified number of complete TDM frames in the packet payload area. Therefore, CESoPSN pseudowires can only be configured on framed ports. SAToP is different from the CESoPSN, in that it is used to transfer transparently a bit stream at the nominal port rate (2.048 Mbps). Therefore, SAToP can be used only when the port uses the unframed mode, and thus only one pseudowire can be configured per port.
Note
The SAToP packet overhead is large, and therefore, for efficient bandwidth utilization, the number of raw TDM bytes per packet should be as large as possible.
Packetizing Considerations
The number of TDM bytes per frame affects several performance aspects: Bandwidth utilization. Because of the relatively short payload, the bandwidth utilization efficiency depends on the overhead that must be transmitted to the network in order to support the transmission of a certain amount of payload.
1-16
Functional Description
Chapter 1 Introduction
The overhead depends on the packet structure: for example, for UDP/IP networks the overhead is 50 bytes when using VLANs, and 46 bytes without VLANs The payload depends on the number of TDM bytes.
For example, when using the payload size of 48 bytes, bandwidth utilization efficiency is around 50%. Packetizing delay. Bandwidth utilization efficiency increases when using a large payload size per frame. However, there is additional aspect (packetization time) that must be considered when selecting the size of the packet payload. When E5-cTDM-4 builds a frame, a packetization delay is introduced. The packet creation time (PCT) is different for the different payload encapsulation methods. It is calculated according to the following formulas:
Mode CESoPSN
N Number of TDM bytes in packet TS Number of timeslots in one frame (32 for E1 or 24 for T1)
Round-trip delay. The voice path round-trip delay is a function of all connections and network parameters. The delay value, 2 msec, is given by: RT Delay(msec) = 2 (PCT + Jitter Buffer Level) + network round trip delay Increasing payload size reduces the ratio between the IP/Ethernet header segment in the packet and the payload, thus reducing the total Ethernet throughput. On the other hand, packetization delay is increased; this contributes to a higher end-to-end delay. This effect can be small and negligible when a full E1/T1 (or many timeslots) are transferred, but can be very significant when few timeslots are transferred. Configuring the TDM bytes per frame (TDM bytes/frame) parameter has impact on the Ethernet throughput (bandwidth or traffic traveling through the Ethernet). This parameter controls the number of TDM bytes encapsulated in one frame.
Sometimes, it is necessary to evaluate the transmission bandwidth required on the PSN, which also depends on the number of TDM bytes.
Chapter 1 Introduction
transmitted). In reality, however, packets arrive at irregular intervals, because of variations in the network transmission delay. The term Packet Delay Variation (PDV) is used to designate the maximum expected deviation from the nominal arrival time of the packets at the far end device.
Note
The deviations from the nominal transmission delay experienced by packets are referred to as jitter, and the PDV is equal to the expected peak value of the jitter. However, nothing prevents the actual delay from exceeding the selected PDV value.
To compensate for deviations from the expected packet arrival time, each pseudowire emulation module uses jitter buffers that temporarily store the packets arriving from the PSN (that is, from the far end equipment) before being transmitted to the local TDM equipment, to ensure that the TDM traffic is sent to the TDM side at a constant rate. For each pseudowire, the jitter buffer must be configured to compensate for the jitter level expected to be introduced by the PSN; that is, the jitter buffer size determines the Packet Delay Variation Tolerance (PDVT). Two conflicting requirements apply: Since packets arriving from the PSN are first stored in the jitter buffer before being transmitted to the TDM side, TDM traffic suffers an additional delay. The added delay time is equal to the jitter buffer size configured by the user. The jitter buffer is filled by the incoming packets and emptied out to fill the TDM stream. If the PSN jitter exceeds the configured jitter buffer size, underflow/overflow conditions occur, resulting in errors at the TDM side: A jitter buffer overrun occurs when it receives a burst of packets that exceeds the configured jitter buffer size + packetization delay. When an overrun is detected, the pseudowire packet processing subsystem clears the jitter buffer, causing an underrun. A jitter buffer underrun occurs when no packets are received for more than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is automatically filled with a conditioning pattern up to the PDVT level in order to compensate for the underrun. Then, the pseudowire packet processing subsystem starts processing the packets and empty out the jitter buffer toward the TDM side. To minimize the possibility of buffer overflow/underflow events, two conditions must be fulfilled: The buffer must have sufficient capacity. For this purpose, the buffer size can be selected by the user in accordance with the expected jitter characteristics, separately for each pseudowire, in the range of 0 to 200 msec. The read-out rate must be equal to the average rate at which frames are received from the network. For this purpose, the read-out rate must be continuously adapted to the packet rate, a function performed by the adaptive clock recovery mechanism of each packet processor.
1-18
Functional Description
Chapter 1 Introduction
After the jitter buffer mechanism reaches a stable state, there may still be temporary changes in network delay, which occur before the mechanism can readjust. To provide the best possible user experience the user can specify how to handle packets under such transient conditions: By specifying that the handling will be sensitive to delay, the user instructs the receiving end to automatically reset the jitter buffer when the buffer remains at its high value for a long time (this introduces a long delay). As a result, some packets are discarded, but for voice applications and under normal conditions, this results in negligible voice degradation. By specifying that the handling will be sensitive to data, the user instructs the receiving end to do nothing until eventually an under- or overrun occurs, or conditions return to normal. This achieves the best possible data integrity (error correction, or higher protocols, may sometimes compensate for the resulting problems).
Adaptive Timing
Each PDH port can use the adaptive timing mode to lock its transmit timing to the clock signal associated with the payload carried by a user-specified pseudowire. The adaptive clock recovery mechanism estimates the average rate of the payload data received in the frames arriving from the packet-switched network. Assuming that the packet-switched network does not lose data, the average rate at which payload arrives will be equal to the rate at which payload is transmitted by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order, are replaced by special dummy packets. However, for CESoPSN and SAToPSN, packets can be reordered.
The method used to recover the payload clock of a pseudowire is based on monitoring the fill level of the selected pseudowire jitter buffer: the clock recovery mechanism monitors the buffer fill level, and generates a read-out clock signal with adjustable frequency. The frequency of this clock signal is adjusted so as to read frames out of the buffer at a rate that keeps the jitter buffer as near as possible to the half-full mark. This condition can be maintained only when the rate at which frames are loaded into the buffer is equal to the rate at which frames are removed. Therefore, the adaptive clock recovery mechanism actually recovers the original payload transmit clock. The performance of the clock recovery mechanism can be optimized for the operating environment, by specifying the following parameters: The accuracy of the original timing source, in accordance with the standard SDH/SONET terminology (Stratum 1, 2, 3, 3E, or 4/unknown) The type of PSN that transports the traffic: router-based network (for example, UDP/IP) versus switch-based network (for example, Ethernet).
Timing Subsystem
See Timing Mechanism section below for detailed descriptions of clocking schemes supported by ETX-5300A.
Functional Description
1-19
Chapter 1 Introduction
Timing Mechanism
ETX-5300A timing subsystem includes a central timing subsystem, located on the main card, and local timing subsystems located on the individual I/O modules. Since ETX-5300A is normally equipped with two main cards, redundancy is also available for the central timing subsystem. The figure below shows the functional block diagram of the ETX-5300A timing mechanism.
Main Card System Clock 10GbE Ports
1588v2 (master)
T0
SEC
Mux
Station Clock Output (T4) Secondary Clock via Standby Main Card
The SEC outputs a clock with Stratum-3 accuracy, jitter and holdover, complying with the following requirements:
1-20
Functional Description
Chapter 1 Introduction
GR-253-CORE for SONET Stratum 3 and SONET minimum clock (SMC) GR-1244-CORE Stratum 3 ITU-G813 Option 1 and Option 2 for SDH Equipment Clock (SEC).
Ethernet Ports
Ethernet ports located on E5-MC-4, E5-10GbE-2 or E5-GbE-20 support Synchronous Ethernet (Sync-E) master and slave modes according to ITU-T G.8261G.826 requirements. This allows each port to: Extract the port clock to be used a source clock to the clock selection mechanism Set the port Tx clock according the domain clock available from the main card.
Sync-E mode can be used for clock frequency distribution. If the ToD (time) is not required, the 2-way 1588v2 slave entities can be used. The main advantage of Sync-E over 1588v2 clock is that it is distributed over physical layer; it is a Stratum-3 clock with near SDH/SONET holdover properties; it is not packetoriented and is considered to be more stable.
STM-1/OC-3 Ports
An Rx clock of any STM-1/OC-3 port on the E5-cTDM-4 card can be extracted and supplied to the main card clock selection mechanism (via backplane clock bus).
Note
When APS is enabled, the clock is used from a selected interface and not from an APS group.
A Tx clock of an STM-1/OC-3 port can be locked to: ETX-5300A system clock Rx clock of the port.
E1/T1 Ports
An Rx clock of any internal E1 or T1 port on the E5-cTDM-4 card can be extracted and supplied to the main card clock selection mechanism (via backplane clock bus). Moreover, ETX-5300A can use an adaptive clock, recovered from a TDM pseudowire stream as an Rx clock source. A Tx clock of an internal E1/T1 port can be locked to: ETX-5300A system clock Rx clock of the port Adaptive clock.
Functional Description
1-21
Chapter 1 Introduction
ETX-5300A recovers Building-Integrated Timing Supply (BITS) clock via the station clock interface ports on E5-MC-4 card. See Appendix A for the external clock connector pinout. The following clock signals are supported: 2.048 Mbps, ITU-T G.703, 120 balanced, 75 balanced 1.544 Mbps, ANSI T1-403, 100 balanced 2.048 MHz squarewave, RS-485 64 kHz, ITU-T G.703, composite clock interface, 110 balanced.
When only one external clock source is available, you can improve hardware protection by connecting the external clock inputs in parallel, by means of a Y-cable.
Master Mode
Using 1588v2 master mode eliminates the need for an external timing device installed in the core of the network to support 1588v2 timing distribution. The ETX-5300A device can be located near the core of the network to supply up to 512 clock reference streams to remote Ethernet CPEs. Currently, only UDP/IP encapsulation is supported.
Slave Mode
In the 1588v2 slave mode, ETX-5300A provides clock recovery mechanism with frequency and phase alignment. Currently, only UDP/IP encapsulation is supported.
Transparency Mode
If there is a 1588v2 grandmaster in the network, ETX-5300A can operate in transparent clock mode, transferring 1588 packets to remote Ethernet CPEs with updated correction field. In this case remote a CPE can operate in a slave mode, if a NodeB has no slave clock capabilities, or in transparent mode if a NodeB supports 1588v2.
1-22
Functional Description
Chapter 1 Introduction
GPS Clock
ETX-5300A accepts GPS-based frequency and phase reference signal from GPS units, using the following interfaces on the E5-MC-4 card: Input or output of 10 MHz sinewave synchronization signal via mini-BNC connector Input and output of ToD timestamp signal via RJ-45 connector with RS-422 interface Input or output of 1 pps TTL synchronization signal via mini-BNC (DIN 1.0/2.3) connector.
When only one GPS clock source is available, you can improve hardware protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
1.4
System Capacity
Technical Specifications
Up to 4
120 Gbps 100 Gbps, full duplex (100 Gbps ingress and 100 Gbps egress) 4 per E5-MC-4 card 2 per E5-10GbE-2 card
10GbE Interface
Number of Ports
Transceiver Type
Fiber optic XFP, flow control: 10GBase-SR, 850 nm, 550m (1804 ft) 10GBase-LR, 1310 nm, 10 km (6.2 mi) 10Gbase-ER, 1550 nm, 40 km (24.8 mi)
LC 20 per E5-cTDM-4 card Fiber optic SFP: 1000BaseSX, multimode, 850 nm, autonegotiation, flow control 1000BaseLX, single mode, 1300 nm, autonegotiation, flow control 100BaseFX, full duplex only, flow control
GbE Interface
Technical Specifications
1-23
Chapter 1 Introduction
SDH/SONET Interface
4 per card
155.520 Mbps SDH: ITU-T Rec. G.707, G.708, G.709 SONET: GR-253-CORE and ANSI T1.105
Fiber optic SFP 63 E1 or 84 T1 per G.707/Y.1322 SDH: E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 > STM-1 T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1 SONET: T1 > VT1.5 > VT group > STS-1 > OC-3
Jitter Tributaries E1 Framing T1 Framing SDH/SONET Transmit Clock E1/T1 Transmit Clock Connector
G.958, G.825 E1, 2.048 Mbps or T1, 1.544 Mbps Unframed, multiframe with or without CRC-4 Unframed, SF, ESF System, port Rx clock (loopback)
Ethernet Forwarding
Forwarding
Number of EVCs
4K
1-24
Technical Specifications
Chapter 1 Introduction
E-Line (EPL, EVPL), E-LAN (EPLAN, EVPLAN) MEF 9, MEF 14, MEF 22, MEF 26 SP + WFQ
Traffic Management
QoS Mechanism
Policer
Color Mode Standard CIR/EIR Range (1 kbps Granularity) CIR/EIR Resolution (Actual Rate)
016.384 Mbps: 1 kbps 016.384 163.84 Mbps: 10 kbps 163.84 Mbps1.6384 Gbps: 100 kbps 1.638410 Gbps: 1 Mbps
1 byte
063 byte
3-level
Up to 16K Up to 256
Technical Specifications
1-25
Chapter 1 Introduction
Congestion Control
Bridge
Mode Number of Instances Number of Ports Number of Broadcast Domains Number of MAC Table Entries MAC Table Size
256K (max)
64 (default), 256, 512, 1024, 4094, 16384, userconfigurable per broadcast domain 3003600 sec 1
Router
Number of Router Instances Number of Interfaces (RIFs) Number of Routing Table Entries Number of ARP Table Entries
Up to 128
Up to 1K, static
Up to 1000, dynamic
Pseudowire
CESoPSN, SAToP
UDP/IP, MEF-8
Protection
E5-MC-4 card, E5-PIM card 1+1 unidirectional APS per G.841 LAG, Ethernet Ring Protection per G.8032
Timing
1-26
Technical Specifications
Chapter 1 Introduction
Nodal Clock
GR-253-CORE for SONET Stratum 3 and SONET minimum clock (SMC) GR-1244-CORE Stratum 3 ITU-G813 Option 1 and Option 2 for SDH Equipment Clock (SEC)
Clock Sources
Up to 4 inputs for selection mechanism 1588v2 recovered, station (BITS/GPS) , I/O port Rx, main card port Rx
1588v2 Sync-E
Master/slave/transparent (TC) Master/slave, ITU-T G.8261G.8266, with primary/secondary clock redundancy Input and output: 2.048 Mbps, ITU-T G.703, 120 balanced, 75 balanced 1.544 Mbps, ANSI T1-403, 100 balanced 2.048 MHz squarewave, RS-485 64 kHz, ITU-T G.703, composite clock interface, 110 balanced
GPS
10 MHz, sinewave via mini BNC (DIN 1.0/2.3), input or output ToD, RS-422 via RJ-45 (input and output) 1 PPS TTL interface via mini BNC (DIN 1.0/2.3), input or output
OAM
Technical Specifications
1-27
Chapter 1 Introduction
Diagnostics
User-activated loopback, inband T1, BERT Ping, trace route Supervision terminal Telnet SSH SNMP (RADview-EMS and other SNMP-based network management stations)
Management
Management Capabilities
CLI
SNMPv1, SNMPv2, SNMPv3 Serial ports on main card 10/100/1000BaseT port on main card, supports Telnet, SSH, and SNMP Inband via network or user ports, supports for Telnet, SSH, and SNMP
Management Interfaces
Interface: RS-232 asynchronous DCE Data Rate: 0.3, 1.2, 2.4, 4.8, 9.6, 19.2, 38.4, 57.6 and 115.2 kbps Connector: 9-pin D-type female
Password-protected login, RADIUS, TACACS+ Interface 10/100/1000BaseT Duplex mode Full duplex only. Default maximum capability 100 Mbps full duplex. Autonegotiation, MDI-X, no flow control Maximum frame size 1518 bytes Connector RJ-45
Alarms
Last 256 time-stamped alarms stored in buffer Alarm synchronization, correlation, severity indication, masking
RMON Syslog
Alarm Relay
Alarm Outputs
Major alarm indication by floating change-over drycontact contacts Minor alarm indication by floating change-over contacts
1-28
Technical Specifications
Chapter 1 Introduction
Max. 60 VDC/30 VAC across open contacts Max. 1 ADC through closed contacts Max. load switching capacity: 60W
One active-low input, RS-232 levels PWR (green) Input power is OK FLT (red) Hardware failure is detected
Indicators
E5-PIM
E5-FAN
OK (green) Fans are operating properly FLT (red) Hardware failure is detected CRITICAL (red) Critical alarm is detected MAJOR (orange) Major alarm is detected MINOR (yellow) Minor alarm is detected TEST (yellow) Test in progress
E5-MC-4
RMV (blue) Safe extract mode FLT (red) Hardware, software or power failure is detected PRI (green) Primary/secondary card mode CLK (red) Station clock status LINK (green) 10GbE or GbE link status ACT (yellow) 10GbE or GbE activity status
E5-10GBE-2
LINK (green) 10GbE link status ACT (yellow) 10GbE activity status RMV (blue) Safe extract mode FLT (red) Hardware, software or power failure is detected
E5-GBE-20
LINK (green) 10GbE link status ACT (yellow) 10GbE activity status RMV (blue) Safe extract mode FLT (red) Hardware, software or power failure is detected
E5-cTDM-4
ON LINE (green) Card administrative status LOS (red) Loss of synchronization is detected RMV (blue) Safe extract mode FLT (red) Hardware, software or power failure is detected
Power
AC Power DC Power
100 to 240 VAC (115/230 VAC nominal), 50/60 Hz 4072 VDC (48 or 60 VDC nominal)
Technical Specifications
1-29
Chapter 1 Introduction
Power Consumption
500W max 440 mm (17.3 in) 133 mm (5.2 in), 3U 380 mm (15.0 in) DC, 455 mm (23.6 in) AC/DC 12 kg (26.4 lb), maximum Operating: 0 to 50C (32 to 122F) Storage: -20 to +70C (0 to 150F)
Physical
Environment
Temperature
Humidity Cooling
1-30
Technical Specifications
After the system is installed, it must be configured it in accordance with the specific user's requirements. The preliminary system configuration is always performed by means of a supervision terminal (procedures for using the terminal are detailed in Chapter 4). The software necessary for using the terminal is stored in the main cards: if the main cards are not yet loaded with the required software, refer to Chapter 12 for detailed software installation instructions. After the preliminary configuration, the system can also be managed by means of Telnet hosts or SNMP-based network management stations, e.g., RADview. Refer to the User's Manual of the network management station for operating instructions.
Safety
Before starting, read the following safety precautions, which are applicable throughout the installation procedures. Where necessary, specific precautions also appear before certain procedures. No internal settings, adjustment, maintenance, and repairs may be performed by either the operator or the user; such activities may be performed only by a skilled technician who is aware of the hazards involved. Always observe standard safety precautions during installation, operation, and maintenance of this product.
Warning
2-1
Caution Delicate electronic components are installed on both sides of the printed circuit
boards (PCBs) of the ETX-5300A cards. To prevent physical damage: Always keep cards in their protective packaging until installed in the ETX-5300A chassis, and return them to the packaging as soon as they are removed from the enclosure. Do not stack cards one above the other, and do not lay any objects on PCBs. After removing a card from a slot, wait at least four seconds before reinserting it. When inserting a card into its chassis slot, align it carefully with the chassis slot guides, and then push it in gently. Make sure the card PCB does not touch the adjacent cards, or any part of the chassis. If resistance is felt before the card fully engages the mating backplane connector, retract the card, realign it with the slot guides and then re-insert.
Grounding
For your protection and to prevent possible damage to equipment when a fault condition, e.g., a lightning stroke or contact with high-voltage power lines, occurs on the lines connected to the equipment, the ETX-5300A case must be properly grounded (earthed) at any time. Any interruption of the protective (grounding) connection inside or outside the equipment, or the disconnection of the protective ground terminal can make this equipment dangerous. Intentional interruption is prohibited.
Grounding
Dangerous voltages may be present on the electrical cables connected to the ETX-5300A and its cards.
Warning
Never connect cables to ETX-5300A if not properly installed and grounded. Disconnect all the cables connected to the electrical connectors of the ETX-5300A before disconnecting its grounding connection. Before connecting any other cable and before applying power to this equipment, the protective ground terminal of the equipment must be connected to protective ground. The grounding connection is made to the grounding terminal located on the ETX-5300A rear panel. Whenever ETX-5300A units are installed in a rack, make sure that the rack is properly grounded and connected to a reliable, low-resistance grounding system, as the rack can also provide a connection to the ground. In addition, the grounding connection is also made through each one of the AC power cables. Therefore, the power cable plug must always be inserted in a socket outlet provided with a protective ground.
2-2
Laser Safety
ETX-5300A modules may be equipped with a laser diode. In such cases, a label with the laser class and other warnings as applicable will be attached near the optical transmitter. The laser warning symbol may be also attached. For your safety: Before turning on the equipment, make sure that the fiber optic cable is intact and is connected to the optical transmitter. Do not use broken or unterminated fiber-optic cables/connectors. Do not look straight at the laser beam, and do not directly into the optical connectors while the unit is operating. Do not attempt to adjust the laser drive current. The use of optical instruments with this product will increase eye hazard. Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an optical instrument. Use of controls or adjustment or performing procedures other than those specified herein may result in hazardous radiation exposure. ATTENTION: The laser beam may be invisible! ETX-5300A modules equipped with laser devices provided by RAD comply with laser product performance standards set by governmental agencies for Class 1 laser products. The modules do not emit hazardous light, and the beam is totally enclosed during all operating modes of customer operation and maintenance. In some cases, the users may insert their own SFP or XFP laser transceivers into ETX-5300A modules. Users are alerted that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are used. In particular, users are warned to use only agency approved products that comply with the local laser safety regulations for Class 1 laser products. Wherever applicable, ETX-5300A modules are shipped with protective covers installed on all the optical connectors. Do not remove these covers until you are ready to connect optical cables to the connectors. Keep the covers for reuse, to reinstall the cover over the optical connector as soon as the optical cable is disconnected.
Warning
2-3
(ESD). To prevent ESD damage, always hold a module by its sides, and do not touch the module components or connectors. If you are not using a wrist strap, before touching a module, it is recommended to discharge the electrostatic charge of your body by touching the frame of a grounded equipment unit. Whenever feasible, during installation works use standard ESD protection wrist straps to discharge electrostatic charges. It is also recommended to use garments and packaging made of antistatic materials or materials that have high resistance, yet are not insulators.
2.1
Before connecting this product to a power source, make sure to read the Handling Energized Products section at the beginning of this manual.
Warning Caution ETX-5300A does not have a power switch, and therefore will start operating as
soon as power is applied to one of the power supply inlets. The external circuit breaker used to protect the input power line can be used as an ON/OFF power switch, or an external ON/OFF switch may be installed.
Power
ETX-5300A can be equipped with either AC or DC power inlet (PI) modules, which conduct power from external sources to the ETX-5300A backplane. There are two PI module types: DC for 4072 VDC (48 or 60 VDC nominal), up to 12A current AC for 100240 VAC, up to 6A current. It operates in conjunction with AC power supplies installed in a hardware extension at the back of the chassis. The AC power supplies convert AC voltage into 48 VDC voltage.
2-4
ETX-5300As with AC power supplies can be powered via any combination of PI cards: 2 AC, AC and DC, 2 DC. ETX-5300A without AC power supplies can be powered only via 2 DC PI cards. If one of the power feeds fails all the power is delivered by the redundant feed.
AC Power
AC-powered ETX-5300A units should be powered via easily-accessible grounded AC outlets capable of furnishing 100, 115 or 230 VAC, 50/60 Hz. The connection of AC power is made through the front panel AC power inlet module. This module has a separate input connector for each AC power supply module installed in the mechanical extension at the back of the chassis. It is necessary to arrange a single ON/OFF power switch to simultaneously apply power to all the ETX-5300A power inlets. Powering AC power supply modules one at a time may cause undesirable effects.
DC Power
DC-powered ETX-5300A units require a 48 or 60 VDC (nominal voltage) power source supplied over 14 AWG (1. 5 mm2) wires. The connection of DC power is made through DC power inlet modules, which deliver the DC input voltage to power supplies installed on main and I/O cards via two redundant backplane buses. The second DC input enables connecting a separate DC input voltage, and thus when power is connected to both DC input connectors, availability is increased by having a redundant power source. The two DC inputs are isolated, and therefore it is not possible for current to flow from one DC input to the other.
Caution The same nominal DC voltage must be supplied to both DC input connectors.
Each DC input must be protected by its own circuit breaker rated at 25A maximum.
Warning
Within the ETX-5300A, the DC input supply lines are not referenced to the chassis (frame) ground.
Panel Clearance
ETX-5300A can be installed on shelves and in telecommunication racks. RAD offers rack mount kits for installation in 19 inch (ANSI) racks or in ETSI racks. Allow at least 70 mm (2.7 inches) of clearance at front, top, bottom and side for cables and module replacement.
Note
70 mm (2.7 inches) clearance is sufficient for most telecommunication and power connections (including fiber optic lines), but some more rigid cables (such as Krone) require as much as 110 mm (4.3 inches) of clearance.
2-5
Ambient Requirements
The ambient operating temperature range of the ETX-5300A is 32 to 122F (0 to +50C), at a relative humidity of up to 93%, non-condensing.
Caution Do not operate ETX-5300A without the fan tray installed. Irreversible damage to
hardware will occur if the chassis is operated without the fan tray installed, even for a few minutes (maximum allowed at room temperature is 5 minutes).
Covering all empty slots is also required for reasons of personal safety and for efficient cooling of the chassis.
Warning
2.2
Package Contents
The ETX-5300A package includes the following items: ETX-5300A chassis Power cords Hardware kit for rack installation Cable manager.
Cards are shipped either separately, or preinstalled in the chassis, in accordance with your order. If your chassis is shipped with preinstalled cards, skip the card installation procedures described below
2.3
Required Equipment
The cables needed to connect to ETX-5300A depend on your specific application. You can prepare the appropriate cables yourself in accordance with the information given in Appendix A, or you can order cables from RAD.
2-6
Required Equipment
2-7
Figure 2-2. Attaching Brackets for Front Edge Installation in 19 Racks Figure 2-3 shows how to attach the brackets supplied in the
RM-GMUX-5300/3U/23/FRONT kit for front edge installation in 23 racks.
Figure 2-3. Attaching Brackets for Front Edge Installation in 23 Racks Figure 2-4 shows how to attach the brackets supplied in the
RM-ETX-5300-3U-23-NEBS kit for mid-chassis installation in 23 racks.
2-8
Figure 2-4. Attaching of Brackets for Mid-Chassis Installation in 23 Racks Note Mid-chassis fitting, using the RM-ETX-5300-3U-23-NEBS kit, meets the requirement for seismic Zone 4 installations. Figure 2-5 shows how to attach the front and rear brackets supplied in the
RM-ETX-5300-AC-3U-19-FRONT kit for front edge installation of AC-powered ETX5300A devices in 19 racks. AC power supplies increase the units depth and weight. Installation of AC-powered ETX-5300A devices in 19 racks requires additional brackets attached to the rear of the chassis.
Figure 2-5. Attaching Brackets for Front Edge Installation and Rear Fastening in 19 Racks
To install ETX-5300A in the rack: 1. Identify the prescribed position of each ETX-5300A in the rack, in accordance with the rack installation plan. 2. With help from an additional person, place ETX-5300A in its prescribed position, and then insert the guide posts located on each bracket in the matching holes in the rack side rails. This will help keep ETX-5300A in position until it is fastened to the rack with the screws.
2-9
3. While the other person holds ETX-5300A in place, fasten the chassis to the rack side rails with four screws, washers and nuts. 4. After installing the enclosure, check and install the required modules, in accordance with the installation plan.
2.6
This section provides instructions for installing a fan tray in an empty chassis. The same procedure is used to replace the fan tray.
2-10
The fan tray includes a total of eight fans that provide cooling air. The fans are divided into two groups (four fans each), which are independently controlled by main cards A and B. The rotation speed of the fans, and thus the airflow, can be varied to adapt to the cooling requirements; for example, when the temperature inside the enclosure is sufficiently low, the speed is decreased to reduce wear and noise.
Figure 2-7 shows a view of the fan tray panel. The fan tray has two indicators,
pertaining to fan operation. The panel also has a 15-pin D-type female connector serving as an alarm relay with LED indicators for alarm monitoring. The fan and alarm relay indicators are described in Chapter 3.
RAD
ETX-5300A
ALARM
F I L T E R
E5-FAN
Figure 2-7. Fan Tray Panel Note The I/O slots labels are located on the fan tray panel.
To install the fan tray: 1. Carefully check the fan tray for foreign objects and dirt that may be trapped inside, and remove them. 2. Insert the fan tray in the chassis slot, and slide it in until its rear connector engages the mating connector on the backplane. 3. Secure the fan tray by tightening its two spring screws.
Caution The cooling fan tray exhausts air from the chassis. The chassis cooling vents are
located in the side panel. Do not obstruct these vents. Leave at least 80 mm (3.1 inch) clearance for sufficient airflow. When replacing the ETX-5300A fan tray in an operating chassis, do it quickly; irreversible damage to hardware will occur if the chassis is operated without the fan tray installed, even for a few minutes (maximum allowed at room temperature is 5 minutes).
2.7
The connection of power to the ETX-5300A power supply modules is made through hot-swappable PI modules. Figure 2-8 and Figure 2-9 show the offered PI modules. Chapter 3 describes the PI module indicators. DC connector pinout is given in Appendix A.
2-11
E5-PIM/AC Module
The E5-PIM/AC module is used for connecting to 100240 VAC power sources. The E5-PIM/AC can be used only in ETX-5300A units, that have AC power supplies installed in the mechanical extension at the back of the chassis.
E5-PIM/DC Modules
The E5-PIM/DC modules are used for connecting to 4072 VDC (48 VDC nominal) power sources.
Installing PI Modules
Caution ETX-5300A units with AC power supplies can be powered via any combination of
PI cards: 2 AC, AC and DC, 2 DC. ETX-5300A without AC power supplies can be powered only via 2 DC PI cards. To install a PI module: 1. Check that the two fastening screws of the PI module move freely. 2. Insert the PI module in its chassis slot, and slide it in until its rear connector engages the mating connector on the backplane. 3. Secure the PI module by tightening its two screws.
2.8
The ETX-5300A chassis can be equipped with two main cards. At any time, only one card is active, and the other serves as hot standby.
Figure 2-10 shows the front panel of the main card. Chapter 3 explains the
functions of the indicators located on the panel.
1 2 10GbE 3 4 EXT CLK EXT CLK IN OUT GPS TOD MNG 1PPS MNG ETH CONTROL PRI FLT CLK RMV
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
2-12
1P P
NG ET H
MN G
10 M
Hz
10
L IN K 10 / 0/ 1 AC T 00 0B A SE
CO
NT RO L PR I
-T
DC E
FL T CL K RM V
2 3 1
2-13
Caution
To prevent service disruption, check that the PRI indicator of the main card you want to remove is blinking. If not, use the supervisory terminal (or any other management facility) to instruct the ETX-5300A to flip to the other main card, and wait for execution of the command before continuing. To flip to the other main card using the supervision terminal: 1. Identify the on-line main card: this is the card with the steadily lit ACT indicator. 2. Connect the supervision terminal directly to the CONTROL DCE connector of the on-line main card, and log in as administrator. 3. Use the manual-switch command in the config>protection>main-card# prompt to flip to the standby main card (the card with the blinking PRI indicator). 4. Wait for the flipping to be executed. After it is executed, the PRI indicator of the main card to which the supervision terminal is connected starts blinking; the indicator of the other module stops blinking and lights steadily.
Note
The command is not executed if a fault is detected in the module that is to become the on-line module. In this case, the PRI indicators state do not change.
5. You can now disconnect the supervision terminal, and remove the module.
2-14
Warning
Caution ETX-5300A does not have a power switch, and therefore it will start operating as
soon as power is applied to one of the power supply inlets. The external circuit breaker used to protect the input power line can be used as an ON/OFF power switch, or an external ON/OF switch may be installed. Before connecting power to an AC-powered device, verify that every power inlet card has a corresponding AC power supply installed in the chassis. The top E5-PIM card is connected to AC power supply B, and the bottom E5-PIM card is connected to AC power supply A.
Grounding
A grounding terminal is located on the front panel of the ETX-5300A chassis. To ground the chassis: 1. Connect an 8 AWG (3.2 mm/0.12 inch) thick copper wire between the grounding terminal on the ETX-5300A front panel and a nearby grounding point. 2. Crimp the terminal to tighten the grounding connection.
Connecting to AC Power
To connect to AC power: Connect each power cable first to the connector on the E5-PIM/AC module, and then to the power outlet.
Note
When redundant power supplies are used, it is recommended to connect the power cables to outlets powered by different circuits. However, it is necessary to use one ON/OFF switch to simultaneously connect/disconnect all of them.
Connecting to DC Power
To connect to DC power: 1. Strip 7 mm (1/4 inch) of insulation from the leads.
Connecting to Power
2-15
Caution Pay attention to polarity. For each source, connect the positive lead first, and the
negative lead second. Refer to the Connection of DC Mains section at the beginning of this manual. 2. Use a narrow blade screwdriver to release the terminal screw. 3. Push the lead into the terminal up to its insulating sleeve. 4. When the lead is in position, fasten the screw to secure the lead. 5. Verify that the lead is securely held by pulling on it lightly. 6. Insert the plug into the socket. 7. Secure the plug by tightening the two screws.
PW R F LT
4 8/
6 0V
E5
-PI M
eL ti v a g Ne
d ea e iti v ad Le
s Po
Figure 2-10 shows the front panel of the main card. Chapter 3 explains the
functions of the indicators located on the panel.
2-16
Warning
To install the SFP or XFP modules: 1. Lock the wire latch of each SFP or XFP module by lifting it up until it clicks into place, as illustrated in Figure 2-16.
Note
Some SFP or XFP models have a plastic door instead of a wire latch.
2-17
Caution Insert the transceiver gently. Using force can cause damage to the connecting
pins. 4. Remove the protective rubber caps from the SFP or XFP modules. To remove the SFP or XFP module: 1. Disconnect the fiber optic cables from the SFP module. 2. Unlock the wire latch by lowering it downwards (as opposed to locking). 3. Hold the wire latch and pull the SFP or XFP module out of the port.
Caution Do not remove the SFP or XFP while the fiber optic cables are still connected. This
may result in physical damage (e.g., a chipped SFP or XFP module clip or socket) or cause malfunction (e.g., the network port redundancy switching may be interrupted).
2-18
OUT
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
2-19
To connect to STM-1/OC-3 equipment Connect ETX-5300A to STM-1/OC-3 equipment at customer premises using standard fiber optic cables terminated with LC connectors.
OC-3/STM-1 FLT LOS 20 FLT LINK 4 RMV E5-cTDM-4 LOS LOS LOS
FLT
LINK 1
FLT
LINK 2
LINK 3
FLT
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
2-20
To connect to ToD clock device: 1. Prepare a cable in accordance with your particular application requirements, using the information presented in Appendix A. 2. Connect the GPS-based ToD clock source and/or slave ToD clock device to the RJ-45 connector on the E5-MC-4 card designated TOD. (RJ-45 TOD connector on E5-MC-4 card uses different pins for clock input and output.)
10GbE
OUT
GPS TOD
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating ground. Using improper terminal cable may result in damage to supervisory terminal port.
Connecting to a Terminal
2-21
LINK E5-MC-4
ACT
LINK
ACT
LINK
ACT
LINK
ACT
10MHz
DCE
ALARM
F I L T E R
E5-FAN
2-22
Labeling Cable
Chapter 3 Operation
This chapter provides general operating instructions and preliminary configuration instructions for ETX-5300A units. This chapter covers the following topics:
Turning On the Unit Indicators Startup Using a Custom Configuration File Saving Configuration Changes Confirming the Configuration File Handling Configuration File Errors Turning Off the Unit.
3.1
When turning on the ETX-5300A, it is useful to monitor the power-up sequence. To turn on ETX-5300A: ETX-5300A does not have a power on/off switch, and will start operating as soon as power is applied. For an ETX-5300A equipped with AC-powered power supply modules, be sure to simultaneously connect the power to all the installed PS modules, for example, by means of a common circuit breaker or an ON/OFF switch. 1. Connect the ETX-5300A to power (see detailed instructions in Chapter 2). The PWR indicators on all the E5-PIM PS modules that are powered light up, and remain lit as long as the ETX-5300A is powered. You may also hear the fans in the ETX-5300A fan tray start operating. 2. Wait for the completion of the power-up initialization process (this takes about one minute). During this interval, monitor the power-up indications: After power is applied, all the ETX-5300A indicators turn on for a few seconds. This allows you to check that the equipment indicators are functioning properly. After a few seconds, all the indicators turn off (except for the E5-PIM PWR indicators as ETX-5300A performs its power-up initialization.
Caution
3-1
Chapter 3 Operation
3. After the power-up initialization ends, all the PWR indicators and the PRI indicator of the active main card are lit steadily; the PRI indicator for the standby main card starts blinking. ETX-5300A performs the startup procedure. See the Startup section below. 4. After startup ends, you may log in, using the supervision terminal.
3.2
Indicators
The unit's LEDs are located on the system and I/O modules. Table 3-1 lists the functions of the ETX-5300A LED indicators.
ACT
Yellow
3-2
Indicators
Installation and Operation Manual Name ON LINE LOS Color Green Red Function ON Card is administratively enabled ON Loss of signal has been detected Blinking Other signal failure (LOF, AIS, RFI etc) has been detected
3.3
Startup
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
Note
The save command is used to save the user configuration. Some commands that reset the device also erase the saved user configuration by copying another file to it before the reset.
Startup
3-3
Chapter 3 Operation
Loading Sequence
At startup, the device boots from the startup-config file, the user-default file, or the factory-default file, in the sequence shown in Figure 3-2 . If none of these files exist, the device boots using hard-coded defaults.
Start
Pass
Sanity Check
Yes
Startup-config exist?
Fail
No
Pass
Sanity Check
Yes
User-default-config exist?
Fail
No
Boot from Factory-default-config
End
3-4
Startup
Chapter 3 Operation
3.4
In large deployments, a central network administrator often sends configuration scripts to the remote locations, and the local technician only needs to replace the IP address in the script or make other small changes (using any text editor), and then download the file to the device. To download the configuration file, use the copy command, as explained in Chapter 10. Normally, user-default-config contains a configuration common to all of the providers devices of the same type, while startup-config contains a device-specific configuration, based on user-default-config. After downloading the configuration file, the unit must be reset in order to execute the file. After the unit completes its startup, the custom configuration is complete.
3.5
The save command is used to save the running configuration in startup-config. Some commands reset the device, and also erase the configuration saved in startup-config by copying another file to it before the reset. Figure 3-1 indicates the commands that copy to startup-config, and whether the device resets after copying.
3.6
ETX-5300A allows you to enable active confirmation of the startup-config file after reboot. The startup-config confirmation prevents loss of the management link to a remote device due to an erroneous configuration. If confirmation of the startup configuration file is enabled, you must confirm the startup-config within a defined period of time. On issuing the startup-confirmrequired command, ETX-5300A copies running-config or any other user-specified
3-5
Chapter 3 Operation
configuration file to rollback-config. If the new startup-config is not confirmed, rollback-config is ready to be loaded. The startup-config-confirm command is used to confirm startup-config. To enable startup-config confirmation: In the admin# prompt, enter the startup-confirm-required command according to the table below.
Command startup-confirm-required [time-toconfirm <165535>] [rollback {startupconfig | user-default-config | factorydefault-config | running-config}] no startup-confirm-required Comments Default time-to-confirm 5 min. You can define any configuration file to be a source for your rollback-config file. The default option is runningdefault, which is guaranteed to maintain management connectivity, as it is the configuration currently run by the user. no before startup-confirmrequired cancels the previously enabled startup-config confirmation.
3.7
By default, ETX-5300A executes commands in configuration files or scripts one by one and skips any invalid command. You can change this behavior and require execution to stop upon error, or reject the file with a subsequent device reboot. To configure handling errors in configuration file: Enter on-configuration-error {ignore | stop | reject} into the configuration file to select the required mode.
3.8
To power off the unit: Remove the power cord from the power source.
3-6
Terminal Control Port User Access SNMP Management Management Access Access Policy Authentication via RADIUS Server Authentication via TACACS+ Server Syslog Programming Cards.
Table 4-1 summarizes management alternatives for ETX-5300A. Table 4-1. Management Alternatives
Port Manager Location Local Transport Method Management Protocol RS-232 Application
Control
Out-of-band
Terminal emulation programs (HyperTerminal, Procomm, SecureCRT, Putty). See Working with Terminal below. Procomm, SecureCRT, Putty (see
Ethernet
Local, remote
Inband, out-of-band
Telnet, SSH
Note
By default, terminal, Telnet (SSH) and SNMP management access methods are enabled.
CLI-Based Configuration
4-1
4.1
CLI-Based Configuration
Note
RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud rate (9.6 kbps) to 115.2 kbps. 11. Configure the PC communication port parameters to a baud rate of 115.2 kbps to match the new ETX-5300A settings. 12. Continue with product configuration.
4-2
CLI-Based Configuration
To configure router interface 1 for management: 1. Define IP address of RIF 1 2. Enable management access for RIF 1 3. Enable RIF 1.
ETX-5300A# ETX-5300A# configure ETX-5300A>config# router 1 ETX-5300A>config>router(1)# interface 1 ETX-5300A>config>router(1)interface(1)# address 1.1.1.1/1 ETX-5300A>config>router(1)interface(1)# management-access allow-all ETX-5300A>config>router(1)interface(1)# no shutdown By default, ETX-5300A has Telnet and SSH access enabled.
Login
To prevent unauthorized modification of the operating parameters, ETX-5300A supports three access levels. Superuser can perform all the activities supported by the ETX-5300A management facility. Users have read-only access, they cannot change any settings. Techs (technicians) read-only access, but the technicians are allowed to reset the unit, set its parameters to defaults and use TFTP download/upload.
The su, user and tech are permanent users, they cannot be removed from the authorization database. The su level users can define new dynamic users and assign access levels (su, user or tech) to them. To enter as a superuser: 1. Enter su for user name. 2. Enter 1234 for password. To enter as a user: 1. Enter user for user name. 2. Enter 1234 for password. To enter as a technician: 1. Enter tech for user name. 2. Enter 1234 for password.
CLI-Based Configuration
4-3
Commands that are not global are available only at their specific tree location. To find out what commands are available at the current location, type ?. For a list of the commands and their levels, refer to Command Tree. To navigate down the tree, type the name of the next level. The prompt then reflects the new location, followed by #. To navigate up, use the global command exit. To navigate all the way up to the root, type exit all. At the prompt, one or more level names separated by a space can be typed, followed (or not) by a command. If only level names are typed, navigation is performed and the prompt changes to reflect the current location in the tree. If the level names are followed by a command, the command is executed, but no navigation is performed and the prompt remains unchanged.
Note
To use show commands without navigating, type show followed by the level name(s) followed by the rest of the show command.
In the following example, the levels and command were typed together and therefore no navigation was performed, so the prompt has not changed. ETX-5300A# ETX-5300A# configure port e1 1/1/1 loopback local 1 ETX-5300A#
Figure 4-2. Commands With Level Navigation Note Level names are abbreviated in the prompt.
You can type only as many letters of the level or command as required by the system to identify the level or command, for example you can enter config manag to navigate to the management level. In addition to being the default prompt, the # symbol also indicates a static entity (such as a port) or already configured entity. The $ symbol indicates a new dynamic entity (such as a flow) that takes several commands to configure. The dynamic entity is created as inactive. After the configuration is completed, it is activated by using the no shutdown command, as shown in the following example.
4-4
CLI-Based Configuration
ETX-5300A# ETX-5300A# configure flows flow flow1 ETX-5300A>config>flows>flow(flow1)$ ingress-port ethernet 1/3 ETX-5300A>config>flows>flow(flow1)$ egress-port ethernet 1/1 queue 1 block 0/1 ETX-5300A>config>flows>flow(flow1)$ classifier Classifier1 ETX-5300A>config>flows>flow(flow1)$ no shutdown ETX-5300A>config>flows>flow(flow1)$exit ETX-5300A>config>flows#
Lists all commands available at the current level Command autocomplete Displays the previous command Displays the next command Deletes character Interrupts current command Logs out
CLI commands can be gathered into text files called scripts. They can be created using a text editor, by recording the user commands or by saving the current configuration. The scripts can be imported from and exported to RAD devices via file transfer protocols.
Command Tree
At the CLI root, the following categories are available:
ETX-5300A Ver. 1.0
rados-versions
4-6
CLI-Based Configuration
Aborts the upgrade process the return to previous sw-pack (downgrade) Requires user confirmation after reboot Loads user default configuration
startup-confirm-required user-default
show vlans
cross-connect | pw-tdm
fault
CLI-Based Configuration
4-7
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | cfm | | | service | | frames-report shutdown Description
Configures OAM CFM thresholds Configures OAM CFM service thresholds OAM CFM service event reporting Enables/disables event reporting for OAM service Flow parameters Defines classifier profile Creates matching criteria Configures a specific flow Assigns classifier profile to the flow Clears flow statistics Assigns CoS mapping profile to the flow, or fixed CoS mapping value Commands to discard traffic transmitted via the flow Defines egress port of the flow Assigns color mapping profile to the flow, or fixed color value Defines ingress port of the flow Assigns L2CP profile to the flow Defines marking action for the flow Overwrites inner P-bit according to marking profile Overwrites inner TPID with a new value Overwrites inner VLAN ID with a new value Overwrites P-bit according to marking profile Overwrites TPID with a new value Overwrites VLAN ID with a new value Overwrites P-bit with a new value Overwrites inner P-bit with a new value Enables/disables statistic data collection Assigns policer profile to the flow Assigns policer aggregate to the flow Defines window size for sampling flow rate statistics Administratively enables/disables the flow Display flow statistics Display flow status Pushes VLAN tag
flow | | | | | | | | | | | | | | | | | | | | | | | | | classifier clear-statistics cos-mapping drop egress-port ingress-color ingress-port l2cp profile mark | | | | | | | | inner-marking-profile inner-tag-ether-type inner-vlan marking-profile tag-ether-type vlan p-bit inner-p-bit
pm-collection policer policer aggregate rate-sampling-window shutdown show statistics show status vlan-tag push vlan
4-8
CLI-Based Configuration
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | vlan-tag pop vlan p-bit fixed p-bit profile p-bit copy inner-vlan tag-ether-type inner-tag-ether-type no vlan-tag Description Pops VLAN tag
Sets P-bit to a specific value Sets P-bit value according to marking profile Sets P-bit value by copying from the incoming frame Pushes inner VLAN tag Pushes TPID Pushes inner TPID Leaves outer and inner VLAN tags intact Displays flow configuration summary Management parameters Specifies access paths and rights Assign policy of authentication Enables/disables SFTP access Enables/disables SNMP access Enables/disables Secure Shell (SSH) access Enables/disables Telnet access Enables/disables TFTP access Specifies RADIUS parameters Clears the RADIUS statistics Defines the RADIUS server Specifies the RADIUS server's IP address Specifies the RADIUS server authentication port Specifies the shared secret between client and RADIUS server Number of authentication attempts at RADIUS server Administratively enables/disables RADIUS server Specifies the timeout Displays the RADIUS server statistics Displays the RADIUS server status SNMP parameters Defines the SNMP group Configures context match Defines notify view of the SNMP group Defines read view of the SNMP group Administratively enables/disables the SNMP group CLI-Based Configuration 4-9
show summary
Defines write view of the SNMP group Defines the SNMP community Defines the SNMP community name Defines the SNMP community security name Administratively enables/disables the SNMP community Defines the transport tag Configures notification Assigns trap to notification Administratively enables/disables notification Assigns tag to notification Configures notification filter Configures notification filter mask Administratively enables/disables notification filter Configures notification filter type Configures notification filter profile Defines notification filter profile name Administratively enables/disables notification filter profile Configures security for access group Specifies access group Administratively enables/disables security for access group Defines SNMP engine ID Defines SNMP target Defines SNMP target address Administratively enables/disables SNMP target Defines SNMP target tag list Defines SNMP target parameters Specifies trap synchronization group for SNMP target Defines SNMP target parameters Configures SNMP target parameters message processing model Configures SNMP target parameters security Administratively enables/disables SNMP target parameters Configures SNMP target parameters version Displays the trap synchronization information
show trap-sync
4-10
CLI-Based Configuration
Configures trap synchronization group with SNMP managers Configures tag list for trap synchronization group with SNMP managers Configures target parameters for trap synchronization group with SNMP managers Defines SNMP user Configures SNMP user authentication Configures SNMP user privacy Administratively enables/disables SNMP user Configures SNMP view Defines SNMP view mask Administratively enables/disables SNMP view Defines SNMP view type TACACS+ parameters Creates a group for binding TACACS+ servers Enables/disables TACACS+ accounting for the group Adds or removes a TACACS+ server Sets accounting TCP port for a TACACS+ server Sets authentication TCP port for a TACACS+ server Clears the TACACS+ statistics Binds\unbinds TACACS+ server to\from a group Specifies the shared secret of TACACS+ server Defines number of authentication attempts at TACACS+ server Administratively enables/disables TACACS+ server Displays the TACACS+ server statistics Defines TACACS+ server response timeout Defines OAM parameters OAM CFM configuration Creates/deletes a maintenance domain Specifies MD level Creates/deletes a maintenance association Specifies MA name Defines interval between continuity check messages MEP parameters CLI-Based Configuration 4-11
server | | | | | | | | | accounting-port authentication-port clear-statistics group key retry shutdown show statistics timeout
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ais bind ccm-initiate ccm-priority classification profile client-md-level cos-mapping direction flow lbm show lbm-results linktrace show linktrace-results queue queue-mapping show status show service shutdown remote-mep | show status Description
Enable/disable sending AIS Binds MEP to a device port Enables/disables CCM initiation by the MEP Specifies priority of the CCMs and LTMs transmitted by the MEP Associates the MEP with a classifier profile Defines client MD level Associates the MEP with a CoS profile Defines the MEP direction Assigns flows to the MEP Runs diagnostic OAM loopback Displays OAM loopback results Runs OAM linktrace utility Displays OAM linktrace results Defines the queue for the MEP Displays MEP status Displays MEP service status Enables/disables the MEP Creates/deletes a remote MEP Displays remote MEP status Creates/deletes a MEP service Specifies delay threshold Specifies Delay variation threshold Defines Destination network elements for delay and loss measurement Clears the performance measurement counters Performance management method Selects loss measurement method Defines the MAC address of the destination NE Displays the performance measurement counters Specifies the interval for delay measurement messages Specifies the interval for loss measurement messages Enables/disables the MEP service Define the MEP name
service | | | | | | | | | | | delay-threshold delay-var-threshold dest-ne | | | | | clear-statistics delay loss remote mac-address show statistics
name
4-12
CLI-Based Configuration
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | mip | | | | | | | | bind flow mhf | | | classification cos-mapping queue Description MIP parameters
Binds the MIP to a device port Assigns flows to the MIP MHF parameters Associates the MHF with a classifier profile Associates the MHF with a CoS mapping profile Defines the queue for the MHF Enables/disables the MIP Displays MIP status Measurement bin profile parameters Defines threshold limits for measurement bin profile Displays configuration summary Peer parameters Displays peer configuration summary Port parameters E1 parameters
measurement-bin-profile | thresholds
show summary
peer show peer-summary port | | | | | | | | | | | | | | | | | e1 | | | | | | | | | | | | | | | | bert show bert clear-bert-counters clear-statistics idle-code line-type loopback name out-of-service path-interval-threshold pm-collection shutdown show statistics show status trail-mode tx-clock-source
Activates/deactivates a bit error rate test (BERT) Displays the BERT results Clears the BERT counters Clears the statistics Defines code transmitted to fill unused timeslots in E1 frames Specifies the E1 framing mode Enables/disables loopback mode for the port Defines port name Enables/disables transmission of out-of-service signal for all services Setting path interval threshold Enables/disables PM collection Administratively enables/disables the port Displays the port statistics Displays the port status Controls the propagation of alarm indications Specifies the source of the port's transmit clock
CLI-Based Configuration
4-13
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ethernet | | | | | | | | | | | | | | | | | auto-negotiation classification-key clear-sfp-counters clear-statistics flow-control l2cp mau-type name pm-collection queue-group restart-auto-negotiation show sfp-status shutdown show statistics show status tag-ethernet-type tx-ssm Description Ethernet parameters
Enables/disables automatic speed and duplex mode adjustment Defines traffic classification key used by the port Clears SFP counters Clears all statistics Enables/disables the flow control Assigns the L2CP profile to the port Defines MAU type of the port Assigns/removes a port name Enables/disables PM collection Assigns/removes a queue group profile Restarts autonegotiation process Displays the Ethernet port SFP status Administratively disables/enables the port Displays the Ethernet port statistics Displays the Ethernet port status Determines the tag protocol identifier Enables/disables Synchronous Status Messages transmission Defines L2CP profile Specifies the default action for undefined control protocols Specifies the L2CP action for MAC addresses LAG parameters
l2cp-profile | | lag | | | | | | | | | | | admin-key bind show bind classification-key l2cp lacp show lacp-statistics show lacp-status name queue-group shutdown default mac
Defines LAG capability Binds a port to the LAG Displays ports bound to the LAG Selects traffic classification key for the LAG Assigns L2CP profile to the LAG Enables the LACP protocol on the LAG Displays the LAG members statistics Displays LAG members status Assigns name to the LAG Assigns a queue group profile to the LAG Administratively disables/enables the
4-14
CLI-Based Configuration
Selects the Ethertype for the LAG Management Ethernet port parameters Enables/disables automatic speed and duplex mode adjustment Clears all statistics Defines MAU type of the port Assigns/removes a port name Enables/disables PM collection Administratively disables/enables the port Displays the Ethernet port statistics Displays the Ethernet port status Defines SDH/SONET VC profile Selects EED (error rate degradation) and SD (signal degrade) thresholds Sets CV, ES, SES and/or UAS counter value during a 15-min interval starting with a trap sent Sets CV, ES, SES and/or UAS counter value during a 15-min interval starting with a trap sent Sets character type for padding path trace label Specifies the expected signal label Enables/disables TIM monitoring Create/delete Service Aggregation Group Assigns name to the SAG port Assigns a queue group profile to the SAG Displays information on SAPs defined on the SAG Displays the SAG status SDH/SONET port parameters Defines the administrative unit group (AUG) Defines AUG and enters AU3 controller level Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Defines path profile Enables/disables PM collection Administratively disables/enables the port
mng-ethernet | | | | | | | | auto-negotiation clear-statistics mau-type name pm-collection shutdown show statistics show status
CLI-Based Configuration
4-15
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | show statistics show status vc11 | | | | | | | | clear-statistics j2-pathtrace name path pm-collection shutdown show statistics show status Description
Displays statistics of the port Displays status of the port Defines VC-11 parameters Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Sets profile configuration Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Defines path profile Selects an administrative unit (AU) Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Defines TUG and enters TUG3 controller Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Sets profile configuration Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Defines VC-12 parameters Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Defines path profile ETX-5300A Ver. 1.0
clear-statistics j1-pathtrace name path path-width pm-collection shutdown show statistics show status tug3 | | | | | | | | | | | | | clear-statistics j2-pathtrace name path pm-collection shutdown show statistics show status vc12 | | | | clear-statistics j2-pathtrace name path
4-16
CLI-Based Configuration
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | pm-collection shutdown show statistics show status Description
Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Clears the SFP statistic counters Clears the statistics Enables/disables triggering AIS/RDI on failure Specifies the cell frame type Sets section trace bytes in the section header Sets section trace bytes in the section header Enables/disables loopback mode for the port Assigns/removes a port name Defines an OC-3 (STM-1) connection Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Sets profile configuration Enables/disables PM collection Administratively disables/enables the port Displays the specified SDH/SONET statistics Displays the SDH-SONET of the port Number in the range from 1 to 3. Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name Defines path profile Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Specifies VT-1.5 as SONET channelized format Clears the statistics Sets section trace bytes in the section header Assigns/removes a port name CLI-Based Configuration 4-17
clear-sfp-counters clear-statistics eed-action frame-type j0-pathtrace j0-pathtrace loopback name oc3 | | | | | | | | | | | | | | | | | | | | | clear-statistics j1-pathtrace name path pm-collection shutdown show statistics show status sts1 | | | | | | | | | | | | clear-statistics j1-pathtrace name path pm-collection shutdown show statistics show status vt1-5 | | | clear-statistics j2-pathtrace name
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | path pm-collection shutdown show statistics show status Description
Sets profile configuration Enables/disables PM collection Administratively disables/enables the port Displays statistics of the port Displays status of the port Defines overhead mode of the port Displays the Ethernet port SFP status Administratively disables/enables the port Sets SOH profile Displays statistics of the port Displays status of the port Enables/disables triggering AIS/RDI on failure Specifies the source of the port's transmit clock Enables/disables DNU/DUS transmit Defines SDH/SONET VC profile Selecting EED (error rate degradation) and SD (signal degrade) thresholds Sets CV, ES, SES and/or UAS counter value during a 15-min interval starting with a trap sent Setting CV, ES, SES and/or UAS counter value during a 15-min interval starting with a trap sent Sets character type for padding path trace label Sets CV, ES, SES and/or UAS counter value during a 15-min interval starting with a trap sent Enables/disables TIM monitoring Displays a summary of a port and its parameters Creates/deletes Service Virtual Interface
overhead-mode show sfp-status shutdown soh show statistics show status tim-action tx-clock-source tx-ssm
show summary svi | | t1 | | | | bert show bert clear-bert-counters clear-statistics name show status
Assigns name to the SVI port Displays SVI status Specifies T1 parameters Activates/deactivates a bit error rate test (BERT) Displays the BERT results Clears the BERT counters Clears the statistics
4-18
CLI-Based Configuration
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | idle-code inband-loopback line-type loopback name out-of-service path-interval-threshold pm-collection shutdown show statistics show status trail-mode tx-clock-source Description
Defines code transmitted to fill unused timeslots in E1 frames Controls inband loopback activation Specifies the T1 framing mode Enables/disables loopback mode for the port Assigns/removes a port name Transmits out-of-service signal for all services Defines path interval threshold Enables/disables PM collection Administratively disables/enables the port Displays the port statistics Displays the port status Controls the propagation of alarm indications Specifies the source of the port's transmit clock Protection parameters APS parameters Adds/removes working and protection ports to/from the APS Clears all externally initiated switch commands and the WTR timer Forces traffic to the protection port Forces traffic to the working port Prevents a working link from switching to a protection link Manually switches traffic to the protection port Manually switches traffic to the working port Specifies the APS operation mode Switches the APS to standby or re-activates the APS Displays the APS status Ethernet Ring Protection parameters Assigns ring node to a bridge instance Clears ring statistics Defines data VLAN Defines bridge port as an East port of ERP node Configures dedicated VLAN for R-APS messages Enables propagation of Signal Failure (SF) condition from the Ethernet OAM service layer CLI-Based Configuration 4-19
protection | | | | | | | | | | | | | | | | | | aps | | | | | | | | | | bind clear force-switch-to-protection force-switch-to-working lockout-of-protection manual-switch-to-protection manual-switch-to-working oper-mode shutdown show status
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | shutdown show statistics show status timers west-port backward-compatibility manual-switch force-switch clear switch-command port-type sub-ring | virtual-channel Description
Administratively enables/disables the ring Display statistics counters Display status parameters Defines guard and hold-off periods in msec Defines bridge port as an West port of ERP node Makes the ring compatible with previous ERP implementations Blocks the East or West port of a ring node Blocks the East or West port of a ring node Clears the existing switch commands Defines node port type in relation to RPL owner Sub-ring parameters Enables virtual channel over shared link I/O card protection group parameters Binds a card to an I/O card group Enables/disables an I/O card protection group Displays status of I/O card protection group Main card protection parameters Switches to secondary card if possible Displays status of main card protection Pseudowire parameters Creates/deletes pseudowires
pwe | | | | | | | | | | | | pw | | | | | | | | | | | clear-statistics egress-port jitter-buffer label name oam peer pm-collection psn-oos shutdown show statistics CLI-Based Configuration
Clears PW statistics Assigns egress port for L2 forwarding Defines the jitter buffer size Specifies the PW label used in the inbound and outbound directions Assign name to the PW Enables/disables OAM protocol for the PW Defines a remote peer terminating the PW Enables/disables PM collection Selects the response to out-of-service conditions detected at the local TDM port Administratively enables/disables the PW Displays PW statistics counters ETX-5300A Ver. 1.0
4-20
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | show status tdm-payload tos Description Displays PW status
Specifies the number of TDM payload bytes to be inserted in each packet Specifies the value for the TOS byte used on outbound traffic Display PW configuration summary Quality of Service parameters Color mapping profile parameters Defines color mapping rules CoS mapping profile parameters Defines CoS mapping rules Marking profile Defines marking rules Policer aggregate profile parameters Displays flows associated with the policer aggregate profile Assigns a policer profile which settings will be used by the aggregate policer profile Policer aggregate profile parameters Defines bandwidth profile, using CIR/CBS and EIR/EBS rates Configures color awareness of the police Compensates for Layer-1 overhead and additional VLAN tag Defines the admission options for yellow packets Queue block profile parameters Defines a queue within the queue block profile Assigns an internal queue profile to the queue within the queue block Queue group profile parameters Defines a queue group which settings will be copied to create a new queue group profile Selects a queue block within a queue group Binds a queue block to a queue in the next-level queue block Assign name to a queue block within a queue group Assigns a queue block profile to a queue block within a queue group Assigns a shaper profile to a queue block within a queue group Internal queue parameters CLI-Based Configuration 4-21
show pw-summary
cos-map-profile | map
marking-profile | mark
queue-internal-profile
Assigns a WRED profile to the internal queue Sets scheduling method Assigns a shaper profile to the internal queue Defines queue mapping profile (this profile is preset and cannot be changed) Maps CoS values to priority queues Shaper profile parameters Defines CIR, EIR data rate and CBS, EBS burst rate Configures extra bytes to be taken into account Defines congestion avoidance profile Color mapping profile parameters Alarm/event reporting parameters Acknowledges the alarm/event logs Rebuilds active alarm table Displays active alarms Displays detailed information about active alarm Displays information on a specific alarm Configures alarm input Displays alarm input information Displays list of alarms Displays alarm log Masks alarm/event from a specific source Masks alarm/event from a specific source type Displays brief alarm log Displays brief alarm/event log Clears alarm log Displays information on a specific event Displays event list Displays alarm/event log Mask alarms per their severity Router parameters Displays the router ARP table Deletes dynamic ARP entities Creates/deletes router interface
queue-map-profile | map
wred-profile | color
reporting | | | | | | | | | | | | | | | | | | acknowledge active-alarm-rebuild show active-alarms show active-alarms-details show alarm-information alarm-input show alarm-input show alarm-list show alarm-log alarm-source-attribute alarm-source-type-attribute show brief-alarm-log show brief-log clear-alarm-log show event-information show event-list show log mask-minimum-severity
4-22
CLI-Based Configuration
Installation and Operation Manual Command | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | address bind management-access name shutdown show status Description
Assigns an IP address and a subnet mask to the router interface Binds router interface to physical/logical port Configures interface management access Assigns name to the router interface Administratively enables/disables the router interface Displays router interface status Displays the interface table Assigns name to the router Displays the routing table Creates/deletes static ARP entities Creates/deletes static route entities Provisions cards in the chassis database Binds loopback address Provisions card in the slot Resets the card Enables/disables the card Displays status of the card System parameters Clock parameters Defines clock domain number Clears the Forced or Manual command Clears statistics for all clock sources Forces a particular clock source Forces T4 timing generator to use the same clock source as the T0 generator Selects a particular clock source Sets maximum frequency deviation Defines clock mode Sets minimum quality of outgoing station clock Clock source parameters Resets the WTR timer Defines amount of time that signal failure must be active before it is transmitted Defines clock source priority CLI-Based Configuration 4-23
system | | | | | | | | | | | | | | clock | | | | | | | | | | | | | domain | | | | | | | | | | | | clear clear-statistics force force-t4-as-t0 manual max-frequency-deviation mode quality source | | | clear-wait-to-restore hold-off priority
Chapter 4 Management and Security Command | | | | | | | | | | | | | | | | | | | | quality-level show statistics show status wait-to-restore Description
Sets quality level of the clock source Displays statistics counters of the clock source Displays status of the clock source Defines amount of time that a previously failed synchronization source must be fault free in order to be considered available Displays clock status Sets synchronization network type 1588v2 master clock parameters Clears the statistics Defines the 1588v2 distributed clock mode Creates a PTP domain Defines IP address of the master entity Defines the maximum number of slaves Enables/disables PM collection Administratively enables/disables master clock 1588v2 slave clock parameters Clears the statistics Displays statistics counters Displays status parameters Displays statistics counters Displays status parameters Defines synchronization message rate Selects Tx clock domain 1588v2 recovered clock parameters Clears the statistics Defines IP address of 1588v2 slave entity Creates a PTP domain Defines 1588v2 message exchange mode Defines BMCA (Best Master Clock Algorithm) mode Enable/disable recovered clock Identifier number of the master clock Display status parameters Defines amount of time that previously failed clock must be fault free in order to be considered available ETX-5300A Ver. 1.0
| | | | | | | | | | | | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | |
| |
master | | | | | | | | | | | | | | | clear-statistics distributed-mode domain-number ip-address maximum-slaves pm-collection shutdown slave | | | clear-statistics show statistics show status
recovered | | | | | | | | | clear-statistics ip-address ptp-domain recovery-mode revertive shutdown source-port-identity show status wait-to-restore
4-24
CLI-Based Configuration
Defines peer master source port ID Defines Announce message rate requested by the slave, minimum Announce message rate supported by the slave and duration of Announce message transmission Clears statistics Defines Delay Response message rate requested by the slave, minimum Delay Response message rate supported by the slave and duration of Delay Response message transmission Specifies the peer device that transmits the clock signal Sets clock quality level depending on the network type Enables/disables recovered clock Displays statistics Displays status Defines sync message rate requested by the slave, minimum sync message rate supported by the slave and duration of sync message transmission Station clock parameters Sets impedance for E1 and 2-MHz interfaces Defines station clock interface type Sets line type for E1, T1 or 64 kHz interfaces Assigns a name to station clock source Sets receiver sensitivity for E1 and 2-MHz interfaces Administratively enables/disables station clock Defines E1 G.732NCRC bits to carry SSM information Displays station clock status Assigns station transmit clock source Enables SSM transmission for E1 G.732NCRC and T1 ESF interfaces Enables/disables Y-cable redundancy for station clock ToD parameters Configure baud rate Define interface type Assigns/removes a port name Enables/disables ToD clock Displays ToD status
| |
| |
| |
| |
| |
clear-statistics delay-respond
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
station | | | | | | | | | | impedance interface-type line-type name rx-sensitivity shutdown ssm-channel show status tx-clock-source tx-ssm
CLI-Based Configuration
4-25
Administratively enables/disables ToD Y-cable redundancy Specifies/removes a contact person Date and time parameters Defines system date Defines system date format Simple Network Time Protocol parameters Enables/disables broadcast client mode for SNTP Defines period for polling SNTP server SNTP server parameters Defines SNTP server IP address Sets/resets the SNTP server preference Queries the timestamp from the SNTP server Administratively enables/disables SNTP server Defines UDP port for SNTP communication Displays SNTP server status Defines system time Defines time zone and offset Displays current system data and time Displays device information Specifies/removes the location of a device Assigns/removes a name to the device Syslog parameters Specifies the Syslog server IP address Clears the Syslog statistics Identifies facility to send Syslog messages from Defines the UDP port for Syslog communication Specifies the severity level of Syslog messages to be sent Opens/closes the connection to the Syslog server Displays Syslog statistics Supervisory terminal parameters Defines the data rate for terminal communication Sets the length of the terminal screen Specifies the time of inactivity after which the device disconnects
contact date-and-time | | | | | | | | | | | | | | date date-format sntp | | | | | | | | | broadcast poll-interval server | | | | | address prefer query-server shutdown udp
show status
time zone
show date-and-time show device-information location name syslog | | | | | | | address clear-statistics facility port severity-level shutdown show statistics
4-26
CLI-Based Configuration
4.2
GUI-Based Configuration
GUI-Based Configuration
4-27
To manage the ETX-5300A from a remote NMS, it is necessary to preconfigure the basic parameters using a supervision terminal connected to the ETX-5300A CONTROL DCE port. RAD recommends Layer-3 management access via out-of-band Ethernet management port. To preconfigure ETX-5300A for Layer-3 management access: 1. Add a router-type SVI. 2. Create classifier profiles for match all and untagged traffic 3. Add two flows (incoming and outgoing) connecting out-of-band Ethernet management port and the SVI. 4. Add a router interface, bind it to the SVI and add a static route to the next hop. 5. Configure SNMPv3 parameters: OID tree visibility, mask and type Access group Trap report policy.
Script below provides all necessary configuration steps. Replace IP addresses and entity names with values relevant for your network environment. #*******************************Adding_SVI*********************************** config port svi 99 router exit all #**********************************End*************************************** #***************************Adding Classifier_Profiles*********************** config flows classifier-profile classall match-any match all exit all config flows classifier-profile classutg match-any match untagged exit all #*********************************End**************************************** #***************************Configuring_Flows******************************** config flows flow mng_in classifier classutg ingress-port mng-ethernet main-a/0 egress-port svi 99 no shutdown exit all
4-28
GUI-Based Configuration
config flows flow mng_out classifier classall ingress-port svi 99 egress-port mng-ethernet main-a/0 no shutdown exit all #**********************************End*************************************** #*********************Configuring_Router_Interface*************************** configure router 1 interface 1 address 172.18.219.116/24 bind svi 99 no shutdown exit static-route 0.0.0.0/0 address 172.18.219.1 exit all #**********************************End*************************************** #*********************Configuring_SNMP_View/Mask/Type************************ configure management snmp view internet 1 mask 1 type included no shut exit all #**********************************End*************************************** #*********************Configuring_SNMP_Access_Group************************ configure management snmp access-group initial usm no-auth-no-priv context-match prefix exit all #**********************************End*************************************** #**************************Configring_SNMP_Traps***************************** configure management snmp target-params p message-processing-model snmpv3 version usm security name initial level no-auth-no-priv no shutdown exit target a target-params p tag-list unmasked address udp-domain 172.17.176.35 no shutdown exit notify unmasked tag unmasked no shutdown exit all #**********************************End************************************
GUI-Based Configuration
4-29
4-30
GUI-Based Configuration
4.3
This section describes two methods used to access the ETX-5300A management host via Layer 2 or Layer 3 networks.
SVI
Management Network VLAN X
SVI
VLAN X
BP BP BP
SVI
VLAN X
Management Network
User
VLAN X
OOB
VLAN X
Bridge
PSN VLAN X VLAN X VLAN X
User
VLAN X
BP SVI
BP
VLAN X
NET SVI
PSN
ETX-2xxA
NMS
4-31
ETX-5300A
ETX-2xxA NMS
SVI
Layer-3 PSN
User
Router SVI
Layer-3 PSN
SVI
Layer-3 PSN
User
RIF 3
RIF 2
NET
Inband Access
ETX-2xxA
LB IP
NMS
Figure 4-6. Default Management Access via Out-Of-Band Ethernet Port Note Management is disabled for loopback RIFs, which are used for TDM pseudowire or Precision Time Protocol (IEEE 1588v2) traffic.
4-32
4.4
To gain access to the devices, as explained in Management Access Methods, you must provision an E-LAN (Layer-2) or routing (Layer-3) service. Services are explained in Chapter 5.
4.5
You can configure the serial port parameters, which include specifying the data rate, security timeout, and screen size from which you are accessing the device.
Factory Defaults
Parameter defaults are listed in the table below.
Parameter baud-rate timeout Default Value 9600bps 10
Defining whether in case of inactivity, device remains connected or disconnects after a specified time period Specifying the number of rows to display
length <020>
The number of rows can be 0, to indicate no limit on the number of lines displayed, or 20.
4-33
4.6
User Access
ETX-5300A management software allows you to define new users, their management and access rights. Only superusers (su) can create new users, the regular users are limited to changing their current passwords, even if they were given full management and access rights. You can specify a users password as a text string or as a hashed value, that you obtain by using info detail to display user data.
Notes
User passwords are stored in a database so that the system can perform
password verification when a user attempts to log in. To preserve confidentiality of system passwords, the password verification data is typically stored after a one-way hash function is applied to the password, in combination with other data. When a user attempts to log in by entering a password, the same function is applied to the entered value and the result is compared with the stored value.
A cryptographic hash function is a deterministic procedure that takes an
arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that any change to the data changes the hash value.
Factory Defaults
By default, the following users exist, with default password 1234: su tech user.
To add a new user: 1. Make sure that you are logged on as superuser (su). 2. Navigate to the Management context (config>mngmnt). 3. Define a new user: user <name> [ level { su | tech | user } ] [[ password <password> [hash] ]
ETX-5300A# configure management ETX-5300A>config>mngmnt# user staff level su password 1234 # Password is encrypted successfully ETX-5300A>config>mngmnt# To add a new user with a hashed password: 1. Define a new user with a text password.
4-34 User Access ETX-5300A Ver. 1.0
2. Use info detail to display the password hash value. 3. Define another user with the hashed password from the info detail output. The second user can log in with the text password defined in step 1. For example, to add the following users: User name = staff1 User password = 4222 User name = staff2 User password = hash of 4222 (user staff2 can log in with password 4222).
ETX-5300A# configure management ETX-5300A>config>mngmnt# user staff1 level user password 4222 # Password is encrypted successfully ETX-5300A>config>mngmnt# info detail user "staff1" level user password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash user "su" : ETX-5300A>config>mngmnt# user staff2 level user password 3fda26f8cff4123ddcad0c1bc89ed1e79977acef hash ETX-5300A>config>mngmnt# info user "staff1" level user password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash user "staff2" level user password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash user "su" ETX-5300A>config>mngmnt# logoutexiting cli ETX-5300A>config>mngmnt#
user>staff2 password>**** To delete an existing user: At the config>mngmnt# prompt, enter no <user_name>. The specified user is deleted.
User Access
4-35
To view all connected users: At the config>mngmnt# prompt, enter show users. A list of all connected users is displayed, showing their access level, the type of connection, and the IP address from which they are connected.
4.7
SNMP Management
SNMP stands for Simple Network Management Protocol. It is an application layer protocol that provides a message format for the communication between managers and agents. SNMP systems consist of an SNMP manager, an SNMP agent and a MIB. The NMS can be part of a management network system. To configure SNMP, you must define the relationship between the manager and the agent. ETX-5300A supports SNMPv3, the latest SNMP version to date. SNMPv3 provides secure access to devices in the network by using authentication and data encryption.
Standards
This section lists the standards on which the supported SNMP versions are based. RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working Group. RFC 1902, Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2). SNMPv2 Working Group. RFC 1903, Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2). SNMPv2 Working Group. RFC 1904, Conformance Statements for Version 2 of the Simple Network Management Protocol (SNMPv2). SNMPv2 Working Group. RFC 1905, Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2). SNMPv2 Working Group. RFC 1906, Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2). SNMPv2 Working Group.
4-36
SNMP Management
RFC 1908, Coexistence between Version 1 and Version 2 of the Internetstandard Network Management Framework. SNMPv2 Working Group. RFC 2104, Keyed Hashing for Message Authentication. RFC 2271, Architecture for Describing SNMP Management Frameworks. RFC 2272, message processing and dispatching for the Simple Network Management Protocol (SNMP). RFC 2273, SNMPv3 Applications. RFC 2274, User-Based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC 2275, View-Based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC 3412, Version 3 Message Processing and Dispatching. RFC 3414, User-based Security Model for SNMPv3 RFC 3416, Update for RFC 1904.
Benefits
The SNMP protocol allows you to remotely manage multiple units from a central work station using RADview EMS. RADview EMS offers a graphical user interface that resembles the front panel of your unit with its interfaces and LEDs. ETX-5300A supports SNMPv3, which allows data to be collected securely from SNMP devices. Confidential information such as SNMP commands can thus be encrypted to prevent unauthorized parties from being able to access them.
Functional Description
SNMPv1 and SNMPv2 can neither authenticate the source of a management message, nor provide privacy (encryption). To overcome these limitations, SNMPv3 provides a security framework for SNMPv1 and SNMPv2 that adds the following main capabilities: Security features: Authentication checks the integrity of management data and verifies its origin, and thus ensures that unauthorized users cannot masquerade as authorized users Privacy ensures that unauthorized users cannot monitor the management information passing from managed systems to the management system Authorization and access control ensures that only authorized users can perform SNMP network management functions and contact the managed entities.
SNMP Management
4-37
Usernames and key management Notification destinations Proxy relationships Remote dynamic configuration of agents via SNMP operations.
SNMP Engine ID
An important parameter related to SNMPv3 is the SNMP engine ID, a unique and unambiguous identifier of the function that processes SNMP messages. It also identifies the SNMP entity that corresponds to the engine. The SNMP engine ID is a string that has three segments: An automatically-generated, fixed segment A selectable segment that identifies the configuration type (method) used to derive the user-defined segment A user-defined segment, which must be unique within the SNMP-managed network. The method used to configure this segment depends on the configuration type.
The automatically-generated segment of the SNMP engine ID changes after each restart (reboot) of the SNMPv3 protocol. As explained below in the SNMPv3 Administrative Features section, the SNMP engine ID is the first parameter to be set whenever SNMPv3 is used and the configuration data and authorized users must be reconfigured.
The message processing models supported by ETX-5300A are as follows: SNMPv2c: SNMPv2 with community-based security model SNMPv2u: SNMPv2 with user-based security model (USM) SNMPv3
The security models available for ETX-5300A are as follows: SNMPv2c: SNMPv2 with community-based security model User-based security model (USM)
4-38
SNMP Management
You can also enable using any of the above-mentioned models, to match different management station capabilities: the appropriate model is automatically selected, in accordance with the model used in the incoming SNMP message.
Encryption mechanism. USM uses the cipher block chaining (CBC) mode of the Data Encryption Standard (DES) for encryption, with a key length of 56 bits.
SNMP Management
4-39
The access control policy used by the agent for each manager must be preconfigured (the policy essentially consists of a table that details the access privileges of each authorized manager). For ETX-5300A, the VACM parameters can be configured only by means of a MIB browser, and/or by SNMP commands
Factory Defaults
The default configuration of the SNMP parameters is as follows: SNMP engine ID set to device MAC address View named internet providing access to IETF MIBs and IEEE MIBs User named "initial", with security level no authentication and no privacy Group for SNMPv3 named "initial": Security levels: no authentication and no privacy, authentication and no privacy, authentication and privacy User: initial Views for read/write/notify: "internet".
Group for SNMPv2c named v2_read: Security level: no authentication and no privacy Read view = internet Write view =
4-40
SNMP Management
Group for SNMPv2c named v2_write: Security level: no authentication and no privacy Read view = internet Write view = internet Notify view = internet
Group for SNMPv2c named v2_trap: Security level: no authentication and no privacy Read view = Write view = Notify view = internet.
SNMPv3 Configuration
ETX-5300A supports SNMP version 3, providing secure SNMP access to the device by authenticating and encrypting packets transmitted over the network. The SNMPv3 manager application in RADview-EMS provides a user-friendly graphical interface to configure SNMPv3 parameters. If you intend to use it, you must first use the device CLI to create users with the required encryption method and security level, as the application can create users based only on existing users; the new user has the same encryption method, and the same security level or lower. The ETX-5300A default configuration provides only one standard user named initial with no encryption and the lowest security level. Use the following procedure to configure SNMPv3: 1. Set SNMP engine ID if necessary 2. Add users, specifying authentication protocol and privacy protocol 3. Add groups, specifying security level and protocol 4. Connect users to groups 5. Add notification entries with assigned traps and tags 6. Configure target parameter sets to be used for targets 7. Configure targets (SNMPv3 network management stations to which ETX-5300A should send trap notifications), specifying target parameter sets and notification tags To configure SNMPv3 parameters: 1. Navigate to configure management snmp. The config>mngmnt>snmp# prompt is displayed. 2. Enter all necessary commands according to the tasks listed below.
Note
When you enter password parameters, they should contain at least eight characters.
SNMP Management 4-41
Chapter 4 Management and Security Task Configuring group Command access-group <group-name> { snmpv2c | usm } { no-auth-no-priv | auth-no-priv | auth-priv } context-match {exact | prefix} Level snmp
Defining context matching Setting notify view of group Setting read view of group Setting write view of group Administratively enabling group Configuring community Configuring name Configuring security name Configuring transport tag Administratively enabling community Configuring notification
snmp>access-group
notify-view <name> read-view <name> write-view <name> no shutdown community <community-index> name <community-string> sec-name <security-name> tag <transport-tag>
snmp> access-group snmp> access-group snmp> access-group snmp> access-group snmp snmp> community snmp> community snmp> community This should be normally set to the default value shutdown disables community
no shutdown
snmp> community
notify <notify-name>
snmp>
4-42
SNMP Management
Installation and Operation Manual Task Assigning trap to notification Command Level
Chapter 4 Management and Security Comments You can assign more than one trap to a notification, in separate commands
bind {coldStart | linkDown | linkUp | snmp>notify authenticationFailure | systemDeviceTemperatureOra | systemSoftwareInstallEnd | systemAlternateConfigLoaded | systemDyingGasp | systemDeviceStartup | systemSwUnconfirmed | systemStartupConfigUnconfirmed | fanFailure | systemSuccessfulLogin | systemFailedLogin | systemLogout | powerDeliveryFailure | systemTrapHardSyncStart | systemTrapHardSyncEnd | systemUserReset | smartSfpMismatch | systemRfc2544TestStart | systemRfc2544TestEnd | clockDomainSystemClockUnlock | sourceClockFailure | stationClockLos | clockDomainStationClockUnlock | ptpRecoveredUnacceptableFrequencyAccuracy | ptpRecoveredMasterDisqualification | ptpRecoveredPtpStateChange | ptpRecoveredSevereFrequencyCondition | epsConfigurationMismatch | epsPortSwitchover | sfpRemoved | ethLos | oamEfmRemoteLoopback | oamEfmRemoteLoopbackOff | oamEfmCriticalLinkIndication | oamEfmFeCriticalLinkIndication | oamEfmDyingGaspIndication | oamEfmFeDyingGaspIndication | sdhSonetLos | e3t3Los | e1t1Los | systemDownloadEnd | oamCfmMepAis | oamCfmMepLck | oamCfmMepMismatch | oamCfmRmepLoc | oamCfmRmepRdi | oamCfmDestNeDelayTca | oamCfmDestNeDelayTcaOff | oamCfmDestNeDelayVarTca | oamCfmDestNeDelayVarTcaOff | oamCfmDestNeLossRatioTca | oamCfmDestNeLossRatioTcaOff | oamCfmDestNeLossRatioTcaFe | oamCfmDestNeLossRatioTcaFeOff | oamCfmDestNeUnavailableRatioTca | oamCfmDestNeUnavailableRatioTcaOff | oamCfmDestNeUnavailableRatioTcaFe | oamCfmDestNeUnavailableRatioTcaFeOff} tag <tag-value> snmp>notify
Assigning tag to notification, to be used to identify the notification entry when configuring target
SNMP Management
4-43
Chapter 4 Management and Security Task Administratively enabling notification Configuring notification filter to define access to a particular part of the MIB hierarchy for trap variables Specifying the part of the subtree OID to use in order to define the MIB subtree Defining whether traps with trap variables belonging to the MIB subtree are sent Administratively enabling notification filter Configuring notification filter profile Configuring notification filter profile name Administratively enabling notification filter profile Connecting security name to group (e.g. connecting user or community to group) Specifying group to which to connect security name Administratively enabling security-to-group entity Command no shutdown Level snmp>notify
snmp
mask [<mask>]
snmp>notify-filter
snmp>notify-filter
no shutdown
snmp>notify-filter
notify-filter-profile <params-name>
snmp>filter-profile
profile-name <argument>
snmp>filter-profile
no shutdown
snmp>filter-profile
snmp
group-name <group-name>
snmp>security-to-group
no shutdown
snmp>security-to-group
4-44
SNMP Management
Installation and Operation Manual Task Setting SNMP engine ID, as MAC address or IP address or string Command snmp-engine-id mac [ <mac-address> ] snmp-engine-id ipv4 [ <ip-address> ] snmp-engine-id text <string> Level snmp
Chapter 4 Management and Security Comments If you use the mac option and dont specify the MAC address, the SNMP engine ID is set to the device MAC address If you use the ipv4 option and dont specify the IP address, the SNMP engine ID is set to the device IP address
Configuring target (SNMPv3 network manager) Specifying target address as IP address or OAM port Assigning tag(s) to target (the tag(s) must be defined in notification entries)
target <target-name>
snmp
snmp>target
snmp>target
If you specify more than one tag, you must enclose the list in square brackets; if you specify just one tag, the brackets are optional
Specifying set of target parameters for target Specifying trap synchronization group
target-params <params-name>
snmp>target
If the group does not exist, it is created If you specify the import-trap-masking parameter, the managers trap masking is imported from the first manager in the group Enter no trap-sync-group <group-id> to remove the manager from the group. If the manager was the last in the group, the group is deleted.
snmp>target snmp
SNMP Management
4-45
Chapter 4 Management and Security Task Specifying message processing model (SNMP version) to be used when generating SNMP messages for the set of target parameters Specifying user on whose behalf SNMP messages are to be generated for the set of target parameters Specifying SNMP version to be used when generating SNMP messages for the set of target parameters Administratively enabling target parameters Configuring target parameters and tags for trap synchronization group Specifying tags Command message-processing-model { snmpv2c | snmpv3 } Level snmp>target
snmp>target
snmp>target
no shutdown
snmp>target
shutdown disables target parameters The trap synchronization group must be previously defined in the target level
trap-sync-group <group-id>
snmp
tag-list <list>
snmp>trap-sync-group
To remove the tag list, enter: no tag-list To remove the tag list, enter: no target-params <params-name> If you dont specify the authentication method when creating a user, the default is MD5 with DES privacy protocol. To create a user with no authentication, specify none-auth. no user <security-name> deletes the user
target-params <params-name>
snmp>trap-sync-group
Configuring user
user <security-name> [md5-auth [ {des | none} ] ] user <security-name> [sha-auth [ {des | none} ] ] user <security-name> [none-auth]
snmp
4-46
SNMP Management
Installation and Operation Manual Task Setting user authentication password and optional key for changes Setting user privacy password and optional key for changes Administratively enabling user Command authentication [ password <password> ] [ key <key-change> ] Level snmp>user
snmp>user
no shutdown
snmp>user
You must define the authentication and privacy method before you can enable the user, unless the user was defined with no authentication (none-auth) shutdown disables the user.
Defining access to a particular part of the MIB hierarchy view <view-name> <sub-tree-oid> snmp
view-name Name of view, which can be associated to a group as a notify, read, or write view sub-tree-oid OID that defines the MIB subtree (for example 1.3.6.1 represents the Internet hierarchy)
Specifying the part of the subtree OID to use in order to define the MIB subtree
mask <mask>
snmp>view
The mask is comprised of binary digits (for example, the mask 1.1.1 converts OID 1.3.6.7.8 to 1.3.6). It is not necessary to specify a mask if sub-tree-oid is the OID that is used to define the MIB subtree included Allows access to the subtree excluded Disables access to the subtree
snmp>view
no shutdown
snmp>view
SNMP Management
4-47
Chapter 4 Management and Security Task Displaying trap synchronization groups and members for SNMPv3 manager groups Displaying SNMPv3 information, such as the number of times the SNMPv3 engine has booted, and how long since the last boot Command show trap-sync Level snmp
snmp
Example
To create SNMPv3 user and connect it to group: User named MD5_priv: Security level MD5 authentication, DES privacy
Group named "SecureGroup": All security levels Contains set of views named "internet" (from default configuration).
4-48
SNMP Management
ETX-5300A# configure management snmp ETX-5300A>config>mngmnt>snmp# user MD5_priv md5-auth des ETX-5300A>config>mngmnt>snmp>user(MD5_priv)$ privacy password MD654321 ETX-5300A>config>mngmnt>snmp>user(MD5_priv)$ authentication password MD654321 ETX-5300A>config>mngmnt>snmp>user(MD5_priv)$ no shutdown ETX-5300A>config>mngmnt>snmp>user(MD5_priv)$ exit ETX-5300A>config>mngmnt>snmp# access-group MD5Group usm no-auth-no-priv ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ context-match prefix ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ read-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ write-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ notify-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ no shutdown ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ exit ETX-5300A>config>mngmnt>snmp# access-group MD5Group usm auth-no-priv ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ context-match prefix ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ read-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ write-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ notify-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ no shutdown ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ exit ETX-5300A>config>mngmnt>snmp# access-group MD5Group usm auth-priv ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ context-match prefix ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ read-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ write-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ notify-view internet ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ no shutdown ETX-5300A>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ exit ETX-5300A>config>mngmnt>snmp# security-to-group usm sec-name MD5_priv ETX-5300A>config>mngmnt>snmp>security-to-group(usm/MD5_priv)$ group-name MD5Group ETX-5300A>config>mngmnt>snmp>security-to-group(usm/MD5_priv)$ no shutdown ETX-5300A>config>mngmnt>snmp>security-to-group(usm/MD5_priv)$ exit ETX-5300A>config>mngmnt>snmp#
To create notifications: Notification named TrapData: Tag = Data Bound to agnStatusChangeTrap, agnUploadDataTrap.
SNMP Management
4-49
ETX-5300A# configure management snmp ETX-5300A>config>mngmnt>snmp# notify TrapPort ETX-5300A>config>mngmnt>snmp>notify(TrapPort)$ tag Port ETX-5300A>config>mngmnt>snmp>notify(TrapPort)$ bind ethLos ETX-5300A>config>mngmnt>snmp>notify(TrapPort)$ bind sfpRemoved ETX-5300A>config>mngmnt>snmp>notify(TrapPort)$ no shutdown ETX-5300A>config>mngmnt>snmp>notify(TrapPort)$ exit ETX-5300A>config>mngmnt>snmp# notify TrapPower ETX-5300A>config>mngmnt>snmp>notify(TrapPower)$ tag Power ETX-5300A>config>mngmnt>snmp>notify(TrapPower)$ bind powerDeliveryFailure ETX-5300A>config>mngmnt>snmp>notify(TrapPower)$ bind systemDeviceStartup ETX-5300A>config>mngmnt>snmp>notify(TrapPower)$ no shutdown ETX-5300A>config>mngmnt>snmp>notify(TrapPower)$ exit ETX-5300A>config>mngmnt>snmp#
To create target parameters and target: Target parameters named TargParam1: Message processing model SNMPv3 version USM User MD5_priv Security level authentication and privacy
Target named TargNMS1: Target parameters TargParam1 Tag list = Data, Power IP address 192.5.4.3.
ETX-5300A# configure management snmp ETX-5300A>config>mngmnt>snmp# target-params TargParam1 ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ message-processing-model snmpv3 ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ version usm ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ security name MD5_priv level auth-
priv
ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ no shutdown ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ exit ETX-5300A>config>mngmnt>snmp# target TargNMS1 ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ target-params TargParam1 ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ tag-list [Port,Power] ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ address udp-domain 192.5.4.3 ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ no shutdown ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ exit ETX-5300A>config>mngmnt>snmp#
SNMPv3 : enable Boots : 2 Boots Time (sec) : 102 EngineID : 800000a4030020d2202416 ETX-5300A>config>mngmnt>snmp#
4-50
SNMP Management
4.8
Management Access
You can enable or disable access to the ETX-5300A management system via Telnet, SSH, or SNMP applications. By disabling Telnet, SSH, or SNMP, you prevent unauthorized access to the system when security of the ETX-5300A IP address has been compromised. When Telnet, SSH, and SNMP are disabled, ETX-5300A can be managed via an ASCII terminal only. In addition, you can limit SFTP and TFTP operation.
Factory Defaults
By default, access is enabled via Telnet, SSH, and SNMP.
4.9
Access Policy
The access policy allows specifying up to three user authentication methods (local, RADIUS, TACACS+. If an authentication method is not available or the user is not found, the next method is used if applicable.
Factory Defaults
By default, authentication is via the locally stored database (1st-level local).
Access Policy
4-51
Task Specifying authentication method preferably via RADIUS/TACACS+, then optionally TACACS+/RADIUS, then optionally local
Note: If at any time in this process, an authentication server rejects an authentication request, ETX-5300A ends the authentication process and does not attempt authentication at the next level.
Specifying authentication method preferably via TACACS+, then optionally local auth-policy 1st-level tacacs+ [2nd-level { local | none } ] If 2nd-level is set to local, authentication is performed via the TACACS server. If the TACACS server does not answer the authentication request, then ETX-5300A authenticates via the local database. .If the TACACS server rejects the authentication request, ETX-5300A ends the authentication process. If 2nd-level is set to none, authentication is performed via the TACACS server only.
4-52
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS) RFC 2618, RADIUS Authentication Client MIB
Benefits
The RADIUS protocol allows centralized authentication and access control, avoiding the need to maintain a local user data base on each device on the network.
Functional Description
When a login attempt occurs at ETX-5300A, it submits an authentication request to the RADIUS server. The RADIUS server checks the database and replies with either Access Rejected or Access Accepted.
Factory Defaults
By default, no RADIUS servers are defined. When the RADIUS server is first defined, it is configured as shown below.
Parameter address retry timeout auth-port Default Value 0.0.0.0 2 2 1812
4-53
Chapter 4 Management and Security Task Defining a non-disclosed string (shared secret) used to encrypt the user password. Command key <string> [hash]
Installation and Operation Manual Comments The shared secret is a secret key consisting of free text known to the client and the server for encryption. It is hashed if specified. Range 010
Defining the number of authentication request attempts Defining timeout (in seconds) for response from RADIUS server Defining the UDP port to be used for authentication Administratively enabling server
retry <number-of-retries>
timeout <seconds>
Range 15
auth-port <udp-port-number>
Range 165535
no shutdown
4-54
ETX-5300A>config>mngmnt>radius# show statistics Server1 Server2 Server3 Server4 -------------------------------------------------------------------------Access Requests :0 0 0 0 Access Retransmits :0 0 0 0 Access Accepts :0 0 0 0 Access Rejects :0 0 0 0 Access Challenges :0 0 0 0 Malformed Response :0 0 0 0 Bad Authenticators :0 0 0 0 Pending Requests :0 0 0 0 Timeouts :0 0 0 0 Unknown Types :0 0 0 0 Packets Dropped :0 0 0 0
used to communicate between the switch and an authentication database. Because TACACS+ is based on TCP, implementations are typically resilient against packet loss.
Standards
RFC 1492, An Access Control Protocol, sometimes called TACACS.
Benefits
The TACACS+ protocol allows centralized authentication and access control, avoiding the need to maintain a local user data base on each device on the network. The TACACS+ server encrypts the entire body of the packet but leaves a standard TACACS+ header.
Factory Defaults
By default, no TACACS+ servers are defined. When the TACACS+ server is first defined, it is configured as shown below.
Parameter retry timeout authentication-port accounting-port Default Value 1 5 seconds 49 49
Functional Description
TACACS+ is a protocol that provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ is based on AAA model: Authentication The action of determining who a user is. Authorization The action of determining what a user is allowed to do. It can be used to customize the service for the particular user. Accounting The action of recording what a user is doing, and/or has done.
The TACACS+ client can be configured to use authentication/authorization with or without accounting functionality.
Components
The TACACS+ remote access environment has three major components: access client, TACACS+ client, and TACACS+ server. The access client is an entity which seeks the services offered by the network. TACACS+ client running on ETX-5300A, processes the requests from the access client and pass this data to TACACS+ server for authentication.
ETX-5300A Ver. 1.0
4-56
The TACACS+ server authenticates the request, and authorizes services over the connection. The TACACS+ server does this by matching data from the TACACS+ client`s request with entries in a trusted database.
TACACS+ server decides whether to accept or reject the user's authentication or authorization. Based on this response from the TACACS+ server, the TACACS+ client decides whether to establish the user's connection or terminate the user's connection attempt. The TACACS+ client also sends accounting data to the TACACS+ server to record in a trusted database. TACACS+ uses TCP for its transport and encrypts the body of each packet. TACACS+ client and server can agree to use any port for authentication and accounting. TACACS+ supports authentication by using a user name and a fixed password.
Accounting
ETX-5300A supports up to five accounting groups, with up to five TACACS+ servers per group. However, each TACACS+ server can be bound to a single accounting group only. A group can be defined with its own accounting level: Shell accounting, which logs the following events: Successful logon Logon failure Successful logoff ETX-5300A-terminated management session.
System accounting, which records system events/alarms registered in local log file Command accounting, which logs the following events: Any shell command that was successfully executed by ETX-5300A Any level that was successfully changed in a shell.
4-57
Chapter 4 Management and Security Task Defining a new TACACS+ server Command server <ip-address>
Installation and Operation Manual Comments no server deletes a TACACS+ server The shared secret is a secret key consisting of free text known to the client and the server for encryption. It is hashed if specified. Range 165535
Defining a non-disclosed string (shared secret) used to encrypt the user password
Defining the TCP port to be used for accounting Defining the TCP port to be used for authentication Binding accounting group to TACACS+ server Defining the number of authentication request attempts Defining timeout (in seconds) for response from TACACS+ server Administratively enabling server
Range 165535
retry <number-of-retries>
timeout <seconds>
Range 110
no shutdown
Note
You can enter any combination of shell, system, and commands, but you must enter at least one of them.
3. Type exit to return to the TACACS+ level. The config>mngmnt>tacacsplus# prompt is displayed. 4. Type server <ip-address> to select the TACACS+ server to which to bind the group. The config>mngmnt>tacacsplus>server(<ip-address>)# prompt is displayed.
4-58
5. At the config>mngmnt>tacacsplus>server(<ip-address>)# prompt, enter group < group-name> to bind the previously defined accounting group to the TACACS+ server.
ETX-5300A# configure management tacacsplus ETX-5300A>config>mngmnt>tacacsplus# server 175.18.172.150 ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)$ key TAC_server1 ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)$ no shutdown ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)$ information detail key "244055BF667B8F89225048C6571135EF" hash retry 1 timeout 5 authentication-port 49 accounting-port 49 no group no shutdown
ETX-5300A# configure management tacacsplus ETX-5300A>config>mngmnt>tacacsplus# group TAC1 ETX-5300A>config>mngmnt>tacacsplus>group(TAC1)$ accounting shell system commands ETX-5300A>config>mngmnt>tacacsplus>group(TAC1)$ info detail accounting shell system commands ETX-5300A>config>mngmnt>tacacsplus>group(TAC1)$ exit ETX-5300A>config>mngmnt>tacacsplus# server 175.18.172.150 ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)# group TAC1 ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)# info detail key "244055BF667B8F89829AB8AB0FE50885" hash retry 1 timeout 5 authentication-port 49 accounting-port 49 group "TAC1" no shutdown
4-59
Displaying Statistics
To display TACACS+ statistics: At the config>mngmnt>tacacsplus>server <ip-address># prompt, type: show statistics. The TACACS+ statistic counters are displayed. ETX-5300A>config>mngmnt>tacacsplus>server(175.18.172.150)$ show statistics Requests 0 Request Timeouts 0 Unexpected Responses 0 Server Error Responses 0 Incorrect Responses 0 Transaction Successes 0 Transaction Failures 0 Pending Requests 0
To clear TACACS+ statistics: At the config>mngmnt>tacacsplus>server <ip-address># prompt, type clear statistics. TACACS+ statistic counters are set to 0.
4-60
4.12 Syslog
ETX-5300A uses the Syslog protocol to generate event notification messages and transport them over IP networks to Syslog servers.
Benefits
Syslog protocol collects heterogeneous data into a single data repository. It provides system administrators with a single point of management for collecting, distributing and processing audit data. Syslog standardizes log file formats, making it easier to examine log data with various standard tools. Data logging can be used for:
ETX-5300A Ver. 1.0
Long-term auditing Intrusion detection Tracking user and administrator activity Product operation management.
Syslog 4-61
Factory Defaults
By default, Syslog operation is disabled. When enabled, the default parameters are as follows:
Parameter facility port severity-level Default Value local1 514 informational
Functional Description
The Syslog protocol provides an instrument for generating and transporting event notification messages from ETX-5300A to servers across IP networks.
Mess
ages
PSN
ETX-5300A
Mess
ETX-5300A
ages
Syslog Server
Elements
Typical Syslog topology includes message senders (devices) and message receivers (servers). ETX-5300A supports up to five Syslog servers. The receiver displays, stores or forwards logged information. The standard designates two types of receivers: Relay, which forwards messages Collector which displays and stores messages.
Transport Protocol
Syslog uses User Datagram Protocol (UDP) for its transport. The UDP port assigned to Syslog is 514, but devices and servers can be defined to use any port for communication.
Message Format
The length of a Syslog message is 1024 bytes or less. It contains the following information: Facility and severity (see below) Host name or IP address of the device Timestamp Message content.
4-62
Syslog
A typical Syslog message looks like this: <145>Jan 15 13:24:07 172.17.160.69 Eth 1: Loss of signal (LOS)
Severity is assigned to a message to specify its importance. ETX-5300A uses the following severity designations: Table 4-11. Syslog Severities
Code 0 1 2 3 4 5 6 7 Syslog Type Emergency Alert Critical Error Warning Notice Informational Debug Description Emergency message Critical alarm Major alarm Minor alarm Event Cleared alarm Informational message, not in use Debug-level messages, not in use
Syslog Configuration
When configuring Syslog parameters, it is necessary to define Syslog device and servers. To configure a Syslog device: 1. Navigate to the syslog device context (config>system>syslog device). The config>system>syslog(device)# prompt is displayed. 2. Enter the necessary commands according to the tasks listed below.
Task Defining a facility from which Syslog messages are sent Defining Syslog device UDP port for communication Command facility {local1 | local2 | local3 | local4 | local5 | local6 | local7} port <udp-port-number> Range is 165535 Port configuration is allowed only if a Syslog device is administratively disabled severity-level { emergency | alert | The log messages that contain critical | error | warning | notice | severity level above or equal informational | debug} the specified level are transmitted Comments
Syslog
4-63
Chapter 4 Management and Security Task Administratively enabling Syslog device Command no shutdown
Installation and Operation Manual Comments shutdown administratively disables Syslog device
Example below illustrates procedure for defining a Syslog device. Facility: local2 UDP port: 155 Severity level: major.
ETX-5300A# configure system syslog device ETX-5300A>config>system>syslog(device)# ETX-5300A>config>system>syslog(device)# facility local2 ETX-5300A>config>system>syslog(device)# port 155 ETX-5300A>config>system>syslog(device)# severity-level major ETX-5300A>config>system>syslog(device)# no shutdown To display Syslog statistics: 1. Navigate to the syslog device context (config>system>syslog device). The config>system>syslog(device)# prompt is displayed. 2. At the config>system>syslog(device)# prompt, enter show statistics. Syslog statistics appear as shown in Figure 4-10. The counters are described in Table 4-12. ETX-5300A>config>system>syslog(device)# show statistics Total Tx Messages : 356 Non-queued Dropped Messages : 265
To clear Syslog statistics: 1. Navigate to the syslog device context (config>system>syslog device). The config>system>syslog(device)# prompt is displayed. 2. At the config>system>syslog(device)# prompt, enter clear statistics. The Syslog statistic counters are set to 0.
4-64
Syslog
The config>system# prompt is displayed. 2. At the config>system# prompt, enter server <server-ID> to specify server to receive Syslog messages, from 1 to 5. The config>system>syslog(server/15)# prompt is displayed. 3. Enter the necessary commands according to the tasks listed below.
Task Defining Syslog server IP Command address <0.0.0.0255.255.255.255> port <udp-port-number> Range 165535 Port configuration is allowed only if a Syslog server is administratively disabled no shutdown shutdown administratively disables Syslog server Comments
Example
Server IP address: 178.16.173.152 UDP port: 155 1 address 178.16.173.152 port 155 no shutdown
Configuration Errors
Table 4-13 lists messages generated by ETX-5300A when a configuration error is
detected.
Syslog
4-65
Slot Actual Provisioned Admin Oper Mode ----------------------------------------------------------------------------PS-A PSU PSU Up Up Standalone PS-B PSU PSU Up Up Standalone Main-A Main 10GbEx4 Main 10GbEx4 Up Up Standalone Main-B Main 10GbEx4 Main 10GbEx4 Up Up Standalone 1 STM-1 Ch-4 STM-1 Ch-4 Up Up Standalone 2 STM-1 Ch-4 STM-1 Ch-4 Up Up Standalone 3 STM-1 Ch-4 Empty Down Down Standalone 4 STM-1 Ch-4 Empty Down Down Standalone Fan Fan Fan Up Up Standalone
4-66
Programming Cards
Installation and Operation Manual Parameter Oper Description Card operational status Possible Values
Not present slot is vacant Up card is provisioned and operational Down card provisioning command has been received, and card software download is in progress
Mode
Standalone Card is not a protection group member Protection Card is a protection group member
eth {gbe-20-sfp | gbe-20-utp | gbe-20-sfp GbE card with 20 SFP ports 10g-2-xfp} gbe-20-utp GbE card with 20 UTP ports 10g-2-xfp 10GbE card with two XFP ports
sdh-sonet [stm-1-ch-4 | stm-1- Provisioning of a TDM card defines its t1-ch-4 | oc-3-ch-4] interface type: stm-1-ch-4 STM-1 E1 card with four TDM ports stm-1-t1-ch-4 STM-1 T1 card with four TDM ports oc-3-ch-4 OC-3 card with four TDM ports
bind loopback-address <value> Binding TDM I/O card to loopback router interface is required for PW operation on UDP/IP networks. The card can be bound only if it is in shutdown state. no before bind loopback-address unbinds from loopback router interface.
no card-type
3. Use no shutdown command to activate a card in a specific slot. 4. Wait until the card initialization process is complete before starting service configuration. For example:
ETX-5300A Ver. 1.0 Programming Cards 4-67
To configure a chassis with: Two AC power supplies Two main cards One E5-GbE-20 card with SFP ports in slot 1 Two E5-cTDM-4 cards with E1 interfaces in slots 23. The card in slot 2 is bound to loopback router interface with IP address 10.10.10.10 Empty slot 4. card-type eth gbe-20-sfp no shutdown card-type sdh-sonet stm-1-ch-4 bind loopback-address 10.10.10.10 no shutdown card-type sdh-sonet stm-1-ch-4 no shutdown no card-type
To verify card provisioning: At the config# prompt, enter the show card-summary command.
ETX-5300A# configure ETX-5300A>config>show card-summary Slot Actual Provisioned Admin Oper Mode ----------------------------------------------------------------------------PS-A PSU PSU Up Up Standalone PS-B PSU PSU Up Up Standalone Main-A Main 10GbEx4 Main 10GbEx4 Up Up Standalone Main-B Main 10GbEx4 Main 10GbEx4 Up Up Standalone 1 ETH GBE-20-SFP Up Up Standalone 2 STM-1 Ch-4 STM-1 Ch-4 Up Up Standalone 3 STM-1 Ch-4 STM-1 Ch-4 Up Up Standalone 4 Empty Empty Down Not Present Standalone Fan Fan Fan Up Up Standalone
4-68
Programming Cards
Actual Type Provisioned Type Administrative Status Operational Status Status Protection Mode Software Version
: : : : : : :
Configuration Errors
Table 4-15 lists messages generated by ETX-5300A when a configuration error is
detected.
Programming Cards
4-69
4-70
Programming Cards
Chapter 5 Services
This chapter presents information on the service elements and services supported by ETX-5300A.
5.1
Service Elements
This section describes the managed elements that need to be configured during service provisioning. Service provisioning elements are as follows: Profiles Scheduling and shaping entities Physical ports (NNI, UNI) Logical ports (SAG, SAP, SVI, LAG) Forwarding entities (flow, bridge, router).
Profiles
Most packet processing features are defined by creating and applying various profiles. Profiles comprise sets of attributes related to a specific service entity. Profiles must be defined before other managed objects.
Service Elements
5-1
Defines level-1, -2 and -3 scheduling elements and structures within queue group Defines actions for L2CP processing (drop, peer, tunnel) Defines CIR, CBS, EIR and EBS parameters Defines method and values for mapping different flow attributes (Pbit, DSCP, DEI etc) to packet color Defines method and values for mapping packet attributes (P-bit, DSCP, IP-Precedence) to internal CoS values Defines method of mapping CoS and packet color values into P-bit and DEI
16 128 36
CoS mapping
Flow
36
Marking
Flow
16
ETX-5300A provides the following shaping tools: Dual leaky bucket shaper (CIR/EIR) Single leaky bucket shaper (CIR).
Physical Ports
GbE and 10GbE ports located in I/O and main cards serve as ingress (UNI) and egress (NNI) ports for Ethernet flows. The following packet processing attributes are assigned to them:
5-2
Tag Ethertype for identifying VLAN-tagged frames at ingress and setting Ethertype value for VLAN editing (stack, swap) at egress L2CP profile for defining L2CP frame handling (discard, peer or tunnel) Queue group profile for associating a port with a queue group
ETX-5300A Ver. 1.0
Service Elements
Chapter 5 Services
Classification key for mapping traffic into flows according to classification profiles.
ETX-5300A ports can be either of two types: Attached directly to the main card packet processor (directly-attached ports). These are 10GbE ports on the main cards. Attached to the packet processor via the classification and traffic management engine (indirectly-attached ports). These are GbE, 10GbE and TDM ports on the I/O cards.
Logical Ports
Logical ports maintained by ETX-5300A serve as internal aggregation or forwarding points for Ethernet flows. The following logical ports exist: Service Virtual Interface (SVI) used for binding flows to bridge ports, router interfaces or Layer-2 TDM pseudowires. SVIs serve as intermediaries for bridges and routers, which must comply with standards of their own (VLAN domains for bridge ports or IP address for router interfaces) and do not have physical port attributes. They also serve as aggregation points for TDM PWs.
SVI SVI User BP Bridge User SVI BP BP SVI NET BP BP SVI OOB
Service Elements
5-3
Chapter 5 Services
Flow
BP Bridge
BP
SVI
Flow
BP SVI
BP SVI
SVI
Flow
Egress
SAP
SAP
Forwarding Entities
Several internal entities carry traffic and make forwarding and switching decisions. These are:
5-4
Flows the main traffic-carrying elements Bridge traffic-forwarding element for Layer-2 E-LAN services Router traffic-forwarding element for Layer-3 services.
ETX-5300A Ver. 1.0
Service Elements
MEF-8 Pseudowires
SVI
SVI
BP
SVI
Chapter 5 Services
Flows
Flows are unidirectional entities that interconnect two physical or logical ports. Flow processing is performed as follows: Ingress traffic is mapped in flows using classification match criteria defined via a classification profile. L2CP frames are handled per flow according to L2CP profile settings. User priority (P-bit, IP Precedence, DSCP) is mapped into internal Class of Service (CoS) according to a CoS mapping profile or assignment per flow. User priority (P-bit, IP Precedence, DSCP or DEI) can be mapped to packet color (yellow or green) according to a color mapping profile or assignment per flow. VLANs can be edited per flow by stacking (pushing), removing (popping), or swapping (marking) tags on single-, or double-tagged packets. P-bit and DEI values are either copied or set according to a CoS marking profile. CoS marking profile maps CoS value and/or packet color into the egress priority tags (P-bit, DEI). A single policer can be applied to a flow or a policer aggregate can be assigned to a group of flows, using a policer profile or policer aggregate profile. A flow is mapped to a specific queue block within a queue group associated with an egress port. A specific queue in the queue block is defined 1:1 by the packet CoS (07) according to a CoS-mapping profile.
Bridge
The bridge is a forwarding entity used by ETX-5300A for delivering E-LAN services in multipoint-to-multipoint topology and G.8032 ring protection. With up to 32 bridge instances, ETX-5300A provides up to 128 bridge ports per bridge entity. The bridge uses SVIs for connecting to logical and physical ports. The bridge is defined by a bridge number, bridge ports and a VLAN membership table that specifies which bridge ports are members in a certain broadcast domain (VLAN). The bridge supports one level of VLAN editing on ingress and one level on egress. The editing is performed at the flow level.
Router
The ETX-5300A router is an internal Layer-3 interworking device that forwards traffic between its interfaces. Each router interface is assigned an IP address and can be bound to one of the following: Physical port on Ethernet I/O or main card Bridge port TDM pseudowire card for UDP/IP forwarding or 1588v2 clock entity, by defining a virtual loopback address on a router interface.
The router uses service virtual interfaces (SVIs) for connecting to logical and physical ports. The connection is always made by directing flows from a port to an SVI, and then binding the SVI to a router interface.
Service Elements
5-5
Chapter 5 Services
5.2
E-Line Service
I/O-to-Main Path
Figure 5-4 illustrates a typical Ethernet service created in I/O-to-main card direction. Table 5-2 details the configuration steps needed for service
provisioning.
5-6
E-Line Service
Chapter 5 Services
Shaper
1. Define profiles
SAP
Flow 2
2. Configure ports
3. Configure flows
Configure flow 1 Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Bind policer profile
Configure flow 2 Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
E-Line Service
5-7
Chapter 5 Services
CoS Mapping
cos-map-profile
5-8
E-Line Service
Installation and Operation Manual Sequence Step Ethernet Ports 2. Configure ports Commands port Comments
Chapter 5 Services
Configure physical layer parameters Define classifier keys for I/O and main card Ethernet ports Bind previously created L2CP profile Select VLAN tag TPID (8100 or select another value) Bind the queue group profile intended for flow 1 to SAG; bind queue group profile intended for flow 2 to main card port
Flows
flow
Define two flows: Flow 1: ingress port I/O card port, egress port SAP Flow 2: ingress port SAP, egress port main card port
Bind L2CP profile to flow 1 Bind classifier profiles to flow 1 and 2 3. Configure flows Bind CoS mapping profile to flow 1 or use a fixed value Bind color mapping profile to flow 1 or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1 and 2 Bind queue block instance to flow 1 and 2 Define required VLAN editing actions (push, pop, mark) for flow 2 Bind marking profile to flow 2 Define TPID editing policy for flow 2
Main-to-I/O Path
Figure 5-5 illustrates a typical service created in main-to-I/O card directions. See Table 5-3 details the configuration steps needed for service provisioning.
E-Line Service
5-9
Chapter 5 Services
See Figure 5.1
1. Define profiles
Flow
2. Configure ports
3. Configure flows
Configure flow Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Define TPID editing policy Legend: Mandatory Optional Bind queue mapping profile Bind queue block instance
Figure 5-5. Main-to-I/O Path Table 5-3. E-Line Main-to-I/O Service Provisioning
Sequence 1. Define profiles Step Same as detailed in Commands Same as detailed in Comments Flows with ingress main card ports do not support policing
Table 5-2
Table 5-2
5-10
E-Line Service
Installation and Operation Manual Sequence 2. Configure ports Step Same as detailed in Commands Same as detailed in Comments
Chapter 5 Services
Table 5-2
Table 5-2
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Define flow with ingress port set to main card port, and egress port set to I/O card port Bind L2CP profile Bind classifier profile
3. Configure flows
Bind CoS mapping profile or use a fixed value Bind color mapping profile or use a fixed value Bind queue mapping profile Bind queue block instance Define required VLAN editing actions (push, pop, mark) Bind marking profile Define TPID editing policy
I/O-to-I/O Path
Figure 5-6 illustrates a typical service created in I/O-to-I/O direction. Table 5-4 details the configuration steps needed for service provisioning.
E-Line Service
5-11
Chapter 5 Services
See Figure 5.1
1. Define profiles
2. Configure ports
3. Configure flows
Configure flow 1 Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Bind policer profile Bind queue mapping profile Bind queue block instance
Configure flow 2 Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
Figure 5-6. I/O-to-I/O Path Table 5-4. E-Line I/O-to-I/O Service Provisioning
Sequence 1. Define profiles Step Same as detailed in Commands Same as detailed in Comments
Table 5-2
Table 5-2
2. Configure ports
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
5-12
E-Line Service
Installation and Operation Manual Sequence Step Same as detailed in Commands Same as detailed in Comments Define two flows:
Chapter 5 Services
Table 5-2
Table 5-2
Flow 1: ingress port I/O card port, egress port SAP Flow 2: ingress port SAP, egress port I/O card port
Bind L2CP profile to flow 1 Bind classifier profiles to flow 1 and 2 3. Configure flows Bind CoS mapping profile to flow 1 or use a fixed value Bind color mapping profile to flow 1 or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1 and 2 Bind queue block instance to flow 1 and 2 Define required VLAN editing actions (push, pop, mark) for flow 2 Bind marking profile to flow 2 Define TPID editing policy for flow 2
Main-to-Main Path
Figure 5-6 illustrates a typical service created in main-to-main direction. Table 5-4 details the configuration steps needed for service provisioning.
E-Line Service
5-13
Chapter 5 Services
See Figure 5.1
1. Define profiles
Flow
2. Configure ports
3. Configure flows
Configure flow Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Define TPID editing policy Legend: Mandatory Optional Bind queue mapping profile Bind queue block instance
Figure 5-7. Main-to-Main Path Table 5-5. E-Line Main-to-Main Service Provisioning
Sequence 1. Define profiles Step Same as detailed in Commands Same as detailed in Comments
Table 5-2
Table 5-2
5-14
E-Line Service
Installation and Operation Manual Sequence 2. Configure ports Step Same as detailed in Commands Same as detailed in Comments
Chapter 5 Services
Table 5-2
Table 5-2
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Define one flow with ingress and egress port set to main card ports Bind L2CP profile to flow 1 Bind classifier profiles to flow 1 and 2 Bind CoS mapping profile to flow 1 or use a fixed value Bind color mapping profile to flow 1 or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1 and 2 Bind queue block instance to flow 1 and 2 Define required VLAN editing actions (push, pop, mark) for flow 2 Bind marking profile to flow 2 Define TPID editing policy for flow 2
3. Configure flows
5.3
E-LAN Service
This section describes various scenarios for provisioning E-LAN services. Depending on flow topology, different classification methods and VLAN editing actions are used at bridge port ingress. All valid combinations are listed in VLAN Editing section of Appendix B.
Figure 5-8 illustrates a typical E-LAN service. Table 5-6 details the configuration steps needed for service provisioning.
E-LAN Service
5-15
Chapter 5 Services
1. Define profiles
See Figure 5.1
Bridge
Flow 2a Flow 2b
SAP
SVI BP
BP SVI
Flow 3a Flow 3b
Configure SAG
3. Define bridge
Define bridge
Define SVIs (B) and bridge ports Define bridge-type SVI Define bridge port Bind bridge port to SVI Configure VLAN membership
Define VLANs Configure bridge ports as VLAN members Configure MAC table size
6. Configure flows
Configure flow 1 Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Bind policer profile Bind queue mapping profile Mandatory Optional Bind queue block instance
Configure flow 2a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Define TPID editing policy Bind classifier profile
Configure flow 2b Bind ingress and egress ports Bind classifier profile Bind queue mapping profile Bind queue block instance Define VLAN editing actions
Configure flow 3a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Configure flow 3b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
Legend:
5-16
E-LAN Service
Chapter 5 Services
Table 5-2
Table 5-2
2. Configure ports
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
3. Define bridge
Bridge
bridge
svi bridge
Define bridge-port type SVIs, add ports to the bridge and bind the bridge ports to the SVIs
Bridge
bridge
Add VLANs, define bridge ports as VLAN members and specify MAC table size for each VLAN
Same as detailed in
Same as detailed in
Define five flows: Flow 1: ingress I/O card port, egress SAP Flow 2a: ingress SAP, egress SVI Flow 2b: ingress SAP, egress I/O card port Flow 3a: ingress SVI, egress main card port Flow 3b: ingress main card port, egress SVI
Table 5-2
6. Configure flows
Table 5-2
E-LAN Service
5-17
Bind CoS mapping profile to flow 1 and 3b or use a fixed value Bind color mapping profile to flow 1 and 3b or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1, 2b and 3a Bind queue block instance to flow 1, 2b and 3a Define required VLAN editing actions for flow 2a, 2b, 3a and 3b Bind marking profile to flow 3a and 3b Define TPID editing policy for flow 2a and 3b
5.4
Routing Services
ETX-5300A supports a static router. Each router interface is assigned an IP address and can be bound to one of the following: Physical port on Ethernet I/O or main card Bridge port Virtual loopback address on a router interface on a TDM pseudowire card for UDP/IP forwarding or on an IEEE 1588v2 master or slave entity.
5-18
Routing Services
Chapter 5 Services
Note
1. Define profiles
Router
Flow 2a Flow 2b
SAP
SVI RIF
RIF SVI
Flow 3a Flow 3b
Configure SAG
3. Define SVIs
4. Configure flows
Configure flow 1 Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Bind policer profile Bind queue mapping profile Bind queue block instance
Configure flow 2a Bind ingress and egress ports Define VLAN editing actions Bind classifier profile Define TPID editing policy
Configure flow 2b Bind ingress and egress ports Bind classifier profile Bind queue mapping profile Bind queue block instance Define VLAN editing actions
Configure flow 3a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Configure flow 3b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Define RIFs
Routing Services
5-19
Chapter 5 Services
Table 5-2
Table 5-2
2. Configure ports
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
4. Define SVIs
svi
Same as detailed in
Same as detailed in
Define five flows: Flow 1: ingress I/O card port, egress SAP Flow 2a: ingress SAP, egress SVI Flow 2b: ingress SAP, egress I/O card port Flow 3a: ingress SVI, egress main card port Flow 3b: ingress main card port, egress SVI
Table 5-2
Table 5-2
5. Configure flows
Bind L2CP profile to flow 1 Bind classifier profiles to all flows Bind CoS mapping profile to flow 1 and 3b or use a fixed value Bind color mapping profile to flow 1 and 3b or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1, 2b and 3a Bind queue block instance to flow 1, 2b and 3a Define required VLAN editing actions for flow 2a, 2b, 3a and 3b Bind marking profile to flow 3a and 2b
5-20
Routing Services
Installation and Operation Manual Sequence 6. Add RIFs and bind them to SVIs Step Router Commands router Comments
Chapter 5 Services
Add interfaces to the router and bind the RIFs to the SVIs
Router-to-Bridge Path
When adding Layer-3 services to Layer-2 topology, such as G.8032 Ethernet ring, a router interface must be connected to a bridge port.
Routing Services
5-21
Chapter 5 Services
1. Define profiles
See Figure 5.1
Router
Flow 2a Flow 2b Flow 3a
Bridge
Flow 3b
SAP
SVI RIF
RIF SVI
SVI BP
BP
SVI
Flow 4a Flow 4b
2. Configure ports
Configure SAG
3. Define bridge
Define SVIs (B and R) and bridge ports Define bridgeand router-type SVIs Define bridge ports Bind bridge ports to SVIs
Define bridge
Define VLANs Configure bridge ports as VLAN members Configure MAC address ranges
Configure flow 1 Bind ingress and egress ports Bind L2CP profile Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Bind policer profile Bind queue mapping profile Bind queue block instance
Configure flow 2a Bind ingress and egress ports Define VLAN editing actions Bind classifier profile Define TPID editing policy
Configure flow 2b Bind ingress and egress ports Bind classifier profile Bind queue mapping profile Bind queue block instance Define VLAN editing actions Bind marking profile
Configure flow 3a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
Configure flow 3b Bind ingress and egress ports Bind classifier profile Define VLAN editing actions
Define RIFs
Configure flow 4a Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Configure flow 4b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Define TPID editing policy
Chapter 5 Services
Table 5-2
Table 5-2
2. Configure ports
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
3. Define bridge
Bridge
bridge
svi bridge
Define bridge-port type SVIs, add ports to the bridge and bind the bridge ports to the SVIs
Bridge
bridge
Add VLANs, define bridge ports as VLAN members and specify MAC address ranges for each VLAN
Same as detailed in
Define five flows: Flow 1: ingress I/O card port, egress SAP Flow 2a: ingress SAP, egress SVI (R) Flow 2b: ingress SAP, egress I/O card port Flow 3a: ingress SVI (R), egress SVI (B) Flow 3b: ingress SVI (B), egress SVI (R)
Table 5-2
Table 5-2
Routing Services
5-23
Bind CoS mapping profile to flow 1 and 4b or use a fixed value Bind color mapping profile to flow 1 and 4b or use a fixed value Bind policer profile to flow 1 Bind queue mapping profile to flow 1, 2b and 4a Bind queue block instance to flow 1, 2b and 4a Define required VLAN editing actions for flow 2a, 2b, 3a and 3b Bind marking profile to flow 3a Define TPID editing policy for flow 3a and 4b 7. Add RIFs and bind them to SVIs Router router Add interfaces to the router and bind the RIFs to the SVIs
Same as detailed in
Same as detailed in
Define flows 4a and 4b: Flow 4a: ingress SVI (B), egress main card port Flow 4b: ingress main card port, egress SVI (B)
Table 5-2
Table 5-2
5.5
Pseudowire Services
ETX-5300A can be used for extending TDM-based services over packet-switched networks. It utilizes various payload (CESoPSN, SAToP) and network (UDP over IP, MEF-8 Ethernet) encapsulation techniques to deliver synchronous traffic over asynchronous infrastructure with the same service quality as of a legacy SDH/SONET network. The circuit emulation traffic has the highest priority, ensuring extremely low packet-loss transport, low latency and minimal jitter. Depending on network type and topology, the pseudowire traffic can be delivered as: Point-to-point L2 service for MEF-8-encapsulated PWs Bridge L2 for MEF-8-encapsulated PWs
5-24
Pseudowire Services
Chapter 5 Services
PW
Flow 1a
SVI
Flow 1b
2. Configure ports
3. Define SVI
4. Define PW peer
Define PW peer
Add and configure a pseudowire Configure crossconnections Configure timeslot cross-connection for CESoPSN PW
7. Configure flows
Configure flow 1a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
Configure flow 1b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind queue mapping profile Bind queue block instance
Pseudowire Services
5-25
Chapter 5 Services
Table 5-2
2. Configure ports
port
3. Define SVIs
svi
Define PW-type SVI. Remember that PW SVIs represent untagged traffic termination points. This means that VLAN tags must be pushed on exiting it and popped on the flows terminating at SVI.
4. Define PW peer
Pseudowire Peer
peer
pwe
cross-connection
7. Configure flows
Define two flows: Flow 1a: ingress SVI, egress main card port Flow 1b: ingress main card port, egress SVI ETX-5300A Ver. 1.0
5-26
Pseudowire Services
Chapter 5 Services
Bind classifier profile to flow 1b Bind CoS mapping profile to 1b or use a fixed value Bind color mapping profile to flow 1b or use a fixed value Bind queue mapping profile Bind queue block instance Define required VLAN editing actions Bind marking profile to flow 1a Define TPID editing policy for flow 1a
Pseudowire Services
5-27
Chapter 5 Services
1. Define profiles
See Figure 5.1
PW
Flow 1a
SVI
Flow 1b
2. Configure ports
Define bridge
Define SVIs (B) and bridge ports Define bridge-type SVIs Define bridge ports Bind bridge ports to SVIs
Define VLANs Configure bridge ports as VLAN members Configure MAC table size
Define PW peer Add and configure a pseudowire Configure crossconnections Configure timeslot cross-connection for CESoPSN PW
9. Configure flows
Configure flow 1a Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Define TPID editing policy
Configure flow 1b Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Define TPID editing policy
Configure flow 2a Bind ingress and egress ports Bind classifier profile Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Configure flow 2b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind marking profile Define TPID editing policy Bind queue mapping profile Bind queue block instance
Chapter 5 Services
Table 5-2
Table 5-2
2. Configure ports
port
3. Define bridge
Bridge
bridge
svi bridge
Define bridge-port type SVIs, add ports to the bridge and bind the bridge ports to the SVIs
Bridge
bridge
Add VLANs, define bridge ports as VLAN members and specify MAC table size for each VLAN
6. Define PW peer
Pseudowire Peer
peer
Pseudowire Services
5-29
Chapter 5 Services Sequence Step Pseudowires 7. Define pseudowire Commands pwe Comments
cross-connection
Same as detailed in
Same as detailed in
Define four flows: Flow 1a: ingress PW SVI, egress bridge SVI Flow 1b: ingress bridge SVI, egress PW SVI Flow 2a: ingress bridge SVI, egress main card port Flow 2b: ingress main card port, egress bridge SVI
Table 5-2
Table 5-2
9. Configure flows
Bind classifier profile Bind CoS mapping profile to flow 2b or use a fixed value Bind color mapping profile to flow 2b or use a fixed value Bind queue mapping profile to flow 2a and 2b Bind queue block instance to flow 2a and 2b Define required VLAN editing actions Bind marking profile Define TPID editing policy
L3 Pseudowire Service
Figure 5-13 illustrates a L3 pseudowire-over-router service. Table 5-11 details the
configuration steps needed for service provisioning.
5-30
Pseudowire Services
Chapter 5 Services
Router
I/O TDM Card PW
LB RIF
Define loopback RIF Define loopback router interface
RIF SVI
Flow 1a Flow 1b
2. Define LB RIF
3. Configure ports
Configure TDM I/O card and its ports Define TDM I/O card in slot Configure SDH/ SONET ports Configure E1/T1 ports
4. Define SVI
5. Define PW peer
6. Add a pseudowire
Define RIFs
9. Configure flows
Configure flow 1a Bind ingress and egress ports Define VLAN editing actions Bind marking profile Bind queue mapping profile Bind queue block instance
Configure flow 1b Bind ingress and egress ports Bind classifier profile Bind CoS mapping profile or use fixed value Bind color mapping profile or use fixed value Define VLAN editing actions Bind queue mapping profile
Chapter 5 Services
Table 5-2
Table 5-2
Router
router
port
When defining TDM I/O card in chassis slot, bind it to the IP address used by loopback router interface. Configure physical layer parameters of the SDH/SONET and E1/T1 ports.
4. Define SVIs
svi
Define router-type SVI. Remember that router SVI represents an untagged traffic termination point. This means VLAN tags must be pushed on exiting it, and popped on the flows terminating at SVI.
5. Define PW peer
Peer
peer
pwe
5-32
Pseudowire Services
Installation and Operation Manual Sequence 7. Configure timeslot crossconnections Step Cross-Connections Commands cross-connection Comments
Chapter 5 Services
Same as detailed in
Same as detailed in
Define two flows: Flow 1a: ingress SVI, egress main card port Flow 1b: ingress main card port, egress SVI
Table 5-2
Table 5-2
8. Configure flows
Bind classifier profile to flow 1b Bind CoS mapping profile to 1b or use a fixed value Bind color mapping profile to flow 1b or use a fixed value Bind queue mapping profile Bind queue block instance Define required VLAN editing actions Bind marking profile to flow 1a
Pseudowire Services
5-33
Chapter 5 Services
5-34
Pseudowire Services
Chapter 6 Ports
This chapter presents information on the following physical and logical ports present in ETX-5300A:
Ethernet Ports SDH/SONET Ports E1 Ports T1 Ports Service Aggregation Group (SAG) Service Virtual Interface (SVI).
6.1
Ethernet Ports
This section details the configuration procedure for Ethernet ports located on the main and I/O cards, including out-of-band management port.
Benefits
Ethernet interfaces located on the E5-MC-4, E5-GBE-20 and E5-10GBE-2 cards provide high-speed connection to GbE and 10GbE networks using fiber optic (SFP/XFP) or copper RJ-45 ports.
Factory Defaults
By default, Ethernet ports are not enabled.
Functional Description
Autonegotiation
The speed and duplex mode of an Ethernet interface is set either manually by the operator or negotiated with the peer interface. The autonegotiation procedure enables automatic selection of the operating mode on a LAN. It allows equipment connecting to an operating LAN to automatically adopt the LAN operating mode
Ethernet Ports
6-1
Chapter 6 Ports
(if it is capable of supporting that mode). In ETX-5300A all Ethernet ports operate in full duplex mode only. When autonegotiation is disabled, the user must manually define MAU (Medium Attachment Unit) type.
Flow Control
A flow control is a mechanism that allows an Ethernet receiving end that is unable to process all the traffic sent to it, to hold the transmitted traffic until it is able to process packets again. The mechanism uses a PAUSE frame, which is a packet that instructs the far-end device to stop transmission of packets until the receiver is able to handle traffic again. The PAUSE frame includes a timer value (set by the originating receiver), which tells the far-end device how long to suspend transmission. If that timer expires or is cleared by getting a PAUSE frame whose timer value is set to 0, the far-end device can then send packets again. Flow control is an optional port-level parameter. Flow control is supported on both directly- and indirectly-attached ports: Directly-attached ports support symmetrical flow control (both Rx and Tx) Indirectly-attached ports support Rx flow control only, without issuing Tx PAUSE frames (asymmetric flow control).
When autonegotiation is enabled, flow control mode is negotiated and a port advertises its user-selected flow control capabilities to the peer. The actual flow control mode, as well as duplex mode and transmission speed are set after the negotiation is completed. When autonegotiation is disabled, the flow control mode is manually selected by the user. All ETX-5300A Ethernet interfaces, except the OOB management port, support flow control.
Jumbo Frames
All Ethernet ports, except out-of-band management port, support jumbo frames (12 kbytes). The OOB management port accepts frames of up to 1518-byte size.
Ethertype
Ethertype configured per-port is used for identification of VLAN-tagged frames at ingress and Ethertype stacking at egress. This refers to outer VLAN only. The outer VLAN of an incoming packet must match the configured Ethertype of the port in order to be considered a VLAN-tagged frame (otherwise frame is considered untagged or dropped). See the Ethertype section in Appendix B for details.
L2CP Handling
ETX-5300A handles Layer-2 control protocol traffic on a per-port and/or per-flow basis. If no per-flow L2CP profile is configured, per-port-level profile is used. It affects both tagged and untagged L2CP frames.
6-2
Ethernet Ports
Chapter 6 Ports
L2CP traffic is processed using a two-stage mechanism comprising per-port or per-flow profiles (set of rules for traffic handling). In total, ETX-5300A supports up to 16 L2CP profiles: Up to 4 (including default) port-level and a single flow-level profile can be defined on directly-attached ports Up to 32 different addresses/protocols selected per L2CP profile.
If no default action is configured for unspecified address or protocol, this traffic is tunneled.
Note
If an L2CP profile has been attached to a port or a flow, the profile cannot be deleted or modified.
See the L2CP Handling section in Appendix B for details.
Classification Key
The ingress traffic is first classified into flows according to classification profiles. A per-port classifier key configuration defines which types of classification profiles are supported for this type of port. The classifier key also defines the CoS mapping and color mapping methods. See the Classification section in Appendix B for details.
Ethernet Ports
6-3
Chapter 6 Ports Task Defining Ethernet interface type, when autonegotiation is disabled Command mau-type { 10-t | 100-t | 1000-t | 10-1001000-t | 100-any | 1000-any | 10gany | 100-fx | 1000-sx | 1000-lx | 10gsr | 10g-lr | 10g-er } flow-control no flow-control Enabling transmitting of Sync-E clock availability and quality via SSM Assigning queue group profile to Ethernet port Defining classifier key for Ethernet port Setting the VLAN tagged frame Ethertype (tag protocol identifier) tx-ssm queue-group <queue-group-profile-name> no queue-group classification-key {vlan | inner-vlan | p-bit | ip-precedence | ip-dscp} tag-ethernet-type <0x0000-0xFFFF>
Installation and Operation Manual Comments mau-type is also used to define SFP/XFP type
no flow-control disables flow control function no tx-ssm disables SSM egress no queue-group removes queue group association
This value must be either 8100 or the same as Ethertype value configured at chassis level Defines discarding or tunneling policy for Layer-2 protocols. To enable LACP (LAG) on the port, the port must have an untagged flow with an L2CP profile defined at the flow level that specifies peer action for MAC 0x02. no l2cp removes association with L2CP profile.
Restarting autonegotiation process Administratively enabling port Enabling/disabling performance monitoring data collection Displaying port status Displaying port statistics Displaying SFP status Clearing port statistic counters Clearing SFP counters
restart-auto-negotiation no shutdown pm-enable no pm-enable show status show statistics show sfp-status clear-statistics clear-sfp-counters shutdown disables the port no pm-enable disables PM data collection
6-4
Ethernet Ports
Chapter 6 Ports
The port status is displayed, for example as follows: ETX-5300A>config>port>eth(main-a/1)# show status Name : GBE-5-1 Administrative Status : Up Operational Status Connector Type Actual Mau Type Provisioned Mau Type Auto Negotiation Flow Control MAC Address : Up : XFP In : 10G Based SR : 10g-any : Disabled : Disabled : 00-20-D2-AA-18-00
Displaying Statistics
Ethernet ports of ETX-5300A collect performance monitoring data. To display the Ethernet port statistics: At the prompt config>slot>port>eth(<slot/port>)#, enter show statistics running. Ethernet statistics are displayed. The counters are described in Table 6-1.
Ethernet Ports
6-5
Chapter 6 Ports
ETX-5300A>config>port>eth(1/1)# show statistics running Running --------------------------------------------------------------Counter Rx Tx Total Octets 0 0 Total Frames 0 0 Unicast Frames 0 0 Multicast Frames 0 0 Broadcast Frames 0 0 Jabber Frames L2CP Discarded OAM Discarded ACL Discarded FCS Error Frames MAC Error Frames MAC Overflow Frames Too Short Frames Discarded Frames 64 Octets 65-127 Octets 128-255 Octets 256-511 Octets 512-1023 Octets 1024-1518 Octets 1519-2047 Octets 2048-Max Octets Too Long Frames 0 0 0 0 0 0 0 0 -0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Total Octets
Total number of transmitted octets Total number of transmitted good unicast packets Total number of transmitted good multicast packets
Unicast Frames
Multicast Frames
6-6
Ethernet Ports
Installation and Operation Manual Description Rx Total number of received broadcast packets, excluding packets with bad CRC and short packets The number of received frames that exceeded the maximum allowed packet size and contained an CRC error, or were not well formed The number of frames dropped in Tx MAC Tx Total number of transmitted good broadcast packets
Chapter 6 Ports
Note
Jabber Frames
Total number of received bad packets, including packets with bad CRC and short packets The number of packets discarded by the L2CP processing mechanism The number of packets discarded by the OAM processing mechanism The number of packets discarded by the ACL processing mechanism The number of received packets with bad CRC The number of packets discarded in Rx MAC due to PHY error or incorrect packet termination, such as badly formed packets The number of packets discarded due to the FIFO overflow The number of received wellformed frames that were less than 64 octets long, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 64 octets in length, excluding framing bits and including FCS octets
L2CP Discarded OAM Discarded ACL Discarded FCS Error Frames MAC Error Frames
I/O card ports only I/O card ports only I/O card ports only I/O card ports only I/O card ports only
Not available for OOB management port Not available for OOB management port
64 Octets
Total number of transmitted packets (including bad packets) that were 64 octets in length, excluding framing bits and including FCS octets
Ethernet Ports
6-7
Chapter 6 Ports Description Rx Total number of received packets (including bad packets) that were 65127 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 128255 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 256511 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 5121023 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 10241518 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 15192047 octets in length, excluding framing bits and including FCS octets Total number of received packets (including bad packets) that were 2048 to maximum allowed size octets in length, excluding framing bits and including FCS octets Tx
Note Not available for OOB management port Not available for OOB management port Not available for OOB management port Not available for OOB management port Not available for OOB management port Not available for OOB management port
Total number of transmitted packets (including bad packets) that were 65127 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 128255 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 256511 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 5121023 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 10241518 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 15192047 octets in length, excluding framing bits and including FCS octets Total number of transmitted packets (including bad packets) that were 2048 to maximum allowed size octets in length, excluding framing bits and including FCS octets
128255 Octets
256511 Octets
5121023 Octets
10241518 Octets
1519-2047 Octets
2048-Max Octets
Total number of received packets that exceeded the maximum allowed packet size
Total number of transmitted packets that exceeded the maximum allowed packet size
6-8
Ethernet Ports
Chapter 6 Ports
Typical Maximum Range (Meter) : 15000 Wave Length (nm) Fiber Type : 850 : MM
SFP --------------------------------------------------------------Current Minimum Maximum RX Power (dBm) : -8.2 -8.2 -7.9 TX Power (dBm) : -2.4 -2.4 -2.1 Laser Bias (mA) : 1.3 1.2 1.3 Laser Temperature (Celsius) : 32.4 18.0 32.5 Power Supply (V) : 3.2 3.2 3.2
Table 6-2 explains the parameters of the SFP installed for selected link port. Table 6-2. Link SFP/XFP Parameters
Parameter Detailed Status Connector Type Transceiver Code Vendor Name ETX-5300A Ver. 1.0 Description SFP/XFP status SFP/XFP connector type SFP/XFP transceiver mode The original manufacturers name Ethernet Ports 6-9
Chapter 6 Ports Parameter Vendor Part Number Vendor Revision Description The original vendors part number The original vendors firmware revision
Vendor Serial Number The original vendors serial number Enhanced Monitoring Typical Maximum Range (Meter) Wave Length (nm) Fiber Type RX Power (dBm) TX Power (dBm) Laser Bias (mA) Laser Temperature (Celsius) Power Supply (V) Enhanced SFP/XFP monitoring support The maximum range expected to be achieved over typical optical fibers, in meters The nominal operating wavelength of the SFP/XFP, in nm The type of optical fiber for which the SFP/XFP is optimized: SM (single mode) or MM (multimode) Displays the current optical power, in dBm, received by the SFP/XFP Displays the current optical power, in dBm, transmitted by the SFP/XFP Displays the measured laser bias current, in mA Displays the measured laser temperature, in C Displays the SFP/XFP power supply voltage
Example
To configure Ethernet interface: Port port 2 on main card A Autonegotiation enabled Classification key VLAN L2CP profile l2cp_prof_1 Queue group profile queue_group_1 Performance monitoring is enabled Administratively enabled.
ETX-5300A# configure port eth main-a/2 ETX-5300A>config>port>eth(main-a/2)# auto-negotiation ETX-5300A>config>port>eth(main-a/2)# classification-key vlan ETX-5300A>config>port>eth(main-a/2)# l2cp l2cp_prof_1 ETX-5300A>config>port>eth(main-a/2)# queue-group queue_group_1 ETX-5300A>config>port>eth(main-a/2)# pm-enable ETX-5300A>config>port>eth(main-a/2)# no shutdown
6-10
Ethernet Ports
Chapter 6 Ports
Configuration Errors
Table 6-3 lists messages generated by ETX-5300A when a configuration error is
detected.
6.2
SDH/SONET Ports
Four SDH/SONET ports located on the E5-cTDM-4 cards serve for terminating STM-1/OC-3 links and their overheads.
Benefits
TDM ports provide access to SDN/SONET networks at STM-1 and OC-3 levels (155.520 Mbps), using fiber optic SFP ports.
SDH/SONET Ports
6-11
Chapter 6 Ports
Factory Defaults
ETX-5300A is supplied with all SDH/SONET ports enabled. Other parameter defaults are listed in the table below.
Parameter j0-pathtrace string j1-pathtrace string j2-pathtrace string overhead-mode loopback tx-ssm tx-clock-source ber-threshold eed ber-threshold sd Default Value 0x00 0x01 0x00 itu-ansi disabled disabled domain 1 e-3 e-6
Functional Description
The TDM interfacing subsystem provides interfaces to the TDM user equipment or network. The physical STM-1/OC-3 ports support many types of SFP transceivers with optical interfaces to meet a wide range of operational requirements.
6-12
SDH/SONET Ports
Chapter 6 Ports
To enable synchronous multiplexing, SDH equipment is designed to permit efficient and reliable synchronization of the entire network to a single timing reference.
In addition, the SDH signal structure includes sufficient overhead for management and maintenance purposes, and therefore gives the network operator full control over all the operational aspects of SDH networks and equipment units. This overhead permits the integration of the network management and maintenance functions within the transport network itself.
SDH/SONET Ports
6-13
Chapter 6 Ports
N x M Bytes
Order of Transmission
F B B B
B B
N x M Bytes
N Rows
1 2
Order of Transmission
B B
M Columns
Legend
B Signal Byte F Framing Byte
N Rows
Section Overhead
M Columns
6-14
SDH/SONET Ports
Chapter 6 Ports
Section Overhead
In SDH networks, the term section refers to the link between two consecutive SDH equipment units of the same type. Some signal carrying capacity is allocated in each SDH frame for the section overhead. This provides the facilities (alarm monitoring, bit error monitoring, data communications channels, etc.) required to support and maintain the transportation of a VC between nodes in an SDH network. The section overhead pertains only to an individual SDH transport system. This means that the section overhead is generated by the transmit side of a network node, and is terminated at the receive side of the next network node. Therefore, when several SDH transport systems are connected in tandem, the section overhead is not transferred together with the payload (VC) between the interconnected transport systems.
VC Assembly/Disassembly Process
The concept of inserting a tributary signal into a virtual container for end-to-end transport across a SDH network, is fundamental to the operation of SDH networks. This process of inserting the tributary signal into the proper locations of a VC is referred to as mapping. In all SDH signal structures, the carrying capacity provided for each individual tributary signal is always slightly greater than that required by the tributary rate. Thus, the mapping process must compensate for this difference. This is achieved by adding stuffing bytes, e.g., path overhead bytes, to the signal stream as part of the mapping process. This increases the bit rate of the composite signal to the rate provided for tributary transport in the SDH structure. At the point of exit from the SDH network, the tributary signal must be recovered from the virtual container, by removing the path overhead and stuffing bits. This process is referred to as demapping. After demapping, it is necessary to restore the original data rate of the recovered tributary data stream.
SDH/SONET Ports
6-15
Chapter 6 Ports
9 Rows
Section Overhead
9 Columns 1 Column
260 Columns
Note
At a transmission rate of 8000 frames per second, each byte supports a data rate of 64 kbps.
The STM-1 signal frame comprises 9 rows by 270 columns, resulting in a total signal capacity of 2430 bytes (19440 bits per frame). Considering the STM-1 frame repetition rate, 8000 frames per second, this yields a bit rate of 155.520 Mbps. The STM-1 frame comprises the following parts: Section Overhead. The STM-1 section overhead occupies the first nine columns of the STM-1 frame, for total of 81 bytes. Virtual Container. The remaining 261 columns of the STM-1 frame, which contain a total of 2349 bytes, are allocated to the virtual container. The virtual container itself comprises a container for the payload signal (260 columns), preceded by one column of path overhead. The virtual container carried in an STM-1 frame is referred to as a Virtual Container Level 4, or VC-4. VC-4, which is transported unchanged across the SDH network, provides a channel capacity of 150.34 Mbps. The VC-4 structure includes one column (9 bytes) for the VC-4 path overhead, leaving 260 columns of signal carrying capacity (149.76 Mbps). This carrying capacity is sufficient for transporting a 139.264 Mbps tributary signal (the fourth level in the PDH signal hierarchy). The VC-4 signal carrying capacity can also be subdivided, to permit the transport of multiple lower-level PDH signals.
6-16
SDH/SONET Ports
Chapter 6 Ports
Pointers
In Figure 6-3, the VC-4 appears to start immediately after the section overhead part of the STM-1 frame. Actually, to facilitate efficient multiplexing and cross-connection of signals in the SDH network, VC-4 structures are allowed to float within the payload part of STM-1 frames. This means that the VC-4 may begin anywhere within the STM-1 payload part. The result is that a given VC-4 typically begins in one STM-1 frame and ends in the next. Were the VC-4 not allowed to float, buffers would be required to store the VC-4 data up to the instant it can be inserted in the STM-1 frame. These buffers (called slip buffers), which are often used in PDH multiplex equipment, introduce long delays. Moreover, they also cause disruptions in case a slip occurs.
SDH/SONET Ports
6-17
Chapter 6 Ports
SDH cross-connect switch permits changing the routing of tributary signals carried in SDH frames Regenerator used to increase the physical range of the transmission path.
Tributary Signals
. . .
Tributary Signals
. . .
VC Assembly
Path
VC Disassembly
To provide the support and maintenance signals associated with transmission across each segment, each of these segments has with its own overhead data, hence three types of overhead data: Section overhead, carried in the first nine columns of the STM-1 frame: Multiplexer section (MS) overhead carried in overhead rows 5 to 9 Regenerator section (RS) overhead carried in overhead rows 1 to 3 AU pointers carried in overhead row 4.
Path overhead, carried in the first column of a VC-4. The path overhead carried in the VC-4 is called high-order path overhead; see the SDH Tributary Units section for a description of the low-order path overhead.
Figure 6-5 shows the detailed structure of the overhead data in STM-1 frames.
6-18
SDH/SONET Ports
Chapter 6 Ports
Path Overhead
ID C1
Section Overhead
Framing A1 Framing A1 Framing A1 Framing A2 Framing A2 Framing A2
BIP-8 B1
Orderwire E1
User F1
DCC D1
DCC D2
DCC D3
AU Pointers (Row 4)
DCC D7
DCC D8
DCC D9
Z3
DCC D10
DCC D11
DCC D12
Z4
Z1
Z1
Z1
Z2
Z2
Z2
Orderwire E2
Z5
Chapter 6 Ports
Data Communication Channel (D1, D2, D3 Bytes) The 192 kbps Data Communication Channel (DCC) provides the capability to transfer network management and maintenance information between regenerator section terminating equipment. Orderwire Channel (E1 Byte) The E1 byte is used to provide a local orderwire channel for voice communications between regenerators and remote terminal locations. User Communication Channel (F1 byte) The F1 byte is intended to provide the network operator with a channel that is terminated at each regenerator location, and can carry proprietary communications. The information transmitted on this channel can be passed unmodified through a regenerator, or overwritten by data generated by the regenerator.
6-20
SDH/SONET Ports
Chapter 6 Ports
Orderwire Channel (E2 Byte) The E2 byte is used to provide a local orderwire channel for voice communications between multiplexer section terminating equipment. Alarm Signals Alarm information is included as part of the MSOH. These functions are explained in the SDH Maintenance Signals and Response to Abnormal Conditions section below.
Path Status (G1 Byte) The G1 byte is used to send status and performance monitoring information from the receive side of the path terminating equipment to the path originating equipment. This allows the status and performance of a path to be monitored from either end, or at any point along the path. Multiframe Indication (H4 byte) The H4 byte is used as a payload multiframe indicator, to provide support for complex payload structures, such as payload structures carrying multiple tributary units (TUs see the SDH Tributary Units section). If, for example, the TU overhead is distributed over four TU frames, these four frames form a TU
SDH/SONET Ports
6-21
Chapter 6 Ports
multiframe structure. The H4 byte then indicates which frame of the TU multiframe is present in the current VC-4. User Communication Channel (F2 Byte) The F2 byte supports a user channel that enables proprietary network operator communications between path terminating equipment. Alarm Signals Alarm and performance information is included as part of the path overhead. These functions are explained in SDH Maintenance Signals and Response to Abnormal Conditions section below.
The TU frame is then multiplexed into a fixed location within the VC-4. Because of the byte interleaving method, a TU frame structure is distributed over four consecutive VC-4 frames. It is therefore more accurate to refer to the structure as a TU multiframe. The phase of the multiframe structure is indicated by the H4 byte contained in the VC-4 path overhead.
6-22
SDH/SONET Ports
Chapter 6 Ports
of 1.728 Mbps and will accommodate the mapping of a North American DS1 signal (1.544 Mbps). 84 TU-11s may be multiplexed into the STM-1 VC-4. TU-12: Each TU-12 frame consists of 36 bytes, structured as 4 columns of 9 bytes. At a frame rate of 8000 Hz, these bytes provide a transport capacity of 2.304 Mbps and will accommodate the mapping of a CEPT 2.048 Mbps signal. 63 TU-12s may be multiplexed into the STM-1 VC-4. TU-2: Each TU-2 frame consists of 108 bytes, structured as 12 columns of 9 bytes. At a frame rate of 8000 Hz, these bytes provide a transport capacity of 6.912 Mbps and will accommodate the mapping of a North American DS2 signal. 21 TU-2s may be multiplexed into the STM-1 VC-4. TU-3: Each TU-3 frame consists of 774 bytes, structured as 86 columns of 9 bytes. At a frame rate of 8000 Hz, these bytes provide a transport capacity of 49.54 Mbps and will accommodate the mapping of a CEPT 34.368 Mbps signal or a North American 44.768 DS3 signal. Three TU-3s may be multiplexed into the STM-1 VC-4.
Figure 6-6 illustrates the assembly (multiplexing) of TUs in the VC-4 structure, for the specific case of the TU-12. For other multiplexing options, see Figure 6-7.
2430 Bytes/Frame
Serial Signal Stream 155.52 Mbps
9 Rows
Section Overhead
TU-12 No. 1
TU-12 No. 63
9 Columns 1 Column
260 Columns
Figure 6-7 also shows the utilization of additional SDH signal structures:
TUG: tributary unit group, is the structure generated by combining several lower level tributaries into the next higher level tributary. For example, TUG-2
SDH/SONET Ports
6-23
Chapter 6 Ports
is generated by combining 3 TU-12 or 4 TU-11, and TUG-3 is generated by combining 7 TUG-2. AU: administrative unit, is a structure that includes a VC and a pointer to the beginning of the VC. For example, AU-3 contains one VC-3 and includes a pointer to the beginning of the VC. AUG: administrative unit group, is the structure generated by combining several lower level administrative units into the next higher level administrative unit. For example, AUG for the STM-1 level is generated by combining 3 AU-3 (several AUG can be combined for generating STM-N (N = 4, 16, etc.) structures).
Note
For simplicity, reference is made only to VCs (the actual structure needed to transport a VC can be found in the SDH or SONET multiplexing hierarchy).
1 1 AU-4 VC-4 1 3 AU-3 VC-3 C-4
AUG
TUG3 1 7 TUG2 Pointer Processing 3 Mapping TU-12 VC-12 C-12 2 TU-2 VC-2 C-2
VT3
Legend
TU-11
VC-11
C-11
6-24
SDH/SONET Ports
Chapter 6 Ports
LOS state exited when 2 consecutive valid framing patterns are received, provided that during this time no new LOS condition has been detected. Out of Frame (OOF) OOF state entered when 4 or 5 consecutive SDH frames are received with invalid (errored) framing patterns. Maximum OOF detection time is therefore 625 s. OOF state exited when 2 consecutive SDH frames are received with valid framing patterns. Loss of Frame (LOF) LOF state entered when OOF state exists for up to 3 ms. If OOFs are intermittent, the timer is not reset to zero until an in-frame state persists continuously for 0.25 ms. LOF state exited when an in-frame state exists continuously for 1 to 3 ms. Loss of Pointer (LOP) LOP state entered when N consecutive invalid pointers are received where N = 8, 9 or 10. LOP state exited when 3 equal valid pointers or 3 consecutive AIS indications are received.
Note
Multiplexer Section AIS
Sent by regenerator section terminating equipment (RSTE) to alert downstream MSTE of detected LOS or LOF state. Indicated by STM signal containing valid RSOH and a scrambled all 1s pattern in the rest of the frame. Detected by MSTE when bits 6 to 8 of the received K2 byte are set to 111 for 3 consecutive frames. Removal is detected by MSTE when 3 consecutive frames are received with a pattern other than 111 in bits 6 to 8 of K2.
Sent upstream by multiplexer section terminating equipment (MSTE) within 250 s of detecting LOS, LOF or MS-AIS on incoming signal. Optionally transmitted upon detection of excessive BER defect (equivalent BER, based on B2 bytes, exceeds 10 ). Indicated by setting bits 6 to 8 of transmitted K2 byte to 110.
-3
Detected by MSTE when bits 6 to 8 of received K2 byte are set to 110 for 3 consecutive frames. Removal is detected by MSTE when 3 consecutive frames are received with a pattern other than 110 in bits 6 to 8 of K2. Transmission of MS-AIS overrides MS-FERF
SDH/SONET Ports
6-25
Sent by MSTE to alert downstream high order path terminating equipment (HO PTE) of detected LOP state or received AU Path AIS. Indicated by transmitting all 1s pattern in the H1, H2, H3 pointer bytes plus all bytes of associated VC-3 and VC-4). Detected by HO PTE when all 1s pattern is received in bytes H1 and H2 for 3 consecutive frames. Removal is detected when 3 consecutive valid AU pointers are received
High Order Path Remote Alarm Indication (HO Path RAI, also known as HO Path FERF)
Generated by high order path terminating equipment (HO PTE) in response to received AU path AIS. Sent upstream to peer HO PTE. Indicated by setting bit 5 of POH G1 byte to 1. Detected by peer HO PTE when bit 5 of received G1 byte is set to 1 for 10 consecutive frames. Removal detected when peer HO PTE receives 10 consecutive frames with bit 5 of G1 byte set to 0 Sent downstream to alert low order path terminating equipment (LO PTE) of detected TU LOP state or received TU path AIS. Indicated by transmitting all 1s pattern in entire TU-1, TU-2 and TU-3 (i.e., pointer bytes V1-V3, V4 byte, plus all bytes of associated VC-1, VC-2 and VC-3 loaded by all 1s pattern). Detected by LO PTE when all 1s pattern received in bytes V1 and V2 for 3 consecutive multiframes. Removal is detected when 3 consecutive valid TU pointers are received.
TU Path AIS
Note
TU Path AIS is only available when generating and/or receiving floating mode tributary unit payload structures.
Low Order Path Remote Alarm Indication (LO Path RAI, also known as LO Path FERF)
Generated by low order path terminating equipment (LO FTE) in response to received TU Path AIS. Sent upstream to peer LO PTE. Indicated by setting bit 8 of LO POH V5 byte to 1. Detected by peer LO PTE when bit 8 of received V5 byte is set to 1 or 10 consecutive multiframes. Removal detected when peer LO PTE receives 10 consecutive multiframes with bit 8 of V5 byte set to 0.
Note
LO Path RAI is only available when generating and/or receiving floating mode tributary unit payload structures.
This section describes the response to the various conditions that can be detected by the maintenance functions built into the SDH frames, and the flow of alarm and indication signals.
Figure 6-8 provides a graphical representation of the flow of alarm and indication
signals through an SDH transmission path.
6-26
SDH/SONET Ports
Chapter 6 Ports
LO PTE
HO PTE
MS TE
RS TE
LOP LOS LOF LOS LOF AIS (X2)
MS TE
LOP
HO PTE
LOP
LO PTE
AIS (H1H2)
AIS (V1V2)
Tributary AIS
RAI (VS)
RAI (VS)
B1(BIP-8)
B1(BIP-8)
B2(BIP-24)
B3(BIP-8)
FEBE (G1)
FEBE (G1)
Legend
Collection Transmission Generation LO HO Low Order High Low Order PTE RS TE MS TE Path Terminating Equipment Regenerator Section Terminating Equipment Multiplexer Section Terminating Equipment
Figure 6-8. Flow of Alarm and Indication Signals through an SDH Transmission Path
SDH/SONET Ports
6-27
Chapter 6 Ports
A Remote Alarm Indication (RAI) for a low order path is sent upstream after a low order path AIS or LOP condition has been detected by equipment terminating a low order path.
Performance Monitoring
Performance monitoring at each level in the maintenance hierarchy is based on the use of the byte interleaved parity (BIP) checksums calculated on a frame by frame basis. These BIP checksums are sent downstream in the overhead associated with the regenerator section, multiplexer section and path maintenance spans. In response to the detection of errors using the BIP checksums, the equipment terminating the corresponding path sends upstream Far End Block Error (FEBE) signals.
SONET Environment
SONET (Synchronous Optical Network) is an alternative standard to SDH, widely used in North America and other parts of the world. SONET uses implementation principles and even frame structures that are very similar to those used by SDH. Therefore, the following description is based on the information already presented for SDH.
1 2
VT6
6.312 Mbps (DS2) 3.152 Mbps (DS1C) 1.544 Mbps (DS1) 2.048 Mbps (E1)
Legend
Pointer Processing
STS-1
STS-1 SPE
VT3
VT Group
4 3
VT1.5
Mapping
VT2
Containers are replaced by synchronous payload envelopes (SPE) for the various virtual tributaries (VTs) Virtual containers (VCs) are replaced by virtual tributaries (VTs); however the rates are similar to those used in the SDH hierarchy Tributary unit groups (TUGs) are replaced by virtual tributary groups
ETX-5300A Ver. 1.0
SDH/SONET Ports
Chapter 6 Ports
The VC-3 level is replaced by the Synchronous Transport Signal level 1 (STS-1), and has the same rate (51.840 Mbps). 3 STS-1 can be combined to obtain one Synchronous Transport Signal level 3 (STS-3) at the same rate as STM-1 (155.520 Mbps). The corresponding optical line signal is designated OC-3.
Remote Loopback
The recovered STM-1/OC-3 receive signal provided by the STM-1/OC-3 transceiver of the tested port is returned by the remote loopback toward the equipment connected to the local STM-1/OC-3 port. The loopback is activated at the line side of the STM-1/OC-3 framer serving the tested port.
Figure 6-10 shows the signal paths when a remote loopback is activated.
E5-cTDM-4 Card
RX Transceiver TX Framer
RX Transceiver TX Framer
Local Loopback
The local loopback connects the STM-1/OC-3 transmit signal generated by the STM-1/OC-3 framer of the tested port, to the receive input of the framer. This returns the STM-1/OC-3 signal toward the equipment at the remote end of the link.
Figure 6-11 shows the signal paths when a local loopback is activated.
SDH/SONET Ports
6-29
Chapter 6 Ports
RX Transceiver TX Framer
shutdown disables the port frame-type parameter is included for information only. Interface type is selected when a TDM module is defined in chassis slot. EED response is enabled for SOH, path and VT levels
6-30
SDH/SONET Ports
Installation and Operation Manual Task Controlling transmitted and expected path trace labels (carried in byte J0 of the SDH overhead) by the port Activating diagnostic loopback Command j0-pathtrace [ {tx-string <txtrace-string> ] [exp-string <exp-string>}] loopback { local | remote } [ duration <160>] no loopback Controlling TIM response (sending AIS downstream and RDI upstream) Defining STM-1 frame overhead type Selecting the timing reference source used by the port for the transmit-to-network direction tim-action [ { soh } ] [ { path } ] [ { vt } ] no tim-action overhead-mode { itu-ansi | ttc } tx-clock-source {loopback | domain <domain-number>} Comments
Chapter 6 Ports
When ETX-5300A receives a path trace string that is different from the expected one, it declares TIM defect
Loopback duration is within 160 minute range. no loopback deactivates the loopback. TIM response is enabled for EOH, path and VT levels
This value defines value for unused overhead bytes. It is valid for STM-1 T1 mode only. Tx clock source set for one SDH/SONET port is automatically copied to the rest three TDM ports of the card. Currently, it is recommended to use domain clock as a Tx clock source.
Defining OC-3 Assigning SOH profile Enabling/disabling performance monitoring data collection at port level Displaying port status Displaying port statistics Displaying SFP status Clearing statistic counters Clearing SFP statistic counters Controlling carrying SSM code in S1 byte for system clock quality level definition
oc3<oc3 number> soh <profile_name> pm-enable no pm-enable show status show statistics show sfp-status clear-statistics clear-sfp-counters tx-ssm no tx-ssm
This parameters is valid for OC-3 mode only and must be set to 1 SOH profile configuration is detailed in
If enabled, the TDM port carries SSM code in S1 byte for system clock QL. In the following cases, the S1 byte is set to DNU (SDH) or DUS (SONET) mode: SSM transmission is disabled Port Rx clock is set to loopback Port clock is used as a selected source for system timing.
Chapter 6 Ports
To configure AUG/OC-3: 1. At the config>port>sdh-sonet(slot/port)# prompt, enter aug 1 or oc3 1. The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)# prompt is displayed. 2. Enter all necessary commands according to the tasks listed below.
Task Controlling transmitted and expected path trace labels (carried in byte J1 of the SDH overhead) by the port Assigning path profile to AUG or OC-3 Selecting path width
Command J1-pathtrace [ {tx-string <txtrace-string> ] [exp-string <exp-string>}] path <profile_name> path-width { au4 | au3}
Comments When ETX-5300A receives path trace string that is different from the expected one, it declares TIM defect Path profile configuration is detailed in
Enabling/disabling performance monitoring data collection at AUG level Defining TUG-3 (Tributary Unit Group) Defining AU-3 (Administrative Unit) Defining STS-1 port
This parameter is valid for STM-1 E1 ports only. See Configuring TUG3/AU3/STS-1 below. This parameter is valid for STM-1 T1 ports only. See Configuring TUG3/AU3/STS-1 below. This parameter is valid for OC-3 ports only. See Configuring TUG3/AU3/STS-1 below.
au3 { 1 | 2 | 3}
sts1 { 1 | 2 | 3}
6-32
SDH/SONET Ports
Installation and Operation Manual Task Controlling transmitted and expected path trace labels (carried in byte J1 of the SDH overhead) by the port Assigning path profile to AU3 or STS-1 Enabling/disabling performance monitoring data collection at AU3 and STS-1 levels Assigning short description to port Defining VC-12 ports Command J1-pathtrace [ {tx-string <txtrace-string> ] [exp-string <exp-string>}] path <profile_name> pm-enable no pm-enable name <string> no name vc12 {<17> | <13>} Comments
Chapter 6 Ports
When ETX-5300A receives path trace string that is different from the expected one, it declares TIM defect Path profile configuration is detailed in
Use space to separate TUG2 and VC-12 values. This parameter is valid for STM-1 E1 ports only. See Configuring VC-12/VC11/VT-1.5 below. Use space to separate TUG2 and VC-11 values. This parameter is valid for STM-1 T1 ports only. See Configuring VC-12/VC11/VT-1.5 below. Use space to separate TUG2 and VT-1.5 values. This parameter is valid for OC-3 ports only. See Configuring VC-12/VC11/VT-1.5 below. shutdown disables the port
no shutdown
SDH/SONET Ports
6-33
Chapter 6 Ports Task Controlling transmitted and expected path trace labels (carried in byte J2 of the SDH overhead) by the port Assigning path profile to VC-12, VC-11 or VT-1.5 Enabling/disabling performance monitoring data collection at VC12, VC-11 or VT-1.5 levels Assigning short description to port Administratively enabling port Command J2-pathtrace [ {tx-string <txtrace-string> ] [exp-string <exp-string>}] path <profile_name> pm-enable no pm-enable name <string> no name no shutdown
Installation and Operation Manual Comments When ETX-5300A receives path trace string that is different from the expected one, it declares TIM defect. Path profile configuration is detailed in
Note
Task
Setting far-end CV, ES, SES and/or UAS counter value during a 15-min interval starting from which a trap is sent
fe-line-interval-threshold [cv <cv-value 016383>] [es <es-value 0900>] [ses <ses-value 0900>] [uas <uas-value 0900>]
6-34
SDH/SONET Ports
Installation and Operation Manual Task Setting near-end CV, ES, SES and/or UAS counter value during a 15-min interval starting from which a trap is sent Setting section CV, ES, SES and/or UAS counter value during a 15-min interval starting from which a trap is sent Defining a padding character (null or space) used when an SDH trace message string is shorter than 15 characters Controlling TIM defect monitoring Command line-interval-threshold [cv <cv-value 016383>] [es <es-value 0-900>] [ses <ses-value 0900>] [uas <uas-value 0900>] section-interval-threshold [cv <cv-value 016383>] [es <es-value 0900>] [ses <ses-value 0900>] [sefs <sefs-value 0900>] padding<value> Comments
Chapter 6 Ports
tim-monitoring no tim-monitoring
Note
Task
Setting far-end CV, ES, SES and/or UAS counter value during a 15-min interval starting from which a trap is sent
fe-line-interval-threshold [cv <cv-value 016383>] [es <es-value 0900>] [ses <ses-value 0900>] [uas <uas-value 0900>]
SDH/SONET Ports
6-35
Chapter 6 Ports Task Setting near-end CV, ES, SES and/or UAS counter value during a 15-min interval starting from which a trap is sent Defining a padding character (null or space) used when an SDH trace message string is shorter than 15 characters Defining the expected higher-order path signal label (byte C2) Controlling TIM defect monitoring Command interval-threshold [cv <cv-value 016383>] [es <es-value 0900>] [ses <ses-value 0900>] [uas <uas-value 0900>] padding<value>
payload-label<value>
tim-monitoring no tim-monitoring
Example
The script below shows the configuration of SDH/SONET port 1 on the E5-cTDM-4 card installed in slot 1. #***************************Defining_SDH_SONET_Card************************** configure slot 1 card-type sdh-sonet stm-1-ch-4 no shutdown exit all #*********************************End**************************************** #**************************Configuring_SOH_Profile*************************** configure port soh-profile SOH-PROFILE-1 ber-threshold eed e-3 sd e-5 tim-monitoring exit all #*********************************End**************************************** #**************************Configuring_HVC_Profile*************************** configure port path-profile PATH-PROFILE-1 payload-label hvc 0x02 tim-monitoring exit all #*********************************End**************************************** #**************************Configuring_LVC_Profile*************************** configure port path-profile VC-PROFILE-1 payload-label lvc asynchronous tim-monitoring exit all #*********************************End**************************************** #**************************Configuring_SDH_Port****************************** configure port sdh-sonet 1/1
6-36 SDH/SONET Ports ETX-5300A Ver. 1.0
Chapter 6 Ports
j0-pathtrace tx-string "ETX-5300A" exp-string "EGATE-2000" soh profile SOH-PROFILE-1 tim-action soh tim-action path tim-action vt eed-action soh eed-action path eed-action vt tx-clock-source domain 1 tx-ssm no shutdown #*********************************End**************************************** #**************************Configuring_HVC*********************************** aug 1 path-width au-4 j1-pathtrace tx-string "ETX-AUG-1" exp-string "EGATE-AUG-1" path profile PATH-PROFILE-1 pm-enable no shutdown #*********************************End**************************************** #**************************Configuring_LVC*********************************** tug3 1 vc12 1 1 j2-pathtrace tx-string "ETX-VC12-1-1" exp-string "EGATE-VC12-1-1" path profile VC-PROFILE-1 pm-enable no shutdown exit all #*********************************End****************************************
Displaying Status
You can display current status of TDM port on E5-cTDM-4 card at any level. For viewing the status of the SDH/SONET hierarchical entities, follow the instructions below. To display SDH/SONET port status: At the config>port>sdh-sonet(slot/port)#prompt, enter show status. The SDH/SONET port status is displayed.
SDH/SONET Ports
6-37
Chapter 6 Ports
ETX-5300A>config>port>sdh-sonet(1/1)# show status Name : SDH/SONET- 1-1 Administrative Status : Up Operational Status : Up MAC Address SFP Status Connector Type Loopback Trace Message (J0) Expected Received : : : : 00-07-45-00-0F-08 OK SFP In None
: 0x01 : 0x01
The TDM interface status screens provide information on the port name, administrative/operational status, trace message strings, signal labels, RDI code and connector type (SDH/SONET level only). To display AUG status: 1. Navigate to config>port>sdh-sonet(slot/port)>aug(1)#. 2. Type show status. The status is displayed, for example as follows: ETX-5300A>config>port>sdh-sonet(l/1)>aug(1)# show status Name Administrative Status Operational Status Trace Message (J0) Expected Received Signal Label Expected Received RDI Code To display AU3/STS-1 status: 1. Navigate to: STM-1 T1: config>port>sdh-sonet(slot/port)>aug(1)>au3(1)# OC-3: config>port>sdh-sonet(slot/port)>oc3(1)>sts1(1)# 2. Type show status. The status is displayed, for example as follows: : HVC-1/1/1 : Down : Down
: 0x01 : 0x01
6-38
SDH/SONET Ports
Chapter 6 Ports
ETX-5300A>config>port>sdh-sonet(4/1)>oc3(1)>sts1(1)# show status Name Administrative Status Operational Status Trace Message (J1) Expected Received Signal Label Expected Received RDI Code To display AU3/STS-1 status: 1. Navigate to: STM-1 E1 config>port>sdh-sonet(slot/port)>aug(1)>tug3(1)>vc12(tug2_num/vc12_num)# STM-1 T1: config>port>sdh-sonet(slot/port)>aug(1)>au3(1)>vc11(tug2_num/vc11_num)# OC-3: config>port>sdh-sonet(slot/port)>oc3(1)>sts1(1)>vt1-5(tug2_num/vt1.5_num)# 2. Type show status. The status is displayed, for example as follows: ETX-5300A>config>port>sdh-sonet(4/1)>oc3(1)>sts1(1)# show status Name Administrative Status Operational Status Trace Message (J2) Expected Received Signal Label Expected Received RDI Code : LVC-4/1/1 : Down : Down : HVC-4/1/1 : Down : Down
: 0x01 : 0x01
: 0x01 : 0x01
Displaying Statistics
SDH/SONET ports of ETX-5300A feature the collection of performance monitoring data at different hierarchical levels, per ANSI T1.403. The PM data is collected for 15-minute and 24-hour intervals.
SDH/SONET Ports
6-39
Chapter 6 Ports
To display the SDH/SONET statistics: 1. Verify that collection of performance data has been enabled for the TDM level that you intend to monitor. 2. At the prompt config>slot>port>sdh-sonet (<slot/port>)#, navigate to the required level and enter show statistics followed by parameters listed below. SDH/SONET statistics are displayed. The counters are described in Table 6-5, Table 6-6 and Table 6-7.
Command show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all}
Comments current Displays the current interval statistics interval (196) Displays statistics for a selected interval current-day Displays statistics for current day starting from 12:00 midnight previous-day Displays statistics for 24 hours before last 12:00 midnight all-intervals Displays statistics for all existing intervals (up to 96) all Displays all statistics in succession: current > all intervals > current day > previous day
ETX-5300A>config>port>sdh-sonet(l/1)# pm-enable ETX-5300A>config>port>sdh-sonet(l/1)# show statistics current Current Time Elapsed (Sec) : 0 Valid Intervals : 0 Invalid Intervals : 0 Section ES : 0 SEFS : 0 Line : 0 : 0 : 0 Far End ES UAS FC : 0 : 0 : 0 SES CV : 0 : 0
SES CV
: 0 : 0
ES UAS FC
SES CV
: 0 : 0
6-40
SDH/SONET Ports
Chapter 6 Ports
ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)# vt1-5 1 1 ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)>vt1.5(1/1)# pm-enable ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)>vt1.5(1/1)# show statistics current Current ----------------------------------------------------------------------------Time Elapsed (Sec) : 0 Valid Intervals : 0 Invalid Intervals : 0 ES UAS FC : 0 : 0 : 0 Far End : 0 : 0 : 0 SES CV : 0 : 0
ES UAS FC
SES CV
: 0 : 0
Figure 6-13. SDH/SONET Statistics, VT-1.5 Level Table 6-5. SDH/SONET Statistics, Section Counters
Parameter ES Description SONET: Number of seconds during which at least one Section BIP error was detected or an SEF or LOS defect was present SDH: Number of seconds during which at least one RS errored block was detected or an SEF or LOS defect was present SES SONET: Number of seconds during which K or more Section BIP errors were detected or an SEF or LOS defect was present SDH: Number of seconds during which 2400 or more RS errored blocks were detected or an SEF or LOS defect was present SEFS CV Number of the seconds during which an SEF defect was present SONET: Number of BIP errors detected at the Section layer (B1 byte) SDH: Number of errored blocks at the RS layer (B1 byte)
SDH/SONET Ports
6-41
Number of seconds for which the Line is unavailable. The line becomes unavailable at the onset of 10 contiguous SES-Ls. The 10 SES-Ls are included in unavailable time. Once unavailable, the line becomes available at the onset of 10 contiguous seconds with no SES-Ls. The 10 seconds with no SES-Ls are excluded from unavailable time. SONET: Number of BIP errors detected at the Line layer (B2 byte) SDH: Number of errored blocks at the MS layer (B2 byte)
CV
FC
Number of Line failure events. A failure event begins when a compound AIS-LINE failure is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.
CV
6-42
SDH/SONET Ports
Chapter 6 Ports
To activate a loopback: 1. Navigate to configure port sdh-sonet <slot>/<port> to select the SDH/SONET port to test. The config>port>sdh-sonet>(slot/port)# prompt is displayed. 2. At the config>port>sdh-sonet>(slot/port)# prompt, enter loopback , followed by loopback type (local or remote) and its duration 160 min.
Configuration Errors
Table 6-8 lists messages generated by ETX-5300A when a configuration error is
detected.
Chapter 6 Ports Message Invalid ES line interval threshold Invalid SES line interval threshold Invalid CvFe line interval threshold Invalid EsFe line interval threshold Invalid SesFe line interval threshold Invalid UasFe line interval threshold Invalid EED response value Invalid EED threshold value Invalid CV1 5min interval threshold value Invalid ES1 5min interval threshold value Invalid SES1 5min interval threshold value Invalid UAS1 5min interval threshold value Invalid FeCv1 5min interval threshold value Invalid FeEs1 5min interval threshold value Invalid FeSes1 5min interval threshold value Invalid FeUas1 5min interval threshold value Invalid payload label Medium type SONET does not match card type Medium type SDH does not match card type Path width sts1 is illegal for SDH E1 Path width sts3cSTM1 is illegal for SONET Default profile cannot be deleted Profile can't be created: max number of profiles has been reached Profile name must be unique Profile name cannot be changed Description
ES line threshold value is out of range (0900) SES line threshold value is out of range (0900) CV far-end line threshold value is out of range (016383) ES far-end line threshold value is out of range (0900) SES far-end line threshold value is out of range (0900) UAS far-end line threshold value is out of range (0900) Invalid EED response value has been selected Invalid EED threshold value has been selected CV 5-min interval threshold value is out of range (016383) ES 5-min interval threshold value is out of range (0900) SES 5-min interval threshold value is out of range (0900) UAS 5-min interval threshold value is out of range (0900) CV far-end 5-min interval threshold value is out of range (0 16383) ES far-end 5-min interval threshold value is out of range (0 900) SES far-end 5-min interval threshold value is out of range (0 900) UAS far-end 5-min interval threshold value is out of range (0 900) Invalid expected higher order path signal label (byte C2) has been selected Frame type is not compatible with selected card type Frame type is not compatible with selected card type Selected STS-1 path width value is incompatible with SDH E1 port type Selected STS-3 path width value is incompatible with SONET port type Default SOH or path profile cannot be deleted Maximum number or SOH or path profiles has been reached SOH or path profile name is already taken SOH or path profile name cannot be changed when it has ports assigned to it
6-44
SDH/SONET Ports
Installation and Operation Manual Message Profile does not exist Description
Chapter 6 Ports
6.3
E1 Ports
Internal E1 ports of the E5-cTDM-4 cards deliver pseudowire services, emulating PDH traffic over PSN. Each internal E1 is permanently mapped to a VC-12 channel, handling its payload in accordance with the defined ITU-T framing mode and signaling format.
Factory Defaults
ETX-5300A is supplied with all E1 ports disabled. Other parameter defaults are listed in the table below.
Parameter line-type path-interval-threshold cv path-interval-threshold es path-interval-threshold ses path-interval-threshold sefs path-interval-threshold css path-interval-threshold uas idle-code out-of-service tx-clock-source loopback trail-mode Default Value g732n 0 80 10 0 0 10 7F 00 domain 1 no loopback terminated
Functional Description
E1 Line Signal Characteristics
E1 signal characteristics are specified in ITU-T Rec. G.703. The nominal data rate of the E1 signal is 2.048 Mbps. The E1 line signal is encoded in the High-Density Bipolar 3 (HDB3) code.
ETX-5300A Ver. 1.0 E1 Ports 6-45
Chapter 6 Ports
HDB3 is based on the alternate mark inversion (AMI) code. In the AMI code, 1s are alternately transmitted as positive and negative pulses, whereas 0s are transmitted as a zero voltage level. To prevent the transmission of long strings of 0s, which do not carry timing information, the HDB3 coding rules restrict the length of a 0 string that can be transmitted through the line to a maximum of three pulse intervals. Longer strings of 0s are encoded at the transmit end to introduce non-zero pulses. To allow the receiving end to detect the artificially-introduced pulses and enable their removal, in order to restore the original data string, the encoding introduces intentional coding violations in the sequence transmitted to the line. The receiving end detects these violations; when they appear to be part of an encoded 0 string, they are removed. Coding violations may also be caused by transmission errors. Therefore, coding violations that cannot be interpreted as intentional coding violations can be counted, and thus provide information on the quality of the transmission link.
E1 Signal Structure
The E1 line operates at a nominal rate of 2.048 Mbps. The data transferred over the E1 line is organized in frames. Each E1 frame includes 256 bits. The E1 frame format, as defined in ITU-T Rec. G.704, is shown in Figure 6-14.
Time Slot 0 a. Even Frames (0,2,4-14) 1 0 0 1 1 0 1 1 FAS b. Odd Frames (1,3,5-15) I 1 A N N N N N Time Slot 16 a. Frame 0 0 0 0 0 X Y X X MAS Channel Data b. Frames 1-15 A B C D A B C D 1 2 3 4 5 6 7 8 Time Slots 1-15, 17-31
32 Time Slots/Frame
TS 0
TS 1
TS 2
TS 3
TS 4
TS 5
TS 6
TS 7
TS 8
TS 9
TS 10
TS 11
TS 12
TS 13
TS 14
TS 15
TS 16
TS 17
TS 18
TS 19
TS 20
TS 21
TS 22
TS 23
TS 24
TS 25
TS 26
TS 27
TS 28
TS 29
TS 30
TS 31
FR 0
FR 1
FR 2
FR 3
FR 4
FR 5
FR 6
FR 7
FR 8
FR 9
FR 10
FR 11
FR 12
FR 13
FR 14
FR 15
International Bit National Bits (Sa4 through Sa8) Alarm Indication Signal (Loss of Frame Alignment - Red Alarm) Frame Alignment Signal, occupies alternate (but not necessarily even) frames
ABCD X Y MAS
ABCD Signaling Bits Extra Bit Loss of Multiframe Alignment Multiframe Alignment Signal
Timeslot 0
Timeslot 0 of E1 frames is used for two main purposes: Delineation of frame boundaries. For this purpose, in every second frame, timeslot 0 carries a fixed pattern, called frame alignment signal (FAS). Frames carrying the FAS are defined as even frames, because they are assigned the numbers 0, 2, 4, etc. when larger structures (multiframes) are used.
ETX-5300A Ver. 1.0
6-46
E1 Ports
Chapter 6 Ports
The receiving equipment searches for the fixed FAS pattern in the data stream using a special algorithm, a process called frame synchronization. Once this process is successfully completed, the equipment can identify each bit in the received frames. Interchange of housekeeping information. In every frame without FAS (odd frames), timeslot 0 carries housekeeping information. This information is carried as follows: Bit 1 this bit is called the international (I) bit. Its main use is for error detection using the optional CRC-4 function (CRC-4 stands for Cyclic Redundancy Check, using a fourth-degree polynomial). This function is described below. Bit 2 is always set to 1, and used by the frame alignment algorithm. Bit 3 is used as a remote alarm indication (RAI), to notify the equipment at the other end that the local equipment lost frame alignment, or did not receive an input signal. The other bits, identified as Sa4 through Sa8, are designated national bits, and are actually available to the users, if there is an agreement regarding their use. The total data rate that can be carried by each national bit is 4 kbps.
Multiframes
To increase the information carrying capacity without wasting bandwidth, the frames are organized in larger patterns, called multiframes. ITU-T Rec. G.704 recommendations define the following types of multiframes: Basic G.704 framing G.704 framing with timeslot 16 multiframe.
The number of timeslots available for user data is 31, and therefore the maximum payload rate is 1984 kbps. To enable the transmission of network management information, a separate timeslot may have to be assigned within the frame. This procedure is called common channel signaling (CCS). The CCS information is often transmitted in timeslot 16.
Chapter 6 Ports
application in which timeslot 16 serves for the transmission of signaling is the transfer of voice channels by means of voice modules, which use channel-associated signaling. Since timeslot 16 must be reserved for the transmission of the MAS and system signaling, only 30 timeslots are available for the user payload, and the maximum payload rate is 1920 kbps. When using the G.704 multiframe format, timeslot 16 of each of the 16 frames in each multiframe carries the following information: The first four bits of timeslot 16 in multiframe 16 always carry the multiframe alignment sequence, 0000. Bit 6 in timeslot 16 in multiframe 0 is used to notify the equipment at the other end of the link that the local equipment lost multiframe alignment. The other bits of this timeslot do not have mandatory functions.
6-48
E1 Ports
Chapter 6 Ports
end in the next submultiframe). The results are reported by two bits multiplexed in bit 1 of timeslot 0 in frames 13, 15 of the CRC-4 multiframe, respectively. Errors are counted and used to prepare statistic data on transmission performance.
E1 Alarm Conditions
Excessive bit error rate. The bit error rate is measured on the frame -3 alignment signal. The alarm threshold is an error rate higher than 10 that persists for 4 to 5 seconds. The alarm condition is canceled when the error -4 rate decreases below 10 for 4 to 5 consecutive seconds. Loss of frame alignment (also called loss of synchronization). This condition is declared when too many errors are detected in the frame alignment signal (FAS); for example, when 3 or 4 FAS errors are detected in the last 5 frames. Loss of frame alignment is cleared after no FAS errors are detected in two consecutive frames. The loss of frame alignment is reported by means of the A bit (Figure 6-14). Loss of multiframe alignment (applicable only when the G.704 multiframe structure is used). This condition is declared when too many errors are detected in the multiframe alignment signal (MAS) (same conditions as for loss of frame alignment). The loss of multiframe alignment is reported by means of the Y bit (Figure 6-14). Alarm indication signal (AIS). The AIS signal is an unframed all-ones signal, and is used to maintain line signal synchronization in case of loss of input signal; for example, because an alarm condition occurred in the equipment that supplies the line signal. The equipment receiving an AIS signal loses frame synchronization.
E1 Port Diagnostics
Diagnostic tools at the E1 level include: Local and remote loopback for checking connections to E1 ports Bit Error Rate Test for measuring the quality of the E1 line.
Local Loopback
Figure 6-15 shows the signal paths during a local loopback on an internal E1 port.
Internal E1 TDM
Framer Mapper
PSN
E1 Ports
6-49
Chapter 6 Ports
side through the port packet processor, the remaining sections of the local transmit path, and the link through the packet-switched network. While the loopback is activated, the transmit signal arriving from the local end user equipment is ignored, but the local E1 port continues to send the received signal to the local end user equipment. To ensure that the remote equipment is capable of providing a good signal, the local loopback should be activated on the local E1 port only after checking that the remote end users equipment connected to the tested E1 port operates normally while its own local loopback is activated. While the local loopback is activated on the local port, the remote end user equipment must receive its own signal, and thus it must be frame-synchronized. This test fully checks the operation of the local E1 path serving the tested port; it also checks the signal paths that end at the corresponding E1 port, including the transmission through the packet network connecting the remote equipment to ETX-5300A.
Remote Loopback
Figure 6-16 shows the signal paths during a remote loopback on an internal E1
port. As shown in Figure 6-16, when a remote loopback is activated on an internal E1 port, the E1 framer of that port returns the transmit signal via the receive path of the same port. The transmit signal is received from the local end user equipment served by the tested port, through the corresponding E5-cTDM-4 card. While the loopback is activated, the signal received from the remote E1 port is ignored. The signal received from the local end user equipment remains connected to the packet processor and it is transmitted to the remote E1 port. To ensure that the user equipment is capable of providing a good signal, the remote loopback should be activated on E1 port only after checking that the local end user equipment operates normally while its own local loopback is activated.
Internal E1 TDM
Framer Mapper
PSN
6-50
E1 Ports
Chapter 6 Ports
BER Testing
A BERT typically consists of a test pattern generator and a receiver that is set to the same pattern. BER testers can be used together at two ends of transmission link to check data integrity in both directions. Alternatively, a single bit tester can be used at one end of the link with a loopback activated at the remote end to return the transmitted data. BER testing can be activated on the entire internal port or on the selected timeslots with or without the injection of errors randomly or at a constant rate. Multiple BERTs can be run simultaneously on separate E1 ports.
Note
An internal E1 port becomes active only if at least one enabled pseudowire with a valid cross-connection is assigned to the port.
Command name <string> Comments no name removes the name
Task Assigning short description to port Masking/unmasking alarms generated by the internal E1 Specifying E1 framing mode
no shutdown
When using one of the framed modes, you select specific timeslots for transport by configuring the appropriate bundle at the pwe# prompt. The specific timeslots are selected using the pw-tdm command at the cross-connect# prompt.
Enabling/disabling performance monitoring data collection Setting path CV, ES, SES, SEFS, CSS and UAS counter value during a 15-min interval starting from which a trap is sent
pm-enable no pm-enable path-interval-threshold [cv <cv-value 0 16383>] [es <es-value 0900>] [ses <sesvalue 0900>] [sefs <sefs-value 0900>] [css <css-value 0900>] [uas <uas-value 0900>]
E1 Ports
6-51
Chapter 6 Ports Task Activating BER testing, defining test pattern and error injection Command bert [pattern {2e-10 | 2e-15 | 2e-20 | 2e23 | 511 | 2047| qrss | 2e-11}] [inject-error {none | single | 10e-1 | 10e-2 | 10e-3 | 10e-4 | 10e-5 | 10e-6 | 10e-7}] no bert Specifying the code transmitted to fill unused timeslots in E1 frames idle-code { 00 to FF (hexa) }
This parameter is valid for framed modes only. Only one idle code value is allowed per the E5-cTDM-4 card.
out-of-service <00FF>
The hexadecimal number is in the range of 0 to FF (two digits). The selected out-of-service code is also sent, instead of the external data stream, during out-of-service periods when the unframed mode is used. Only one out-of-service code value is allowed per the E5-cTDM-4 card.
Controls the propagation of alarm indications Selects the reference source used by the transmit path of this port Activating diagnostic loopback
See Alarm Indications and Fault Propagation in the TDM Pseudowires of Chapter 8
Loopback duration is within 160 minute range. no loopback deactivates loopback. See Displaying Status See Displaying Statistics
Displaying Status
You can display current status of any internal E1 port on an E5-cTDM-4 card. To display E1 port status: At the config>port>e1(slot/port/tributary)#prompt, enter show status. The E1 port status is displayed. ETX-5300A>config>port>e1(1/1/1)# show status Name : E1-1-1-1 Administrative Status : Down Operational Status : Down Loopback : Off The E1 interface status screens provide information on the port name, administrative/operational status, and loopback status.
6-52
E1 Ports
Chapter 6 Ports
Displaying Statistics
Internal E1 ports of ETX-5300A collect performance monitoring data at the path level. To display the internal E1 port statistics: 1. Verify that statistics collection is enabled (pm-enable) for the E1 port. 2. At the prompt config>slot>port>e1 (<slot/port/tributary>)#, enter show statistics followed by parameters listed below. E1 statistics are displayed. The counters are described in Table 6-5.
Task Displaying statistics Command show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all} Comments current Displays the current interval statistics interval (196) Displays statistics for a selected interval current-day Displays statistics for current day starting from 12:00 midnight previous-day Displays statistics for 24 hours before last 12:00 midnight all-intervals Displays statistics for all existing intervals (up to 96) all Displays all statistics in succession: current > all intervals > current day > previous day
ETX-5300A>config>port>e1(4/1/1)# show statistics current Current --------------------------------------------------------------Time Elapsed (Sec) : 0 Valid Intervals : 0 Path --------------------------------------------------------------CV : 0 Rx Frames Slip : 0 ES : 0 UAS : 0 BES : 0 FC : 0 SES : 0 SEFS : 0
Note
For unframed E1 ports, only FC counter is available. Table 6-9. Internal E1 Statistics
Parameter CV
E1 Ports
6-53
Chapter 6 Ports Parameter Rx Frames Slip ES UAS Description Number of received Frames Slip events
Number of seconds during which at least one FE or CS was detected or a SEF defect or an AIS defect was present Number of seconds for which the E1 path is unavailable. The E1 path becomes unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in unavailable time. Once unavailable, the E1 path becomes available at the onset of 10 contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from unavailable time. Number of seconds during which at least 2 and no more than 804 CRC-4 errors were detected while neither OOF nor AIS defects were present. Number of E1 path failure events. A failure event begins when a LOF failure or an AIS failure is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins. Number of seconds during which 805 or more CRC-4 errors were detected or an OOF defect was present Number of seconds during which at least one OOF defect or an AIS defect was present
BES FC
SES SEFS
Running Loopbacks
ETX-5300A supports activation of local and remote loopbacks at the E1 level. You can initiate a local loopback on a single E1 port and remote loopbacks on any number of E1 ports on an E5-cTDM-4 card at a time. E1 Port Diagnostics section above details signal paths when local and remote loopbacks are activated. To activate a loopback: 1. Navigate to configure port e1 <slot/port/tributary> to select the E1 port to test. The config>port>e1>(slot/port/tributary)# prompt is displayed. 2. At the config>port>e1>(slot/port/tributary)# prompt, enter loopback, followed by loopback type (local or remote) and its duration 160 min. To deactivate a loopback: In the config>port>e1>(slot/port/tributary)# prompt, enter no loopback.
6-54
E1 Ports
Chapter 6 Ports
BER Testing
Bit Error Rate test is used for measuring the quality of the E1 line. To run BER testing: 1. Navigate to configure port e1 <slot/port/tributary> to select the E1 port to test. The config>port>e1>(slot/port/tributary)# prompt is displayed. 2. At the config>port>e1>(slot/port/tributary)# prompt, enter bert, followed by pattern pattern_type and inject-error none or error_type. To display BERT results: 1. Make sure that BERT is running. 2. At the config>port>e1>(slot/port/tributary)# prompt, enter show bert. The BERT results are displayed. ETX-5300A>config>port>e1(1/1/1)# show bert Status : Sync Bit Error Count : 0 Pattern : None Inject Error : 10e-3 Run Time (Sec) : 10 ES (Sec) : 0 Sync Loss (Sec) : 0 Result : OK To reset counters while BERT is running At the config>port>e1>(slot/port/tributary)# prompt, enter clear-bertcounters.
Example
To configure internal E1 interface: E1 name e1_1_1_1 Line type G.732N Idle code 0xFF Transmit clock source Loopback Performance monitoring is enabled Administratively enabled.
E1 Ports
6-55
Chapter 6 Ports
ETX-5300A# configure port e1 1/1/1 ETX-5300A>config>port>e1(1/1/1)# name e1_1_1_1 ETX-5300A>config>port>e1(1/1/1)# line-type g732n ETX-5300A>config>port>e1(1/1/1)# idle-code 0xFF ETX-5300A>config>port>e1(1/1/1)# tx-clock-source loopback ETX-5300A>config>port>e1(1/1/1)# pm-enable ETX-5300A>config>port>e1(1/1/1)# no shutdown
Configuration Errors
Table 6-10 lists messages generated by ETX-5300A when a configuration error is
detected.
6.4
T1 Ports
Internal T1 ports of the E5-cTDM-4 cards deliver pseudowire services, emulating PDH traffic over PSN. Each internal T1 is permanently mapped to a VT-1.5 channel, handling its payload in accordance with the defined ITU-T framing mode and signaling format.
6-56
T1 Ports
Chapter 6 Ports
Factory Defaults
ETX-5300A is supplied with all E1 ports disabled. Other parameter defaults are listed in the table below.
Parameter line-type path-interval-threshold cv path-interval-threshold es path-interval-threshold ses path-interval-threshold sefs path-interval-threshold css path-interval-threshold uas idle-code out-of-service tx-clock-source loopback trail-mode Default Value unframed 0 80 10 0 0 10 7F 00 loopback no loopback terminated
Functional Description
T1 Line Signal
The basic T1 line signal is coded using the alternate mark inversion (AMI) rules. The AMI format cannot transmit long strings of 0s because such strings do not carry timing information. Therefore, the AMI signal source must generate a signal with a guaranteed minimum of 1 density. The minimum average 1 density required by the applicable standards is 1:8. Therefore, when a T1 signal is transmitted over an AMI line, each frame timeslot must include at least one 1 bit. This effectively reduces user data rate to 56 kbps per timeslot, and precludes the provisioning of clear channel capability (CCC). This problem is circumvented by using modified line codes that perform zero suppression by substituting special codes for long 0 strings. The generally accepted zero suppression methods are B7 and B8ZS. With B7, the maximum length of 0 strings in the user data must not exceed seven zeros. (When a longer string is detected, the seventh bit is changed to one, to meet the minimum 1 density requirement and thus ensure that the remote end can properly recover the clock signal.). Although this requirement can be fulfilled in many applications, it does not provide 64 kbps clear channel capability. Therefore, when the B7 line code is used, inband management is not supported. Only the B8ZS zero suppression method provides clear channel capability, and the 1 density requirement no longer restricts user data characteristics. This means that each T1 frame timeslot can support the full 64 kbps.
T1 Ports 6-57
Chapter 6 Ports
Since the AMI coding does not affect the signal transmitted to the line, it is also called transparent coding. This emphasizes the fact that although the other methods are also transparent to users data, perfect transparency is achieved only when the zero-string substitution sequences are correctly recognized. Thus, the other methods are more sensitive to transmission errors (transmission errors may affect the decoding of zero-string substitution sequences).
T1 Signal Structure
The T1 line operates at a nominal rate of 1.544 Mbps. The data transferred over the T1 line is organized in frames. The T1 frame format is shown in Figure 6-17.
8 Bits/Channel Byte Organization (D4 Frame - See NOTE)
8 A B
Frame Organization
CH 13
CH 24
Multiframe Organization
FR FR 1 2
FR FR 11 12
The SF format provides limited supervision capabilities, such as end-to-end reporting of local loss-of-signal (yellow alarm), and line loopback. The ESF format provides improved supervision capabilities, and allows better utilization of the 8 kbps framing timeslots. The major advantage of the ESF format is that it supports on-line link performance monitoring (by means of a 2 kbps Cyclic Redundancy Check (CRC) channel) and also provides a 4 kbps end-to-end supervision and control data link. The data link can be used for performance monitoring and failure reporting, for activation of maintenance loopbacks, and for transmission of various commands to the far end equipment.
6-58 T1 Ports ETX-5300A Ver. 1.0
Chapter 6 Ports
The implementation of the multiframing format is based on the use of various F-bit patterns. The F-bit pattern is used to perform three functions: Framing Pattern Sequence (FPS) defines frame and multiframe boundaries. Facility Data Link (FDL) allows transfer of supervisory data, e.g. alarms, error performance, test loop commands, etc. to be passed through the T1 link. Cyclic Redundancy Check (CRC) allows the measurement of the bit error rate and enhances the reliability of the framing algorithm.
The F-bit pattern defines the structure of frames and multiframes. In the D4 (SF) frame format, the F-bit of consecutive frames is alternately interpreted as an Ft bit (terminal framing bit) or Fs bit (frame signaling bit). Ft pattern: alternating 0s and 1s, defines the frame boundaries. Fs pattern: fixed 001110 pattern, defines the multiframe boundaries, so that one frame may be distinguished from another. In particular, the Fs pattern is needed so that frames 6 and 12 may be identified for the recovery of signaling bits. In the ESF frame format, the multiframe structure is extended to 24 frames, but the frame and channel structure are the same as in the D4 (SF) format.
T1 Alarm Conditions
The basic alarm conditions are the red alarm and the yellow alarm. Note that with the ESF format, the FDL link can be used for more sophisticated status transmissions, in accordance with the ANSI Standard T1.403-1989 and AT&T Pub. 54016. Red Alarm. A red alarm is generated when the local unit has lost frame synchronization for more than 2.5 consecutive seconds, or the bit error rate -2 exceeds 10 for 2.5 consecutive seconds. Loss of frame synchronization may be caused either by Fs or Ft errors, by the reception of an AIS signal, or by the loss of the input signal (receive data remains zero for 31 consecutive bits). In accordance with AT&T TR-62411, a system automatically recovers synchronization when there has been a period of 10 to 20 consecutive seconds free of the loss of sync condition. Yellow Alarm. A yellow alarm is sent from the remote unit to inform the local unit that a red alarm exists at the remote end. Alarm Indication Signal (AIS). The AIS signal is an unframed all-ones signal, and is used to maintain line signal synchronization when an alarm condition occurs in the equipment that supplies the line signal.
T1 Port Diagnostics
Diagnostic tools at the T1 level include: Local and remote loopback for checking connections toT1 ports Code-activated local and remote loopbacks. These loopbacks are activated and deactivated by the detection of user-specified patterns in the TDM data, a function enabled and configured as part of the physical parameters of the port. Bit Error Rate Test for measuring the quality of the T1 line.
T1 Ports
6-59
Chapter 6 Ports
Note
You can run only one regular or inband-activated local loopback per the E5-cTDM-4 card.
Local Loopback
Figure 6-15 shows the signal paths during a local loopback on an internal T1 port.
Internal T1 TDM
Framer Mapper
PSN
Remote Loopback
Figure 6-16 shows the signal paths during a remote loopback on an internal E1
port. As shown in Figure 6-16, when a remote loopback is activated on an internal E1 port, the T1 framer of that port returns the transmit signal via the receive path of the same port. The transmit signal is received from the local end user equipment served by the tested port, through the corresponding E5-cTDM-4 card. While the loopback is activated, the signal received from the remote T1 port is ignored. The signal received from the local end user equipment remains connected to the packet processor and it is transmitted to the remote T1 port. To ensure that the user equipment is capable of providing a good signal, the remote loopback should be activated on T1 port only after checking that the local end user equipment operates normally while its own local loopback is activated.
6-60
T1 Ports
Chapter 6 Ports
PSN
BER Testing
A BERT typically consists of a test pattern generator and a receiver that is set to the same pattern. BER testers can be used together at two ends of transmission link to check data integrity in both directions. Alternatively, a single bit tester can be used at one end of the link with a loopback activated at the remote end to return the transmitted data. BER testing can be activated on the entire internal port or on the selected timeslots with or without the injection of errors randomly or at a constant rate. Multiple BERTs can be run simultaneously on separate T1 ports.
Inband Loopbacks
ETX-5300A supports code-activated local and remote loopbacks. These loopback functions are activated and deactivated by the detection of user-specified patterns in the TDM data. When a T1 port is configured to activate a local loopback in response to the configured pattern sent using PW OAM messaging, it monitors the incoming TDM data stream: To activate the loopback, the user equipment sends the configured activation pattern several times in sequence. When the configured activation pattern is detected, the port activates its local loopback. The user equipment detects the activation of the loopback because it starts receiving the loopback activation pattern. After detecting the loopback, the equipment can stop transmitting the activation pattern, and send any other desired test signals. To deactivate the loopback and return the port to normal operation, the user equipment sends the configured deactivation pattern several times in sequence, until it detects the deactivation of the local loopback.
ETX-5300A supports the following inband loopback activation methods: CSU, according to ANSI T1.403 and AT&T TR 54016. This method is relevant for framed modes only.
T1 Ports
6-61
Chapter 6 Ports
NIU (FAC1 and FAC2), according to Telecordia GR-312. This method is relevant for framed and unframed modes. Custom, user-defined 38 bit long loopback activation and deactivation patterns. This method is relevant for framed and unframed modes.
Note
An internal T1 port becomes active only if at least one enabled pseudowire with a valid cross-connection is assigned to the port.
Command name <string> Comments no name removes the name
Task Assigning short description to port Masking/unmasking alarms generated by the internal T1 Specifying T1 framing mode
no shutdown
When using one of the framed modes, you select specific timeslots for transport by configuring the appropriate bundle at the pwe# prompt. The specific timeslots are selected using the pw-tdm command at the cross-connect# prompt.
Enabling/disabling performance monitoring data collection Setting path CV, ES, SES, SEFS, CSS and UAS counter value during a 15-min interval starting from which a trap is sent Controlling inband loopback activation
pm-enable no pm-enable path-interval-threshold [cv <cv-value 0 16383>] [es <es-value 0900>] [ses <sesvalue 0900>] [sefs <sefs-value 0900>] [css <css-value 0900>] [uas <uas-value 0900>] inband-loopback {local | remote} csu inband-loopback {local | remote} niu {fac1 | fac2} inband-loopback {local | remote} program <loop-up-code> <loop-up-len> <loop-down-code> <loop-down-len> no inband-loopback
no inband-loopback disables inband loopback. One loopback activation and one loopback deactivation code are allowed per the E5-cTDM-4 card. To activate an inband loopback in a far-end unit, you must enable pseudowire OAM functionality.
6-62
T1 Ports
Installation and Operation Manual Task Activating BER testing, defining test pattern and error injection Command bert [pattern {2e-10 | 2e-15 | 2e-20 | 2e23 | 511 | 2047| qrss | 2e-11}] [inject-error {none | single | 10e-1 | 10e-2 | 10e-3 | 10e-4 | 10e-5 | 10e-6 | 10e-7}] no bert Specifying the code transmitted to fill unused timeslots in T1 frames idle-code { 00 to FF (hexa) } Comments
Chapter 6 Ports
This parameter is valid for framed modes only. Only one idle code value is allowed per the E5-cTDM-4 card.
out-of-service <00FF>
The hexadecimal number is in the range of 0 to FF (two digits) The selected out-of-service code is also sent during out-of-service periods instead of the external data stream when the unframed mode is used. Only one out-of-service code value is allowed per the E5-cTDM-4 card.
Controls the propagation of alarm indications Selects the reference source used by the transmit path of this port Activating diagnostic loopback
See Alarm Indications and Fault Propagation in the TDM Pseudowires of Chapter 8
Loopback duration is within 160 minute range no loopback deactivates it. See Displaying Status See Displaying Statistics
Displaying Status
You can display current status of any internal T1 port on an E5-cTDM-4 card. To display E1 port status: At the config>port>t1(slot/port/tributary)#prompt, enter show status. The T1 port status is displayed. ETX-5300A>config>port>t1(1/1/1)# show status Name : T1-1-1-1 Administrative Status : Down Operational Status : Down Loopback : Off The E1 interface status screens provide information on the port name, administrative/operational status, and loopback status.
T1 Ports
6-63
Chapter 6 Ports
Displaying Statistics
Internal T1 ports of ETX-5300A collect performance monitoring data at path level. To display the internal T1 port statistics: 1. Verify that statistics collection is enabled (pm-enable) for the T1 port. 2. At the prompt config>slot>port>t1 (<slot/port/tributary>)#, enter show statistics followed by parameters listed below. T1 statistics are displayed. The counters are described in Table 6-11.
Task Displaying statistics Command show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all} Comments current Displays the current interval statistics interval (196) Displays statistics for a selected interval current-day Displays statistics for current day starting from 12:00 midnight previous-day Displays statistics for 24 hours before last 12:00 midnight all-intervals Displays statistics for all existing intervals (up to 96) all Displays all statistics in succession: current > all intervals > current day > previous day
ETX-5300A>config>port>t1(4/1/1)# show statistics current Current --------------------------------------------------------------Time Elapsed (Sec) : 0 Valid Intervals : 0 Path --------------------------------------------------------------CV : 0 Rx Frames Slip : 0 ES : 0 UAS : 0 BES : 0 FC : 0 SES : 0 SEFS : 0
Note
For unframed T1 ports, only FC counter is available. Table 6-11. Internal T1 Statistics
Description Number of CRC-4 errors Number of received Frames Slip events ETX-5300A Ver. 1.0
Chapter 6 Ports
Number of seconds during which at least one FE or CS was detected or a SEF defect or an AIS defect was present Number of seconds for which the T1 path is unavailable. The T1 path becomes unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in unavailable time. Once unavailable, the T1 path becomes available at the onset of 10 contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from unavailable time. Number of seconds during which at least 2 and no more than 804 CRC-4 errors were detected while neither OOF nor AIS defects were present. Number of T1 path failure events. A failure event begins when a LOF failure or an AIS failure is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins. Number of seconds during which 805 or more CRC-4 errors were detected or an OOF defect was present Number of seconds during which at least one OOF defect or an AIS defect was present
BES FC
SES SEFS
Example
To configure internal T1 interface: T1 name t1_1_1_1 Line type ESF Idle code 0xFF Transmit clock source Loopback Performance monitoring is enabled Administratively enabled.
ETX-5300A# configure port t1 1/1/1 ETX-5300A>config>port>t1(1/1/1)# name t1_1_1_1 ETX-5300A>config>port>t1(1/1/1)# line-type esf ETX-5300A>config>port>t1(1/1/1)# idle-code 0xFF ETX-5300A>config>port>t1(1/1/1)# tx-clock-source loopback ETX-5300A>config>port>t1(1/1/1)# pm-enable ETX-5300A>config>port>t1(1/1/1)# no shutdown
Configuration Errors
Table 6-12 lists messages generated by ETX-5300A when a configuration error is
detected.
T1 Ports
6-65
Chapter 6 Ports
6.5
SAG (Service Aggregation Group) is a logical port (management entity) that represents a physical connection between I/O and main Ethernet cards.
Benefits
SAGs represent blocks of I/O card ports with ability to aggregate their flows into Service Attachment Points (SAPs), supporting pre-forwarding scheduling and shaping.
Factory Defaults
By default, two SAGs exist per I/O Ethernet card.
Functional Description
GbE and 10GbE cards introduce logical ports that serve as management entities (SAG) and flow aggregation points (SAP). Figure 6-20 illustrates Ethernet I/O card schematics. The SAPs aggregate several I/O ingress flows to a single forwarding path (E-Line or E-LAN) towards the main card and help avoid re-classification to different forwarding paths from the same SAG.
6-66
Chapter 6 Ports
Flow SAP
SAG
Flow
SAP
Flow
SAP
SAG
Flow
SAP
Configuring SAGs
To configure a SAG: 1. Navigate to config>port. 2. Enter sag <slot/port>. The config>port>sag(slot/port)# prompt is displayed. 3. Enter all necessary commands according to the tasks listed below.
Task Associating SAG with queue group Assigning a name to SAG Command queue-group < queue-group-name> name <string> Comments no queue-group removes SAG association with the queue group no name removes SAG name
Example
To configure a SAG: Slot 1
6-67
Chapter 6 Ports
Configuration Errors
Table 6-13 lists messages generated by ETX-5300A when a configuration error is
detected.
6.6
Service Virtual Interface (SVI) is a logical port that is used for binding flows to bridge ports, router interfaces or Layer-2 TDM pseudowires.
Factory Defaults
By default, ETX-5300A does not have SVIs.
Functional Description
SVIs are used as ingress and egress ports for flows, serving as intermediaries for bridges and routers, which must comply with standards of their own (VLAN domains for bridge ports or IP address for router interfaces). They do not have physical port attributes. They also serve as aggregation points for TDM PWs (see Figure 6-22). ETX-5300A supports up to 4000 SVIs.
6-68
Chapter 6 Ports
SVI SVI User BP Bridge User SVI BP BP SVI NET BP BP SVI OOB
BP Bridge
BP
MEF-8 Pseudowire
SVI
Flow
BP SVI
BP SVI
MEF-8 Pseudowire
SVI
Flow
Configuring SVIs
To configure an SVI: 1. Navigate to config>port. 2. Enter svi <svi_number>, followed by the SVI type (bridge | pw | router), depending on whether you intend to attach a flow to bridge, pseudowire or router. The config>port>svi(number)# prompt is displayed.
MEF-8 Pseudowires
SVI
BP
SVI
6-69
Chapter 6 Ports
Note
Example
To configure SVI: Number 1 Type bridge Name svi_1_bridge.
Configuration Errors
Table 6-14 lists messages generated by ETX-5300A when a configuration error is
detected.
6-70
Chapter 7 Resiliency
The modular, distributed architecture of ETX-5300A enables redundancy at different levels of the network and provides a resilient system with no single point of failure. Power system (redundant power supplies, see Chapter 2) Management and timing system (redundant main cards) Port and service: LAG G.8032 ring (ERP) APS for STM-1/OC-3 ports.
This chapter describes port and service protection mechanisms (LAG, ERP and APS), as well as main card redundancy. Timing system redundancy is detailed in Chapter 9.
7.1
Redundancy for the ETX-5300A control subsystem is supported only when the ETX-5300A chassis includes two operational main cards. If only one is installed, it is automatically selected and redundancy cannot be activated. ETX-5300A provides 1:1 main card protection, when one of the cards is defined as primary, and the other one as secondary. The primary card manages the chassis with its I/Os and peripherals, performs data plane forwarding, and controls the timing subsystem. The secondary main card stores a copy of the configuration database, serving as a hot standby.
Benefits
Main card redundancy with automatic switchover ensures continuous service provisioning. It provides a hot-standby capability for the ETX-5300A management and timing subsystems.
Functional Description
Only one main card per chassis is necessary; however, the chassis has two slots dedicated to this type of module. The second slot can be used by a redundant main card, thereby providing a hot-standby capability for the ETX-5300A system control functions.
7-1
Chapter 7 Resiliency
When a second main card is installed, the two modules operate as a master/slave pair; one module is the active (online) module, and the other is off-line and serves as a hot standby. Only the online main card communicates with the management station/terminal and actively manages the ETX-5300A system. The off-line main card is automatically updated by the online card with all the configuration and status data. The off-line card can take over at any time without disrupting system operation. The switch-over to the off-line card occurs automatically when one of the following occurs: Extraction of the primary main card Power failure of the primary main card Diagnostics indication primary main card failure User-initiated or automatic reset of the primary main card A manual switch command Administratively disabling of the primary main card.
Chapter 7 Resiliency
Configuration Errors
Table 7-1 lists messages generated by ETX-5300A when a configuration error is
detected.
7.2
Ethernet link aggregation technique allows one or more links to be combined to form a Link Aggregation Group (LAG). LAG can be used for Ethernet card/port protection and for bandwidth expansion. ETX-5300A supports LAG for up to two members, consisting of Ethernet ports located on the same or different cards.
Benefits
Ethernet link aggregation ensures increased service availability. If a link within a LAG fails or is replaced, the traffic is not disrupted and communication is maintained.
Factory Defaults
By default, no LAG groups exist.
Functional Description
The two Ethernet ports can be operated as a single logical interface, using link aggregation in accordance with IEEE 802.3-2005. The two ports must be connected to the same switch/router. LAG uses 1:1 distribution mechanism. ETX-5300A supports up to 44 LAGs per chassis. Using link aggregation inherently provides redundancy; if one of the GbE ports fails, the other can continue transferring traffic. Link failure is detected by sensing the loss of valid signals, or receiving a failure report via Link Aggregation Control Protocol (LACP) if applicable, in which case all traffic is sent through the other link.
7-3
Chapter 7 Resiliency
ETX-5300A supports LAG for up to two members, consisting of Ethernet ports located on the same or different cards.
Intra-Card LAG
With intra-card LAG, the two aggregation group members reside on the same E5-MC-4, E5-10GBE-2 or E5-GBE-20 card. For E5-GBE-20 card, when the LAG ports belong to the same 10-port group (ports 110 or ports 1120), LACP can be enabled or disabled by the user. In this mode, both ports receive traffic at the same time, but only one of them transmits data.
Rx Tx Tx Rx LAG
Inter-Card LAG
With inter-card LAG, the two aggregation group members reside on different E5-MC-4, E5-GBE-20 or E5-10GBE-2 card. However, the ports must belong to: The same card type (LAG between ports residing on I/O and main cards is not allowed) The same 10-port group on E5-GBE-20 cards: Permitted port 2/1 (port 1 on E5-GBE-20 card in slot 2) and port 3/3 (port 3 on E5-GBE-20 card in slot 3) Not permitted Port 2/1 and port 3/12.
The same port on E5-10GBE-2 cards: Permitted port 1/1 (port 1 on E5-10GBE-2 card in slot 1) and port 3/1 (port 1 on E5-10GBE-2 card in slot 3) Not permitted Port 2/1 and port 3/2.
In this LAG scheme, data flow redundancy can be provided at a card and port levels.
7-4
Chapter 7 Resiliency
Rx Tx
LAG
Configuring LAG
This section explains how to define a link aggregation group (LAG) and enable link aggregation control protocol (LACP). ETX-5300A supports up to 44 LAGs. LAG is defined with two Ethernet ports bound to the group. LAG serves as a logical port with all relevant port attributes (queue block profile, classification key, L2CP profile, etc). Service flows to and from the LAG, use the LAG as their ingress/egress port.
LACP Traffic
To ensure correct distribution of LACP traffic, you must configure flow with an L2CP profile with peer action for the LACP address (01-80-c2-00-00-02). The flow must have the following attributes: Untagged classification Ingress port LAG Egress port according to application requirements.
If you use the flow only to peer the LACP frames and do not need to forward the untagged traffic, discard it, using the drop command on the flow.
Figure 7-3 illustrates flows in inter-card LAG between two main cards. LACP flow
can be optionally dropped.
7-5
Chapter 7 Resiliency
LAG/SAP Connection
When configuring LAG between ports on the E5-GBE-20 or E5-10GBE-2 cards, follow these guidelines for establishing flows between the LAG and the SAP: Intra-card LAG: Connect LAG to a SAP, belonging to the first 10-port group (SAP slot/1/x)
LACP Flow
LAG Port 1/3 SAP 1/1/X
Port 1/2
Any Port
Data Flow
SAP 1/1/X
Any Port
Data Flow
7-6
Chapter 7 Resiliency
Inter-card LAG for E5-GBE-20 cards: LAG between ports belonging to the first ten-port group (110): Connect LAG to a SAP, belonging to the first 10-port group (SAP slot/1/x)
LACP Flow
LAG Port 2/3 SAP 1/1/X
Port 1/2
Any Port
Data Flow
SAP 1/1/X
Any Port
Data Flow
Figure 7-5. LAG-SAP Connection in Inter-Card LAG over Ports 110 in E5-GBE-20 Cards
LAG between ports belonging to the second ten-port group (1120): Connect LAG to a SAP, belonging to the second 10-port group (SAP slot/2/x)
LACP Flow
LAG Port 2/12 SAP 1/2/X
Port 1/11
Any Port
Data Flow
SAP 1/2/X
Any Port
Data Flow
Figure 7-6. LAG-SAP Connection in Inter-Card LAG over Ports 1120 in E5-GBE-20 Cards
Inter-card LAG for E5-10GBE-2 cards: LAG between ports 1 and 1: Connect LAG to a SAP, belonging to the first 10-port group (SAP slot/1/x)
LACP Flow
LAG Port 2/1 SAP 1/1/X
Port 1/1
Any Port
Data Flow
SAP 1/1/X
Any Port
Data Flow
Figure 7-7. LAG-SAP Connection in Inter-Card LAG over Ports 1 and 1 in E5-10GBE-2 Cards
7-7
Chapter 7 Resiliency
LAG between ports 2 and 2: Connect LAG to a SAP, belonging to the second 10-port group (SAP slot/2/x)
LACP Flow
LAG Port 2/2 SAP 1/2/X
Port 1/2
Any Port
Data Flow
SAP 1/2/X
Any Port
Data Flow
Figure 7-8. LAG-SAP Connection in Inter-Card LAG over Ports 2 and 2 in E5-10GBE-2 Cards Note
The same rules apply to flows carrying LACP traffic from LAG to SAP. Always leave the mirror SAPs located on the second I/O card unused (i.e. have
no flows attached to them). These SAPs serve as internal peers for SAPs which are used by the LACP and data flows.
Point-to-Point Flows
ETX-5300A does not support point-to-point flows between ports that belong to the same 10-port group. In the same manner, point-to-point flows from a LAG to a port which is in the same 10-port group as one of the LAG members is not allowed. For example: Permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/15.
Flow 1 (LACP)
LAG Port 3/2 SAP 1/1/1
Port 1/2
Any Port
Flow 3 (Data)
SAP 1/1/2
Port 1/15
Flow 5 (Data)
7-8
Chapter 7 Resiliency
Not permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/3.
Flow 1 (LACP)
LAG Port 3/2 SAP 1/1/1
Port 1/2
Any Port
Flow 3 (Data)
SAP 1/1/2
Port 1/3
Flow 5 (Data)
7-9
Chapter 7 Resiliency Task Enabling LACP and setting LACP parameters: operation mode (active or passive) and time to wait before sending LACP frames (long or short) Command lacp [tx-activity {active | passive}] [tx-speed {slow | fast}] [sys-priority <sys-priority>]
Installation and Operation Manual Comments tx-activity: active LAG interface periodically transmits LACP frames (LACPDUs) to all links with LACP enabled passive LAG interface does not initiate the LACP exchange, but replies to received LACPDUs. tx-speed: slow Three seconds fast_ 90 seconds. no lacp disables LACP protocol. The sys-priority parameter
See the Traffic Management section in Appendix B for description of queue groups and their elements. no queue-group removes queue group association
shutdown disables the LAG See the Ethertype section in Appendix B for description of Ethertype values available for directly- and indirectly-attached ports. no tag-ethernet-type removes Ethertype association
Assigning a name Displaying bind status Displaying LAG status Displaying the LAG members statistics Displaying LAG members status
name <string> show bind show status show lacp-statistics ethernet <slot/port> show lacp-status ethernet <slot/port>
7-10
Chapter 7 Resiliency
Admin up up
Oper up up
The LAG status screen provides information on the current state of the aggregation group and individual group members.
Chapter 7 Resiliency
Timeout
Synchronized
Collecting Distributing
7-12
Installation and Operation Manual Counter Rx Illegal Frames Tx LACP Frames Tx Marker Response Frames Description Number of invalid packets received Number of valid LACP PDUs transmitted Number of valid Marker Response PDUs received
Chapter 7 Resiliency
Example
Examples below illustrate how to configure different types of link aggregation groups.
4. Configure L2CP profile with peer action for the LACP address (01-80-c2-0000-02). 5. Configure three flows: Flow 1 from LAG 1 to any ETX-5300A port for LACP data with untagged classification. In this example, port 3 on main card A is used for virtual termination of LACP traffic. Discard the flow data. Flow 2 from port 3 on main card A to LAG 1 with VLAN 100 classification Flow 3 from LAG 1 to port 3 on main card A with VLAN 100 classification.
7-13
Chapter 7 Resiliency
Chapter 7 Resiliency
mac 01-80-c2-00-00-02 peer exit all #*********************************End**************************************** #***************************Configuring_Flows******************************** config flows flow 1 classifier classutg ingress-port lag 1 egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block 0/1 l2cp profile l2cp1 drop pm-enable no shutdown exit all config flows flow 2 classifier class100 egress-port lag 1 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-port ethernet main-a/3 pm-enable no shutdown exit all config flows flow 3 classifier class100 egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-port lag 1 pm-enable no shutdown exit all #*********************************End****************************************
Note
The I/O card ports combined in LAG must belong to the same 10-port group. See Inter-Card LAG above.
To peer LACP frames, configure a dedicated flow with untagged classifier from the LAG. This flow must have an L2CP profile attached to it. The L2CP profile must have a peer action for the LACP address. As the only purpose of this flow is to peer LACP traffic, you can discard its traffic by using a drop action on the flow. Follow the LAG/SAP Connection guidelines described above when directing flows from the LAG to the relevant SAPs. Keep in mind that the mirror SAP 3/1/1 and SAP 3/1/2 located on I/O card in slot 3 must be left unused (i.e. have no flows attached to them). These SAPs serve as internal peers for SAP 1/1/1 and SAP 1/1/2, which are used by the LACP and data flows. Data-carrying flows use the LAG as their ingress or egress ports.
7-15
Chapter 7 Resiliency
To configure inter-card LAG between two I/O cards: 1. Enable the relevant I/O and main card ports. 2. Configure LAG 1 for port 2 on I/O card 1 and port 2 on I/O card 3. 3. Attach queue group profiles to all relevant ports and SAGs. 4. Configure three classifier profiles: Untagged for incoming LACP peer flow Match All for outgoing LACP peer flow VLAN 100 for user data flows
5. Configure L2CP profile with peer action for the LACP address (01-80-c2-0000-02). 6. Configure six flows: Flow 1 from LAG 1 to SAP 1/1/1 with untagged classification for incoming LACP data Discard the flow data. Flow 2 from SAP 1/1/1 to port 3 on main card A with Match All classification for outgoing LACP data. Flow 3 from LAG 1 to SAP 1/1/2 with VLAN 100 classification Flow 4 from SAP 1/1/2 to port 13 on I/O card 1 with Match All classification Flow 5 from port 13 on I/O card 1 to LAG 1 with VLAN 100 classification.
SAP 1/1/1
Port A/3
SAP 1/1/2
Port 1/13
Flow 5 (Data)
SAP 3/1/1
Leave Unused
SAP 3/1/2
Chapter 7 Resiliency
config port ethernet 1/13 no shutdown exit all config port ethernet main-a/3 no shutdown exit all config port ethernet 1/2 no shutdown exit all config port ethernet 3/2 no shutdown exit all #*********************************End**************************************** #*****************************Configuring_LAG******************************** config port lag 1 admin-key giga-ethernet bind ethernet 1/2 bind ethernet 3/2 queue-group profile q_group_2_level_default lacp tx-activity active tx-speed slow no shutdown exit all #*********************************End**************************************** #***************************Assigning_Queue_Group_Profiles******************* config port ethernet 1/2 queue-group profile q_group_2_level_default config port sag 1/1 queue-group profile q_group_SAG_2_level_default config port ethernet 3/2 queue-group profile q_group_2_level_default config port sag 3/1 queue-group profile q_group_SAG_2_level_default config port ethernet main-a/3 queue-group profile q_group_2_level_default config port ethernet 1/13 queue-group profile q_group_2_level_default config port sag 1/2 queue-group profile q_group_SAG_2_level_default #*********************************End**************************************** #***************************Configuring_Classifier_Profiles****************** config flows classifier-profile classutg match-any match untagged exit all config flows classifier-profile classAll match-any match all exit all config flows classifier-profile class100 match-any match vlan 100 exit all #*********************************End**************************************** #***************************Configuring_L2CP_Profile*************************
7-17
Chapter 7 Resiliency
config port l2cp l2cp1 mac 01-80-c2-00-00-02 peer exit all #*********************************End**************************************** #***************************Configuring_Flows******************************** config flows flow 1 classifier classutg ingress-port lag 1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 l2cp profile l2cp1 drop no shutdown exit all config flows flow 2 classifier classAll ingress-port sap 1/1/1 egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all config flows flow 3 classifier class100 ingress-port lag 1 egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all config flows flow 4 classifier classAll ingress-port sap 1/1/2 egress-port ethernet 1/13 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all config flows flow 5 classifier class100 ingress-port ethernet 1/13 gress-port lag 1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************End****************************************
Configuration Errors
Table 7-4 lists messages generated by ETX-5300A when a configuration error is
detected.
7-18
Chapter 7 Resiliency
7.3
A G.8032 Layer-2 Ethernet ring is used by ETX-5300A for traffic protection. This technology builds a logical ring, defined as a set of IEEE 802.1-compliant bridges, and protects against link and node failures. ETX-5300A supports 16 rings (major and sub-rings) per shelf.
7-19
Chapter 7 Resiliency
Standards
ITU-T G.8032v2, Y.1731.
Benefits
G.8032 revertive rings provide sub-50 ms protection for Ethernet traffic and prevent loops at the Ethernet layer.
Factory Defaults
No Ethernet protection rings are configured in the system by default.
Functional Description
Ethernet Ring Protection technology provides a scalable solution for low-cost traffic protection and rapid service restoration, with SDH/SONET-type resilience. It is built on traditional Ethernet MAC (IEEE 802.3) and bridging (IEEE 802.1) functions. It is independent of any physical-layer technologies and can be utilized in any carrier network. In ERP every ring node uses heartbeat messaging to determine availability of its neighbor. When a link failure occurs, it is detected via LOS or heartbeat messaging. Upon failure, node forwarding information is recalculated to ensure that data traffic reaches its destination, using an alternative path. Ring ports can reside on Ethernet ports belonging to the same main or I/O card, providing port redundancy. In addition, they can reside on ports belonging to different cards, providing port and card redundancy. In total, ETX-5300A supports up to 16 major rings and sub-rings.
Note
Ring Topology
ETX-5300A supports different ring topologies, including single and interconnected (ladder) ring topologies.
7-20
Chapter 7 Resiliency
Major Ring
Sub-Ring
R-APS Messaging
Ethernet ring protection is achieved by means of a dedicated protocol, Automated Protection Switching (APS). Every ring link is bound by two adjacent nodes. At any time, traffic flows on all, but one of the ring links. This link is called the ring protection link (RPL). Under normal conditions this link is blocked. RPL is controlled by a single node called an RPL owner, which prevents traffic from using the RPL. When a failure is detected, the RPL owner unblocks the RPL port, allowing the RPL to be used for traffic. R-APS messages require a designated transmission channel (R-APS channel), which is separated from the service traffic channel. An R-APS channel is configured using a separate dedicated VLAN to enable handling of the R-APS messages differently from the service traffic. An R-APS channel and service traffic blocking is performed via VID filtering by the bridge.
Mechanism of Operation
Every failure along the ring triggers an R-APS Signal Fail (SF) message in both directions from the nodes adjacent to the failed link. Before sending the R-APS, these nodes block the ports facing the failed link. On receiving these messages, the RPL owner unblocks the RPL port. An SF message is triggered even if only one node adjacent to the failed link recognizes the failure. Moreover, to overcome scenarios in which link failures are not recognized via LOS (Loss of signal), ERPS can also use the standard Ethernet OAM 802.1ag Continuity Check Messages (CCMs) to expose the failure to the two adjacent nodes. During a recovery phase, when a failed link is restored and a node continually detects a Clear SF, it sends an R-APS No Request (NR) message and keeps the failed port blocked. When receiving the R-APS (NR), the RPL owner starts its Wait-To-Restore (WTR) timer. When that timer expires, it blocks the RPL port and sends RAPS (NR, RB) (R-APS no request, root blocked) messages in both directions of the ring. Nodes receiving the R-APS (NR, RB) message flush their learning table, unblock their blocked ports, and return to idle state.
Figure 7-15 illustrates a stable-state Ethernet ring with blocked RPL to prevent a
loop. Each node is monitored, using Ethernet CCM OAM messages, and the ring protection is triggered by loss of continuity or server layer failure, as defined in Y.1731.
7-21
Chapter 7 Resiliency
CCM CCM
CCM
CCM
Timers
The following timers are used to facilitate ERP operation: Wait-to-Restore (WTR) Period of time used by RPL owner to verify that the ring has stabilized before blocking the RPL after signal recovery. Guard Period of time during which all received A-RPS messages are ignored by the ERP mechanism. This prevents the ring nodes from receiving outdated A-RPS messages circulating the network. Hold-off Period of time during which the underlying Ethernet layer attempts to filter out intermittent link faults before reporting them to the ERP mechanism.
Administrative Commands
If there is a need to intervene into ERP operation for maintenance or any other reason, the operator can issue a forced or manual switch command. Forced switch command forcefully blocks a particular ring port. It can be issued even if an SF condition exists on the ring, with multiple force switch commands supported per ring instance. Manual switch command manually blocks a particular ring port with only one manual switch command per ring instance. It can be overridden by SF condition or a force switch command. Clear switch command clears all existing force and manual switch command on the ERP.
Note
The manual and forced switch commands are temporary commands and do not permanently change the location of the RPL.
Multiple Rings
Multiple rings with a common link are usually referred to as ladder network (see Figure 7-16). In such networks a common VLAN is shared on more than one physical ring. For example, a user connected to node E is communicating with a user connected to node A over the same VLAN. Ring topology includes a physical link between nodes G and C. It belongs to the major ring and is used by the sub-ring as its R-APS channel.
7-22
Chapter 7 Resiliency
Virtual Channel
Major Ring
Sub-Ring
Major Ring
Sub-Ring
In a stable state the rings in Figure 7-16 have two RPL owners that prevent the traffic from looping in the network (nodes E, A). When a non-shared link fails in the network, the RPL owner that controls the ERPS instance containing that link unblocks the RPL port while the distant RPL port, which is not a part of this instance, remains blocked. For example, if link G-F fails, only node E unblocks its RPL port, while node A does not change the state of its RPL port.
7-23
Chapter 7 Resiliency
If a shared link fails (link G-C), the RPL owner of the main ring (node A) unblocks its port; however, the RPL port of the sub-ring (node E) remains blocked since that link is declared as virtual channel for this ring.
Configuring ERP
To configure ERP: 1. In the configure>protection# prompt, enter erp followed by ring number (1 16) and ring type (major or sub). An ERP instance with is created and the config>protection>erp(1)# prompt is displayed. 2. Configure the ERP as illustrated and explained below.
Note
Task
Making the ring compatible with previous ERP implementations Assigning node to a bridge instance Assigning VLAN ID to user data
Defining bridge port as an East port of ERP node Defining bridge port as a West port of ERP node Defining ERP node as an interconnection node, sharing more than one ring
Sub-rings have East ports only Sub-rings do not have West ports
7-24
Installation and Operation Manual Task Defining node port type in relation to RPL owner Command port-type owner {east | west} port-type neighbor {east | west} port-type next-neighbor {east | west} port-type ring-node Comments
Chapter 7 Resiliency
owner RPL owner neighbor port directly connected to RPL owner next-neighbor port connected to RPL owner via neighbor ring-node regular ring port, which is not connected to RPL owner
Configuring dedicated VLAN for R-APS messages Configuring the revertive mode
R-APS settings must be the same for all ring members This mode is relevant to the RPL owner node. In the revertive mode, after condition, causing the switch, is cleared, traffic is blocked at the RPL owner and restored to the working state. After the node has entered the pending state in non-revertive mode, use the Clear command to exit the state. no revertive enables non-revertive mode.
Enabling propagation of Signal Failure (SF) condition from the Ethernet OAM service layer
sf-trigger {east | west} mep <md-id> <ma-id> <mep-id> no sf-trigger {east | west}
Before enabling SF propagation, verify that relevant CFM parameters have been configured. MEPs used for SF propagation cannot reside on R-APS VLAN; they must be bound to data VLANs only.
no shutdown
To avoid traffic loops, always enable Ethernet ports only after enabling Ethernet rings. shutdown disables the ERP.
This option available for major rings only. The sub-ring number must be lower than the number of the major ring it is assigned to.
7-25
Chapter 7 Resiliency Task Defining guard and hold-off periods in msec Command timers [guard <102000>] [holdoff <010000]
Installation and Operation Manual Comments Guard timer is used by the ERP mechanism to prevent ring nodes from receive outdated RAPS messages. While the guard timer is active, all received R-APS messages are ignored by the node. The guard timer is configured in 10-ms steps. Its recommended value for all ring nodes is 2 sec. Hold-off timer is used by Ethernet layer to filter out intermittent faults. Faults are reported to the ERP mechanism only after the hold-off timer expires. The guard timer is configured in 100-ms steps.
The manual switch command can be applied to a single ring node only. When the command is active, all ring nodes shift to the manual switch mode. The forced switch can be applied to any number of nodes in the ring.
Clearing the existing switch commands Displaying ERP status Displaying ERP statistics Clearing ERP statistics
The following marking actions can be performed in the sub-ring level, at the config>protection>erp(erp_number)>sub-ring(sub-ring_number)# prompt.
Task Enabling virtual channel over shared link Command virtual-channel no virtual-channel Comments Currently, the virtual channel is permanently enabled
Chapter 7 Resiliency
ETX-5300A>config>protection>erp(1)$ show status Bridge Number : 0 RPL Link : Not Owner Ring State : Init East Port : 0 West Port : 0
ERP status provides information on: Bridge number Bridge ports assigned to be East and West ring ports RPL link role:
Not owner All other nodes on the ring (that is, those that are not the RPL owner node) operate as normal nodes and have no special role on the ring RPL owner This node owns the RPL and blocks or unblocks the RPL as conditions require. This node initiates the R-APS message.
Ring state:
Init The node is not yet participating in the ring Idle The node is performing normally (there is no link failure on the ring). In this state, traffic is unblocked on both ring ports, except for the RPL owner node, which blocks the RPL port (the other RPL owner port is unblocked). Protected A failure occurred on the ring. A not-owner node have traffic blocked on the ring port that connects to the failed link. The RPL owner, if it is not at one end of the failed link, unblocks the RPL port so both ports are active.
7-27
Chapter 7 Resiliency
The ERP statistic counters are displayed. ETX-5300A>config>protection>erp(1)$ show statistics East Port ---------------------------------------------R-APS Message Rx Frames Tx Frames SF 0 0 NR 0 0 NR,RB 0 0 Total Valid 0 0 Total Errors 0 0 West Port ---------------------------------------------R-APS Message Rx Frames Tx Frames SF 0 0 NR 0 0 NR,RB 0 0 Total Valid 0 0 Total Errors 0 0
Example
Figure 7-18 and script below illustrate configuration a G.8032v2 ring over main
card ports.
7-28
Chapter 7 Resiliency
Flow 1 Flow 2
Port 1
SAP Fl. 35 VLAN 1500 SVI 1 East BP 1 Bridge BP 2 BP 4 BP 3 Fl. 36 SVI 3 VLAN 1500
Flow 16
Main Ethernet Card A
Flow 15
Flow 30 Flow 31
Fl. 3 Fl. 17
Port 1
Fl. 10 SAP Fl. 9 VLAN 500 VLAN 900 VLAN 500 Fl. 11
Port 1
Fl. 32
Fl. 33
6. Configure the ring: BP 1 East port BP 2 West port R-APS VLAN 777 Data VLANs 500, 1500
7. Configure flows for R-APS messages (red flows in Figure 7-18): Classifier profile for VLAN 777 Configure flows 1, 2, 3, 4 between main card ports and BPs Configure the color-aware marking profile.
7-29
Chapter 7 Resiliency
Classifier profiles for VLANs 500, 900 and 1500 Configure data flows, as illustrated in Figure 7-18
Note
VLAN 900 is swapped to VLAN 500 on flow 9. VLAN 500 is swapped to VLAN 900 on flow 11.
9. Enable the main and I/O card ports.
#*********************Assigning_Queue_Group_Profiles************************* config port ethernet main-a/1 queue-group profile q_group_2_level_default config port ethernet main-b/1 queue-group profile q_group_2_level_default config port ethernet 1/1 queue-group profile q_group_2_level_default config port sag 1/1 queue-group profile q_group_SAG_2_level_default config port ethernet 2/1 queue-group profile q_group_2_level_default config port sag 2/1 queue-group profile q_group_SAG_2_level_default exit all #*********************************End**************************************** #*********************Selecting_Classification_Keys************************** config port ethernet main-a/1 classification-key vlan p-bit config port ethernet main-b/1 classification-key vlan p-bit config port ethernet 1/1 classification-key vlan p-bit config port ethernet 2/1 classification-key vlan p-bit exit all #*********************************End**************************************** #***************************Configuring_SVIs********************************* config port svi 1 bridge exit all config port svi 2 bridge exit all config port svi 3 bridge exit all config port svi 4 bridge exit all #*********************************End**************************************** #*************************Binding_Bridge_Ports_to_SVIs*********************** config bridge 1 port 1 bind svi 1 no shutdown exit all config bridge 1 port 2 bind svi 2 no shutdown exit all config bridge 1 port 3 bind svi 3 no shutdown exit all
7-30 Ethernet Ring Protection (ERP) ETX-5300A Ver. 1.0
Chapter 7 Resiliency
config bridge 1 port 4 bind svi 4 no shutdown exit all #*********************************End**************************************** #******************** Configuring_VLAN_Membership**************************** config bridge 1 vlan 500 tagged-egress 4 config bridge 1 vlan 500 maximum-mac-addresses 64 config bridge 1 aging-time 300 exit all config bridge 1 vlan 1500 tagged-egress 3 config bridge 1 vlan 1500 maximum-mac-addresses 64 config bridge 1 aging-time 300 exit all #*********************************End**************************************** #************************ Configuring_the_Ring******************************* config protection erp 1 major bridge 1 east 1 west 2 r-aps vlan 777 vlan-priority 1 mel 1 port-type east node-port port-type west rpl wait 120 data-vlan 500 data-vlan 1500 no shutdown exit all #*********************************End**************************************** #************************ Configuring_R-APS_Flows**************************** config flows classifier-profile class_R_APS match-any match vlan 777 exit all config flows flow 1 classifier class_R_APS ingress-port ethernet main-a/1 egress-port svi 1 no shutdown exit all config flows flow 2 classifier class_R_APS ingress-port svi 1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all
7-31
Chapter 7 Resiliency
config flows flow 3 classifier class_R_APS ingress-port ethernet main-b/1 egress-port svi 2 no shutdown exit all config flows flow 4 classifier class_R_APS ingress-port svi 2 egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************End**************************************** #************************ Configuring_Marking_Profile************************ config qos marking-profile mark1 classification cos color-aware green-yellow dei-copy mark 0 green to 0 dei green exit all #*********************************End**************************************** #************************ Configuring_Data_Flows**************************** config flows classifier-profile class_900 match-any match vlan 900 exit all config flows classifier-profile class_500 match-any match vlan 500 exit all config flows classifier-profile class1500 match-any match vlan 1500 exit all config flows flow 9 classifier class_900 ingress-port ethernet 2/1 egress-port sap 2/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all config flows flow 10 classifier classall ingress-port sap 2/1/1 egress-port svi 4 mark all vlan 500 exit pm-enable no shutdown exit all
7-32
Chapter 7 Resiliency
config flows flow 11 classifier class_500 ingress-port svi 4 egress-port ethernet 2/1 queue-map-profile QueueMapDefaultProfile block 0/1 mark all vlan 900 exit pm-enable no shutdown exit all config flows flow 15 classifier class_500 ingress-port ethernet main-a/1 egress-port svi 1 pm-enable no shutdown exit all config flows flow 16 classifier class_500 ingress-port svi 1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all config flows flow 17 classifier class_500 ingress-port ethernet main-b/1 egress-port svi 2 pm-enable no shutdown exit all config flows flow 18 classifier class_500 ingress-port svi 2 egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all
config flows flow 30 classifier class1500 ingress-port ethernet main-a/1 egress-port svi 1 pm-enable no shutdown exit all config flows flow 31
7-33
Chapter 7 Resiliency
classifier class1500 ingress-port svi 1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all config flows flow 32 classifier class1500 ingress-port ethernet main-b/1 egress-port svi 2 pm-enable no shutdown exit all config flows flow 33 classifier class1500 ingress-port svi 2 egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all config flows flow 34 classifier class1500 ingress-port ethernet 1/1 egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all config flows flow 35 classifier class1500 ingress-port sap 1/1/2 egress-port svi 3 pm-enable no shutdown exit all config flows flow 36 classifier class1500 ingress-port svi 3 egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1 pm-enable no shutdown exit all #*********************************End****************************************
7-34
Chapter 7 Resiliency
#****************************Enabling_Ports********************************** config port ethernet main-a/1 no shutdown config port ethernet main-b/1 no shutdown config port ethernet 1/1 no shutdown config port ethernet 2/1 no shutdown exit all #*********************************End****************************************
Configuration Errors
Table 7-6 lists messages generated by ETX-5300A when a configuration error is
detected.
7-35
Chapter 7 Resiliency Message East and West ports must be different Cannot assign ERP node to bridge instance after configuring East/West ports Cannot modify East/West port before assigning ERP node to bridge instance Cannot add data VLAN before assigning ERP node to bridge instance Cannot disable major ring with active subrings Major ring of the specified sub-ring is not active Major ring of the specified sub-ring does not exist Illegal node port type in relation to another ring member Cannot set node port type to ring-node Description
Different bridge ports must be defined as East and West A ring node must be assigned to a bridge instance before configuring East/West ports East/West ports can be modified after assigning a ring node to a bridge instance Data VLAN must be defined after assigning a ring node to a bridge instance A major ring cannot be disabled if it has a sub-ring attached to it The major ring of the specified sub-ring has not been enabled A sub-ring cannot be configured if a major ring does not exist Not a valid value for the current node configuration. For example, if an East port is defined as RPL owner, the West port can be configured only as a ring node. The owner, neighbor or next-neighbor port type of the node cannot be changed back to the ring-node (default value). First, delete the ring, then set the port type of the node. Invalid ring type is selected Ring type (major or minor) cannot be modified Invalid type for the node is selected Force switch and manual switch commands are not supported in the backward-compatible mode Cannot run a force or manual switch command if an active command instance exist on the ring R-APS VLAN ID can be set only for an active virtual channel R-APS VLAN priority can be set only for an active virtual channel A virtual channel attached to a sub-ring cannot be modified This parameter cannot be modified, you must delete and re-create the ring The maximum number of sub-rings (5) per major ring has been reached The selected sub-ring does not exist One of the major ring nodes must be configured as an interconnection node to accommodate a sub-ring
Invalid ring type Cannot modify ring type Invalid node type Cannot run FS or MS command in backwardcompatibility mode FS or MS command is already active Cannot configure R-APS VLAN ID for inactive virtual channel Cannot configure R-APS VLAN priority for inactive virtual channel Cannot modify virtual channel bound to subring Cannot modify this parameter, delete and recreate the ring Maximum number of sub-rings per major ring exceeded Sub-ring with specified index does not exist Major ring node must be configured as interconnection node
7-36
Installation and Operation Manual Message Sub-ring node must be configured as interconnection node Cannot enable backward-compatibility mode when FS command is active First, remove all sub-rings of the major ring This node must be configured as interconnection node First, remove all sub-rings bound to the major ring This command is available for major ring only Cannot change bridge number for a ring with configured data VLAN Major ring is assigned to a different bridge instance The sub-ring is already bound to another major ring The port is already in use by another ring Cannot activate a ring without configured bridge number Cannot activate a ring without configured East port Cannot activate a ring without configured West port Cannot activate a ring without configured RAPS VLAN Cannot activate a ring without configured RAPS MEL Cannot activate a ring without R-APS VLAN configured for virtual channel Cannot activate a ring without R-APS VLAN priority configured for virtual channel Cannot activate a virtual channel without configured R-APS VLAN ID and priority for sub-ring Description
Chapter 7 Resiliency
One of the sub-ring nodes must be configured as an interconnection node Disable the force switch command to operate the ring in the backward-compatibility mode This action requires deleting all sub-rings belonging to the major ring Configure this node as an interconnection node to operate a sub-ring This action requires deleting all sub-rings belonging to the major ring This command can be run only on a major ring A ring with configured data VLAN The major ring is already assigned to another bridge instance The sub-ring cannot be attached to the ring, because it is already bound to another major ring The port cannot be attached to the ring because it is in use by another ring A ring without a port assigned to the bridge instance cannot be activated A ring without configured East port cannot be activated A ring without configured West port cannot be activated A ring without configured R-APS VLAN cannot be activated A ring without configured R-APS MEL cannot be activated A ring without R-APS VLAN ID, configured for the virtual channel, cannot be activated A ring without R-APS VLAN priority, configured for the virtual channel, cannot be activated A virtual channel without R-APS VLAN ID and priority, configured for the sub-ring, cannot be activated
7-37
Chapter 7 Resiliency
7.4
ETX-5300A provides 1+1 APS line redundancy for rapid restoration of service in case of line failure. When two TDM cards operate in APS mode for hardware redundancy, they ensure 50 ms restoration of service in case of line faults.
Benefits
APS switches over traffic with minimal loss of data, thus avoiding time-consuming reroutes. With APS, there is no indication beyond the affected network element that a failure has occurred; other nodes stay intact. SDH/SONET APS performs switchovers at Layer 1 significantly faster than at Layer 2 or Layer 3. The effect of a failure is greatly minimized, and a fast switchover guarantees minimal effect on the network.
Factory Defaults
By default, APS is disabled.
Functional Description
In 1+1 APS, ETX-5300A provides a protection facility (backup line) for each working facility. At the near end of the line, the optical signal is bridged permanently (split into two signals) and sent over both the working and the protection facilities simultaneously, producing identical working and protection signals. At the far end of the line, both signals are monitored independently for failures. The receiving equipment selects either working or the protection signal. This selection is based on switch initiation criteria, which can be a signal fail (hard failure such as loss of frame), a signal degrade (soft failure caused by the error rate exceeding some pre-defined value), or a response to user-initiated commands. Working and the protection ports can reside on the same or different E5-cTDM-4 cards. When the working and the protection ports reside on different cards, each card is protected against failures. The working and protection ports can reside on the same E5-cTDM-4 card (intra-card APS), provided that the card is not a member of an I/O card protection group (standalone card). The working and protection ports can reside on two different E5-cTDM-4 cards (inter-card APS) that are already assigned to an I/O card protection group, provided that:
7-38
The working port is on the working card The protection port is on the protection card
ETX-5300A Ver. 1.0
Chapter 7 Resiliency
The working and protection ports have the same port number. APS is defined for cards in the following slot pairs: 1 and 2 3 and 4.
This means that working and protection ports cannot reside on cards in slots 1 and 3, 1 and 4, 2 and 3, or 2 and 4.
Note
PW services cannot be assigned to SDH/SONET ports which are not APS members, when an inter-card APS has been defined on at least two ports of different I/O TDM cards. For example, if two ports 1 on I/O TDM cards in slot 1 and slot 2 are inter-card APS members, no pseudowire services are available on ports 2, 3 and 4 of both cards.
Each APS group includes up to two members. ETX-5300A can have up to eight APS instances per chassis.
APS Architecture
ETX-5300A APS is a 1+1 unidirectional protection switching. In this mode, all communication from the near end to the far end is carried out over the APS channel, using the K1 and K2 bytes of the SONET/SDH overhead on the protection line. The line selection is based only on the local conditions and requests. Therefore, each end operates independently of the other end, and the K1 and K2 bytes are not needed to coordinate switch actions. However, the K1 byte is still used to inform the other end of the local action. The K2 byte is set to indicate that the K1 byte is being received (by indicating the same channel number as the received K1) and to inform the other end of the provisioned architecture and mode of operation.
Working Line Tx Rx Tx Rx
Protection Line
Chapter 7 Resiliency
(bits 1-4) and the mode type (bit 5) as well bits 6 to 8 contain various condition such as AIS-L, RDI-L. I/O card maintains a protection status for every port in a protection group. The status values arranged in the following ascending priority order: active(1) standby(2) waitToRestore(3) manualSwitched(4) sd(5) sf(6) forcedSwitched(7) lockedOut(8) (protection only) notPresent(9)
The switch occurs whenever the protection status of the active port changed to a higher priority than the standby as a result of a user command (shutdown, reset, switch) or protection event.
A higher priority command overrides the lower priority command. Signal failures and signal degradations override manual switch, but are overridden by force and lockout commands.
Installation and Operation Manual Interface Conditions Working is active, protection is shut down Working is reset, protection is active
Chapter 7 Resiliency Allowed Command (1+1 Unidirectional Mode) Lockout-of-protection Lockout-of-protection Force-switch-to-working (causes a switchover)
Lockout-of-protection
To add an I/O card protection group: 1. Navigate to configure protection. 2. Type io-group and enter an I/O card protection group name. The config>protection>io-group (group name)# prompt is displayed.
Note
Using no before io-group (group name), deletes the I/O card protection group. I/O protection group can be deleted when it is disabled and has no cards assigned to it.
To configure I/O card protection group: At the config>protection> io-group (group name)# prompt, enter all necessary commands according to the tasks listed below:
Command bind {working <slot> | protection <slot>} no shutdown Comments Using no before bind removes a card from I/O card protection group When the APS group is activated (no shutdown command), the protection TDM I/O card is reset. This allows error-free transfer of configuration parameters from the working to the protection TDM I/O card. shutdown disables I/O card protection group
Task Defining working (active) and protection (standby) I/O cards Administratively enabling I/O card protection group
show status
7-41
Chapter 7 Resiliency
Configuring APS
Use the following procedure to configure redundancy for the ETX-5300A SDH/SONET links. To add an APS group: 1. Navigate to configure protection. 2. Type aps and enter an APS group name. The config>protection>aps(group name)# prompt is displayed.
Note
Task Defining protection (standby) and working (active) links Administratively enabling APS group Forcing traffic to the working port Forcing traffic to the protection port
force-switch-to-protection
manual-switch-to-working
Manually switching traffic to the protection port Preventing a working link from switching to a protection link
manual-switch-to-protection
lockout-of-protection
7-42
Chapter 7 Resiliency
Example
Intra-Card APS
To configure intra-card APS: APS group name aps_1 Working interface STM-1/OC-3 port 1 on E5-cTDM-4 card in slot 1 Protection interface STM-1/OC-3 port 2 on E5-cTDM-4 card in slot 1
ETX-5300A# config protection aps aps_1 ETX-5300A>config>protection>aps(aps_1)$ bind working sdh-sonet 1/1 ETX-5300A>config>protection>aps(aps_1)$ bind protection sdh-sonet 1/2 ETX-5300A>config>protection>aps(aps_1)$ no shutdown
Inter-Card APS
I/O card protection group name io-group_1 Working card E5-cTDM-4 in slot 1 Protection card E5-cTDM-4 in slot 2 APS group name aps_1 Working interface STM-1/OC-3 port 1 on E5-cTDM-4 card in slot 1 Protection interface STM-1/OC-3 port 1 on E5-cTDM-4 card in slot 2
7-43
Chapter 7 Resiliency
ETX-5300A# config protection io-group io-group_1 ETX-5300A>config>protection>io-group(io-group_1)$ bind working 1 ETX-5300A>config>protection>io-group(io-group_1)$ bind protection 2 ETX-5300A>config>protection>io-group(io-group_1)$ no shutdown ETX-5300A>config>protection>io-group(io-group_1) exit all ETX-5300A# config protection aps aps_1 ETX-5300A>config>protection>aps(aps_1)$ bind working sdh-sonet 1/1 ETX-5300A>config>protection>aps(aps_1)$ bind protection sdh-sonet 2/1 ETX-5300A>config>protection>aps(aps_1)$ no shutdown
Configuration Errors
Table 7-8 lists messages generated by ETX-5300A when a configuration error is
detected.
7-44
Installation and Operation Manual Message Command failed: Protection line is in signal fail or signal degrade Command failed: Working line is in signal fail or signal degraded Modify failed: Group should be shutdown in order to perform modification APS create failed: Exactly 2 ports should be bound to group Description
Chapter 7 Resiliency
Traffic cannot be manually switched to a port with signal failure or signal degrade condition Traffic cannot be manually switched to a port with signal failure or signal degrade condition Active APS group cannot be modified Number of APS member cannot exceed two ports
7-45
Chapter 7 Resiliency
7-46
Chapter 8 Networking
This chapter explains how to configure networking entities in ETX-5300A. It presents the following information:
Flows Ethertype Layer 2 Control Protocol (L2CP) Peer TDM Pseudowires Cross-Connection Bridge Router Quality of Service (QoS) Ethernet OAM.
8.1
Flows
Flows are unidirectional entities that connect two physical or logical ports.
Benefits
The user traffic can be classified into different Ethernet flows (EVC, EVC.CoS) to provide services in a flexible manner.
Factory Defaults
By default, there are no flows in the ETX-5300A system.
Functional Description
The ingress traffic is first classified into flows according to classification profiles. A per-port classification key configuration defines what types of classification profiles are supported for this type of port. The classification key also defines the CoS mapping and color mapping methods. The Classification section in Appendix B specifies the supported classification keys and the associated CoS and color mapping methods. It also details the different classifier profile types supported per classifier key.
Flows
8-1
Chapter 8 Networking
Flows connect physical and/or logical ports. They are used for E-Line and E-LAN services, or to provide L3 connectivity over router interfaces. In total, ETX-5300A supports up to 24K of Ethernet flows. Flows include information about traffic forwarding (flow destination); traffic mapped into flows is further processed according to user-defined profiles and VLAN editing actions. See the Flow Processing section below.
Note
Data flow and traffic management are detailed in Appendix B of this manual.
Figure 8-1 illustrates point-to-point and multipoint flows originating in I/O and
main Ethernet cards. I/O ingress flows are marked in red.
SAG SAP
SVI BP BP
SVI
Main Card Ethernet Port
Figure 8-1. I/O Ingress Flows Note A flow between two ports that belong to the same 10-port group (110 or 11 20) on the same E5-GBE-20, cannot be defined. If an E-Line service is required between two GbE ports, define the flows between ports belonging to the different 10-port groups on the same E5-GBE-20 card or between ports on the different E5-GBE-20 cards.
Flow Processing
Flow processing includes the following:
8-2 Flows ETX-5300A Ver. 1.0
Chapter 8 Networking
Ingress traffic is mapped in flows using the classification match criteria defined in the classifier profile. L2CP frames are handled per flow according to L2CP profile settings. User priority (P-bit, IP Precedence, DSCP) is mapped to an internal Class of Service (CoS) according to CoS mapping profile or fixed CoS mapping value User priority (P-bit, IP Precedence, DSCP) or DEI can be mapped to a packet color (yellow or green) according to color mapping profile. A single policer can be applied to a flow or a policer aggregate can be assigned to a group of flows, using policer profile or policer aggregate profile VLANs can be edited per flow by stacking (pushing), removing (popping), or swapping (marking) tags on single- or double-tagged packets. P-bit and DEI values are either copied or set according to CoS marking profile. CoS marking profile maps CoS value and/or packet color into the egress priority tags (P-bit, DEI). Flow is mapped to a specific queue block within a queue group associated with the egress port. A specific queue in the queue block is defined 1:1 by the packet CoS (07) according to CoS-mapping profile.
Table 8-1 details processing actions supported by different flow types. Table 8-1. Processing Actions per Flow Type
Ingress Port Classifier Profile Drop Action L2CP Profile CoS Mapping Profile Color Mapping Profile Policing Profile VLAN Editing
Main card I/O card SAP SVI PW SVI bridge SVI router
Note
All flows can be mapped to a queue block, if the flow egress port is on an I/O or main Ethernet card.
Drop Action
Traffic carried by I/O ingress flows or by flows originating from directly-attached (main card) ports can be dropped and thereby prevented from reaching its egress port. For example, if you plan to accept traffic marked by a certain VLAN, but to drop this traffic if it comes from a specific MAC address, you can define two flows: Flow 1 with VLAN classification Flow 2 with VLAN + specific MAC classification and drop action.
Flows
8-3
Chapter 8 Networking
This action can also be used to direct LACP traffic to the CPU, and preventing it from reaching an egress port. This is done by creating an untagged flow with an L2CP profile defining a drop action for it.
Flow Counters
Statistic counters can be enabled on the following flows: Up to 512 of I/O ingress flows per each I/O card Up to 2K minus two main card flows per chassis. These flows include: Point-to-point (E-Line) flows Multipoint (E-LAN) flows.
Note
Each pair of the multipoint flows (at bridge port ingress and egress) is counted as a single flow. PM counters must be either enabled or disabled for both multipoint flows.
ETX-5300A maintains counters for current statistics per flow. I/O ingress flows, point-to-point flows (E-Line) and multipoint (E-LAN) flows at bridge port ingress support the following counters: Received:
Transmitted:
Number of transmitted packets Number of transmitted green packets Number of transmitted yellow packets Number of transmitted bytes Number of transmitted green bytes Number of transmitted yellow bytes Total packet transmit rate (packet/sec) Green packet transmit rate (packet/sec) Yellow packet transmit rate (packet/sec) Total bit transmit rate (bit/sec) Green bit transmit rate (bit/sec) Yellow bit transmit rate (bit/sec)
Dropped:
Number of dropped packets Number of dropped green packets Number of dropped yellow/red packets Number of dropped bytes
8-4
Flows
Chapter 8 Networking
Number of dropped green bytes Number of dropped yellow/red bytes Total packet drop rate (packet/sec) Green packet drop rate (packet/sec) Yellow/red packet drop rate (packet/sec) Total bit drop rate (bit/sec) Green bit drop rate (bit/sec) Yellow/red bit drop rate (bit/sec)
Peak:
Maximum transmit bit rate Minimum transmit bit rate Maximum drop bit rate Minimum drop bit rate
Multipoint (E-LAN) flows at bridge port egress support the following counters: Transmit:
Number of transmitted packets Number of transmitted bytes Total packet transmit rate (packet/sec) Total bit transmit rate (bit/sec)
Peak:
Ports
The RFC-2544 testing is supported only on the flows whose ingress port is one of the following: An indirectly-attached port (Ethernet port on I/O cards) A LAG with ports bound to indirectly-attached ports.
Functionality
Before running the flow test, you must configure and enable a Down MEP, bound to an indirectly-attached port (see Ethernet OAM) with live ingress and egress flows.
Flows
8-5
Chapter 8 Networking
When the flow testing is enabled, ETX-5300A loops back all LBM packets received on the flow by swapping the MAC address and changing the LBM code to the LBR code.
Tx Flow
SAP Main or I/O Card Port A Rx Flow Down MEP Bound to Port B I/O Card Port B
A. Normal Operation
Tx Flow LBR Code LBM Code Loop I/O Card Port B
SAP Main or I/O Card Port A Rx Flow Down MEP Bound to Port B
B. Operation after Enabling the RFC-2544 Loopback Responder Figure 8-2. RFC-2544 Loopback Responder
ETX-5300A continues to forward all other, non-LBM packets. This includes the OAM packets, such as CCMs and DMMs. The testing mode has no impact on the user traffic. This mode can be activated dynamically, without disabling the flow. The LBM packets that are sent back during the RFC-2544 responder operation are not registered by the statistical counters of the flow.
Notes
All packets carrying the LBM code are looped back without any filtering according to the destination MAC address, MD level etc. The RFC-2544 testing functions only if the ingress and egress flows use the same port and have the same VLAN settings.
Classifier Profiles
You can define up to 24K classifier profiles to apply to flows to ensure the desired flow classification. To define a classifier profile: 1. Navigate to the flows context (config>flows). 2. Define a classifier profile and assign a name to it: classifier-profile <profilename> match-any The system switches to the context of the classifier profile (config>flows>classifier-profile(<profile-name>)). 3. Specify the criteria for the classifier profile: [no] match [ vlan <X>..<Y> ] [ inner-vlan <X>..<Y> ] [ p-bit <X>..<Y> ] [ ip-precedence <X>..<Y> ] [ ip-dscp <X>..<Y> ] [src-mac <src-mac-low>] [dst-mac <dst-mac-low>] [src-ip <src-ip-low>] [to-src-ip <src-ip-high>]
8-6 Flows ETX-5300A Ver. 1.0
Chapter 8 Networking
[dst-ip <dst-ip-low>] [to-dst-ip <dst-ip-high>] [ether-type <0xhhhh>] [untagged] [non-ip] [all] All possible combinations of classification criteria are listed under Classification in Appendix B. 4. Using no before match deletes classification criteria, but does not delete the classifier profile. A classifier profile can be edited only if it is not attached to a flow. 5. no classifier-profile(<profile-name>) deletes classifier profile. A classifier profile can be deleted only if it is not attached to a flow. 6. When you have completed specifying the criteria, enter exit to exit the classifier profile context.
Examples
To create classifier profile with criteria VLAN 100 to VLAN 150:
ETX-5300A# configure flows classifier-profile v100_150 match-any ETX-5300A>config>flows>classifier-profile(v100_150)$ match vlan 100..150 ETX-5300A>config>flows>classifier-profile(v100_150)$ exit all ETX-5300A# To create classifier profile with criteria VLAN 20 and inner VLAN 30:
ETX-5300A# configure flows classifier-profile v20_inner_30 match-any ETX-5300A>config>flows>classifier-profile(v20_inner_30)$ match vlan 20 inner-vlan 30 ETX-5300A>config>flows>classifier-profile(v20_inner_30)$ exit all To create classifier profile that matches all criteria:
ETX-5300A# configure flows classifier-profile all match-any ETX-5300A>config>flows>classifier-profile(all)$ match all ETX-5300A>config>flows>classifier-profile(all)$ exit all To create classifier profile with criteria VLAN 10 and P-bit 5:
ETX-5300A# ETX-5300A# configure flows classifier-profile vlan_10+p-bit_5 match-any ETX-5300A>config>flows>classifier-profile(vlan_10+p-bit_5)$ match vlan 10 pbit 5 ETX-5300A>config>flows>classifier-profile(vlan_10+p-bit_5)$ exit all
Error Messages
Table 8-5 lists the messages generated by ETX-5300A when a configuration error
is detected.
Chapter 8 Networking Message Classifier profiles overlap Invalid VLAN ID range This profile is not supported Classifier profile cannot use more than one match criteria for classification Outer and inner VLAN classifier profile does not support outer VLAN range Classifier profile: illegal range Classifier profile: use of value range is not allowed Classifier profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Description
Classifier profile ranges or values overlap Invalid VLAN ID range is selected for classifier profile Invalid classifier profile for the current classification key or port type Only one match classification criteria is allowed per classifier profile When configuring an outer and inner VLAN classifier profile, use a single value for outer VLAN ID Not a valid range of values for this classifier profile This classifier profile supports a single value only The maximum number of profiles (24K) has been reached and no additional classifier profiles can be added The classifier profile name is not unique The profile name cannot be changed because the profile is in use
Configuring Flows
To configure flows: 1. Navigate to config>flows. 2. Enter flow <flow-name>. If the flow already exists, the config>flows>flow(<flow-name>)# prompt is displayed; otherwise the flow is created and the config>flows>flow(<flow-name>)$ prompt is displayed. 3. Enter all necessary commands according to the tasks listed below.
Task Associating the flow with a classifier profile Specifying the ingress port Command classifier <classifier-profile-name> Comments no classifier removes the flow association with the classifier profile no ingress-port removes the flow association with the ingress port
ingress-port ethernet <slot/port> ingress-port lag <port-number> ingress-port svi <port-number> ingress-port mng-ethernet <slot/port> ingress-port sap <slot/port/tributary> no ingress-port
8-8
Flows
Installation and Operation Manual Task Specifying the egress port, and the egress queue block and the queue within the block Command egress-port ethernet <slot/port> [queue-map-profile <queue-map-profile-name> block <level_id/queue_id>] egress-port lag <port-number> [queue-map-profile <queue-map-profile-name> block <level_id/queue_id>] egress-port svi <port-number><bridge | router | pw> egress-port mng-ethernet <slot/port> egress-port sap <slot/port/tributary> [queue-mapprofile <queue-map-profile-name> block <level_id/queue_id>] no egress-port Assigning CoS mapping profile, or using a fixed value for mapping user priority to internal Class of Service values Assigning color mapping profile, or using a fixed value for assigning a color (green or yellow) to incoming packets Associating the flow with a policer profile or policer aggregate cos-mapping {[fixed <0..7>] [profile <cos-mappingprofile-name>]}
Chapter 8 Networking Comments The queue map profile maps CoS to a queue. In ETX-5300A it is permanently set to 1:1 mapping (CoS 0 to queue 0 etc.) If you intend to use an I/O card port as an egress port for the flow, verify that the port already has a queue group profile attached to it. no egress-port removes the flow association with the egress port See Appendix B for details
L2CP profiles can be attached to certain types of flows, as detailed in the L2CP Handling section of Appendix B. no l2cp profile removes the flow association with the L2CP profile
Defining swapping actions for the flow such as overwriting the VLAN ID or inner VLAN ID or setting the priority Defining window size for sampling flow rate statistics Administratively enabling the flow
mark
rate-sampling-window no shutdown You can activate a flow only if it is associated at least with a classifier profile, an ingress port, and an egress port. Flows are created as inactive by default. shutdown disables the flow.
Discarding traffic transmitted via the flow Activating the RFC-2544 responder mode drop test [lbm-responder] no test
Flows
8-9
Chapter 8 Networking
Table 8-3 lists all VLAN pushing and popping actions supported by ETX-5300A. For allowed combinations of VLAN editing for E-Line, E-LAN and router and PW SVIs, see VLAN Editing in Appendix B. Table 8-3. VLAN Pushing and Popping Actions
Task Pushing VLAN tag Removing outer VLAN tag, or optionally inner VLAN tag Pushing inner VLAN tag Setting P-bit to a specific value Setting P-bit value according to marking profile Setting P-bit value by copying from the incoming frame Setting TPID Setting inner TPID Command vlan-tag push vlan <sp-vlan> vlan-tag pop vlan [inner vlan] inner-vlan <inner-sp-vlan> p-bit fixed <fixed-p-bit> p-bit profile <inner-marking-profile-name> p-bit copy tag-ether-type <tag-ether-type> inner-tag-ether-type <inner-tag-ether-type> Comments
The following VLAN swapping (marking) actions can be performed at the mark level in the config>flows>flow(flow-name)>mark# prompt.
8-10
Flows
Installation and Operation Manual Task Overwriting inner P-bit according to marking profile Command inner-marking-profile <inner-marking-profile-name>
Chapter 8 Networking Comments criteria of the flow. If a color-aware marking profile is applied for the outer VLAN of a flow, then if marking is applied to the inner VLAN, either the same color-aware marking profile must be used for the inner VLAN, or a non-color-aware marking profile must be used for the inner VLAN. no marking-profile or no inner-marking-profile disables the overwriting of marking profile or inner marking profile respectively
exit
Examples
The following examples show the configuration of point-to-point (E-Line) and multipoint (E-LAN) flows.
Flows
8-11
Chapter 8 Networking
Note
Four flows from I/O card port to SAP with per-flow policing, CoS and color mapping One flow SAP to main card port, push S-VLAN to this flow with S-VID P-bit and DEI values set by a marking profile One returning flow from main card port to I/O card port, pop S-VLAN.
ETX-5300A Ver. 1.0
Chapter 8 Networking
#***************************Defining_Policer_Profiles************************ config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0 config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0 config qos policer-profile "3" bandwidth cir 10000 cbs 10000 eir 100000 ebs 64000 config qos policer-profile "4" bandwidth cir 55000 cbs 10000 eir 100000 ebs 64000 exit all #*********************************End**************************************** #***************************Assigning_Queue_Groups*************************** config port ethernet main-a/1 queue-group profile 3level_1 config port ethernet 1/1 queue-group profile q_group_2_level_default config port sag 1/1 queue-group profile q_group_SAG_2_level_default exit all #*********************************End**************************************** #***************************Selecting_Classification_Key********************* config port ethernet main-a/1 classification-key vlan p-bit config port ethernet 1/1 classification-key vlan p-bit exit all #*********************************End**************************************** #***************************Enabling_Ports*********************************** config port ethernet main-a/1 no shutdown config port ethernet 1/1 no shutdown exit all #*********************************End**************************************** #***************************Configuring_Classifier_Profiles****************** config flows classifier-profile class100pbit6 match-any match vlan 100 p-bit 6 exit all config flows classifier-profile class100pbit5 match-any match vlan 100 p-bit 5 exit all config flows classifier-profile class100pbit3 match-any match vlan 100 p-bit 3 exit all config flows classifier-profile class100pbit0 match-any match vlan 100 p-bit 0 exit all
config flows classifier-profile class300100 match-any match vlan 300 inner-vlan 100
ETX-5300A Ver. 1.0 Flows 8-13
Chapter 8 Networking
exit all #*********************************End**************************************** #************************Configuring_CoS_Mapping_Profile********************* config qos cos-map-profile cosvzb classification p-bit map 0 to-cos 6 map 1 to-cos 5 map 2 to-cos 5 map 3 to-cos 5 map 4 to-cos 5 map 5 to-cos 4 map 6 to-cos 0 map 7 to-cos 0 exit all #*********************************End**************************************** #**************************Configuring_Color_Mapping_Profile***************** config qos color-map-profile color_all_green classification p-bit map 0 to green map 1 to green map 2 to green map 3 to green map 4 to green map 5 to green map 6 to green map 7 to green exit all #*********************************End**************************************** #*****************Configuring_Marking_Profile ******************************* configure qos marking-profile mark1 classification cos color-aware greenyellow dei mapping mark 0 green to 7 dei green mark 0 yellow to 7 dei green mark 1 green to 7 dei green mark 1 yellow to 7 dei green mark 2 green to 7 dei green mark 2 yellow to 7 dei green mark 3 green to 7 dei green mark 3 yellow to 7 dei green mark 4 green to 5 dei green mark 4 yellow to 5 dei green mark 5 green to 2 dei green mark 5 yellow to 2 dei green mark 6 green to 0 dei green mark 6 yellow to 0 dei yellow mark 7 green to 7 dei green mark 7 yellow to 7 dei green exit all #*********************************End**************************************** #**************************************************************************** #***************************Configuring_Flows******************************** #****************************************************************************
8-14
Flows
Chapter 8 Networking
#********************Configuring_EVC.CoS_Flows_from_I/O_to_SAP*************** configure flows flow 11 classifier class100pbit6 cos-mapping profile cosvzb ingress-color profile color_all_green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 1 no shutdown exit all configure flows flow 12 classifier class100pbit5 cos-mapping profile cosvzb ingress-color profile color_all_green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 2 no shutdown exit all configure flows flow 13 classifier class100pbit3 cos-mapping profile cosvzb ingress-color profile color_all_green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 3 no shutdown exit all configure flows flow 14 classifier class100pbit0 cos-mapping profile cosvzb ingress-color profile color_all_green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 4 no shutdown exit all #********************Configuring_EVC_Flow_from_SAP_to_Main_Card************** configure flows flow 15 classifier match-all ingress-port sap 1/1/1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 vlan-tag push vlan 300 p-bit profile mark1 no shutdown exit all #********************Configuring_Flow_from_Main_to_I/O_Card******************
Flows
8-15
Chapter 8 Networking
configure flows flow 16 classifier class300100 ingress-port ethernet main-a/1 egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1 vlan-tag pop vlan no shutdown exit all #*********************************End****************************************
Multipoint Service
This section provides an example of configuring an E-LAN application built on a four-port bridge with all bridge ports sharing the same VLAN domain (VLAN 10). Figure 8-4 shows the flows to be configured for this application.
Chapter 8 Networking
#***********************Assigning_Queue_Group_Profiles*********************** config port ethernet main-a/1 queue-group profile q_group_2_level_default config port ethernet 1/1 queue-group profile q_group_2_level_default config port ethernet 1/2 queue-group profile q_group_2_level_default config port ethernet 1/3 queue-group profile q_group_2_level_default config port sag 1/1 queue-group profile q_group_SAG_2_level_default exit all #*********************************End**************************************** #****************************Selecting_Classification_Key******************** config port ethernet main-a/1 classification-key vlan p-bit config port ethernet 1/1 classification-key vlan p-bit config port ethernet 1/2 classification-key vlan p-bit config port ethernet 1/3 classification-key vlan p-bit exit all #*********************************End**************************************** #****************************Enabling_Ports********************************** config port ethernet main-a/1 no shutdown config port ethernet 1/1 no shutdown config port ethernet 1/2 no shutdown config port ethernet 1/3 no shutdown exit all #*********************************End**************************************** #****************************Configuring_Classifier_Profile****************** config flows classifier-profile class10 match-any match vlan 10 exit all #*********************************End****************************************
#***************************Configuring_COS_Mapping_Profile****************** config qos color-map-profile color1 classification p-bit exit cos-map-profile cos1 classification p-bit map 0 to-cos 7 map 1 to-cos 6 map 2 to-cos 5 map 3 to-cos 4 map 4 to-cos 3 map 5 to-cos 2 map 6 to-cos 1 map 7 to-cos 0 exit all #*********************************End**************************************** #************************** Configuring_Color_Mapping_Profile *************** config qos color-map-profile color_all_green classification p-bit map 0 to green map 1 to green map 2 to green map 3 to green
Flows
8-17
Chapter 8 Networking
map 4 to green map 5 to green map 6 to green map 7 to green exit all #*********************************End**************************************** #*************************Defining_Bridge_SVIs******************************* config port svi 11 bridge exit all config port svi 12 bridge exit all config port svi 13 bridge exit all config port svi 14 bridge exit all #*********************************End**************************************** #*************************Binding_Bridge_Ports_to_SVIs*********************** config bridge 1 port 1 bind svi 11 exit all config bridge 1 port 2 bind svi 12 exit all config bridge 1 port 3 bind svi 13 exit all config bridge 1 port 4 bind svi 14 exit all #*********************************End**************************************** #************** Configuring_VLAN_Membership_and_MAC_Table_Size ************** config bridge 1 vlan 10 tagged-egress 1..4 maximum-mac-addresses 256 exit all #*********************************End**************************************** #************************Configuring_Flows_to/from_Bridge_Port_1************* config flows flow 100 classifier class10 ingress-port ethernet main-a/1 egress-port svi 11 ingress-color profile color_all_green cos-mapping profile cos1 no shutdown exit all config flows flow 101 classifier class10
8-18
Flows
Chapter 8 Networking
ingress-port svi 11 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************End**************************************** #************************Configuring_Flows_to/from_Bridge_Port_2************* config flows flow 102 classifier class10 ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-color profile color_all_green cos-mapping profile cos1 no shutdown exit all config flows flow 103 classifier class10 ingress-port sap 1/1/1 egress-port svi 12 no shutdown exit all config flows flow 104 classifier class10 ingress-port svi 12 egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************end**************************************** #************************Configuring_Flows_to/from_Bridge_Port_3************* config flows flow 105 classifier class10 ingress-port ethernet 1/2 egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-color profile color_all_green cos-mapping profile cos1 no shutdown exit all config flows flow 106 classifier class10 ingress-port sap 1/1/2 egress-port svi 13 no shutdown exit all config flows flow 107 classifier class10 ingress-port svi 13 egress-port ethernet 1/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all
Flows
8-19
Chapter 8 Networking
#*********************************End**************************************** #************************Configuring_Flows_to/from_Bridge_Port_4************* config flows flow 108 classifier class10 ingress-port ethernet 1/3 egress-port sap 1/1/3 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-color profile color_all_green cos-mapping profile cos1 no shutdown exit all config flows flow 109 classifier class10 ingress-port sap 1/1/3 egress-port svi 14 no shutdown exit all config flows flow 110 classifier class10 ingress-port svi 14 egress-port ethernet 1/3 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************End****************************************
Statistics
ETX-5300A collects the current performance monitoring data for the following flow types: Point-to-point flows (E-Line) and multipoint (E-LAN) flows at the bridge port ingress Multipoint (E-LAN) flows at the bridge port egress.
To display flow statistics: At the prompt config>flow>flow(<number>)#, enter show statistics running. Flow statistics are displayed.
ETX-5300A>config>flows>flow(1)# show statistics running Rate Sampling Window ----------------------------------------------------------------------------Window Size [Min.] : 0 Window Remain Time [Min.] : 0 Rx ----------------------------------------------------------------------------Packets Bytes Total : 26858717 3384198342
Drop
8-20 Flows ETX-5300A Ver. 1.0
Chapter 8 Networking
Peak Measurement ----------------------------------------------------------------------------Minimum Maximum Tx Bit Rate [bps] : 6143760 9326016 Drop Bit Rate [bps] : 658197792 859194000 To clear statistics: At the prompt config>flow>flow (number)#, enter clear-statistics.
Configuration Errors
Table 8-5 lists the messages generated by ETX-5300A when a configuration error
is detected.
Flows
8-21
Chapter 8 Networking Message Flow creation failure: max number of flows reached Flow is in use A MIP/MEP is defined on the flow Active MIP is defined on the flow, shutdown failed Active MEP is defined on the flow, shutdown failed SVI is not configured Illegal flow-SAG combination in policer aggregate profile Max number of flows per policer aggregate profile has been reached Classifier profile is not attached CoS or color profile is missing CoS or color profile are unnecessary CoS and color profile mismatch Illegal CoS method Illegal color method Port classification key and CoS method mismatch Port classification key and color method mismatch Max number of CoS or color profiles for I/O card has been reached Max number of color profiles for I/O card has been reached Policer is not supported Flow is in use, change failed Ingress I/O card port does not match SAG Mismatch between flow SVI (B) and egress port Description
The maximum number of flows (24K) has been reached and no flows can be added The current flow is being used and cannot be deleted or modified A flow is assigned to a MIP or MEP instance A flow cannot be shut down if it has a MIP assigned to it A flow cannot be shut down if it has a MEP assigned to it An SVI must be defined before a flow can be bound to it The policer profile cannot be used because not all of its flows are bound to the same SAG The maximum number of flows per policer aggregate (16) has been reached and no flows can be added to the profile The required classifier profile has not been attached to the flow The CoS or color profile has not been assigned to a flow The CoS or color profile cannot be attached to an ingress flow, originating from a TDM port A discrepancy between the CoS and color mapping methods Invalid CoS mapping method for the current flow type or ingress color mapping method Invalid color mapping method for the current flow type or ingress CoS mapping method Invalid combination of port classification key and CoS mapping method Invalid combination of port classification key and color mapping method The maximum number of CoS or color profiles per I/O card (36) has been reached and no profiles can be added to flows originating from the I/O card The maximum number of color profiles per I/O card (36) has been reached and no profiles can be added to flows originating from the I/O card Policer and policer aggregate profiles can be attached to flows originating from indirectly-attached ports only The flow is being used and cannot be modified Mismatch between ingress port of the flow and SAG number Flows originating from the same bridge-type SVI must terminate in the same port
8-22
Flows
Installation and Operation Manual Message Mismatch between flow SVI (B) and egress slot Inner editing action error Outer editing action error Inner + outer editing action error Inner + outer editing action error for bridge service Inner + outer editing action error for P2P service Inner + outer editing action error for router service Classification + editing error for bridge service Bridge port is not a member of identified VLAN VLAN editing error for a P2P flow starting from PW SVI Editing of ingress I/O flows is not allowed Max number of L2CP profiles bound to a port has been reached Max number of L2CP profiles bound to a flow has been reached Ingress port has not been defined yet Egress port has not been defined yet Ingress LAG port has less than 2 ports bound to it Egress LAG port has less than 2 ports bound to it Number of ingress SAPs has been exceeded Number of egress SAPs has been exceeded Specified queue group does not exist Flow type is not valid Classification type is not valid for the ingress port Classification type cannot include Pbit Description
Chapter 8 Networking
Flows originating from the same bridge-type SVI must terminate in the same slot Invalid editing action for inner VLAN Invalid editing action for outer VLAN Invalid editing action for inner and outer VLANs Invalid editing action for inner and outer VLANs on a flow in multipoint service Invalid editing action for inner and outer VLANs on a flow in point-to-point service Invalid editing action for inner and outer VLANs on a flow in Layer-3 service Invalid classification and VLAN editing action on a flow in multipoint service The bridge port must be a member of an outer VLAN of the frame remaining at the entrance to the bridge port Invalid VLAN editing action for a point-to-point flow starting from PW-type SVI Cannot perform VLAN editing on ingress I/O flows The maximum number of L2CP profiles per port (4, including default) has been reached and no profiles can be added The maximum number of L2CP profiles per flow (1) has been reached and no profiles can be added The ingress port selected for a flow has not yet been defined The egress port selected for a flow has not yet been defined If a LAG serves as a flow ingress port, it must have two ports assigned to it If a LAG serves as a flow egress port, it must have two ports assigned to it Cannot define a SAP as an ingress port for a flow if the SAP number is higher than 512 Cannot define a SAP as an egress port for a flow if the SAP number is higher than 512 A queue group assigned to a flow has not yet been defined
A discrepancy between the classification key of port and the classification method of the flow The P-bit classification cannot be used for flows originating from bridge-type SVIs
Flows
8-23
Chapter 8 Networking Message Max number of port-based flows per SAG has been exceeded Max number of VLAN-based flows per SAG has been exceeded Classification type must be VLAN or untagged Classification type must be VLAN Classification type must be VLAN or Inner VLAN Classification type must be VLAN, Inner VLAN or Match All Classification type must be Match All for ingress port SVI (R) Classification type must be Match All for ingress port SVI (PW) Classification type must be Match All for P2P SAP flow Classification type must be untagged VLAN number is out of limit Other classification type already defined for the VLAN Classification entry already exists for the P-bit Only single VLAN is allowed for this classification type Only single VLAN is allowed for SVI router/bridge egress port Only single VLAN is allowed for SVI router/bridge ingress port Only single MAC is allowed for this classification type Only single IP is allowed for this classification type Only single P-bit is allowed for this classification type Only one P-bit range is allowed for this classification type Description
The maximum number (128) of port-based flows per SAG has been exceeded The maximum number (128) of VLAN-based flows per SAG has been exceeded Only VLAN or untagged classification is allowed Only VLAN classification is allowed Only VLAN or Inner VLAN classification is allowed Only VLAN, Inner VLAN or Match All classification is allowed Only Match All classification is allowed for flows originating from router-type SVI Only Match All classification is allowed for flows originating from PW-type SVI Only Match All classification is allowed for point-to-point flows originating from SAP Only untagged classification is allowed VLAN number exceeded maximum allowed value Another classification type has already been defined for the VLAN. Source MAC, destination MAC, source IP, destination IP and Ethertype classifications must be unique per VLAN. Another type of classification entry already exists for the port. The classification type must be unique for the port. VLAN ranges are not allowed for the selected classification type VLAN ranges are not allowed for flows terminating in router- or bridge-type SVIs VLAN ranges are not allowed for flows originating from router- or bridge-type SVIs MAC ranges are not allowed for the selected classification type IP ranges are not allowed for the selected classification type P-bit ranges are not allowed for the selected classification type A single P-bit is not allowed for the selected classification type
8-24
Flows
Chapter 8 Networking
8.2
Ethertype
Ethertype (tag protocol ID, or TPID) configured per chassis and per port is used for: Identifying VLAN-tagged frames at ingress Setting Ethertype value used in VLAN editing at egress.
Benefits
Per-port tag Ethertype configuration allows identification of incoming and outgoing VLAN-tagged frames.
Factory Defaults
By default, Ethertype is set to 8100.
Functional Description
See Ethertype in Appendix B for a detailed description of Ethertype.
Configuring Ethertype
Any Ethertype tag, in addition to the default 8100 value, must first be defined at the chassis level. Afterwards, the additional tag value is used in the port configuration. If the second value is not defined for a port, the port uses default setting (8100). To configure Ethertype tag at chassis level: 1. Navigate to config>port. 2. Enter tag-ethernet-type <0x0000-0xFFFF>.
Note
Example
To configure global Ethertype tag 0x88a8:
ETX-5300A>config>port>tag-ethertype 0x88a8
Configuration Errors
Table 8-6 lists the messages generated by ETX-5300A when a configuration error
is detected.
ETX-5300A Ver. 1.0 Ethertype 8-25
Chapter 8 Networking
Cannot delete default Ethertype tag value Delete failed: Ethertype tag value is in use Setting failed: Ethertype tag value is unknown Ethertype tag cannot be modified for a port attached to LAG
8.3
ETX-5300A tunnels, discards or peers (trap to host for protocol processing) L2CP packets. These actions are defined by L2CP profiles, which also provide different L2CP addresses. The L2CP profiles are attached to ports and flows.
Standards
IEEE 802.3
Benefits
ETX-5300A offers high flexibility in handling customers L2CP packets. According to application requirements, these packets can be tunneled, discarded or trapped to the host.
Factory Defaults
By default, a tunnel all profile is attached to every port. However, no default L2CP profile is attached to a newly created flow, meaning the flow traffic behaves, by default, according to the port profile.
Functional Description
See L2CP in Appendix B for a detailed description of how ETX-5300A handles Layer 2 Control Protocol packets.
8-26
Chapter 8 Networking
8-27
Chapter 8 Networking Task Specifying the L2CP action for MAC addresses (discard, tunnel, or peer) Command
Installation and Operation Manual Comments discard L2CP frames are discarded tunnel L2CP frames are forwarded across the network as ordinary data peer ETX-5300A peers with the user equipment to run the protocol. L2CP frames are forwarded to the ETX-5300A CPU. Unidentified L2CP frames are forwarded across the network as ordinary data. The peer actions are supported at the flow level only. no mac <mac-addr-last-byte-value-list> removes the action for the specified MAC address
Example
To add L2CP profile named layer2ctrl1 with peer action: ETX-5300A# configure port ETX-5300A>config>port# l2cp profile layer2ctrl1 ETX-5300A>config>port>l2cp profile(layer2ctrl1)$ mac 01-80-C2-00-00-02 peer To delete L2CP profile named layer2ctrl1:
Configuration Errors
Table 8-7 lists the messages generated by ETX-5300A when a configuration error
is detected.
8-28
Installation and Operation Manual Message Cannot add MAC address: Max number of MAC addresses has been reached PAUSE frames are not supported Illegal MAC address for peer action L2CP profile does not exist Peer action is not allowed for portbound L2CP profile Description
Chapter 8 Networking
Cannot specify an L2CP processing action for a MAC address because the maximum number of addresses has been reached PAUSE frames must be discarded The MAC address selected for the peer processing action is not valid. The address must be 01-80-C2-00-00-02. Cannot bind an L2CP profile that has not yet been created An L2CP profile bound to a port cannot perform a peer action
8.4
Peer
Remote devices that are destinations for pseudowire traffic or serve as a grandmaster for 1588v2 slave clock entities are referred to as peers.
Factory Defaults
By default, there are no peers in the ETX-5300A system.
Benefits
Peers serve as destinations for pseudowire connections for transporting a TDM payload over packet-switched networks. In addition, they are configured to be sources for the master clock used by 1588v2 slave entities.
Functional Description
Peers are remote devices operating opposite router interfaces. You can define up to 1334 peers for pseudowire or 1588v2 traffic, with each assigned a unique index number. The index number is used to specify the pseudowire destination, instead of directly providing the necessary destination information. To configure a UDP/IP peer, you must provide its IP address. For MEF-8 peers, you must specify the MAC address of the destination device.
To configure a remote peer: At the config>peer (number) # prompt, enter all necessary commands according to the tasks listed below:
Peer
8-29
Chapter 8 Networking Task Defining the IP address of a remote peer in UDP/IP networks Assigning a name to a remote peer Specifying number of a router instance Defining MAC address of a remote peer in MEF-8 networks Command ip <valid IP address> name <alphanumeric string > router <1> mac<valid MAC address>
To remove a remote peer: At the config>peer (peer number) # prompt, type no peer (peer number).
Note
ETX-5300A>config# info peer 1 ip 6.6.6.7 peer 2 ip 172.17.153.191 name peer 3 ip 172.17.154.192 name
"peer_2" "peer_3"
Example
To configure remote peer 1 for UDP/IP PSN: IP address: 9.9.9.9
Name: peer1. ETX-5300A>configure peer 1 ip 9.9.9.9 name peer1 To configure remote peer 1 for MEF-8 PSN: MAC address: 00-20-d6-54-bf-05
Name: peer2. ETX-5300A>configure peer 1 mac 00-20-d6-54-bf-05 name peer2 To delete remote peer 1:
ETX-5300A>config# no peer 1
Note
8-30
Peer
Chapter 8 Networking
Configuration Errors
Table 8-8 lists the messages generated by ETX-5300A when a configuration error
is detected.
8.5
TDM Pseudowires
TDM pseudowires (PWs) are an emulation of Layer-2 point-to-point connectionoriented services over packet-switching networks (PSN).
Standards
Structure-Aware Time Division Multiplexed (TDM) Circuit Emulation Service over Packet Switched Network (CESoPSN), RFC 5086 Structure-Agnostic Time Division Multiplexing (TDM) over Packet (SAToP), RFC 4553 MEF 8, Implementation Agreement for the Emulation of PDH Circuits over Metro Ethernet Networks, October 2004 ITU-T Recommendation Y.1453 (03/2006), TDM-IP interworking User plane interworking Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification (VCCV), draft-ietf-pwe3-vccv-bfd-05 Pseudo Wire (PW) OAM Message Mapping, draft-ietf-pwe3-oam-msg-map-10 Definitions of Textual Conventions for Pseudowire (PW) Management, RFC 5542
TDM Pseudowires
8-31
Chapter 8 Networking
Pseudowire (PW) Management Information Base (MIB), draft-ietf-pwe3-pwmib-14 Managed Objects for TDM over Packet Switched Network (PSN), draft ietf pwe3 tdm mib 11 ITU-T Recommendation G.823 (03/2000), The control of jitter and wander within digital networks which are based on the 2048 kbps hierarchy ITU-T Recommendation G.824 (03/2000), The control of jitter and wander within digital networks which are based on the 1544 kbps hierarchy.
Factory Defaults
By default, there are no pseudowire connections in the ETX-5300A system.
Benefits
Pseudowire circuit emulation technology enables packet-based infrastructure to provide TDM services with the service quality of an SDH/SONET network.
Functional Description
The pseudowire services convert TDM payload to packets and transfer these packets through Layer-2 (E-Line, E-LAN) or Layer-3 (router) services. The pseudowire subsystem is located on the E5-cTDM-4 cards. Each TDM card has four channelized STM-1/OC-3 ports with DS1 capacity at 63 E1 or 84 T1 channels per interface. The traffic to the internal DS1 ports is directed by means of a pseudowire cross-connect matrix (a timeslot cross-connect matrix similar to the TDM cross-connect matrix), which routes traffic from the internal ports to the pseudowire packet processors with total capacity of up to 336 pseudowires per card and 1344 per chassis.
Note
For additional information on the ETX-5300A pseudowire system, see also Peer and Cross-Connection.
Each pseudowire terminated on the E5-cTDM-4 can be independently configured to handle the particular type of traffic: Transparent transfer of data (unframed E1/T1 streams) using SAToP. Transfer of framed E1/T1 streams, using CESoPSN. To support voice payload, the signaling information can also be transported. Note that when using CESoPSN, any timeslots carrying signaling information (either channel-associated signaling (CAS), or common-channel signaling (CCS) such as Signaling Scheme 7 (SS7), ISDN PRI signaling, etc.) can be transparently transferred within the pseudowire, as regular data timeslots. Packet structure is independently selectable for each pseudowire, for compatibility with the various pseudowire protocols (CESoPSN, SAToP) and the PSN type (UDP/IP or ETH). For maximum flexibility in system applications, the framing format of the pseudowire device at the destination (referred to as a pseudowire peer) can also be taken into account. Therefore, in CESoPSN, for
8-32
TDM Pseudowires
Chapter 8 Networking
example, traffic using the E1 standards can be directed at destinations using the T1 standards, and vice versa.
Ethernet Header
The Ethernet header contains the DA, SA and Ethernet type information. It may also contain an optional VLAN tag. UDP over IP For UDP/IP-type PSN, the Ethernet header is as follows: SA MAC MAC address of the router interface used for packet forwarding DA MAC MAC address of the resolved next hop, default gateway or host VLAN VLAN assigned to the router interface used for packet forwarding P-bit CoS of PW is set to 1. P-bit is a RIF attribute (CoS > P-bit).
MEF-8 For the MEF-type PSN, the Ethernet header is as follows: SA MAC MAC address of the E5-cTDM-4 card DA MAC MAC address of the peer VLAN Flow (E-Line/E-LAN) VLAN P-bit CoS of PW is set to 1. P-bit is a flow attribute (marking profile, CoS > P-bit) Packet color green.
TDM Pseudowires
8-33
Chapter 8 Networking
UDP over IP For UDP/IP-type PSN, the TDM-PW packet structure is as follows: 6 DA 6 SA 2 Type 8100 Where: DA MAC address of the next hop (taken from the forwarding table) SA MAC address of the applicable router interface VLAN type 0x8100 + VLAN tag, optional Type 0x800 (IP packet) IPv4 Header the protocol field of the IP header is set to 17 (UDP) UDP Header the PW label/s, manually configured (see below) 2 VLAN Tag 2 Type 800 20 IP Header 8 UDP Header 4 CW TDM Payload
For UDP/IP-type PSN IP, the TOS byte in the IP header can be configured per PW. The UDP header is used to multiplex between the different PWs. UDP port values are as follows: UDP Source Port source PW label (18191) + 49152 UDP Destination Port destination PW label (18191) + 49152 Classification (Rx side) - configured destination port together with both the source and destination IP addresses uniquely identifies the PW for the receiver (a match is checked between the destination port within the Rx packet and the pre-configured source PW label)
Note
The constant value of 49152 is added to the PW labels configured by the operator. It is inserted in the outgoing packet at the UDP ports fields. For example, a PW label 1 is transmitted as port 49153.
MEF-8 (CESoETH) For MEF-8-type PSN, the TDM-PW packet structure is as follows:
6 DA
6 SA
2 VLAN Tag
2 Type 88D8
4 ECID
4 CW TDM Payload
DA MAC address of the peer device SA MAC address of the associated SVI (per E5-cTDM-4 card) VLAN type 0x8100 + VLAN tag, optional Type 0x88D8 (CESoETH packet) ECID Emulated Circuit Identifier, a manually configured unique label which identifies the PW.
8-34
TDM Pseudowires
Chapter 8 Networking
Control Word
The control word structure for different encapsulation methods is illustrated below. CESoPSN:
0 0 1 0 2 0 3 0 4 L 5 R 6 M 7 8 9 10 LEN (6) 15 16 Sequence Number (16) 31
FRG
SAToP:
0 0 1 0 2 0 3 0 4 L 5 R 6 7 8 9 10 LEN (6) 15 16 Sequence Number (16) 31
RSV
FRG
Bits 0-3 Set to zero. L local attachment circuit abnormal condition. If set, indicates that the source has detected or has been notified of a TDM fault condition that is affecting the data to be transmitted. If the TDM fault is cleared, the L bit is also cleared. R remote loss of frame. If set, indicates that packet loss or buffer underflow condition is detected at the PSN. M/RSV a 2-bit modifier field in CESoPSN. If L=0, it allows detection of signaling packets, carrying RDI across the PSN. If L=1, only value 00 for M bits is currently defined. In SAToP it is reserved and must be set to 0. L & M can be treated as a 3-bit code point that is described in the table below.
0 1
11 00
1 1 1
01 10 11
FRG fragmentation field. This field is used for fragmenting multiframe structures into multiple packets in case of structured CESoPSN with CAS bundles. Must be set to zero. LEN the length of the TDM-PW packet (header + payload) if it is less than 64 bytes. Otherwise, it is set to zero.
TDM Pseudowires
8-35
Chapter 8 Networking
Sequence Number provides the common PW sequencing function as well as detection of lost packets. Its generation rules: Its space is a 16-bit unsigned circular space Its initial value is random (unpredictable) It is incremented with each TDM-PW data packet sent in the specific PW.
TDM Payload
This section details the two payload encapsulation methods supported by ETX-5300A. CESoPSN CESoPSN transports raw TDM data; that is, packets are formed by inserting a user-specified number of complete TDM frames (4 to 360 frames) in the packet payload area. Therefore, CESoPSN pseudowires can only be configured on framed ports. The TDM frames are considered serial data, even if they carry voice and CAS. Since a CESoPSN pseudowire transports raw TDM frames, a CESoPSN pseudowire can only be directed to another framed port. The amount of TDM data in the CESoPSN packet is an integer multiple of the basic structure size (the basic structure consists of N octets filled with the data of the corresponding NxDS0 channels belonging to same PW): N number of timeslots in the PW L packet payload size in bytes L = mxN
8-36
TDM Pseudowires
Chapter 8 Networking
Timeslot 1 Frame 1 Timeslot 2 Timeslot N Timeslot 1 Frame 2 Timeslot 2 Timeslot N Timeslot 1 Frame 3 Timeslot 2 Timeslot N Timeslot 1 Frame m Timeslot 2 Timeslot N The first structure in the packet starts immediately at the beginning of the packet payload. The timeslots to be placed into the payload do not need to be contiguous, and the payload can contain any combination of timeslots from the TDM circuit. The timeslots are placed into the payload in the same order that they occur in the TDM circuit. Maximum payload size for a CESopSN PW is up to 512 bytes. It is calculated as N number of timeslots in the PW, Where N = 8, 16, 24, 32, 40, 48, 56, 64. SAToP SAToP is used to transfer a bit stream transparently at the nominal port rate (2.048 Mbps or 1.544 Mbps). Therefore, SAToP can be used only when the port uses the unframed mode, and thus only one pseudowire can be configured per port. The SAToP packet payload consists of a user-specified number of raw TDM bytes (4 to 1440 bytes), and is treated as data payload.
Note
The SAToPSN packet overhead is large, and therefore, for efficient bandwidth utilization, the number of raw TDM bytes per packet should be as large as possible.
TDM Pseudowires
8-37
Chapter 8 Networking
The receiving end restores the original bit stream. Therefore, a SAToP pseudowire can only be directed to another unframed TDM port. Maximum payload size for a SAToP PW is as follows: E1 N 32 Where N = 18, 16, 24, 32 (payload size is an multiple integer of 32 bytes) T1 N 24 Where N = 18, 16, 24, 32 (payload size is an multiple integer of 24 bytes)
All SAToP implementations support the following payload sizes (other sizes are optional): E1 - 256 bytes T1 - 192 bytes.
Selection Guidelines for TDM Payload Bytes per Frame The pseudowire technology enables transmitting the continuous data stream generated by TDM equipment as a stream of discrete packets, having a structure suitable for transmission over packet-switched networks. This process is called packetizing. The number of TDM bytes inserted in each packet affects two important performance parameters: Bandwidth utilization efficiency. The smaller the number of TDM bytes per packet, the lower the efficiency. The overhead can be a significant fraction of the total packet when the TDM payload parameter is small. Packetizing delay and the associated delay variance. Considering that any given TDM byte is received only once per TDM frame, the rate at which TDM bytes are received for filling packets is 8000 bytes per timeslot per second. Since a packet will be sent only after its payload field has been filled, the maximum possible filling rate occurs for PWs carrying 32 timeslots (unframed mode) and a payload of 32 bytes per frame. In this case, the filling of the 32 bytes takes 1 internal TDM frame (125 ps). However, the filling time increases significantly for PWs with few timeslots; for example, a voice channel can be carried by a single-timeslot PW. Considering the nominal filling rate (approximately one byte every 0.125 msec), the filling time can easily become very significant. As a worst-case example, consider the time needed to fill a single-timeslot PW: At 32 TDM bytes per frame: approx. 4 msec At 768 TDM bytes per frame: approx. 96 msec.
The round-trip (or echo) delay for voice channels is at least twice the packetizing delay; any other delays encountered along the end-to-end transmission path only add to this minimum. Another problem introduced by packetizing is intrinsic jitter. Because the instant when a packet is filled up is usually not synchronized with its transmission to network, and occurs after an essentially random delay, some jitter is inherently introduced.
8-38
TDM Pseudowires
Chapter 8 Networking
Jitter Buffer
The packets of each pseudowire are transmitted by E5-cTDM-4 at essentially fixed intervals towards the PSN. The packets are transported by the PSN and arrive to the far end after some delay. Ideally, the PSN transport delay should be constant, meaning the packets arrive at regular intervals (equivalent to the intervals at which they were transmitted). However, in reality packets arrive at irregular intervals, because of variations in the network transmission delay. The term Packet Delay Variation (PDV) is used to designate the maximum expected deviation from the nominal arrival time of the packets at the far end device.
Note
The deviations from the nominal transmission delay experienced by packets are referred to as jitter, and the PDV is equal to the expected peak value of the jitter. However, nothing prevents the actual delay from exceeding the selected PDV value.
To compensate for deviations from the expected packet arrival time, E5-cTDM-4 uses jitter buffers that temporarily store the packets arriving from the PSN (that is, from the far end equipment) before being transmitted to the local TDM equipment, to ensure that the TDM traffic is sent to the TDM side at a constant rate. For each pseudowire, the jitter buffer must be configured to compensate for the jitter level expected to be introduced by the PSN; that is, the jitter buffer size determines the Packet Delay Variation Tolerance (PDVT). Two conflicting requirements apply: Since packets arriving from the PSN are first stored in the jitter buffer before being transmitted to the TDM side, TDM traffic suffers an additional delay. The added delay time is equal to the jitter buffer size configured by the user. The jitter buffer is filled by the incoming packets and emptied to fill the TDM stream. If the PSN jitter exceeds the configured jitter buffer size, underflow/overflow conditions occur, resulting in errors at the TDM side: A jitter buffer overrun occurs when it receives a burst of packets that exceeds the configured jitter buffer size + packetization delay. When an overrun is detected, E5-cTDM-4 clears the jitter buffer, causing an underrun. A jitter buffer underrun occurs when no packets are received for more than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is automatically filled with a conditioning pattern up to the PDVT level in order to compensate for the underrun. Then, E5-cTDM-4 starts processing the packets and emptying the jitter buffer toward the TDM side. To minimize the possibility of buffer overflow/underflow events, two conditions must be fulfilled: The buffer must have sufficient capacity. For this purpose, the buffer size can be selected by the user in accordance with the expected jitter characteristics, separately for each pseudowire, in the range of 1 to 16 ms.
TDM Pseudowires
8-39
Chapter 8 Networking
The read-out rate must be equal to the average rate at which frames are received from the network. For this purpose, the read-out rate must be continuously adapted to the packet rate, a function performed by the adaptive clock recovery mechanism of each packet processor.
Packet Loss
In order to handle packet loss and misordering, E5-cTDM-4 has a packet sequence integrity mechanism. It uses a sequence number in the control word (or in the RTP header, if used) to detect lost and misordered packets. This mechanism tracks the serial numbers of arriving packets and takes appropriate action when anomalies are detected. When lost packets are detected, the mechanism outputs filler data in order to retain TDM timing. Packets arriving in incorrect order are reordered. Misordered packets that cannot be reordered are discarded and treated as lost.
ToS
The ToS specifies the Layer 3 priority assigned to the traffic generated by this pseudowire. For IP networks, this priority is indicated by the IP type-of-service parameter for this pseudowire. The specified value is inserted in the IP TOS field of the pseudowire IP packets. When supported by an IP network, the type-of-service parameter is interpreted, in accordance with RFC 791 or RFC 2474, as a set of qualitative parameters for the precedence, delay, throughput and delivery reliability to be provided to the IP traffic generated by this pseudowire. Each network that transfers the pseudowire IP traffic can use these qualitative parameters to select specific values for the actual service parameters of the network, to achieve the desired quality of service.
OAM Protocol
The OAM protocol, supported only by packet payload version V2, is used by pseudowire emulation modules to check for a valid bundle connection: this includes checks for compatible configuration parameters at the packet processors at the two endpoints of a bundle, and detection of inactive bundle status. The bundle state information is collected by the continuous, periodic handshake between the two endpoints of a bundle, which generates little traffic, but ensures that each endpoint recognizes the connection, and that it is enabled. If no response is received by OAM packets within a predefined interval (a few tens of seconds), the bundle is declared inactive. When the use of the OAM protocol is enabled, little traffic flows until the connection between the two bundle endpoints is established: only after the connection is confirmed by the OAM exchange is transmission at the normal (full) rate started, and the bundle starts carrying traffic. In case the connection is lost, the transmitted traffic is again significantly decreased (several packets per second per connection). The OAM connectivity check also prevents network flooding if the connection is lost.
8-40
TDM Pseudowires
Chapter 8 Networking
OAM packets are identified, using the following methods: UDP/IP In accordance with source port: in this case the OAM packets run over a UDP port number that is assigned only for OAM traffic, but use the same VLAN ID and ToS of the originating connection. MEF-8 In accordance with the contents of the control word, which is included in version V2 packets (Virtual Circuit Connection Verification VCCV). The first four bits of an OAM control word are always set to 0001.
ETX-5300A uses set of flags in TDM PW control word (CW) to indicate defect conditions: L-bit TDM forward defect indication used by the local PW device to signal TDM link defects to the remove PW device M-bit Modification indication, used to change meaning of the received defects R-bit PW reverse defect indication used by the local PW device to signal PSN failures to the remote PW device.
Structure-Agnostic Mode
In the structure-agnostic mode TDM defect indications are carried within the TDM frame and passed transparently via the pseudowire connection. PSN defects are mapped to TDM defects (TDM AIS).
Figure 8-5 illustrates fault propagation in structure-agnostic mode when LOS or AIS is detected on the TDM link. In this case, remote ETX-5300A ignores or propagates the AIS condition, according to the user configuration. If the AIS is generated, the ETX-5300A sets the CW bits as follows: L-bit 1, M-bit 00. When ETX-5300A detects the CW bit settings, it generates the AIS towards the local TDM device.
L-bit = 1 M-bit = 00 LOS, AIS
AIS
PSN
AIS
TDM Device
ETX-5300
ETX-5300
TDM Device
Chapter 8 Networking
TDM Device
ETX-5300
ETX-5300
TDM Device
Figure 8-6. Structure-Agnostic Mode, PSN Failure Figure 8-7 illustrates fault propagation in structure-agnostic mode, when RDI
signal is received on the TDM interface. The RDI is carried transparently over PSN without any modification.
ETX-5300
ETX-5300
Figure 8-8. Structure-Aware Trail-Terminated Mode, TDM Failure Figure 8-9 illustrates fault propagation in structure-aware trail-terminated mode,
when persistent packet loss or jitter buffer underflow conditions are detected. ETX-5300A detects the fault condition and generates the OOS code for all DS0
8-42
TDM Pseudowires
Chapter 8 Networking
channels belonging to a specific pseudowire in the local TDM circuit. In addition, it sets the CW R-bit to 1 in all packets transmitted towards the PSN.
R-bit = 1 Packet Loss PSN OOS Code
TDM Device
ETX-5300
ETX-5300A
TDM Device
Figure 8-9. Structure-Aware Trail-Terminated Mode, PSN Failure Figure 8-10 illustrates fault propagation in structure-aware trail-terminated
mode, when RDI signal is received on the TDM interface. ETX-5300A sets the CW bits as follows: L-bit 0, M-bit 10, in all packets transmitted towards the PSN.
L-bit = 0 M-bit = 10
ETX-5300
ETX-5300
ETX-5300
ETX-5300
Figure 8-11. Structure-Aware Trail-Extended Mode, TDM Failure Figure 8-12 illustrates fault propagation in structure-aware trail-extended mode, when persistent packet loss or jitter buffer underflow conditions are detected. In this case, AIS is generated towards the local TDM device. In addition, ETX-5300A sets the CW R-bit to 1 in all packets transmitted towards the PSN. When
TDM Pseudowires
8-43
Chapter 8 Networking
ETX-5300A detects the CW bit settings, it generates the RDI towards the local TDM device.
R-bit = 1 Packet Loss AIS RDI TDM Device ETX-5300 PSN
ETX-5300
TDM Device
Figure 8-12. Structure-Aware Trail-Extended Mode, PSN Failure Figure 8-13 illustrates fault propagation in structure-aware trail-extended mode,
when RDI signal is received on the TDM interface. ETX-5300A sets the CW bits as follows: L-bit 0, M-bit 10, in all packets transmitted towards the PSN. When ETX-5300A detects the CW bit settings, it generates the RDI towards the local TDM device.
L-bit = 0 M-bit = 10
PSN
ETX-5300
ETX-5300
Adaptive Timing
For each pseudowire, the E5-cTDM-4 cards have independent adaptive clock recovery mechanisms, which recover the original timing (clock rate) of the farend source of each pseudowire. The clock recovery mechanisms can provide recovered clock signals to serve as timing references for the ETX-5300A nodal timing subsystem. The receive path of each pseudowire must use a clock recovery mechanism to recover a clock signal at the original payload transmit rate used at the far end. This mechanism is referred to as adaptive clock recovery mechanism. Each pseudowire has its own adaptive timing recovery mechanism, in accordance with the options listed in RFC 4197. The recovered pseudowire clocks can be used as timing reference signals for the nodal ETX-5300A timing subsystem; therefore, E5-cTDM-4 allows flexible timing distribution. The adaptive clock recovery mechanism estimates the average rate of the payload data received in the frames arriving from the packet-switched network. Assuming that the packet-switched network does not lose data, the average rate at which payload arrives will be equal to the rate at which payload is transmitted by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order, are replaced by special dummy packets. However, for CESoPSN and SAToPSN, packets can be reordered.
The method used to recover the payload clock of a pseudowire is based on monitoring the fill level of the selected pseudowire jitter buffer. The clock recovery mechanism monitors the buffer fill level, and generates a read-out clock
8-44
TDM Pseudowires
Chapter 8 Networking
signal with adjustable frequency. The frequency of this clock signal is adjusted to read frames out of the buffer at a rate that keeps the jitter buffer as near as possible to the half-full mark. This condition can be maintained only when the rate at which frames are loaded into the buffer is equal to the rate at which frames are removed. Therefore, the adaptive clock recovery mechanism actually recovers the original payload transmit clock. The performance of the clock recovery mechanism can be optimized for the operating environment, by specifying the following parameters: The accuracy of the original timing source, in accordance with the standard SDH/SONET terminology. The type of PSN that transports the traffic: router-based network (for example, UDP/IP) versus switch-based network (for example, Ethernet). Handling of transient conditions: even after the adaptive clock recovery mechanism reaches a stable state, temporary changes in the network delay may still occur, and be on a timescale that does not allow for the mechanism to fully readjust. To provide the best possible user experience, you can specify how to handle such transient conditions (a capability referred to as delay sensitivity): By disabling delay sensitivity, performance is optimized for accurate clock recovery. This selection is optimal for data transmission applications. By enabling delay sensitivity, performance is optimized for constant delay. This selection is optimal for voice transmission applications.
Configuring Pseudowires
A new pseudowire bundle is added by defining its number (11344), its type (connection mode) and a type of the PSN. To define and configure a pseudowire: 1. If you intend to use UDP/IP PSN type, verify that: Loopback router interface with valid IP address has been configured (see Router). The TDM I/O card has been bound to the loopback router interface, using card-type > bind loopback-address commands in the slot(14)# prompt.
2. At the config>pwe# prompt, enter the syntax illustrated in the table below. The config>pwe>pw(<pw-number>)# prompt appears.
Note
An internal E1 or T1 port becomes active only if at least one enabled pseudowire with a valid cross-connection is assigned to the port.
TDM Pseudowires
8-45
Chapter 8 Networking Task Assigning the pseudowire number, selecting the encapsulation protocol for the selected pseudowire and specifying the PSN type (selecting the type of PSN header) Command pw <pw-number> [type {cespsn-data | e1satop | t1satop ] [psn {udp-over-ip | ethernet}] Comments
PW number: 1..1344 PW type (must be configured for the first time): e1satop: SAToP, for carrying unframed E1 data streams t1satop: SAToP, for carrying unframed T1 data streams ces-psn-data: CESoPSN protocol, for carrying framed data streams udp-over-ip UDP over IP network encapsulation ethernet MEF-8 Ethernet network encapsulation
3. At the config>pwe>pw(<pw-number>)# prompt, enter the parameters specified in the table below.
Task Assigning a name to the pseudowire Specifying the PW label used in the inbound and outbound directions Command name <up to 32 characters> label [in <number>] [out < number>] Comments Using no before name deletes the pseudowire name Out PW label: For udp-over-ip: Specifies the UDP destination port number used by the pseudowire for Tx PW packets (source port for Rx PW packets) For ethernet: Specifies the Emulated Circuit ID (ECID) for Tx PW packets For udp-over-ip: Specifies the UDP source port number used by the pseudowire for the Tx PW packets (destination port for Rx PW packets) For ethernet: Specifies the expected Emulated Circuit ID (ECID) Rx PW packets
In PW label:
The allowed range is 18191. Defining the jitter buffer size jitter-buffer <value in sec> Use the shortest feasible buffer, to minimize connection latency. The allowed range is 100016000 sec, in 1-sec steps.
8-46
TDM Pseudowires
Installation and Operation Manual Task Enabling/disabling the OAM connectivity protocol for this PW Command oam Comments
Chapter 8 Networking
The selection must be compatible with the equipment at the far end of the connection For pseudowires defined on redundant internal DS1 ports, make sure to select the same OAM mode. The pseudowire OAM messaging system is also used for transferring inband loopback activation codes for T1 interfaces. no oam disables the OAM protocol.
tdm-payload <value>
A larger value increases the bandwidth utilization efficiency, but also increases the connection intrinsic latency, in particular when the bundle is configured to carry a small number of timeslots. The values are: E1 SAToP n32, n = 18, 16, 24, 32 (32, 64, 96, 128, 160, 192, 256, 512, 768, 1024) T1 SAToP n24, n = 18, 16, 24, 32 (24, 48, 72, 96, 120, 144, 168, 192, 384, 576, 768) CESoPSN Number of timeslots 8, 16, 24, 32, 40, 48, 56, 64 (up to 512 bytes)
Specifying the value for the TOS byte used on outbound traffic
Range: from 1 to 255. In accordance with RFC 2474, it is recommended to use only values which are multiples of 4. This parameter is relevant only when psn is udp-over-ip.
Selecting the response to out-of-service conditions detected at the local TDM port Assigning egress port for L2 forwarding Enabling the pseudowire
OOS conditions are reported by setting the 1 bit within the PW packet overhead
Displaying PW Statistics
ETX-5300A PWs feature the collection of statistical diagnostics, thereby allowing the carrier to monitor the transmission performance of the links. The pseudowire transmission statistics enable analysis of pseudowire traffic volume, and evaluation of the end-to-end transmission quality (as indicated by sequence errors) and jitter buffer performance. By resetting the status data at
ETX-5300A Ver. 1.0 TDM Pseudowires 8-47
Chapter 8 Networking
the desired instant, it is possible to ensure that only current, valid data is taken into consideration. To display the PW statistics: At the prompt config>slot>pwe>pw(<pw_number>)#, enter show statistics followed by parameters listed below.
Command show statistics {total | all | current} Comments current Displays the current statistics all-intervals Displays statistics for all valid intervals (without current statistics) total-counters Displays total statistics of last 96 intervals
ETX-5300A>config>pwe>pw(1)# show statistics current Current --------------------------------------------------------------Rx Packets : 354994 Tx Packets : 354995 Missing Packets : 0 Misordered Dropped Packets : 0 Reordered Packets : 0 Malformed Packets : 0 Jitter Buffer Underrun : 0
8-48
TDM Pseudowires
Chapter 8 Networking
Clearing Statistics
To clear the PW statistics: At the prompt config>pwe>pw<pw_number>)#, enter clear-statistics. The statistics for the specified PW are cleared.
Table 8-11 explains the connectivity status values of the selected pseudowire. Table 8-11. Pseudowire Connectivity Status Values
Parameter Displayed Disable Up Description
The pseudowire is disabled The pseudowire carries traffic, and both the remote and the local pseudowire endpoints receive Ethernet frames. However, there may be problems such as sequence errors, underflows, overflows, etc., which can be displayed using the Statistics function. The pseudowire reports loss of connectivity (it did not receive either OAM or data packets for 10 seconds or more; OAM link then reports loss of synchronization). This is often caused by network problems or configuration errors. The pseudowire is waiting for a timeslot assignment A failure has been detected at the local pseudowire endpoint A failure is reported by the remote pseudowire endpoint
Unavailable
TDM Pseudowires
8-49
The remote pseudowire endpoint replied to OAM packets, but there is a configuration mismatch (the configuration parameters used at two endpoints of the pseudowire are different).
To display PW configuration summary: At the config>pwe# prompt, enter the show summary command. For example:
ETX-5300A>config>pwe# show summary PW PSN Type Out Label Peer : : : : 1 UDP Over IP 1 1 : 1000 PW Type Status In Label : SAToP : Not present : 1
Jitter Buffer
Payload Size
: 24
To display PW detailed information: At the config>pwe# prompt, enter the info detail command. For example:
ETX-5300A>config>pwe# info detail name: pwe-1 peer 1 label in 22 out 33 no oam tdm-payload size 248 rate 31 jitter buffer 10000 psn-oos 1-bit egress-port svi 1 no pm-enable no shutdown
Example
To configure a pseudowire: PW number 1 PW type T1 SAToP PSN type Ethernet Out (destination) label 1 In (source) label 1 Jitter buffer 300 OAM disabled Peer 1
8-50
TDM Pseudowires
Chapter 8 Networking
Egress port SVI 1 TDM payload size 96 type t1satop psn ethernet label out 1 in 1 jitter-buffer 300 no oam peer 1 egress-port svi 1 tdm-payload 10
Note
Configuration Errors
Table 8-12 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-12. Configuration Error Messages
Message PW peer number has not been configured PW inbound label hasn't been configured PW outbound label hasn't been configured PW egress-port hasn't been configured PW TDM mandatory fields: tdm payload size/rate/jitter buffer, must be configured Peer must have a MAC assigned to it PW removal failed: PW is connected to a cross-connection PW egress-port SVI must be of type PW PW set failed: Payload size is below the minimum value PW set failed: Payload size exceeds the maximum value PW set failed: PW is connected to a cross-connection PW set failed: Maximum number of PWs already configured PW set failed: PW number exceeds maximum ETX-5300A Ver. 1.0 Description Cannot configure a pseudowire because PW peer number is missing Cannot configure a pseudowire because inbound label is missing Cannot configure a pseudowire because outbound label is missing Cannot configure a pseudowire because egress port is missing Cannot configure a pseudowire because TDM payload size, or rate, or jitter buffer values are missing Cannot configure a pseudowire because a destination peer does not have a MAC address assigned to it Cannot delete a pseudowire because it has timeslots assigned to it The SVI used by the pseudowire must be PW type Cannot configure a pseudowire because the TDM payload size is below the minimum value Cannot configure a pseudowire because the TDM payload size is above the minimum value Cannot configure a pseudowire because it has timeslots assigned to it Cannot configure a pseudowire because the maximum number of allowed PWs per chassis has been reached Cannot configure a pseudowire because its number is above the maximum allowed value (1344) TDM Pseudowires 8-51
Chapter 8 Networking Message PW set failed: PW number fails to meet minimum PW PSN type must be of type IP in order to set TOS field Egress port can only be set if PSN type is Ethernet or MPLS Egress port has not been configured Peer must have an IP assigned to it UDP mux method can only be updated if PSN type is UDPoIP PW set failed: combination of peer and outbound label should be unique PW set failed: TDM payload size or rate invalid PW set failed: A peer must be configured first PW set failed: PW label value must be unique PW set failed: Changing this parameter is not allowed Description
Cannot configure a pseudowire because its number is above the minimum allowed value (1) Only PWs with UDP/IP network encapsulation support ToS configuration Only PWs with Ethernet or MPLS network encapsulation require egress port configuration Cannot configure a pseudowire because its egress port has not been configured Cannot configure a pseudowire because its peer does not have an IP address assigned to it Only PWs with UDP/IP network encapsulation support UDP multiplexing method configuration Cannot configure a pseudowire because its peer/outbound label combination is not unique Cannot configure a pseudowire because selected TDM payload type or rate value is not valid Cannot configure a pseudowire because no PW peer has been configured yet Cannot configure a pseudowire because PW label value is already in use Cannot modify pseudowire parameters when a PW is not shut down
8.6
Cross-Connection
The cross-connect function is used to assign TDM timeslots for pseudowire connections.
Note
Factory Defaults
By default, there are no cross-connections in the ETX-5300A system.
Benefits
Cross-connects allow flexible mapping of individual DS0 channels or full DS1 streams into pseudowires.
8-52
Cross-Connection
Chapter 8 Networking
Functional Description
The ETX-5300A cross-connect matrix supports two types of cross-connect, selectable at the level of the individual E1 and T1 port: DS0 cross-connect mode used when necessary to control the routing of individual timeslots, and is therefore relevant only when using a framed mode with CESoPSN pseudowires DS1 (TDM) cross-connect mode used when necessary to transparently transfer entire E1 or T1 streams into SAToP pseudowires.
Configuring Cross-Connection
To configure a pw-tdm cross connection: 1. At the config# prompt, enter cross-connect or cr. The config>cross-connect# prompt appears. 2. Configure the cross connection as illustrated and explained below.
Task Establishing crossconnection between this pseudowire and timeslots on the ds1 port Command pw-tdm pw <pw number> ds1 <slot>/<port> [time-slots <ts list>] Comments Timeslots in a list can be separated by a comma or given as a range, for example: 1..3, 5. Using no before the command removes the cross-connection
Examples
Cross-Connection
To assign timeslots 16, 8, and 1015: PW number 1 E1 interface 1 in TDM port 1 of E5-cTDM-4 card installed in slot 1
Cross-Connection
8-53
Chapter 8 Networking
ETX-5300A>config>cross-connect# pw-tdm pw 1 e1 1/1/1 time-slots [1..6, 8..8, 10..15] To remove PW1: ETX-5300A>config>cross-connect# no pw-tdm pw 1 To display information on all assigned timeslots: ETX-5300A>config>cross-connect# info pw-tdm pw 1 e1 1/1/1 [1..31] pw-tdm pw 3 t1 2/1/1 [1..4]
Pseudowire Service
The following script illustrates the configuration of point-to-point L2 pseudowire service for unframed T1. #****************************Provisioning_I/O_TDM_Card*********************** configure slot 1 card-type sdh-sonet oc-3-ch-4 no shutdown exit all #*********************************End**************************************** #*********************Activating_Ethernet_Port_1_on_Main_Card_A************** configure port ethernet main-a/1 no shutdown exit all #*********************************End**************************************** #**************Activating_SDH_SONET_Port_1_on_TDM_Card_in_Slot_1 ************ configure port sdh-sonet 1/1 tx-clock-source domain 1 no shutdown exit all #*********************************End**************************************** #************************Configuring_Clock_Domain**************************** configure system clock domain 1 source 1 rx-port sdh-sonet 1/1 quality-level prs wait-to-restore 0 exit all #*********************************End**************************************** #*********************Configuring_Pseudowire_Peer**************************** configure peer 1 mac 00-20-d2-31-bf-01 name IPmux216 exit all #*********************************End**************************************** #*********************Configuring_Classifier_Profile************************* config flows classifier-profile classAll match-any match all exit all config flows classifier-profile class1000 match-any
8-54
Cross-Connection
Chapter 8 Networking
match vlan 1000 exit all config flows classifier-profile class2000 match-any match vlan 2000 exit all config flows classifier-profile class3000 match-any match vlan 3000 exit all config flows classifier-profile class4000 match-any match vlan 4000 exit all #*********************************End**************************************** #********************Assigning_Queue_Group_Profile***************************
configure port ethernet main-a/1 queue-group profile q_group_2_level_default exit all #*********************************End**************************************** #*************************Selecting_Classification_Key*********************** config port ethernet main-a/1 classification-key vlan p-bit exit all #*********************************End**************************************** #***********************Configuring_Marking_Profile************************** config qos marking-profile mark1 classification cos color-aware green-yellow dei mapping mark 0 green to 7 dei green mark 1 green to 6 dei green mark 2 green to 5 dei green mark 3 green to 4 dei green mark 4 green to 3 dei green mark 5 green to 2 dei green mark 6 green to 1 dei green mark 7 green to 0 dei green exit all #*********************************End**************************************** #*****************************Configuring_SVI******************************** configure port svi 1 pw name pw-dataS1 no shutdown exit all #*********************************End**************************************** #*****************************Configuring_T1********************************* configure port t1 1/1/1 line-type unframed tx-clock-source domain 1 exit all #*********************************End**************************************** #*****************************Configuring_Pseudowire************************* configure pwe
Cross-Connection
8-55
Chapter 8 Networking
pw 1 type t1satop psn ethernet label in 1 out 1 peer 1 egress-port svi 1 tdm-payload size 96 jitter-buffer 3000 no oam no shutdown exit all #*********************************End**************************************** #**************************Configuring_Cross-Connect************************* configure cross-connect pw-tdm pw 1 t1 1/1/1
exit all #*********************************End**************************************** #************************Configuring_T1_to_Ethernet_Flow********************* configure flows flow 1 classifier classAll ingress-port svi 1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 vlan-tag push vlan 1000 p-bit profile mark1 no shutdown exit all #*********************************End**************************************** #************************Configuring_Ethernet_to_T1_Flow********************* configure flows flow 2 classifier class1000 ingress-port ethernet main-a/1 egress-port svi 1 vlan-tag pop vlan no shutdown exit all #*********************************End****************************************
Configuration Errors
Table 8-13 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-13. Configuration Error Messages
Message PW XC set failed: Only one PW can be configured on an Unframed port PW XC set failed: Timeslots do not match with PW payload size and rate Description Cannot configure a timeslot cross-connection because unframed ports support only a single PW Cannot configure a timeslot cross-connection because there is a mismatch between the number of assigned timeslots and the selected PW TDM payload size or rate
8-56
Cross-Connection
Installation and Operation Manual Message PW XC set failed: The timeslot belongs to another bundle Pw-TDM cross-connection failed: Timeslot(s) out of range Pw-TDM cross-connection failed: PW type doesn't match card configured in slot PW XC set failed: card in specified slot must be of type TDM PW XC create failed: more than one multi-service card cannot use same the SVI PW XC set failed: Mismatch between port line-type (unframed) and pw type (cespsn-data) PW XC set failed: Mismatch between port line-type (framed) and pw type (SAToP) PW XC set failed: Mismatch between port interface type and PW type PW XC set failed: only 1 PW can be configured per port Description
Chapter 8 Networking
Cannot configure a timeslot cross-connection because a timeslot is already assigned to another PW Cannot configure a timeslot cross-connection because there is a mismatch between the number of timeslots and the PW type Cannot configure a timeslot cross-connection because there is a mismatch between a PW type and a card configured for the slot Cannot configure a timeslot cross-connection because an Ethernet card has been configured in the chassis slot Cannot configure a timeslot cross-connection because only one TDM card can use a single SVI Cannot configure a timeslot cross-connection because a PW type (CESoPSN) requires a framed line type Cannot configure a timeslot cross-connection because a PW type (SAToP) requires an unframed line type Cannot configure a timeslot cross-connection because there is a mismatch between an interface type (E1 or T1) and a PW type (e1satop or t1satop) Cannot configure a timeslot cross-connection because only one PW can be configured for this port type
8.7
Bridge
Standards
IEEE 802.1D, 802.1Q
Benefits
Bridge is used to deliver EPLAN and EVPLAN (any-to-any) services.
Factory Defaults
By default, no bridge instances exist in the ETX-5300A system.
Functional Description
A bridge is a forwarding entity used by ETX-5300A for delivering E-LAN services in multipoint-to-multipoint topology and G.8032 ring protection. With up to 32 bridge instances, ETX-5300A provides up to 128 bridge ports.
ETX-5300A Ver. 1.0 Bridge 8-57
Chapter 8 Networking
The bridge operates in VLAN-aware mode (IVL) with ingress filtering. It accepts tagged frames only. To be admitted to the bridge, a frames VID must be configured as a part of the bridge port VLAN member set. Untagged frames must receive a relevant VID at port ingress (tag push) or they will be dropped. The ETX-5300A bridge supports up to 4K broadcast domains (bridge/VLAN) and a MAC table with up to 256K entries. MAC table size is configurable per broadcast domain with up to 4K entries per broadcast domain. The MAC table flush is supported per bridge instance and the MAC table list is available in a file. MAC address aging time is configured per chassis in the range of 300 (default) to 3600 seconds.
Note
Bridge Model
A bridge is defined by a bridge number, bridge ports and a VLAN membership table that specifies which bridge ports are members in a certain broadcast domain (VLAN). Traffic in and out of a bridge port is configured using flows. This allows editing action at ingress and egress bridge ports. Valid and invalid bridge configurations are described below. Different flows from one physical port can be mapped to bridge ports on different bridge instances, as shown in the figure below:
Bridge Port
Bridge
Figure 8-14. Mapping Flows from the Same Physical Port to Different Bridges
However, different flows from the same physical port cannot be mapped to the same bridge port and broadcast domain (VLAN):
VID A VID B Port VID C Push C Bridge
Figure 8-15. Mapping Flows with the Same VID to One Bridge Port
Likewise, flows from the same bridge port cannot be mapped to different physical ports:
8-58
Bridge
Chapter 8 Networking
Port Bridge
Port
Figure 8-16. Mapping Flows with the Same Bridge Port to Different Physical Ports
Untagged
Push X None
VLAN X
Indirectly-attached ports: Up to 255 different bridge ports with ingress pop action can be defined
Bridge
8-59
Chapter 8 Networking
Match All
Outer VLAN X Outer VLAN X + Inner VLAN Y
Note
All flows from the same SAP must have the same classification mode.
Configuring Bridge
Bridge configuration includes the following steps: 1. Adding and configuring a bridge instance (132) 2. Binding bridge ports to SVIs 3. Adding VLANs and defining bridge ports as egress tagged VLAN members. To configure a bridge: 1. At the configure prompt, enter bridge followed by bridge number (132). A bridge instance with the specified number is created and the config>bridge(1)# prompt is displayed. 2. Configure the bridge as illustrated and explained below.
Note
Task
Defining aging time for MAC table entries (seconds) Clearing addresses in MAC table
8-60
Bridge
Installation and Operation Manual Task Configuring bridge ports, see below Configuring VLAN membership, see below Displaying MAC address table Command port <1128> no port <1128> vlan <14094> show mac-address-table all [vlan-id]
Chapter 8 Networking Comments no port (port_number), deletes a bridge port no vlan (VLAN_number), deletes a VLAN Adding VLAN ID after the show mac-address-table all displays MAC table only for selected VLAN
show vlans
The following marking actions can be performed at the port level, at the config>bridge(bridge_number)>port(port_number)# prompt.
Task Binding bridge port to a bridgetype SVI Assigning a name to bridge port Command bind svi <svi_number> no bind svi <svi_number> name <value> no name Enabling the bridge port Displaying bridge port status no shutdown show status Comments no bind svi (svi_number), unbinds bridge port from SVI no name deletes bridge port name shutdown disables the bridge port
The following marking actions can be performed at the vlan membership level, at the config>bridge(bridge_number)>vlan(vlan_number)# prompt.
Task Defining maximum MAC table size supported by the VLAN Assigning a name to VLAN Command maximum-mac-addresses <64 | 256 | 512 | 1024 | 4096> name <value> no name Defining bridge ports as egress tagged VLAN members tagged-egress<bridge_port_number> no tagged-egress <bridge_port_number> Bridge ports in a list can be separated by a comma or given as a range, for example: 1..3, 5. no before the command deletes VLAN membership for the bridge port. no name deletes VLAN name Comments
Bridge
8-61
Chapter 8 Networking
To display MAC address table: At the config>bridge(bridge_number)# prompt, enter show mac-address-table all. The MAC address table is displayed.
Note
ETX-5300A displays only first 100 entries. To view the whole MAC table, download it to your PC, using SFTP. See File Operations in Chapter 10.
ETX-5300A>config>bridge(1)# show mac-address-table all VLAN MAC Address Port Status --------------------------------------------------------------100 00:00:11:00:00:01 1 dynamic 100 00:00:11:00:00:02 1 dynamic 200 00:00:11:00:00:01 1 dynamic 200 00:00:11:00:00:02 1 dynamic 300 00:00:11:00:00:01 1 dynamic 300 00:00:11:00:00:02 1 dynamic 400 00:00:11:00:00:01 1 dynamic 400 00:00:11:00:00:02 1 dynamic
To display MAC address table for a specific VLAN: At the config>bridge(bridge_number)# prompt, enter show mac-address-table all vlan-id. The MAC address table for the selected VLAN is displayed. ETX-5300A>config>bridge(1)# show mac-address-table all vlan 100 VLAN MAC Address Port Status --------------------------------------------------------------100 00:00:11:00:00:01 1 dynamic 100 00:00:11:00:00:02 1 dynamic
8-62
Bridge
Chapter 8 Networking
To display bridge port status: At the config>bridge(bridge_number)>port(port_number)# prompt, enter show status. The bridge port status information is displayed. ETX-5300A>config>bridge(1)>port(1)# show status Name : Bridge Port-1-1 Administrative Status : Up Operational Status : UP ERP Ring : 1 East ERP Status : Forward Local SF Source : Not Applicable
Example
Flow configuration example (see Multipoint Service) includes bridge configuration procedure.
Configuration Errors
Table 8-16 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-16. Configuration Error Messages
Message Modify failed: shut down the port before modification Modify failed: bridge port is bound Modify failed: bridge port is bound to ERP Modify failed: VLAN does not exist Modify failed: no bridge ports are configured to be this VLAN members Modify failed: max number of bridge instances has been reached Modify failed: max number of VLANs has been reached Modify failed: VLAN is used for RAPS messaging in ERP Modify failed: VLAN is used as data VLAN in ERP Modify failed: VLAN index is out of range Modify failed: only bound bridge ports can be activated Description Active bridge ports cannot be modified Bound bridge ports cannot be modified ERP-bound bridge ports cannot be modified VLAN cannot be modified because it does not exist VLAN with no bridge ports attached to it cannot be modified Maximum number of bridge instances per chassis (32) has been reached Maximum number of broadcast domains (4K) has been reached VLAN cannot be modified because it is used as a messaging VLAN in ERP VLAN cannot be modified because it is used as a data VLAN in ERP VLAN numbering index is out of allowed range Bridge ports must be bound to SVIs prior to their activation
Bridge
8-63
Chapter 8 Networking Message Modify failed: bridge port must be shut down Modify failed: bridge has active ports or VLANs Modify failed: bridge port index is out of range Description
Active bridge ports cannot be modified Bridge entity has active ports or VLANs Bridge port index is out of allowed range
8.8
Router
The ETX-5300A static router is a Layer-3 interworking device that forwards traffic between its interfaces. The router is also used as a forwarding plane for UDP/IP TDM pseudowires and 1580v2 entities.
Standards
RFC 4292
Benefits
The router is used for segmenting a LAN, increasing network performance, and making packet forwarding more efficient.
Factory Defaults
By default, there is one router instance in the ETX-5300A system.
Functional Description
The ETX-5300A static router is an internal interworking device that forwards traffic between its interfaces. ETX-5300A supports a single router instance with up to 128 router interfaces (RIFs), up to 1K of routing table and up to 1000 ARP table entries. Each router interface is assigned an IP address and can be bound to one of the following: Physical port on Ethernet I/O or main card Bridge port Virtual loopback address on a router interface on a TDM pseudowire card for UDP/IP forwarding or IEEE 1588v2 master or slave entity.
A router interface can be activated only if it has active ingress and egress flows connected to it. Likewise, to delete or deactivate flows connected to a router SVI, the RIF must be deactivated first.
8-64
Router
Chapter 8 Networking
SVI SVI User BP Bridge User SVI BP BP SVI NET BP BP SVI OOB
Management
ETX-5300A can be managed via any router interface, if it is configured to accept management traffic. RIF management modes are as follows: Disabled Enable Allow only ping.
Router
8-65
Chapter 8 Networking
Notes
To enable connection of UDP/IP PW and/or 1588v2 PTP traffic, the TDM pseudowire cards and 1588v2 agents on the main cards must be allocated the same IP addresses as the corresponding loopback RIFs. Loopback router interfaces must be configured prior to using them for TDM PW or 1588v2 traffic.
Loopback interfaces are not bound to SVIs.
Configuring Router
Router configuration includes the following steps: 1. Adding a router instance 2. Add and configure router interfaces (1128). To configure a router: 1. At the configure prompt, enter router followed by router number (1). A router instance with number 1 is created and the config>router(1)# prompt is displayed. 2. Configure the router as illustrated and explained below.
Task Assigning a name to router Command name <value> no name Clearing dynamic entries from ARP table Configuring router interfaces, see below Configuring the static route and the next gateway (next hop) using the next hops IP address Displaying the address resolution protocol (ARP) table, which lists the original MAC addresses and the associated (resolved) IP addresses Displaying the router interface table clear-arp-table interface <1128> no interface <1128> static-route <IP-address/IP-mask-of-static-route> address <IP-address-of-next-hop> [metric <metric>] show arp-table no interface (port_number), deletes router interface The next hop must be a subnet of one of the router interfaces Comments no name deletes router name
show interface-table
8-66
Router
Installation and Operation Manual Task Displaying the routing table Command show routing-table
The following marking actions can be performed at the interface level, at the config>router(1)>interface(interface_number)# prompt.
Task Defining router interface to be of the loopback type Assigning an IP address and a subnet mask to the router interface Binding router interface to an SVI or out-of-band management Ethernet port Configuring interface management access Command loopback address <IP-address/IP-mask> Comments
bind svi <port-number> bind mng-ethernet <slot/port> no bind management-access {allow-all | allow-ping} no management-access
Assigning a name to the router interface Administratively enabling router interface Displaying interface status
Chapter 8 Networking
The routing table is displayed. ETX-5300A>config>router(1)# show routing-table IP Address/Mask Next Hop Port Protocol Metric --------------------------------------------------------------15.15.15.124/24 0.0.0.0 svi 1 Local 1
Example
Figure 8-18 and script below illustrate configuration of router with one router interface connected to a bridge port.
8-68
Router
Chapter 8 Networking
Port 1
Fl. 9 Fl. 10
Port 1
Fl. 12
Port 2
Port 2
Fl. 1
Port 3
Fl. 2 Fl. 3
Port 4
SVI 4
Fl. 8
Port 3
SVI 2 Fl. 4
Note
From router to main card A From router to main card B From router to bridge
One profile (VLAN 600) for traffic from main card B to router One profile (VLAN 20) for traffic:
From bridge to router From bridge to main card A From bridge to main card B From main card B to bridge.
6. Use default CoS mapping and color mapping profiles (color green, CoS CoS 0).
Router
8-69
Chapter 8 Networking
7. Configure color-aware marking profile for flows connecting BP 1 with main card A. 8. Add four router interfaces, configure their IP addresses and bind them to router-type SVIs; add static route. 9. Configure twelve flows: Flow 1 from main card A port 2 to SVI 1, untagged classifier Flow 2 from SVI 1 to main card A port 2, match all classifier Flow 3 from main card A port 3 to SVI 2, untagged classifier Flow 4 from SVI 2 to main card A port 3, match all classifier Flow 5 from main card B port 2 to SVI 3, VLAN 600 classifier, pop VLAN Flow 6 from SVI 3 to main card B port 2, match all classifier, push VLAN 600 with VID P-bit and DEI values set by marking profile Flow 7 from SVI 4 to SVI 5, match all classifier, push VLAN 20 with VID P-bit and DEI values set by marking profile Flow 8 from SVI 5 to SVI 4, VLAN 20 classifier, pop VLAN Flow 9 from SVI 6 to main card A port 1, VLAN 20 classifier Flow 10 from main card A port 1 to SVI 6, VLAN 20 classifier Flow 11 from SVI 7 to main card B port 1, VLAN 20 classifier Flow 12 from main card B port 1 to SVI 7, VLAN 20 classifier.
#**********************Enabling_Ports_on_Main_Cards************************* config port ethernet main-a/1 no shutdown exit ethernet main-a/2 no shutdown exit ethernet main-a/3 no shutdown exit ethernet main-b/1 no shutdown exit ethernet main-b/2 no shutdown exit exit all #*********************************End**************************************** #*********************Assigning_Queue_Group_Profiles************************* config port ethernet main-a/1 queue-group profile q_group_2_level_default config port ethernet main-a/2 queue-group profile q_group_2_level_default config port ethernet main-a/3 queue-group profile q_group_2_level_default config port ethernet main-b/1 queue-group profile q_group_2_level_default config port ethernet main-b/2 queue-group profile q_group_2_level_default exit all #*********************************End****************************************
8-70 Router ETX-5300A Ver. 1.0
Chapter 8 Networking
#***************************Configuring_SVIs********************************* config port svi 1 router exit all config port svi 2 router exit all config port svi 3 router exit all config port svi 4 router exit all config port svi 5 bridge exit all config port svi 6 bridge exit all config port svi 7 bridge exit all #*********************************End**************************************** #************************Configuring_Bridge_Ports**************************** config bridge 1 port 1 bind svi 5 no shutdown exit all config bridge 1 port 2 bind svi 6 no shutdown exit all config bridge 1 port 3 bind svi 7 no shutdown exit all config bridge 1 vlan 20 tagged-egress 1..3 exit all #*********************************End**************************************** #***********************Configuring_Classifier_Profiles********************** config flows classifier-profile classall match-any match all exit all config flows classifier-profile classutg match-any match untagged exit all
Router
8-71
Chapter 8 Networking
config flows classifier-profile class600 match-any match vlan 600 exit all config flows classifier-profile class20 match-any match vlan 20 exit all #*********************************End**************************************** #***********************Configuring_Marking_Profile************************** config qos marking-profile mark1 classification cos color-aware green-yellow dei mapping mark 0 green to 0 dei green exit all #*********************************End**************************************** #*******************Configuring_Router_Interfaces**************************** configure router 1 interface 1 address 10.10.52.1/24 bind svi 1 no shutdown exit all configure router 1 interface 2 address 10.10.53.1/24 bind svi 2 no shutdown exit all configure router 1 interface 3 address 10.10.62.1/24 bind svi 3 no shutdown exit all configure router 1 interface 4 address 172.18.219.180/24 bind svi 4 no shutdown exit all configure router 1 static-route 10.10.30.0/24 address 10.10.52.2 exit all #*********************************End****************************************
Configuration Errors
Table 8-17 lists the messages generated by ETX-5300A when a configuration error is detected.
8-72
Router
Chapter 8 Networking
Router
8-73
Chapter 8 Networking Message The address must be different from a router interface IP address Description
The next hop IP address of a static route must be different from a RIF IP address
8.9
ETX-5300A employs enhanced traffic engineering techniques for efficient handling of multi-priority traffic on per-flow basis. It performs pre- and/or post-forwarding traffic management (TM), using advanced queuing, shaping, policing and mapping mechanisms.
Standards
IEEE 802.1p, IEEE 802.1Q.
Benefits
Flexible Ethernet QoS and extensive TM capabilities allow ETX-5300A to offer, monitor and enforce different levels of Service Level Agreements (SLAs) for various service types.
Factory Defaults
Refer to the following sections for the specific default for each type of QoS.
Functional Description
Appendix B details QoS capabilities of ETX-5300A, discussing the following:
Traffic management (queues, queue blocks, queue groups, shaping and congestion avoidance) CoS mapping Ingress color mapping Policing Marking.
This QoS section describes profile creation, gives default profiles (where applicable), and provides a configuration example.
Traffic Management
ETX-5300A devices employ various traffic engineering techniques to optimize service delivery and ensure end-to-end QoS. They enable multi-criteria traffic classification as well as metering, policing and shaping to rate-limit user traffic according to CIR and EIR profiles.
8-74
Chapter 8 Networking
A 3-level hierarchical scheduling mechanism combines strict priority and weighted fair queue scheduling to handle different types of traffic. Weighted random early detection (WRED) policy is used for intelligent queue management and congestion avoidance.
Shaper
Traffic coming from level-0 internal queues and from level-0, -1 and -2 queue blocks, is shaped to smooth out bursts and avoid buffer overruns in subsequent network elements. At this stage, output packets from each buffer block undergo a shaping function so that the overall traffic volume from each block does not exceed a preset bandwidth value. Shaping is performed according to a single or dual token bucket algorithm (see Traffic Management in Appendix B for details). Traffic shaping is performed by creating shaper profiles with the following bandwidth parameters: Committed Information Rate (CIR): The bandwidth that the service provider guarantees the enterprise, regardless of network conditions. Excess Information Rate (EIR): The bandwidth allowance for best effort delivery, for which service performance is not guaranteed and traffic may be dropped if the network is congested. Committed Burst Size (CBS): The maximum size, expressed in bytes, of a burst of back-to-back Ethernet frames for guaranteed delivery. Excess Burst Size (EBS): The maximum size of a burst of back-to-back Ethernet frames permitted into the network without performance guarantees. EBS frames may be queued or discarded if bandwidth is not available.
Defined shaper profiles (up to 256 per chassis) are assigned to relevant scheduling elements (SE). Traffic Management in Appendix B details the ETX-5300A SEs and shapers supported by them. Single-rate shapers are defined with CIR/CBS values only; dual-rate shapers have both CIR/CBS and EIR/EBS values. Shaper bandwidth values are different for pre-forwarding (ingress) and postforwarding (egress) traffic management.
Pre-Forwarding (Ingress) TM CIR 01 Gbps CBS 064 kbyte Post-Forwarding (Egress) TM CIR/EIR 0.256 kbps 10 Gbps CBS/EBS 0, 10512 kbyte
Factory Defaults
By default, there are no shaper profiles in the system.
Configuring Shaper
To define a shaper profile: 1. At the configure>qos# prompt, enter shaper-profile followed by profile name. The config>qos>shaper-profile(profile_name)$ prompt is displayed. 2. Configure the shaper profile as illustrated and explained below.
ETX-5300A Ver. 1.0 Quality of Service (QoS) 8-75
Chapter 8 Networking
3. Assign the shaper profile to a relevant scheduling element (internal queue or queue block within queue group).
Note
Task
Defining CIR, EIR data rate and CBS, EBS burst rate
Compensating for Layer-1 overhead and additional VLAN tag (in bytes)
compensation <063>
Example
See the Example at the end of the Traffic Management section
Configuration Errors
Table 8-18 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-18. Configuration Error Messages
Message Illegal value Shaper/policer profile is in use and cannot be changed/deleted Shaper/policer profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Illegal indices for bandwidth profile Description The value entered for the parameter is not valid The shaper profile is being used by a queue or queue block; or policer profile is being used by a flow. Remove the association to delete or modify a shaper/policer profile. The maximum number of profiles (128) has been reached and no additional shaper/policer profiles can be added The shaper/policer mapping profile name is not unique The profile name cannot be changed because the profile is in use The values entered for the bandwidth profile are not valid
8-76
Chapter 8 Networking
A congestion control policy is defined by a WRED profile attached to an internal queue (level-0 SE only). A WRED profile includes two curves, one for green and one for yellow packets. You can configure up to eight WRED profiles per chassis. A profile includes the following parameters: Minimum threshold: a percentage of the maximum queue depth. If a packet is queued and the queue size is between 0 and minimum threshold, the packet is admitted. Maximum threshold: a percentage of the maximum queue depth. If a packet is queued and the queue size is between the minimum threshold and the maximum threshold, the packet is dropped according to the drop probability of the particular queue size. Maximum drop probability: a percentage of the maximum threshold queue size that defines the drop probability.
Min Threshold
Max Threshold
100%
Queue Depth
Factory Defaults
By default, ETX-5300A provides one WRED profile (DefaultWREDProfile) with the following settings: Green packets Minimum threshold 100% Maximum threshold 100% Maximum probability 100%
Yellow packets: Minimum threshold 70% Maximum threshold 85% Maximum probability 100%.
8-77
Chapter 8 Networking
Configuring WRED
To define a WRED profile: 1. At the configure>qos# prompt, enter wred-profile followed by profile name. The config>qos>wred-profile(profile_name)$ prompt is displayed. 2. Configure the WRED profile as illustrated and explained below. 3. Assign WRED profile to an internal scheduling queue (see Internal Queue below).
Note
Task
Example
See Example at the end of the Traffic Management section
Configuration Errors
Table 8-19 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-19. Configuration Error Messages
Message Illegal value WRED profile is in use and cannot be changed/deleted WRED profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Default WRED profile cannot be changed/deleted Description The value entered for the parameter is not valid The WRED profile is being used by an internal queue. Remove the queue association to delete or modify WRED profile. The maximum number of profiles (8) has been reached and no additional WRED profiles can be added The WRED profile name is already in use The profile name cannot be changed because the profile is in use It is not possible to modify or delete a default WRED profile
Internal Queue
Internal queues are tier-1 scheduling elements of ETX-5300A, that use strict or WFQ scheduling techniques. They have shaper and WRED profiles assigned to them, and, at a later stage, they are combined into queue blocks. ETX-5300A supports up to 16K of internal queue profiles per chassis.
8-78
Chapter 8 Networking
For a detailed explanation of ETX-5300A scheduling elements, see the Traffic Management section in Appendix B.
Factory Defaults
By default, ETX-5300A provides the following internal queue profiles: DefaultStrictInternalQ Strict scheduling WRED profile DefaultWREDProfile
Note
Using no before queue-internal-profile (profile _name) deletes the internal queue profile.
Command congestion-avoidance wred profile <wred-profile-name> no congestion-avoidance wred Comments You can assign a user-defined or default (DefaultWREDProfile) to the internal queue. no congestion-avoidance wred removes a WRED profile association.
Example
See Example at the end of the Traffic Management section
8-79
Chapter 8 Networking
Queue Block
The queue block is a tier-2 scheduling element in the ETX-5300A traffic management system. It consists of internal queues, and, in turn, serves as part of a tier-3 element a queue group. The Traffic Management section in Appendix B describes level-0, level-1 and level-3 queue blocks, and details their relationships to different types of queue groups.
Factory Defaults
ETX-5300A provides several queue block profiles, depending on the queue group types that use them. The Traffic Management section in Appendix B describes default the queue block profiles. The default queue block profiles are as follows: q_block_4_WFQ_4_SP_default q_block_8_queue_WFQ_default q_block_64_queue_WFQ_default q_block_16_queue_WFQ_default q_block_50_queue_WFQ_default q_block_4_SP_default.
Note
The number of internal queues per queue block is different for different types of queue block.
The config>qos>queue-block-profile(profile_name)>queue(queue_number)$ prompt is displayed. 4. Assign an internal queue profile to each internal queue within the queue block (see internal-profile in table below). 5. Assign the queue block to a queue group and bind it to a queue within a higher queue block (see Queue Group below).
Note
profile.
Using no before queue (queue_number) deletes the queue from the queue
block.
8-80
Installation and Operation Manual Task Assigning an internal queue profile to the queue within the queue block Command internal-profile profile <internal_profile_name> no internal-profile
Chapter 8 Networking Comments no internal-profile removes an internal queue profile association from the queue within the queue block
Example
See Example at the end of the Traffic Management section.
Queue Group
Queue group is a tier-3 scheduling element in the ETX-5300A traffic management system. Queue groups perform pre- and post-forwarding (ingress and egress) traffic management and are subdivided into the different types, as explained in the Traffic Management section of Appendix B.
Factory Defaults
ETX-5300A provides several queue group profiles, depending group type. Traffic Management section in Appendix B describes default queue group profiles. The default queue group profiles are as follows: q_group_2_level_default q_group_3_level_default q_group_3_level_768_default q_group_SAG_2_level_default.
Note
The queue block number depends on the queue group type that the queue
block belongs to. Traffic Management in Appendix B details the exact numbers of queue blocks supported by different queue group types.
The queue blocks must be added sequentially (queue-block 0/1, queue-block
0/2 etc).
8-81
Chapter 8 Networking
The config>qos>queue-group-profile(profile_name)>queue-block(level/ID)# prompt is displayed. 4. Enter all necessary commands according to the tasks listed below. 5. If you wish to configure another queue block, type exit to return to the queue group profile context, and start again.
Note
Using no before queue-block (queue_block_name) deletes the queue block from the queue group.
6. Alternatively, you can create a new queue group by copying parameters from an existing one. Use the inherited-from command in the queue-group-profile(profile_name) prompt, followed the name of the queue group from which you want to copy parameters.
Task Assigning a name to the queue block Assigning a queue block profile Binding a queue block to a queue in the next-level queue block
Comments
profile <queue_block_profile> bind queue <queue_number> block <level/number> Level-2 (highest) queue block cannot be bound to anything
Example
See Example at the end of the Traffic Management section.
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-20. Queue Configuration Error Messages
Message Illegal value Internal queue profile is in use and cannot be changed/deleted Queue block profile is in use and cannot be changed/deleted Only first 4 internal queues in the queue block can be strict Dual shaper cannot be bound Profile does not exist Description The value entered for the parameter is not valid The internal queue profile is being used by a queue block. Remove the queue block association to delete or modify an internal queue profile. The queue block profile is being used by a queue group. Remove the queue group association to delete or modify a queue block profile. The first four internal queues in a queue block must use a strict priority mechanism Use single-rate shaper The selected profile does not exist
8-82
Installation and Operation Manual Message Profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Default profile cannot be changed/deleted Illegal indices for profile Illegal CIR value in shaper Illegal CBS value in shaper Illegal EIR value in shaper Illegal EBS value in shaper Illegal shaper compensation value Queue block name is already in use at the same level Source group queue group profile for inherit action does not exist Specified queue group profile does not exist Next level queue block does not exist Assigned internal queue does not exist Internal queue is already in use by another queue bock Assigned queue block cannot be deleted Queue group profile cannot be added, max number of profiles has been reached Internal queue mismatch in level-0 queue block Strict internal queues cannot be assigned to level-1 and level-2 queue blocks Description
Chapter 8 Networking
The maximum number of internal queue profiles has been reached and no additional profiles can be added The queue profile name is not unique The profile name cannot be changed because the profile is in use It is not possible to modify or delete a default queue profile The values entered for a profile are not valid The CIR value entered is not valid for a shaper assigned to a specific scheduling element The CBS value entered is not valid for a shaper assigned to a specific scheduling element The EIR value entered is not valid for a shaper assigned to a specific scheduling element The EBS value entered is not valid for a shaper assigned to a specific scheduling element The compensation value entered is not valid for a shaper assigned to a specific scheduling element A queue block with the same name already exist in the same level Indicates an attempt to use a non-existing queue group profile as a source for a new queue group profile Indicates an attempt to use a non-existing queue group profile Indicates an attempt to bind a queue block profile to a queue in a next-level queue block that does not exist Indicates an attempt to bind a non-existing internal queue a queue block Indicates an attempt to bind an internal queue already in use to a queue block A queue block cannot be deleted while it is assigned to a queue group. The maximum number of queue group profiles has been reached and no additional profiles can be added Invalid queue combination in a level-0 queue block Level-1 and level-2 queue blocks can have only WFQ queues
8-83
Chapter 8 Networking Message WRED profiles cannot be assigned to internal queues in level-1 and level-2 queue blocks Green or yellow color settings are missing from WRED profile Strict internal queues are missing from level 0 queue block WFQs are missing from level 0 queue block Illegal weight value for internal queues in level 0 queue block Illegal weight value for internal queues in level 1 queue block Illegal number of internal queues Dual shaper cannot be bound to level 0 queue block Dual shaper cannot be bound to level 1 queue block Cannot be bound to internal queues in level-1 and level-2 queue blocks Description
Internal queues in level-1 and level-2 queue blocks cannot have WRED profiles assigned to them No color values are defined in a WRED profile assigned to an internal queue Mandatory internal queues with strict priority have not been assigned to a level-0 queue block. Mandatory internal queues with WFQ priority have not been assigned to a level-0 queue block The weight values entered are not valid for internal queues with WFQ priority in a level-0 queue block The weight values entered are not valid for internal queues with WFQ priority in a level-1 queue block The number of internal queues defined in a queue block is not valid Dual shaper profiles cannot be assigned to a level 0 queue block in an ingress (pre-forwarding) queue group Dual shaper profiles cannot be assigned to a level 1 queue block in an ingress (pre-forwarding) queue group Shaper profiles cannot be assigned to internal queues in level-1 and level-2 queue blocks
CoS Mapping
User priorities must be mapped to internal Class of Service (CoS) values, according to P-bit, DSCP, IP Precedence or per flow criteria, as detailed in Appendix B. The newly defined CoS can then be used for: P-bit handling during VLAN editing Queue mapping.
In other words, each packet is first normalized to a CoS value (07), this CoS is then used for VLAN editing (P-bit) or priority queue mapping.
CoS Mapping Profiles to map packet to CoS: Ingress Traffic P-bit to CoS (07) DSCP to CoS (07) IP Precedence to CoS (07) Flow to CoS CoS to P-bit (VLAN Editing) Profiles to map: CoS to P-bit
The CoS Mapping section in Appendix B gives detailed description of CoS mapping methods supported by directly- and indirectly-attached ports, according to a classification key used for traffic classification.
8-84
Chapter 8 Networking
Factory Defaults
ETX-5300A has three default profiles for P-bit to CoS, IP Precedence to CoS, and DSCP to CoS mapping. These profiles are part of 36 CoS mapping profiles supported per system. CoS Mapping section in Appendix B describes the default CoS mapping profiles.
Note
Example
See Example at the end of the Traffic Management section.
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration
error is detected.
8-85
Chapter 8 Networking
Color Mapping
ETX-5300A supports an ingress color mapping mechanism as part of its traffic policing features. The mechanism inspects incoming packets and assigns a green or yellow color value according to the configured color mapping profiles. The following mapping profiles are supported: P-bit to color DSCP to color IP Precedence to color DEI to color (fixed mapping, 0 to green and 1 to yellow) Flow to color Mark all green (default).
ETX-5300A supports up to 36 ingress color mapping profiles (12 of each type). Packet color is also used by WRED mechanism for preventing congestion and for setting DEI value during VLAN editing. The ingress color mapping method for both directly- and indirectly-attached ports depends on the classification key used for the port. See Ingress Color Mapping in Appendix B for details.
Note
For directly-attached ports, color and CoS mapping methods, applied to the same flow, must belong to the same color-CoS-mapping combination, as detailed in the CoS Mapping section of Appendix B.
Factory Defaults
By default, ETX-5300A marks all incoming packets as green.
Note
Note
Example
See Example at the end of the Traffic Management section.
8-86 Quality of Service (QoS) ETX-5300A Ver. 1.0
Chapter 8 Networking
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-22. Configuration Error Messages
Message Illegal value Color mapping profile is in use and cannot be changed/deleted Color mapping profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Max number of profiles using one color mapping method has been reached Description The value entered for the parameter is not valid The color mapping profile is being used by a flow. Remove the flow association to delete or modify the color mapping profile. The maximum number of profiles (36) has been reached and no additional color mapping profiles can be added The color mapping profile name is not unique The profile name cannot be changed because the profile is in use The maximum number of profiles (12) using the same color mapping method (P-bit to color, DSCP to color, etc.) has been reached
Policing
When the flows are established, a metering and policing function can be applied for each ingress flow on indirectly-attached ports to regulate traffic according to the contracted CIR, EIR, CBS and EBS bandwidth profiles. Rate limitation is performed according to the Dual Token Bucket mechanism (two rates, three colors) in color-aware or color-blind modes. The final color of a packet is determined by a policer (color-aware or color-blind). If a policer is not applied on a specific flow, the ingress color mapping determines packet color. Policing is implemented by defining policer bandwidth profiles and assigning them to one or more (up to 16) flows (aggregate policer profile) . ETX-5300A supports up to 128 policer bandwidth profiles (regular and aggregate) with up to: 2K policer instances per each Ethernet I/O card
Note
Flows from different I/O port groups (110, 1120) of the E5-GBE-20 card and flows from different ports of the E5-10GBE-2 card cannot share the same aggregate policer.
Factory Defaults
By default, ETX-5300A does not have policer profiles.
8-87
Chapter 8 Networking
Compensating for Layer-1 overhead and additional VLAN tag (in bytes) Enabling coupling flag to control the volume of yellow packets
coupling-flag no coupling-flag
8-88
Chapter 8 Networking
Example
See the Multiple CoS Point-to-Point Service example in the section Flows above. This example shows how to create four policer profiles to allocate bandwidth to four flows (1114).
Configuration Errors
Table 8-23 lists the messages generated by ETX-5300A when a policer configuration error is detected. Table 8-24 lists the messages generated by ETX-5300A when a policer aggregate configuration error is detected. Table 8-23. Policer Configuration Error Messages
Message Illegal value Shaper/policer profile is in use and cannot be changed/deleted Shaper/policer profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Illegal indices for bandwidth profile Description The value entered for the parameter is not valid The shaper profile is being used by a queue or queue block; or the policer profile is being used by a flow. Remove the association to delete or modify a shaper/policer profile. The maximum number of profiles (128) has been reached and no additional shaper/policer profiles can be added The shaper/policer mapping profile name is not unique The profile name cannot be changed because the profile is in use The values entered for the bandwidth profile are not valid
Marking
Marking profiles map CoS and packet color values into egress priority tags. The marking is done per color (green and/or yellow) to support color re-marking, and
8-89
Chapter 8 Networking
optionally the Drop Eligible Indicator (DEI) bit is specified in the frame header. ETX-5300A supports up to 16 color-aware and color-blind marking profiles. A color-aware profile translates CoS (07) and packet color (all, green, yellow) into P-bit (07) and DEI (yellow, green) values A color-blind profile translates CoS (07) into P-bit (07) and DEI (yellow, green) values.
Note
Factory Defaults
By default, ETX-5300A does not have any marking profiles.
Example
See Multiple CoS Point-to-Point Service example in the Flows section above. This example shows how to create color-aware marking profile.
8-90
Chapter 8 Networking
Configuration Errors
Table 8-25 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-25. Configuration Error Messages
Message Illegal value Color mapping profile is in use and cannot be changed/deleted Marking profile cannot be added, max number of profiles has been reached Profile name must be unique Profile name cannot be changed Illegal marking profile method Mark value in marking profile is out of range Description The value entered for the parameter is not valid The color mapping profile is being used by a flow. Remove the flow association to delete or modify color mapping profile. The maximum number of profiles (16) has been reached and no additional marking profiles can be added The marking profile name is not unique The profile name cannot be changed because the profile is in use The selected marking method is not supported The selected mark valuemust be within the range 07
Example
This example shows how to create multiple CoS point-to-point service with traffic management. Traffic management is performed using a 3-level queue group, illustrated in Figure 8-20.
ETX-5300A Ver. 1.0 Quality of Service (QoS) 8-91
Chapter 8 Networking
To configure multiple CoS point-to-point service: 1. Configure single- and dual rate shaper profiles. 2. Configure WRED profiles with a small queue depth for delay-sensitive highpriority queues. The rest of the queues use the default WRED profile, or do not provide congestion avoidance, such as level-1 and level-2 queue blocks. 3. Define internal queue profiles, specifying their scheduling types, shaping and WRED profiles (where applicable). 4. Configure level-0, level-1 and level -2 queue block profiles with queues, using internal queue profiles. 5. Define the queue group profile, adding queue blocks to the group, binding the queue blocks to the next level queues and assigning the relevant shaper profiles. Queue blocks are added to queue groups in the reverse order: level-2 > level-1 > level 0. 6. Assign the queue group to the main card ports. 7. Select classification keys for the main card ports. 8. Enable the main card ports. 9. Configure 12 VLAN-type classifier profiles. 10. Configure the CoS mapping profile to map user priorities to internal CoS values. 11. Configure the color mapping profile to map user color to internal color values. 12. Configure 12 flows from port 1 to port 2 on the main card and direct them to the relevant level-0 queue blocks.
8-92
Chapter 8 Networking
q_block_4_WFQ_4_SP_10_40 CIR Shapers WR.1 WR.1 Flow 10 WR.1 WR.1 Def. WR. Def. WR. Def. WR. Def. WR. SP 1 SP 2 SP 3 SP4 WFQ 10 WFQ 20 WFQ 30 WFQ 40 Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 2 Sh. 4 0/2 CIR/EIR Shapers Level-1 SEs q_block_11_queue_WFQ_10_20_30 1/1 WFQ 10 WFQ 20 WFQ 30 CIR/EIR Shapers
q_block_4_WFQ_4_SP_40_10 CIR Shapers WR.1 WR.1 WR.1 Flow 20 WR.1 Def. WR. Def. WR. Def. WR. Def. WR. SP 1 SP 2 SP 3 SP4 WFQ 40 WFQ 30 WFQ 20 WFQ 10 Sh. 7 Sh. 3 Sh. 7 Sh. 7 Sh. 7 Sh. 7 CIR/EIR Shapers Level-2 SE q_block_21_queue_WFQ_10_20 2/1 WFQ 10 WFQ 20 Sh. 6 0/3
CIR Shaper
q_block_4_WFQ_4_SP_10_40 CIR Shapers WR.1 WR.1 WR.1 Flow 30 WR.1 Def. WR. Def. WR. Def. WR. Def. WR. SP 1 SP 2 SP 3 SP4 WFQ 10 WFQ 20 WFQ 30 WFQ 40 q_block_11_queue_WFQ_10_20 1/2 CIR/EIR Shapers WFQ 10 WFQ 20 Sh. 5 SP 1 SP 2 SP 3 SP4 WFQ 10 WFQ 20 WFQ 30 WFQ 40 Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 1 CIR/EIR Shapers Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 7 Sh. 3 CIR/EIR Shapers 0/4
q_block_4_WFQ_4_SP_10_40 CIR Shapers WR.1 WR.1 WR.1 Flow 40 WR.1 Def. WR. Def. WR. Def. WR. Def. WR. 0/5
Chapter 8 Networking
************************Configuring_Shaper_Profiles************************** config qos shaper-profile sh1 bandwidth cir 10000 cbs 100000 eir 50000 ebs 200000 config qos shaper-profile sh2 bandwidth cir 20000 cbs 100000 eir 50000 ebs 200000 config qos shaper-profile sh3 bandwidth cir 30000 cbs 100000 eir 50000 ebs 200000 config qos shaper-profile sh4 bandwidth cir 60000 cbs 100000 eir 20000 ebs 200000 config qos shaper-profile sh5 bandwidth cir 40000 cbs 100000 eir 30000 ebs 200000 config qos shaper-profile sh6 bandwidth cir 130000 cbs 100000 config qos shaper-profile sh7 bandwidth cir 1000 cbs 100000 eir 5000 ebs 200000 exit all #*********************************End**************************************** **************************Configuring_WRED_Profiles************************** config qos wred-profile 1 color green min 30 max 30 probability 100 config qos wred-profile 1 color yellow min 20 max 30 probability 100 #*********************************End**************************************** **********************Configuring_Internal_Queue_Profiles******************** config qos queue-internal-profile qstrict congestion-avoidance wred profile 1 scheduling strict shaper profile sh7 exit all config qos queue-internal-profile q10 congestion-avoidance wred profile DefaultWREDProfile scheduling wfq 10 shaper profile sh7 exit all config qos queue-internal-profile q20 congestion-avoidance wred profile DefaultWREDProfile scheduling wfq 20 exit all config qos queue-internal-profile q30 congestion-avoidance wred profile DefaultWREDProfile scheduling wfq 30 exit all config qos queue-internal-profile q40 congestion-avoidance wred profile DefaultWREDProfile scheduling wfq 40 exit all config qos queue-internal-profile q10_no_wred scheduling wfq 10 exit all config qos queue-internal-profile q20_no_wred
8-94 Quality of Service (QoS) ETX-5300A Ver. 1.0
Chapter 8 Networking
scheduling wfq 20 exit all config qos queue-internal-profile q30_no_wred scheduling wfq 30 exit all config qos queue-internal-profile q40_no_wred scheduling wfq 40 exit all #*********************************End**************************************** #**************************************************************************** *********************Configuring_Queue_Block_Profiles************************ #**************************************************************************** #*******************Configuring_Queue_Block_Profile_L2-1********************* config qos queue-block-profile "q_block_21_queue_WFQ_10_20" queue 1 internal-profile profile q10_no_wred queue 2 internal-profile profile q20_no_wred exit all #*********************************End**************************************** #********************Configuring_Queue_Block_Profile_L1-1******************** config qos queue-block-profile "q_block_11_queue_WFQ_10_20_30" queue 1 internal-profile profile q10_no_wred queue 2 internal-profile profile q20_no_wred queue 3 internal-profile profile q30_no_wred exit all #*********************************End**************************************** #*********************Configuring_Queue_Block_Profile_L1-2******************* config qos queue-block-profile "q_block_12_queue_WFQ_10_20" queue 1 internal-profile profile q10_no_wred queue 2 internal-profile profile q20_no_wred exit all #*********************************End**************************************** #**********************Configuring_Queue_Block_Profile_L0-1****************** config qos queue-block-profile "q_block_4_WFQ_4_SP_10_40" queue 1 internal-profile profile qstrict queue 2 internal-profile profile qstrict queue 3 internal-profile profile qstrict queue 4 internal-profile profile qstrict queue 5 internal-profile profile q10 queue 6 internal-profile profile q20 queue 7 internal-profile profile q30 queue 8 internal-profile profile q40 exit all #*********************************End**************************************** #**********************Configuring_Queue_Block_Profile_L0-2****************** config qos queue-block-profile "q_block_4_WFQ_4_SP_40_10" queue 1 internal-profile profile qstrict queue 2 internal-profile profile qstrict queue 3 internal-profile profile qstrict queue 4 internal-profile profile qstrict queue 5 internal-profile profile q40
8-95
Chapter 8 Networking
queue 6 internal-profile profile q30 queue 7 internal-profile profile q20 queue 8 internal-profile profile q10 exit all #*********************************End**************************************** #********************* Configuring_Queue_Group_Profile1********************** configure qos queue-group-profile 3level_1 queue-block 2/1 name "3Level_2_1" profile "q_block_21_queue_WFQ_10_20" shaper profile sh6 exit queue-block 1/1 name "3Level_1_1" profile "q_block_11_queue_WFQ_10_20_30" bind queue 1 queue-block 2/1 shaper profile sh4 exit queue-block 1/2 name "3Level_1_2" profile "q_block_12_queue_WFQ_10_20" bind queue 2 queue-block 2/1 shaper profile sh5 exit queue-block 0/1 name "3Level_0_1" profile "q_block_4_WFQ_4_SP_10_40" bind queue 1 queue-block 1/1 shaper profile sh1 exit queue-block 0/2 name "3Level_0_2" profile "q_block_4_WFQ_4_SP_10_40" bind queue 2 queue-block 1/1 shaper profile sh2 exit queue-block 0/3 name "3Level_0_3" profile "q_block_4_WFQ_4_SP_40_10" bind queue 3 queue-block 1/1 shaper profile sh3 exit queue-block 0/4 name "3Level_0_4" profile "q_block_4_WFQ_4_SP_10_40" bind queue 1 queue-block 1/2 shaper profile sh3 exit
8-96
Chapter 8 Networking
queue-block 0/5 name "3Level_0_5" profile "q_block_4_WFQ_4_SP_10_40" bind queue 2 queue-block 1/2 shaper profile sh1 exit all #*********************************End**************************************** #**********************Assigning_Queue_Group_to Main_Card_Ports************** config port ethernet main-b/1 queue-group profile 3level_1 config port ethernet main-b/2 queue-group profile 3level_1 exit all #*********************************End**************************************** #***********************Defining_Classification_Keys************************* config port ethernet main-b/1 classification-key vlan p-bit config port ethernet main-b/2 classification-key vlan p-bit exit all #*********************************End**************************************** #*************************Enabling_Main_Card_Ports*************************** config port ethernet main-b/1 no shutdown config port ethernet main-b/2 no shutdown exit all #*********************************End**************************************** #***********************Defining_Classifier_Profiles************************* config flows classifier-profile class100 match-any match vlan 100 exit all config flows classifier-profile class101 match-any match vlan 101 exit all config flows classifier-profile class102 match-any match vlan 102 exit all config flows classifier-profile class103 match-any match vlan 103 exit all config flows classifier-profile class104 match-any match vlan 104 exit all config flows classifier-profile class105 match-any match vlan 105 exit all config flows classifier-profile class106 match-any match vlan 106 exit all config flows classifier-profile class107 match-any match vlan 107 exit all config flows classifier-profile class200 match-any match vlan 200 exit all
8-97
Chapter 8 Networking
config flows classifier-profile class300 match-any match vlan 300 exit all config flows classifier-profile class400 match-any match vlan 400 exit all config flows classifier-profile class500 match-any match vlan 500 exit all #*********************************End**************************************** #************************Configuring_CoS_Mapping_Profile********************* config qos cos-map-profile cos7_0 classification p-bit map 0 to-cos 7 map 1 to-cos 6 map 2 to-cos 5 map 3 to-cos 4 map 4 to-cos 3 map 5 to-cos 2 map 6 to-cos 1 map 7 to-cos 0 exit all #*********************************End**************************************** #*********************** Configuring_Color_Mapping_Profile******************* config qos color-map-profile color_all_green classification p-bit map 0 to green map 1 to green map 2 to green map 3 to green map 4 to green map 5 to green map 6 to green map 7 to green exit all #*********************************End**************************************** #***************************Configuring_Flows******************************** configure flows flow 1 classifier class100 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 2 classifier class101 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1
8-98
Chapter 8 Networking
no shutdown exit all configure flows flow 3 classifier class102 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 4 classifier class103 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 5 classifier class104 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 6 classifier class105 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 7 classifier class106 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 8 classifier class107 cos-mapping profile cos7_0
ETX-5300A Ver. 1.0 Quality of Service (QoS) 8-99
Chapter 8 Networking
ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all configure flows flow 10 classifier class200 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/2 no shutdown exit all configure flows flow 20 classifier class300 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/3 no shutdown exit all configure flows flow 30 classifier class400 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/4 no shutdown exit all configure flows flow 40 classifier class500 cos-mapping profile cos7_0 ingress-color profile color_all_green ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/5 no shutdown exit all #*********************************End************************************
8-100
Chapter 8 Networking
Standards
IEEE 802.1ag-D8, ITU-T Y.1731
Factory Defaults
By default, OAM functionality is disabled.
Functional Description
OAM (Operation, Administration, and Maintenance) describes the monitoring of network operation by network operators. OAM is a set of functions used by the user that enables detection of network faults and measurement of network performance, as well as distribution of fault-related information. OAM may trigger control plane or management plane mechanisms, by activating rerouting or by raising alarms, for example, but such functions are not part of the OAM itself. OAM functionality ensures that network operators comply with QoS guarantees, detect anomalies before they escalate, and isolate and bypass network defects. As a result, the operators can offer binding service-level agreements.
OAM Elements
The Ethernet OAM mechanism monitors connectivity in Maintenance Association (MA) groups, identified by a Maintenance Association Identifier (MAID). Each maintenance association consists of two or more maintenance end points (MEP). Every MA belongs to a maintenance domain (MD), and inherits its level from the MD to which it belongs. The MD levels are used to specify the scope of the MA (provider, operator, customer, etc). Maintenance Domain (MD) The network or the part of the network for which faults in connectivity can be managed. Each maintenance domain has an MD level attribute which designates the scope of its monitoring. Maintenance Association (MA) A set of MEPs, each configured with the same MAID and MD level, established to verify the integrity of a single service instance. Maintenance End Point (MEP) An actively managed CFM entity. A MEP is both an endpoint of a single MA, and an endpoint of a separate Maintenance Entity for each of the other MEPs in the same MA. A MEP generates and receives CFM PDUs and tracks responses. Maintenance Intermediate Point (MIP) Created in the middle of the domain. Unlike MEPs, MIPs are passive points, responding only when triggered by CFM
Ethernet OAM 8-101
Chapter 8 Networking
trace route and loopback messages. A MIP consists of two MIP Half Functions (MHFs).
OAM Functions
RADs carrier Ethernet aggregation and demarcation devices feature a comprehensive hardware-based Ethernet OAM and performance monitoring for SLA assurance: End-to-end Connectivity Fault Management (CFM) per IEEE 802.1ag: Continuity check (CC) Non-intrusive loopback Link trace for fault localization
End-to-end service and performance monitoring per ITU-T Y.1731 Loss measurement (single-ended) Delay measurement (two-way).
Note
Loss measurement is supported only if the MEP-connected flows have their statistic counters enabled (PM-enabled).
OAM Connectivity
Figure 8-21 shows how the various levels of OAM sessions supported by RAD equipment allow each entity to monitor the layers under its responsibility and easily isolate problems. The Maintenance Entities (MEs) are created at different levels:
Lowest-level OAM session (subscriber ME) between two subscriber devices (devices 1 and 8). ETX-2xxA devices serve as a MIPs End-to-end OAM session (EVC ME) between two ETX-2xxAs, which serve as MEPs. ETX-5300A devices act as MIPs. Segment OAM session (operator service ME) between ETX-2xxA and the network side of ETX-5300A. Transport OAM session (tunnel ME) between network ports of two ETX-5300A devices.
8-102
Ethernet OAM
Chapter 8 Networking
Subscriber Equipment 7 8
Operator A NEs 3 4
Service Provider 5
Operator B NEs 6
Subscriber ME
EVC ME Ethernet Operator A Service ME Operator B Service ME UNI ME Transport Tunnel ME UNI ME
ETX-2xxA
Legend: Triangle MEP (Maintenance End Point) Circle MIP (Maintenance Intermediary Point)
GbE
SAP
MEP
10 GbE
10 GbE
MEP
BP
Bridge BP
MEP
10 GbE
MEP
10 GbE
Chapter 8 Networking
A MEP is transparent to OAM frames whose MD level is higher than the MEP level, and drops OAM packets whose MD level is lower than the MEP level. It fully supports connectivity check (CC), loopback, link trace and PM counters,
Down MEP
Down MEPs reside at port egress and are bound to physical ports. These MEPs receive and send CFM PDU from and to the network. Down MEPs are supported for either point-to-point or multipoint services. Different MEP locations are illustrated below.
Figure 8-23 illustrates a point-to-point service between two main card ports with the MEP bound to port A. Tx flow in the service is directed to a queue block.
Tx Flow MEP Rx Flow
Figure 8-23. PtP Service with Down MEP Bound to Main Card Port A Figure 8-24 illustrates a point-to-point service between main and I/O card ports with the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow MEP SAP Rx Flow I/O Card Port B
Figure 8-24. PtP Service with Down MEP Bound to I/O Card Port B Figure 8-25 illustrates a point-to-point service between main and I/O card ports
with MEP bound to port A. Tx flow in the service is directed to a queue block.
Rx Flow MEP SAP Tx Flow Main Card Port A I/O Card Port B
Figure 8-25. PtP Service with Down MEP Bound to Main Card Port A Figure 8-26 illustrates a point-to-point service between two I/O card ports with
the MEP bound to port B. Tx flow in the service is directed to a queue block.
SAP MEP SAP I/O Card Port A Rx Flow I/O Card Port B Tx Flow
8-104
Ethernet OAM
Chapter 8 Networking
Figure 8-26. PtP Service between Two I/O Card Ports with Down MEP Bound to Port B Figure 8-27 illustrates a multipoint service between main card and bridge ports
with the MEP bound to port A. Tx flow in the service is directed to a queue block.
Tx Flow
BP
Bridge BP
SVI
Rx Flow
Figure 8-27. Multipoint Service with Down MEP Bound to Main Card Port A
The Down MEP is defined over the physical port, inheriting its MAC address. The Down MEP EVC/location is characterized by: Rx flow, whose classification profile can be one of the following: Untagged Single VLAN Single VLAN+P-bit Single outer + single inner VLAN Single outer VLAN + P-bit + single inner VLAN Match all. If configured over an IO port, the flow from the corresponding SAP must be used. It also needs a classification profile to specify the packet tag structure (as it cannot be taken from the flow classification profile).
Up MEP
Up MEPs reside at bridge ingress and are bound to bridge ports. These MEPs receive and send CFM PDU from and to the bridge entity. Up MEPs are supported for multipoint services only. The Up MEPs inherit their MAC addresses from the corresponding physical ports (egress ports of Tx flows). Different MEP locations are illustrated below.
Figure 8-28 illustrates a multipoint service between I/O card and bridge ports with the Up MEP bound to the bridge port. Tx flow in this service is directed to the BP SVI.
Rx Flow
BP
Bridge BP
SVI
MEP Tx Flow
Figure 8-28. Multipoint Service with Up MEP Bound to I/O Card Port A Figure 8-29 illustrates a multipoint service between main card and bridge ports with the Up MEP bound to the bridge port. Tx flow in this service is directed to the BP SVI.
ETX-5300A Ver. 1.0 Ethernet OAM 8-105
Chapter 8 Networking
Rx Flow
BP
Bridge BP
SVI
Figure 8-29. Multipoint Service with Up MEP Bound to Main Card Port A
Up MEP is defined over the bridge port. The Up MEP is characterized by: Rx flow with a single VLAN classification profile Tx flow.
MIPs
Unlike MEP, which is a directional entity acting as a service termination point, MIP is defined as a bidirectional intermediate entity, consisting of half functions (MHFs). MIP responds to link trace messages (LTMs) and loopback messages (LBMs), whose MD level is equal to the MIP MD level. ETX-5300A supports up to 512 MIPs.
LBM/LTM
MIP
LBM/LTM
Flow X
Flow X
LBR/LTR
MHF MHF
LBR/LTR
MIP locations are similar to those of MEP. The MIPs are defined under MD level and are characterized by the following: The physical port to which they are bound, inheriting the ports MAC source address Rx flow, originating from the MIP-bound port, which faces MHF 1, and whose classification profile can be one of the following:
8-106 Ethernet OAM
Untagged Single VLAN Single VLAN+P-bit Single outer + single inner VLAN Single outer VLAN + P-bit + single inner VLAN
ETX-5300A Ver. 1.0
Chapter 8 Networking
Rx classification, when Rx flow originates from SA with the Match All classification profile Tx flow, originating from the physical port facing MHF 2 Optional egress queue for the Tx flow.
Figure 8-31 and Figure 8-32 illustrate MIPs in point-to-point and multipoint
services.
Rx Flow MIP (bound to port B)
MHF 1
MHF 2
Rx Flow
MHF 1
MHF 2
Tx Flow
SAP
MHF 1
MHF 2
Rx Flow
BP
Bridge BP
SVI
Tx Flow MHF 1 MHF 2 Main Card Port B
Messaging System
The Ethernet service OAM mechanism uses cyclic messages for availability verification, fault detection, and performance data collection. The main message types are detailed below.
Note
OAM cyclic messages (CCMs, LBMs and LTMs) packet priority (P-bit value) is user-configurable at MEP level.
CC Messages
Continuity Check Messages (CCMs) are sent from the service source to the destination node at regular periodic intervals. They are used to detect loss of
ETX-5300A Ver. 1.0 Ethernet OAM 8-107
Chapter 8 Networking
continuity or incorrect network connections. A CCM is multicast to each MEP in a MA at each administrative level. CCM status information is available at the MEP and RMEP levels. CCM Priority and Color The CCMs are always marked green. CCM priority is configurable as a P-bit value at the MEP level. CCM CoS is also set at the MEP level according to P-bit-to-CoS profile with up to four such profiles per chassis. AIS When a MEP detects a connectivity failure at a physical port, it propagates an Alarm Indication Signal (AIS) in the direction away from the detected failure to the next higher level. The AIS is sent over the MEP Rx flow with the level as configured by the client MD level (default is the MEP level + 1) for the following trigger events: LOC LCK Rx AIS.
The signal is carried in dedicated AIS frames. The transmit interval is configured per MEP, and can be set to one frame per second (default) or one frame per minute. The AIS message priority is set per MEP via P-bit (07) configuration.
AIS, LCK, LOC
Port B
8-108
Ethernet OAM
Chapter 8 Networking
Loopback Messages
MEPs send loopback messages (LBMs) to verify connectivity with another MEP or MIP for a specific MA. Loopback is a ping-like request/reply function. A MEP sends a loopback request message to another MEP or MIP, which generates a subsequent LBR (loopback response). LBMs/LBRs are used to verify bidirectional connectivity. The LBMs are always marked green. LBM priority uses the CCM priority that is configurable as a P-bit value at the MEP level. LBM CoS is set according to a P-bitto-CoS profile, with up to four such profiles per chassis. LBMs are generated on demand and sent up to 500 times at a rate of 10 pps.
Chapter 8 Networking
Figure 8-34. MEP with LTM Sent from the Card Port in Point-to-Point Service
In Figure 8-35, the MEP responds with LTR if the target MAC address of the received LTM is the same as the MEP MAC address (inherited from the port to which the MEP is bound). LTM is not relayed.
LTM
BP
Bridge BP
SVI
LTR
Figure 8-35. MEP with LTM Sent from the Bridge Port in Multipoint Service
In Figure 8-36, the MIP always responds with LTR and relays the LTM.
LTM LTM
Figure 8-36. MIP with LTM Sent from the Card Port in Point-to-Point Service
In Figure 8-37, the MIP responds with LTR if the target MAC address of the received LTM has been learned on the bridge port. The MIP relays the LTM if the target MAC address of the received LTM has been learned on the bridge port or has not been learnt at all. If the target MAC address has been learned on another bridge port, the LTM is discarded.
LTM LTM
BP
Bridge BP
SVI
LTR MIP Main Card Port A
Figure 8-37. MIP with LTM Sent from the Bridge Port in Multipoint Service
In Figure 8-38, the MIP responds with LTR if the target MAC address of the received LTM has been learned on another bridge port. The MIP relays the LTM to the bridge port with the target MAC address. If the target MAC is unknown, the MIP floods the LTM.
8-110
Ethernet OAM
Chapter 8 Networking
LTM
LTM
BP
Bridge BP
SVI
LTR MIP Main Card Port A
Figure 8-38. MIP with LTM Sent from the Card Port in Multipoint Service
Performance Monitoring
ETX-5300A Ethernet service OAM PM functionality complies with the Y.1731 requirements. ETX-5300A provides per-service loss and delay measurement and event reporting.
Note
Loss measurement is supported only if the MEP-connected flows have their statistic counters enabled (PM-enabled).
The following performance parameters are measured by appropriate OAM messages: Frame Loss Ratio (FLR) FLR, expressed as a percentage, is the ratio of the number of service frames not delivered, divided by the total number of service frames during a time interval, where the number of service frames not delivered is the difference between the number of service frames sent to an ingress UNI and the number of service frames received at an egress UNI. ETX-5300A supports single-ended loss measurement (LM) with on-demand LMM transmission and automatic LM response (up to 128 simultaneous LM sessions per chassis). OAM MEPs measure frame loss only if statistic counters have been enabled on the incoming and outgoing flows. LM is not supported over tunnels. Frame Delay (FD) FD is specified as round trip delay for a frame, where FD is defined as the time elapsed since the start of transmission of the first bit of the frame by a source node, until the reception of the last bit of the loop backed frame by the same source node, when the loopback is performed at the frames destination node. ETX-5300A supports dual-ended delay measurement (DM) with on-demand DMM transmission and automatic DM response (up to 128 simultaneous DM sessions per chassis). Measurement is performed for delays of up to 1 second with full DM over tunnels.
Configuring OAM
Ethernet OAM configuration procedure includes the following steps, detailed in this section:
Note
Before deleting any of the OAM CFM components, verify that it is not used by other ETX-5300A elements, such as ERP.
1. Configure maintenance domains (MDs) 2. Define maintenance associations (MAs) 3. Add maintenance endpoints (MEPs)
Ethernet OAM
8-111
Chapter 8 Networking
4. Add maintenance intermediary points (MIPs) 5. Define endpoint services 6. Add destination network elements (NEs) 7. Configuring counter thresholds.
Note
MD name is no name.
To add a maintenance domain: At the config>oam>cfm# prompt, enter maintenance-domain <mdid> where <mdid> is 14095. The maintenance domain is created and the config>oam>cfm>md(<mdid>)$ prompt is displayed.
To delete a maintenance domain: At the config>oam>cfm# prompt, enter no maintenance-domain <mdid>. The maintenance domain is deleted.
Note
A maintenance domain can be deleted only if it has all its MEPs/MIPs deleted or disabled.
To configure a maintenance domain: 1. Navigate to configure oam cfm maintenance-domain <mdid> to select the maintenance domain to configure. The config>oam>cfm>md(<mdid>)# prompt is displayed 2. Enter all necessary commands according to the tasks listed below.
Comments Refer to Configuring Maintenance Associations. no maintenance association <maid> deletes the MA
md-level <md-level>
Note: If the pre-standard OAM protocol is used, the only value allowed for the maintenance domain level is 3.
mip <mip id> no mip <mip id> Refer to Configuring Maintenance Intermediary Points. no mip <mip id> deletes the MIP.
Defining MIPs
8-112
Ethernet OAM
Installation and Operation Manual Task Displaying information on configured MAs Displaying information on configured MIPs Command show maintenance-association <maid> show mip <mip id> Comments
Chapter 8 Networking
Note
A maintenance association can be deleted only if it has all its MEPs/MIPs deleted or disabled.
To configure a maintenance association: 1. Navigate to configure oam cfm maintenance-domain <mdid> maintenance-association <maid> to select the maintenance association to configure. The config>oam>cfm>md(<mdid>)>ma(<maid>)# prompt is displayed 2. Enter all necessary commands according to the tasks listed below.
Task Specifying MA name in UINT (unsigned integer) format Specifying the interval between continuity check messages Configuring MEP for the MA
Command ma-name <065535> ccm-interval {3.33ms | 10ms | 100ms | 1s | 10s | 1min | 10min} mep <mepid>
Comments
Ethernet OAM
8-113
Chapter 8 Networking
localize, and diagnose connectivity problems. ETX-5300A supports up to 4K MEPs and MIPs. To add a maintenance endpoint (MEP): At the config>oam>cfm>md(<mdid>)>ma(<maid>)# prompt, enter: mep <mepid> where <mepid> is 14098. The MEP is created and the prompt config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)$ is displayed. To delete a maintenance endpoint: At the config>oam>cfm>md(<mdid>)>ma(<maid>)# prompt, enter: no mep <mepid> The maintenance endpoint is deleted.
Note
Task Enabling AIS sending and defining interval Binding the MEP to an Ethernet port, LAG or SVI
Command ais [ interval { 1s | 1min }] [priority <priority>] bind ethernet <slot/port> bind lag <port_number> bind svi <port_number> no bind
Comments To disable AIS sending, enter no ais To remove the MEP from an Ethernet port, LAG or SVI, enter no bind
Enabling initiation of continuity check messages (CCM) Specifying the priority of CCMs, LBMs and LTMs transmitted by the MEP Associating the MEP with a classifier profile
ccm-initiate
To disable initiating continuity check messages, enter no ccm-initiate The allowed range for <priority> is 07
ccm-priority <priority>
Classifier profile is needed when the MEP Rx flow has the SAP ingress port (in this case the flow classifier profile is Match All). To delete classifier profile assignment, enter no classification profile.
8-114
Ethernet OAM
Installation and Operation Manual Task Defining client MD level Associating the MEP with a CoS profile Command client-md-level <md_level> Comments
Chapter 8 Networking
Client MD level is a level for sending upstream AIS The CoS mapping profile must be P-bit-to-CoS to assign the class of service to the packets transmitted by the MEP (CCMs, LBTs etc). To delete CoS mapping profile assignment, enter no cos-mapping profile.
Defining the MEP direction Assigning unidirectional Rx and Tx flows to the MEP
direction {up | down} flow uni-direction rx <rx_flow_name> [tx <tx-name>] no flow uni-direction To delete flow assignment, enter no flow uni-direction
Activating OAM loopback Activating OAM link trace Defining the queue for the MEP
See Performing OAM Loopback See Performing OAM Link Trace To delete queue assignment, enter no queue queue-mapping
Allowed range for remote MEP is 18191 The MEP ID and the remote MEP ID must be different. You can define up to 511 remote MEPs for the local MEP if standard OAM protocol is being used for the MD and the destination address type is multicast; otherwise you can define only one remote MEP. To delete remote MEP, enter no remote-mep <remote_mep_id>
Configuring service for the MEP Displaying MEP status Displaying remote MEP status Displaying MEP service status Administratively enabling MEP
service <service_id> show status show remote-mep <remote-mep-id> status show service <service_id> no shutdown
Endpoint Services
Ethernet OAM
8-115
Chapter 8 Networking
To add a maintenance intermediary point (MIP): At the config>oam>cfm>md(<mdid>)# prompt enter: mip <mipid> The maintenance intermediary point is created and the config>oam>cfm>md(<mdid>)>mip(<mipid>)$ prompt is displayed.
To delete a maintenance intermediary point: At the config>oam>cfm>md(<mdid>)# prompt enter: no mip <mipid> The maintenance intermediary point is deleted.
To configure a maintenance intermediary point: 1. Navigate to configure oam cfm maintenance-domain <mdid> mip <mipid> to select the maintenance association to configure. The config>oam>cfm>md(<mdid>)>mip(<mipid>)# prompt is displayed 2. Enter all necessary commands according to the tasks listed below.
Command bind ethernet <slot/port> bind lag <port_number> bind svi <port_number> no bind
Comments To remove the MIP from an Ethernet port, LAG or SVI, enter no bind
Configuring MIP half functions (MHF) Administratively enabling MIP Displaying MIP status
The following marking actions can be performed at the mhf level, at the config>oam>cfm> md(<mdid>)>mip(<mipid>)>mhf(1 or 2)# prompt.
Task Associating the MHF with a classifier profile Command classification profile <profile_name> no classification profile Comments Classifier profile is needed when the MHF Rx flow has the SAP ingress port (in this case the flow classifier profile is Match All). To delete classifier profile assignment, enter no classification profile. Associating the MHF with a CoS profile cos-mapping profile <profile_name> no cos-mapping profile The CoS mapping profile must be P-bit-to-CoS to assign the class of service to the packets transmitted by the MHF (CCMs, LBTs etc). To delete CoS mapping profile assignment, enter no cos-mapping profile. 8-116 Ethernet OAM ETX-5300A Ver. 1.0
Installation and Operation Manual Task Defining the queue for the MHF Command queue queue-mapping <queue_mapping_profile_name> [block <level_id>/<queue_id>] no queue queue-mapping Comments
Chapter 8 Networking
delay-threshold <delay-thresh>
delay-var-threshold <delay-var-thresh>
Specifying the interval for delay measurement messages, to be used by all remote NEs defined for service
Ethernet OAM
8-117
Chapter 8 Networking Task Specifying the interval for loss measurement messages, to be used by all remote NEs defined for service Configuring destination NE for service Command lmm-interval {100ms | 1s | 10s}
dest-ne <dest-ne-index>
See Configuring Destination NEs below. The value range is 1255. One NE per service is allowed. To delete a destination NE, enter no dest-ne.
no shutdown
You can activate a service only if the corresponding MEP is active and you have defined at least one destination NE
8-118
Ethernet OAM
Installation and Operation Manual Task Enabling two-way delay measurement method Enabling loss measurement method Displaying statistics data Clearing statistics Command delay two-way no delay loss { single-ended } no loss show statistics clear-statistics
To display the OAM CFM statistics for a destination NE: 1. Navigate to the level corresponding to the destination NE for which you wish to view the statistics (configure oam cfm maintenance-domain <mdid> maintenance-association <maid> mep <mepid> service <serviceid> dest-ne <dest-ne-index>). The following prompt is displayed: config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)> service(<serviceid>)>dest-ne(<dest-ne-index>)#. 2. Enter all necessary commands according to the tasks listed below.
Ethernet OAM
8-119
Chapter 8 Networking Task Viewing statistics for the current interval Viewing the statistics for a selected interval Command show statistics current
Installation and Operation Manual Comments The statistics for the current interval are displayed as listed in Table 8-28 Allowed values for interval-num: 196 The statistics for the selected interval are displayed as listed in
Table 8-28
If you specified an interval that has not yet ended, a message indicates that the interval does not exist. Viewing statistics for current day Viewing statistics for previous day show statistics current-day show statistics previous-day The statistics for the current day, as listed in Table 8-28 The statistics for the previous day, as listed in
Table 8-28
Viewing running statistics, statistics for the current interval, statistics for all intervals, and day statistics Viewing statistics for all intervals show statistics all All available performance measurement counters, as listed in Table 8-28 Performance measurement counters for all available Intervals, as listed in
Table 8-28
Clearing the statistics for the destination NE clear-statistics All statistical data for the service are cleared, including the stored interval data, except for the time elapsed since the start of the current interval
8-120
Ethernet OAM
Installation and Operation Manual Parameter Far End Unavailable Seconds (sec) Near End Tx Frames Near End Rx Frames Near End Lost Frames Near End Frame Loss Ratio (%) Near End Unavailable Seconds (sec) Average Two Way Delay (msec) Frames Above Delay Threshold Frames Above Delay Variation Threshold Elapsed Time (sec) Description
Chapter 8 Networking
Total number of unavailable seconds in the remote MEP since the service was activated Total number of OAM frames transmitted from the remote MEP to the local MEP since the service was activated Total number of OAM frames received by the local MEP since the service was activated Total number of OAM frames lost from the remote MEP to the local MEP since the service was activated Total number of near end lost OAM frames divided by the total number of near end transmitted OAM frames Total number of unavailable seconds in the local MEP since the service was activated Average delay Number of frames that exceeded the delay threshold Number of frames that exceeded the delay variation threshold Time (in seconds) elapsed since the service was activated
Task Specifying remote MEP by MAC address Sending LBMs to default multicast MAC address Checking OAM loopback results
Ethernet OAM
8-121
Chapter 8 Networking Task Specifying remote the MEP by MAC address Command linktrace address <mac-address> [ttl <164>]
Installation and Operation Manual Comments The TTL parameter specifies the number of hops. Each unit in the link trace decrements the TTL until it reaches 0, which terminates the link trace. Destnation MAC address LTM cannot be multicast.
show linktrace-results
Examples
This section illustrates OAM configuration for three MEP instances (two Down MEPs and one Up MEP).
8-122
Ethernet OAM
Chapter 8 Networking
**********************Assigning_Default_Queue_Group_Profiles********************* config port ethernet main-b/1 queue-group profile q_group_2_level_default config port ethernet main-b/2 queue-group profile q_group_2_level_default exit all #*********************************End******************************************** **********************Assigning_Classification_Keys****************************** config port ethernet main-b/1 classification-key vlan p-bit config port ethernet main-b/2 classification-key vlan p-bit exit all #*********************************End******************************************** ************************Enabling_Main_Card_Ports********************************* config port ethernet main-b/1 no shutdown config port ethernet main-b/2 no shutdown exit all #*********************************End******************************************** ************************Defining_Classifier_Profile****************************** config flows classifier-profile class20 match-any match vlan 20 exit all #*********************************End**************************************** ************************Defining_Policer_Profiles******************************** config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0 config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0 exit all #*********************************End******************************************** ************************Defining_CoS_Mapping_Profile***************************** cos-map-profile cos1 classification p-bit map 0 to-cos 0 map 1 to-cos 1 map 2 to-cos 2 map 3 to-cos 3 map 4 to-cos 4 map 5 to-cos 5 map 6 to-cos 6 map 7 to-cos 7 exit all #*********************************End******************************************** ******************************Adding_Flows*************************************** configure flows flow EVC1_eg classifier class20 ingress-port ethernet main-b/1 egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-color profile color1 cos-mapping profile cos1 no shutdown exit all configure flows flow EVC1_ing classifier class20
Ethernet OAM
8-123
Chapter 8 Networking
ingress-port ethernet main-b/2 egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-color profile color1 cos-mapping profile cos1 no shutdown exit all #*********************************End******************************************** #**************************Defining_MEP_and_MEP_Service************************** config oam cfm maintenance-domain 1 md-level 4 maintenance-association 1 name uint 265 mep 1 bind ethernet main-b/1 cos-mapping profile cos1 direction down flow uni-direction rx EVC1_ing tx EVC1_eg queue queue-mapping QueueMapDefaultProfile block 0/1 ccm-initiate ccm-priority 0 remote-mep 101 no shutdown service 1 classification priority-bit 1 dest-ne 1 remote mac 00-20-d2-50-1d-28 delay-measurement-bin bin_profile_delay1 delay-var-measurement-bin bin_profile_delay_var1 exit no shutdown exit all #*********************************End******************************************** #*******************Configring_OAM_Reporting_Thresholds************************** config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60 config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60 config fault cfm service 1 1 1 1 far-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 near-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 far-end-unavailability-ratio frames-report 10 9 config fault cfm service 1 1 1 1 near-end-unavailability-ratio frames-report 10 9 exit all #*********************************End********************************************
Chapter 8 Networking
2. Select classification keys for the main and I/O card ports. 3. Enable the main and I/O card ports. 4. Configure classifier profiles: VLAN 100 + P-bit 6 VLAN 100 + P-bit 5 VLAN 300 + inner VLAN 100.
5. Configure two policer profiles. 6. Configure a CoS mapping profile to map user priorities to internal CoS values. 7. Configure the following flows: From I/O card port 1 to SAP (classification VLAN 100 + P-bit 6) From I/O card port 1 to SAP (classification VLAN 100 + P-bit 5) From SAP to main card port 1 From main card port 1 to I/O card port 1.
8. Define a Down MEP bound to port 1 with CCM sent over P-bit 0. 9. Configure MEP service with LMMs and DMMs sent over P-bit 1. 10. Configure OAM event reporting thresholds for:
SAG
SAP
CCMs
ECV2COS1
Port 1
ECV2COS2
SAP 1
EVC2_eg
MEP
Port 1
PSN
MEP
EVC2_ing
Remote NE
SAP
Figure 8-40. Down MEP between Main and I/O Card Ports
**********************Assigning_Default_Queue_Group_Profiles********************* config port ethernet main-b/1 queue-group profile q_group_2_level_default config port ethernet 1/1 queue-group profile q_group_2_level_default config port sag 1/1 queue-group profile q_group_SAG_2_level_default
ETX-5300A Ver. 1.0 Ethernet OAM 8-125
Chapter 8 Networking
exit all #*********************************End******************************************** **********************Assigning_Classification_Keys****************************** config port ethernet main-b/1 classification-key vlan inner-vlan p-bit config port ethernet 1/1 classification-key vlan p-bit exit all #*********************************End******************************************** ************************Enabling_Main_and_I/O_Card_Ports************************* config port ethernet main-b/1 no shutdown config port ethernet 1/1 no shutdown exit all #*********************************End******************************************** ************************Defining_Classifier_Profiles***************************** config flows classifier-profile class100pbit6 match-any match vlan 100 p-bit 6 exit all config flows classifier-profile class100pbit5 match-any match vlan 100 p-bit 5 config flows classifier-profile class300100 match-any match vlan 300 inner-vlan 100 exit all #*********************************End**************************************** ************************Defining_Policer_Profiles******************************** config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0 config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0 exit all #*********************************End******************************************** ************************Defining_CoS_Mapping_Profile***************************** cos-map-profile cos1 classification p-bit map 0 to-cos 0 map 1 to-cos 1 map 2 to-cos 2 map 3 to-cos 3 map 4 to-cos 4 map 5 to-cos 5 map 6 to-cos 6 map 7 to-cos 7 exit all #*********************************End******************************************** ******************************Adding_Flows*************************************** configure flows flow ECV2COS1 classifier class100pbit6 cos-mapping fixed 0 ingress-color green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 1
8-126
Ethernet OAM
Chapter 8 Networking
configure flows flow EVC2COS2 classifier class100pbit5 cos-mapping fixed 1 ingress-color green ingress-port ethernet 1/1 egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1 policer profile 2 no shutdown exit all
configure flows flow EVC2_eg classifier match-all ingress-port sap 1/1/1 egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block 0/2 vlan-tag push vlan 300 p-bit copy no shutdown exit all
configure flows flow EVC2_ing classifier class300100 ingress-color profile color1 cos-mapping profile cos1 ingress-port ethernet main-b/1 egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1 vlan-tag pop vlan no shutdown exit all #*********************************End******************************************** #**************************Defining_MEP_and_MEP_Service************************** config oam cfm maintenance-domain 1 maintenance-association 2 name uint 22 mep 2 bind ethernet main-b/1 cos-mapping profile cos1 direction down flow uni-direction rx EVC2_ing tx EVC2_eg queue queue-mapping QueueMapDefaultProfile block 0/1 ccm-initiate ccm-priority 0 remote-mep 110 no shutdown service 1 classification priority-bit 1 dest-ne 1
Ethernet OAM
8-127
Chapter 8 Networking
remote mac 00-20-d2-50-2e-55 exit no shutdown exit all #*********************************End******************************************** #*******************Configring_OAM_Reporting_Thresholds************************** config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60 config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60 config fault cfm service 1 1 1 1 far-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 near-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 far-end-unavailability-ratio frames-report 10 9 config fault cfm service 1 1 1 1 near-end-unavailability-ratio frames-report 10 9 exit all #*********************************End********************************************
8-128
Ethernet OAM
Chapter 8 Networking
Flow 1
Port 1 MEP
SVI 1 BP 1
Flow 3
Port 2
Flow 5
Port 3
Ethernet OAM
8-129
Chapter 8 Networking
map 2 to-cos 2 map 3 to-cos 3 map 4 to-cos 4 map 5 to-cos 5 map 6 to-cos 6 map 7 to-cos 7 exit all #*********************************End******************************************** ***********************Configuring_Bridge_and_Bridge_Ports*********************** config port svi 1 bridge exit all config port svi 2 bridge exit all config port svi 3 bridge exit all config bridge 1 port 1 bind svi 1 no shutdown exit all config bridge 1 port 2 bind svi 2 no shutdown exit all config bridge 1 port 3 bind svi 3 no shutdown exit all config bridge 1 vlan 20 tagged-egress 1..3 exit all #*********************************End******************************************** ******************************Adding_Flows*************************************** config flows flow 1 classifier class20 ingress-port ethernet main-a/1 egress-port svi 1 ingress-color profile color1 cos-mapping profile cos1 no shutdown exit all config flows flow 2 classifier class20 ingress-port svi 1 egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all
8-130
Ethernet OAM
Chapter 8 Networking
config flows flow 3 classifier class20 ingress-port ethernet main-a/2 egress-port svi 2 no shutdown exit all config flows flow 4 classifier class20 ingress-port svi 2 egress-port ethernet main-a/2 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all config flows flow 5 classifier class20 ingress-port ethernet main-a/3 egress-port svi 3 no shutdown exit all config flows flow 6 classifier class20 ingress-port svi 3 egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block 0/1 no shutdown exit all #*********************************End******************************************** #**************************Defining_MEP_and_MEP_Service************************** config oam cfm maintenance-domain 2 md-level 3 maintenance-association 3 name uint 37 mep 3 bind svi 1 cos-mapping profile cos1 direction up flow uni-direction rx 2 tx 1 ccm-initiate ccm-priority 0 remote-mep 101 no shutdown service 1 classification priority-bit 1 dest-ne 1 remote mac 00-20-d2-50-1d-28 exit no shutdown exit all #*********************************End******************************************** #*******************Configring_OAM_Reporting_Thresholds**************************
Ethernet OAM
8-131
Chapter 8 Networking
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60 config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60 config fault cfm service 1 1 1 1 far-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 near-end-loss-ratio frames-report 1e-6 1e-8 config fault cfm service 1 1 1 1 far-end-unavailability-ratio frames-report 10 9 config fault cfm service 1 1 1 1 near-end-unavailability-ratio frames-report 10 9 exit all #*********************************End********************************************
Configuration Errors
Table 8-29 lists the messages generated by ETX-5300A when a configuration error is detected. Table 8-29. Configuration Error Messages
Message Mismatch between flow and MIP classification profiles Flow must be enabled Description The classification profile bound to the MIP and the classification profiles of its Rx/Tx flows do not match The flow must be administratively enabled before it is bound to the MEP/MIP A single flow can be bound to up to eight MEPs
Maximum number of MEPs (8) associated with the flow has been reached Different MEPs/MIPs, using the same flow, must have different MD levels MIP bound to Ethernet port or LAG must have classification profile MIP-bound bridge port is not a member of the MHFs classification profile VLAN
When the same flow is bound to different MEPs/MIPs, the flow must have different MD levels When a MIP is bound to an Ethernet port or LAG, the MIP must have a classification profile assigned to it The bridge port of the SVI to which the MIP is bound is not a member of the VLAN defined in the VLAN-based classification profile used by the MIPs MHF A MEP must be bound to an Ethernet port, LAG or bridge-type SVI The CoS profile cannot be bound to a MEP bound to an Ethernet port or LAG The queue mapping profile cannot be bound to a MEP bound to an Ethernet port or LAG The Up MEP must be bound to a bridge-type SVI. The Down MEP must be bound to an Ethernet port or LAG The MA number is out of range (12048) The MA cannot be deleted if it has MEPs defined under it A name assigned to the MA already exists The MA parameters cannot be changed if the MA has MEPs defined under it
Cannot bind CoS mapping profile to a MEP bound to an Ethernet port or LAG Cannot bind queue mapping profile to a MEP bound to an Ethernet port or LAG Up MEPs are bound to SVI (B), Down MEPs are bound to Ethernet port or LAG MA number is out of range Cannot delete MA with MEPs Current MA name is already in use Cannot change MA with MEPs
8-132
Ethernet OAM
Installation and Operation Manual Message Cannot change MA with MIPs Description
Chapter 8 Networking
The MA parameters cannot be changed if the MA has MIPs defined under it The value entered not within the allowed range The MA name value is not within the allowed range (06535) The maximum number of MEs (4096) has been reached The maximum value for the current parameters has been reached. This may refer to the number of MEPs/MIPs, remote MEPs, destination NEs, etc. Only one Down MEP is allowed per MA
The value is out of range MA name is out of range Max number of MEs has been reached Max value has been reached
Max number of Down MEPs per MA has been reached Max number of Up MEPs per MA has been reached Entity must be in shutdown
The entity (MEP, MIP, port, etc.) must be administratively disabled in order to delete or change its parameters The port to which you are trying to bind a MEP/MIP does not exist The port to which you are trying to bind a MEP/MIP is not Ethernet, LAG or SVI The SVI to which you are trying to bind a MEP/MIP is not a bridge type The selected VLAN ID is not within the allowed range (04094) The VLAN ID can be changed only when the MEP/MIP is administratively disabled Assigned classification profile can be changed only when the MEP/MIP is administratively disabled The classification profile bound to the MEP/MIP is not valid. A non-existing classification or CoS mapping profile has been bound to MEP/MIP Only a P-bit-to-CoS CoS mapping profile can be bound to MEP/MIP Only a default queue mapping profile (QueueMapDefaultProfile) can be bound to MEP/MIP The port to which a MEP/MIP is bound can be changed only when the MEP/MIP is administratively disabled The destination MAC address for OAM link trace messages cannot be a multicast type The OAM service can be administratively enabled only if a destination NE has been defined for it The OAM service can be administratively enabled only if a
VLAN ID is out of range VLAN ID can be changed in MEP/MIP shutdown Classification profile can be changed in MEP/MIP shutdown Invalid classification profile Profile does not exist
CoS mapping profile must be P-bit-toCoS Only default queue mapping profile is allowed Port can be changed, when MEP/MIP is in shutdown LTM destination MAC cannot be multicast
Cannot enable OAM service if no destination NE exists Cannot enable OAM service if no
Ethernet OAM
8-133
Chapter 8 Networking Message destination NE MAC exists Destination NE MAC can be unicast only Description
destination NE MAC address has been defined The MAC address of the destination NE can be a unicast type only The Rx flow for the MEP has not yet been configured The Tx flow for the MEP has not yet been configured For Rx flow with ingress port defined as SAP, there must be a matching flow between I/O port and SAP The ingress port for Rx and Tx flows must be an Ethernet port, LAG, bridge-type SVI or SAP If Rx flow uses the Match All classification mode, a separate classification profile must be bound to the MEP/MIP
MEP Rx flow must be configured MEP Tx flow must be configured I/O port-to-SAP flow must be configured for Rx flow with SAP as ingress port Illegal ingress port for Rx or Tx flow
Classification profile must be bound to MEP/MIP, if Rx flow uses Match All classification Classification profile must be bound to MEP/MIP, if Tx flow uses Match All classification Classification profile cannot be bound to MEP/MIP, if Rx flow uses other than Match All classification OAM service must be in shutdown
If Tx flow uses the Match All classification mode, a separate classification profile must be bound to the MEP/MIP
If Rx flow does not use the Match All classification mode, a separate classification profile cannot be bound to the MEP/MIP
The OAM service must be administratively disabled for this action The MEP to be administratively enabled for this action The number of MDs is out of range (12048) An MD with existing MAs or MIPs cannot be deleted
MEP must be in no shutdown Illegal number of MDs Cannot delete MD with MA or MIP under it Illegal MD level Cannot change MD level
The MD level value is out of allowed range (07) The MD level cannot be changed if the MD has MEPs/MIPs under it The maximum number of MDs (4096) has been reached
8-134
Ethernet OAM
9.1
Clock Selection
This section discusses clock selection mechanism provided by ETX-5300A, synchronization sources supported by the chassis and their configuration methods.
Benefits
Flexible timing mechanism utilizes standard technologies to ensure highly accurate clock recovery and distribution over both the physical and packet layers with powerful frequency, phase and ToD alignment capabilities.
Factory Defaults
Parameter defaults are listed in the tables below.
Domain Parameter sync-network-type quality min-level-station Default Value 2 Network type 1 SEC Network type 2 ST3 max-frequency-deviation 1200 100 ppm
Clock Selection
9-1
Chapter 9 Timing and Synchronization Domain Parameter mode force-t4-as-t0 Default Value auto Enabled
Functional Description
The figure below is a diagram of the ETX-5300A timing mechanism.
9-2
Clock Selection
1588v2 (master)
T0
SEC
Mux
Station Clock Output (T4) Secondary Clock via Standby Main Card
Clock Domain
The timing system in ETX-5300A provides a single clock domain. The clock domain distributes a system clock derived from up to four configured sources after selection process implemented via Synchronous Equipment Clock (SEC). Clock sources (SEC inputs) are as follows: Clock derived from a physical port on a main or I/O card Station clock (BITS/GPS10 MHz) IEEE 1588v2 clock.
The synchronization network type identifies the type of synchronization network and its levels. Each synchronization network connection is provided by one or more synchronization link connections, each supported by a synchronized PDH trail, SDH multiplex section trail, or 802.3 physical media trail. The synchronization network types are: Option I (Europe) Option II (USA), default.
Clock Selection
9-3
9-4
Clock Selection
To prevent transmission (via station clock interface) of a timing signal of inferior quality, you must configure the quality level (QL) minimum parameter with the minimum quality allowed. If the transmitted signal quality becomes lower than QL minimum parameter, the external clock interface is squelched (or AIS is sent in E1 / T1 mode).
SSM/ESSM Support
ETX-5300A supports automatic learning/distributing clock QL using Sync Status Message (SSMs) or Ethernet Synchronization Message Channel (ESMC) systems. In the receive direction, an ESMC-FAILED state is declared if no ESMC messages are received for a period of 5 seconds or more (with issuing SSF). In the transmit direction, an ESMC message is transmitted every 1 second or immediately if a change in QL is detected. For synchronization source signals/interfaces that do not support SSM, it is possible to force the quality level to a fixed value. This allows use of these signals/interfaces as synchronization sources in the automatic reference clock selection process in QL-enabled mode. You must configure a specific QL for all the ingress synchronization interfaces that do not support SSM.
Clock Mode
The domain clock mode can be one of the following: Auto mode domain timing is determined by the clock selection algorithm (default) Free-run mode the domain clock is based on the main card local oscillator (TCXO) Force T0 holdover the domain clock uses data stored by the T0 timing generator during normal operation for timing output.
Note
Note
By default, the ETX-5300A system clock is in free-run state, until a valid clock source is selected.
Clock Selection
9-5
Station clock output: Locked Locked to a valid clock input Unlocked Not locked to a valid clock input.
Note
By default, ETX-5300A station clock output is in free-run state, until a valid clock source is selected.
SEC Module
The clock domain provides the system clock according to one of the four timing inputs, as selected by the SEC unit. The SEC module performs physical clock selection, hitless switching, clock filtering and holdover. It consists of two timing generators: T0 for system clock output T4 for station clock output.
System Clock
Quality Level
The SEC unit supports input prioritization and source quality level configuration, according to network type:
9-6
Clock Selection
Clock Selection
The clock selection algorithm is based on ITU-T Recommendation G.781. During the selection process, the best synchronization source from the SEC inputs is selected as the system clock. The selection process operates in two modes: QL-enabled, in which the following parameters are considered: Quality level Signal failure Priority External switch commands
If no overriding external commands are active, the algorithm selects the reference clock that has the highest quality level without signaling a fail condition. If both inputs have the same quality level, the input with the highest priority is selected. If all inputs have the same highest priority, an arbitrary reference clock is chosen. If no input clock is available, the SEC uses internal oscillator timing. QL-disabled, in which the following parameters are considered: Signal failure Priority External switch commands
If no overriding external commands are active, the algorithm selects the reference clock that has the highest priority without signal fail condition. If all inputs have the same highest priority, an arbitrary reference clock is chosen. If no input clock is available, the SEC uses internal oscillator timing.
Timers
For additional flexibility in clock restoration, the SEC module has two timers: Wait-To-Restore. The timer defines the time (in seconds) that a previously failed synchronization source must be fault-free in order to be considered available. Hold-Off. The timer defines the time (in milliseconds) that a signal failure must be active before it is relayed to the clock selection unit.
Switchover
Clock switchover (changing current reference clock) occurs if: An external clock switch command is received A locked source clock becomes invalid A higher priority/quality clock becomes available.
Physical failure Clock failure has been detected at the physical layer Monitoring failure Clock failure has been detected by the clock monitoring entity of the domain ESMC failure Ethernet port only with SSM-based clock has not received valid ESMC-packet stream for 5 seconds.
Note
Switch over is always revertive. For non-revertive mode, you can configure several sources with the same priority.
SEC Output
The SEC unit outputs a clock with Stratum-3 accuracy, jitter and holdover, in compliance with the following requirements: GR-253-CORE for SONET Stratum 3 and SONET minimum clock (ST3) GR-1244-CORE Stratum 3 ITU-G813 Option 1 and Option 2 for SDH Equipment Clock (SEC).
The T0 timing generator of the SEC unit delivers a system (domain) clock to I/O cards and to the second main card. In addition, the T4 timing generator outputs an external clock for distribution to other network devices.
Note
By default, the T4 generator is forced to use the same clock source as the T0 generator.
Main Card System Clock Bus System Clock I/O Card 1 I/O Card 2 I/O Card 3 T4 I/O Card4 Main card Ethernet ports Station Clock Output 1588v2 master entity
SEC T0
Input Sources
The four clock sources (SEC inputs) are based on: Clock derived from a physical port on a main or I/O card Station clock (BITS or GPS-10 MHz)
9-8
Clock Selection
Note
Sync-E mode can be used when phase synchronization or Time of Day (ToD) is not required. The main advantages of Sync-E over 1588v2 clock are: It is propagated over physical layer It is a Stratum-3 clock with near SDH/SONET holdover properties It is not packet-oriented and considered to be more stable.
STM-1/OC-3 Ports The Rx clock of any STM-1/OC-3 port on the E5-cTDM-4 card can be extracted and supplied to the main card clock selection mechanism (via backplane clock bus).
Note
When APS is enabled, clock is used from a selected interface and not from an APS group.
The Tx clock of an STM-1/OC-3 port can be locked to: ETX-5300A system clock Rx clock of the port (loopback timing).
E/T1 Ports
The internal E1/T1 ports cannot be used as clock sources for the system clock. The Tx clock of internal E1/T1 ports can be locked to: System clock Rx clock of the port Adaptive clock recovered from pseudowire stream.
Clock Selection
9-9
Station Clock
The station clock interface has two functions: Input for station clock signal (BITS and GPS clocks) Output for the ETX-5300A nodal clock. This output provides a convenient means for distributing the ETX-5300A nodal clock signal to other equipment (BITS clock only).
BITS Clock ETX-5300A recovers Building-Integrated Timing Supply (BITS) clock via the station clock interface ports on E5-MC-4 card. See Appendix A for the external clock connector pinout. The following clock signals are supported: 2.048 Mbps, ITU-T G.703, 120 balanced, 75 unbalanced 1.544 Mbps, ANSI T1-403, 100 balanced 2.048 MHz squarewave, RS-485 64 kHz, ITU-T G.703, composite clock interface, 110 balanced.
When only one external clock source is available, you can improve hardware protection by connecting the external clock inputs in parallel, by means of a Y-cable. GPS Clock ETX-5300A receives/transmits (1588v2 master/slave) GPS-based frequency and phase reference signal from GPS units, using the following interfaces on the E5MC-4 card: Input or output of 10 MHz sinewave synchronization signal via mini-BNC (DIN 1.0/2.3) connector Input and output of ToD timestamp signal via Rj-45 connector with RS-422 interface Input or output of 1PPS TTL synchronization signal via mini-BNC connector.
When only one GPS clock source is available, you can improve hardware protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
Redundancy
When ETX-5300A is equipped with two main cards, clock selection and distribution mechanisms are mirrored in the active and backup cards. This ensures full timing system redundancy.
9-10
Clock Selection
SEC Redundancy
When a clock source is configured for the active main card, the action is duplicated in the backup card. This results in the same clock source feeding both SECs. The SECs are connected internally to improve switchover time and reduce phase difference when a flip occurs. The two SEC outputs (active and backup) are master to the I/O cards, which use only the active one.
Station Clock
Any station clock can be used as a clock input on an active or backup main card. Each SEC can use input from both station clock sources.
Primary
Station Clock
Secondary
To backup card
Clock Selection
9-11
9-12
Clock Selection
Installation and Operation Manual Task Forcing T4 timing generator to use the same clock source as the T0 generator Forcing a selection of a particular clock source when the sources have different quality levels Manually selecting a particular clock source in the following conditions: No quality is defined for the clock domain The sources have the same qualities The sources have different priorities. clear Command force-t4-as-t0
Chapter 9 Timing and Synchronization Comments no force-t4-as-t0 prevents T4 timing generator from using the same clock source as the T0 generator
force <source-id>
manual <source-id>
Canceling a previously issued force or manual command Adding clock source (refer to Configuring the Clock Sources) Configuring clock source (refer to Configuring the Clock Sources) Displaying status
show status
To display clock status; 1. Navigate to configure system clock domain 1. The config>system>clock>domain(1)# prompt is displayed. 2. At the config>system>clock>domain(1)# prompt, enter show status. Clock status provides information on: Current system clock source, state and quality:
Locked Locked to selected clock source Free-run Locked to internal oscillator Holdover Input lock is lost, the clock mechanism uses data stored during normal operation for timing output
Current station out clock source and state Forced and manual switch command status
Clock Selection
9-13
ETX-5300A>config>system>clock>domain(1)# show status System Clock Source Station Out Clock Source Force Switch Manual Switch : : : : 0 0 InActive InActive State State : Freerun : Unlocked Quality : ST3
Note
To add a clock source: 1. Verify that the clock source to be used as an input is valid.
Note
You can choose an invalid clock source. However, this input will be rejected by the domain during the clock selection process.
2. Verify that the card whose port will be used as a source clock is provisioned. 3. Verify that the port to be used as a source clock is enabled (no shutdown).
Note
If you choose an invalid clock source, this input will be rejected by the domain during the clock selection process.
4. Navigate to configure system clock domain 1. The config>system>clock>domain(1)# prompt is displayed. 5. Type one of the following, according to the required clock source: For Ethernet port: clock source <14> rx-port ethernet <slot/port> Use main-a or main-b designation for main card ports.
Note
To ensure correct distribution of SSM traffic, you must configure flow with an L2CP profile with peer action on the 01-80-c2-00-00-02 address. The flow must have the following attributes:
Untagged classification Ingress port Ethernet port/LAG, serving as the SSM source (Sync-E port Egress port according to application requirements.
If you use the flow only to peer the SSM frames and do not need to forward the untagged traffic, discard it, using the drop command on the flow
9-14
Clock Selection
For SDH/SONET port: clock source <14> rx-port sdh-sonet <slot/port> For station clock: clock source <14> station <main-a/1 or main-b/1> For recovered clock: clock source <14> recovered < main-a/1 or main-b/1>
6. Enter all necessary commands according to the tasks listed below the next procedure. To configure a clock source for which the port has been defined: 1. Navigate to configure system clock domain 1. The config>system>clock>domain(1)# prompt is displayed. 2. Type source <14> to select the source to configure. The config>system>clock>domain(1)>source(<14>)# prompt is displayed. 3. Enter all necessary commands according to the tasks listed below.
Task Setting the priority to be taken into account during the clock selection process Setting quality level of the clock source Command priority <num> Comments 14 Priority 1 is the highest. no priority disables clock source priority quality-level { prc | ssu-a | ssu-b | sec | dnu | ssm-based } quality-level { prs | stu | st2 | tnc | st3e | st3 | smc | st4 | dus | ssm-based | prov } Clock source quality, as well as source priority are taken into account during clock selection process. If no quality is defined for the domain, this command is not available. The quality level values are according to the synchronization network type defined for the domain. The quality level ssm-based indicates the quality level is learned automatically via SSM messages or S1 byte of SDH/SONET frames. When using SSM-based clock source, add a flow supplying ESMC messages to the port. Defining the amount of time that a previously failed synchronization source must be fault free in order to be considered available Defining the amount of time that signal failure must be active before it is transmitted Canceling the wait-to-restore timer of a clock source Displaying status Displaying statistics ETX-5300A Ver. 1.0 wait-to-restore <seconds> 0720
hold-off <milliseconds>
3001800
clear-wait-to-restore
This is useful if a timing source fault is cleared and you want the source to be available immediately
OK The clock source is valid and can be considered as clock input candidate for the system clock Physical Fail Clock failure has been detected at the physical level Monitoring Fail Clock failure has been detected by the clock monitoring entity of the domain. One reason for declaring a monitoring failure state is that the maximum frequency deviation of the clock source has been exceeded. ESMC Fail Ethernet port with SSM-based clock has not received a SSM-packet stream for 5 seconds. Make sure the Ethernet port has been configured to supply SSMs and a dedicated flow has been directed to the port.
Tx quality Transmit clock quality Rx quality Receive clock quality ESMC State State of the Ethernet Synchronization Messaging Channel (ESMC) WTR State Wait-to-restore counter status
The ESMC statistics are displayed. ETX-5300A>config>system>clock>domain(1)>source(1)# ETX-5300A>config>system>clock>domain(1)>source(1)# show statistics ESMC Failure Counter : 1 Rx Tx ESMC Events : 0 1 ESMC Information : 0 29 ESMC Events Number of changed quality level messages sent and received ESMC Information Number of quality level information messages sent and received
Example
To configure clock selection: Domain 1: Synchronization network type 1 Source 1: Station clock port on main card A Source 2: Ethernet port 1 on main card A.
#***************************Defining_Station_Clock_Source******************** configure system clock station main-a/1 interface-type e1 no shutdown show status exit all #*********************************End**************************************** #***************************Configuring_Clock_Domain************************* configure system clock domain 1 sync-network-type 1 source 1 station main-a/1 priority 1 wait-to-restore 0 exit source 2 rx-port ethernet main-a/1 priority 2 wait-to-restore 0 exit all #*********************************End**************************************** #***************************Configuring_Ethernet_Ports*********************** configure port ethernet main-a/1 queue-group profile q_group_2_level_default tx-ssm no shutdown exit all configure port ethernet main-a/2 queue-group profile q_group_2_level_default no shutdown
ETX-5300A Ver. 1.0 Clock Selection 9-17
exit all #*********************************End**************************************** #*******************Configuring_Classifiier_Profile_for_SSM_Flow************* configure flows classifier-profile class1 match-any match untagged #*********************************End**************************************** #*******************Configuring_L2CP_Profile_for_SSM_Flow******************** configure port l2cp-profile l1 mac 01-80-c2-00-00-02 peer exit all #********************************Adding_SSM_Flow***************************** configure flows flow 1 classifier class1 egress-port ethernet main-a/2 queue-map-profile QueueMapDefaultProfile block 0/1 ingress-port ethernet main-a/1 l2cp profile l1 no shutdown exit all #*********************************End****************************************
oNote
The station clock input can be looped back directly via station clock output. The station clock interface does not provide Tx clock, if it uses a GPS 10 MHz
signal.
The station clock ports are located on the main cards and provide the following timing interfaces: E1 via RJ-45 balanced and BNC unbalanced ports T1 via RJ-45 balanced port 2 MHz square-wave synchronization via RJ-45 balanced and BNC unbalanced ports 64 kHz composite via RJ-45 balanced port GPS 10 MHz via mini BNC port (input only).
To configure the station clock: 1. Navigate to configure system clock station main-a/1 or main-b/1. The config>system>clock>station(main-a/1 or main-b/1)# prompt is displayed.
9-18
Clock Selection
tx-ssm
The config>system>clock>station(main-a/1 or main-b/1)# prompt is displayed. 2. Enter show status. The station clock status is displayed. ETX-5300A>config>system>clock>station(main-a/1)# show status Name : Station Clk-5-1 Administrative Status : Down Operational Status : Down Detailed Status : Received SSM : Quality Unknown
Example
To configure clock selection: Main card A Interface type: E1 Line type: G732N-CRC Name: E1_Station_Clock_1 Transmit clock source: domain 1 SSM transmission enabled.
ETX-5300A# configure system clock station main-a/1 ETX-5300A>config>system>clock>station(main-a/1)# shutdown ETX-5300A>config>system>clock>station(main-a/1)# interface-type e1 ETX-5300A>config>system>clock>station(main-a/1)# line-type g732n-crc ETX-5300A>config>system>clock>station(main-a/1)# name E1_Station_Clock_1 ETX-5300A>config>system>clock>station(main-a/1)# tx-clock-source domain 1 ETX-5300A>config>system>clock>station(main-a/1)# tx-ssm ETX-5300A>config>system>clock>station(main-a/1)# no shutdown
9-20
Clock Selection
Main Card A
Station Clock
SEC
Figure 9-5. Y-Cable Redundancy Note Although not shown in Figure 9-5, inputs 1 and 2 are doubled in main card B for redundancy.
To control Y-cable redundancy: 1. Verify that both station clocks to be used in Y-cable redundancy have been configured with the same parameters (interface type, line type etc). 2. Navigate to configure system clock The config>system>clock# prompt is displayed. 3. Enter station-y-cable to enable Y-cable protection or no station-y-cable to disable it.
Example
This example shows the configuration procedure for defining two clock sources: Source 1 E1 station clock Source 2 SDH/SONET port 1 on TDM card in slot 1.
#*************************Activating_SDH_SONET_Port************************** ETX-5300A# configure port sdh-sonet 1/1 ETX-5300A>config>port>sdh-sonet(1/1)# no shutdown ETX-5300A>config>port>sdh-sonet(1/1)# exit all #*********************************END**************************************** #*************************Configuring_Station_Clock************************** ETX-5300A# configure system clock station main-a/1 ETX-5300A>config>system>clock>station(main-a/1)# shutdown ETX-5300A>config>system>clock>station(main-a/1)# interface-type e1
Clock Selection
9-21
ETX-5300A>config>system>clock>station(main-a/1)# no shutdown ETX-5300A>config>system>clock>station(main-a/1)# show status Name : Station Clk-5-1 Administrative Status : Up Operational Status : Up Detailed Status : Received SSM : PRC #*********************************END**************************************** #*************************Configuring_Clock_Domain*************************** ETX-5300A# configure system clock domain 1 ETX-5300A>config>system>clock>domain(1)# sync-network-type 1 #*********************************END**************************************** #**********************Configuring_Station_Clock_as_Source_1***************** ETX-5300A>config>system>clock>domain(1)# source 1 station main-a/1 ETX-5300A>config>system>clock>domain(1)>source(1)$ wait-to-restore 10 ETX-5300A>config>system>clock>domain(1)>source(1)$ show status Status : Monitoring Fail Tx Quality : SEC Rx Quality : SSM Based ESMC State : Unlocked WTR State : Running <===== WTR Timer is running ETX-5300A>config>system>clock>domain(1)>source(1)$ clear-wait-to-restore ETX-5300A>config>system>clock>domain(1)>source(1)$ show status Status Tx Quality Rx Quality ESMC State WTR State : : : : : OK DNU PRC Unlocked Inactive
ETX-5300A>config>system>clock>domain(1)>source(1)$ exit ETX-5300A>config>system>clock>domain(1)# show status System Clock Source : 1 State State : Locked : Unlocked Quality : PRC
Force Switch:
Manual Switch : InActive #*********************************END**************************************** #**********************Configuring_SDH_SONET_Port_as_Source_2**************** ETX-5300A>config>system>clock>domain(1)# source 2 rx-port sdh-sonet 1/1 ETX-5300A>config>system>clock>domain(1)>source(2)$ quality-level ssu-a ETX-5300A>config>system>clock>domain(1)>source(2)$ wait-to-restore 10 ETX-5300A>config>system>clock>domain(1)>source(2)$ show status Status : OK Tx Quality : PRC
9-22
Clock Selection
Rx Quality : SSU-A ESMC State : Unlocked WTR State : Inactive ETX-5300A>config>system>clock>domain(1)# show status System Clock Source : 1 State State : Locked : Locked Quality : PRC
Force Switch:
Configuration Errors
Table 9-4 lists the messages generated by ETX-5300A when a configuration error
is detected.
9.2
1588v2 Timing
ETX-5300A fully supports IEEE 1588v2 Precision Time Protocol for distribution of synchronization signals over packet-switched networks. The device operates in master, transparent and slave clock modes with hardware-based time-stamping as well as ToD (time of day) synchronization.
1588v2 Timing
9-23
Benefits
The Precision Time Protocol (PTP), defined in the IEEE 1588 standard, is a high-precision time protocol for synchronization of clocks over a PSN. The use of PTP is beneficial for applications that cannot bear the cost of a GPS receiver at each node, or for which GPS signals are inaccessible.
Factory Defaults
By default, each 1588v2 entity is disabled and configured as neither master nor slave. When enabled, it has the following default settings:
Master Parameter ip-address ptp-domain maximum-slaves mode sync-rate tx-clock Default Value 4 256 time-frequency 64pps domain 1
Slave Parameter ip-address ptp-domain BMCA wait-to-restore recovery-mode priority network-type peer sync
Default Value 4 revertive 300 time-frequency 1 Automatic 0 rate 128pps grant-period 300
announce
delay-respond
9-24
1588v2 Timing
Installation and Operation Manual Slave Parameter quality-level Default Value type2SsmBased
Functional Description
When implementing the 1588v2 PTP, ETX-5300A operates in the following roles: 1588v2 master, eliminating the need for an external timing device installed in the core of the network to support 1588v2 timing distribution. The ETX-5300A system is located near the core of the network and supplies clock reference to remote Ethernet CPEs operating in 1588v2 mode. 1588v2 slave, regenerating frequency and time from 1588v2 packets received from grandmaster 1588v2 transparent. In the transparent mode, ETX-5300A timestamps the correction field of traversing 1588v2 (UDP/IP) packets to reflect time in ingress to egress direction. The device updates the correction field directly and does not use follow-up messages for the time-correction functionality.
Note
Figure 9-6 illustrates the basic schematics of the 1588v2 master functionality.
Both 1588v2 master entities reside on loopback addresses of the router. The 1588v2 entities generate PTP packets, which are encapsulated with UDP/IP and forwarded to 1588v2 slaves via PSN.
1588v2 Timing
9-25
9-26
1588v2 Timing
1588v2 Master
Frequency
SEC
Clock Inputs
GPS Source
1588v2 Master
Frequency
SEC
Clock Inputs
1588v2 Timing
9-27
ETX-5300A Main Card A 1588v2 Master 1588v2 Slave Main Card B 1588v2 Master
Legend:
Active Backup
1588v2 Slave
ETX-5300A
9-28
1588v2 Timing
The 1588v2 slave entity receives TOD information from the master clock source and outputs NMEA messages via TOD RJ-45 connector.
Recovery Modes
The 1588v2 slave entities operate in two-way mode to recover synchronization information, using sync, delay request and delay response messages. The message exchange modes are as follows: Frequency. In this mode, the 1588v2 slave entity reconstructs remote clock, using sync and delay request/response messages, while ignoring TOD information (time indication and time-related status/alarm messages). Frequency and time. In this mode, the 1588v2 slave entity reconstructs remote clock, using sync and delay request/response messages, while providing TOD information via TOD interface.
Forwarding
The 1588v2 slave entity uses a dedicated router loopback interface for message forwarding, similar to 1588v2 master (Figure 9-6). This LB RIF cannot be shared with either a 1588v2 master entity or a PW.
Redundancy
The ETX-5300A 1588v2 slaves support non-revertive clock redundancy, using the Best Master Clock (BMC) algorithm for selecting the clock source with the best quality. If a failure is detected (no sync massages within 10 seconds), the 1588v2 slave entity switches to the secondary master clock source.
Note
no master disables PTP master mode, setting the 1588v2 entity to be neither
mode. Use no master command prior to switching between slave and master modes.
ETX-5300A Ver. 1.0 1588v2 Timing 9-29
4. In the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter all necessary commands according to the tasks listed below.
Task Activating the 1588v2 master entity Defining IP address of 1588v2 master entity Creating a PTP domain Command no shutdown ip-address <value> Comments shutdown deactivates the 1588v2 master entity The IP address of 1588v2 master entity must be the same as the IP address of the router loopback interface A domain consists of one or more PTP devices (masters or slaves) communicating with each other according to PTP requirements. For correct distribution of timing signals, a 1588v2 master and slaves operating with it must belong to the same PTP domain. The total number of slaves supported by 1588v2 master entities residing on both main cards is 512 In frequency mode the master transmits sync and announce messages to slaves In time-frequency mode the master transmits sync, announce and delay response messages to slaves Defining the synchronization message rate Selecting Tx clock domain Displaying 1588v2 master status Displaying 1588v2 slave status Enable statistic collection sync-rate { 16pps | 32pps | 64pps | 128pps } tx-clock {domain <1>} show status slave <value > show status pm-collection The slave is identified by its IP address no pm-collection resets statistic counters and stops further collection of performance monitoring data All slaves within the domain must use the same message rate
ptp-domain <423>
Defining a maximum number of slaves Defining the 1588v2 message exchange mode
Displaying Status
You can display the current status of the 1588v2 master and the slaves in its domain. To display 1588v2 master status: At the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter show status. The 1588v2 master status is displayed.
9-30
1588v2 Timing
ETX-5300A>config>system>clock>master(main-a/1)# show status Administrative Status: Up Operational Status : Up Detailed Status : OK Slave IP Address Oper Clock Identity Announce Mode Rate (pps) 1 1.1.1.1 Frq xx:xx:xx:xx:xx:xx:xx:xx:xx:xx 16 2 2.2.2.2 Frq+T xx:xx:xx:xx:xx:xx:xx:xx:xx:xx 16 The 1588v2 master status provides information about: Administrative status:
Operational status:
Up 1588v2 master is operating properly Down 1588v2 master has failed LLD Lower Link Down
Detailed status:
OK 1588v2 master is operating properly TOD Failure ToD source failure 1PPS Failure 1PPS source failure
Slave status, including its number, IP address, message exchange mode, identifier (MAC address), announce and delay response message rates.
To display 1588v2 slave status: At the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter slave <IP address> show status. The 1588v2 slave status is displayed.
ETX-5300A>config>system>clock>master(main-a/1)# slave 1.1.1.1 show status Validity : On Operational Mode : Frequency+Time Clock Identity : xx:xx:xx:xx:xx:xx:xx:xx:xx:xx Announce Rate (pps) : 4 Announce Period (sec) : 6 Delay Response Rate (pps) : 4 Delay Response Period (sec) : 5 The 1588v2 slave status provides information about: Validity Slave validity Operational Mode Message exchange mode Clock Identity Unique slave identifier (MAC address) Announce Rate Current rate of Announce messages Announce Period Period of time for which an Announce message is transmitted
1588v2 Timing
9-31
Delay Response Rate Current rate of Delay Response messages Delay Response Period Period of time for which an Delay Response message is transmitted
Displaying Statistics
If the collection of performance monitoring data is enabled, you can display the current statistics for 1588v2 master or slave. To display statistics: At the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter show statistics running to display master statistics. or At In the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter slave < IP address> show statistics running to display slave statistics. The 1588v2 master or slave statistics are displayed. ETX-5300A>config>system>clock>master(main-a/1)# show statistics running Running ----------------------------------------------------------------------------Tx Packets : 1 Tx Sync Packets : 1 TX Follow Up Packets : 1 TX Delay Response Packets : 1 TX Announce Packets : 1 TX Signaling Packets : 1 Rx Packets : 1 RX Signaling Packets : 1 RX Delay Request : 1 Discarded Signaling Packets : 1
ETX-5300A>config>system>clock>master(main-a/1)>slave(1.1.1.1)#show statistics running Running -----------------------------------------------------------------------------Tx Sync Packets : 1 TX Follow Up Packets : 1 TX Delay Response Packets : 1 TX Announce Packets : 1 TX Signaling Packets : 1 RX Signaling Packets : 1 RX Delay Request : 1 Discarded Signaling Packets : 1
Installation and Operation Manual Counter TX Follow Up Packets TX Delay Response Packets TX Announce Packets TX Signaling Packets Rx Packets RX Signaling Packets RX Delay Request Discarded Signaling Packets Description
Number of Follow-up packets transmitted by 1588v2 master Number of Delay Response packets transmitted by 1588v2 master or slave Number of Announce packets transmitted by 1588v2 master or slave Number of Signaling packets transmitted by 1588v2 master or slave Number of all packets received by 1588v2 master Number of Signaling packets received by 1588v2 master or slave Number of Delay Request packets received by 1588v2 master or slave Number of Signaling packets discarded by 1588v2 master or slave
Configuration Errors
Table 9-6 lists the messages generated by ETX-5300A when a configuration error
is detected.
1588v2 Timing
9-33
Note
no recovered disables the PTP slave mode, setting the 1588v2 entity as
mode. Use no recovered prior to switching between slave and master modes.
4. At the config>system>clock>recovered(main-a/1 or main-b/1)# prompt, enter all necessary commands according to the tasks listed below.
Task Activating 1588v2 slave entity Defining IP address of 1588v2 slave entity Creating a PTP domain Command no shutdown ip-address <value> Comments shutdown deactivates 1588v2 slave entity The IP address of the 1588v2 slave entity must be the same as the IP address of the router loopback interface A domain consists of one or more PTP devices (masters or slaves) communicating with each other according to PTP requirements. For the correct distribution of timing signals, a 1588v2 master and the slaves operating with it must belong to the same PTP domain. Revertive mode if a higher priority master becomes available, the 1588v2 slave uses it as its active master Non-revertive if a higher priority master becomes available, the 1588v2 slave remains with its current active master Defining amount of time that previously failed clock must be fault free in order to be considered available wait-to-restore <0720>
ptp-domain <423>
revertive nonRevertive
9-34
1588v2 Timing
Installation and Operation Manual Task Defining the 1588v2 mode Command recovery-mode {frequency | timefrequency}
Chapter 9 Timing and Synchronization Comments frequency the 1588v2 slave entity reconstructs remote clock, using sync, delay request/response messages, and ignoring TOD information (time indication and time-related status/alarm messages) time-frequency the 1588v2 slave entity reconstructs remote clock, using sync, delay request/response messages, providing also TOD information via TOD interface
Note
Task Activating peer 1588v2 master Defining peer master source port ID
Comments shutdown deactivates peer 1588v2 master Default clock ID value (0xFFFFFFFFFFFFFFFFFFFF) indicates that the slave retrieves the master source port ID from the Announce messages. Any other value indicates that the slave ignores the value delivered in the Announce messages and uses the one that has been configured by the user.
1588v2 Timing
9-35
Chapter 9 Timing and Synchronization Task Defining peer master priority Command priority { 1 | 2}
Installation and Operation Manual Comments When a 1588v2 slave operates opposite two 1588v2 masters with the same quality level, it selects a clock source with the highest priority (priority 1)
Specifying the peer device that transmits the clock signal Defining synchronization message rate requested by the slave and duration of sync message transmission Defining Announce message rate requested by the slave and duration of Announce message transmission Defining Delay Response message rate requested by the slave and duration of Delay Response message transmission Setting quality level
peer <peer-number>
All slaves within a domain must use the same sync message rate parameters
announce {rate [16sec |8sec |4sec |2sec |1sec | 500msec | 250msec | 125msec] [grant-period <601000>}
All slaves within a domain must use the same Announce message rate parameters
All slaves within a domain must use the same Delay Response message rate parameters
quality-level { prc | ssu-a | ssu-b | type1-sec | type1-dnu | type1-ssm-based } quality-level { prs | stu | st2 | tnc | st3e | st3 | smc | st4 | dus | type2-ssm-based | prov } quality-level { unk | type3-sec | type3-dnu | type3-ssm-based }
Displaying Status
You can display current status of the 1588v2 slave entity. To display 1588v2 slave status: At the config>system>clock>recovered (main-a/1 or main-b/1)#prompt, enter show status. The 1588v2 master status is displayed.
9-36
1588v2 Timing
ETX-5300A>config>system>clock>recovered(main-a/1)# show status Clock State : Free Run Indicated QL : Type-1 PRC Clock Identity : 1 Active Master : 1 Ip Address : 30.30.30.30 Master Num IP PTSF Clock Identity Received QL Granted Sync Rate (pps) Granted Sync Period (sec) Granted Announce Rate (pps) Granted Announce Period (sec) Granted Delay Respond Rate (pps) Granted Delay Respond Period (sec) : : : : : : : : : : : 1 30.30.30.30 ACT Type-1 DNU 64 0 2 0 64 0
The 1588v2 slave status provides the following information Current state of the slave clock (free run, locked, acquisition, holdover) Indicated and received quality level Master clock identity, IP address and number PTSF (Packet Timing Signal Fail) indication. Its Active state indicates that the 1588v2 slave has not received a sync, delay respond or announce message for 10 seconds. Granted sync, delay respond and announce rates and periods
Displaying Statistics
You can display current statistics for 1588v2 slave entity. To display statistics: At the config>system>clock>recovered(main-a/1 or main-b/1)#prompt, enter show statistics running or measured to display running or measured slave statistics. The 1588v2 slave running or measured statistics are displayed.
1588v2 Timing
9-37
ETX-5300A>config>system>clock>recovered(main-a/1)# show statistics running Running ----------------------------------------------------------------------------Unicast Announce Request : 2 Unicast Announce Accept : 1 Unicast Announce Reject : 0 Unicast Announce Timeout : 0 Unicast Sync Request : 2 Unicast Sync Accept : 4 Unicast Sync Reject : 0 Unicast Sync Timeout : 0 Unicast Delay Respond Request : 3 Unicast Delay Respond Accept : 1 Unicast Delay Respond Reject : 0 Unicast Delay Respond Timeout : 1 Rx Unicast Sync Miss Ordered : 0 No Sync Total Elapsed Time : 10 No Sync Elapsed Time : 0 No Announce Total Elapsed Time : 6 No Announce Elapsed Time : 0 No Delay Respond Total Elapsed Time : 11 No Rx Rx Rx Delay Respond Elapsed Time Sync Packets Sync Lost Delay Respond Packets : : : : 0 9595 0 9467
Figure 9-11. 1588v2 Slave Measured Statistics Table 9-7. 1588v2 Slave Running Statistic Counters
Counter Unicast Announce Request Unicast Announce Accept Unicast Announce Reject Unicast Announce Timeout Unicast Sync Request Unicast Sync Accept Unicast Sync Reject Description Number of unicast announce messages sent by the slave Number of unicast announce messages accepted by the slave Number of unicast announce messages rejected by the slave Number of unicast announce messages that timed out Number of unicast sync messages sent by the slave Number of unicast sync messages accepted by the slave Number of unicast sync messages rejected by the slave
9-38
1588v2 Timing
Installation and Operation Manual Counter Unicast Sync Timeout Unicast Delay Respond Request Unicast Delay Respond Accept Unicast Delay Respond Reject Unicast Delay Respond Timeout Rx Unicast Sync Miss Ordered No Sync Total Elapsed Time No Sync Elapsed Time No Announce Total Elapsed Time No Announce Elapsed Time No Delay Respond Total Elapsed Time No Delay Respond Elapsed Time Rx Sync Packets Rx Sync Lost Rx Delay Respond Packets Description
Number of unicast sync messages that timed out Number of unicast delay respond messages sent by the slave Number of unicast delay respond messages accepted by the slave Number of unicast delay respond messages rejected by the slave Number of unicast delay respond messages that timed out Number of received unicast sync messaged that are misordered Total time in seconds during which sync messages were not received Time in seconds elapsed after the last received sync message Total time in seconds during which announce messages were not received Time in seconds elapsed after the last received announce message Total time in seconds during which delay respond messages were not received Time in seconds elapsed after the last received delay respond message Total number of received sync packets Total number of lost sync packets Total number of received delay respond packets
Current rate of sync messages Maximum rate of sync messages Minimum rate of sync messages Current rate of delay respond messages Maximum rate of delay respond messages Minimum rate of delay respond messages
Note
Delay respond rate counters are not available in time-frequency recovery mode.
Configuration Errors
Table 9-9 lists messages generated by ETX-5300A when a configuration error is
detected.
1588v2 Timing
9-39
9-40
1588v2 Timing
Installation and Operation Manual Task Activating ToD clock Defining ToD clock baud rate Assigning name to ToD clock Defining input interface for 1PPS phase stream Command no shutdown baudrate {2400bps | 4800bps | 9600bps | 14400bps | 19200bps | 38400bps | 57600bps | 115200bps} name <tod_name > interface-type {rj-45 | mini-bnc}
Chapter 9 Timing and Synchronization Comments shutdown deactivates the ToD clock
no name removes the ToD clock name rj-45 1PPS is supplied via RJ-45 TOD connector mini-bnc 1PPS is supplied via mini BNC 1PPS connector
show status
To enable/disable ToD Y-cable redundancy: 1. Verify that both ToD clocks to be used in Y-cable redundancy are active and have been configured with the same parameters (interface type, baud rate etc). 2. At the config>system>clock# prompt, enter tod-y-cable to enable or no tody-cable to disable the ToD Y-cable redundancy.
Example
This example illustrates configuration of 1588v2 slave and master entities. Slave clock
ETX-5300A Ver. 1.0
Router interface (RIF) 1 RIF IP address 15.15.15.15/32 Physical port Ethernet port 3 on main card A Peer IP address 30.30.30.30 Slave entity IP address 15.15.15.15 Quality level PRC
1588v2 Timing 9-41
ETX-5300A
Port 1
LB RIF 1
15.15.15.15/32
Router
30.30.30.30
RIF 2 SVI
Port 4
#***************************Adding_Loopback_RIF****************************** configure router 1 interface 1 loopback address 15.15.15.15/32 no shutdown exit all #*********************************END**************************************** #***************************Configuring_Peer_Master************************** configure peer 1 ip 30.30.30.30 exit all #*********************************END**************************************** #**************************Configuring_1588v2_Slave************************** configure system clock recovered main-a/3 ptp ip-address 15.15.15.15
9-42
1588v2 Timing
master 1 peer 1 quality-level prc no shutdown #*********************************End**************************************** To verify that the slave is locked:
#***************************Displaying_Slave_Clock_Status******************** config>system>clock>recovered(1/ptp) show status # Clock State: Frequency : Locked Time : Locked Indicated QL : Type-1 DNU Clock Identity : 0 Active Master : 1 Ip Address : 15.15.15.15
Master Num : 1 IP : 30.30.30.30 PTSF : NACT Clock Identity : Received QL : Type-1 DNU Granted Sync Rate (pps) : 128 Granted Sync Period (sec) : 60 Granted Announce Rate (pps) : 2 Granted Announce Period (sec) : 300 Granted Delay Respond Rate (pps) : 128 Granted Delay Respond Period (sec) : 300 #*********************************End**************************************** To configure 1588v2 master clock:
#***************************Adding_Loopback_RIF****************************** configure router 1 interface 2 loopback address 16.16.16.16/32 no shutdown exit all #*********************************END**************************************** #**************************Configuring_1588v2_Master************************* configure system clock master main-b/1 ptp ip-address 16.16.16.16 sync-rate 128pps no shutdown #*********************************End****************************************
1588v2 Timing
9-43
9-44
1588v2 Timing
Chapter 10 Administration
This chapter covers administrative tasks such as entering contact info, file management, etc. It also includes a section with instructions for resetting the unit.
Administrative Information
10-1
Chapter 10 Administration
To configure device information: Device name ETX-5300A-HQ Location floor-8 Contact Engineer-1. ETX-5300A-HQ location floor-8 contact Engineer-1 show device-information
ETX-5300A# configure system ETX-5300A>config>system# name ETX-5300A-HAC >config>system# ETX-5300A-HAC >config>system# ETX-5300A-HAC >config>system# Description Name Location Contact MAC Address Engine Time : : : : : :
ETH NTU: Boot; 1.10, Hw: 0.0, Main Sw: 3.0, Back-up Sw: 3.0 ETX-5300A-HQ floor-8 Engineer-1 00-20-D2-30-CC-9D 000:00:04:10
Benefits
Simple Network Time Protocol (SNTP) synchronizes the internal clocks of network devices to a single time reference source. SNTP provides comprehensive mechanisms to access national time dissemination services, organize the NTP subnet of servers and clients, and adjust the system clock in each participant. It improves the timekeeping quality of the network by using redundant reference sources and diverse paths for time distribution.
10-2
Chapter 10 Administration
Factory Defaults
The default configuration of the SNTP parameters is: No SNTP servers defined Polling interval set to 15 minutes.
When an SNTP server is defined, its default configuration is: IP address set to 0.0.0.0 Not preferred.
Functional Description
SNTP is a time-maintenance protocol that helps synchronize networked hardware. It is based on a server-client topology. A client (ETX-5300A) sets its system date and time by retrieving this information from an SNTP server. The information is used for time-stamping log file messages, SNMP traps, Syslog entries and so on. SNTP uses Coordinated Universal Time (UTC) as a reference.
Requ
ETX-5300A
est
PSN Request Response SNTP Server
Resp est Re
onse
Requ
se spon
ETX-5300A
Transport Protocol
SNTP uses User Datagram Protocol (UDP) for its transport. The UDP port that has been assigned to SNTP is 123, but devices and servers can be defined to use any port for communication.
The client checks each message received from an SNTP server by performing sanity checks to verify it validity (SNTP server IP match, source/destination port match etc).
Chapter 10 Administration
time <hh:mm[:ss]>
Example
To set the date and time: Format = mm-dd-yyyy Date = May 17, 2011 Time = 5:40pm Zone = UTC4 hours and 30 minutes.
ETX-5300A#configure system date-and-time ETX-5300A>config>system>date-time# date-format mm-dd-yyyy ETX-5300A>config>system>date-time# date 05-17-2011 ETX-5300A>config>system>date-time# time 17:40 ETX-5300A>config>system>date-time# zone utc -04:30 ETX-5300A>config>system>date-time#
SNTP Configuration
To configure SNTP parameters: 1. Navigate to config system date-and-time sntp. The config>system>date-time>sntp# prompt is displayed. 2. Enter all necessary commands according to the tasks listed below.
Task Enabling ETX-5300A to listen to NTP broadcast messages to obtain accurate timestamps Command broadcast Comments no broadcast disables broadcast mode.
10-4
Installation and Operation Manual Task Setting the polling interval (in minutes) for SNTP requests Defining and configuring SNTP servers (refer to Defining SNTP Servers and Configuring SNTP Server Parameters) Displaying SNTP status Command poll-interval interval <minutes> server <server-id>
show status
prefer
Setting UDP port for NTP requests, to a specific UDP port or to default UDP port (123) Administratively enabling server Sending query to server and displaying result
10-5
Chapter 10 Administration
Example
To define SNTP server: Server ID = 1 IP address = 192.1.1.1 Preferred Administratively enabled.
ETX-5300A# configure system date-and-time sntp ETX-5300A>config>system>date-time>sntp# server 1 ETX-5300A>config>system>date-time>sntp>server(1)# address 192.1.1.1 ETX-5300A>config>system>date-time>sntp>server(1)# prefer ETX-5300A>config>system>date-time>sntp>server(1)# no shutdown ETX-5300A>config>system>date-time>sntp>server(1)# query-server Query Server Replay ----------------------------------------------------------------------------Server : 192.1.1.1 UDP : 123 Date : 00-00-0000 Time : 00:00:00 Stratum : 0 ETX-5300A>config>system>date-time>sntp>server(1)# exit ETX-5300A>config>system>date-time>sntp# show status System Uptime : 000 Days 00:19:55 System Time : 2009-09-14 13:01:09 Current Source : 1 NTP Server Type 127.0.0.1 UDP Port Tstap Date Time Strat Received --
10.3 Inventory
The ETX-5300A inventory table displays the units components, hardware, software and firmware revisions. You can display an inventory table that shows all installed components, and you can display more detailed information for each component. In addition, you can display manufacture information on items installed in specific chassis slots, their serial numbers, software and hardware revisions and number of defined MAC addresses.
Chapter 10 Administration
Physical Class
Inventory
10-7
Chapter 10 Administration
To display manufacture information: At the config>chassis# prompt, enter show manufacture-info slot <slot_number> or show manufacture-info all to display information on items installed in a specific slot, or all existing items, respectively.
ETX-5300A# configure chassis ETX-5300A>config>chassis# show manufacture-info slot 1 Slot Main-A Type Main 10GEx4 Serial Number HW Ver 0.0 FW Ver 2.0
: : : : :
Assigning user-specific asset identifier to the component (usually for removable physical components) Assigning vendor-specific serial number to the component
serial-number <string>
10-8
Inventory
Chapter 10 Administration
Example
To display the following inventory information: Inventory table Inventory information for the ETX-5300A chassis.
ETX-5300A# configure chassis ETX-5300A# config>chassis# show inventory-summary Index Physical Class Name HW Ver SW Ver FW Ver ----------------------------------------------------------------------------1001 Chassis AC-chassi N/A N/A N/A 2001 Backplane Backplane 0.0 N/A N/A 3001 Container 1 N/A N/A N/A 3002 Container 2 N/A N/A N/A 3003 Container 3 N/A N/A N/A 3004 Container 4 N/A N/A N/A 3005 Container main-a N/A N/A N/A 3006 Container main-b N/A N/A N/A 3007 Container Slot 5 Port 1 N/A N/A N/A 3008 Container Slot 5 Port 2 N/A N/A N/A 3009 Container Slot 5 Port 3 N/A N/A N/A 3010 Container Slot 5 Port 4 N/A N/A N/A 3011 Container Slot 6 Port 1 N/A N/A N/A 3012 Container Slot 6 Port 2 N/A N/A N/A 3013 Container Slot 6 Port 3 N/A N/A N/A 3014 Container Slot 6 Port 4 N/A N/A N/A 3035 Container Slot 2 Port 1 N/A N/A N/A 3036 Container Slot 2 Port 2 N/A N/A N/A 3095 Container AC Slot N/A N/A N/A 3096 Container AC Slot N/A N/A N/A 3097 Container FAN N/A N/A N/A 4001 Power Supply PS_AC 1 0.0 N/A N/A 4003 Fan FAN 0.0 N/A N/A 5002 Module IO Card 2 65535.0 1.00A10T1 2.0 5005 Module Main Card A 5006 Module Main Card B 0.0 1.00A10T1 2.0 7005 Port Etherent port main-b/1 N/A N/A N/A 7006 Port Etherent port main-b/2 N/A N/A N/A 7007 Port Etherent port main-b/3 N/A N/A N/A 7008 Port Etherent port main-b/4 N/A N/A N/A 7010 Port RS_232 Control Port N/A N/A N/A 7011 Port Clock RJ45 Port N/A N/A N/A 7012 Port Clock BNC Port N/A N/A N/A 7013 Port Time Of Day BNC Port N/A N/A N/A 7014 Port Time Of Day RS422 Port N/A N/A N/A 7015 Port MNG Port N/A N/A N/A 7016 Port RS_232 Control Port N/A N/A N/A 7017 Port Clock RJ45 Port N/A N/A N/A 7018 Port Clock BNC Port N/A N/A N/A 7019 Port Time Of Day BNC Port N/A N/A N/A 7020 Port Time Of Day RS422 Port N/A N/A N/A 7041 Port Ethernet Port 2/1 N/A N/A N/A 7042 Port Ethernet Port 2/2 N/A N/A N/A
Inventory
10-9
Chapter 10 Administration
ETX-5300A# configure chassis ETX-5300A# config>chassis# inventory 1001 ETX-5300A# config>chassis>inventory(1001)# show status Description Contained In Physical Class Relative Position Name HW Ver SW Ver FW Ver Serial Number MFG Name Module Name Alias Asset ID FRU : : : : : : : : : : : : : : ETX-5300A.AC-chassis 0 Chassis 0 AC-chassi N/A N/A N/A RAD ETX-5300A-AC
True
The maximum allowed values for SFTP parameters are: Username 1 60 characters Password 1 60 characters File name 1100 characters Port 165535.
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands. The SFTP protocol is used to provide secure file transfers via the devices Ethernet interface. SFTP is a version of FTP that encrypts commands and data transfers, keeping your data secure and your session private. For SFTP file transfers, an SFTP server application must be installed on the local or remote
10-10
Downloading/Uploading Files
Chapter 10 Administration
computer. SFTP file transfers use Port 22. You must check that the firewall you are using on the server computer allows communication through this port. A variety of third-party applications offer SFTP server software. For more information, refer to the documentation of these applications.
Application file is transferred to ETX-5300A Ethernet PC with an Active SFTP Server and Application File
ETX-5300
Note
Note
Source file name can be one of the following: startup-config, user-default-config or rollback-config.
Chapter 10 Administration
Figure 10-3. Commands that Copy Configuration Files Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
You can copy files via the copy command, or via the commands shown in Table 10-2.
10-12
Chapter 10 Administration
Resetting to User Defaults Saving the Configuration Confirmation of Configuration File in Chapter 3
To copy files within the device: At the file# prompt, enter: copy <source-file> <dest-file>.
For example: Source file name running-config Destination file name startup-config.
ETX-5300A# file ETX-5300A>file# copy running-config startup-config To display the last copy command result: At the file# prompt, enter: show copy.
ETX-5300A# show file copy Network to Device, Transferring Data Src: sftp://172.17.174.56/etx1_03_00b06.bin Dst: sw-pack-4 Started: 14.3.2011 8:50:52 Transferred : 665600 Bytes in: 16 seconds (41600 Bytes/Second) To view the copy command history: At the file# prompt, enter: show copy summary.
For example: ETX-5300A>file# show copy summary Direction Source Destination End Time 1 Local running-config user-default-conf 13-3-2011 14:6:51 2 Local running-config startup-config 13-3-2011 14:7:35 3 Dev to Net startup-config DB 13-3-2011 14:7:40 Status Ended OK Ended OK Ended OK
10-13
Chapter 10 Administration
To display the files: At the file# prompt, enter dir. A list of the file names and types is displayed. For example:
ETX-5300A>file# dir Codes C - Configuration S - Software Name mac-table sw-pack-1 startup-config rollback-config
LO - Log
O - Other
Type Size(Bytes) Creation Date Status O S C C -70250901 508671 509453 34 -26598 2012-01-02 09:25:01 2011-12-10 05:58:01 2012-01-01 16:08:11 2012-01-01 19:58:30 2012-01-02 09:25:01 2012-01-02 11:19:24 2011-12-27 15:48:10 Read Only valid File In Use valid valid valid valid valid Read Only valid File In Use valid Read Only valid
: 672849920
At the file# prompt, enter the show command according to the table below.
Command show configuration-files show factory-default-config show rollback-config show startup-config show sw-pack Application files contain information on application software running on main and I/O cards installed in the chassis Comments
10-14
Installation and Operation Manual Task Displaying the user-defaultconfig file contents Command show user-default-config
Size (Bytes) -----------------------------------------------------ETX-5300A Ver. 1.0 Copying Files within ETX-5300A 10-15
Chapter 10 Administration
Deleting Files
You can delete files. Before deleting the file, make sure the file is not in use. For additional information on configuration files and the consequences of deleting, refer to Configuration Files and Loading Sequence in Chapter 3. To delete a file: 1. At the file# prompt, enter: delete <file-name>. You are prompted to confirm the deletion. For example: ETX-5300A# file ETX-5300A>file# delete sw-pack-1 File will be erased. Are you sure?? [yes/no] _yes 2. Confirm the deletion.
10-16
Chapter 10 Administration
Chapter 10 Administration
Note
10-18
Resetting ETX-5300A
Monitoring and Diagnostics Handling Events Running Diagnostic Tests Technical Support.
Indicators
ETX-5300A cards and the ETX-5300A chassis itself have various status indicators that can be used to identify problems. Refer to Chapter 3 of this manual for details regarding the functions and indications of each system indicator.
Statistic Counters
ETX-5300A collects statistics per physical and logical ports (see the list below) and per connection in 15-minute intervals. This enables the network operator to monitor the transmission performance, and thus the quality of service provided
Detecting Problems
11-1
to users, as well as identify transmission problems. Performance parameters for all the active entities are continuously collected during equipment operation. Statistics for the last 24 hours are stored in the device and can be retrieved at the network management station. Statistic counters provide information on possible abnormal behavior and failures.
Alarms and events have the following properties: Source An entity for which alarms and events can be generated. The source consists of a source ID, source type (e.g., system, fan, Ethernet), and source name. ID Unique numeric identification of the alarm/event Name Unique alphanumeric identification of the alarm/event, of up to 32 characters Description Alphanumeric description that provides details about the alarm/event Severity (alarms only) Critical, Major, or Minor.
Masking
Alarms and events can be masked per source type, source ID, or minimum severity. When masking by source type (such as Ethernet) or source ID (such as Ethernet port 1 on card in slot 1), choose a specific alarm or event, or apply the change to all the alarms and events of the selected source type or ID.
11-2
Handling Events
When masking an alarm/event, you can: Prevent the alarm/event from being written to the history log, sent to Syslog servers, and displayed in the default view of the active alarms table Prevent any corresponding traps from being sent to management stations, regardless of masking in the SNMP manager configuration Deactivate alarm reporting via LED and alarm relay.
When an alarm/event is not masked, any corresponding traps are sent only to management station for which the traps are not masked in the SNMP manager configuration. In addition, you can: Change alarm severity Mask a specific reporting method Mask alarms per their severity.
You can also acknowledge alarm logs. The last acknowledgement time is recorded by ETX-5300A. When displaying the log, only entries entered after the last acknowledgment time are displayed (or calculated, as for the brief log). This action does not delete any data from the log, and you can also display acknowledged data by using a designated keyword.
Alarm Buffer
ETX-5300A continuously monitors critical signals and signal processing functions. In addition, it can monitor an external alarm line, connected to the ALARM connector. If a problem is detected, ETX-5300A generates time-stamped alarm messages. These messages are explained below. Internally, the ETX-5300A stores alarms in an alarm buffer. The alarm buffer can store up to 5000 alarm messages, together with their time-stamps. The alarm history buffer is organized as a FIFO queue; after 5000 alarms have been written into the buffer, new alarms overwrite the oldest alarms. Alarm messages can also be sent automatically as traps to the user-specified network management stations. The alarms can be read on-line by the network administrator using the network management station, a Telnet host, a Web browser, or a supervision terminal. The network administrator can then use the various diagnostic tests to determine the causes of the alarm messages and to restore the system to normal operation. When ETX-5300A is powered down, the alarm messages are not erased. When using the terminal, a Web browser or a Telnet host, you can also clear (delete) the alarms stored in this buffer after reading them.
Alarm Relays
In addition to the alarm reporting facility, ETX-5300A has alarm relays with floating change-over contacts for indicating the presence of critical, major and minor alarms. Each relay changes state whenever the first alarm is detected, and returns to its normal state when all the alarms of the corresponding severity disappear.
ETX-5300A Ver. 1.0 Handling Events 11-3
The relay contacts can be used to report internal system alarms to outside indicators, e.g., lights, buzzers, bells, located on an alarm bay or remote monitoring panel.
alarm-input <port-number> [active {high | low | high Active alarm input is off}] [description <description>] indicated by high voltage low Active alarm input is indicated by low voltage off Alarm input is disabled
Masking alarm/event from a specific source, defining alarm severity and masking reporting methods
alarm-source-attribute <source-type> Use the no form to mask [<source-id>] alarm <alarm-list> [severity alarms/events. The following {critical | major | minor}] [log] [snmp-trap] [led- apply: relay] If a trap is masked according to alarm/event attribute, it is alarm-source-attribute<source-type> not sent to any management [<source-id>] event <alarm-list> [log] [snmp-trap] station, regardless of whether it is masked in the SNMP manager configuration If a trap is unmasked according to alarm/event attribute, it is sent only to management station for which it is not masked in the SNMP manager configuration.
11-4
Handling Events
Installation and Operation Manual Task Masking alarm/event from a specific source type, defining alarm severity and masking reporting methods Command
Chapter 11 Monitoring and Diagnostics Comments Use the no form to mask alarms/events. The following apply: If a trap is masked according to alarm/event attribute, it is not sent to any management station, regardless of whether it is masked in the SNMP manager configuration If a trap is unmasked according to alarm/event attribute, it is sent only to management station for which it is not masked in the SNMP manager configuration.
alarm-source-type-attribute <source-type> alarm <alarm-list> [severity {critical | major | minor}] [log] [snmp-trap] [led-relay] alarm-source-type-attribute <source-type>
Note: Severity, LED and LED- event <alarm-list> [log] [snmp-trap] Relay apply only to alarms.
mask-minimum-severity [log {critical | major | minor}] [snmp-trap {critical | major | minor}] [led-relay {critical | major | minor}] no mask-minimum-severity [log] [snmp-trap [led-relay]
Masking a minimum severity means that lower severities are also masked
Rebuilding active alarm table active-alarm-rebuild [send-traps] from scratch, and, optionally resending traps for all open alarms
To ensure that no active alarms are lost due to a system failure, the user can rebuild the active alarm table. The optional traps sent by the system have an indication that are sent because of the configuration change.
acknowledge {log | brief-log | all-logs} show See Working with the Alarm and
Event Logs
Note
If alarm/event is masked using one of the masking commands (alarm-source-attribute, alarm-source-type-attribute, mask-minimum-severity), there is no need to repeat the procedure using the other commands.
Examples
To mask alarm for a specific source type: Source type All E1s Alarm excessive-bpv Reporting methods log
Handling Events
11-5
ETX-5300A>config# reporting ETX-5300A>config>reporting# alarm-source-type-attribute e1 excessive-bpv log To mask event for a specific source: Source type E1 1 in port 1 on card in slot 1 Event css-path-tca Reporting methods SNMP trap
ETX-5300A>config# reporting ETX-5300A>config>reporting# alarm-source-attribute e1 1/1/1 event css-path-tca snmp-trap To mask alarms per severity: Severity major and lower Reporting method LED and alarm relay
Meaning
Shows the active alarms table. Counters of active alarms in the output appear at the top of the screen, listed in order of severity Same as above but with time-stamp and alarm description added to active alarms. Detailed information about the alarm type. For example, if you need to know what the LOF alarm is on SDH/SONET in Examples 1 or 2, see Example 3. Displays information about alarm inputs (also known as alarm relays) connected to external sources. Information includes alarm status, voltage assigned to it (high or low), and alarm description. Log of active and cleared alarms (without events). The default view of the alarm log (i.e., alarm history) shows one line per raised alarm and one for cleared alarm.
Example Number
1
active-alarms-details alarm-information
alarm-input
alarm-log
11-6
Handling Events
Display Option
alarm-list [<source ID> [severity {critical|major|minor}]] brief-alarm-log
Meaning
List of all ETX-5300A alarms for a specific source ID and severity value, or for all the alarms in the system Brief log of active and cleared alarms (without events). Unlike the full alarm log (show log), which displays all alarm instances, the brief log provides only one alarm entry with the number of times it was recorded since last acknowledged. The brief log is cleared at reboot. Brief log of active alarms, cleared alarms and events. The brief log is cleared at reboot. Detailed information about event type (similar to alarminformation). List of all ETX-5300A events for a specific source IDs or of all the events available in the system Log of active alarms, cleared alarms and events
Example Number
6
Minor
Handling Events
11-7
Domain station clock state changed to unlocked Domain Clock 1 station_clock_unlock Major Unmasked
2011-12-20 20:55:23.00 2
Provisioning failure Card 1 failure FAN 1 fan_failure Critical Unmasked card_provision_failure Critical Unmasked
2011-12-20 20:56:11.00
11-8
Handling Events
2011-12-18 02:17:00.00
2011-12-18 02:16:58.00
ID
Severity
Logged
System SYSTEM_TEMPERATURE_ORA 20002 Major Yes (Default) ---------------------------------------------------------------------------System hardware_failure_fe 20012 Yes (Default) ----------------------------------------------------------------------------System configuration_mismatch_fe 20013 Yes (Default) ----------------------------------------------------------------------------System INTERFACE_MISMATCH_FE 20014 Major Yes (Default) ----------------------------------------------------------------------------System NO_INTERFACE_FE 20015 Yes (Default) ----------------------------------------------------------------------------Power Supply POWER_DELIVERY_FAILURE 20201 Major Yes (Default) ----------------------------------------------------------------------------Alarm Input Alarm_Relay_Input 20401 Major Yes (Default) ----------------------------------------------------------------------------Card HARDWARE_FAILURE 40001 Major Yes (Default) ----------------------------------------------------------------------------Card CARD_MISMATCH 40002 Major Yes (Default) ----------------------------------------------------------------------------To scroll up and down in the list, use the arrow keys.
Handling Events
11-9
System System
-----
Clearing Alarms
To clear a log: At the config>reporting# prompt, enter clear followed by log, brief-log or alllogs to clear the full log, brief log or all alarm/event logs in ETX-5300A. The log is cleared.
Alarm List
Table 11-1 lists and explains the alarm messages generated by the ETX-5300A.
The alarm messages are listed alphabetically in order of the following: Source type: system, card, port/entity Alarm name (inside each source)
For each alarm, Table 11-1 also specifies the alarm description, the corresponding trap, and the alarm ID (unique number that identifies the alarm). Alarm names are not case-sensitive.
11-10
Handling Events
Installation and Operation Manual Source Type card card card Alarm Name card_temperature ora card_no_response card_initialization_ failure system_clock_ unlock domain_clock_ql_ low station_clock_ unlock ais lof rai erp_state_protected sfp_no_response sfp_mismatch los sfp_removed sfp_temperature_ ora sfp_opr_ora auto_negotiation_ failure fan_failure lacp_down lacp_loop_detection lacp_churn ais lck Alarm Description Card temperature is out of range Loss of communication with card Card software download has failed
Chapter 11 Monitoring and Diagnostics Trap Name cardTemperatureOra cardNoResponse cardInitFailure clockDomainStation ClockUnlock clockDomainQlLow clockDomainStation ClockUnlock e1t1Ais e1t1Lof e1t1Rai erpStateProtected sfpNoResponse sfpMismatch ethLos sfpRemoved sfpTemperatureOra sfpOprOra ethAutoNegotiation Failure fanFailure lagLacpDown lagLacpLoopDetection lagLacpChurn oamCfmMepAis oamCfmMepLck Alarm ID 40007 40008 40009
clock-domain
Domain system clock state changed to freerun, holdover or locked Domain clock quality level is below minimum Domain station clock state has changed to unlocked Alarm indication signal (AIS) Loss of frame (LOF) Remote alarm indication (RAI) ERP ring state changed to protected Loss of communication with SFP SFP mismatch Loss of signal (LOS) SFP not installed Laser temperature is out of range Optical power received (OPR) is out of range Autonegotiation with remote device failed Fan failure Ethernet port active but LACP out-of-sync LACP detected loop between LAG ports LACP is unable to synchronize with partner Alarm Indication Signal (AIS) Lock Signal (LCK)
30301
clock-domain clock-domain e1t1 e1t1 e1t1 erp eth eth eth eth eth eth eth fan lag lag lag oam-cfmmep oam-cfmmep
30302 30303 110105 110106 110107 290301 50001 50002 50003 50004 50005 50006 50008 20101 250001 250002 250003 270201 270202
Handling Events
11-11
Chapter 11 Monitoring and Diagnostics Source Type oam-cfmmep oam-cfmmep oam-cfmmep path path path path path path path path path power-supply power-supply power-supply ptp-master ptp-master ptp-master ptprecovered ptprecovered ptprecovered ptprecovered ptprecoveredmaster 11-12 Alarm Name Alarm Description Mismatch due to mismerge, unexpected MEP, unexpected MEG level, unexpected period Loss of Continuity (LOC) Remote Defect Indication (RDI) Alarm Indication Signal (AIS) Loss of Multiframe (LOMF) Unequipped payload Path Trace ID mismatch (TIM) Payload Label Mismatch (PLM) Loss of Pointer (LOP) BER above signal degradation threshold BER above excessive error threshold Remote Failure Indication (RFI) Power supply failure Input power out-of-range Input power near minimum Unavailable Time of Day (ToD) Unavailable 1PPS Slaves limit reached No PTP master can be reached Unacceptable frequency accuracy Unacceptable time accuracy Master disqualification Rx sync messages timeout expiration
mismatch
oamCfmMepMismatch
270203
loc rdi ais-path lomf-path uneq-path tim-path plm-path lop-path sd-path eed-path rfi-path power_delivery_ failure power_in_ora power_in_low unavailable_tod unavailable_1pps slaves_limit_reached no_ptp_master invalid_frequency_ accuracy invalid_time_ accuracy disqualified_master
oamCfmRmepLoc oamCfmRmepRdi pathAis pathLomf pathUneq pathTim pathPlm pathLop pathSd pathEed pathRfi powerDeliveryFailure powerInOra powerInLow ptpMasterUnavailable Tod ptpMasterUnavailable 1pps ptpMasterSlavesLimit Reached ptpRecoveredNoPtpM aster ptpRecoveredInvalid FreqAccuracy ptpRecoveredInvalid TimeAccuracy ptpRecoveredDisquali fiedMaster ptpRecoveredMaster SyncFail
270601 270602 100201 100202 100203 100204 100205 100206 100207 100208 100209 20201 20202 20203 30601 30602 30603 30201 30202 30203 30204
sync_failure
30401
Handling Events
Installation and Operation Manual Source Type ptprecoveredmaster ptprecoveredmaster pw pw pw pw pw pw routerinterface sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet station-clock station-clock station-clock Alarm Name Alarm Description Rx announce messages timeout expiration Rx delay response messages timeout expiration Configuration mismatch PW OAM disconnected Remote defect indication (RDI)
Chapter 11 Monitoring and Diagnostics Trap Name ptpRecoveredMaster AnnounceFail ptpRecoveredMaster DelayRespFail pwConfigMismatch pwOamFailure pwRdi pwRxFailure pwFeRxFailure pwFeRdi routerIfDhcpClientNo Lease sfpNoResponse sfpMismatch sdhSonetLof sdhSonetRfi sdhSonetLos sfpRemoved sfpTemperatureOra sfpOprOra sdhSonetAis sdhSonetTim sdhSonetSd sdhSonetEed stationClockAis stationClockLof stationClockLos Alarm ID
announce_failure
30402
delay_response_ failure configuration mismatch pw_oam_failure rdi rx_failure rx_failure_fe rdi_fe dhcp_client_no_ lease sfp_no_response sfp_mismatch lof rfi-line los sfp_removed sfp_temperature_ ora sfp_opr_ora ais-line tim sd-line eed-line ais lof los
30403
310001 310002 310003 310004 310008 310009 300101 100001 100002 100003 100004 100005 100006 100007 100008 100009 100010 100011 100012 30102 30103 30104
Ethernet frames not received by PW Ethernet frames not received by PW at far end Remote defect indication (RDI) at the far end DHCP lease not obtained Loss of communication with SFP SFP mismatch Loss of frame (LOF) Remote failure indication (RFI) Loss of signal (LOS) SFP is not installed Laser temperature is out of range Optical power received (OPR) is out of range Alarm indication signal (AIS) Section trace ID mismatch (TIM) BER above signal degradation threshold BER above excessive error threshold Alarm Indication Signal (AIS) Loss of Frame (LOF) Loss of Signal (LOS)
Handling Events
11-13
Chapter 11 Monitoring and Diagnostics Source Type system system system vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt Alarm Name device_temperature _ora hardware_failure sw_pack_corrupted ais-vcvt uneq-vcvt tim-vcvt plm-vcvt lop-vcvt sd-vcvt eed-vcvt rfi-vcvt Alarm Description Device temperature is out of range Hardware failure Application software file is corrupted Alarm indication signal (AIS) Unequipped payload Path trace ID mismatch (TIM) Payload label mismatch (PLM) Loss of pointer (LOP) BER above signal degradation threshold BER above excessive error threshold Remote failure indication (RFI)
Installation and Operation Manual Trap Name systemDevice TemperatureOra systemHardware Failure systemSwPack Corrupted vcVtAis vcVtUneq vcVtTim vcVtPlm vcVtLop vcVtSd vcVtEed vcVtRfi Alarm ID 20002 20005 20008 100101 100103 100104 100105 100106 100107 100108 100109
Event List
Table 11-2 lists the event messages generated by the ETX-5300A and explains their interpretation. The event messages are listed alphabetically in order of the following:
Source type: system, card, port/entity Alarm name (inside each source)
For each alarm, Table 11-2 also specifies the alarm description, the corresponding trap and the event ID (unique number that identifies the event type). Event names are not case-sensitive. For an alphabetical list of traps, see Table 11-3.
11-14
Handling Events
Installation and Operation Manual Source Type clockdomain e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 erp-port eth eth eth eth lag lag oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne
Event Name station_source_ clock_change loopback loopback_off es_line_tca cv_path_tca es_path_tca ses_path_tca sefs_path_tca css_path_tca uas_path_tca erp_port_state_ change sfp_opt_ora sfp_opt_ora_off sfp_lbc_ora sfp_lbc_ora_off sub_group_ switchover lag_failure delay_tca delay_tca_off delay_var_tca delay_var_tca_off
Event Description
Trap Name clockDomainStation SrcClockChange e1t1Loopback e1t1LoopbackOff e1t1EsLineTca e1t1CvPathTca e1t1EsPathTca e1t1SesPathTca e1t1SefsPathTca e1t1CssPathTca e1t1UasPathTca erpPortState Change sfpOptOra sfpOptOraOff sfpLbcOra sfpLbcOraOff lagSubGroup Switchover lagFailure oamCfmDestNe DelayTca oamCfmDestNe DelayTcaOff oamCfmDestNe DelayVarTca oamCfmDestNe DelayVarTcaOff
Event ID
Domain station source clock changed Loopback started Loopback ended Errored Seconds (ES) threshold crossing alert Coding Violation (CV) threshold crossing alert Errored seconds (ES) threshold crossing alert Severely Errored Seconds (SES) threshold crossing alert Severely Errored Framing Seconds (SEFS) threshold crossing alert Controlled Slip Seconds (CSS) threshold crossing alert Unavailable Seconds (UAS) threshold crossing alert ERP port state changed Optical power transmitted (OPT) out of range Optical power transmitted (OPT) in permitted range Laser bias current (LBC) out of range Laser bias current (LBC) in permitted range Switchover between sub-groups of inter-card LAG All LAG member ports are down Delay threshold crossing alert Delay in permitted range Delay variance threshold crossing alert Delay variance in permitted range
1030302 1110104 1110105 1110106 1110107 1110108 1110109 1110110 1110111 1110112 1291101 1050001 1050002 1050003 1050004 1250001 1250002 1270401 1270402 1270403 1270404
Handling Events
11-15
Chapter 11 Monitoring and Diagnostics Source Type oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne path path path path path path path path ptpmaster ptpmaster ptprecovered
Event Name
Event Description
Trap Name oamCfmDestNe LossRatioTca oamCfmDestNe LossRatioTcaOff oamCfmDestNe LossRatioTcaFe oamCfmDestNe LossRatioTcaFeOff oamCfmDestNe UnavailRatioTca oamCfmDestNe UnavailRatioTcaOff oamCfmDestNeUna vailRatioTcaFe oamCfmDestNeUna vailRatioTcaFeOff pathEsTca pathSesTca pathCvTca pathUasTca pathFeEsTca pathFeSesTca pathFeCvTca pathFeUasTca ptpMasterGranted ServiceAborted ptpMasterSlave RequestDenied ptpRecoveredPtp StateChange
Event ID
loss_ratio_tca loss_ratio_tca_off loss_ratio_tca_fe loss_ratio_tca_fe_ off unavailable_ratio_ tca unavailable_ratio_ tca_off unavailable_ratio_ tca_fe unavailable_ratio_ tca_fe_off es_path_tca ses_path_tca cv_path_tca uas_path_tca es_path_tca_fe ses_path_tca_fe cv_path_tca_fe uas_path_tca_fe granted_service_ aborted slave_request_ denied ptp_state_change
Loss ratio threshold crossing alert Loss ratio in permitted range Loss ratio threshold crossing alert at far-end Loss ratio in permitted range at far-end Unavailable ratio threshold crossing alert Unavailable ratio in permitted range Unavailable ratio threshold crossing alert at far-end Unavailable ratio in permitted range at far-end Errored seconds (ES) threshold crossing alert Severely errored seconds (SES) threshold crossing alert Coding violation (CV) threshold crossing alert Unavailable Seconds (UAS) threshold crossing alert Errored seconds (ES) threshold crossing alert at far end Severely errored seconds (SES) threshold crossing alert at far end Coding violation (CV) threshold crossing alert at far end Unavailable Seconds (UAS) threshold crossing alert at far end Granted service aborted Slave request denied PTP state changed to freerun/ holdover/acquiring/locked
1270405 1270406 1270407 1270408 1270409 1270410 1270411 1270412 1100201 1100202 1100203 1100204 1100205 1100206 1100207 1100208 1030601 1030602 1030201
11-16
Handling Events
Installation and Operation Manual Source Type ptprecovered ptprecovered ptprecovered ptprecovered -master pw pw pw sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet
Event Name
Event Description
Trap Name ptpRecovered SevereFreq Condition ptpRecovered SevereTime Condition ptpRecovered MasterSwitchover ptpRecovered MasterUnicastNeg Fail pwSwitchover pwJitterBuffer Overflow pwJitterBuffer Underflow sfpOptOra sfpOptOraOff sfpLbcOra sfpLbcOraOff sdhSonetEsSecTca sdhSonetSesSecTca sdhSonetSefsSecTc a sdhSonetCvSecTca sdhSonetEsLineTca sdhSonetSesLineTc a sdhSonetCvLineTca sdhSonetUasLineTc a
Event ID
severe_frequency_ condition severe_time_ condition master_switchover unicast_ negotiation_failure pw_switchover jitter_buffer_ overflow jitter_buffer_ underflow sfp_opt_ora sfp_opt_ora_off sfp_lbc_ora sfp_lbc_ora_off es_section_tca ses_section_tca sefs_section_tca cv_section_tca es_line_tca ses_line_tca cv_line_tca uas_line_tca
Network conditions might cause frequency recovery degradation Network conditions might cause time recovery degradation Switchover to master (ID)
1030202
1030203
1030204
Unicast negotiation failure PW switchover Jitter buffer overflow Jitter buffer underflow Optical power transmitted (OPT) out of range Optical power transmitted (OPT) in permitted range Laser bias current (LBC) out of range Laser bias current (LBC) in permitted range Errored seconds (ES) threshold crossing alert Severely errored seconds (SES) threshold crossing alert Severely Errored Framing Seconds (SEFS) threshold crossing alert Coding violation (CV) threshold crossing alert Errored seconds (ES) threshold crossing alert Severely errored seconds (SES) threshold crossing alert Coding violation (CV) threshold crossing alert Unavailable Seconds (UAS) threshold crossing alert
1030401 1310001 1310002 1310003 1100001 1100017 1100002 1100018 1100003 1100004 1100005 1100006 1100007 1100008 1100009 1100010
Handling Events
11-17
Chapter 11 Monitoring and Diagnostics Source Type sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet system system system system system
Event Name
Event Description Errored seconds (ES) threshold crossing alert at far end Severely errored seconds (SES) threshold crossing alert at far end Coding violation (CV) threshold crossing alert at far end Unavailable Seconds (UAS) threshold crossing alert at far end Port switchover Loopback started Loopback ended Software file_name installation started Software file_name installation ended file_name download Device reset by user file_name loaded as running-config
Trap Name sdhSonetFeEsLineT ca sdhSonetFeSesLine Tca sdhSonetFeCvLine Tca sdhSonetFeUasLine Tca sdhSonetPort Switchover sdhSonetLoopback sdhSonetLoopback Off systemSoftware InstallStart systemSoftware InstallEnd systemDownload End systemUserReset systemAlternate ConfigLoaded System Configuration Migration System ConfigurationSanity systemTrapHard SyncStart systemTrapHard SyncEnd System Configuration ChangeMask System Configuration ChangeUnmask
Event ID
es_line_tca_fe ses_line_tca_fe cv_line_tca_fe uas_line_tca_fe port_switchover loopback loopback_off sw_install_start sw_install_end download_end user_reset alternate_ configuration_ loaded configuration_ migration configuration_ sanity trap_hard_sync_ start trap_hard_sync_ end configuration_ change_mask configuration_ change_unmask
1100011 1100012 1100013 1100014 1100015 1100019 1100020 1020001 1020002 1020003 1020004 1020005
system
file_name conversion file_name after software upgrade Configuration sanity in file_name: configuration file_name Trap synchronization hard sync process started Trap synchronization hard sync process ended Configuration change traps masked
1020006
system
system
11-18
Handling Events
Event Name backup_ configuration_ loaded device_startup active_software_ changed running_config_ saved successful_login failed_login logout sw_unconfirmed startup_config_ unconfirmed es_vcvt_tca ses_vcvt_tca cv_vcvt_tca uas_vcvt_tca es_vcvt_tca_fe ses_vcvt_tca_fe cv_vcvt_tca_fe uas_vcvt_tca_fe
Event Description
Trap Name systemBackup Configuration Loaded systemDevice Startup systemActive SoftwareChanged systemRunning ConfigSaved systemSuccessful Login systemFailedLogin systemLogout systemSw Unconfirmed systemStartup ConfigUnconfirmed vcVtEsTca vcVtSesTca vcVtCvTca vcVtUasTca vcVtFeEsTca vcVtFeSesTca vcVtFeCvTca vcVtFeUasTca
Event ID
system
Device configuration loaded from backup database Device startup Active software changed from last reboot Running configuration saved to startup configuration user_name login from user_name failed to logon from due to user_name logout from Installed software not confirmed New startup-config not confirmed Errored seconds (ES) threshold crossing alert Severely errored seconds (SES) threshold crossing alert Coding violation (CV) threshold crossing alert Unavailable Seconds (UAS) threshold crossing alert Errored seconds (ES) threshold crossing alert at far end Severely errored seconds (SES) threshold crossing alert at far end Coding violation (CV) threshold crossing alert at far end Unavailable Seconds (UAS) threshold crossing alert at far end
1020017
system system system system system system system system vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt
Trap List
The traps are listed in the table below.
Handling Events
11-19
alarm-input card card card card card card card clock-domain clock-domain clock-domain clock-domain e1t1 e1t1 e1t1 erp eth sdh-sonet eth sdh-sonet eth eth sdh-sonet eth sdh-sonet eth sdh-sonet eth fan lag lag
alarmInput cardHwFailure cardMismatch cardProvisionFailure cardImproperRemoval cardTemperatureOra cardNoResponse cardInitFailure clockDomainStationClock Unlock clockDomainSystemClock Unlock clockDomainStationClock Unlock clockDomainQlLow e1t1Ais e1t1Lof e1t1Rai erpStateProtected sfpNoResponse sfpMismatch ethLos sfpRemoved sfpTemperatureOra sfpOprOra ethAutoNegotiationFailure fanFailure lagLacpDown lagLacpLoopDetection
alarm_input card_hardware_failure card_mismatch card_provision_failure card_improper_removal card_temperature_ora card_no_response card_initialization_failure station_clock_unlock system_clock_unlock station_clock_unlock domain_clock_ql_low ais lof rai erp_state_protected sfp_no_response sfp_mismatch los sfp_removed sfp_temperature_ora sfp_opr_ora auto_negotiation_failure fan_failure lacp_down lacp_loop_detection
1.3.6.1.4.1.164.6.5.0.1 1.3.6.1.4.1.164.3.3.2.1.0.1 1.3.6.1.4.1.164.3.3.2.1.0.2 1.3.6.1.4.1.164.3.3.2.1.0.3 1.3.6.1.4.1.164.3.3.2.1.0.6 1.3.6.1.4.1.164.3.3.2.1.0.7 1.3.6.1.4.1.164.3.3.2.1.0.8 1.3.6.1.4.1.164.3.3.2.1.0.9 1.3.6.1.4.1.164.6.2.52.0.8 1.3.6.1.4.1.164.6.2.52.0.1 1.3.6.1.4.1.164.6.2.52.0.8 1.3.6.1.4.1.164.6.2.52.0.2 1.3.6.1.4.1.164.3.1.6.4.0.25 1.3.6.1.4.1.164.3.1.6.4.0.26 1.3.6.1.4.1.164.3.1.6.4.0.27 1.3.6.1.4.1.164.3.1.6.1.0.4 1.3.6.1.4.1.164.40.3.4.0.1 1.3.6.1.4.1.164.40.3.4.0.2 1.3.6.1.4.1.164.3.1.6.1.0.1 1.3.6.1.4.1.164.40.3.4.0.3 1.3.6.1.4.1.164.40.3.4.0.4 1.3.6.1.4.1.164.40.3.4.0.5 1.3.6.1.4.1.164.3.1.6.1.0.6 1.3.6.1.4.1.164.6.1.0.64 1.3.6.1.4.1.164.6.2.54.0.1 1.3.6.1.4.1.164.6.2.54.0.2
11-20
Handling Events
Installation and Operation Manual Associated to Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Source Type Trap Description
lag oam-cfm-mep oam-cfm-mep oam-cfm-mep oam-cfm-mep oam-cfm-mep path path path path path path path path path power-supply power-supply power-supply ptp-master ptp-master ptp-master ptp-recovered ptp-recovered ptp-recovered ptp-recovered ptprecoveredmaster ptprecoveredmaster
lagLacpChurn oamCfmMepAis oamCfmMepLck oamCfmMepMismatch oamCfmRmepLoc oamCfmRmepRdi pathAis pathLomf pathUneq pathTim pathPlm pathLop pathSd pathEed pathRfi powerDeliveryFailure powerInOra powerInLow ptpMasterUnavailableTod ptpMasterUnavailable1pps ptpMasterSlavesLimitReached ptpRecoveredNoPtpMaster ptpRecoveredInvalidFreq Accuracy ptpRecoveredInvalidTime Accuracy ptpRecoveredDisqualified Master ptpRecoveredMasterSyncFail
lacp_churn ais lck mismatch loc rdi ais-path lomf-path uneq-path tim-path plm-path lop-path sd-path eed-path rfi-path power_delivery_failure power_in_ora power_in_low unavailable_tod unavailable_1pps slaves_limit_reached no_ptp_master invalid_frequency_accuracy invalid_time_accuracy disqualified_master sync_failure
1.3.6.1.4.1.164.6.2.54.0.3 1.3.6.1.4.1.164.3.1.6.1.3.0.4 1.3.6.1.4.1.164.3.1.6.1.3.0.5 1.3.6.1.4.1.164.3.1.6.1.3.0.6 1.3.6.1.4.1.164.3.1.6.1.3.0.7 1.3.6.1.4.1.164.3.1.6.1.3.0.8 1.3.6.1.4.1.164.3.1.6.2.0.50 1.3.6.1.4.1.164.3.1.6.2.0.51 1.3.6.1.4.1.164.3.1.6.2.0.52 1.3.6.1.4.1.164.3.1.6.2.0.53 1.3.6.1.4.1.164.3.1.6.2.0.54 1.3.6.1.4.1.164.3.1.6.2.0.55 1.3.6.1.4.1.164.3.1.6.2.0.56 1.3.6.1.4.1.164.3.1.6.2.0.57 1.3.6.1.4.1.164.3.1.6.2.0.58 1.3.6.1.4.1.164.6.1.0.73 1.3.6.1.4.1.164.6.1.0.74 1.3.6.1.4.1.164.6.1.0.75 1.3.6.1.4.1.164.6.2.52.0.24 1.3.6.1.4.1.164.6.2.52.0.25 1.3.6.1.4.1.164.6.2.52.0.26 1.3.6.1.4.1.164.6.2.52.0.10 1.3.6.1.4.1.164.6.2.52.0.11 1.3.6.1.4.1.164.6.2.52.0.12 1.3.6.1.4.1.164.6.2.52.0.13 1.3.6.1.4.1.164.6.2.52.0.14
Alarm
ptpRecoveredMasterAnnounce Fail
announce_failure
1.3.6.1.4.1.164.6.2.52.0.15
Handling Events
11-21
Chapter 11 Monitoring and Diagnostics Associated to Alarm Source Type Trap Description
ptprecoveredmaster pw pw pw pw pw pw routerinterface sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet station-clock station-clock station-clock system system system vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt card card
ptpRecoveredMasterDelay RespFail pwConfigMismatch pwOamFailure pwRdi pwRxFailure pwFeRxFailure pwFeRdi routerIfDhcpClientNoLease sdhSonetLof sdhSonetRfi sdhSonetLos sdhSonetAis sdhSonetTim sdhSonetSd sdhSonetEed stationClockAis stationClockLof stationClockLos systemDeviceTemperatureOra systemSwPackCorrupted systemFeHardwareFailure vcVtAis vcVtUneq vcVtTim vcVtPlm vcVtLop vcVtSd vcVtEed vcVtRfi cardReset cardSwitchover
delay_response_failure
1.3.6.1.4.1.164.6.2.52.0.16
Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Alarm Event Event
configuration_mismatch pw_oam_failure rdi rx_failure rx_failure_fe rdi_fe dhcp_client_no_lease lof rfi-line los ais-line tim sd-line eed-line ais lof los device_temperature_ora sw_pack_corrupted hardware_failure_fe ais-vcvt uneq-vcvt tim-vcvt plm-vcvt lop-vcvt sd-vcvt eed-vcvt rfi-vcvt card_reset card_switchover
1.3.6.1.4.1.164.14.0.1 1.3.6.1.4.1.164.14.0.2 1.3.6.1.4.1.164.14.0.3 1.3.6.1.4.1.164.14.0.4 1.3.6.1.4.1.164.14.0.6 1.3.6.1.4.1.164.14.0.7 1.3.6.1.4.1.164.11.7.2.2.1.0.1 1.3.6.1.4.1.164.3.1.6.2.0.22 1.3.6.1.4.1.164.3.1.6.2.0.23 1.3.6.1.4.1.164.3.1.6.2.0.24 1.3.6.1.4.1.164.3.1.6.2.0.25 1.3.6.1.4.1.164.3.1.6.2.0.26 1.3.6.1.4.1.164.3.1.6.2.0.27 1.3.6.1.4.1.164.3.1.6.2.0.28 1.3.6.1.4.1.164.6.2.52.0.5 1.3.6.1.4.1.164.6.2.52.0.6 1.3.6.1.4.1.164.6.2.52.0.7 1.3.6.1.4.1.164.6.1.0.41 1.3.6.1.4.1.164.6.1.0.61 1.3.6.1.4.1.164.6.1.0.66 1.3.6.1.4.1.164.3.1.6.2.0.67 1.3.6.1.4.1.164.3.1.6.2.0.69 1.3.6.1.4.1.164.3.1.6.2.0.70 1.3.6.1.4.1.164.3.1.6.2.0.71 1.3.6.1.4.1.164.3.1.6.2.0.72 1.3.6.1.4.1.164.3.1.6.2.0.73 1.3.6.1.4.1.164.3.1.6.2.0.74 1.3.6.1.4.1.164.3.1.6.2.0.75 1.3.6.1.4.1.164.3.3.2.1.0.10 1.3.6.1.4.1.164.3.3.2.1.0.13
11-22
Handling Events
Installation and Operation Manual Associated to Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Source Type Trap Description
card card clock-domain clock-domain e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 e1t1 erp-port eth sdh-sonet eth sdh-sonet eth sdh-sonet eth sdh-sonet lag lag oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne
cardPluggedIn cardPluggedOut clockDomainSystemSrcClock Change clockDomainStationSrcClock Change e1t1Loopback e1t1LoopbackOff e1t1EsLineTca e1t1CvPathTca e1t1EsPathTca e1t1SesPathTca e1t1SefsPathTca e1t1CssPathTca e1t1UasPathTca erpPortStateChange sfpOptOra sfpOptOraOff sfpLbcOra sfpLbcOraOff lagSubGroupSwitchover lagFailure oamCfmDestNeDelayTca oamCfmDestNeDelayTcaOff oamCfmDestNeDelayVarTca oamCfmDestNeDelayVarTca Off oamCfmDestNeLossRatioTca
card_plugged_in card_plugged_out system_source_clock_change station_source_clock_change loopback loopback_off es_line_tca cv_path_tca es_path_tca ses_path_tca sefs_path_tca css_path_tca uas_path_tca erp_port_state_change sfp_opt_ora sfp_opt_ora_off sfp_lbc_ora sfp_lbc_ora_off sub_group_switchover lag_failure delay_tca delay_tca_off delay_var_tca delay_var_tca_off loss_ratio_tca
1.3.6.1.4.1.164.3.3.2.1.0.11 1.3.6.1.4.1.164.3.3.2.1.0.12 1.3.6.1.4.1.164.6.2.52.0.3 1.3.6.1.4.1.164.6.2.52.0.9 1.3.6.1.4.1.164.3.1.6.4.0.36 1.3.6.1.4.1.164.3.1.6.4.0.37 1.3.6.1.4.1.164.3.1.6.4.0.38 1.3.6.1.4.1.164.3.1.6.4.0.39 1.3.6.1.4.1.164.3.1.6.4.0.40 1.3.6.1.4.1.164.3.1.6.4.0.41 1.3.6.1.4.1.164.3.1.6.4.0.42 1.3.6.1.4.1.164.3.1.6.4.0.43 1.3.6.1.4.1.164.3.1.6.4.0.44 1.3.6.1.4.1.164.3.1.6.1.0.5 1.3.6.1.4.1.164.40.3.4.0.6 1.3.6.1.4.1.164.40.3.4.0.7 1.3.6.1.4.1.164.40.3.4.0.8 1.3.6.1.4.1.164.40.3.4.0.9 1.3.6.1.4.1.164.6.2.54.0.4 1.3.6.1.4.1.164.6.2.54.0.5 1.3.6.1.4.1.164.3.1.6.1.3.0.9 1.3.6.1.4.1.164.3.1.6.1.3.0.10 1.3.6.1.4.1.164.3.1.6.1.3.0.11 1.3.6.1.4.1.164.3.1.6.1.3.0.12 1.3.6.1.4.1.164.3.1.6.1.3.0.13
Handling Events
11-23
Chapter 11 Monitoring and Diagnostics Associated to Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Source Type Trap Description
oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne oam-cfmdest-ne path path path path path path path path ptp-master ptp-master ptp-recovered ptp-recovered ptp-recovered ptp-recovered ptprecoveredmaster pw pw
oamCfmDestNeLossRatioTca Off oamCfmDestNeLossRatioTca Fe oamCfmDestNeLossRatioTca FeOff oamCfmDestNeUnavailRatio Tca oamCfmDestNeUnavailRatio TcaOff oamCfmDestNeUnavailRatio TcaFe oamCfmDestNeUnavailRatio TcaFeOff pathEsTca pathSesTca pathCvTca pathUasTca pathFeEsTca pathFeSesTca pathFeCvTca pathFeUasTca ptpMasterGrantedService Aborted ptpMasterSlaveRequestDenied ptpRecoveredPtpStateChange ptpRecoveredSevereFreq Condition ptpRecoveredSevereTime Condition ptpRecoveredMaster Switchover ptpRecoveredMasterUnicast NegFail pwSwitchover pwJitterBufferOverflow
loss_ratio_tca_off loss_ratio_tca_fe loss_ratio_tca_fe_off unavailable_ratio_tca unavailable_ratio_tca_off unavailable_ratio_tca_fe unavailable_ratio_tca_fe_off es_path_tca ses_path_tca cv_path_tca uas_path_tca es_path_tca_fe ses_path_tca_fe cv_path_tca_fe uas_path_tca_fe granted_service_aborted slave_request_denied ptp_state_change severe_frequency_condition severe_time_condition master_switchover unicast_negotiation_failure
1.3.6.1.4.1.164.3.1.6.1.3.0.14 1.3.6.1.4.1.164.3.1.6.1.3.0.15 1.3.6.1.4.1.164.3.1.6.1.3.0.16 1.3.6.1.4.1.164.3.1.6.1.3.0.17 1.3.6.1.4.1.164.3.1.6.1.3.0.18 1.3.6.1.4.1.164.3.1.6.1.3.0.19 1.3.6.1.4.1.164.3.1.6.1.3.0.20 1.3.6.1.4.1.164.3.1.6.2.0.59 1.3.6.1.4.1.164.3.1.6.2.0.60 1.3.6.1.4.1.164.3.1.6.2.0.61 1.3.6.1.4.1.164.3.1.6.2.0.62 1.3.6.1.4.1.164.3.1.6.2.0.63 1.3.6.1.4.1.164.3.1.6.2.0.64 1.3.6.1.4.1.164.3.1.6.2.0.65 1.3.6.1.4.1.164.3.1.6.2.0.66 1.3.6.1.4.1.164.6.2.52.0.27 1.3.6.1.4.1.164.6.2.52.0.28 1.3.6.1.4.1.164.6.2.52.0.17 1.3.6.1.4.1.164.6.2.52.0.18 1.3.6.1.4.1.164.6.2.52.0.19 1.3.6.1.4.1.164.6.2.52.0.20 1.3.6.1.4.1.164.6.2.52.0.21
Event Event
pw_switchover jitter_buffer_overflow
1.3.6.1.4.1.164.14.0.6 1.3.6.1.4.1.164.14.0.9
11-24
Handling Events
Installation and Operation Manual Associated to Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Event Source Type Trap Description
pw sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet sdh-sonet system system system system system system system system system system system system system system
pwJitterBufferUnderflow sdhSonetEsSecTca sdhSonetSesSecTca sdhSonetSefsSecTca sdhSonetCvSecTca sdhSonetEsLineTca sdhSonetSesLineTca sdhSonetCvLineTca sdhSonetUasLineTca sdhSonetFeEsLineTca sdhSonetFeSesLineTca sdhSonetFeCvLineTca sdhSonetFeUasLineTca sdhSonetPortSwitchover sdhSonetLoopback sdhSonetLoopbackOff systemSoftwareInstallStart systemSoftwareInstallEnd systemDownloadEnd systemUserReset systemAlternateConfigLoaded systemConfigurationMigration systemConfigurationSanity systemTrapHardSyncStart systemTrapHardSyncEnd systemConfigurationChange Mask systemConfigurationChange Unmask systemBackupConfiguration Loaded systemDeviceStartup systemActiveSoftware Changed
jitter_buffer_underflow es_section_tca ses_section_tca sefs_section_tca cv_section_tca es_line_tca ses_line_tca cv_line_tca uas_line_tca es_line_tca_fe ses_line_tca_fe cv_line_tca_fe uas_line_tca_fe port_switchover loopback loopback_off sw_install_start sw_install_end download_end user_reset alternate_configuration_ loaded configuration_migration configuration_sanity trap_hard_sync_start trap_hard_sync_end configuration_change_mask configuration_change_ unmask backup_configuration_loaded device_startup active_software_changed
1.3.6.1.4.1.164.14.0.10 1.3.6.1.4.1.164.3.1.6.2.0.30 1.3.6.1.4.1.164.3.1.6.2.0.31 1.3.6.1.4.1.164.3.1.6.2.0.32 1.3.6.1.4.1.164.3.1.6.2.0.33 1.3.6.1.4.1.164.3.1.6.2.0.34 1.3.6.1.4.1.164.3.1.6.2.0.35 1.3.6.1.4.1.164.3.1.6.2.0.36 1.3.6.1.4.1.164.3.1.6.2.0.37 1.3.6.1.4.1.164.3.1.6.2.0.38 1.3.6.1.4.1.164.3.1.6.2.0.39 1.3.6.1.4.1.164.3.1.6.2.0.40 1.3.6.1.4.1.164.3.1.6.2.0.41 1.3.6.1.4.1.164.3.1.6.2.0.88 1.3.6.1.4.1.164.3.1.6.2.0.89 1.3.6.1.4.1.164.3.1.6.2.0.90 1.3.6.1.4.1.164.6.1.0.42 1.3.6.1.4.1.164.6.1.0.43 1.3.6.1.4.1.164.6.2.12.18.0.2 1.3.6.1.4.1.164.6.1.0.82 1.3.6.1.4.1.164.6.1.0.45 1.3.6.1.4.1.164.6.1.0.46 1.3.6.1.4.1.164.6.1.0.47 1.3.6.1.4.1.164.6.1.0.77 1.3.6.1.4.1.164.6.1.0.78
Handling Events
11-25
Chapter 11 Monitoring and Diagnostics Associated to Event Event Event Event Event Event Event Event Event Event Event Event Event Event Source Type Trap Description
system system system system system system vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt vc-vt
systemRunningConfigSaved systemSuccessfulLogin systemFailedLogin systemLogout systemSwUnconfirmed systemStartupConfig Unconfirmed vcVtEsTca vcVtSesTca vcVtCvTca vcVtUasTca vcVtFeEsTca vcVtFeSesTca vcVtFeCvTca vcVtFeUasTca
running_config_saved successful_login failed_login logout sw_unconfirmed startup_config_unconfirmed es_vcvt_tca ses_vcvt_tca cv_vcvt_tca uas_vcvt_tca es_vcvt_tca_fe ses_vcvt_tca_fe cv_vcvt_tca_fe uas_vcvt_tca_fe
11-26
To trace a route: At any level, start the trace route and specify the IP address of the host to which you intend to trace route: trace-route <1.1.1.1255.255.255.255>
Technical Support
11-27
11-28
Technical Support
12.1
Impact
The software upgrade process is designed to minimize service disruption, as long as following criteria are met: Two main cards are installed in the chassis
Note
If your system has two main cards, you must upgrade only the active card. The active card transfers new application software to the standby card to ensure seamless redundancy after the upgrade. Verify that both main cards are administratively enabled (no shutdown).
Ethernet services are protected, using inter-card LAG or ERP TDM services are protected, using APS.
12.3 Prerequisites
This section details the software file names and outlines system requirements needed for the upgrade procedure.
Prerequisites
12-1
Software Files
New version releases are distributed as software files named *.bin, for example sw-pack.bin. The files can be obtained from the local RAD business partner from whom the device was purchased. The software upgrade utility includes four partitions called sw-pack-1, sw-pack-2, sw-pack-3, sw-pack-4 for downloading and storing the software versions. To activate the specified software version, one of these partitions is set to active. Each software pack consists of a set of image files for each module with appropriate headers. The software pack can be ordered for the entire chassis only. The version 1.0 software pack consists of three internal image files for the E5-MC-4, E5-GBE-20/E5-1-GBE-2 and E5-cTDM-4 cards. The software pack is installed as a whole entity; internal software files cannot be changed or installed separately. The software package version, as well as version of internal image files can be viewed using the show sw-pack command entered at the file# prompt.
System Requirements
Before starting the upgrade using SFTP or FTP, verify that you have the following: ETX-5300A unit with valid network connection to a PC with the SFTP/FTP server application, and a valid IP address. Software file stored on the PC.
12.4
The recommended method for downloading software to the flash disk is to use the file copy command of the CLI environment. This can be done remotely and does not require booting. Only CL modules need to be reset after this procedure. The upgrade consists of two stages: The application software is downloaded from a PC to the ETX-5300A flash disk. This is done via SFTP, using the file>copy command The software pack is downloaded from the flash disk to the CL. This is done, using the admin>software>install command.
Using SFTP
Network administrators use the SFTP protocol to securely distribute new software releases to all the managed ETX-5300A units in the network from a central location. A central SFTP server application is installed on a PC on the network.
12-2
ETX-5300
Note
Pinging the PC
Check the integrity of the communication link between ETX-5300A and the PC by pinging the ETX-5300A from the PC.
12-3
For example, to download the sw-pack.bin file to sw-pack-4 partition from the PC at 10.10.10.10 with user name admin and password 1234:
ETX-5300A>file# sftp://<admin>:<1234>@10.10.10.10/sw-pack.bin sw-pack-4 You are prompted to confirm the request: Are you sure? [yes/no] _ y The application file begins downloading.
Note
Issuing the dir command (file# prompt) while installing a new software release causes the CLI to stop responding during the installation process. The CLI connection is restored after the SW installation is complete.
To check the flash memory contents: At the file# prompt, enter the dir command, for example:
ETX-5300A>file# dir Codes C - Configuration S - Software LO Log Name Type Size(Bytes) Creation Date Status sw-pack-1 S 6306207 21-12-2010 valid 13:44:58 sw-pack-2 S 6305847 21-2-2011 valid 7:48:0 sw-pack-3 S 6278526 21-2-2011 valid 9:57:47 sw-pack-4 S 6289552 6-1-2011 valid 10:23:13 startup-config C 95872 13-3-2011 valid 14:7:35 user-default-config C 95872 13-3-2011 valid 14:6:51 factory-default-conf C 796 1-1-1970 Read Only 0:0:9 running-config C 0 1-1-1970 Read Only 0:0:9 Total Bytes : 101367808 Free Bytes : 63442944 To monitor the copy progress: At the file# prompt, enter the show copy command, for example:
ETX-5300A# show file copy Network to Device, Transferring Data Src: sftp://172.17.174.56/2.27.bin Dst: sw-pack-4 Started: 14.3.2011 8:50:52 Transferred : 665600 Bytes in: 16 seconds (41600 Bytes/Second) Finally, the application file is downloaded and saved in partition 4 of the flash disk. File copy command was completed. sftp://172.17.174.56/ sw-pack.bin copied to sw-pack-4 successfully 6306207 bytes copied in 133 secs (47415 bytes/sec) Once the file is downloaded, the following message is displayed: ETX-5300A>file# sw-pack.bin copied to sw-pack-4 successfully
12-4 Upgrading Software using the CLI ETX-5300A Ver. 1.0
To display the partition contents: At the file# prompt, enter the show sw-pack command, for example:
ETX-5300A>file# show sw-pack Name Version Creation Time Actual ---------------------------------------------------------------------------sw-pack-1 1.0.0(1.39) 2012-08-06 00:00:00 ready sw-pack-1 Size (Bytes) Type Name : 77140261 Version H/W Ver
Size (Bytes) --------------------------------------------------------------main main.bin 1.0.0(1.91) 1.1 31728762 eth1g eth1g.bin 1.0.0(1.65) 1.1 10698214 stm1ch stm1ch.bin 1.0.0(1.53) 1.1 18829047 eth2X10g eth2X10g.bin 1.0.0(1.65) 1.1 15883998
Installing the New Software Release File from the Flash Disk
Once a file is saved on the ETX-5300A flash disk, it must be copied to the main card to replace the current software. The sw-pack file includes the new software version for all the main and I/O cards, according to your purchase order. Simultaneously download the new software release file to all the main and I/O cards installed in the chassis. During the installation process, ETX-5300A stores active software and startup-config in the restore-point-config file. As long as the restore point remains valid, you can return the device to the restore point (the application software and startup-config the device ran before the last software installation). When ETX-5300A includes redundant main cards, the software installation process is slightly different, resulting in the main card flip.
Note
If you intend to skip creation of a restore point, enter the no-restore-point parameter in the following form: install <filename> [no-restore-point].
ETX-5300A displays confirmation request: ! Device will install file and reboot. Are you sure? [yes/no] _ 2. For ETX-5300A with a single main card: Confirm the install. The previous software pack is deleted from the active partition:
12-5
The software pack stored in sw-pack-3 partition is transferred to the active partition and sent to all relevant cards that are found in the chassis. ETX-5300A performs reboot automatically and is now ready for operation with new software version. ETX-5300A is upgraded and starts with the new software version. or 3. For ETX-5300A with redundant main cards: Confirm the install.
The primary main card resets the secondary main card. The secondary main card starts up with the new software. When the secondary main card is online, the primary card resets itself. The secondary main card becomes primary. The former primary card starts up with the new software and becomes secondary.
Note
For ETX-5300A with redundant main cards, you can confirm the software application files only after the main card flip.
To enable software application confirmation: At the admin>software# prompt, enter the software-confirm-required command according to the table below.
Command software-confirm-required [time-toconfirm <51440>] Comments Default time-to-confirm 5 min. no software-confirm-required to disable application software confirmation
12-6
ETX-5300A>admin>software# show status Software Installation Status : Idle Remaining Time to Confirm Software Installation : -Active Software : sw-pack-1 Version : 1.0.0 Restore Point Software : sw-pack-1 Version : 1.0.0 Slot Upgrade Status --------------------------------------------------------------main-a Ready main-b Ready 1 Empty 2 Empty 3 Empty 4 Empty The chassis software installation statuses are as follows: Idle No software installation performed since the last reboot In Progress New software is being installed, reboot has not been performed yet Ended Successfully New software installed, with or without reboot Failed Software installation has failed Main Card Reset Failed Installation failed due to failure of the secondary main card to reset correctly Ended with Error Unknown error has occurred during software installation Aborted By User Installation failed due to user intervention Software Unconfirmed: Software confirmation was not received on time ETX-5300A was reset before receiving software confirmation Previous software version is about to be reinstalled
Awaiting Confirmation Installation is on hold, pending user confirmation of the software file Awaiting Card Reset The software was confirmed, or no confirmation was required, and ETX-5300A waits for reset of at least one I/O card Software Installed From Boot ETX-5300A detected a new software release installed via the Boot menu Unconfirmed Software Used in Lack Of Valid Software ETX-5300A uses unconfirmed software due to the lack of confirmed file
Ready The card is installed and ready to accept the software package Empty The card slot is empty In Progress The card has been reset and software installation is in progress Manual Wait Software installation has started, but the card has not been reset yet Failure Software installation has failed.
The Boot menu can be accessed while ETX-5300A is performing initialization, such as after power-up. You may need to start the loading from the Boot menu when it is not possible to activate SFTP using the CLI because, for example, the ETX-5300A software has not yet been downloaded or is corrupted.
Caution The Boot menu procedures are recommended for use only by authorized
personnel, because this menu provides many additional options that are intended for use only by technical support personnel. You can upgrade via the Boot menu using the FTP. This is usually performed by downloading from a remote location that provides an IP communication path to an Ethernet port of ETX-5300A.
Note
All the screens shown in this section are for illustration purposes only. Your ETX-5300A may display different software versions and port profiles.
The preparations for using the FTP protocol via the Boot menu are similar to the preparations for downloading software using the SFTP protocol via the CLI. The main difference is that you need to define the IP communication parameters associated with the corresponding Ethernet port -- IP addresses and the associated subnet mask, and a default gateway IP address.
12-8
12-9
[boot]: p file name (fn) : vxworks device IP (ip) : 10.10.10.88 device mask (dm) : 255.255.255.0 server IP (sip) : 10.10.10.10 gateway IP (g) : 10.10.10.10 user (u) : vxworks ftp password (pw) : ******* device name (dn) : ETX-5300A quick autoboot (q) : yes protocol (p) : ftp baud rate (b) : 9600
Figure 12-3. Typical Boot Parameters Screen Table 12-1. Boot Parameters
Parameter file name device ip device mask server IP gateway ip Command fn ip dm sip g Description The binary software pack file (*.bin) name The IP address of ETX-5300A The IP subnet mask of ETX-5300A The FTP server IP address The FTP server default gateway IP-address if the server is located on a different LAN.
Note: Be sure to select an IP address within the subnet of the assigned ETX-5300A IP address. Note: If no default gateway is needed, for example, because the FTP server is attached to the same LAN as ETX-5300A being upgraded, enter 0.0.0.0.
user u The user name, as registered at the FTP server.
Note
12-10
^D = quit
file name (fn) : vxworks sw-pack.bin device IP (ip) : 10.10.10.88 device mask (dm) : 255.255.255.0 server IP (sip) : 10.10.10.10 gateway IP (g) : 10.10.10.10 user (u) : vxworks ftp password (pw) (blank = use rsh): ******* device name (dn) : ETX-5300A quick autoboot [y/n] : y protocol [tftp/ftp] : ftp baud rate [9600/19200/115200]: 9600 10. To complete the upgrade and log on again, follow the onscreen instructions.
Note
When working with FTP server, the user name and password in Boot parameters must be the same as defined in FTP server.
3. Turn on ETX-5300A and enter the Boot menu. Set FTP protocol. 4. From the Boot menu, type download <index 1..4> [<FileName>] command to start downloading the software pack file from the PC to the corresponding partition of the ETX-5300A flash disk.
Note
[<FileName>] is used if you did not specify the filename in the Boot menu earlier.
For example: Download the file to sw-pack-2 [boot]: download 2 The file is being copied to sw-pack-2 partition: File transferring - 7580KB 226 Transfer finished successfully. Please wait, old file is being erased and written with new one. File writing to flash: - 7580KB File downloaded successfully to :2 [boot]: 5. Using dir command, check which partition is currently active. In this example it is sw-pack-1.
12-11
[boot]: dir SIZE FILE-NAME 796 factory-default-config 6296759 sw-pack-1 6305902 sw-pack-2 6278526 sw-pack-3 6289552 sw-pack-4 Active SW-pack is: 2 Total Bytes : 101367808 Free Bytes
: 69701632
6. Use set-active command to activate the partition to which the file has been downloaded (in this example: sw-pack-2). [boot]: set-active 2 set-active may take few minutes... deleting file /tffs0/Sw-Pack/Active/main.bin deleting file /tffs0/Sw-Pack/Active/mainHdr.bin SW set active 2 completed successfully. The new software release is now stored in partition 2 and will be activated after reset. 7. Perform one of the following: Type @ or run. The following message is displayed and the new software release is activated: [boot]: run External file header passed validation! Loading/un-compressing main.bin... Starting the APPLICATION off address 0x10000... Press <Ctrl + X> to perform a cold (hard) reboot with turning power off and then on. Type reset to perform a warm (soft) reboot without turning off power. The following message is displayed: Are you sure (y/n)? Press <Y>. When the downloading process is successfully completed, you will see a sequence of messages similar to the following:
12-12
External file header passed validation! Loading/un-compressing main.bin... Starting the APPLICATION off address 0x10000... Instantiating /ram as rawFs, device = 0x20001 Formatting /ram for DOSFS Instantiating /ram as rawFs, device = 0x20001 Formatting...Retrieved old volume params with %38 confidence: Volume Parameters: FAT type: FAT32, sectors per cluster 0 0 FAT copies, 0 clusters, 0 sectors per FAT Sectors reserved 0, hidden 0, FAT sectors 0 Root dir entries 0, sysId (null) , serial number 7d0000 Label:" " ... Disk with 64 sectors of 512 bytes will be formatted with: Volume Parameters: FAT type: FAT12, sectors per cluster 1 2 FAT copies, 54 clusters, 1 sectors per FAT Sectors reserved 1, hidden 0, FAT sectors 2 Root dir entries 112, sysId VXDOS12 , serial number 7d0000 Adding 71349 symbols for standalone. External file header passed validation! Loading/un-compressing main.bin... Starting the APPLICATION off address 0x10000... 8. Press <Enter> to start working with the new SW release downloaded.
Note
The new parameters take effect only after the reset is completed.
12.6
To verify that the upgrade was successful, log on to ETX-5300A to view the Inventory summary. To verify the upgrade result: At the config# prompt, enter show inventory-summary and verify the active software version in the SW Ver column.
12-13
ETX-5300A# configure chassis ETX-5300A# config>chassis# show inventory-summary Index Physical Class Name HW Ver
SW Ver
FW Ver
----------------------------------------------------------------------------1001 Chassis AC-chassi N/A 1.0.0(1.39) N/A 2001 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 Backplane Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Backplane 1 2 3 4 main-a main-b Slot 5 Port 1 Slot 5 Port 2 Slot 5 Port 3 Slot 5 Port 4 Slot 6 Port 1 Slot 6 Port 2 Slot 6 Port 3 Slot 6 Port 4 Slot 1 Port 1 Slot 1 Port 2 Slot 1 Port 3 Slot 1 Port 4 Slot 1 Port 5 Slot 1 Port 6 Slot 1 Port 7 Slot 1 Port 8 Slot 1 Port 9 0.0/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
12-14
3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091
Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container Container
Slot 1 Port 10 Slot 1 Port 11 Slot 1 Port 12 Slot 1 Port 13 Slot 1 Port 14 Slot 1 Port 15 Slot 1 Port 16 Slot 1 Port 17 Slot 1 Port 18 Slot 1 Port 19 Slot 1 Port 20 Slot 4 Port 1 Slot 4 Port 2 Slot 4 Port 3 Slot 4 Port 4 Slot 4 Port 5 Slot 4 Port 6 Slot 4 Port 7 Slot 4 Port 8 Slot 4 Port 9 Slot 4 Port 10 Slot 4 Port 11 Slot 4 Port 12 Slot 4 Port 13 Slot 4 Port 14 Slot 4 Port 15 Slot 4 Port 16 Slot 4 Port 17
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
12-15
3092 3093 3094 3095 3096 3097 4001 4002 4003 5001 5004 5005 5006 7001 7002 7003 7004 7009 7010 7011 7012 7013 7014 7016 7017 7018 7019
Container Container Container Container Container Container Power Supply Power Supply Fan Module Module Module Module Port Port Port Port Port Port Port Port Port Port Port Port Port Port
Slot 4 Port 18 Slot 4 Port 19 Slot 4 Port 20 AC Slot AC Slot FAN PS_AC 1 PS_AC 2 FAN IO Card 1 IO Card 4 Main Card A Main Card B Etherent port main-a/1 Etherent port main-a/2 Etherent port main-a/3 Etherent port main-a/4 MNG Port RS_232 Control Port Clock RJ45 Port Clock BNC Port Time Of Day BNC Port Time Of Day RS422 Port RS_232 Control Port Clock RJ45 Port Clock BNC Port Time Of Day BNC Port
N/A N/A N/A N/A N/A N/A 0.0/0.0/0.0/A 0.1/0.1/0.0/G N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A 1.0.0(1.65) 1.0.0(1.65) 1.0.0(1.91) N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A 2.0 2.0 2.0 N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
12-16
7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036 7037 7038 7039 7040 7082 7083 7084 7085 7086 7087 7088
Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port Port
Time Of Day RS422 Port Ethernet Port 1/1 Ethernet Port 1/2 Ethernet Port 1/3 Ethernet Port 1/4 Ethernet Port 1/5 Ethernet Port 1/6 Ethernet Port 1/7 Ethernet Port 1/8 Ethernet Port 1/9 Ethernet Port 1/10 Ethernet Port 1/11 Ethernet Port 1/12 Ethernet Port 1/13 Ethernet Port 1/14 Ethernet Port 1/15 Ethernet Port 1/16 Ethernet Port 1/17 Ethernet Port 1/18 Ethernet Port 1/19 Ethernet Port 1/20 Ethernet Port 4/2 Ethernet Port 4/3 Ethernet Port 4/4 Ethernet Port 4/5 Ethernet Port 4/6 Ethernet Port 4/7 Ethernet Port 4/8
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
12-17
7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100
Port Port Port Port Port Port Port Port Port Port Port Port
Ethernet Port 4/9 Ethernet Port 4/10 Ethernet Port 4/11 Ethernet Port 4/12 Ethernet Port 4/13 Ethernet Port 4/14 Ethernet Port 4/15 Ethernet Port 4/16 Ethernet Port 4/17 Ethernet Port 4/18 Ethernet Port 4/19 Ethernet Port 4/20
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
Note
12-18
The CONTROL DCE connector is a 9-pin D-type female connector with RS-232 asynchronous DCE interface, intended for direct connection to a supervision terminal. The connector is wired in accordance with Table A-1.
A.2
Each ETX-5300A MNG ETH port has a 10/100BASE-TX Ethernet station interface terminated in an RJ-45 connector. The port supports the MDI/MDIX crossover function, and therefore can be connected by any type of cable (straight or crossed) to any type of 10/100BASE-TX Ethernet port. The port also corrects for polarity reversal in the 10BASE-T mode. Connector pin functions for the MDI state are listed in Table A-2. In the MDIX state, the receive and transmit pairs are interchanged.
A-1
A.3
The Gigabit Ethernet connectors on the E5-GBE-20 card have 10/100/1000BASE-T Ethernet station interface terminated in an RJ-45 connector. Connector pin functions are listed in Table A-3.
A.4
The balanced external clock interface on the E5-MC-4 card terminates in an RJ-45 connector, wired in accordance with Table A-4.
A.5
TOD Connector
The RS-422 GPS-based ToD clock interface on the E5-MC-4 card terminates in an RJ-45 connector, wired in accordance with Table A-5.
A-2
TOD Connector
A.6
ALARM Connector
The ALARM connector is a 15-pin D-type female connector which provides connections to the following functions: Critical, major and minor alarm relay contacts +12V auxiliary voltage output External alarm sense input
Caution To prevent damage to alarm relay contacts, the maximum current that can flow
through the contacts must be limited by external means. (The maximum current through closed contacts is 1A; load switching capacity is 60 W). The maximum voltage across the open contacts is 60 VDC/30 VAC.
ALARM Connector
A-3
Major Alarm common Input Alarm 2 Input Alarm 3 Critical Alarm common
A-4
ALARM Connector
Data Path Model Ingress Processing Classification CoS Mapping Ingress Color Mapping Policing VLAN Editing Traffic Management.
B.1
B-1
4 x 10GbE
4 x 10GbE
Main Card
Main Card
Timing
Timing
Packet Processor
Common Logic
Packet Processor
Common Logic
Power
Fans ETX-5300A
B-2
Classify
Police
Forward
Edit
20 x GbE or 2 x 10GbE
2 x 10GbE
4 x 10GbE
Edit
Forward
Classify
Port Types
ETX-5300A ports can be either of two types: Attached directly to the main card packet processor (directly-attached ports). These are 10GbE ports on the main cards. Attached to the packet processor via the classification and traffic management engine (indirectly-attached ports). These are GbE, 10GbE and TDM ports on the I/O cards.
These ports differ in the way they admit traffic, classify flows, and perform traffic management.
B-3
Data Path
Figure B-3 illustrates the general traffic path within the ETX-5300A system in the ingress-to-egress direction.
Ingress Egress
VLAN Editing
Shaping
Classification
Policing
Bridge
Router
Ingress Processing
Forwarding
Figure B-3. Data Path Note SAG (Service Aggregation Group) is a logical port (management entity) that represents a physical connection between I/O and main Ethernet cards. Preforwarding scheduling and shaping are performed at the SAG level. Flow aggregation and pseudowire aggregation entities are logical ports that create an aggregated classification identification for all Ethernet flows and pseudowires going in the same direction. This identification allows the main card to make forwarding decisions. The Ethernet flow aggregation entity is referred to as SAP (Service Attachment Point); for pseudowires it is called SVI (Service Virtual Interface).
B-4
Tunnel
Queuing
Shaping
Classification to Flows
Policing
Ingress Scheduling and Shaping (using traffic classes and drop precedence) Ethernet I/O Cards only
Post-forwarding Scheduling and Shaping (using traffic classes and drop precedence)
Flow SAP
SAG
Flow
SAP
Flow
SAP
SAG
Flow
SAP
B.2
Ingress Processing
This section describes ingress processing of traffic performed by directly- and indirectly-attached ports.
Frame Format
ETX-5300A supports Ethernet II frames. It does not support IEEE 802.3 LLC packets.
Flow Control
A flow control is a mechanism that allows an Ethernet receiving end that is unable to process all the traffic sent to it, to hold the transmitted traffic until it is able to process packets again. The mechanism uses a PAUSE frame, which is a packet instructing the far-end device to stop transmission of packets until the receiver is able to handle traffic again. The PAUSE frame includes a timer value (set by the originating receiver), which tells the far-end device how long to suspend its transmission. If that timer expires or is cleared by getting a PAUSE frame with the timer value set to 0, the far-end device can then send packets again. Flow control is an optional port-level parameter. Flow control is supported on both directly- and indirectly-attached ports: Directly-attached ports support symmetrical flow control (both Rx and Tx) Indirectly-attached ports support Rx flow control only, without issuing Tx PAUSE frames (asymmetric flow control).
When autonegotiation is enabled, flow control mode is negotiated and a port advertises its user-selected flow control capabilities to the peer. The actual flow control mode, as well as duplex mode and transmission speed are set after the negotiation is completed. When autonegotiation is disabled, the flow control mode is manually selected by the user.
Ethertype
Ethertype configured per port is used for the identification of VLAN-tagged frames at ingress and VLAN editing at egress. This refers to outer VLAN only. The outer VLAN of the incoming packet must match the configured Ethertype of the port in order to be considered as a VLAN-tagged frame (otherwise the frame is considered untagged or dropped). ETX-5300A supports two Ethertype tag values: Default 8100 Any other type. The second Ethertype tag value is configured globally, and can thus be used in per port configuration.
B-6
Ingress Processing
Per-port Ethertype tag configuration allows identification of incoming and outgoing VLAN-tagged frames. The configured tag protocol ID (TPID) refers to outer tag. As for the inner TPID, the following assumptions are maintained: Indirectly-attached ports inner VID (if exists) is 8100 Directly-attached ports inner VID is either the same as outer VID Ethertype or 8100.
Note
Ethertype tag cannot be changed if a port (Ethernet or LAG) has flows attached to it.
The following tables describe the admission rules for different port and TPID types.
None
8100 X (other than 8100) Dont care
1 2 1
Untagged Untagged
Table B-2. Indirectly-Attached Ports with Port TPID Y (other than 8100)
Outer TPID Inner TPID Admit/Drop Admit Admit Admit Admit Admit Recognized Tag Levels
Y Y
Y Z (other than Y) None
None
8100 X (other than 8100) Dont care
1 2 1
Untagged Untagged
None
8100 or Y X (other than 8100) Dont care
1 2 1
Untagged Untagged
Ingress Processing
B-7
Table B-4. Directly-Attached Ports with Port TPID Y (other than 8100)
Outer TPID Inner TPID Admit/Drop Admit Admit Admit Drop Admit Admit Recognized Tag Levels
Y Y
Y 8100 B (other than 8100 or Y) None
None
8100 or Y B (other than 8100 or Y) Dont care Dont care
1 2 1
Untagged Untagged
Note
TPID is also used to indicate the Ethertype tag used in VLAN stacking.
L2CP Handling
ETX-5300A handles Layer-2 control protocol traffic on a per-port and/or a perflow basis. If no per-flow L2CP profile is configured, a per-port-level profile is used. It affects both tagged and untagged L2CP frames. L2CP traffic is processed using a two-stage mechanism comprising per-port or per-flow profiles (set of rules for traffic handling). In total, ETX-5300A supports up to 16 L2CP profiles: Up to 4 (including default) port-level and a single flow-level profiles can be defined on directly-attached ports Up to 32 different addresses/protocols can be selected per L2CP profile.
If no default action is configured for an unspecified address or protocol, this traffic is tunneled.
Note
If an L2CP profile has been attached to a port or a flow, the profile cannot be deleted or modified.
Note
PAUSE frames (01-80-C2-00-00-01) are not part of L2CP profiles. They are
B-8
Ingress Processing
Discards L2CP traffic. In this case, per-port L2CP handling configuration supersedes per-flow profile, as the L2CP traffic is dropped before it is processed by per-flow profile. Tunnels L2CP traffic. ETX-5300A forwards the traffic according to its configuration (flows, etc). The final decision (drop, tunnel or peer) is made according the per-flow profile setting. If no per-flow profile is configured, the L2CP traffic is handled according to per-port profile setting.
Note
Note
L2CP traffic can be peered only at the flow level. Therefore, for full LACP support, the user must define an untagged flow with per-flow L2CP profile to peer the LACP traffic.
VLAN, VLAN + P-bit Untagged (used for per-port L2CP profiles as well) Unclassified (indirectly-attached ports only) VLAN + Src/Dest MAC (indirectly-attached ports only) VLAN (outer) Outer VLAN + P-bit + Inner VLAN Untagged (used for per-port L2CP profiles as well) Unclassified (indirectly-attached ports only) VLAN + Src MAC
LAN + Non IP
Appendix B Data Flow and Traffic Management Classification Key IP-P, DSCP Flow Classification Type
Unclassified
B.3
Classification
The ingress traffic is first classified to flows according to classifier profiles. A per port classification key defines the types of classifier profiles supported for this type of port. The classification key also defines the CoS mapping and color mapping methods. Table B-6 and Table B-7 specify the supported classification keys and the associated CoS and color mapping methods. The different types of classifier profiles supported per classification key are detailed in Table B-8,
Table B-9, Table B-10, Table B-11, Table B-12, Table B-13, Table B-14, Table B-15, Table B-16. Table B-6. Classification Keys for Indirectly-Attached Ports
Classification Key (Port + ) CoS Mapping Method Ingress Color Mapping Method
Flow, P-bit Flow, IP Precedence Flow, DSCP Flow, P-bit Flow, IP Precedence Flow, DSCP Flow, P-bit
Flow, P-bit, DEI Flow, IP Precedence Flow, DSCP Flow, P-bit, DEI Flow, IP Precedence Flow, DSCP Flow, P-bit, DEI
Note
IA port classification key cannot be changed when the port has flows attached to it. Flows must be deleted first.
B-10
Classification
2 1 1 1 1 1 2 3
Note
Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit P-bit indication, but they actually imply a full P-bit range (07).
ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not detected.
A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
Priority
Flow priority, as shown in Table B-8, is a hard-coded attribute of a flow that cannot be changed. Two flows having the same priority cannot overlap. For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a flow with VID 5 and P-bit 0 (classifier profile type VLAN+P-bit, priority 2) is not allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0 and VID 5 and P-bit 17. When flows have different priorities, they can overlap. For example, it is possible to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN 5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
Classification
B-11
Group 1 and Group 2 classification types cannot be used on the same port. Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x (Group 2) profile. In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1 10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
2 1 1 1 1 1 2 3 2 2
Note
Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit IP precedence indication, but they actually imply a full IP Precedence range (07). Packets with VLANs, but without IP Precedence (non-IP) will not match these classifier profiles.
ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not detected.
A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
B-12
Classification
Priority
Flow priority, shown in Table B-9, is a hard-coded attribute of a flow that cannot be changed. Two flows having the same priority cannot overlap. For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a flow with VID 5 and IP-P 0 (classifier profile type VLAN + IP-P, priority 2) is not allowed and vice versa. In this case, two flows must be created: VID 5 and IP-P 0 and VID 5 and IP-P 17. When flows have different priorities, they can overlap. For example, it is possible to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN 5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
Group 1 and Group 2 classification types cannot be used on the same port. Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x (Group 2) profile. In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1 10 or 1120 of E5-GbE-20 card, or on ports 1 or 2 of E5-10GbE-2 card.
2 1 1 1 1 1 2
Classification B-13
Appendix B Data Flow and Traffic Management Classifier Profile Type Match All (Unclassified), default Non-IP VLAN + Non-IP Single VLAN range Range (per Flow)
3 2 2
Note
(1) Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst
MAC, VLAN + Src/Dst IP) are supported without explicit DSCP indication, but they actually imply a full DSCP range (063). Packets with VLANs, but without DSCP (non-IP) will not match these classifier profiles.
(2) ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not detected.
Priority
Flow priority, shown in Table B-10, is a hard-coded attribute of a flow that cannot be changed. Two flows having the same priority cannot overlap. For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a flow with VID 5 and DSCP 0 (classification type VLAN + DSCP, priority 2) is not allowed and vice versa. In this case, two flows must be created: VID 5 and DSCP 0 and VID 5 and DSCP 163. When flows have different priorities, they can overlap. For example, it is possible to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5 and Src MAC x (classification type VLAN + Src MAC, priority 1).
Group 1 and Group 2 classification types cannot be used on the same port. Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x (Group 2) profile. In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1 10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
B-14
Classification
2 1 1 1 2 3
Note
ETX-5300A recognizes only one level of VLAN tagging on the flows created with this classifier key. This means that for a double-tag packet, IP level is not detected.
Priority
Flow priority, shown in Table B-11, is a hard-coded attribute of a flow that cannot be changed. Two flows having the same priority cannot overlap. For example, if a flow with P-bit 07 exists (classification type P-bit, priority 2), a flow with P-bit 3 (classification type P-bit, priority 2) is not allowed and vice versa. In this case, three flows must be created: P-bit 02, P-bit 3 and P-bit 47.
Classification
B-15
Appendix B Data Flow and Traffic Management Classifier Profile Type Src MAC Dst MAC Src IP Dst IP Ethertype Match All (Unclassified), default Non-IP Single Ethertype Single IP Range (per Flow) Single MAC
1 1 1 3 1
Priority
Flow priority, shown in Table B-12, is a hard-coded attribute of a flow that cannot be changed. Two flows with the same priority cannot overlap. For example, if a flow with IP-P 07 exists (classification type IP Precedence, priority 2), a flow with IP-P 3 (classification type IP Precedence, priority 2) is not allowed and vice versa. In this case, three flows must be created: IP-P 02, IP-P 3 and IP-P 47.
2 1 1 1 2 3
ETX-5300A Ver. 1.0
Priority
Flow priority, shown in Table B-13, is a hard-coded attribute of a flow that cannot be changed. Two flows with the same priority cannot overlap. For example, if a flow with DSCP 063 exists (classification type DSCP, priority 2), a flow with DSCP 3 (classification type DSCP, priority 2) is not allowed and vice versa. In this case, three flows must be created: DSCP 02, DSCP 3 and DSCP 4 63.
Note
tag.
TPID of inner VLAN must be 8100, otherwise the inner VLAN and IP level are
not recognized. Table B-14. Indirectly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Classifier Profile Type Outer VLAN + P-bit + Inner VLAN Outer VLAN + Inner VLAN (see Note 1 below) VLAN (see notes 1 and 2 below) VLAN + P-bit (see Notes 1 and 2 below) VLAN + Src MAC (see note 1 below) VLAN + Dst MAC (see Note 1 below) VLAN + Src IP (see Note 1 below) VLAN + Dst IP (see Note 1 below) Src IP Dst IP Ethertype Single Ethertype Single IP Single VLAN, single IP Single VLAN, single MAC Range (per Flow) Single outer VLAN, single P-bit range, single inner VLAN range Priority
2 1 1 1 1
Classification B-17
Appendix B Data Flow and Traffic Management Classifier Profile Type Untagged Match All (Unclassified), default Range (per Flow)
2 3
Note
(1) Some of the VLAN-based classifier profile types (VLAN, Outer VLAN + Inner
VLAN, VLAN + Src/Dst MAC, VLAN + Src/Dst IP) are supported without explicit P-bit indication, but they actually imply a full P-bit range (07).
(2) VLAN and VLAN + P-bit classifier profile types relate to packets with single
Priority
Flow priority, as it appears in Table B-14, is a hard-coded attribute of a flow that cannot be changed. Two flows having the same priority cannot overlap. For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a flow with VID 5 and P-bit 0 (classification type VLAN+P-bit, priority 2) is not allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0 and VID 5 and P-bit 17. When flows have different priorities, they can overlap. For example, it is possible to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5 and Src MAC x (classification type VLAN + Src MAC, priority 1).
Group 1 and Group 2 classification types cannot be used on the same port. Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x (Group 2) profile. In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1 10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
1 2
B-18
Classification
Note
(1) VLAN classifier profile type is supported without explicit P-bit indication,
outer VLAN.
Flow priority, shown in Table B-15, is a hard-coded attribute of a flow that cannot be changed. Two flows with the same priority cannot overlap. For example, if a flow with VID 5 exists (classification type VLAN, priority 1), a flow with VID 5 and P-bit 0 (classification type VLAN+P-bit, priority 1) is not allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0 and VID 5 and P-bit 17.
Note
A packet with an outer Ethertype tag that does not match the port Ethertype tag is considered untagged.
Table B-16. Directly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Classifier Profile Type Outer VLAN + P-bit + Inner VLAN Outer VLAN + Inner VLAN (see note 1 below) VLAN (see notes 1 and 2 below) VLAN + P-bit (see note 2 below) Untagged Range (per Flow) Single outer VLAN, single P-bit range, single inner VLAN range Priority
1 1
Note
(1) VLAN classifier profile type is supported without explicit P-bit indication,
Classification
B-19
B.4
CoS Mapping
User priorities must be mapped to internal Class of Service (CoS) values, according to P-bit, DSCP, IP Precedence or per-flow criteria. The newly defined CoS can then be used for: P-bit handling during VLAN editing process Queue mapping.
In other words, each packet is first normalized to a CoS value (07), then this CoS is used for VLAN editing (P-bit) or priority queue mapping.
CoS Mapping Profiles to map packet to CoS: Ingress Traffic P-bit to CoS (07) DSCP to CoS (07) IP Precedence to CoS (07) Flow to CoS CoS to P-bit (VLAN Editing) Profiles to map: CoS to P-bit
Table B-6 and Table B-7 give detailed description of CoS mapping methods supported by directly- and indirectly-connected ports, depending on a classification key used for traffic classification. Note Unmapped traffic is assigned to the default (lowest, 7) CoS.
Capacity
ETX-5300A supports up to 36 user-defined CoS mapping profiles per I/O card. There are three default profiles for P-bit to CoS, IP Precedence to CoS, DSCP to CoS mapping. These profiles are considered part of the 36 CoS mapping profiles supported per system
B-20
CoS Mapping
Indirectly-attached ports support up to 12 profiles. The CoS mapping method for indirectly-attached ports depends on the selected classification key (see Table B-6). The number of CoS mapping profiles supported by directly-attached ports depends on the selected ingress color mapping. For any flow, the methods used for CoS and ingress color mapping are related in the following way: The flow to CoS mapping method is supported only with flow to ingress color mapping The P-bit to CoS mapping method is supported only with either DEI or P-bit to ingress color mapping methods The DSCP to CoS mapping method is supported only with DSCP to ingress color mapping method.
Up to 15 different combinations of X to CoS + X to color are supported for directly-attached ports. CoS mapping method for directly-attached ports depends on the selected classification key (see Table B-7).
CoS Mapping
B-21
Table B-20. Possible Combinations of CoS and Ingress Color Mapping Methods for Directly-Attached Ports
CoS Mapping Method Per flow (flow to CoS) Per P-bit (P-bit to CoS) Per P-bit (P-bit to CoS) Per DSCP (DSCP to CoS) Ingress Color Mapping Method Per flow (flow to color) Per P-bit (P-bit to color) Per DEI (DEI to color) Per DSCP (DSCP to color)
Note
See Ingress Color Mapping for details on the color mapping methods.
B-22
CoS Mapping
B.5
ETX-5300A supports an ingress color mapping mechanism as a part of its traffic policing features. The mechanism inspects incoming packets and assigns a color (green or yellow) value according to configured color mapping profiles. The following mapping profiles are supported: P-bit to color DSCP to color IP Precedence to color DEI to color (fixed mapping, 0 to green and 1 to yellow) Flow to color Mark all green (default).
In total, ETX-5300A supports up to 36 ingress color mapping profiles (12 of each type). Packet color is used afterwards by WRED mechanism for congestion prevention and during VLAN editing process (setting DEI value).
Note
Ingress color mapping method for both directly- and indirectly-attached ports depends on a classification key used for the port. See Table B-6 and Table B-7 for details.
Note
The ingress color mapping method for directly-attached ports depends on selected CoS mapping for a flow. See Table B-20 for possible combinations of CoS mapping and color mapping profiles.
B-23
B.6
Policing
When the flows are established, a metering and policing function can be applied for each ingress flow on indirectly-attached ports to regulate traffic according to the contracted CIR, EIR, CBS and EBS bandwidth profiles.Rate limitation is performed according to the Dual Token Bucket mechanism (two rates, three colors) in color-aware or color-blind modes. The final color of a packet is determined by a policer (color-aware or color-blind). If a policer is not applied on a specific flow, the ingress color mapping determines packet color.
Policer Parameters
Policer uses the following for bandwidth control: Committed Information Rate (CIR) for the current profile. The CIR specifies a bandwidth with committed service guarantee (green bucket rate). Committed Burst Size (CBS) for the current profile. The CBS specifies the maximum guaranteed burst size (green bucket size). Excess Information Rate (EIR). The EIR specifies an extra bandwidth with no service guarantee (yellow bucket rate). Excess Burst Size (EBS). The EBS specifies the extra burst with no service guarantee (yellow bucket size). Coupling Flag. This parameter is relevant for color-aware mode only. See
Overhead Compensation
, you can also specify the amount of bytes that the shaper or policer can use to compensate for the overhead of Layer-1 (preamble and IFG) and the overhead for the added VLAN header in case of stacking.
Color-Aware Policer
When determining whether or not a packet conforms to a bandwidth profile, the color-aware policer takes into account any preexisting color markings that may have been set for a packet by another traffic policer. The packet ingress color is resolved by a color mapping profile (see Ingress Color Mapping section above).
B-24 Policing ETX-5300A Ver. 1.0
The color-aware policing mechanism conforms to MEF 10.1 requirements and is illustrated below:
Arriving packet is green and CIR bucket is not exceeded No Yes
Packet is green
Yes
Packet is yellow
Figure B-6. Color-Aware Policing Note When the Coupling Flag is enabled, a sum of CIR and EIR volumes is taken into account. Coupling flags are described below.
The coupling flag allows a choice between two modes of operations for the rate enforcement algorithm. The chosen value for CF has the effect of controlling the volume of the yellow packets. When CF is disabled, the long term average bit rate of yellow packets is set by EIR. When CF is enabled, the long term average bit rate of yellow packets is set by CIR + EIR, depending on volume of the green packets.
In both cases the burst size of the yellow packets is limited by EBS. In other words, when the CF is enabled, a yellow packet arrives with an empty EIR bucket, and the policer forwards the packet, using tokens form the CIR bucket. This allows the EIR to be extended to the value of configured CIR + extended EIR.
Color-Blind Policer
In the color-blind mode, the policer ignores the packet color (if any) when determining whether or not a packet conforms to a bandwidth profile.
B.7
VLAN Editing
The VLAN tag editing mechanism allows service providers to carry customertagged traffic on its network using its own VLANs. You can configure tag editing
VLAN Editing
B-25
operations to stack (push), remove (pop), or swap (mark) tags on single-, or double-tagged packets.
Note
When a VLAN is pushed or swapped, the inner bits (P-bit, CFI/DFI) are either copied from the original VLAN or set according to CoS marking profile.
None
Swap (set P-bit and DEI according to CoS marking profile) Swap (copy P-bit and DEI)
None
mark all vlan <vid> exit vlan-tag push vlan <vid> p-bit profile <profile name>
B-26
VLAN Editing
Installation and Operation Manual Action 1 Swap (copy P-bit and DEI) Action 2 Push (copy P-bit and DEI)
Appendix B Data Flow and Traffic Management CLI Command mark all vlan <vid> exit vlan-tag push vlan <vid> p-bit copy
Push (copy P-bit and DEI) Push (copy P-bit and DEI)
Push (copy P-bit and DEI) Push (set P-bit and DEI according to CoS marking profile) Push (set P-bit and DEI according to CoS marking profile), see Note below Swap (copy P-bit and DEI)
vlan-tag push vlan <vid> p-bit copy inner-vlan <vid> pbit copy vlan-tag push vlan <vid> p-bit profile <profile name> inner-vlan <vid> p-bit copy vlan-tag push vlan <vid> p-bit profile <profile name> inner-vlan <vid> p-bit profile <profile name> mark all inner-vlan <vid> exit vlan-tag pop vlan
Push (set P-bit and DEI according to CoS marking profile), see Note below Pop
Pop
mark all vlan <vid> marking-profile <profile name> exit vlan-tag pop vlan
Note
Both VLAN editing actions must use the same CoS marking profile.
The TPID (Ethertype) editing policy for specific actions in E-Line topology is detailed below: Push: TPID of the egress port Swap: TPID of the egress port Swap-push: Swap: User-configured TPID. Default setting is 8100. Push: TPID of the egress port
Push-push: Push 1: User-configured TPID. Default setting is 8100. Push 2: TPID of the egress port
Pop: Not relevant Pop-swap: Pop: Not relevant Swap: TPID of the egress port
Note
The VLAN editing options allowed at bridge port ingress also depend on the
configured flow classification method. Valid combinations are listed in Table B-25 and Table B-26.
VLAN tag swap is not available if the associated broadcast domain is
B-28
VLAN Editing
Untagged
Push X None
VLAN X
Match All
Outer VLAN X Outer VLAN X + Inner VLAN Y
VLAN Editing
B-29
Appendix B Data Flow and Traffic Management Type 3 Action 1 Pop (outer) Action 2 Pop (inner) CLI Command vlan-tag-pop vlan vlantag-pop inner-vlan
Installation and Operation Manual Remarks Double-tagged packets only. This action is not available, when a router interface is connected to a bridge port.
Note
All bridge ports with flows originating from indirectly-attached ports and sharing the same RIF broadcast domain (RIF over bridge/VLAN) must use the same VLAN editing options.
Push-push: Inner tag: TPID is user-configured. If TPID is not configured, default setting is used (8100). Outer tag: TPID is copied from a port TPID.
SVI PW Editing
PW-type SVIs are considered to be untagged entities, inheriting their VLAN properties from attached flows. Table B-29 and Table B-30 detail VLAN editing
B-30
VLAN Editing
options available for PW-type SVIs. VLAN editing option type at ingress must be used with the similar option at egress, as detailed below: Ingress type 1 egress type 1 Ingress type 2 egress types 3 and 4 Ingress type 3 egress type 3.
PtP flows
None
Multipoint flows
Marking Profile
P-bit/DEI translation is further enhanced by using marking profiles that convert CoS and packet color values into P-bit and DEI. ETX-5300A supports up to 16 color-aware and color-blind marking profiles: The color-aware profile translates CoS (07) and packet color (all, green, yellow) into P-bit (07) and DEI (yellow, green) values The color-blind profile translates CoS (07) into P-bit (07) and DEI (yellow, green 1) values.
Note
VLAN Editing
B-31
B.8
Traffic Management
ETX-5300A employs enhanced traffic engineering techniques for efficient handling of multi-priority traffic on a per-flow basis. It provides pre- and/or post-forwarding traffic management (TM), using advanced queuing and shaping mechanisms. As illustrated in the data flow diagram (Figure B-3), pre-forwarding (ingress) traffic management is performed at the Service Aggregation Group (SAG) of an Ethernet I/O card for indirectly-attached ports ingress traffic. Post-forwarding (egress) traffic management is done at both directly- and indirectly-attached ports egress.
Overview
ETX-5300A traffic management entities are called queue groups. They are configured over SAGs or physical ports. The queue groups consist of 2- or 3-level scheduling elements (queue blocks) per port type (see the description of Type-1, Type-2 and Type-3 queue groups below). The queue blocks consist of separate internal strict-priority or WFQ queues.
Scheduling Elements
Each scheduling element consists of strict or weight fair queues. In addition, single- and dual-rate shapers operate at per-queue and per-scheduling-element level to shape traffic into a required traffic profile (CIR, CBS or CIR/EIR, CBS/EBS). The TM entities allow hierarchical scheduling and shaping at several levels. For example, a 3-level TM entity schedules and shapes traffic at EVC, tunnel and port levels. This means that several shaped EVCs can be bundled into one shaped tunnel. A dual shaper at the EVC level ensures committed EVC CIR on the aggregated tunnel while sharing the remaining traffic between the EIR part of the other EVCs (see Dual Shaper and EIR Sharing below). Similar bandwidth allocation can be made among the different tunnels at the port level by committing on tunnels CIR and sharing the remaining port bandwidth between tunnels EIR.
Figure B-7 illustrates the hierarchical TM concept and the dual shaper
functionality. The magnified portion of the diagram details functionality of a level-1 SE.
B-32
Traffic Management
CIR/EIR Shaper
WFQ 1 WFQ 2
Level-0 SEs CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 1 WFQ 3 WFQ 4 CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 WFQ 383 WFQ 384 CIR/EIR Shaper WFQ 1 WFQ 2 CIR/EIR Shaper WFQ 63 WFQ 64 WFQ 383 WFQ 384 WFQ 2 CIR Shaper Level-2 SE CIR/EIR Shaper
EVC Level
Tunnel Level
Port Level
For WFQs belonging to the queue groups defined for physical ports (not for SAGs)
Queuing
Each flow is assigned to a queue block as its destination. Each queue block includes scheduling queues in accordance with CoS delivery priorities. A flow packet is mapped to a specific queue according to the packets CoS (set by CoS mapping profile at the ingress), whereby CoS 7 is mapped to the lower priority queue, and CoS 0 to the highest.
Level-0 SEs CIR Shapers Packets mapped to queue according to their CoS SP 1 SP 2 Flow mapped to SE (queue block) SP 3 SP4 WFQ 1 WFQ 2 WFQ 1 WFQ 3 WFQ 4 Up to 384 CIR Shapers SP 1 SP 2 SP 3 SP4 WFQ 1 WFQ 2 WFQ 3 WFQ 4 WFQ 383 WFQ 384 Up to 384 WFQ 383 WFQ 384 Up to 64 WFQ 1 WFQ 2 WFQ 63 WFQ 64 Up to 64 WFQ 2 CIR Shaper Level-2 SE CIR/EIR Shapers
A queue block consists of several internal queues and each queue is defined by its profile. The user defines an internal queue profile and then assigns it to a queue block.
B-34 Traffic Management ETX-5300A Ver. 1.0
An internal queue profile has the following attributes: Queue type (strict or WFQ) Queue weight for WFQ Shaper profile (relevant for level-1 queue blocks of post-forwarding shaping only). See Post-Forwarding Traffic Management Entities below. WRED profile (relevant for level-1 queue blocks of post-forwarding shaping only). See Congestion Avoidance below.
ETX-5300A provides three queue group types for post-forwarding traffic management (TM) and one queue group type for pre-forwarding TM.
Congestion Avoidance
As the queues fill up, new packets face a growing risk of being discarded due to lack of buffer space. The packets can be dropped as the queue becomes totally full (tail-drop) or dropped selectively before all buffers are filled, using a statistical probability. Selective dropping of packets when the queues are filling up is referred to as congestion avoidance. Congestion avoidance mechanisms are complementary to queuing algorithms; queuing algorithms manage the front of a queue, congestion avoidance mechanisms manage the end of the queue. The ETX-5300A traffic management engine solves such issues by employing a weighted random early discard (WRED) mechanism for intelligent queue management and congestion avoidance. The WRED algorithm monitors the fill level of each queue and determines whether an incoming packet should be queued or dropped, based on statistical probabilities. Near-empty queues accept all incoming packets, but as the queues begin to fill, the drop probability for new packets increases. The different queues are allocated different occupancy thresholds, above which incoming packets are discarded at random at a growing rate as the queue fills, until the queue has reached a maximum threshold and all incoming packets are dropped.
WRED Profile
A congestion control policy is defined by a WRED profile attached to an internal queue (level-0 SE only). Each WRED profile includes two curves one for green and one for yellow packets. A packet is mapped into a curve according to its color, with green packets having priority over the yellow ones. ETX-5300A supports up to eight WRED profiles. Each WRED profile includes the following parameters: Minimum threshold: a percentage of maximum queue depth. If a packet is queued and the queue size is 0 minus the minimum threshold, the packet is admitted. Maximum threshold: a percentage of maximum queue depth. If a packet is queued and the queue size is the minimum threshold minus the maximum threshold, the packet is dropped at the drop probability of the particular queue size. Maximum drop probability: a drop probability of the maximum threshold queue size, measured in percentages.
Traffic Management
B-35
Min Threshold
Max Threshold
100%
Queue Depth
Yellow packets: Minimum threshold 70% Maximum threshold 85% Maximum probability 100%.
When configuring and using queue groups, you may not exceed maximum allowed number of its elements. For example, you can activate less than 384 level-0 SEs, supported by 3-level queue groups (see Type 2 Queue Group). To facilitate the configuration process, ETX-5300A provides default queue groups for every available type. These default entities can be used as a basis for creating customized queue groups according to user requirements.
B-36 Traffic Management ETX-5300A Ver. 1.0
The post- and pre-forwarding traffic management entities are described below.
Traffic Management
B-37
The default queue group profile can be viewed and bound to a port as is, or used as the basis for a new queue group (copy default queue group, rename and edit), and then bound to a port. When a queue group is bound to a port, the following configuration actions are allowed: Replacing queue block profiles Replacing or deleting shaper profiles (a shaper profile cannot be edited while it is in use in a queue group).
A queue group that is bound to a port cannot be replaced; you must verify that no flows are attached to it, delete it, and then bind a new one.
The default queue block profile can be used as is, or as the basis for a new queue block (copy, rename, edit), and bound to a queue group. A queue block that is bound to a queue group cannot be edited (you can replace it with a different queue block). ETX-5300A supports up to 128 different weight combinations for level-0 queue block. The default level-1 queue block profile uses queues with the default WFQ queue profile (weight fair queues, weight = 10, no shaper).
B-38
Traffic Management
Traffic Management
B-39
Installation and Operation Manual 110 113 117 120 124 128 132 136 141 146 151 157 163 170 178 186 195 204 215 227 240 256 273 292 315 341 372 409 455 512 585 682 819 1024 1365 2048 4096
Shaping elements: Single leaky bucket shaper per internal queue in level-0 SE Dual leaky bucket shaper per level-0 SE queue block (see Egress Shaping below) Dual leaky bucket shaper per level-1 SE queue block(see Egress Shaping below) Single leaky bucket shaper at level-2 SE egress.
The default queue group profile can be viewed and bound to a port as is, or used as the basis for a new queue group (copy default queue group, rename and edit), and then bound to a port. When a queue group is bound to a port, the following configuration actions are allowed: Replacing queue block profiles Replacing or deleting shaper profiles (a shaper profile cannot be edited while it is in use in a queue group). Editing connections between level-0 and level-1 queue blocks. You can connect up to 384 level-0 SE to a single level-1 SE.
A queue group that is bound to a port cannot be replaced, you must verify that no flows are attached to it, delete it, and then bind a new one.
B-40
Traffic Management
The default queue block profile can be used as is, or as a basis for a new queue block (copy, rename, edit), and bound to a queue group. A queue block that is bound to a queue group cannot be edited (you can replace it with a different queue block). ETX-5300A supports up to 128 different weight combinations for level-0 queue block. Default level-1 and level-2 queue block profiles use queues with default WFQ queue profile (weight fair queues, weight = 10, no shaper).
Weight granularity: each of the 64 WFQs belonging to the level-2 SE (queue block) can have one of 127 predetermined weights, according to the table below. When a weight is selected in the range of two consecutive values, the highest value is automatically selected. For example, if you set a WFQ weight to 3000, which falls between the two allowed values of 2048 and 4096, ETX-5300A rounds it to 4096.
31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 71 71 73 74 75 77 78 80 81 83 85 87 89 91 93 95 97 99 102 105 107 110 113 117 120 124 128 132 136 141 146 151 157 163 170 178 186 195 204 215 227 240 256 273 292 315 341 372 409 455 512 585 682 819 1024 1365 2048 4096
1 2 3 4 5 6 7 8 9 10
11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 30
Shaping elements: Dual leaky bucket shaper per level-0 SE queue block (see Egress Shaping below) Dual leaky bucket shaper per level-1 SE queue block(see Egress Shaping below) Single leaky bucket shaper at level-2 SE egress.
The default queue group profile can be viewed and bound to a port as is, or used as the basis for a new queue group (copy default queue group, rename and edit), and then bound to a port. When a queue group is bound to a port, the following configuration actions are allowed: Replacing queue block profiles Replacing or deleting shaper profiles (a shaper profile cannot be edited while it is in use in a queue group).
B-42
Traffic Management
Editing connections between level-0 and level-2 queue blocks. You can connect up to 384 level-0 SE to a single level-2 SE.
A queue group that is bound to a port cannot be replaced, you must verify that no flows are attached to it, delete it, and then bind a new one.
The default queue block profile can be used as is or used as the basis for a new queue block (copy, rename, edit), and bound to a queue group A queue block that is bound to a queue group cannot be edited (you can replace it with a different queue block). The default level-2 and level-3 queue block profiles use queues with default WFQ queue profile (weight fair queues, weight = 10, no shaper).
Egress Shaping
As described above, ETX-5300A provides the following post-forwarding shaping elements: Single leaky bucket shaper (CIR/CBS) per each level-0 SE queue Dual leaky bucket shaper per each level-0 SE queue block Dual leaky bucket shaper per each level-1 SE queue block Single leaky bucket shaper per level-2 SE queue block.
In total, ETX-5300A supports up to 256 shaper profiles with the following configuration ranges: CIR/EIR: 0, 256 kbps10 Gbps (configured in kbps) CBS/EBS: 0, 10512 kBytes (configured in bytes).
Note
Traffic Management
B-43
WFQ 49 WFQ 50
The ingress CIR/CBS shaper has the following configuration ranges: CIR: 01 Gbps (configured in kbps) CBS: 064 kBytes (configured in bytes) Compensation: 063 bytes.
The default queue group profile can be viewed and bound to a port as is, or used as the basis for a new queue group (copy default queue group, rename and edit), and then bound to a port. When a queue group is bound to a port, the following configuration actions are allowed:
B-44 Traffic Management ETX-5300A Ver. 1.0
Replacing queue block profiles Replacing or deleting shaper profiles (a shaper profile cannot be edited while it is in use in a queue group).
A queue group that is bound to a port cannot be replaced, you must verify that no flows are attached to it, delete it and bind a new one.
The default queue block profile can be used as is, or as the basis for a new queue block (copy, rename, edit), and bind to a queue group. A queue block that is bound to a queue group cannot be edited (you can replace it with a different queue block). The default level-1 queue block profile uses queues with default WFQ queue profile (weight fair queues, weight = 10, no shaper).
Traffic Management
B-45
B-46
Traffic Management
International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail market@rad.com
www.rad.com