Vous êtes sur la page 1sur 244

Title page

Alcatel-Lucent 1646
Synchronous Multiplexer (SM) | Release 2.3
User Provisioning Guide
3KC18078ADAATQZZA
Issue 1 | June 2013

Legal notice
Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.
The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright 2013 Alcatel-Lucent. All rights reserved.
Notice

The information in this document is subject to change without notice. Although every effort has been made to make this document as accurate, complete, and
clear as possible, Alcatel-Lucent and its predecessors assume no responsibility for any errors that appear in this document.
Security Statement

In rare instances, unauthorized individuals make connections to the telecommunications network. In such an event, applicable tariffs require that the
customer pay all network charges for traffic. Alcatel-Lucent and its predecessors cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.
Limited warranty

Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team.
Ordering information

To order more copies of this document or other Alcatel-Lucent documents, please access the Online Customer Support (OLCS) (https://support.lucent.com).
Information product support

To comment on this information product, go to the Online Comment Form (http://www.alcatel-lucent-info.com/comments/enus/) or email your comments to
the Comments Hotline (comments@alcatel-lucent.com).

Contents

About this document


Purpose

......................................................................................................................................................................................... xxv
xxv

Intended audience

..................................................................................................................................................................... xxv
xxv

How to use this document ...................................................................................................................................................... xxv


xxv
Signal words ............................................................................................................................................................................. xxvii
xxvii
Conventions used

................................................................................................................................................................... xxvii
xxvii

Related information
Technical support
How to order

.................................................................................................................................................................. xxviii
xxviii

........................................................................................................................................................................... xxviii
xxviii

How to comment
1

............................................................................................................................................................... xxvii
xxvii

................................................................................................................................................................... xxviii
xxviii

Getting Started
Overview ...................................................................................................................................................................................... 1-1
1-1
ZIC Functionality ...................................................................................................................................................................... 1-1
1-1

System Management
Overview ...................................................................................................................................................................................... 2-1
2-1
ZIC overview .............................................................................................................................................................................. 2-2
2-2
Procedure 2-1: Establish ZIC session ................................................................................................................................ 2-3
2-3
ZIC icons and symbols

........................................................................................................................................................... 2-5
2-5

Menus ............................................................................................................................................................................................ 2-6


2-6
Equipment menu

....................................................................................................................................................................... 2-7
2-7

Provider Bridge menu


Connection menu

............................................................................................................................................................. 2-8
2-8

...................................................................................................................................................................... 2-8
2-8

....................................................................................................................................................................................................................................
1646 SM
iii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Contents
....................................................................................................................................................................................................................................

Data menu .................................................................................................................................................................................... 2-9


2-9
Communication menu ........................................................................................................................................................... 2-10
2-10
Alarms menu

............................................................................................................................................................................ 2-11
2-11

Protection menu

...................................................................................................................................................................... 2-11
2-11

Synchronization menu .......................................................................................................................................................... 2-12


2-12
System Management menu ................................................................................................................................................. 2-13
2-13
Security menu .......................................................................................................................................................................... 2-14
2-14
Tools menu ................................................................................................................................................................................ 2-15
2-15
Help menu ................................................................................................................................................................................. 2-15
2-15
3

Equipment management
Overview ...................................................................................................................................................................................... 3-1
3-1
Procedure 3-1: Configure a board ....................................................................................................................................... 3-1
3-1
Procedure 3-2: Refresh Tree

................................................................................................................................................. 3-5
3-5

Procedure 3-3: System Information


4

................................................................................................................................... 3-5
3-5

Connection
TDM Search ................................................................................................................................................................................ 4-1
4-1
Procedure 4-1: Search VCn cross-connection ................................................................................................................ 4-1
4-1
Procedure 4-2: Create Connection ...................................................................................................................................... 4-4
4-4
Procedure 4-3: Ethernet P2P XC ......................................................................................................................................... 4-9
4-9
Procedure 4-4: Ethernet Flow Based Switching

......................................................................................................... 4-11
4-11

Procedure 4-5: Search OverHead connection .............................................................................................................. 4-13


4-13
Procedure 4-6: Create OverHead Connection
5

............................................................................................................ 4-14
4-14

Ethernet Functions
Overview ...................................................................................................................................................................................... 5-1
5-1
Procedure 5-1: Traffic descriptor

........................................................................................................................................ 5-2
5-2

Procedure 5-2: Resource Availability ................................................................................................................................ 5-5


5-5
Procedure 5-3: VLAN Profile

.............................................................................................................................................. 5-7
5-7

Procedure 5-4: Create color profile .................................................................................................................................... 5-9


5-9
....................................................................................................................................................................................................................................
1646 SM
iv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Contents
....................................................................................................................................................................................................................................

Procedure 5-5: Bridge configuration ............................................................................................................................... 5-10


5-10
Procedure 5-6: IGMP management .................................................................................................................................. 5-11
5-11
Procedure 5-7: Global setting

............................................................................................................................................ 5-13
5-13

Procedure 5-8: Create maintenance domain ................................................................................................................. 5-13


5-13
Procedure 5-9: Create maintenance association .......................................................................................................... 5-15
5-15
Procedure 5-10: Search MEP ............................................................................................................................................. 5-17
5-17
Procedure 5-11: Create MEP .............................................................................................................................................. 5-19
5-19
Procedure 5-12: EFM tool ................................................................................................................................................... 5-21
5-21
Procedure 5-13: Configure EFM tool

............................................................................................................................. 5-22
5-22

Procedure 5-14: Create VLAN .......................................................................................................................................... 5-23


5-23
Procedure 5-15: ConfigureVLAN .................................................................................................................................... 5-24
5-24
Procedure 5-16: Dynamic filtering DB

.......................................................................................................................... 5-26
5-26

Procedure 5-17: Configure static unicast filtering

..................................................................................................... 5-27
5-27

Procedure 5-18: Configure static multicast filtering

................................................................................................. 5-28
5-28

Procedure 5-19: Create ERP topology ............................................................................................................................ 5-29


5-29
Procedure 5-20: Create ELP ............................................................................................................................................... 5-36
5-36
6

Data Communication
Overview ...................................................................................................................................................................................... 6-1
6-1
DCC
Overview ...................................................................................................................................................................................... 6-2
6-2
Procedure 6-1: Network IF .................................................................................................................................................... 6-2
6-2
Procedure 6-2: XC Overhead

............................................................................................................................................... 6-3
6-3

DCN Phys. If
Overview ...................................................................................................................................................................................... 6-6
6-6
Procedure 6-3: IP Address

..................................................................................................................................................... 6-6
6-6

Procedure 6-4: LAN management ...................................................................................................................................... 6-7


6-7
IP tunnel management
Overview ...................................................................................................................................................................................... 6-8
6-8
....................................................................................................................................................................................................................................
1646 SM
v
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Contents
....................................................................................................................................................................................................................................

Procedure 6-5: Administer IP tunnel .................................................................................................................................. 6-8


6-8
Procedure 6-6: Configure IP tunnel .................................................................................................................................... 6-9
6-9
Network domain
Overview

................................................................................................................................................................................... 6-11
6-11

Procedure 6-7: Configure IP route

................................................................................................................................... 6-11
6-11

Procedure 6-8: OSI management ...................................................................................................................................... 6-14


6-14
Management Access Control
Overview

................................................................................................................................................................................... 6-17
6-17

Procedure 6-9: Create MAC Access Control List (ACL) ........................................................................................ 6-17
6-17
7

Alarm Management
Overview ...................................................................................................................................................................................... 7-1
7-1
Procedure 7-1: TCA Profiles ................................................................................................................................................. 7-2
7-2
Procedure 7-2: Create ASAP ................................................................................................................................................ 7-3
7-3
Procedure 7-3: Modify or Delete an ASAP profile

...................................................................................................... 7-8
7-8

Procedure 7-4: ALM cutoff ................................................................................................................................................... 7-9


7-9
Procedure 7-5: ALM resynch. ............................................................................................................................................ 7-10
7-10
Procedure 7-6: Condition log ............................................................................................................................................. 7-11
7-11
Procedure 7-7: Housekeeping support ............................................................................................................................ 7-13
7-13
8

Synchronization
Overview ...................................................................................................................................................................................... 8-1
8-1
Synchronization menu ............................................................................................................................................................. 8-1
8-1
Procedure 8-1: Modify BITS-0 ............................................................................................................................................ 8-2
8-2
Procedure 8-2: Modify BITS-1 ............................................................................................................................................ 8-4
8-4
Procedure 8-3: Modify BITS-OUT0 .................................................................................................................................. 8-5
8-5
Procedure 8-4: Modify BITS-OUT1 .................................................................................................................................. 8-7
8-7
Procedure 8-5: Administer system timing BITS ............................................................................................................ 8-8
8-8
Synchronization outgoing

................................................................................................................................................... 8-16
8-16

....................................................................................................................................................................................................................................
1646 SM
vi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Contents
....................................................................................................................................................................................................................................

Security
Overview ...................................................................................................................................................................................... 9-1
9-1
Procedure 9-1: Change user password

............................................................................................................................. 9-2
9-2

Procedure 9-2: Retrieve user information ........................................................................................................................ 9-3


9-3
Procedure 9-3: Create user account .................................................................................................................................... 9-3
9-3
Procedure 9-4: Change user account

................................................................................................................................. 9-5
9-5

Procedure 9-5: Modify account default settings ............................................................................................................ 9-8


9-8
Procedure 9-6: View current sessions ................................................................................................................................ 9-9
9-9
Procedure 9-7: Modify command privileges ................................................................................................................ 9-10
9-10
Procedure 9-8: Manage audit ............................................................................................................................................. 9-12
9-12
Procedure 9-9: Log settings ................................................................................................................................................ 9-14
9-14
Procedure 9-10: Modify in progress message settings
10

............................................................................................. 9-16
9-16

Provisioning: Detailed level Procedures


Overview

................................................................................................................................................................................... 10-1
10-1

Procedure 10-1: Log into the system

.............................................................................................................................. 10-2
10-2

Procedure 10-2: Log out of the system

.......................................................................................................................... 10-3
10-3

Procedure 10-3: Retrieve software version ................................................................................................................... 10-4


10-4
Procedure 10-4: In-Service Upgrade ............................................................................................................................... 10-6
10-6
Procedure 10-5: Initialize and Upgrade with a new release

................................................................................... 10-7
10-7

Procedure 10-6: DB management remote file copy ................................................................................................... 10-7


10-7
Procedure 10-7: DB management cancel remote file copy .................................................................................. 10-10
10-10
Procedure 10-8: Network Element management ...................................................................................................... 10-11
10-11
Procedure 10-9: LAC Management

.............................................................................................................................. 10-12
10-12

Procedure 10-10: MAC File Collection ....................................................................................................................... 10-14


10-14
Procedure 10-11: Administer NTP

................................................................................................................................ 10-15
10-15

Procedure 10-12: Network IF .......................................................................................................................................... 10-18


10-18
Procedure 10-13: OSI ULC Report ............................................................................................................................... 10-20
10-20
Procedure 10-14: Create Overhead XC

....................................................................................................................... 10-21
10-21

Procedure 10-15: Create linear MSP ............................................................................................................................ 10-23


10-23
....................................................................................................................................................................................................................................
1646 SM
vii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Contents
....................................................................................................................................................................................................................................

Procedure 10-16: Create MS-SPRing ........................................................................................................................... 10-25


10-25
Procedure 10-17: Create Provider Bridge Service ................................................................................................... 10-27
10-27
Procedure 10-18: LAG management ............................................................................................................................ 10-29
10-29
Procedure 10-19: IGMP Snooping

................................................................................................................................ 10-34
10-34

Procedure 10-20: Remove LAG member

................................................................................................................... 10-34
10-34

Procedure 10-21: Retrieve system information

........................................................................................................ 10-39
10-39

Procedure 10-22: Create IP route ................................................................................................................................... 10-40


10-40
Procedure 10-23: Create IP tunnel ................................................................................................................................. 10-42
10-42
Procedure 10-24: NE TL1 Parameter ........................................................................................................................... 10-44
10-44
Procedure 10-25: TL1 console ........................................................................................................................................ 10-44
10-44
Procedure 10-26: Create FTP Server Configuration ............................................................................................... 10-48
10-48
Glossary
Index

....................................................................................................................................................................................................................................
1646 SM
viii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of tables

Signal words for hazard severity

...................................................................................................................... xxvii

3-1

Board xx panel parameters ..................................................................................................................................... 3-2

3-2

Board xx Restart panel parameters

3-3

System Information parameters ............................................................................................................................ 3-5

4-1

Connection panel

4-2

Create Connection panel

4-3

P2P data connection panel parameters

............................................................................................................ 4-10

4-4

P2P data connection panel parameters

............................................................................................................ 4-12

4-5

OverHead Connection parameters

5-1

Traffic descriptor panel parameters ..................................................................................................................... 5-2

5-2

Service type parameters

5-3

Resource Management Pool parameters

5-4

VLAN Protocol Profile panel parameters ......................................................................................................... 5-8

5-5

Color Profile panel parameters

5-6

Maintenance Domain panel parameters .......................................................................................................... 5-14

5-7

Maintenance Domain panel parameters .......................................................................................................... 5-15

5-8

Create Maintenance Association panel parameters

5-9

Maintenance Domain panel parameters .......................................................................................................... 5-18

5-10

Maintenance Domain panel parameters .......................................................................................................... 5-19

5-11

Create MEP panel parameters

5-12

Modify VLAN parameters ................................................................................................................................... 5-25

5-13

Static Unicast Filtering Entry parameters

..................................................................................................................... 3-3

....................................................................................................................................................... 4-3
4-3
......................................................................................................................................... 4-7
4-7

.................................................................................................................... 4-14

.......................................................................................................................................... 5-3
5-3
........................................................................................................... 5-6

............................................................................................................................. 5-9

.................................................................................... 5-16

............................................................................................................................ 5-20

...................................................................................................... 5-27

....................................................................................................................................................................................................................................
1646 SM
ix
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of tables
....................................................................................................................................................................................................................................

5-14

Static Multicast Filtering Entry parameters ................................................................................................... 5-28

5-15

ERP topology parameters ..................................................................................................................................... 5-30

5-16

The ERP Protection Group parameters

........................................................................................................... 5-33

5-17

Ethernet Linear Protection parameters

............................................................................................................ 5-37

6-1

Filter by parameters

6-2

IP address of Network Element

6-3

Filter by parameters

6-4

IP tunnel panel parameters

6-5

IP Routing panel parameters

6-6

OSI area panel parameters

6-7

OS Address panel parameters

7-1

Create ASAP parameters ......................................................................................................................................... 7-7


7-7

7-2

Alarm log parameters

7-3

Input points attributes panel parameters

9-1

Create user account panel parameters

9-2

Change User information window

9-3

Current sessions

10-1

Copy remote file panel parameters

10-2

Cancel Copy of Remote File panel parameters .......................................................................................... 10-11

10-3

Lac state panel parameters

10-4

MAC File Collection panel parameters

10-5

NE interface details parameters ....................................................................................................................... 10-19

10-6

NE interface details parameters ....................................................................................................................... 10-24

10-7

NE interface details parameters ....................................................................................................................... 10-26

10-8

Provider Bridge Service

10-9

Link aggregation parameters

.................................................................................................................................................. 6-3
6-3
............................................................................................................................ 6-4

.................................................................................................................................................. 6-6
6-6
..................................................................................................................................... 6-8
............................................................................................................................... 6-12

................................................................................................................................... 6-14
............................................................................................................................. 6-15

............................................................................................................................................ 7-12
7-12
......................................................................................................... 7-14

................................................................................................................ 9-4

...................................................................................................................... 9-7

....................................................................................................................................................... 9-10
9-10
................................................................................................................... 10-9

................................................................................................................................ 10-13
........................................................................................................ 10-15

..................................................................................................................................... 10-28
............................................................................................................................ 10-31

10-10 Link Aggregator configuration panel parameters

..................................................................................... 10-33

10-11 System Information panel parameters ........................................................................................................... 10-39


10-12 IP routing parameters

.......................................................................................................................................... 10-41

....................................................................................................................................................................................................................................
1646 SM
x
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of tables
....................................................................................................................................................................................................................................

10-13 NE IP tunnel parameters

.................................................................................................................................... 10-43

10-14 Create FTP server parameters

.......................................................................................................................... 10-49

....................................................................................................................................................................................................................................
1646 SM
xi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of tables
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
xii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures

2-1

ZIC authentication window

................................................................................................................................... 2-2

2-2

ZIC main window ...................................................................................................................................................... 2-3


2-3

2-3

NE of ZIC Launcher

2-4

ZIC launcher ................................................................................................................................................................ 2-5


2-5

2-5

ZIC icons and symbols

2-6

Equipment menu

2-7

Provider Bridge menu

2-8

Connection menu

2-9

Data menu

2-10

Communication menu

2-11

Alarms menu

2-12

Protection menu

2-13

Synchronization menu ........................................................................................................................................... 2-12

2-14

System Management menu .................................................................................................................................. 2-13

2-15

Security menu ........................................................................................................................................................... 2-14


2-14

2-16

Tools menu

3-1

Rack xx > Shelf xx > Board xx

3-2

Rack xx > Shelf xx > Board xx > Module xx

3-3

System Information

3-4

System Information panel ....................................................................................................................................... 3-6

4-1

TDM search

4-2

TDM create with ENT-CRS

................................................................................................................................................. 2-4
2-4

............................................................................................................................................ 2-6

........................................................................................................................................................ 2-7
2-7
.............................................................................................................................................. 2-8
2-8

....................................................................................................................................................... 2-8
2-8

.................................................................................................................................................................... 2-9
2-9
........................................................................................................................................... 2-10
2-10

............................................................................................................................................................. 2-11
2-11
....................................................................................................................................................... 2-11
2-11

................................................................................................................................................................ 2-15
2-15
............................................................................................................................ 3-2
................................................................................................. 3-4

.................................................................................................................................................. 3-5
3-5

................................................................................................................................................................. 4-3
4-3
.................................................................................................................................. 4-4

....................................................................................................................................................................................................................................
1646 SM
xiii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

4-3

TDM create with ENT-CRSPROT ...................................................................................................................... 4-4

4-4

STMnAU4 window

4-5

LOPOOL window

4-6

VC4 list

4-7

Create LOVC12

4-8

Connection Detail ...................................................................................................................................................... 4-7


4-7

4-9

XC mapping ................................................................................................................................................................. 4-8


4-8

4-10

P2P Panel

4-11

P2P data connection panel

4-12

ETS switching

4-13

ETS Switching Service

........................................................................................................................................ 4-12

4-14

OverHead Connection

.......................................................................................................................................... 4-13

4-15

Create OverHead Connection

5-1

Traffic descriptor panel

5-2

Resource Management Pools

5-3

VLAN Profile .............................................................................................................................................................. 5-8


5-8

5-4

Color profile

5-5

Bridge configuration panel

5-6

Create Maintenance Domain panel ................................................................................................................... 5-14

5-7

Maintenance Associations Range panel .......................................................................................................... 5-15

5-8

Create Maintenance Association panel

5-9

MA MEP List Range panel .................................................................................................................................. 5-18

5-10

MEP List Range panel ........................................................................................................................................... 5-19


5-19

5-11

Create MEP panel

5-12

EFM tool

.................................................................................................................................................................... 5-21
5-21

5-13

EFM tool

.................................................................................................................................................................... 5-22
5-22

5-14

VLAN Registration

................................................................................................................................................ 5-23
5-23

5-15

VLAN Registration

................................................................................................................................................ 5-24
5-24

5-16

Modify VLAN .......................................................................................................................................................... 5-25


5-25

.................................................................................................................................................. 4-5

..................................................................................................................................................... 4-6
4-6

......................................................................................................................................................................... 4-6
4-6
......................................................................................................................................................... 4-7
4-7

...................................................................................................................................................................... 4-9
4-9
................................................................................................................................... 4-10

.......................................................................................................................................................... 4-11
4-11

............................................................................................................................ 4-14

........................................................................................................................................... 5-2
5-2
................................................................................................................................ 5-6

................................................................................................................................................................ 5-9
5-9
.................................................................................................................................. 5-11

........................................................................................................... 5-16

................................................................................................................................................... 5-20
5-20

....................................................................................................................................................................................................................................
1646 SM
xiv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

5-17

Dynamic filtering database

.................................................................................................................................. 5-26

5-18

Dynamic filter error message .............................................................................................................................. 5-26

5-19

Static Unicast Filtering .......................................................................................................................................... 5-27


5-27

5-20

Static Multicast Filtering

5-21

ERP[ITU-T G.8032]

5-22

Ethernet Ring Protection Topology

5-23

ERP Topology ........................................................................................................................................................... 5-30


5-30

5-24

East/West Ports

5-25

ERP instance

5-26

ERP Protection Group

5-27

ERP topology panel ................................................................................................................................................ 5-33


5-33

5-28

MEPs for East/West ports

5-29

MEP Range ................................................................................................................................................................ 5-35


5-35

5-30

Ethernet Linear Protection

5-31

Ethernet Linear Protection Group

5-32

Create Ethernet Linear Protection Group

5-33

PU interface ............................................................................................................................................................... 5-39


5-39

5-34

VLAN-ID Range

5-35

MD/MA/MEP Range

6-1

DCC Channel

6-2

Overhead Channel Cross Connection

6-3

DCC Channel

6-4

Customer LAN management ................................................................................................................................. 6-7

6-5

Create IP tunnel

6-6

IP route creation ....................................................................................................................................................... 6-12


6-12

6-7

AID Type Selection

6-8

OSI Area

6-9

OS Address

6-10

MAC Access Control List

...................................................................................................................................... 5-28
5-28

............................................................................................................................................. 5-29
.................................................................................................................. 5-29

........................................................................................................................................................ 5-31
5-31

............................................................................................................................................................. 5-32
5-32
........................................................................................................................................... 5-32

.................................................................................................................................... 5-34

................................................................................................................................... 5-36
..................................................................................................................... 5-36
....................................................................................................... 5-37

..................................................................................................................................................... 5-40
5-40
............................................................................................................................................. 5-41

.............................................................................................................................................................. 6-2
6-2
................................................................................................................ 6-4

.............................................................................................................................................................. 6-6
6-6

.......................................................................................................................................................... 6-9
6-9

................................................................................................................................................ 6-13
6-13

..................................................................................................................................................................... 6-14
6-14
................................................................................................................................................................ 6-15
6-15
.................................................................................................................................... 6-17

....................................................................................................................................................................................................................................
1646 SM
xv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

6-11

Modify MAC Access Control List

................................................................................................................... 6-18

6-12

Management Access Control Element (ACE)

6-13

Create Access Control Element

6-14

Management Actual Access Control Element (ACE)

7-1

TCA Profile .................................................................................................................................................................. 7-2


7-2

7-2

Search TCA Profiles

7-3

Create TCA Profile .................................................................................................................................................... 7-3


7-3

7-4

ASAP Mng

7-5

ASAP Type ................................................................................................................................................................... 7-4


7-4

7-6

ASAP AID .................................................................................................................................................................... 7-5


7-5

7-7

ASAP AID list

7-8

ASAP AID details ...................................................................................................................................................... 7-6


7-6

7-9

Create ASAP

7-10

Modify ASAP-AID

7-11

Delete ASAP AID

7-12

Alarm cutoff

7-13

Refresh alarms

7-14

Alarm log

7-15

Input Points shelf selection panel ...................................................................................................................... 7-13

7-16

Input points attributes

7-17

Alarms report

7-18

Operate/Release Output Points

8-1

BITS Select shelf panel

8-2

Modify BITS 0

8-3

BITS 1 Select shelf panel

8-4

Modify BITS 1

8-5

Modify BITS OUT Select shelf panel ................................................................................................................ 8-5

8-6

Modify BITS OUT0 panel

8-7

Modify BITS OUT1 Select shelf panel

............................................................................................. 6-19

........................................................................................................................ 6-20
................................................................................ 6-21

................................................................................................................................................. 7-2
7-2

................................................................................................................................................................... 7-4
7-4

............................................................................................................................................................ 7-5
7-5

.............................................................................................................................................................. 7-6
7-6
................................................................................................................................................... 7-8

...................................................................................................................................................... 7-9
7-9

.............................................................................................................................................................. 7-10
7-10
.......................................................................................................................................................... 7-11
7-11

................................................................................................................................................................... 7-12
7-12

............................................................................................................................................ 7-14
7-14

............................................................................................................................................................ 7-14
7-14
.......................................................................................................................... 7-15

........................................................................................................................................... 8-2
8-2

........................................................................................................................................................... 8-3
8-3
....................................................................................................................................... 8-4

........................................................................................................................................................... 8-4
8-4

..................................................................................................................................... 8-6
............................................................................................................. 8-7

....................................................................................................................................................................................................................................
1646 SM
xvi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

8-8

Modify BITS OUT1 panel

..................................................................................................................................... 8-7

8-9

Synchronization panel .............................................................................................................................................. 8-9


8-9

8-10

Retrieve synchronization timing entity

8-11

Modify Synchronization panel

8-12

Operate - Modify synchronization switch ...................................................................................................... 8-12

8-13

Release - Modify synchronization switch

...................................................................................................... 8-13

8-14

Retrieve Synchronization Message panel

...................................................................................................... 8-15

8-15

Search synchronization message results

8-16

Synchronization Outgoing Search

8-17

Modify Synchronization Switch Outgoing Operate

................................................................................... 8-17

8-18

Modify Synchronization Switch Outgoing Release

................................................................................... 8-18

9-1

Change user password

9-2

User information

9-3

Create user account

9-4

Change User information ........................................................................................................................................ 9-6

9-5

Modify account default settings panel

9-6

Current sessions

9-7

Command Access Privileges page

9-8

Modify Command Access Privileges panel ................................................................................................... 9-12

9-9

Retrieve audit log

9-10

Retrieve audit page with results ......................................................................................................................... 9-14

9-11

Modify log attributes

9-12

Modify in progress message settings panel

10-1

ZIC loading

10-2

Logout message screen

10-3

About window

10-4

In-Service Upgrade Status

10-5

Copy remote file panel

10-6

Cancel Copy of Remote File panel

........................................................................................................... 8-10

........................................................................................................................... 8-11

......................................................................................................... 8-15

.................................................................................................................... 8-16

............................................................................................................................................. 9-2

........................................................................................................................................................ 9-3
9-3
................................................................................................................................................... 9-4
9-4

............................................................................................................... 9-9

......................................................................................................................................................... 9-9
9-9
.................................................................................................................... 9-11

.................................................................................................................................................... 9-13
9-13

............................................................................................................................................. 9-15
9-15
................................................................................................... 9-17

............................................................................................................................................................... 10-3
10-3
......................................................................................................................................... 10-4

.......................................................................................................................................................... 10-5
10-5
................................................................................................................................... 10-6

.......................................................................................................................................... 10-8
10-8
................................................................................................................ 10-10

....................................................................................................................................................................................................................................
1646 SM
xvii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

10-7

System configuration ........................................................................................................................................... 10-12

10-8

LAC State Management panel

10-9

MAC File Collection

......................................................................................................................... 10-13

........................................................................................................................................... 10-14
10-14

10-10 NTP Config - with Disabled Server Synchronization

............................................................................. 10-16

10-11 NTP Config - with Enabled Server Synchronization

.............................................................................. 10-17

10-12 NTP Server Address Provision


10-13 DCC Channel

........................................................................................................................ 10-18

......................................................................................................................................................... 10-19
10-19

10-14 DCC channel - filter by

...................................................................................................................................... 10-20

10-15 OSI Routing Configuration

.............................................................................................................................. 10-21

10-16 Overhead channel cross-connection

.............................................................................................................. 10-22

10-17 Overhead channel cross-connection - enter channel ................................................................................ 10-22


10-18 Linear MSP

............................................................................................................................................................. 10-23
10-23

10-19 Linear multiplex section protection provision panel

............................................................................... 10-24

10-20 Multiplex section shared protection provision panel ............................................................................... 10-25


10-21 Provider Bridge Service
10-22 Create Provider Bridge

..................................................................................................................................... 10-27

....................................................................................................................................... 10-28

10-23 Link aggregation management

........................................................................................................................ 10-30

10-24 Link aggregator configuration

......................................................................................................................... 10-32

10-25

..................................................................................................................................................................................... 10-34
10-34

10-26 Two member in one LAG

.................................................................................................................................. 10-35

10-27 Configure LAG selection ................................................................................................................................... 10-36


10-28 Configure LAG ...................................................................................................................................................... 10-37
10-37
10-29 Actor Admin key selection window ............................................................................................................... 10-37
10-30 Configure LAG for 0 Unlink Port

.................................................................................................................. 10-38

10-31 LAG pop up window ........................................................................................................................................... 10-38


10-32 System Information .............................................................................................................................................. 10-39
10-39
10-33 IP Routing Configuration ................................................................................................................................... 10-40
10-34 IP tunnel - network element
10-35 Tools - TL1 console

.............................................................................................................................. 10-43

............................................................................................................................................. 10-45

....................................................................................................................................................................................................................................
1646 SM
xviii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

10-36 Tools - Accessing TL1 console ........................................................................................................................ 10-46


10-37 Tools - Telnet console

......................................................................................................................................... 10-47

10-38 Tools - TL1 command ......................................................................................................................................... 10-48


10-39 Create FTP server

................................................................................................................................................. 10-49
10-49

....................................................................................................................................................................................................................................
1646 SM
xix
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of figures
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
xx
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of procedures

System Management
2-1

Establish ZIC session

............................................................................................................................................... 2-3
2-3

Equipment management
3-1

Configure a board

3-2

Refresh Tree ................................................................................................................................................................. 3-5


3-5

3-3

System Information

...................................................................................................................................................... 3-1
3-1

.................................................................................................................................................. 3-5
3-5

Connection
4-1

Search VCn cross-connection

4-2

Create Connection

4-3

Ethernet P2P XC

4-4

Ethernet Flow Based Switching ......................................................................................................................... 4-11

4-5

Search OverHead connection

............................................................................................................................. 4-13

4-6

Create OverHead Connection

............................................................................................................................ 4-14

............................................................................................................................... 4-1

..................................................................................................................................................... 4-4
4-4

........................................................................................................................................................ 4-9
4-9

Ethernet Functions
5-1

Traffic descriptor

5-2

Resource Availability

5-3

VLAN Profile .............................................................................................................................................................. 5-7


5-7

5-4

Create color profile

5-5

Bridge configuration

5-6

IGMP management

5-7

Global setting ............................................................................................................................................................ 5-13


5-13

5-8

Create maintenance domain

....................................................................................................................................................... 5-2
5-2
............................................................................................................................................... 5-5
5-5

................................................................................................................................................... 5-9
5-9
.............................................................................................................................................. 5-10
5-10

................................................................................................................................................. 5-11
5-11

................................................................................................................................ 5-13

....................................................................................................................................................................................................................................
1646 SM
xxi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of procedures
....................................................................................................................................................................................................................................

5-9

Create maintenance association

......................................................................................................................... 5-15

5-10

Search MEP ............................................................................................................................................................... 5-17


5-17

5-11

Create MEP

5-12

EFM tool

5-13

Configure EFM tool

5-14

Create VLAN ............................................................................................................................................................ 5-23


5-23

5-15

ConfigureVLAN ...................................................................................................................................................... 5-24


5-24

5-16

Dynamic filtering DB

5-17

Configure static unicast filtering

5-18

Configure static multicast filtering

5-19

Create ERP topology .............................................................................................................................................. 5-29


5-29

5-20

Create ELP ................................................................................................................................................................. 5-36


5-36

............................................................................................................................................................... 5-19
5-19

.................................................................................................................................................................... 5-21
5-21
............................................................................................................................................... 5-22
5-22

............................................................................................................................................ 5-26
5-26
....................................................................................................................... 5-27
................................................................................................................... 5-28

Data Communication
6-1

Network IF

6-2

XC Overhead ............................................................................................................................................................... 6-3


6-3

6-3

IP Address ..................................................................................................................................................................... 6-6


6-6

6-4

LAN management

6-5

Administer IP tunnel ................................................................................................................................................. 6-8


6-8

6-6

Configure IP tunnel

6-7

Configure IP route ................................................................................................................................................... 6-11


6-11

6-8

OSI management

6-9

Create MAC Access Control List (ACL)

................................................................................................................................................................... 6-2
6-2

..................................................................................................................................................... 6-7
6-7

................................................................................................................................................... 6-9
6-9

..................................................................................................................................................... 6-14
6-14
....................................................................................................... 6-17

Alarm Management
7-1

TCA Profiles ................................................................................................................................................................ 7-2


7-2

7-2

Create ASAP

7-3

Modify or Delete an ASAP profile ...................................................................................................................... 7-8

7-4

ALM cutoff

7-5

ALM resynch. ........................................................................................................................................................... 7-10


7-10

7-6

Condition log

............................................................................................................................................................... 7-3
7-3

.................................................................................................................................................................. 7-9
7-9

............................................................................................................................................................ 7-11
7-11

....................................................................................................................................................................................................................................
1646 SM
xxii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of procedures
....................................................................................................................................................................................................................................

7-7
8

10

Housekeeping support

........................................................................................................................................... 7-13

Synchronization
8-1

Modify BITS-0

........................................................................................................................................................... 8-2
8-2

8-2

Modify BITS-1

........................................................................................................................................................... 8-4
8-4

8-3

Modify BITS-OUT0

................................................................................................................................................. 8-5

8-4

Modify BITS-OUT1

................................................................................................................................................. 8-7

8-5

Administer system timing BITS ........................................................................................................................... 8-8

Security
9-1

Change user password

9-2

Retrieve user information

9-3

Create user account

9-4

Change user account ................................................................................................................................................. 9-5


9-5

9-5

Modify account default settings

9-6

View current sessions ............................................................................................................................................... 9-9


9-9

9-7

Modify command privileges

9-8

Manage audit

9-9

Log settings

9-10

Modify in progress message settings

............................................................................................................................................ 9-2
....................................................................................................................................... 9-3
9-3

................................................................................................................................................... 9-3
9-3

........................................................................................................................... 9-8

............................................................................................................................... 9-10

............................................................................................................................................................ 9-12
9-12

............................................................................................................................................................... 9-14
9-14
............................................................................................................... 9-16

Provisioning: Detailed level Procedures


10-1

Log into the system

10-2

Log out of the system

10-3

Retrieve software version ..................................................................................................................................... 10-4

10-4

In-Service Upgrade ................................................................................................................................................. 10-6


10-6

10-5

Initialize and Upgrade with a new release

10-6

DB management remote file copy

10-7

DB management cancel remote file copy

10-8

Network Element management ........................................................................................................................ 10-11

10-9

LAC Management

................................................................................................................................................ 10-2
10-2
............................................................................................................................................ 10-3

..................................................................................................... 10-7

.................................................................................................................... 10-7
.................................................................................................... 10-10

................................................................................................................................................ 10-12
10-12

....................................................................................................................................................................................................................................
1646 SM
xxiii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

List of procedures
....................................................................................................................................................................................................................................

10-10 MAC File Collection


10-11 Administer NTP
10-12 Network IF

........................................................................................................................................... 10-14
10-14

.................................................................................................................................................... 10-15
10-15

.............................................................................................................................................................. 10-18
10-18

10-13 OSI ULC Report

................................................................................................................................................... 10-20
10-20

10-14 Create Overhead XC

........................................................................................................................................... 10-21
10-21

10-15 Create linear MSP

................................................................................................................................................ 10-23
10-23

10-16 Create MS-SPRing

............................................................................................................................................... 10-25
10-25

10-17 Create Provider Bridge Service


10-18 LAG management

....................................................................................................................... 10-27

................................................................................................................................................ 10-29
10-29

10-19 IGMP Snooping ..................................................................................................................................................... 10-34


10-20 Remove LAG member ........................................................................................................................................ 10-34
10-21 Retrieve system information ............................................................................................................................. 10-39
10-22 Create IP route

....................................................................................................................................................... 10-40
10-40

10-23 Create IP tunnel

..................................................................................................................................................... 10-42
10-42

10-24 NE TL1 Parameter


10-25 TL1 console

............................................................................................................................................... 10-44
10-44

............................................................................................................................................................ 10-44
10-44

10-26 Create FTP Server Configuration

................................................................................................................... 10-48

....................................................................................................................................................................................................................................
1646 SM
xxiv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

About this document


About this document

Purpose

This User Provisioning Guide provides the following information about the
Alcatel-Lucent 1646 Synchronous Multiplexer, Release 2.3:

Accessing and logging into the Zero Installation Craft (ZIC) terminal
Using the Zero Installation Craft (ZIC) terminal.
Provisioning, Configuration, Operations and Maintenance, Performance Monitoring,
Fault Management.

Intended audience

This User Provisioning Guide is intended primarily for telecommunications technicians


and communications network providers.
Procedural information in this document is intended primarily for maintenance, operation,
and provisioning personnel responsible for operating and maintaining the Alcatel-Lucent
1646 SM.
How to use this document

This guide includes descriptive and procedural chapters with supporting information (for
example, safety instructions, glossary, and index). See the Contents section to locate
specific information.
Assumptions
This document assumes that users have an understanding of the following:

Basic principles of telecommunication transmission


Common telecommunication and system terminology (a glossary is provided in this
document to assist you)
Test sets and tools used in the telecommunication industry

...................................................................................................................................................................................................................................
1646 SM
xxv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

About this document


....................................................................................................................................................................................................................................

Local operations and functional procedures of the company


Personal computer (PC) operation, common PC terminology, and navigational
procedures in a windows-style user interface
Chapter

About this document

Description
This chapter

Describes the guide's purpose, intended audience,


and organization

Lists related documentation

Explains how to comment on this document

Chapter 1, Getting Started

Contains all the general introduction of the Network


Element including its application in the
telecommunication network.

Chapter 2, System Management

Contains all the description about the menus.

Chapter 3, Equipment management

Contains complete provisioning information on the


equipment, including the equipment protection,
according to the user needs.

Chapter 4, Connection

Contains the provisioning procedures for the


cross-connection.

Chapter 5, Ethernet Functions

Contains procedures necessary to provision Ethernet


features.

Chapter 6, Data Communication

Contains the procedure related to data


communication.

Chapter 7, Alarm Management

Contains all information related to alarms.

Chapter 8, Synchronization

Contains all the description about synchronization


procedures.

Chapter 9, Security

Contains all information related to security.

Chapter 10, Provisioning: Detailed


level Procedures

Contains all other detailed level procedures using the


ZIC.

Glossary

Defines and explains the following:

Index

Telecommunication terms

Abbreviations

Acronyms

Contains a list of index references

....................................................................................................................................................................................................................................
1646 SM
xxvi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

About this document


....................................................................................................................................................................................................................................

Signal words

The signal words that identify the hazard severity levels are shown in Table 1, Signal
words for hazard severity (p. xxvii)
Table 1

Signal words for hazard severity

Signal word

Meaning

DANGER

Indicates an extremely hazardous situation which, if not


avoided, will result in death or serious injury.

WARNING

Indicates a hazardous situation which, if not avoided, could


result in death or serious injury.

CAUTION

Indicates a hazardous situation which, if not avoided, could


result in minor or moderate injury.

NOTICE

Indicates a hazardous situation not related to personal injury.

See Alcatel-Lucent 1646 SM Release 2.3 Safety Guide (3KC18083ADAATQZZA) for


safety related information.
Conventions used

The following conventions are used in this document:

This font indicates a document reference.


This font indicates buttons, icons, or menu items.

Example:
Configuration -> Equipment

This font indicates window names or special emphasis.


Example:
The Configure Equipment window is displayed.

Blue text indicates hyperlinks (cross-references) to other text in the document or


another step in the procedure.
Important messages are displayed as follows:
Note: This is important information.

Related information

The following table lists the documents included in the Alcatel-Lucent 1646 SM
documentation set:
Part Number

Title

3KC18077ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


Product Information and Planning
Guide

Description
Provides information on the
Product and detailed
descriptions of the product
specifics.

....................................................................................................................................................................................................................................
1646 SM
xxvii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

About this document


....................................................................................................................................................................................................................................

Part Number

Title

Description

3KC18078ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


User Provisioning Guide

Provides information on
provisioning, configuration,
operation, performance
monitoring and maintenance
using the Zero Installation
Craft (ZIC) terminal.

3KC18079ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


Installation and System Turn-Up
Guide

Provides information on
product installation and
commissioning.

3KC18080ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


Maintenance and Trouble-Clearing
Guide

Provides information on
Fault Management, alarms
and clearance procedures.

3KC18082ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


TL1 User Provisioning Guide

Provides information on
provisioning, configuration,
operation, performance
monitoring and maintenance
using the TL1 interface in
the Zero Installation Craft
(ZIC) terminal Interface.

3KC18083ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3


Safety Guide

Provides information on the


Safety instructions,
precautions, labels and
instructions in handling the
product.

Technical support

For technical support, contact your local Alcatel-Lucent customer support team. See the
Alcatel-Lucent Support web site (http://www.alcatel-lucent.com/support/) for contact
information.
How to order

To order Alcatel-Lucent documents, contact your local sales representative or use Online
Customer Support (OLCS) (http://support.alcatel-lucent.com)
How to comment

To comment on this document, go to the Online Comment Form (http://infodoc.alcatellucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com).

....................................................................................................................................................................................................................................
1646 SM
xxviii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Getting Started
1

Overview
Purpose

This Chapter introduces the Zero Installation Craft (ZIC) terminal Alcatel-Lucent
software and the main functions of the ZIC Menu. The ZIC provides local management of
single network element, with an ITU compliant Information Model Interface that
manages the Network Element.
Contents
ZIC Functionality

1-1

ZIC Functionality
Purpose

The following is a listing of the functionality of the Zero Installation Craft terminal in
managing the NE.
System Management

Provides descriptions of the following:

System Overview
Hierarchical menu

System Functions

Equipment and Board Management

Provides a description of the presentation of the equipment and the hierarchical tree
structure.
Equipment/Board Management also provides information on:

Setting, Modifying and Removing Boards

Board Hierarchy

...................................................................................................................................................................................................................................
1646 SM
1-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

Remote Inventory
Port Management
Port Management permits configuration and viewing of transmission resources at the
port level. The following are the Port level configuration menu listing:
Automatic Laser Shutdown

MSP protection
Loopback management and configuration
Single fiber configuration
TP Frame Mode Configuration
Re-timing

Ethernet Port Configuration


Equipment Protection Management
Protection Management comprises of:
Equipment protection switching
Multiple Section Protection

Network Configuration

Provides an overview and description of the Network and an introduction to Provisioning


using the ZIC.
Data Communication

Provides a description of the Communication ports, functions and a description of traffic.


Ethernet functions

Provides descriptions of Ethernet related features and the detailed level provisioning
procedures for the same.
Synchronization

Provides descriptions of time and alarm Synchronization functions.


Fault Management

Provides a description and listing of the Alarms and the alarm management system.
Performance Management

Provides a description and procedure on Performance Monitoring and Remote Monitoring


functions.
Security

Provides descriptions and procedures based on Security Management.

....................................................................................................................................................................................................................................
1646 SM
1-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

Provisioning

Provides detailed level procedures for the following:

Accessing the Zero Installation Craft (ZIC) terminal.

Provisioning, Administering and Creation of:


Data Communication
Alarms

Protection
Synchronization
System Management
Security

....................................................................................................................................................................................................................................
1646 SM
1-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
1-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management
2

Overview
Purpose

Provides a description of the Zero Installation Craft (ZIC) terminal system overview and
hierarchical menu.
Contents
ZIC overview

2-2

Procedure 2-1: Establish ZIC session

2-3

ZIC icons and symbols

2-5

Menus

2-6

Equipment menu

2-7

Provider Bridge menu

2-8

Connection menu

2-8

Data menu

2-9

Communication menu

2-10

Alarms menu

2-11

Protection menu

2-11

Synchronization menu

2-12

System Management menu

2-13

Security menu

2-14

Tools menu

2-15

Help menu

2-15

...................................................................................................................................................................................................................................
1646 SM
2-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

ZIC overview

....................................................................................................................................................................................................................................

ZIC overview
Overview

The Zero Installation Craft (ZIC) terminal is a project in charge of the local management
of single network elements, providing ITU-compliant Information Model Interface to the
Network Element.
The ZIC can be integrated to products in charge of the management of networks and
network elements. The Network Element (NE) provides the web server while the user
only needs to start a standard available web browser to access the ZIC application.
Figure 2-1 ZIC authentication window

The Authentication dialog window displays the product name and release number. It also
contains the following fields:

User - Specifies a unique user identifier.

Password - Specifies the user login password. According to the specification, it is a

sequence of case-sensitive alphanumeric characters.


Local Time - This check-box allows to select the local PC time.
Language - Allows to select the language. Default is English.
Login - Allows to login to the home page of the NE.

....................................................................................................................................................................................................................................
1646 SM
2-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

ZIC overview

....................................................................................................................................................................................................................................

Figure 2-2 ZIC main window

The following are the components of the ZIC:

Starting from left to right, the Page header contains the company logo, the equipment
title, the user ID and the Logout hyperlink.

The Client area is the area in which the user works.

Menu bar is present at the top of a page browser (under the title of the page) and
above the client area. They appear automatically along with the page. They contain
the titles from which pull down menus and cascading menus are opened.
Tree area in the left pane allows the user to select the resources from a list. Click on
the NE icon to expand the tree as shown in Figure 2-2, ZIC main window (p. 2-3).
The Alarms table presents the detailed list of the current alarm.

Procedure 2-1: Establish ZIC session


When to use

Use this procedure to establish a Zero Installation Craft (ZIC) terminal session.
...................................................................................................................................................................................................

If this is the first usage of ZIC, go to Step 2, otherwise, go to Step 3.

....................................................................................................................................................................................................................................
1646 SM
2-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Procedure 2-1: Establish ZIC session

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Start the Alcatel-Lucent ZIC Launcher. Click Add from the NE menu and enter the IP
address of the NE as shown in the Figure 2-3, NE of ZIC Launcher (p. 2-4).
Figure 2-3 NE of ZIC Launcher

....................................................................................................................................................................................................................................
1646 SM
2-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Procedure 2-1: Establish ZIC session

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Start the Alcatel-Lucent ZIC Launcher. From the File menu click Load and the previously
saved NE's IP address opens as shown in Figure 2-4, ZIC launcher (p. 2-5) and click
Open.
Figure 2-4 ZIC launcher

...................................................................................................................................................................................................

The authentication dialog window opens as shown in Figure 2-1, ZIC authentication
window (p. 2-2).
...................................................................................................................................................................................................

In the authentication dialog box enter the user name and password and click Login or
press the Enter key. The ZIC application opens and loads the NE information as shown in
Figure 2-2, ZIC main window (p. 2-3).
E...................................................................................................................................................................................................
N D O F S T E P S

ZIC icons and symbols


This section displays the icons and symbols as shown in the ZIC application.

....................................................................................................................................................................................................................................
1646 SM
2-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

ZIC icons and symbols

....................................................................................................................................................................................................................................

Figure 2-5 ZIC icons and symbols

Menus
Description

This section describes an important aspect of the user interface. The user constantly has to
open Pages, select icons and navigate through the different functionalities of the Zero
Installation Craft (ZIC) terminal. A menu consists of a title, that usually identifies the
nature of the actions that can be undertaken, and a list of options associated with actions.
Menu types can be classified as:

Menu bars

Pull-down menus
Cascading menus
Pop-up menus

....................................................................................................................................................................................................................................
1646 SM
2-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Menus

....................................................................................................................................................................................................................................

Menu bars

Menu bars present at the top of a page's browser (under the title of the page) and above
the client area. They appear automatically along with the page.
Pull down menu

A pull-down menu is pulled down from a menu item present in a menu bar. To open a
pull-down menu, click on the title of the menu you need to open with theSelect mouse
button.
Note: A menu option followed by ... means that selecting this option opens another
view. For example the Open... or Save As... menu options in the File pull-down
menu.
Cascading menus

Cascading menus are derived from pull-down menus and represent additional options for
the pull-down menu item selected. Cascading menus are indicated if the > sign follows
an option in a pull-down menu.
To open a cascading menu, click on the menu option with the > sign in the pull-down
menu.

Equipment menu
This menu allows to manage the equipment configuration. The menu options are shown
in the following figure:
Figure 2-6 Equipment menu

Refresh Tree - Allows to update the page area tree


System Information - Allows to view the system information

....................................................................................................................................................................................................................................
1646 SM
2-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Provider Bridge menu

....................................................................................................................................................................................................................................

Provider Bridge menu


This menu allows to manage the Bridge configuration.
Figure 2-7 Provider Bridge menu

The menu options are :

Ethernet Services XC

Connection menu
The connection menu allows to manage (provisioning, service type etc.) the client/line
traffic.
Figure 2-8 Connection menu

The menu options are shown in the following figure :

TDM Search - Allows to set the SDH service.

TDM Create - Allows to configure the SDH service.

OH XC

- OH Search - Allows to search Overhead Connection.


- OH Create - Allows to Create Overhead Connection.

ETS XC - Allows to set the Point-to-Point cross-connection services.

....................................................................................................................................................................................................................................
1646 SM
2-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Data menu

....................................................................................................................................................................................................................................

Data menu
The data menu allows to set the service for Data traffic. The menu options are shown in
the following figure:
Figure 2-9 Data menu

Traffic descriptor - To set the operation mode.

Resource Avilability - To monitor and to count the amount of dynamic NE resources.

MAC Access Control List - To create access control list.

VLAN Profile - To set the virtual LAN mode.

ASAP list - To show and manage the Alarm Severity Assignment Profile.

Bridge - To create a bridge configuration.

IGMP Management - This displays the details of Board, Router Neighbor Timeouts

and their status

Queue Management - This allows management of the queue.


OAM Management - This allows operation and maintenance management.

The suboptions are:

OAM Resource Config.

EFM Tool - To manage EFM.


Virtual LAN Management - To manage Virtual LAN.

Virtual LAN

DB Filtering

....................................................................................................................................................................................................................................
1646 SM
2-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Communication menu

....................................................................................................................................................................................................................................

Communication menu
The communication menu allows to configure and set the external communication for NE
management interfaces. The menu options are shown in the following figure:
Figure 2-10 Communication menu

DCC - Allows to specifies the reference of DCC Channel (Line or Section).

DCN Physical Interface - Allows to specify the supported Layer 3 (network layer) of

the OSI Data Communication Network (DCN).


IP Tunnel - Allows the operator to manage an IP tunnel instance on the NE.
Network Domain

Allows the operator to enter (add) a new static IP route in the IP routing table.
Allows to instruct the NE to provide routing database information that is
supported by network layer of the OSI DCN.

Allows to retrieve a list of all immediate OSC neighbors to the local network
element.
Allows retrieve the parameters of a configured OSIAREA that the NE is part of.

....................................................................................................................................................................................................................................
1646 SM
2-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Alarms menu

....................................................................................................................................................................................................................................

Alarms menu
The alarms menu allows to manage entities yield alarms when they malfunction. The
menu options are shown in the following figure:
Figure 2-11 Alarms menu

TCA Profile - Allows to configure and display of the active threshold crossing alarm

profile (TCA = Threshold Crossing Alarm).


ASAP Mng - Allows to configure and display the ASAP (Alarm Severity Assignment
Profile).
ALM CUTOFF - Allows to silence the office audible alarm indications.
ALM Resynch. - Allows to update the alarm database to the current alarm situation.

Condition Log - Allows to collect the alarm history report from the NE.

House Keeping - Allows to manage the input and output points of the shelf.

Protection menu
This menu allows the to manage the available protection systems.
Figure 2-12 Protection menu

....................................................................................................................................................................................................................................
1646 SM
2-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Protection menu

....................................................................................................................................................................................................................................

The menu options are shown in the following figure:

Equipment Protection

E1 Equipment Protection

Linear MSP

MS-SPRing

Ethernet Liner Protection

Synchronization menu
This menu allows the operator to manage the ports dedicated to BITS (Building
Integrated Timing Source) facilities for clock distribution purposes. A BITS output
reference is a DS1 signal.
Figure 2-13 Synchronization menu

The menu options are :

Bits

Modify BITS 0

Modify BITS 1

Modify BITS-OUT 0

Modify BITS-OUT 1

Synchornization

Search

Operate

Release

Sync.Message

....................................................................................................................................................................................................................................
1646 SM
2-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Synchronization menu

....................................................................................................................................................................................................................................

Synch.Outgoing

Search

Release

Operate

System Management menu


This menu provides options for users and administrators to manage the system.
Figure 2-14 System Management menu

The menu options are:

Initialize and Upgrade

In-Service Upgrade

- Upgrade Status

DB Management

Data Base

- DB Information

Remote File

Perform Copy

Cancel Copy

Network Element

....................................................................................................................................................................................................................................
1646 SM
2-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

System Management menu

....................................................................................................................................................................................................................................

Lac

State
Default

Manager List

PM Global File

MAC File Collection

Network Time Protocol

Security menu
This menu contains the following sub-menu options for user and administrative users.
Figure 2-15 Security menu

User Account

Change Password

Information

Administration

Accounts

- Change Account

Current Sessions

Commands Privileges

Audit

Log Settings

IP Message Settings

Logout

....................................................................................................................................................................................................................................
1646 SM
2-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Tools menu

....................................................................................................................................................................................................................................

Tools menu
The menu options are shown in the following figure:
Figure 2-16 Tools menu

Tools menu allows the operator to open a Telnet console for TL1 commands :

TL1 Console
NE TL1 Param
FTP Server Configuration

Help menu
The menu options are shown in the following figure:

Help menu allows the operator to obtain information about:

About (software version)


NE TL1 Syntax

....................................................................................................................................................................................................................................
1646 SM
2-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

System Management

Help menu

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
2-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management
3

Overview
Purpose

Use this chapter to perform equipment provisioning.


Contents
Procedure 3-1: Configure a board

3-1

Procedure 3-2: Refresh Tree

3-5

Procedure 3-3: System Information

3-5

Procedure 3-1: Configure a board


When to use

Use this procedure to configure a board.

...................................................................................................................................................................................................................................
1646 SM
3-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Rack xx Shelf xx Board xx from the tree area.


Figure 3-1 Rack xx > Shelf xx > Board xx

...................................................................................................................................................................................................

The following table provides description of the Rack xx > Shelf xx > Board xx
parameters.
Table 3-1

Board xx panel parameters

Parameter

Description

Access Identifier

Specifies the access identifier of the selected board

Current Provisioned
Type

Specifies the type of equipment to be provisioned

Alarm Profile

Specifies the alarm profile.

....................................................................................................................................................................................................................................
1646 SM
3-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following table provides description of the Restart panel parameters.


Table 3-2

Board xx Restart panel parameters

Parameter

Description

Access Identifier

Specifies the access identifier of the selected board

Phase

Specifies the reload of dynamic and static data (sw and db if


present). Processor is restarted. It is supported by all the
Processor-based cards, without affecting the traffic, if the current
configuration is in line with the one to be reloaded.
For SCC card only COLD reset type is supported in R2.0

...................................................................................................................................................................................................

Click Save to save the settings on the page.


...................................................................................................................................................................................................

Click View to view the Alarms on the alarms panel.


E...................................................................................................................................................................................................
N D O F S T E P S

Provision a module
...................................................................................................................................................................................................

Click Provision hyperlink to provision the SFP module for the selected board as shown in
Figure 3-1, Rack xx > Shelf xx > Board xx (p. 3-2).

....................................................................................................................................................................................................................................
1646 SM
3-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following screen appears for the module selected.


Figure 3-2 Rack xx > Shelf xx > Board xx > Module xx

...................................................................................................................................................................................................

Select the SFP/XFP module from the Provisioned Type drop-down list box.
...................................................................................................................................................................................................

Click Save to save the settings, the tree area displays the XFP module provisioned on the
selected facility.
...................................................................................................................................................................................................

Click Remote Inventory to view the details of the selected module.


...................................................................................................................................................................................................

Click Save to save the settings.


...................................................................................................................................................................................................

Click View hyperlink displayed under Alarms and Conditions panel to view the
alarms/conditions raised by the equipment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
3-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management

Procedure 3-2: Refresh Tree

....................................................................................................................................................................................................................................

Procedure 3-2: Refresh Tree


When to use

Use this procedure to Refresh the Tree view on the left pane.
Procedure
...................................................................................................................................................................................................

Select Equipment Refresh Tree.


Result: The tree view on the left is refreshed and any new ports added are displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 3-3: System Information


When to use

Use this procedure to view the system information.


Procedure
...................................................................................................................................................................................................

Select Equipment System Information.


Result: The System Information tab is displayed.
Figure 3-3 System Information

Table 3-3

System Information parameters

Parameter

Description

Node Type

Specifies the provisioned Node type.

Software

Specifies the type of equipment to be provisioned

System Type

Specifies the System type.

Release ID

Specifies the Release ID of the software.

Release Date

Specifies the Release date of the software

Matrix Size

Specifies the size of the matrix.

....................................................................................................................................................................................................................................
1646 SM
3-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Equipment management

Procedure 3-3: System Information

....................................................................................................................................................................................................................................

Table 3-3

System Information parameters

(continued)

Parameter

Description

Status

Specifies the status of software installation.

Region

Specifies the region for which the software is customized.

Provision Mode

Specifies the mode in which the system is provisioned.

User Label

Specifies the user label.

Save

Click to save the settings on the page.

Cancel

Click to undo the changes and return back to previous window.

...................................................................................................................................................................................................

Click on the ACTSW link.


Result: The System Information panel is displayed.
Figure 3-4 System Information panel

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
3-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection
4

TDM Search
Purpose

Use this chapter to perform the cross-connection provisioning.


Contents
Procedure 4-1: Search VCn cross-connection

4-1

Procedure 4-2: Create Connection

4-4

Procedure 4-3: Ethernet P2P XC

4-9

Procedure 4-4: Ethernet Flow Based Switching

4-11

Procedure 4-5: Search OverHead connection

4-13

Procedure 4-6: Create OverHead Connection

4-14

Procedure 4-1: Search VCn cross-connection


When to use

Use this procedure to retrieve a VCn cross-connection.


Four types of cross connection can be created:

VC44C
VC4
VC3

VC12

...................................................................................................................................................................................................................................
1646 SM
4-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Choose specific STM-N optical SFP to configure high order structure.

Note: For VC44C cross-connection, STM-4 and STM-16 are available and for VC4,
VC3, and VC12 cross-connection, STM-1, STM-4 and STM-16 are available.
...................................................................................................................................................................................................

Select Connection TDM Search option from the menu bar to view and set the
cross-connection parameters for the search criteria

....................................................................................................................................................................................................................................
1646 SM
4-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................

The following Connection panel is displayed.


Figure 4-1 TDM search

...................................................................................................................................................................................................

This panel lists the parameters described in the following table.


Table 4-1

Connection panel

Parameters

Description

Retrieve Connection
command

The options are:

Filter by Access
Identifier Type

(RTRV-CRS) - To retrieve general cross-connections. This removes


the VC Type drop-down list box.

(RTRV-CRS-) - To retrieve lower order protected cross-connections..


This option adds the VC Type drop-down list box.

(RTRV-CRSPROT) - To retrieve protected cross-connections. This


option removes the VC Type

(RTRV-CRSPROT-) - To retrieve lower order protected


cross-connections.. This option adds the VC Type

Allows to filter by Access Identifier Type

...................................................................................................................................................................................................

Click Search. The system retrieves the cross-connection details based on the search
parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
4-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Procedure 4-2: Create Connection


Create VCn cross-connection
...................................................................................................................................................................................................

Click on the Create hyperlink as shown in Figure 4-1, TDM search (p. 4-3) or select
Connection TDM Create from the menu bar.
Result: The Create Connection tab is displayed.
Figure 4-2 TDM create with ENT-CRS

Figure 4-3 TDM create with ENT-CRSPROT

...................................................................................................................................................................................................

Create cross connection between STMnAU4 and LOPOOL.

....................................................................................................................................................................................................................................
1646 SM
4-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Note: Step 2 to Step 8 is only for LOVC12 and LOVC3. Step 1 is for high order
VC4/VC44C.
...................................................................................................................................................................................................

To create lower order cross connection (e.g. LOVC12/ LOVC3) set VC4 level cross
connection from STMnAU4 XC to Lower Order AID LOPOOL. After VC4 cross
connection is set MVC4 AID is returned.
Note: For bidirectional service, another VC4 from LOPOOL to STMnAU4 need to be
created. The related LOVC12 of this MVC4 channel is used to set LOVC12 to real
PDH or VCG port/Channel.
...................................................................................................................................................................................................

Select STMnAU4 from From selection button.


Result: The From window is displayed.
Figure 4-4 STMnAU4 window

...................................................................................................................................................................................................

Choose LOPOOL from To selection button.

....................................................................................................................................................................................................................................
1646 SM
4-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The To window is displayed.


Figure 4-5 LOPOOL window

...................................................................................................................................................................................................

Click Save to save the configuration.


...................................................................................................................................................................................................

Search the Cross connection from ZIC.


Result: A new cross connection is found.
Figure 4-6 VC4 list

...................................................................................................................................................................................................

Create LOVC12 path to PDH/VCG AID.

....................................................................................................................................................................................................................................
1646 SM
4-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The Create Connection tab is displayed


Figure 4-7 Create LOVC12

Figure 4-8 Connection Detail

...................................................................................................................................................................................................

This panel lists the parameters described in the following table.


Table 4-2

Create Connection panel

Parameters

Description

Enter Command

The options are:

ENT-CRS

ENT-CRSPROT

VC type is selected using the drop-down list.


From

Allows to select the start direction.

To

Allows to select the end point.

Cross Connection
Type

Cross Connection Type is 1WAY for ENT-CRS and 1WAYSNCP for


ENT-CRSPROT

Revertive

The options are:

Y- Yes

N - No

Hold Off Time

Values are 0, 100, 300, 500, 700, 1000, 3000, 5000, 10000

Protection Type

The options are:

SNCN

SNCI

...................................................................................................................................................................................................

10

Click Select hyperlink to select the From and To directions.

....................................................................................................................................................................................................................................
1646 SM
4-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The following window pops up.


Figure 4-9 XC mapping

Solution: Managing a fake MVC4 which can be easily mapped to AU4

MVC4-1-1-7-1-{1-8} <-> AU4 in slot1

MVC4-1-1-7-1-{9-16} <-> AU4 in slot2


MVC4-1-1-7-1-{17-24} <-> AU4 in slot3

MVC4-1-1-7-1-{25-32} <-> AU4 in slot4


MVC4-1-1-7-1-{33-40} <-> AU4 in slot5
MVC4-1-1-7-1-{41-48} <-> AU4 in slot6

MVC4-1-1-7-1-{49-64} <-> AU4 in slot7

Impacts: MVC4, MVC4TU3, MVC4TU12 are supported but the AID number is not
generated by matrix but fixed with a AU4 number in a slot.
...................................................................................................................................................................................................

11

Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
4-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................

Procedure 4-3: Ethernet P2P XC


When to use

Use this procedure to manage the P2P cross-connection.


Procedure
...................................................................................................................................................................................................

Select Connection ETS XC P2P option from the menu bar.


Figure 4-10 P2P Panel

...................................................................................................................................................................................................

The P2P panel provides the cross-connection search criteria range.


...................................................................................................................................................................................................

Click Search to find a service instance defined in the specified range.

....................................................................................................................................................................................................................................
1646 SM
4-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to create a new P2P instance. The following screen appears.
Figure 4-11 P2P data connection panel

This panel lists the parameters described in the following table:


Table 4-3

P2P data connection panel parameters

Parameter

Description

Type

Specifies the type of P2P service

From

Allows to select the source point

To

Allows to select the end point

Service Label

Allows to enter a service label string

...................................................................................................................................................................................................

Click Select hyperlink to select the From and To directions.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

Select the boards that have to be cross-connected by double-clicking on them.


Result: The selected boards are displayed in the From and To boxes.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

Click Save & Continue to save the settings and configure another P2P instance.

....................................................................................................................................................................................................................................
1646 SM
4-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 4-4: Ethernet Flow Based Switching


When to use

Use this procedure to manage the ETS cross-connection.


Procedure
...................................................................................................................................................................................................

Select Connection ETS XC Flow based Switching option from the menu bar.
Result: The ETS switching panel is displayed.
Figure 4-12 ETS switching

...................................................................................................................................................................................................

Enter the range of XC IDs to be searched and Click Search.

....................................................................................................................................................................................................................................
1646 SM
4-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-4: Ethernet Flow Based Switching

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to create a new ETS Switching Service instance. The following screen
appears.
Figure 4-13 ETS Switching Service

This panel lists the parameters described in the following table:


Table 4-4

P2P data connection panel parameters

Parameter

Description

Type

Specifies the type of switching service

Ingress

Allows to select the source point

Egress

Allows to select the end point

Service Label

Allows to enter a service label string

Traffic descriptor

Allows to select the Traffic Descriptor

Topology Classifier

Allows to select the Topology Classifier

Policing mode

Allows to select the Policing mode

VLAN pop

Allows to select the VLAN pop

VLAN push

Allows to select the VLAN push

...................................................................................................................................................................................................

Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

Click Save & Continue to save the settings and configure another ETS Switching service
instance.

....................................................................................................................................................................................................................................
1646 SM
4-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-4: Ethernet Flow Based Switching

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 4-5: Search OverHead connection


When to use

Use this procedure to retrieve a OverHead connection.


...................................................................................................................................................................................................

Select Connection -> OH XC ->OH Search from the menu bar as shown in Figure 4-14,
OverHead Connection (p. 4-13).
Figure 4-14 OverHead Connection

The following are the parameter description:

Retrieve Connection command: RTRV-AUX- retrieves the provisioned parameters

for AUX channel functionality.


Filter by Access Identifier: Allows to filter by Access Identifier type.

...................................................................................................................................................................................................

Click Search. The system retrieves the overhead connection details based on the search
parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
4-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................

Procedure 4-6: Create OverHead Connection


Purpose

Use this procedure to configure OverHead connection.


...................................................................................................................................................................................................

Select Connection -> OH XC ->OH Create from the menu bar as shown in Figure 4-15,
Create OverHead Connection (p. 4-14).
Figure 4-15 Create OverHead Connection

Table 4-5, OverHead Connection parameters (p. 4-14) provides description of Create
OverHead Connection panel parameters:
Table 4-5

OverHead Connection parameters

Parameter

Description

Enter Command

ENT-AUX command is used to provision AUX

channel configuration parameters.


From

Allows to select the start point.

To

Allows to select the end point.

....................................................................................................................................................................................................................................
1646 SM
4-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................

Table 4-5

OverHead Connection parameters

(continued)

Parameter

Description

Overhead Byte

Correlation Tag, associates input command


with its output responses

S27 - F1 byte, overhead byte postion in

SOH: row=2, col=7.

S24 - F1 byte, overhead byte postion in

SOH: row=2, col=4.

S25 - F1 byte, overhead byte postion in

SOH: row=2, col=5.

S97 - F1 byte, overhead byte postion in

SOH: row=9, col=7.

S38 - F2 byte, overhead byte postion in

SOH: row=3, col=8.

S39 - F2 byte, overhead byte postion in

SOH: row=3, col=9.

S62 - F2 byte, overhead byte postion in

SOH: row=6, col=2.

S89 - F2 byte, overhead byte postion in

SOH: row=8, col=9.

...................................................................................................................................................................................................

Click Select to select the From and To directions.


Results: The following window pops up.

....................................................................................................................................................................................................................................
1646 SM
4-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Save to create a OverHead connection.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
4-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions
5

Overview
Purpose

Provides a description of the Ethernet functionality and features supported in the Zero
Installation Craft (ZIC) terminal.
Contents
Procedure 5-1: Traffic descriptor

5-2

Procedure 5-2: Resource Availability

5-5

Procedure 5-3: VLAN Profile

5-7

Procedure 5-4: Create color profile

5-9

Procedure 5-5: Bridge configuration

5-10

Procedure 5-6: IGMP management

5-11

Procedure 5-7: Global setting

5-13

Procedure 5-8: Create maintenance domain

5-13

Procedure 5-9: Create maintenance association

5-15

Procedure 5-10: Search MEP

5-17

Procedure 5-11: Create MEP

5-19

Procedure 5-12: EFM tool

5-21

Procedure 5-13: Configure EFM tool

5-22

Procedure 5-14: Create VLAN

5-23

Procedure 5-15: ConfigureVLAN

5-24

Procedure 5-16: Dynamic filtering DB

5-26

Procedure 5-17: Configure static unicast filtering

5-27

Procedure 5-18: Configure static multicast filtering

5-28

Procedure 5-19: Create ERP topology

5-29

Procedure 5-20: Create ELP

5-36

...................................................................................................................................................................................................................................
1646 SM
5-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Procedure 5-1: Traffic descriptor


When to use

This procedure is to be used as a guideline for a set of instructions to create, configure,


activate and delete a traffic descriptor.
A Traffic descriptor is the set of Committed Information Rate (CIR), Committed Burst
Size (CBS), Peak Information Rate (PIR), and Peak Burst Size (PBS) parameters used by
the System for bandwidth checks related to port bit rate or Virtual Transport bit rate on
which tunnels and pseudowires are defined. Main use is metering and policing operations.
Create traffic descriptor

Use this procedure to create traffic descriptor:


...................................................................................................................................................................................................

From Data menu, Select Traffic descriptor.


Result: The traffic Descriptor tab is displayed.
...................................................................................................................................................................................................

Click Create hyperlink.


Result: The Traffic Descriptor panel is displayed.
Figure 5-1 Traffic descriptor panel

Traffic Descriptor panel


Table 5-1

Traffic descriptor panel parameters

Parameter

Description

User Label

Indicates the label for Traffic Descriptor.

Service type

Specifies the type of service the traffic. Identifies the used output queue.
Queue is specified by specifying the service type.

CIR [Kb/sec]

Committed Information Rate - This is the maximum rate (kb/sec) with


high priority guaranteed for the packets delivery.

PIR [Kb/sec]

Peak Information Rate - This is the maximum peak rate allowed


(kb/sec).

....................................................................................................................................................................................................................................
1646 SM
5-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Table 5-1

Traffic descriptor panel parameters

(continued)

Parameter

Description

CBS [KBytes]

Committed Burst Size - This is the maximum burst size (byte) with high
priority guaranteed for delivery.

PBS [KBytess]

Peak Burst Size - This is the maximum burst rate allowed (byte).

...................................................................................................................................................................................................

The Traffic Descriptor tab displays the table that contains different traffic descriptor
entries.
Table 5-2

Service type parameters

Parameter

Description

Service type

Indicates the Traffic codification, according to international standard


conversion:
bestEffortService - serves Low priority traffic, which relies on transport

layer protocol to recover from loss and tolerates large delay; for
example: E-mail and file transfer applications. Best Effort denotes BW
(PIR > CIR = 0 in 100kbps increments), which may or may not be
available per network operators reservation for Best Effort policy. It
may therefore be unavailable under congestion conditions.
backGroundService
regulatedService - serves Medium priority traffic, which relies on

transport layer protocol to recover from occasional loss and requires


moderate delay; for example, clientserver applications. Regulated
service denotes BW (PIR > CIR >0 in 100 Kbps increments), which may
be overbooked per network operators overbooking policy. The portion
of bandwidth between CIR and PIR (EIR) may therefore be partially
available under congestion conditions.
Grouped
regulatedService1
regulatedService3
regulatedService4
guaranteedService - serves High priority traffic for mission critical

applications that require lossless delivery and minimal delay.


Guaranteed SLA denotes BW (CIR = PIR > 0 in 100 Kbps increments),
that is always available regardless of any congestion conditions. Traffic
delivered using Guaranteed BW, is policed to the CIR value with a burst
window equal to the CBS.
guaranteedService2

....................................................................................................................................................................................................................................
1646 SM
5-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Table 5-2

Service type parameters

(continued)

Parameter

Description

CIR [Kb/sec]

This is the normal medium rate (expressed in kb/sec) of the data flow
(Effective Bandwidth) and it ranges from 0 to PIR value. It can be set
only if the RegulatedService has been selected; in BestEffortService
case it is set to 0 by the system; in GuaranteedService case it is set equal
to PIR value.

PIR [Kb/sec]

This is the maximum rate (expressed in kb/sec) up to which the source


can transmit for a short time period and it ranges from 3 to
physical-linerate of the relative Port.

CBS [Kbytes]

This is the committed number of bytes for which the source may
transmit the PIR; it ranges from 0 to 64 MB. It can be set only if the
RegulatedService traffic has been selected; in BestEffortService case it
is set to 0 by the system; in GuaranteedService case it is set equal to PBS
value. A value greater than MTU (e.g. 2000) is advisable.

PBS [Kbytes]

This is the number of bytes for which are allowed to be sent above PIR
or CIR before the colour (drop eligibility) of the packet changes; it
ranges from 1 to 64 MB (this max value cannot be greater than the
minimum value of 64 MB or 256xCBS. I.e.: if CBS=2000, then
PBS<512 kB). A value greater than MTU (e.g. 2000) is advisable.

...................................................................................................................................................................................................

TD Policing Mode contains a drop-down list containing the following options:

td_undefined
td_colorBlind
td_colorAware
td_colorAwareNoCoupling
td_colorAwareWithCoupling

...................................................................................................................................................................................................

Click Cancel to return to the previous page.


...................................................................................................................................................................................................

Click Save & Exit to save all the changes and exit from the window.
...................................................................................................................................................................................................

Click Save & Continue to save the settings and create another traffic descriptor.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Procedure 5-2: Resource Availability


When to use

This procedure is used to monitor and to count the amount of dynamic NE resources,
where dynamic NE resources (for example, ETS Classifier, ETS Inflow, ETS Outflow
and so on..) are mapped inside NE internal resources.
This features allows you to perform the following functions:

to report the Used amount of entries and the Available amount of entries
(associated to each dynamic NE resource) to a Management operator, informing the
Management Operator when available resources are exhausted
to support Resource management feature to track Resources limitations (on per-NE
basis) through dedicated Resource Management pools (see Figure 5-2, Resource
Management Pools (p. 5-6) ). Each Resource Management Pool allows the
monitoring of a resource, relying on the following retrieved information (for each
resource):
used entries
available entries
to keep aligned the values inside Management Pools with Packet processor CAM

Resource Management Pools

Use this procedure to view the resource management pools:


...................................................................................................................................................................................................

From Data menu, Select Resource Availability.

....................................................................................................................................................................................................................................
1646 SM
5-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Result: The Resource Management Pools tab is displayed.


Figure 5-2 Resource Management Pools

Resource Management Pool


Table 5-3

Resource Management Pool parameters

Parameter

Description

ETS Cross-Connections

Used

Specifies the Used number of entries for the NE resource ETS


Cross-Connections

Available

Specifies the Available number of entries for the NE resource ETS


Cross-Connections.

Unavailable

Specifies the Unavailable number of entries for the NE resource


ETS Cross-Connections.

Nominal

Specifies the nominal number of entries for the NE resource ETS


Cross-Connections.

Ethernet OAM MEPs

Used

Specifies the Used number of entries for the NE resource Ethernet


OAM MEPs.

Available

Specifies the Available number of entries for the NE resource


Ethernet OAM MEPs.

Unavailable

Specifies the Unavailable number of entries for the NE resource


Ethernet OAM MEPs.

....................................................................................................................................................................................................................................
1646 SM
5-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Table 5-3

Resource Management Pool parameters

Parameter
Nominal

(continued)

Description
Specifies the nominal number of entries for the NE resource
Ethernet OAM MEPs.

Static Vlan Reg. Entry

Used

Specifies the Used number of entries for the NE resource static


VLAN.

Available

Specifies the Available number of entries for the NE resource static


VLAN.

Unavailable

Specifies the Unavailable number of entries for the NE resource


static VLAN.

Nominal

Specifies the nominal number of entries for the NE resource static


VLAN.

Static Filtering

Used

Specifies the Used number of entries for the NE resource static


filtering.

Available

Specifies the Available number of entries for the NE resource static


filtering.

Unavailable

Specifies the Unavailable number of entries for the NE resource


static filtering.

Nominal

Specifies the nominal number of entries for the NE resource static


filtering.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-3: VLAN Profile


When to use

The virtual LAN (VLAN) management provides reports the registered VLANs associated
to the Ethernet interface existing on the each data card and in specific range. VLAN
registration is not applicable to MAC Bridge case.
User this procedure to view the virtual LAN mode.

....................................................................................................................................................................................................................................
1646 SM
5-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-3: VLAN Profile

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Data VLAN profile option from the menu bar.


Figure 5-3 VLAN Profile

...................................................................................................................................................................................................

Table 5-4

VLAN Protocol Profile panel parameters

Parameter

Description

State

Specifies the state of the VLAN.

User label

Specifies the default user label of the VLAN.

Ethernet type (0x)

Specifies the Ethernet type values, which is an hexadecimal value


for the provider protocol-type (PT) that is inserted into the 2-bytes
field of the Stacked-VLAN shim header; the value identifies the
network provider and has to be 2-bytes long in hexadecimal
notation; the third non-included byte is forced by default to 0x.
The PT is used to recognize the type of different VLAN frames,
that is, if they are S-Vlan-tagged or Q-Vlan tagged;
In 1646, the types of VLAN frames supported are only 88A8 or
8100 for 802.1ad or 802.1Q.

...................................................................................................................................................................................................

Click Cancel to cancel the operation and return to the previous page.
...................................................................................................................................................................................................

Click Save & continue to apply the changes and continue the configuration process.
...................................................................................................................................................................................................

Click Save & Exit to apply the changes and the following page appears.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................

Procedure 5-4: Create color profile


When to use

Use this procedure to create a new color profile.


Procedure
...................................................................................................................................................................................................

Select Data Color profile option from the menu bar.


...................................................................................................................................................................................................

Click Create hyperlink.


The following screen appears.
Figure 5-4 Color profile

...................................................................................................................................................................................................

Table 5-5

Color Profile panel parameters

Parameter

Description

Color Profile Mode

Specifies the color profile mode.


The values are

User Label

Priority

Dscp

Specifies the label for the new color profile

....................................................................................................................................................................................................................................
1646 SM
5-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................

Table 5-5

Color Profile panel parameters

(continued)

Parameter

Description

Priority Bits 0 to 7

Specifies the priority bits. The valid range is 0-7.


The values are

green

red

yellow

...................................................................................................................................................................................................

Select Dscp from the Color Profile Mode drop-down list. The Priority bits increases to 063.
...................................................................................................................................................................................................

Click Cancel to unsave the settings and return to the previous page.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and return to the previous page.
...................................................................................................................................................................................................

Click Save & Continue to save the settings and continue to create another color profile.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-5: Bridge configuration


When to use

User this procedure to create a new bridge configuration.

....................................................................................................................................................................................................................................
1646 SM
5-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-5: Bridge configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Data Bridge Configuration option from the menu bar.


Figure 5-5 Bridge configuration panel

...................................................................................................................................................................................................

Select the Type of bridge to be configured from the Bridge Type drop-down list box.
The values are:

Bridge802.1D
Bridge802.1Q
Bridge802.1ad

...................................................................................................................................................................................................

Select the type of protocol from the Protocol Type drop-down list box.
The values are:

manualDisable

STP
RSTP

...................................................................................................................................................................................................

Click Save & Continue to save the setting and continue to create another bridge
configuration.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-6: IGMP management


When to use

Use this procedure to set IGMP management settings.

....................................................................................................................................................................................................................................
1646 SM
5-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-6: IGMP management

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Data IGMP Management option from the menu bar.


Result: The IGMP Management per NE tab is displayed

...................................................................................................................................................................................................

The IGMP Management per NE displays the details of Board, Router Neighbor Timeouts
and their status.
Click Create link to configure IGMP management for a new board.
Result: The IGMP Configurations per NE panel is displayed

...................................................................................................................................................................................................

Click Select link to choose the board for IGMP configuration is done.
Result: A new window is displayed with a list of boards.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-7: Global setting

....................................................................................................................................................................................................................................

Procedure 5-7: Global setting


When to use

Use this procedure to set OAM - Global Configuration.


Procedure
...................................................................................................................................................................................................

Select Data OAM management Global Setting option from the menu bar.
...................................................................................................................................................................................................

The NE Global Setting tab displays the OAM Global Configuration panel.
This panel contains the following parameters:

ETH Type
LBM Time Out [sec]

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-8: Create maintenance domain


When to use

Use this procedure to configure the maintenance domain.


Procedure
...................................................................................................................................................................................................

Select Data OAM Management OAM Resource config. MD option from the
menu bar.
Click Create hyperlink.

....................................................................................................................................................................................................................................
1646 SM
5-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-8: Create maintenance domain

....................................................................................................................................................................................................................................

Result: The Create Maintenance Domain panel is displayed.


Figure 5-6 Create Maintenance Domain panel

This panel lists the parameters described in the following table:


Table 5-6

Maintenance Domain panel parameters

Parameter

Description

MD Label

Specifies the maintenance domain label. The default values is MD#0

Name

Specifies the name for the maintenance domain

MHFCreation

Indicates the MIP Half Function (MHF) Creation.


The values are:

Format

defMHFnone

defMHFdefault

Specifies the MD format.


The values are:

charString

dnsLikeName

none

Level

Specifies the maintenance domain levels. The valid range is from Level0
to Level7

Status

Specifies the maintenance domain status. The values are:

up

down

...................................................................................................................................................................................................

Click Save to save the settings and return to the previous panel.

....................................................................................................................................................................................................................................
1646 SM
5-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-8: Create maintenance domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Cancel to cancel the settings and return to the previous panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-9: Create maintenance association


When to use

Use this procedure to configure the maintenance association.


Procedure
...................................................................................................................................................................................................

Select Data OAM Management OAM Resource config. MA option from the
menu bar.
Result: The Maintenance Associations Range panel is displayed.
Figure 5-7 Maintenance Associations Range panel

This panel lists the parameters described in the following table:


Table 5-7

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are show all or specify criteria

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

....................................................................................................................................................................................................................................
1646 SM
5-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-9: Create maintenance association

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Search/Refresh to filter the Maintenance Association based on the range selected.
...................................................................................................................................................................................................

Click Create to configure a new Maintenance Association.


Result: The Create Maintenance Association panel is displayed.
Figure 5-8 Create Maintenance Association panel

This panel lists the parameters described in the following table:


Table 5-8

Create Maintenance Association panel parameters

Parameter

Description

MD

Specifies the MD number.

Status

Specifies the maintenance domain status. The values are:

up

down

MA Index

Specifies the index for new Maintenance Association.

MHFCreation

The values are:

defMHFnone

defMHFdefault

MA Name

Specifies the new name for Maintenance Association.

CCM Interval

The values are:

interval100ms

interval1s

interval10s

interval1min

interval10min

....................................................................................................................................................................................................................................
1646 SM
5-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-9: Create maintenance association

....................................................................................................................................................................................................................................

Table 5-8

Create Maintenance Association panel parameters

(continued)

Parameter

Description

Format

Specifies the format for new Maintenance Association. The values are:

charString

Type

Type is vid

Vid

Click on Select to choose the Vid.

...................................................................................................................................................................................................

Click Cancel to cancel the settings and return to the previous panel.
...................................................................................................................................................................................................

Click Save to save the settings and return to the previous panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-10: Search MEP


When to use

Use this procedure to search for a list of MEPs.


Procedure
...................................................................................................................................................................................................

Select Data OAM Management OAM Resource config. MA MEP List option from
the menu bar.

....................................................................................................................................................................................................................................
1646 SM
5-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-10: Search MEP

....................................................................................................................................................................................................................................

Result: The Maintenance Associations Range panel is displayed.


Figure 5-9 MA MEP List Range panel

This panel lists the parameters described in the following table:


Table 5-9

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are Show all or Specify
Criteria.

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

MEP From To

Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

Select the filter criteria from the Search Filter drop-down list box. The values are: Show
alland specify criteria.
...................................................................................................................................................................................................

If Show all is selected as a search filter the MD From and To and MA From and To range
cannot be set by the user. To set the specified range, select specify criteria and click
Search that displays the existing MA MEP list.
...................................................................................................................................................................................................

Click Search to filter the MEP based on the range selected.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-18
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................

Procedure 5-11: Create MEP


When to use

Use this procedure to configure a new MEP.


Procedure
...................................................................................................................................................................................................

Select Data OAM Management OAM Resource config. MEP option from the
menu bar.
Result: The Maintenance Associations Range panel is displayed.
Figure 5-10 MEP List Range panel

This panel lists the parameters described in the following table:


Table 5-10

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are Show all or Specify
Criteria.

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

MEP From To

Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

Select the filter criteria from the Search Filter drop-down list box. The values are: Show
alland specify criteria.

....................................................................................................................................................................................................................................
1646 SM
5-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

If Show all is selected as a search filter the MD From and To and MA From and To range
cannot be set by the user. To set the specified range, select specify criteria and click
Search that displays the existing MA MEP list.
...................................................................................................................................................................................................

Click Search to filter the MEP based on the range selected.


...................................................................................................................................................................................................

Select Data OAM Management OAM Resource config. MEP option from the
menu bar.
Click Create hyperlink.
Figure 5-11 Create MEP panel

This panel lists the parameters described in the following table:


Table 5-11

Create MEP panel parameters

Parameter

Description

MA Label

Specifies the MA label for the MEP

MEP Identifier

Specifies the MEP identifier for the MEP. The ID must come from MA's
settings.

If Index

Specifies the If Index value for the MEP

LTM/CCM Priority
(0..7)

Specifies the LTM priority. The valid range is 0-7

LBM Priority

Specifies the LBM priority. The default value is 7

CCIEnable

Specifies the CCIEnable as either True or False

Active

Indicates the Activation State. The values are:

Direction

true

false

Indicates the MEP Direction. The values are:

Up

Down

....................................................................................................................................................................................................................................
1646 SM
5-20
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Select to choose the MA Label, MEP Identifier and If index values and click Save
to store the settings.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous panel
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-12: EFM tool


When to use

Use this procedure to search for the available local ports.


Procedure
...................................................................................................................................................................................................

Select Data EFM tool option from the menu bar.


Result: The EFM tool tab displays the Search Local Port panel.
Figure 5-12 EFM tool

...................................................................................................................................................................................................

Click Search link to search for the available ports.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

Click boards link on the left pane.


Result: The list of local ports available are displayed in the right pane.
...................................................................................................................................................................................................

Click on any of the available port link to select that port.


Result: The selected port name is displayed in the Search Local Port panel.
...................................................................................................................................................................................................

Click Show.

....................................................................................................................................................................................................................................
1646 SM
5-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-12: EFM tool

....................................................................................................................................................................................................................................

Result: The EFM Tool panel with Configuration and Link Monitoring tabs is
displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-13: Configure EFM tool


When to use

Use this procedure to configure the available local ports.


Procedure
...................................................................................................................................................................................................

Select Data EFM tool option from the menu bar.


Result: The EFM tool panel is displayed with the Configuration and Link Monitoring
tabs. By default the Configuration tab is opened.
Figure 5-13 EFM tool

....................................................................................................................................................................................................................................
1646 SM
5-22
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-13: Configure EFM tool

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Selectenabled to enable the Admin State.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

Click Save on the bottom left pane of the panel to save the changes.
...................................................................................................................................................................................................

Click Cancel to undo the changes and return back to the Search Local Port panel.
...................................................................................................................................................................................................

Click Show.
Result: The EFM Tool panel with Configuration and Link Monitoring tabs is

displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-14: Create VLAN


When to use

Use this procedure to search, create and configure VLAN.


Procedure
...................................................................................................................................................................................................

Select Data Virtual LAN Management Virtual LAN option from the menu bar.
Result: The VLAN Registration tab is displayed
Figure 5-14 VLAN Registration

...................................................................................................................................................................................................

Enter the range of ports to be searched in From: and To: boxes and click Search.

....................................................................................................................................................................................................................................
1646 SM
5-23
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-14: Create VLAN

....................................................................................................................................................................................................................................

Result: The search result is displayed.


...................................................................................................................................................................................................

Click Create link on the bottom left pane of the VLAN Registration tab.
Result: The Create VLAN panel is displayed.
...................................................................................................................................................................................................

Enter a numeric value in the VLAN Id: text box. Then select the port to which you want to
assign the VLAN Id from the list of ports in Available Port panel and by clicking
.
Result: The selected port is displayed in the Selected Port: panel.
...................................................................................................................................................................................................

Click Save to save the VLAN created


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-15: ConfigureVLAN


When to use

Use this procedure to configure VLAN.


Procedure
...................................................................................................................................................................................................

Select Data Virtual LAN Management Virtual LAN option from the menu bar.
Result: The VLAN Registration tab is displayed
Figure 5-15 VLAN Registration

...................................................................................................................................................................................................

Enter the range of ports to be searched in From: and To: boxes and click Search.

....................................................................................................................................................................................................................................
1646 SM
5-24
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-15: ConfigureVLAN

....................................................................................................................................................................................................................................

Result: The search result is displayed.

...................................................................................................................................................................................................

Select the check box of the VLAN that you want to configure and click Configure link
given for the selected VLAN.
Result: The Modify VLAN panel is displayed.
Figure 5-16 Modify VLAN

This panel lists the parameters described in the following table:


Table 5-12

Modify VLAN parameters

Parameter

Description

VLAN

Specifies the VLAN Id assigned.

Limit in learning
process

Indicates the status. The values are:

disabled

enabled

Port#

Specifies the Port#

Value

Specifies the Value

Untagged

Specifies the Untagged ports

...................................................................................................................................................................................................

Click Save to save the VLAN modified.

....................................................................................................................................................................................................................................
1646 SM
5-25
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-15: ConfigureVLAN

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Cancel to undo the changes and return back to VLAN Registration panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-16: Dynamic filtering DB


When to use

Use this procedure to view modify the dynamic filtering parameter.


Procedure
...................................................................................................................................................................................................

Select Data Virtual LAN Management DB Filtering option from the menu bar.
Result: The Dynamic Filtering Parameter panel is displayed
Figure 5-17 Dynamic filtering database

...................................................................................................................................................................................................

Enter the time interval in seconds in Aging Time (seconds): text box and click Save.
Note: The value entered for Aging Time (seconds): should be in multiples of 60. If
any value other than this is entered, it throws up an error as shown in Figure 5-18,
Dynamic filter error message (p. 5-26).
Figure 5-18 Dynamic filter error message

Result: The Dynamic filtering parameter is saved.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-26
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-17: Configure static unicast filtering

....................................................................................................................................................................................................................................

Procedure 5-17: Configure static unicast filtering


When to use

Use this procedure to configure static unicast filtering.


Procedure
...................................................................................................................................................................................................

Select Data Virtual LAN Management DB Filtering option from the menu bar.
Result: The Static Unicast Filtering tab is displayed
Figure 5-19 Static Unicast Filtering

...................................................................................................................................................................................................

Click Create link to configure a new static unicast filtering entry. .


Result: The Static Unicast Filtering Entry tab is displayed.
Table 5-13

Static Unicast Filtering Entry parameters

Parameters

Description

VLAN ID

Specifies the Virtual LAN ID of the equipment.

MAC Address

Specifies the MAC address of the port.

Outbound port

Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

Click on the Select link to choose an existing VLAN ID from the drop-down list.
...................................................................................................................................................................................................

Click on the Select link to choose an existing outbound data ports from the drop-down
list.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and return to the previous window.
...................................................................................................................................................................................................

Click Save & Continue to save the setting and configure another unicast entry.
...................................................................................................................................................................................................

Click Cancel to cancel the settings and return back to previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-27
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-18: Configure static multicast filtering

....................................................................................................................................................................................................................................

Procedure 5-18: Configure static multicast filtering


When to use

Use this procedure to configure static multicast filtering.


Procedure
...................................................................................................................................................................................................

Select Data Virtual LAN Management DB Filtering option from the menu bar.
Result: The Static Multicast Filtering tab is displayed
Figure 5-20 Static Multicast Filtering

...................................................................................................................................................................................................

Click Create link to configure a new static multicast filtering entry. .


Result: The Static Multicast Filtering Entry tab is displayed.
Table 5-14

Static Multicast Filtering Entry parameters

Parameters

Description

VLAN ID

Specifies the Virtual LAN ID of the equipment.

MAC Address

Specifies the MAC address of the port.

Outbound port

Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

Click on the Select link to choose an existing VLAN ID from the drop-down list.
...................................................................................................................................................................................................

Click on the Select link to choose an existing outbound data ports from the drop-down
list.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and return to the previous window.
...................................................................................................................................................................................................

Click Save & Continue to save the setting and configure another multicast entry.
...................................................................................................................................................................................................

Click Cancel to cancel the settings and return back to previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-28
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Procedure 5-19: Create ERP topology


When to use

Use this procedure to create a new Ethernet Ring Protection (ERP).


Procedure
...................................................................................................................................................................................................

Select Protection ERP[ITU-T G.8032] option from the menu bar.


Figure 5-21 ERP[ITU-T G.8032]

...................................................................................................................................................................................................

Select theERP topology for which the user wants to configure an ERP.
Figure 5-22 Ethernet Ring Protection Topology

....................................................................................................................................................................................................................................
1646 SM
5-29
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to configure a new ERP topology.


Figure 5-23 ERP Topology

...................................................................................................................................................................................................

ERP topology panel parameters are described in the following table.


Table 5-15

ERP topology parameters

Parameter

Description

ERP Label

Specifies the ERP label.

Interconnection Node

The values are True or False. Only the value


False is supported in R2.2.

East Port

Allows to select the east port.

West Port

Allows to select the west port.

....................................................................................................................................................................................................................................
1646 SM
5-30
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Figure 5-24 East/West Ports

E...................................................................................................................................................................................................
N D O F S T E P S

Create ERP instance


...................................................................................................................................................................................................

Select the ERP Topology.


...................................................................................................................................................................................................

Click on Activate to activate the ERP topology for which the instance is to be created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-31
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Create ERP Instance


Figure 5-25 ERP instance

Create ERP Protection Group

Use this procedure to create ERP Protection Group.


...................................................................................................................................................................................................

Click create from the tree area. The Create ERP Protection Group is displayed.
Figure 5-26 ERP Protection Group

....................................................................................................................................................................................................................................
1646 SM
5-32
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the ERP topology for which the ERP instance has to be created.
Figure 5-27 ERP topology panel

...................................................................................................................................................................................................

The CreateERP Protection Group panel allows changing the settings of the resource by
means of the following parameters:
Table 5-16

The ERP Protection Group parameters

Parameter

Description

ERP label

Specifies the ERP label.

Scope

Specifies the ERP scope in which the ERP


instance operates. The values are Per port and
Per_VLAN.

RPL Owner

It is an Ethernet Ring Node adjacent to the


RPL that is responsible for blocking its end of
the RPL under normal conditions.

Wait-to- restore WTR

This parameter must be in the set { 0, 1, 2, ..,


12 minutes}, with default value at 5 minutes.
A value infinite (corresponding to non
revertive switching behavior) is not supported

Guard Timer

This parameter must be in the range [10 - 2000


msec] with 10 msec steps. Default value is 500
msec.

....................................................................................................................................................................................................................................
1646 SM
5-33
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Table 5-16

The ERP Protection Group parameters

(continued)

Parameter

Description

Hold-off Timer

This parameter must be in the range [ 0 - 10


sec], with 0.1 sec. steps. Default value is 0 sec.

Revertive

The values are True or False. Only the value


True is supported in R2.2.

ERP Version

Specifies the ERP version.

APS Ring VLAN ID

Specifies the APS Ring VLAN ID.

Maintenance Entity Level

Maintenance Entity Level represents the


information to be used to distinguish between
OAM signals belonging to different nested
MEs, at any point in a network.

VLAN priority

Specifies the VLAN ID priority.

...................................................................................................................................................................................................

Select the MEPs associated with the corresponding East and West ports.
Note:
1. Create and activate ERP instance so as to create APS ring VLAN which will be
used for associating MA.
2. Create MD, MA, MEP list, and then map the MEP with the ERP.
Figure 5-28 MEPs for East/West ports

....................................................................................................................................................................................................................................
1646 SM
5-34
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Parameter

Description

Switch Command

The values are Clear, w-FS and e-FS.

Clear-This command clears all the


externally initiated switch commands.

w-FS- This command locally issues


Forced Switch on West.

e-FS- This command locally issues Forced


Switch on East.

Figure 5-29 MEP Range

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-35
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

Procedure 5-20: Create ELP


When to use

Use this procedure to create a new Ethernet Linear Protection (ELP).


Procedure
...................................................................................................................................................................................................

Select Protection Ethernet Linear Protection from the menu bar.


Figure 5-30 Ethernet Linear Protection

...................................................................................................................................................................................................

The Ethernet Linear Protection Group Management screen is displayed:


Figure 5-31 Ethernet Linear Protection Group

....................................................................................................................................................................................................................................
1646 SM
5-36
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click create to configure a new Ethernet Linear Protection Group. The following screen
is displayed:
Figure 5-32 Create Ethernet Linear Protection Group

...................................................................................................................................................................................................

The Ethernet Linear Protection panel allows changing the settings of the resource by
means of the following parameters:
Table 5-17

Ethernet Linear Protection parameters

Parameter

Description

User Label

Specifies the user label.

Status

Specifies the status. The values are active or


Notinservice.

....................................................................................................................................................................................................................................
1646 SM
5-37
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

Table 5-17

Ethernet Linear Protection parameters

(continued)

Parameter

Description

Name

Specifies Ethernet Linear Protection Group


name.

Wait-to- restore WTR

This parameter must be in the set [0, 1, 2, ..,


12 minutes], with default value at 5 minutes. A
value infinite (corresponding to non
revertive switching behavior) is not supported

Hold-off Timer

This parameter must be in the range [0 - 10


sec], with 0.1 sec. steps. Default value is 0 sec

Switch Command

The values are Clear, Lockout of Protection,


Forced Switch and Manual.

Clear- This command clears all the


externally initiated switch commands

Lockout of Protection- This command


fixes the selector position to the working
connection. Prevents the selector from
switching to the protection connection
when it is selecting the working
connection. Switches the selector from the
protection to the working connection when
it is selecting the protection connection.

Forced Switch- This command switches


the selector from the working connection
to the protection connection, unless a
higher priority switch request (that is, LO)
is in effect.

Manual- This command switches the


selector from the working connection to
the protection connection, unless an equal
or higher priority switch request (i.e., LO,
FS, SF or MS) is in effect.

....................................................................................................................................................................................................................................
1646 SM
5-38
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the PU interface from the list as shown in the figure.


Figure 5-33 PU interface

....................................................................................................................................................................................................................................
1646 SM
5-39
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the PU VLAN-ID value from the list as shown in the figure.
Figure 5-34 VLAN-ID Range

....................................................................................................................................................................................................................................
1646 SM
5-40
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the PU MD/MA/MEP values from the list as shown in the figure.
Figure 5-35 MD/MA/MEP Range

...................................................................................................................................................................................................

Click save to save all the settings.


...................................................................................................................................................................................................

Click cancel to revoke all changes and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
5-41
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
5-42
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
6

Overview
Purpose

Provides an introduction to the data communication ports and features.


Contents
DCC

6-2

Procedure 6-1: Network IF

6-2

Procedure 6-2: XC Overhead

6-3

DCN Phys. If

6-6

Procedure 6-3: IP Address

6-6

Procedure 6-4: LAN management

6-7

IP tunnel management

6-8

Procedure 6-5: Administer IP tunnel

6-8

Procedure 6-6: Configure IP tunnel

6-9

Network domain

6-11

Procedure 6-7: Configure IP route

6-11

Procedure 6-8: OSI management

6-14

Management Access Control

6-17

Procedure 6-9: Create MAC Access Control List (ACL)

6-17

...................................................................................................................................................................................................................................
1646 SM
6-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCC

Overview

....................................................................................................................................................................................................................................

DCC
Overview
Purpose

The purpose of this procedure is to create SEL for Data Communication Network (DCN).
Contents
Procedure 6-1: Network IF

6-2

Procedure 6-2: XC Overhead

6-3

Procedure 6-1: Network IF


When to use

Use this procedure to create the network interface.


Procedure

Follow this procedure to create network interface:


...................................................................................................................................................................................................

Select Communication DCC Network IF from the menu bar.


Result: The DCC Channel tab is displayed.Figure 6-1, DCC Channel (p. 6-2).
Figure 6-1 DCC Channel

...................................................................................................................................................................................................

Click Create SEL link.

....................................................................................................................................................................................................................................
1646 SM
6-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCC

Procedure 6-1: Network IF

....................................................................................................................................................................................................................................

Result: The Filter by panel is displayed.

Table 6-1

Filter by parameters

Parameter

Description

AID type

Specifies the AID type available

STM1

STM4

STM16

Cancel

Cancels the AID type selection and returns back to the


previous window.

Search

Searches the available DCC channels for the selected AID


type.

...................................................................................................................................................................................................

Click Search to search for the DCC channel with the selected AID type.
Result: The DCC channels available for the selected AID type is displayed.
...................................................................................................................................................................................................

Select any one of the DCC channels and click Apply & Exit link.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-2: XC Overhead


When to use

Use this procedure to create Overhead channel cross-connection.


Procedure
...................................................................................................................................................................................................

Select Communication DCC XC Overhead from the menu bar.

....................................................................................................................................................................................................................................
1646 SM
6-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCC

Procedure 6-2: XC Overhead

....................................................................................................................................................................................................................................

Result: The Overhead channel Cross connection tab is displayed.


Figure 6-2 Overhead Channel Cross Connection

...................................................................................................................................................................................................

Click on the Create hyperlink to create a cross-connection.


Result: The Enter Channel panel is displayed

Table 6-2

IP address of Network Element

Parameter

Description

DCC Channel

Specifies the type of DCC

SECTION

LINE

From

From Access identifier determines the entity Access Identifier (AID) of


either end of cross-connection for 2WAY cross-connections. The
cross-connection is bidirectional

To

To Access identifier determines the entity Access Identifier (AID) of the


other end of a cross-connection for 2WAY cross-connections. The
cross-connection is bidirectional

Cancel

Allows to cancel the selection and return back to the previous screen.

Save

Allows to save the cross-connect settings.

...................................................................................................................................................................................................

Click Select links to choose the source and the destination to configure a
cross-connection.
...................................................................................................................................................................................................

Click Save to store all the settings and return back to the previous page.

....................................................................................................................................................................................................................................
1646 SM
6-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCC

Procedure 6-2: XC Overhead

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCN Phys. If

Overview

....................................................................................................................................................................................................................................

DCN Phys. If
Overview
Purpose

The purpose of this procedure is to create DCN Physical interface management features.
Contents
Procedure 6-3: IP Address

6-6

Procedure 6-4: LAN management

6-7

Procedure 6-3: IP Address


When to use

Use this procedure to manage the system's IP address.


Procedure

Follow this procedure to manage system's IP address


...................................................................................................................................................................................................

Select Communication DCN Phy. If IP Address from the menu bar.


Result: The system IP address panel is displayed.
Figure 6-3 DCC Channel

Table 6-3

Filter by parameters

Parameter
IP Address:

Description
This is the IP Address of the NE. The entry box allows to
digit the IP address of the NE (value range
[1-99,101-126,128-223]-[0-255]-[0-255]-[0-254]).

....................................................................................................................................................................................................................................
1646 SM
6-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
DCN Phys. If

Procedure 6-3: IP Address

....................................................................................................................................................................................................................................

Table 6-3

Filter by parameters

(continued)

Parameter
Subnet mask:

Description
This is the entry box for subnet mask of the network the NE
is connected to (value range [128-255]-[0-255]-[0-255]-[0255]). The mask, in binary representation, must contain a
contiguous string of 1s (the network portion) and a
contiguous string of 0s (the host portion).

...................................................................................................................................................................................................

Click Save link to store the settings and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-4: LAN management


When to use

Use this procedure to manage the customer LAN.


Procedure
...................................................................................................................................................................................................

Select Communication DCN Phys. IfLAN manag from the menu bar.
Result: The Customer LAN mangement tab is displayed.
Figure 6-4 Customer LAN management

...................................................................................................................................................................................................

Click Save to store all the settings and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
IP tunnel management

Overview

....................................................................................................................................................................................................................................

IP tunnel management
Overview
Purpose

The purpose of this procedure is to manage an IP tunnel instance on the NE.


The IP tunnel that has to be created is specified by its AID. If the AID specified matches
any of the ID for existing IP tunnels, an error message is returned in response.
Contents
Procedure 6-5: Administer IP tunnel

6-8

Procedure 6-6: Configure IP tunnel

6-9

Procedure 6-5: Administer IP tunnel


When to use

Use this procedure to retrieve, create and delete an IP tunnel instance on the NE.
Procedure

Follow this procedure to view an IP tunnel:


...................................................................................................................................................................................................

Click Communication IP Tunnel.


Result: The Network IP Tunnel Configuration panel is displayed.

This panel lists the parameters described in the table below:


Table 6-4

IP tunnel panel parameters

Parameter

Description

Access Identifier IPT-

Specifies the access identifier of the LSP tunnel for the network
connection. It is assigned by system at connection creation.

Remote NSAP

Specifies the Network Service Access Point (NSAP) for the IP


Tunnel

Encapsulation Type

Specifies the Encapsulation Type required for the Tunnel


configuration

ALU

GRE

....................................................................................................................................................................................................................................
1646 SM
6-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
IP tunnel management

Procedure 6-5: Administer IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Delete hyperlink allows to remove from the list the selected item by the check box.
...................................................................................................................................................................................................

The Create hyperlink allows to configure a new IP Tunnel. For details refer to Procedure
6-6: Configure IP tunnel (p. 6-9).
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-6: Configure IP tunnel


When to use

Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be
created is specified by its Access Identifier (AID).
Procedure
...................................................................................................................................................................................................

Select Communication IP Tunnel.


...................................................................................................................................................................................................

Click Create to configure the IP Tunnel as shown in Figure 6-5, Create IP tunnel
(p. 6-9).
Figure 6-5 Create IP tunnel

See Table 6-4, IP tunnel panel parameters (p. 6-8) for parameter description.
...................................................................................................................................................................................................

Enter the IP tunnel access identifier in the entry box.


...................................................................................................................................................................................................

Enter the Remote NSAP value for the IP tunnel.

....................................................................................................................................................................................................................................
1646 SM
6-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
IP tunnel management

Procedure 6-6: Configure IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the encapsulation type from the drop-down list box and click Save to create new IP
tunnel.
...................................................................................................................................................................................................

Click Close to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Overview

....................................................................................................................................................................................................................................

Network domain
Overview
Purpose

The purpose of this procedure is to manage network domain.


Contents
Procedure 6-7: Configure IP route

6-11

Procedure 6-8: OSI management

6-14

Procedure 6-7: Configure IP route


When to use

Use this procedure to configure the IP Routing and enter (add) a new static IP route in the
IP routing table.
Procedure

Follow this procedure to configure the IP Routing:


...................................................................................................................................................................................................

Click CommunicationNetwork DomainIP Route from the menu bar.


Result: The IP Routing Configuration panel is displayed.

The panel displays the existing IP route entry along with its attributes.

....................................................................................................................................................................................................................................
1646 SM
6-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Procedure 6-7: Configure IP route

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create hyperlink to configure a new IP route as displayed in Figure 6-6, IP route
creation (p. 6-12).
Figure 6-6 IP route creation

Table 6-5, IP Routing panel parameters (p. 6-12) provides description of the IP route
panel parameters.
Table 6-5

IP Routing panel parameters

Parameter

Description

Access Identifier

Access Identifier, it specifies the facility carrying the DCC with the next
hop network interface or identifies the IP Tunnel or Customer LAN. The
select hyperlink allows to open the window shown in Figure 6-7, AID
Type Selection (p. 6-13) for the selection of the resource. After the
selection procedure, the chosen value will be reported

Destination Address

This is the IP address of the destination host or network (in the format
nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default
route. If NETMASK is not all '1' (that is, a network route is specified),
the host portion of the DESTADDR must be all '0'

Subnet Mask

This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn).
The mask 0-0-0-0 is used to specify a default route

Metric

This is the cost metric of the route. The valid range is 1- 65535

Status

Specifies the status of the configuration.

....................................................................................................................................................................................................................................
1646 SM
6-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Procedure 6-7: Configure IP route

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the AID
type. The values are DCC, NE IPT, and LAN as shown in Figure 6-7, AID Type
Selection (p. 6-13).
Figure 6-7 AID Type Selection

...................................................................................................................................................................................................

Select one of the radio button to choose the AID value and click Send hyperlink, the
choice are added in the relevant field of the previous page. Close hyperlink allows to
leave the window.
...................................................................................................................................................................................................

Enter the Destination Address and Subnet mask for the IP route to be configured.
...................................................................................................................................................................................................

Enter the Metric value and set the Advertise value to either Y or N.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and return to the window.
...................................................................................................................................................................................................

Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Procedure 6-8: OSI management

....................................................................................................................................................................................................................................

Procedure 6-8: OSI management


When to use

This option retrieves the parameters of a configured OSI AREA that the NE is part of.
It contains the following two sub-menu options:

OSI NE Area
OSI OS Address

Administer OSI NE area


...................................................................................................................................................................................................

Select Communication Network Domain OSI Mng OSI NE Area option from the
menu bar. The OSI area panel is displayed as shown in Figure 6-8, OSI Area (p. 6-14).
Figure 6-8 OSI Area

...................................................................................................................................................................................................

Table 6-6, OSI area panel parameters (p. 6-14) provides description of OSI NE area
parameters.
Table 6-6

OSI area panel parameters

Parameter

Description

OSI AREA

Determines an access Identifier for an OSI area

Level 3 Initial
Domain Part

Assigns the initial domain part of the manual area address (8


hexadecimal characters)

Level 3 Domain
Format Identifier

Assigns the domain format identifier field of the manual area address (2
hexadecimal characters)

Level 3
ORGanization

Assigns the organization field of the manual area address (8 hexadecimal


characters)

....................................................................................................................................................................................................................................
1646 SM
6-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Procedure 6-8: OSI management

....................................................................................................................................................................................................................................

Table 6-6

OSI area panel parameters

(continued)

Parameter

Description

Level 3 Reserved

Assigns the reserved field of the manual area address (4 hexadecimal


characters)

Level 3 Routing

Assigns the routing domain and routing area within the routing domain
of the manual area address (8 hexadecimal characters)

Level 3 System
Identifier

This is the system identifier assigned to the card (12 hexadecimal


characters)

...................................................................................................................................................................................................

The Save hyperlink closes the page and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Administer OSI OS address


...................................................................................................................................................................................................

Select Communication Network Domain OSI Mng OSI OS Address option from
the menu bar. The OS Address panel is displayed as shown in Figure 6-9, OS Address
(p. 6-15).
Figure 6-9 OS Address

...................................................................................................................................................................................................

Table 6-7, OS Address panel parameters (p. 6-15) provides description of the OS
address parameters.
Table 6-7

OS Address panel parameters

Parameter

Description

Operating System

Specifies the operating system for the open system


interconnection management. The values are: OSI and
IP.

Main Address

Specifies the main address for the OSI management

Spare Address

Specifies the spare address for the OSI management

....................................................................................................................................................................................................................................
1646 SM
6-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Network domain

Procedure 6-8: OSI management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Save hyperlink closes the page and returns back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Management Access Control

Overview

....................................................................................................................................................................................................................................

Management Access Control


Overview
Purpose

The purpose of this procedure is to create and manage MAC ACL and ACE
Contents
Procedure 6-9: Create MAC Access Control List (ACL)

6-17

Procedure 6-9: Create MAC Access Control List (ACL)


Purpose

Use this procedure to create a MAC Access Control List.


...................................................................................................................................................................................................

Select Data -> MAC Access Control List from the menu bar.
Figure 6-10 MAC Access Control List

....................................................................................................................................................................................................................................
1646 SM
6-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click ACL hyperlink the Modify MAC Access Control panel is displayed.
Figure 6-11 Modify MAC Access Control List

The Modify MAC Access Control panel that contains the following parameters.
Parameter

Description

ACL Identifier

Identifies the entity for which the output data


are retrieved.

ACL Name

Name of the MAC Access Control

Apply Change

The supported values are

Status

true - Managment Actual Access Control


Element (ACE) panel is displayed.

false - Managment Access Control


Element (ACE) and Managment Actual
Access Control Element (ACE) panel is
displayed

Specifies the state of the MAC Access Control

...................................................................................................................................................................................................

Click Save. The MAC Access Control is created.


E...................................................................................................................................................................................................
N D O F S T E P S

Search and Create MAC Access Control Element (ACE)


...................................................................................................................................................................................................

Select Data -> MAC Access Control List from the menu bar. Click ACL hyperlink.

....................................................................................................................................................................................................................................
1646 SM
6-18
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

Result: The Modify MAC Access Control panel is displayed.


...................................................................................................................................................................................................

Click View to view the Management Access Control Element (ACE) as shown in menu
bar.

Result: Management Access Control Element (ACE) panel is displayed.


Figure 6-12 Management Access Control Element (ACE)

...................................................................................................................................................................................................

Enter the values in From and To search range. Click Search.


Result: The existing list of the MAC ACE is displayed.
...................................................................................................................................................................................................

Click Create to create a new Access Control Element.

....................................................................................................................................................................................................................................
1646 SM
6-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

Result: The following screen appears.


Figure 6-13 Create Access Control Element

This panel lists the parameters described in the following table:


Parameter

Description

Order

Specifies the order range from 0 to 65535.

MAC Source

Specifies the Valid 48 bit MAC address.

MAC Destination

Specifies the Valid 48 bit MAC address.

VID

Indicates the VLAN Id of the ACE . The valid range from


0 to 4097.

Action

Indicates the state of the ACE.


The supported values are

Status

Permit

Deny

Indicates if the ACE is in service.


The supported values are

active : indicates that the MAC ACE is active.

notInService : indicates that the MAC ACE is not

active.
The default value is notInService.
...................................................................................................................................................................................................

Click Save to save the ACE or click Cancel to return to the previous screen without
saving.

....................................................................................................................................................................................................................................
1646 SM
6-20
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication
Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click View to view the Management Actual Access Control Element (ACE) as shown in
menu bar.

Management Actual Access Control Element (ACE) panel is displayed.


Figure 6-14 Management Actual Access Control Element (ACE)

...................................................................................................................................................................................................

Enter the management actual access control element From and To values and click
Search.
...................................................................................................................................................................................................

Click Cancel to return to the previous page.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
6-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Data Communication

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
6-22
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management
7

Overview
Purpose

Alcatel-Lucent 1646 SM supports different types of alarms and events in various


scenarios related to the equipment and transmission.
This section defines the alarms or events supported on the Alcatel-Lucent 1646 SM
network element. The probable cause, raise/clear criteria, object against which alarm is
raised, alarm domain, and consequent actions for each of the supported alarms are defined
in the following table.
Contents
Procedure 7-1: TCA Profiles

7-2

Procedure 7-2: Create ASAP

7-3

Procedure 7-3: Modify or Delete an ASAP profile

7-8

Procedure 7-4: ALM cutoff

7-9

Procedure 7-5: ALM resynch.

7-10

Procedure 7-6: Condition log

7-11

Procedure 7-7: Housekeeping support

7-13

...................................................................................................................................................................................................................................
1646 SM
7-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-1: TCA Profiles

....................................................................................................................................................................................................................................

Procedure 7-1: TCA Profiles


When to use

Use this procedure to create and search and retrieve Threshold profiles.
Procedure
...................................................................................................................................................................................................

Select Alarms TCA Profile from the menu bar.


Figure 7-1 TCA Profile

...................................................................................................................................................................................................

Select the Profile type and click on Search. The corresponding TCA profiles are
displayed.
Figure 7-2 Search TCA Profiles

....................................................................................................................................................................................................................................
1646 SM
7-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-1: TCA Profiles

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to create a new TCA Profile.


Figure 7-3 Create TCA Profile

...................................................................................................................................................................................................

TCA Profile panel parameters are described in the following table.


Parameter

Description

Profile Type

Specifies the Threshold profile type.

User Label

Specifies the User Label.

Default

The values are Y or N.

...................................................................................................................................................................................................

Click Save to save all settings.


...................................................................................................................................................................................................

Click Cancel to revoke all changes and return to previous page.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-2: Create ASAP


When to use

This procedure allows to create an Alarm Severity Assigned Profile (ASAP) Management
instance for a given profile type.

....................................................................................................................................................................................................................................
1646 SM
7-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Alarms ASAP Mng option from the menu bar.


Figure 7-4 ASAP Mng

...................................................................................................................................................................................................

Select the ASAP Type from the drop-down list as shown in the figure.
Figure 7-5 ASAP Type

....................................................................................................................................................................................................................................
1646 SM
7-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the ASAP AID from the drop-down list as shown in the figure.
Figure 7-6 ASAP AID

...................................................................................................................................................................................................

Enter the User Label.


...................................................................................................................................................................................................

Click search to view the list of ASAP AID.


Figure 7-7 ASAP AID list

...................................................................................................................................................................................................

Select the ASAP AID.

....................................................................................................................................................................................................................................
1646 SM
7-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on view to view the details of the selected ASAP AID


Figure 7-8 ASAP AID details

...................................................................................................................................................................................................

Click cancel to return back to the previous page.


...................................................................................................................................................................................................

Click create to configure new ASAP profile. The following screen is displayed.
Figure 7-9 Create ASAP

....................................................................................................................................................................................................................................
1646 SM
7-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

The create ASAP panel parameters are described in the following table.
Table 7-1

Create ASAP parameters

Parameter

Description

ASAP type

Specifies the ASAP type for which the ASAP


profile can be created. The values are EQPT,
BITS, TIMING, SECU, GBE, STM1, STM4,
STM16, VC4, VC44C, LOVC3,
LOVC12,E1,E3,T3,VCG,T1

User Label

Specifies the User Label. System assigned


values for User Label are in the format
LBL-ASAP<ASAP-TYPE>-<ASAP AID INDEX.

Default

The values are Y of N.

Clone From

Specifies the following ASAP-AID parameters


using the index number greater than equal to
5:

NULL ASAP Proflie (0)- is used for the


NULL ASAP which contains NR( Not
Reported) notification code for all the
conditions in the ASAP type.

FACTORY DEFAULT ASAP(1) - is used


for the factory default ASAP

NOT PRIMARY COND.(2) - is used for


the primary conditions which are not
disabled.

ASAP Prof. FERF-AIS CONDITION


Disabled (3)- is used for FERF and AIS
conditions disabled.

ALL CONDITION ASAP Profile(4)- is


used for all conditions enabled.

...................................................................................................................................................................................................

11

Click save to save all the settings


...................................................................................................................................................................................................

12

Click cancel to revoke all changes and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
7-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-3: Modify or Delete an ASAP profile

....................................................................................................................................................................................................................................

Procedure 7-3: Modify or Delete an ASAP profile


When to use

This procedure allows to modify or delete an Alarm Severity Assigned Profile


(ASAP)Management instance for a given profile type.
Procedure
...................................................................................................................................................................................................

Select the ASAP-AID to be modified as shown in the figure


Figure 7-10 Modify ASAP-AID

...................................................................................................................................................................................................

Modify the settings and click on save.


...................................................................................................................................................................................................

Click cancel to revoke all changes and return to the previous page.

....................................................................................................................................................................................................................................
1646 SM
7-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-3: Modify or Delete an ASAP profile

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To delete an ASAP profile select the ASAP AID to be deleted and click delete as shown in
the figure.
Figure 7-11 Delete ASAP AID

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-4: ALM cutoff


When to use

Use this procedure to stop the office audible alarm indications.

....................................................................................................................................................................................................................................
1646 SM
7-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-4: ALM cutoff

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Alarms ALM CUTOFF option from the menu bar.


Figure 7-12 Alarm cutoff

...................................................................................................................................................................................................

Click on SEND functional button a command cuts off the office audible alarm indications
without changing the local alarm reporting.
...................................................................................................................................................................................................

OPERATION COMPLETED or OPERATION FAILED message is displayed.

The currently active audible alarm indications will be silenced. The visual alarm
indications are not affected. Future alarm reporting is not be affected and new audible
alarm indications will be provided for any new alarms.
The ACO LED turns on and a new alarm arrives, it is presented to the audible
closures and the ACO LED switches off. Alarms silenced is not presented to the
Audible closures even if they are still present (only new alarms).
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-5: ALM resynch.


When to use

Use this procedure to update the alarm database to the current alarm situation.

....................................................................................................................................................................................................................................
1646 SM
7-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-5: ALM resynch.

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Alarms Resynch. option from the menu bar.


Figure 7-13 Refresh alarms

...................................................................................................................................................................................................

Click Resynchronize, a command refreshes the alarms and the relevant information is
referred.
...................................................................................................................................................................................................

OPERATION COMPLETED or OPERATION FAILED message is displayed.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-6: Condition log


When to use

Use this procedure to collect the alarm history report from the NE.

....................................................................................................................................................................................................................................
1646 SM
7-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-6: Condition log

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Alarms Condition Log option from the menu bar.


Figure 7-14 Alarm log

...................................................................................................................................................................................................

The Alarm Log tab displays the Filter by panel that contains the following parameters.
Table 7-2

Alarm log parameters

Parameter

Description

Domain

Specifies the domain for filtering the alarm. The values are ALL, TDM,
and DATA.
Note1: If the selected Domain value is DATA, the widow displays
Severity drop down, the values are: CRITICAL, MAJOR, MINOR,
WARNING, and CLEARED.
Note2: If the selected Domain value is ALL, the Event Type and Aid
Type parameters are not available.

Event Type

Specifies the event type that triggers alarm. The values is ALM.

Aid Type

Specifies the Access Identifier type.

From Date & Time

Specifies From date & time to apply filter to the alarm.

To Date & Time

Specifies To data & time to apply filter to the alarm.

...................................................................................................................................................................................................

The Search link allows to filter the alarm details based on the selection criteria.
...................................................................................................................................................................................................

The Reset Criteria link allows to reset the new criteria to apply the filter.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
7-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Procedure 7-7: Housekeeping support


When to use

The NE will be able to receive and process three separate customer-defined inputs for
fault conditions arising externally to the NE. The fault conditions will be processed and
reported as for internally detected fault conditions.
It will be possible to disable the reporting from any input if not used. The inputs will be
capable of interfacing to a dry relay contact, that is, an input will comprise two wire
interfaces capable of detecting an open or closed circuit condition between the two
connections. Each user alarm input is separately configured to accept either a closed
circuit or open circuit state as the active alarm condition. The inputs from the dry contacts
are normally used for site specific alarms such as open door, high temperature, high water
level, and so on. The polarity of an external input control determines the relationship
between the declaration of an environmental condition and the physical signal. The NE
shall drive one separate output station controls for customer defined, site specific
facilities external to the NE, such as air conditioning, generators, and so on. Operating an
external control means that a relay is activated to control some external device. Releasing
an external control means deactivating the relay. The polarity of an external output
control determines the relationship between the control state (CONTSTATE) value and
the physical signal. Provisioning of housekeeping alarms and controls is persistent
Customer access to the Housekeeping (HKP) connections is through 25 pin D-Sub
connector on the NE user access panel.
Input Points
...................................................................................................................................................................................................

From the Alarms menu, Select Housekeeping Input Points.


Figure 7-15 Input Points shelf selection panel

...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue.

....................................................................................................................................................................................................................................
1646 SM
7-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Result: The following screen appears.


Figure 7-16 Input points attributes

...................................................................................................................................................................................................

The Input points attributes panel contains the following parameters.


Table 7-3

Input points attributes panel parameters

Parameter

Description

Alarm Access Identifier

Specifies the Alarm Access Identifier.

Notification Code

Specifies the Notification Code.

Alarm Type

Specifies the type of alarm.

Alarm Message

Specifies the alarm message.

Polarity

Specifies the type of polarity.


The polarity of an external input control determines the relationship
between the declaration of an environmental condition and the
physical signal.

...................................................................................................................................................................................................

Select View under the Alarm Access Identifier column.


Result: The following screen appears
Figure 7-17 Alarms report

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1646 SM
7-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Output Points
...................................................................................................................................................................................................

From the Alarms menu, Select Housekeeping Output Points.


Result: The Select Shelf panel appears.
...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue.
Result: The following screen appears.
Figure 7-18 Operate/Release Output Points

...................................................................................................................................................................................................

Select the Access Identifier that requires the Action.


...................................................................................................................................................................................................

Click Release to release (deactivate) the External Control Output Points.


Note: Releasing an external control means deactivating the relay.
...................................................................................................................................................................................................

Click Operate to operate (activate) the External Control Output Points.


Note: Operating an external control means that a relay is activated to control some
external device.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
7-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
7-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization
8

Overview
Purpose

Provides an overview of the chapter contents and an introduction to Time and Alarm
Synchronization.
Contents
Synchronization menu

8-1

Procedure 8-1: Modify BITS-0

8-2

Procedure 8-2: Modify BITS-1

8-4

Procedure 8-3: Modify BITS-OUT0

8-5

Procedure 8-4: Modify BITS-OUT1

8-7

Procedure 8-5: Administer system timing BITS

8-8

Synchronization outgoing

8-16

Synchronization menu
This menu allows the operator to manage the ports dedicated to BITS (Building
Integrated Timing Source) facilities for clock distribution purposes. A BITS output
reference is a DS1 signal.
The menu options are:

BITS - Allows to modify the characteristics (BITS-0 as Primary and BITS-1 as

Secondary) and the outgoing port of reference clock.


Synchronization - Allows to modify the parameters of the synchronization system.
Synch. Outgoing - Allows to modify the parameters of the synchronization outgoing.

...................................................................................................................................................................................................................................
1646 SM
8-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-1: Modify BITS-0

....................................................................................................................................................................................................................................

Procedure 8-1: Modify BITS-0


When to use

Use this procedure to edit bit 0 related to a given shelf.


Procedure
...................................................................................................................................................................................................

Select Synchronization Bits Modify BITS 0. The following panel appears.


Figure 8-1 BITS Select shelf panel

...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue to continue with the operation.

....................................................................................................................................................................................................................................
1646 SM
8-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-1: Modify BITS-0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following screen appears.


Figure 8-2 Modify BITS 0

The Modify BITS panel contains the following fields:

Access Identifier - Specifies the access identifier for the selected BITS

Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,

or 2MBIT-SSM

SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.

...................................................................................................................................................................................................

The Save link is used to send the related command to the Network Element.
Automatically the Modify BITS page is loaded to show updated data.
...................................................................................................................................................................................................

A further panel Alarms allows to display the alarms relevant to the BITS. Click View
hyperlink to view the alarms.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................

Procedure 8-2: Modify BITS-1


When to use

Use this procedure to edit bit 1 related to a given shelf.


Procedure
...................................................................................................................................................................................................

Select Synchronization Bits Modify BITS 1. The following panel appears.


Figure 8-3 BITS 1 Select shelf panel

...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue to continue with the operation.


...................................................................................................................................................................................................

The following screen appears.


Figure 8-4 Modify BITS 1

The Modify BITS panel contains the following fields:

Access Identifier - Specifies the access identifier for the selected BITS

Signal Format - Specifies the signal format. The values are 2MHZ, and 2MBIT-SSM

....................................................................................................................................................................................................................................
1646 SM
8-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................

SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.

...................................................................................................................................................................................................

The Save link is used to send the related command to the Network Element.
Automatically the Modify BITS page is loaded to show updated data.
...................................................................................................................................................................................................

A further panel Alarms allows to display the alarms relevant to the BITS. Click View
hyperlink to view the alarms.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-3: Modify BITS-OUT0


When to use

Use this procedure to edit to search and edit bit out related to a given shelf
Procedure
...................................................................................................................................................................................................

Select Synchronization Bits Modify BITS OUT0. The following panel appears.
Figure 8-5 Modify BITS OUT Select shelf panel

...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue to continue with the operation.

....................................................................................................................................................................................................................................
1646 SM
8-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-3: Modify BITS-OUT0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following screen appears.


Figure 8-6 Modify BITS OUT0 panel

...................................................................................................................................................................................................

The Modify BITS panel contains the following fields:

Access Identifier - Specifies the access identifier for the selected BITS

Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,

or 2MBIT-SSM

SA Bit Location - Specifies the SA bit location used to carry the SSM information.

The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
Transmitted ESF - Specifies if the output signal is the DUS message or is the actual
SSM value. The values are DUS and ACT. The default value is the previous existing
value. If the existing value is empty. The default existing value is DUS.
Enable Output - Specifies the output mode to which the facility is set. The values are
Y and N. The default value is N.
AIS Mode - Specifies which signal is inserted for the timing output port if the output
signal is squelched. The values are AISMODE and QLMODE. The default values is
the previous value. If the existing value is empty, the default factory value is
QLMODE.
Outgoing Signal Quality - Specifies the quality value level for the out-going signal at
the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS.
SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.

....................................................................................................................................................................................................................................
1646 SM
8-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-3: Modify BITS-OUT0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Save that is used to send the related command to the Network Element.
Automatically the Modify BITS OUT page is loaded to show updated data.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-4: Modify BITS-OUT1


When to use

Use this procedure to edit to search and edit bit out related to a given shelf
Procedure
...................................................................................................................................................................................................

Select Synchronization Bits Modify BITS OUT1. The following panel appears.
Figure 8-7 Modify BITS OUT1 Select shelf panel

...................................................................................................................................................................................................

Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

Click Continue to continue with the operation.


...................................................................................................................................................................................................

The following screen appears.


Figure 8-8 Modify BITS OUT1 panel

....................................................................................................................................................................................................................................
1646 SM
8-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-4: Modify BITS-OUT1

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify BITS panel contains the following fields:

Access Identifier - Specifies the access identifier for the selected BITS

Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-SSM

SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
Transmitted ESF - Specifies if the output signal is the DUS message or is the actual
SSM value. The values are DUS and ACT. The default value is the previous existing
value. If the existing value is empty. The default existing value is DUS.
Enable Output - Specifies the output mode to which the facility is set. The values are
Y and N. The default value is N.
AIS Mode - Specifies which signal is inserted for the timing output port if the output
signal is squelched. The values are AISMODE and QLMODE. The default values is
the previous value. If the existing value is empty, the default factory value is
QLMODE.
Outgoing Signal Quality - Specifies the quality value level for the out-going signal at
the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS.
SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.

...................................................................................................................................................................................................

Click Save that is used to send the related command to the Network Element.
Automatically the Modify BITS OUT page is loaded to show updated data.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-5: Administer system timing BITS


When to use

Use this procedure to retrieve, edit, remove, and restore Building Integrated Timing
Source (BITS) timing and to switch system clock synchronization from one reference to
the other.
General

Time Division Multiplexing (TDM) ports provides external synchronization from a


network timing source to the system. Under normal conditions, all terminating and
outgoing STMns have identical average frequency derived from the network timing
source.

....................................................................................................................................................................................................................................
1646 SM
8-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

The Network Element (NE) utilizes external Building Integrated Timing Supply (BITS)
timing to synchronize the system. BITS timing signal enters the system either directly via
the backplane (Rear Access Shelf) or via dedicated front plane integral, a panel just below
the fan.
The following clock modes are supported:

Locked mode (normal mode) - Steady state, the SETG generated clock signal is
controlled by the selected external timing reference determined by the T0 selection
process
Holdover mode - Steady state. The operating condition of a clock that has lost its
references and is using data previously acquired (when it was operating in the normal
mode) to control its output signal.
Free-running mode - Temporary operating mode. The operating condition when the
output signal is totally internally controlled with no influence of a present or previous
reference.

Procedure
...................................................................................................................................................................................................

Select Synchronization Synchronization Search. The following panel appears.


Figure 8-9 Synchronization panel

...................................................................................................................................................................................................

Select the access identifier from the Access Identifier drop-down list.
The values are:

ALL
SYNC
EXTREF
LINEREFSYS

....................................................................................................................................................................................................................................
1646 SM
8-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Search to retrieve the synchronization timing BITS.


Figure 8-10 Retrieve synchronization timing entity

...................................................................................................................................................................................................

The Retrieve Synchronization displays the following SHELF timing entities:

System timing entity


Reference timing entity

...................................................................................................................................................................................................

Click the radio button under Select column to set the access identifier.

....................................................................................................................................................................................................................................
1646 SM
8-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Modify hyperlink to edit the system timing entity parameters as shown in the
following figure.
Figure 8-11 Modify Synchronization panel

...................................................................................................................................................................................................

The Access Identifier displays the system timing entity selected.


...................................................................................................................................................................................................

Set the Sync Messaging to either Y or N. Click Default to choose the default setting.
...................................................................................................................................................................................................

Click View to view the alarm profile for the selected timing entity from the Alarms panel.
...................................................................................................................................................................................................

10

Click Save to set the synchronization settings for the system timing entity and return to
the Synchronization window.
...................................................................................................................................................................................................

11

Click Operate or Release hyperlinks to perform the operate and release functions on
either system timing or references timing entities.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Operate
...................................................................................................................................................................................................

Select Synchronization Synchronization Operate. The following panel appears.


Figure 8-12 Operate - Modify synchronization switch

...................................................................................................................................................................................................

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
panel that contains the following parameters:
Parameter
Switch Command

Description
Specifies the switch command that is requested by the
user.
The values are:

Shelf Access Identifier

LOCKOUT

FRCD

MAN

INT

This is used to change the content of Switch To


Reference parameter according to the selected shelf
access identifier

....................................................................................................................................................................................................................................
1646 SM
8-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Parameter
Switch To Reference

Description
Specifies the access identifier of the synchronization
facility
The values are:

EXTREF-110

EXTREF-111

LINEREFSYS-110

LINEREFSYS-111

SYNC-110

...................................................................................................................................................................................................

Click Operate to send the command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

Release
...................................................................................................................................................................................................

Select Synchronization Synchronization Release. The following panel appears.


Figure 8-13 Release - Modify synchronization switch

...................................................................................................................................................................................................

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
panel that contains the following parameters:

Switch Command - Specifies the switch command that is requested by the user. The

values are CLOCKSWITCH and REFSWITCH


Shelf Access Identifier - This is used to change the content of Switch To Reference
parameter according to the selected shelf access identifier

Access Identifier

....................................................................................................................................................................................................................................
1646 SM
8-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

The values are:


SYNC

EXTREF
LINEREFSYS
Parameter

Switch Command

Description
Specifies the switch command that is requested by the
user.
The values are:

CLOCKSWITCH

REFSWITCH

Shelf Access Identifier

This is used to change the content of Switch To


Reference parameter according to the selected shelf
access identifier

Switch To Reference

Specifies the access identifier of the synchronization


facility
The values are:

EXTREF-110

EXTREF-111

LINEREFSYS-110

LINEREFSYS-111

SYNC-110

...................................................................................................................................................................................................

Click Release to send the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Retrieve Synchronization Message


...................................................................................................................................................................................................

Select Synchronization Synchronization Sync. message. The following panel


appears.
Figure 8-14 Retrieve Synchronization Message panel

...................................................................................................................................................................................................

The Synchronization Message tab displays the Retrieve Synchronization Message


panel that displays the following parameters:

Shelf Access Identifier - This is used to change the access identifier according to the

selected shelf identifier


Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

The Search link sends the TL1 command to the agent and results are displayed in the
following Synchronization Message Search page.
Figure 8-15 Search synchronization message results

....................................................................................................................................................................................................................................
1646 SM
8-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Retrieve Synchronization Message table contains the following columns:

Access Identifier - Specifies the timing entity facility

Incoming SSM Message - Specifies the actual quality value for the incoming SSM

derived from corresponding OH byte value of a timing reference.


E...................................................................................................................................................................................................
N D O F S T E P S

Synchronization outgoing
This option contains the following sub-menu options:

Search - To retrieve and edit outgoing synchronization resources related to a given

shelf

Operate - To operate switching outgoing synchronization resources related to a given

shelf

Release - To release switching outgoing synchronization resources related to a given

shelf
Search
...................................................................................................................................................................................................

Select Synchronization Synch. Outgoing Search. The following panel appears.


Figure 8-16 Synchronization Outgoing Search

...................................................................................................................................................................................................

The Synchronization Outgoing tab displays the Synchronization Outgoing panel that
contains the following parameters:

Shelf Access Identifier - This is used to change the content of Access Identifier

parameter according to the selected shelf


Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

Click Search to retrieve the shelf information based on the selection.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Synchronization outgoing

....................................................................................................................................................................................................................................

Operate
...................................................................................................................................................................................................

Select Synchronization Synch. Outgoing Operate. The following panel appears.


Figure 8-17 Modify Synchronization Switch Outgoing Operate

...................................................................................................................................................................................................

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
Outgoing panel that contains the following parameters:

Switch Command - Specifies the switch command that is requested by the user. The

values are LOCKOUT, FRCD, and MAN


Shelf Access Identifier - This is used to change the content of Switch To Reference
parameter according to the selected shelf access identifier
Switch To Reference - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

The Operate link sends the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Synchronization

Synchronization outgoing

....................................................................................................................................................................................................................................

Release
...................................................................................................................................................................................................

Select Synchronization Synch. Outgoing Release. The following panel appears.


Figure 8-18 Modify Synchronization Switch Outgoing Release

...................................................................................................................................................................................................

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
Outgoing panel that contains the following parameters:

Shelf Access Identifier - This is used to change the content of the Access Identifier

parameter according to the selected shelf access identifier


Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

The Release link sends the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
8-18
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security
9

Overview
Purpose

This section is related to security within the Zero Installation Craft (ZIC) terminal. The
functions of configuration and installation are accessible only to the administrator.
Provides an overview of the Security menu and features.
Contents
Procedure 9-1: Change user password

9-2

Procedure 9-2: Retrieve user information

9-3

Procedure 9-3: Create user account

9-3

Procedure 9-4: Change user account

9-5

Procedure 9-5: Modify account default settings

9-8

Procedure 9-6: View current sessions

9-9

Procedure 9-7: Modify command privileges

9-10

Procedure 9-8: Manage audit

9-12

Procedure 9-9: Log settings

9-14

Procedure 9-10: Modify in progress message settings

9-16

...................................................................................................................................................................................................................................
1646 SM
9-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-1: Change user password

....................................................................................................................................................................................................................................

Procedure 9-1: Change user password


When to use

Use this procedure to change or configure the password used when logging into a
Network Element (NE).
Procedure
...................................................................................................................................................................................................

Select Security User Account Change Password option from the menu bar.
Figure 9-1 Change user password

...................................................................................................................................................................................................

The User Identifier and Old Password ID entry boxes display the user name and
password with which the user has logged in.
...................................................................................................................................................................................................

Enter the new password in the New Password ID entry box. Enter the same password in
Confirm New Password ID entry box.
...................................................................................................................................................................................................

Click Save to set the newly entered password.


...................................................................................................................................................................................................

The system generates an error message if the newly entered password is violating the
password naming convention. Go to Step 3 to re-enter the correct string.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
9-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-2: Retrieve user information

....................................................................................................................................................................................................................................

Procedure 9-2: Retrieve user information


When to use

Use this procedure to retrieve user information.


Procedure
...................................................................................................................................................................................................

Select Security User Account Information.


...................................................................................................................................................................................................

The following screen appears.


Figure 9-2 User information

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-3: Create user account


When to use

Use this procedure to create a user account.

....................................................................................................................................................................................................................................
1646 SM
9-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-3: Create user account

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Security Administration Accounts Create Account.


Figure 9-3 Create user account

...................................................................................................................................................................................................

This panel lists the parameters described in the following table:


Table 9-1

Create user account panel parameters

Parameter

Description

User Identifier

Allows to enter the user id

Password Identifier

Allows to enter the user password

Confirm Password
Identifier

Allows the re-enter the user password to confirm

Password Duration
[day]

Allows to enter the validity of the password. Default is 30 days.

Warning on
Password Duration
[day]

Allows to enter the warning period of the password. Default is 7 days.

Access after
Password Duration

Default is 3 days.

Password
Obsolescence
Interval [day]

Default is 180 days.

User ID Duration
[day]

Default is 60 days.

....................................................................................................................................................................................................................................
1646 SM
9-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-3: Create user account

....................................................................................................................................................................................................................................

Table 9-1

Create user account panel parameters

(continued)

Parameter

Description

Available User
Access Privileges

This table lists the Available User Access Privileges.

User Access
Privileges

This table lists the current User Access Privileges

SNMPv3 Privacy
Protocol

Default is NOPRIV.

SNMPv3
Authorization
Protocol

Default is NOAUTH.

...................................................................................................................................................................................................

Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-4: Change user account


When to use

Use this procedure to change user account details.


Procedure
...................................................................................................................................................................................................

Select Security Administration Accounts Change Account.

....................................................................................................................................................................................................................................
1646 SM
9-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-4: Change user account

....................................................................................................................................................................................................................................

The following screen is displayed.


Figure 9-4 Change User information

....................................................................................................................................................................................................................................
1646 SM
9-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-4: Change user account

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The panel displays the following parameters.


Table 9-2

Change User information window

Parameter

Description

ACTION

This allows to take the following actions:

Modify Account

Inhibit User

Allow User

Delete Account

User Identifier

Specifies a unique user ID

User Access
Privileges

Specifies the User access privileges granted to the user.


Values are:

Read-only (READ)

Provision (PROV)

Configure (CONF)

Network Administrator (NETADMIN)

Security Administrator (SEC)

Test (DEBUG)

No link timeout (NOTMOUT)

User State

This shows the new user's login password. The values that can be
displayed are Active and Suspended

Password Duration
[day]

Specifies the number of days of validity for the password.

Warning on
Password Duration
[day]

This shows the number of days after the expiration date, that is allowed
for the user to change the password.

Access after
Password Duration

This shows the number of times that a user can log in after Password
expiration.

0 (zero) means that Password aging is disabled

0 (zero) means that grace period after password expiration is disabled.

0 (zero) means that the grace extra log-in after password expiration is
disabled.
Password
Obsolescence
Interval [day]

This shows the minimum time interval that is required if the User wishes
to use a password that was already used.

Password Expiration
date and time

Specifies the expiry date and time for the password.

User ID Duration
[day]

This shows the aging or expiry interval of a particular User Id.

0 (zero) means that reuse of old passwords is disabled.

0 (zero) means that User ID aging is disabled.

....................................................................................................................................................................................................................................
1646 SM
9-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-4: Change user account

....................................................................................................................................................................................................................................

Table 9-2

Change User information window

(continued)

Parameter

Description

Login Fails Number

Specifies the number of unsuccessful authentication (login) attempts


since the last authenticated session.

Last Login
TimeStamp

This shows the last recorded Login time of a user.

Keep Alive Message


Interval [min]

This shows the time interval, in minutes, after which the NE shall send a
KEEP ALIVE MESSAGE on a TCP connection inactivity. The value
range is 0 - 240. 0 (zero) means that KEEP ALIVE MESSAGE sending
is disabled.

Minimum Interval
between invalid
attempts [sec]

This shows the minimum interval, in seconds, between invalid login


attempts before an NE shall logout a user and lockout the user channel.
The value range is 0 - 60. 0 (zero) means no minimum interval between
consecutive invalid login attempts.

Maximum Invalid
Attempts

This shows the maximum number of invalid login attempts before an NE


shall logout a user and lockout the user channel. The value range is 0 15. 0 (zero) means that no limit to the invalid login attempts.

User Session
Inactivity Timeout
[min]

This shows User Session Activity Link TimeOut, specifies the amount of
time (in minutes) that the User Session link is inactive with regards to
user TL1 input before a user session link time-out occurs.
0 (zero) means that no user session link timeout will occur (disabled).

SNMPv3 Privacy
Protocol

This parameter allows enabling/disabling of the configuration of the


SNMPv3 privacy protocol. NOPRIV means that privacy is disabled for
this user.

SNMPv3
Authorization
Protocol

This parameter allows enabling/disabling of the configuration of the


SNMPv3 authorization protocol. NOAUTH means that authorization is
disabled for this user.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-5: Modify account default settings


When to use

Use this procedure to modify account default settings.


Procedure
...................................................................................................................................................................................................

Select Security Administration Accounts Default settings.

....................................................................................................................................................................................................................................
1646 SM
9-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-5: Modify account default settings

....................................................................................................................................................................................................................................

The following screen is displayed.


Figure 9-5 Modify account default settings panel

...................................................................................................................................................................................................

See Table 9-2, Change User information window (p. 9-7) for parameter description.
...................................................................................................................................................................................................

Click Default hyperlink next to each parameter to enter the default settings.
...................................................................................................................................................................................................

Click Save to save the settings entered on the page.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-6: View current sessions


When to use

Use this procedure to view current sessions.


...................................................................................................................................................................................................

Select Security Administration Current Sessions.


Figure 9-6 Current sessions

....................................................................................................................................................................................................................................
1646 SM
9-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-6: View current sessions

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

This panel lists the parameters described in the following table.


Table 9-3

Current sessions

Parameters

Description

Action

Contains the Log Off User hyperlink which allows to close the session

User Identifier

Specifies a unique user ID (e.g. ALCATEL)

Session

Specifies by a unique identifier allocated to a client connection that


distinguishes that connection from other connections in the system

Address

Specifies the address where the user is connecting from. It is the port/IP
address that is being used for access. If a non IP port is used to connect
to the NE, the values DCC, LAN, USB, RS232 are used

Last login timestamp

Specifies by a quoted string the last recorded Login time of a user. This
time is displayed every time a user logs in

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-7: Modify command privileges


When to use

Use this procedure to modify command privileges.

....................................................................................................................................................................................................................................
1646 SM
9-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-7: Modify command privileges

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Security Administration Command Privileges.


Figure 9-7 Command Access Privileges page

....................................................................................................................................................................................................................................
1646 SM
9-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-7: Modify command privileges

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The page the command security privileges assigned to the specified TL1 command.
The columns of the table are:

Action - Contains the hyperlinks in order to modify the security privilege. The

manager actions related to these hyperlinks are:


The Modify hyperlink activates the following Modify Command Access
Privileges page.
Figure 9-8 Modify Command Access Privileges panel

Command Identifier - Specifies the TL1 command code. The value for the parameter

can be any one of the TL1 command codes, in upper or lower case.
Command Access Privilege - Allows to choose the User access privileges granted to
the user.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-8: Manage audit


When to use

Use this procedure to activate the Audit Security Log page and retrieve audit log.

....................................................................................................................................................................................................................................
1646 SM
9-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-8: Manage audit

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Security Administration Audit.


Figure 9-9 Retrieve audit log

...................................................................................................................................................................................................

The Audit Log tab contains the Retrieve Audit Log panel with the following parameters:

From - Specifies the beginning date and time used to filter the response messages. By

means the combo-boxes it is possible to change data and time.


To - Specifies the beginning date and time used to filter the response messages. By
means the combo-boxes it is possible to change data and time.
Set User Identifier - The combo-box allows to select the user identifier.

....................................................................................................................................................................................................................................
1646 SM
9-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-8: Manage audit

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Retrieve hyperlink send the command to the agent, then the Retrieve Audit Log
page is reloaded and the table with Security log is displayed
Figure 9-10 Retrieve audit page with results

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-9: Log settings


When to use

Use this procedure to manage the log sessions.

....................................................................................................................................................................................................................................
1646 SM
9-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-9: Log settings

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Security Administration Log Settings.


Figure 9-11 Modify log attributes

...................................................................................................................................................................................................

The Modify Log Attributes page is made up of description of the TL1 command and the
Modify Log Attributes panel that contains:

Current Log File Max Size [Mbyte] - Specifies the size, in 1 Megabyte blocks, of the

Security Log File system's disk buffer.


New Log File Max Size [Mbyte] - Allows to change the size, in 1 Megabyte blocks,
of the Security Log File system's disk buffer. When the SECULOG has reached its
max size, the SECULOG wraps reducing its size to the 70% of its max size discarding
the oldest events (30%). The Default hyperlink allows to set the relevant value
automatically.
Current Warning Message - This is the provisioned user-logon warning message is
shown
New Warning Message - Allows to provision a new user-logon warning message. The
Default hyperlink allows to set the relevant warning message automatically. The Set
Empty hyperlink allows to deplete the entry field.
Current Log Events - Specifies the current log event.

....................................................................................................................................................................................................................................
1646 SM
9-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-9: Log settings

....................................................................................................................................................................................................................................

Available Log Events - Specifies the list of events that, upon their occurrence, are

included in the security log (i.e., events that are specified for logging, if they occur).
The values are:
Authentication Event (EIUA) - It logins, logoffs, invalid user authentication
attempts and the alarms/alerts generated due to the invalid authentication attempts
Changes to the User's Security Accounts (EUSP) - Specifies the details of the
changes made in a user's security profiles and attributes
Changes to the NE/NS Security Configuration (ESCC) - Specifies the details of
changes made in the NE/NS security configuration
Changes to NE/NS resources (ECMR) - Specifies the creation and modification of
NE/NS resources performed via standard operations and maintenance procedures.
This does not address creations and modifications carried offline. Commands
creating log events of this type are all the commands not mentioned in the lists
above, having Y in the security field of the command security table
All Events (ALL) - All events
New Log Events - This shows the log events for the command. The entry box has the
Default hyperlink in order to set the User access privileges forecast for the account.

They can be copied or removed from one of the entry box using the left or right arrow
buttons available between the two entry boxes.
...................................................................................................................................................................................................

Click Save hyperlink to send the command to the agent; the main page is reloaded.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-10: Modify in progress message settings


When to use

Use this procedure to modify in progress message settings.

....................................................................................................................................................................................................................................
1646 SM
9-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Security Administration IP Message Settings.


Figure 9-12 Modify in progress message settings panel

...................................................................................................................................................................................................

The Modify In Progress Message Settings panel is displayed that contains the following
parameters:

IP Message Interval Time [sec] - Allows to enter IP Message Interval Time in

seconds.

IP Message Interval Time - Specifies the IP Message Interval Time.

...................................................................................................................................................................................................

Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
9-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Security

Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
9-18
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

10

10
Provisioning:
Detailed
level Procedures

Overview
Purpose

Provides an overview of the detailed level procedures documented in this chapter.


Contents
Procedure 10-1: Log into the system

10-2

Procedure 10-2: Log out of the system

10-3

Procedure 10-3: Retrieve software version

10-4

Procedure 10-4: In-Service Upgrade

10-6

Procedure 10-5: Initialize and Upgrade with a new release

10-7

Procedure 10-6: DB management remote file copy

10-7

Procedure 10-7: DB management cancel remote file copy

10-10

Procedure 10-8: Network Element management

10-11

Procedure 10-9: LAC Management

10-12

Procedure 10-10: MAC File Collection

10-14

Procedure 10-11: Administer NTP

10-15

Procedure 10-12: Network IF

10-18

Procedure 10-13: OSI ULC Report

10-20

Procedure 10-14: Create Overhead XC

10-21

Procedure 10-15: Create linear MSP

10-23

Procedure 10-16: Create MS-SPRing

10-25

Procedure 10-17: Create Provider Bridge Service

10-27

Procedure 10-18: LAG management

10-29

Procedure 10-19: IGMP Snooping

10-34

Procedure 10-20: Remove LAG member

10-34

Procedure 10-21: Retrieve system information

10-39

...................................................................................................................................................................................................................................
1646 SM
10-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Overview

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route

10-40

Procedure 10-23: Create IP tunnel

10-42

Procedure 10-24: NE TL1 Parameter

10-44

Procedure 10-25: TL1 console

10-44

Procedure 10-26: Create FTP Server Configuration

10-48

Procedure 10-1: Log into the system


When to use

Use this procedure to log into the Zero Installation Craft (ZIC) terminal.
Procedure
...................................................................................................................................................................................................

See Procedure 2-1: Establish ZIC session (p. 2-3) for the initial steps to launch the ZIC
session.
...................................................................................................................................................................................................

Enter the User Identifier and Password in the respective entry boxes, set the Language
from the drop-down list box. The default is English.
The default User is ALCATEL and password is Alcatel_1.
...................................................................................................................................................................................................

Enable the Local Time check box for the network element to display the local time.

....................................................................................................................................................................................................................................
1646 SM
10-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-1: Log into the system

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Login to log into the system, the browser starts loading the ZIC.
Figure 10-1 ZIC loading

Note: After the maximum number of attempts the user is disabled. Check parameters
for spelling and case-sensitive characters.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-2: Log out of the system


When to use

Use this procedure to log out from the ZIC application.


Procedure
...................................................................................................................................................................................................

To log out from the Zero Installation Craft (ZIC) terminal, click the Logout hyperlink
displayed in the top right corner of the ZIC application.
OR
Select Security Logout.

....................................................................................................................................................................................................................................
1646 SM
10-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-2: Log out of the system

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following window appears.


Figure 10-2 Logout message screen

...................................................................................................................................................................................................

Click Yes to log out of ZIC terminal.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-3: Retrieve software version


When to use

Use this procedure to obtain information about the software version.


Procedure
...................................................................................................................................................................................................

From the menu bar, select Help About option.

....................................................................................................................................................................................................................................
1646 SM
10-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-3: Retrieve software version

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following window message is displayed.


Figure 10-3 About window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-4: In-Service Upgrade

....................................................................................................................................................................................................................................

Procedure 10-4: In-Service Upgrade


When to use

Use this procedure for a software refresh.


...................................................................................................................................................................................................

Select System Management -> Initialize and Upgrade -> In-Service Upgrade ->
Upgrade Status menu as shown in Figure 10-4, In-Service Upgrade Status (p. 10-6)
Figure 10-4 In-Service Upgrade Status

...................................................................................................................................................................................................

The In-Service Upgrade Status tab displays status of the in-service upgrade.
The status are:

Download In Progress (DLIP) - Indicates that a COPY-RFILE command for software

package transfer is ongoing.

Initialize New In Progress (INITNIP) - Indicates the INIT-SYS-NEW system

initialization process is in progress.


No Status In Progress (NOSTAIP) - Indicates that no generic in-service upgrade
procedure is in progress or has been attempted.
Status Completed (STAC) - Indicates that the STA-ISU command completed
successfully and is awaiting the issuance of the INIT-SYS-NEW command.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-5: Initialize and Upgrade with a new release

....................................................................................................................................................................................................................................

Procedure 10-5: Initialize and Upgrade with a new release


When to use

This option starts the background activity on the NE to perform the actual switch over
from the current release to the new release. This option returns a completion message to
the user when the background activity is successfully started.
A copy of the primary database is generated during its execution and used for database
conversion in the upgrade processing. This backup is also used to revert to the old release
database when the Initialize System With Old Release option is issued after the system is
upgraded to the new release.
Procedure
...................................................................................................................................................................................................

Select System Management Initialize and Upgrade Initialize System With


New Release.
...................................................................................................................................................................................................

The panel contains the Apply hyperlink that is used to start the new release downloading
procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-6: DB management remote file copy


When to use

Use this procedure to perform remote file copy.

....................................................................................................................................................................................................................................
1646 SM
10-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select System Management DB Management Remote File Perform Copy.


Figure 10-5 Copy remote file panel

....................................................................................................................................................................................................................................
1646 SM
10-8
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

This panel lists the parameters described in the following table.


Table 10-1

Copy remote file panel parameters

Parameters

Description

From

Determines the location from which the DB remote file is to be copied.


The supported values are:

To

Database backup on a Remote File Server (RFSDB) - Represents a


database on a Remote File Server. Multiple instances of RFSDB can
exist in different locations on an RFS. A specific instance is always
addressed with this AID, with the addition of information in the
LOCATION parameter in the command.

Software Generic on a Remote File Server (RFSSW) - Represents a


software generic on a Remote File Server. Multiple instances of
RFSSW can exist in different locations on an RFS. A specific
instance is always addressed with this AID, with the addition of
information in the LOCATION parameter in the command.

Local NE PM Global File collection (LOCPMGLB) - Represents the


PM Global File Collection in the local NE. There is a maximum of
one instance of LOCPMGLB in the NE.

LOCMACGLB (LOCMACGLB) - Represents the MAC File


Collection in the local NE. There is a maximum of one instance of
LOCMACGLB in the NE.

System's primary backup database (ACTDSKDB) - Represents the


active database in the local NE .

Determines the location to which the DB remote file is to be copied.


The supported values are:

Database Backup on a Remote File Server (RFSDB)

Remote File Server PM Global File Collection (RFSPMGLB) Represents the PM Global File Collection on a Remote File Server.
Multiple instances of RFSPMGLB can exist in different locations on
an RFS.A specific instance is always addressed with this AID, with
the addition of information in the LOCATION parameter in the
command.

Remote File Server MAC File Collection (RFSMACGLB) Represents the MAC File Collection on a Remote File Server.
Multiple instances of RFSMACGLB can exist in different locations
on an RFS. A specific instance is always addressed with this AID,
with the addition of information in the LOCATION parameter in the
command.

System's primary backup database (ACTDSKDB)

Active software generic on the NE (ACTSW)

User

The user identifier used for the ftp connection on the RFS.

Password

The user password used for the ftp connection on the RFS

Host

The IP address of the host (the Remote File Server)

....................................................................................................................................................................................................................................
1646 SM
10-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................

Table 10-1

Copy remote file panel parameters

(continued)

Parameters

Description

Port

The port number to connect to. Most schemes designate protocols that
have a default port number.

URL Path

The details of how the specified resource (i.e. the directory where the
file(s) reside) can be accessed.

...................................................................................................................................................................................................

Click Apply to apply the configuration settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-7: DB management cancel remote file copy


When to use

Use this procedure to cancel the copy of remote file.


Procedure
...................................................................................................................................................................................................

Select System Management DB Management Remote File Cancel Copy.


Figure 10-6 Cancel Copy of Remote File panel

....................................................................................................................................................................................................................................
1646 SM
10-10
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-7: DB management cancel remote file copy

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Remote file tab displays the Cancel Copy of Remote File panel that contains the
following parameters.
Table 10-2

Cancel Copy of Remote File panel parameters

Parameters

Description

From

Determines the location from which the DB remote file copy is to be


cancelled.
The supported values are:

To

Database backup on a Remote File Server (RFSDB)

Software Generic on a Remote File Server (RFSSW)

Local NE PM Global File collection (LOCPMGLB)

LOCMACGLB (LOCMACGLB)

System's primary backup database (ACTDSKDB)

Determines the location to which the DB remote file copy is to be


cancelled.
The supported values are:

Database Backup on a Remote File Server (RFSDB)

Remote File Server PM Global File Collection (RFSPMGLB)

Remote File Server MAC File Collection (RFSMACGLB)

System's primary backup database (ACTDSKDB)

Active software generic on the NE (ACTSW)

...................................................................................................................................................................................................

Click Apply to apply the configuration settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-8: Network Element management


When to use

Use this procedure to retrieve general system level configuration information consisting
of:

system type
software release identifier
software release date

matrix size
system restart status

....................................................................................................................................................................................................................................
1646 SM
10-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-8: Network Element management

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select System Management DB Management Network Element.


Figure 10-7 System configuration

...................................................................................................................................................................................................

The System Configuration tab displays the following general system level configuration
information.

Access Identifier
Matrix Size

Node Type
Provision Mode
Region
Release Date
Release Identification

System Restart Process Status


System Type
USER LABEL

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-9: LAC Management


When to use

Local Access Control (LAC) is used to manage the ZIC.


This option displays the current and default status of the DB management.

....................................................................................................................................................................................................................................
1646 SM
10-12
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-9: LAC Management

....................................................................................................................................................................................................................................

LAC state management


...................................................................................................................................................................................................

Select System Management DB Management Lac State.


Figure 10-8 LAC State Management panel

...................................................................................................................................................................................................

The LAC state tab displays the Lac State Management panel that contains the following
parameters.
Table 10-3

Lac state panel parameters

Parameters

Description

LAC current state

Specifies the current LAC state. The default value is Granted.

LAC state

Specifies the LAC state. The values are Requested or Denied.

Requested - Indicates that the local CRAFT is waiting to get access


the NE to send provisioning data.

Denied - Indicates that the local CRAFT is denied to access the NE


to send provisioning data.

...................................................................................................................................................................................................

Click Save hyperlink to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

LAC default management


...................................................................................................................................................................................................

Select System Management DB Management Lac Default.

....................................................................................................................................................................................................................................
1646 SM
10-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-9: LAC Management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Save hyperlink to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-10: MAC File Collection


When to use

The mechanism of MAC File Collection is an efficient way of collecting MAC addresses
of the entire NE in a single file.
The collection of MAC data will be done on the basis of the input filtering, where the
input filters consists of MAC address, slot AIDs and FDB IDs. The MAC File Collection
then generated will contain one line (record) for every retrieved MAC address in the NE
according to the input filtering.
Procedure
...................................................................................................................................................................................................

Select System Management MAC File Collection.


Figure 10-9 MAC File Collection

....................................................................................................................................................................................................................................
1646 SM
10-14
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-10: MAC File Collection

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The MAC File Collection tab displays the following panels.

MAC File Collection Status

MAC File Collection

...................................................................................................................................................................................................

The MAC File Collection Status panel displays the Collection State and contains the
following hyperlinks:

Refresh
File View

...................................................................................................................................................................................................

The MAC File Collection panel displays the following parameters.


Table 10-4

MAC File Collection panel parameters

Parameters

Description

MAC Address

Allows to enter the MAC Address

Board

Allows to select the board

VLAN

Specifies the input filtering VLAN for the collection preparation.

MAC Learning Type

Specifies the type of MAC learning. Dynamically Learned MAC and


Static MAC

...................................................................................................................................................................................................

Click Set Empty to make the entries empty.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-11: Administer NTP


When to use

This procedure provides the instructions to retrieve the Network Time Protocol (NTP)
server IP address, provision NTP servers, and delete NTP servers. It also provides
instructions to enable and disable the NTP synchronization.
NTP servers are used for time-of-day synchronization when the NTP protocol is enabled.
If no NTP server is entered and the NTP protocol is enabled, the time-of-day clock
synchronizes with the last known internal clock frequency.
When NTP is enabled, the NE internal time-of-day clock uses the calculated Coordinated
Universal Time (UTC) from the selected NTP server, which is modified by the
user-provisioned offset. All messages, event reports, logs, and events that carry time
stamps use the following time of day: NTP UTC time + provisioned offset.
....................................................................................................................................................................................................................................
1646 SM
10-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select System Management Network Time Protocol option from the menu bar.
Figure 10-10 NTP Config - with Disabled Server Synchronization

The NTP config tab contains the Time and Date and Network Time Protocol panels.
...................................................................................................................................................................................................

The Time and Date panel allows to manually set the system date and time by means of
six combo-boxes Year, Month, Day, Hour, Minute and Sec. This command is not allowed
if NTP is enabled as shown in Figure 10-11, NTP Config - with Enabled Server
Synchronization (p. 10-17).
...................................................................................................................................................................................................

Click Save to save the settings and Refresh to refresh the page.

....................................................................................................................................................................................................................................
1646 SM
10-16
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Network Time Protocol panel shows the following information.

Current NTP Server Synchronization - The time synchronization from the NTP

server; The value are Enabled or Disabled. Factory default is Disabled


Current Offset - The time offset to apply to NTP server UTC time, +/- HH-MM, for
all events and time stamps reported by this NE. Factory default is +08-00
Current Operating Mode - The current operating mode of the NTP service. The
values are: NTPSYNC - NTP is enabled, and the NE is using the NTP protocol to
synchronize to an NTP server.
NTP Server Synchronization
New Offset

Figure 10-11 NTP Config - with Enabled Server Synchronization

....................................................................................................................................................................................................................................
1646 SM
10-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create hyperlink and the following window appears.


Figure 10-12 NTP Server Address Provision

The NTP Server Address Provision window contains:


Server IP Address - Four entry boxes whose allow to digit the IP address of an NTP
server. the address in the [0-126,128-223]-[0-255]-[0-255]-[0-255] format.
The window has the following hyperlinks:

Cancel allows to leave the page without applying the previously selections.

Save allows to apply the previously selections.

...................................................................................................................................................................................................

Click Delete hyperlink to delete the selected IP address.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-12: Network IF


When to use

Use this procedure to modify the various network interface parameters on a specified
DCC channel on an optical port for data communication purposes. The network interface
must be first provisioned on the line or section DCC of the specific STMn facility. The
DCC is identified as STMn and the DCCCHNL parameter.

....................................................................................................................................................................................................................................
1646 SM
10-18
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-12: Network IF

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Communication DCC Network IF option from the menu bar.


Figure 10-13 DCC Channel

...................................................................................................................................................................................................

Click the radio button to select the previously created DCC Channel entries from the
table.
Table 10-5

NE interface details parameters

Parameters

Description

Access Identifier

Specifies the Access Identifier of a resource for the selected port

DCC Channel

Specifies the reference of DCC Channel.


The values are:

Layer 2

OSI Protocol

LINE

SECTION

The values are:

USER

NETWORK

Specifies if the OSI protocol runs on the addressed DCC or not.


The values are:

ENABLE

DISABLE

....................................................................................................................................................................................................................................
1646 SM
10-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-12: Network IF

....................................................................................................................................................................................................................................

Table 10-5

NE interface details parameters

(continued)

Parameters

Description

OSI Area

Specifies which OSI Area the addressed DCC belongs to. The default
value is 1

...................................................................................................................................................................................................

Click Save to store all the settings and click Create to configure a new DCC Channel as
shown in the following figure.
Figure 10-14 DCC channel - filter by

...................................................................................................................................................................................................

Select the AID type from the combo-box to filter DCC Channel that the user wants to
configure.
...................................................................................................................................................................................................

Click Search to filter the DCC Channel.


...................................................................................................................................................................................................

The available resources are displayed, else No configurable resources found message is
displayed.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-13: OSI ULC Report


When to use

Allows to modify OSI upper layers stack parameters that are common to all the stack
interfaces of the NE.

....................................................................................................................................................................................................................................
1646 SM
10-20
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-13: OSI ULC Report

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Communication DCC OSI USL Report option from the menu bar.
Figure 10-15 OSI Routing Configuration

...................................................................................................................................................................................................

The OSI Routing Configuration tab displays the OSI upper layers common parameters
panel that contains the following parameters:
Layer 3 IS Level: This is the IS level provisioning. Check for the option from the drop
down list.
The Values are:

1 - It is a Level 1 IS
2 - It is a Level 2 IS

...................................................................................................................................................................................................

Click Save to close the page and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-14: Create Overhead XC


When to use

Use this procedure to create overhead channel cross-connection.

....................................................................................................................................................................................................................................
1646 SM
10-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-14: Create Overhead XC

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select Communication DCC XC Overhead from the menu bar.


Figure 10-16 Overhead channel cross-connection

...................................................................................................................................................................................................

Click Create to configure a new Overhead Channel Cross-Connection. The following


screen is displayed.
Figure 10-17 Overhead channel cross-connection - enter channel

...................................................................................................................................................................................................

The Enter Channel panel contains the following parameters.

DCC Channel - Specifies the reference of the DCC Channel.

The values are:


LINE

SECTION

From - Specifies the source for the cross-connection

To - Specifies the destination for the cross-connection

....................................................................................................................................................................................................................................
1646 SM
10-22
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-14: Create Overhead XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Select to choose source and the destination to configure a cross-connection.


...................................................................................................................................................................................................

Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-15: Create linear MSP


When to use

Use this procedure to create a new Linear MSP.


Procedure
...................................................................................................................................................................................................

Select Protection Linear MSP from the menu bar.


Figure 10-18 Linear MSP

...................................................................................................................................................................................................

Select the available STMn Signal from the combo-box for which the user wants to
configure a Linear MSP.

....................................................................................................................................................................................................................................
1646 SM
10-23
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-15: Create linear MSP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to configure a new Linear MSP.


Figure 10-19 Linear multiplex section protection provision panel

...................................................................................................................................................................................................

Linear Multiplex Section Protection Provision panel parameters are described in the

following table.
Table 10-6

NE interface details parameters

Parameters

Description

FFP Access
Identifier

Specifies the Access Identifier for Fast Facility Protection

Protection Type

Specifies the type of protection. The default values is Linear

Revertive Mode

The values are Y or N

Revertive Delay
Time (min)

The valid range is from 0-15

Hold Off Time


(msec)

Indicates the Hold off time in milliseconds. The valid range is 010000.

Protected Access
Identifier

Specifies the Access Identifier for the protected resource

Protecting Access
Identifier

Specifies the Access Identifier for the protecting resource

Protection Switching
Direction

Specifies the switching direction. The values are UNI or BI

...................................................................................................................................................................................................

Click Select to choose the Protected Access Identifier and Protecting Access
Identifier.

....................................................................................................................................................................................................................................
1646 SM
10-24
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-15: Create linear MSP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-16: Create MS-SPRing


When to use

Use this procedure to create a new MS-SPRing.


Procedure
...................................................................................................................................................................................................

Select Protection MS-SPRing from the menu bar.


Result: The MS-SPRing panel is displayed.
...................................................................................................................................................................................................

Select the available STMn Signal from the drop-down list for which the user wants to
configure a MS-SP.
...................................................................................................................................................................................................

Click Search to view the provisioned MS-SPRing.


Result: The available list of provisioned MS-SPRings is displayed.
...................................................................................................................................................................................................

Click Create to configure a new MS-SPRing.


Figure 10-20 Multiplex section shared protection provision panel

....................................................................................................................................................................................................................................
1646 SM
10-25
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-16: Create MS-SPRing

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Multiplex Section Shared Protection RingProvision panel parameters are described in

the following table.


Table 10-7

NE interface details parameters

Parameters

Description

FFP Access
Identifier

Specifies the Access Identifier for Fast Facility Protection

Protection Type

Specifies the type of protection. The default values is MSSPRING2F

Revertive Mode

The values are Y or N

Revertive Delay
Time (min)

The valid range is from 0-15

Hold Off Time


(msec)

Indicates the Hold off time in milliseconds. The valid range is 010000.

East Access
Identifier

Specifies the east side for the MS-SPRing is created.


Important:

The East and West Access identifiers should have the same data rates.
West Access
Identifier

Specifies the west side for the MS-SPRing is created.


Important:

The East and West Access identifiers should have the same data rates.
Node Identifier

Indicates the node identifier connected to MS-SPRing. The valid range


is 015.

Node Descriptor

Indicates the MS-SPRing node descriptor. The valid range is 0255


ASCII characters.

...................................................................................................................................................................................................

Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-26
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................

Procedure 10-17: Create Provider Bridge Service


Purpose

Use this procedure to create the Provider Bridge service.


...................................................................................................................................................................................................

Select Provider Bridge -> Ethernet Services XC from the menu bar as shown in Figure
10-21, Provider Bridge Service (p. 10-27).
Figure 10-21 Provider Bridge Service

This panel lists the Range filter parameters:


From XC ID - the minimum value to implement the range visualization.
To XC ID - the maximum value to implement the range visualization.

....................................................................................................................................................................................................................................
1646 SM
10-27
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to configure a new Provider Bridge service as shown in Figure 10-22,
Create Provider Bridge (p. 10-28).
Figure 10-22 Create Provider Bridge

Table 10-8, Provider Bridge Service (p. 10-28) provides the description of Create
Provider Bridge service parameters.
Table 10-8

Provider Bridge Service

Parameters

Description

Topology

Specifies the topology to establish the service.


The values are :

UNI-NNI

NNI-UNI

Ingress

Specifies the input port

S-VID

Specifies the static VLAN. Enter the from and


to range to search a specific VLAN

Service Label

Specifies the name or label for the new service

Traffic Descriptor

Specifies the operation mode

Topology Classifier

Specifies the classifier for the selected


topology

....................................................................................................................................................................................................................................
1646 SM
10-28
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................

Table 10-8

Provider Bridge Service

(continued)

Parameters

Description

Policing mode

Refers to the policing of the incoming ETS


tarffic.
The values are :

disabled

color blind

...................................................................................................................................................................................................

Click Save & continue to save the changes and create a new service.
...................................................................................................................................................................................................

Click Cancel to return to the previous window without saving the changes.
...................................................................................................................................................................................................

Click Save & exit to save the changes and return to the previous window.
...................................................................................................................................................................................................

Click Search. The system retrieves the ethernet cross connection details based on the
search parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-18: LAG management


When to use

The Link Aggregation function is an extension of the MAC layer which allows grouping
of a set of physical Ethernet interfaces into one logical interface with greater capacity and
reliability. The Link Aggregation Group (LAG) is valid only as a link between two
systems (called the Partners). Grouping of more interfaces linking one system with two or
more Partners is not allowed.
Permitted port rates to be aggregated are 1 Gbps and 10 Gbps (10 Mbps and 100 Mbps
are for future release). The max number of ports (LAG-size) to be aggregated is 16; (LAG
stands for Link Aggregation Group). Links may be anytime added or removed to/from the
bundle. Ports to be aggregated can be either located on the same board and also on
different boards.
Its management in the network is based upon the communication, between the aggregate
partner pieces of equipment, of LACP messages (Link Aggregation Control Protocol).
The LACP packets transport information about set-up, aggregation capability, links
failures, automatic reconfiguration after failure, etc.
....................................................................................................................................................................................................................................
1646 SM
10-29
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................

The benefits of Link Aggregation feature are:

Bandwidth limitation overcoming


Load balancing (the traffic is distributed over the constituting links)
Reliability increasing (in case that a link of the aggregate fails, its traffic is
automatically distributed over the other links of the aggregate).

The conditions for Link Aggregation option are the following:

All involved ports must work at the same rate.

All involved ports must have the same configurations, regarding AutoNegotiation and
Flow Control.
All aggregated links must be point-to-point (multicast is not allowed).
All involved interfaces must work in full-duplex modality.

All involved ports must be Local (remote ports are not allowed).
Actor and Partner ports (local and far sides) must be of the same type.

Create LAG

Use this procedure to create LAG.


...................................................................................................................................................................................................

Click LAG Group from the Tree area. The Link Aggregation Mng window is displayed.
Figure 10-23 Link aggregation management

....................................................................................................................................................................................................................................
1646 SM
10-30
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Link Aggregator Creation panel parameters are described in the following table.
Table 10-9

Link aggregation parameters

Parameter

Description

Name

Allows to set the name of the LAG; the only suffix after # can be set by
the user, with an integer in the 1 to 123 range

Admin State

This item can be set only after creation, in Configure Aggregator option.
The values are:

enable: the LAG is in-service

disable: the LAG is out-of-service

User Label

Allows to indicate the LAG by means of a name defined by the user.

Size

Allows to set the size of the LAG, i.e. number of Aggregated Ports;
possible values are integers in the 1 to 16 range.

Actor Admin Key

Allows to indicate the LAG Key, the parameter identifying this LAG;
integer in the 1 to 65535 range.

EthClient Type

Indicates the LAG client layer.


The values are:

ets: for Ethernet Transparent System

etb: for Ethernet Bridge System

Actor System
Priority

Allows to indicate the LAG Priority. This parameter, together with the
LAG Mac-Address, forms the System Identifier. The lowest System
Identifier value is elected as the Master of the link, i.e. the one that will
drive the actions in case of events such as failures, switches, etc. The
valid range is 0 to 65535.

Type

Default value is ieee802.3adLag.

Maximum MRU

Specifies the maximum MRU value.

LACP Enabled

Link Aggregation Control Protocol (LACP).

...................................................................................................................................................................................................

Click Save hyperlink that applies the users operation in this page.
...................................................................................................................................................................................................

Select the LAG# from the LAG table to select any previously created LAG and Select
Configuration to configure the existing LAG.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-31
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................

Configure LAG
...................................................................................................................................................................................................

Click on LAG# from the tree area or select the LAG and select the Configuration
hyperlink.
Figure 10-24 Link aggregator configuration

...................................................................................................................................................................................................

See Table 10-9, Link aggregation parameters (p. 10-31) for Link Aggregator
Configuration panel parameters description.
...................................................................................................................................................................................................

Client Type Management panel contains the EthClient Type parameter that indicates the

LAG client layer.


The default value is ets (Ethernet Transparent System).

....................................................................................................................................................................................................................................
1646 SM
10-32
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Link Aggregator Configuration panel parameters are described in the following
table.
Table 10-10

Link Aggregator configuration panel parameters

Parameter

Description

Mac Address

A 6-octet MAC address value (NE MAC Address) consisting of the


unique identifier for Partner System.

Partner System Id

A 6-octet System Id value consisting of the unique identifier for Partner


System.

Partner Admin Key

Indicates the current administrative value of the Key for Link


Aggregation Group (in Partner System).

Partner Operator
Key

Indicates the current operational value of the Key for LAG (in Partner
System); in case of Active LAG, Partner Admin key = Partner Oper key.

Partner System
Priority

A 2-octet value (NE System Priority) indicating priority value inside


Partners NE SystemId.

N. Selected Ports

Indicates the number of ports currently selected for aggregation inside


Link Aggregation Group.

N. Attached Ports

Indicates the number of ports currently attached to the same Link


Aggregation Group.

Primary Port

It is the index of the primary port in Link Aggregation Group used to


send BPDUs and flooding frames; Zero indicates no primary port is
available

Primary Port
Position

It is the port index number in the Link Aggregation Group used to send
BPDUs and flooding frames

...................................................................................................................................................................................................

Access Control List (ACL) Management panel contains ACL Index parameter that

indicates the ACL Management type.


The default value is 1.
...................................................................................................................................................................................................

Click Save & Continue to save the settings and configure another LAG.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-33
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-19: IGMP Snooping

....................................................................................................................................................................................................................................

Procedure 10-19: IGMP Snooping


Purpose

Use this procedure to retrieve a VLAN connection.


...................................................................................................................................................................................................

Click on LAG# from the tree area or select the LAG and select the Configuration
hyperlink.
Click on IGMP Snooping the following panel is shown.
Figure 10-25

This panel lists the parameters described below:


From (VLAN) - the minimum value to implement the range of VLAN.
To (VLAN) - the maximum value to implement the range of VLAN.
...................................................................................................................................................................................................

Click Search. The system retrieves the VLAN connection details based on the search
parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-20: Remove LAG member


When to use

Use this procedure to remove LAG member.

....................................................................................................................................................................................................................................
1646 SM
10-34
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

Select the board from the tree area.


Figure 10-26 Two member in one LAG

....................................................................................................................................................................................................................................
1646 SM
10-35
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one VCG and click Configure LAG.


Figure 10-27 Configure LAG selection

....................................................................................................................................................................................................................................
1646 SM
10-36
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following screen appears.


Figure 10-28 Configure LAG

...................................................................................................................................................................................................

Click Select hyperlink to select the Actor Admin key and the following window pops up.
Figure 10-29 Actor Admin key selection window

....................................................................................................................................................................................................................................
1646 SM
10-37
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click 0 Unlink Port. The following screen appears.


Figure 10-30 Configure LAG for 0 Unlink Port

...................................................................................................................................................................................................

Click Save & exit to save all the changes and exit from the window.
Note: If the member is not the first one, the saved settings are fine. If the member
which is removed is the first one, the following window pops up.
Figure 10-31 LAG pop up window

The user needs to change the remove sequence.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-38
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-21: Retrieve system information

....................................................................................................................................................................................................................................

Procedure 10-21: Retrieve system information


When to use

Use this procedure to retrieve general system level and global system configuration
information.
Procedure
...................................................................................................................................................................................................

Select Equipment System Information option from the menu bar. The Zero
Installation Craft (ZIC) terminal displays the system level information.
The System Information panel is displayed.
Figure 10-32 System Information

...................................................................................................................................................................................................

This panel lists the parameters described in the following table.


Table 10-11

System Information panel parameters

Parameter

Description

Node Type

Specifies the type of NE.

Software

Specifies the active or standby state of the software

System Type

Specifies the type of NE.

Release ID

Specifies the release identifier

Release Date

Specifies the date of release

Matrix Size

Specifies the bandwidth supported.

Status

Specifies the download state of the software

Region

Specifies the region of the NE

Provision Mode

Specifies the provisioning mode

User Label

Specifies the user label

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-39
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route


When to use

Use this procedure to configure the IP Routing.


Procedure
...................................................................................................................................................................................................

Select Communication Network Domain IP Routing option from the menu bar.
The following table displays the existing IP route entry along with its attributes.
Figure 10-33 IP Routing Configuration

....................................................................................................................................................................................................................................
1646 SM
10-40
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create hyperlink to configure a new IP route.

...................................................................................................................................................................................................

Parameters of the screen are described in the following table.


Table 10-12

IP routing parameters

Parameter

Description

Access Identifier

Specifies the STMn facility carrying the DCC with the next hop network
interface or identifies the IP Tunnel or Customer LAN. The select
hyperlink allows to open the window shown in following figure for the
selection of the resource. After the selection procedure, the chosen value
will be reported.

Destination Address

This is the IP address of the destination host or network (in the format
nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default
route. If NETMASK is not all '1' (i.e., a network route is specified), the
host portion of the DESTADDR must be all '0'.

....................................................................................................................................................................................................................................
1646 SM
10-41
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................

Table 10-12

IP routing parameters

(continued)

Parameter

Description

Subnet Mask

This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn).
The mask 0-0-0-0 is used to specify a default route.

...................................................................................................................................................................................................

Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the
AID type. The values are DCC, NE IPT, and LAN.
...................................................................................................................................................................................................

Enter the Destination Address and Subnet mask for the IP route to be configured.
...................................................................................................................................................................................................

Click Save & Exit to save the settings and return to the window.
...................................................................................................................................................................................................

Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-23: Create IP tunnel


When to use

Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be
created is specified by its AID.
Procedure
...................................................................................................................................................................................................

Select Communication IP Tunnel option from the menu bar.

....................................................................................................................................................................................................................................
1646 SM
10-42
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-23: Create IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Create to configure the IP Tunnel.


Figure 10-34 IP tunnel - network element

...................................................................................................................................................................................................

Parameters of the screen are described in the following table.


Table 10-13

NE IP tunnel parameters

Parameter

Description

AID

(IP Tunnel Identifier), it is the identifier of the specific IP tunnel to


create. Allowable values are in the 1 - 128 range

REMOTE NSAP

(TL1 SID of the IP Tunnel target NE.) The Target NE must be reachable
via OSI over DCC and the NSAP address corresponding to this TID
must be able to be retrievable from the TARP cache. The values are:
<1-20 VALID TID CHARACTERS> or <1-20 VALID TID
CHARACTERS>. If the value contains non-alphanumeric characters, it
has to be enclosed in double quotes

Encapsulation Type

Specifies the encapsulation type for the NE. The values are: ALU or
GRE.

...................................................................................................................................................................................................

Enter the IP tunnel access identifier in the entry box.


...................................................................................................................................................................................................

Enter the Remote NSAP value for the IP tunnel.


...................................................................................................................................................................................................

Select the encapsulation type from the drop-down list box and click Save to create new IP
tunnel.

....................................................................................................................................................................................................................................
1646 SM
10-43
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-23: Create IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Close to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-24: NE TL1 Parameter


When to use

Use this procedure to modify the NE TL1 parameters.


Procedure
...................................................................................................................................................................................................

Select Tools NE TL1 Param option from the menu bar.


Result: The NE TL1 parameters configuration details if any, are displayed.

...................................................................................................................................................................................................

Enter the Prompt information.


...................................................................................................................................................................................................

Click Save to store the settings and return to the previous panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-25: TL1 console


When to use

Use this procedure to view the TL1 console parameters.


...................................................................................................................................................................................................

Select Tools TL1 console option from the menu bar.

....................................................................................................................................................................................................................................
1646 SM
10-44
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In order to use this facility it is necessary to access the Telnet console. Enter User and
Password fields with the log accessing data.
Figure 10-35 Tools - TL1 console

....................................................................................................................................................................................................................................
1646 SM
10-45
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Connect.
Figure 10-36 Tools - Accessing TL1 console

Lower part used to digit the TL1 command.


Upper part used to answer the TL1 Telnet command.

....................................................................................................................................................................................................................................
1646 SM
10-46
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Client area is shown in Figure 10-37, Tools - Telnet console (p. 10-47).
Figure 10-37 Tools - Telnet console

....................................................................................................................................................................................................................................
1646 SM
10-47
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click the TL1 command RTRV-EQPT::ALL, press enter the following is shown.
Figure 10-38 Tools - TL1 command

...................................................................................................................................................................................................

Click QUIT or CANC-USER to close the Telnet session.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-26: Create FTP Server Configuration


When to use

Use this procedure to create an FTP Server configuration.


Procedure
...................................................................................................................................................................................................

Select Tools FTP Server Configuration option from the menu bar.

....................................................................................................................................................................................................................................
1646 SM
10-48
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................

Result: The available FTP server configuration details if any, are displayed.

...................................................................................................................................................................................................

Click Create to configure the FTP server.


Figure 10-39 Create FTP server

Table 10-14

Create FTP server parameters

Parameter

Description

Host

Specifies the IP address of the Host machine.

Port

Specifies the Port number.

Path

Specifies the complete path of the host machine.

...................................................................................................................................................................................................

Enter the IP address of the Host machine in text box.


...................................................................................................................................................................................................

Enter the Port number.


...................................................................................................................................................................................................

Enter the complete path of the host machine.


...................................................................................................................................................................................................

Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM
10-49
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
10-50
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary

...................................................................................................................................................................................................................................

AIS

Alarm Indication Signal failure (Condition Type)


Alarm

Visible or audible signal indicating that an equipment failure or significant event/condition has
occurred.
Alarm Severity

An attribute that defines the priority of the alarm message. The way in which alarms are processed
depends on the severity.
APS

Automatic Protection Switching


...................................................................................................................................................................................................................................

Backup

The backup and restoration features provide the capability to recover from loss of network
element data because of such factors as human error, power failure, and network element design
flaws.
BITS

Building Integrated Timing Supply


...................................................................................................................................................................................................................................

CBS

Committed Burst Size is the maximum burst size (byte) with high priority guaranteed for the
Tunnel/Pseudowire packets deliver.
CFM

Connectivity Fault Management


CIF

Customer Interface
CIR

Committed Information Rate is the maximum rate (kb/sec) with high priority guaranteed for the
Tunnel/Pseudowire packets delivery.
....................................................................................................................................................................................................................................
1646 SM
GL-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary
....................................................................................................................................................................................................................................

Circuit

A combination of two transmission channels that permits bidirectional transmission of signals


between two points to support a single communication.
...................................................................................................................................................................................................................................

DCC

Data Communication Channel


DCN

Data Communication Network.


DDM

Digital Diagnostic Monitoring.


DEI

Dropping Eligibility Indicator


...................................................................................................................................................................................................................................

ESD

Electro Static Discharge. Static electrical energy potentially harmful to circuit packs and humans.
...................................................................................................................................................................................................................................

FDB

Filtering Database. The filtering database maintains a dynamic list of paths to which packets are
routed based on the destination address. The database entries are created, updated, and removed
by the learning process.
FLC

First Level Controller


...................................................................................................................................................................................................................................

GB

Gigabytes.
GUI

Graphical User Interface. This interface supports applications that consist of a series of
rectangular presentation regions called windows. Each window displays another application.
...................................................................................................................................................................................................................................

HKP

HouseKeeping
...................................................................................................................................................................................................................................

ID

Identifier
ISID

Backbone Service Identifier


....................................................................................................................................................................................................................................
1646 SM
GL-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary
....................................................................................................................................................................................................................................

ITU

International Telecommunications Union


...................................................................................................................................................................................................................................

LAC

Local Access Control


LACP

Link Aggregation Control Protocol


LAG

Link Aggregation Group.


LAN

Local Area Network.


Link Aggregation

A method of combining a group of IEEE 802.3 Ethernet links into a single logical link of up to the
aggregate rate.
...................................................................................................................................................................................................................................

MA

Maintenance Association.
MAC

Media Access Control.


MD

Maintenance Domain.
MEG

Maintenance Entity Group.


MEP

Maintenance association End Point.


MHF

MIP Half Function


MIP

MEG Intermediate Point.


MP

Maintenance Point.
MTU

Maximum Transmission Unit.

....................................................................................................................................................................................................................................
1646 SM
GL-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................

NE

Network Element. A node in a telecommunication network that supports network transport


services and is directly manageable by a management system.
NIF

Network Interface.
Node

A node or network element is defined as all equipment that is controlled by one-system controller.
NTP

Network Time Protocol.


...................................................................................................................................................................................................................................

OSS

Operational Support System.


OSTYPE

Operations System Type.


...................................................................................................................................................................................................................................

Path

A logical connection between the point at which a standard frame format for the signal at the
given rate is assembled, and the point at which the standard frame format for the signal is
disassembled.
PBS

Peak Burst Size is the maximum burst rate allowed (byte) for the Tunnel/Pseudowire.
PDU

Power Distribution Unit.


PIP

Provider Instance Port. The set of Virtual Instance ports that are supported by a single instance of
the Internal sub-layer service.
PIR

Peak Information Rate.


PRC

Primary Reference Clock.


...................................................................................................................................................................................................................................

Ring

A configuration of nodes comprised of network elements connected in a circular fashion. Under


normal conditions, each node is interconnected with its neighbor and includes capacity for
transmission in either direction between adjacent nodes.

....................................................................................................................................................................................................................................
1646 SM
GL-4
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................

S-VID

Service VLAN Identifier.


SFP

Small Form Factor Pluggable.


Shelf

Basic rack assembly unit; contains subassemblies (usually circuit packs, also referred to as
modules).
SNCP

Sub-Network Connection Protection.


SSM

Synchronization Status Message.


...................................................................................................................................................................................................................................

TDM

Time Domain Multiplexing.


...................................................................................................................................................................................................................................

UNI

User-Network Interface.
...................................................................................................................................................................................................................................

VCG

Virtual Concatenation Group.


VID

Virtual LAN Identifier


VLAN

Virtual Local Area Network.


...................................................................................................................................................................................................................................

XFP

Extended Form-factor Pluggable.


...................................................................................................................................................................................................................................

ZIC

Zero Installation Craft Terminal. A NE-embedded graphical user interface application for local
operation and maintenance.

....................................................................................................................................................................................................................................
1646 SM
GL-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Glossary
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1646 SM
GL-6
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Index

A alarm, 7-1

condition log, 7-11


cutoff, 7-9

.............................................................
I

IGMP
snooping, 10-34

OH
create, 4-14
search, 4-13

In-Service upgrade, 10-6

.............................................................

ASAP, 7-3

IP routing, 6-11

S security, 9-1

audit, 9-12

IP tunnel, 6-8

resynch., 7-10

.............................................................

.............................................................

B bridge

L LAC, 10-12

configure, 5-10

LAG, 10-29

.............................................................

configure, 10-32

C color profile, 5-9

create, 10-30

software version, 10-4


synchronization, 8-1
BITS-0, 8-2, 8-4
BITS-OUT, 8-5, 8-7
outgoing, 8-16
system

conventions, xxvii

linear MSP, 10-23, 10-25

log in, 10-2

Create

log settings, 9-14

log out, 10-3

provider bridge service, 10-27


Create MAC Access Control List,
6-17

.............................................................

.............................................................

M MAC, 10-14

T TCA Profile, 7-2

MAC Access Control Element


(ACE), 6-18

TL1

.............................................................
D DB management

Modify ASAP, 7-8

traffic descriptor, 5-2, 5-5

console, 10-44

cancel remote file copy, 10-10

.............................................................

.............................................................

remote file copy, 10-7

N NTP, 10-15

U user

documentation
set, xxvii
.............................................................
E ELP, 5-36

ERP instance, 5-29


ethernet
P2P XC, 4-9, 4-11

.............................................................

change account, 9-5

O OAM

change password, 9-2

global setting, 5-11, 5-13, 5-21,


5-22, 5-23, 5-24, 5-26, 5-27,
5-28
MA, 5-15
MD, 5-13
MEP, 5-17, 5-19

create account, 9-3


information, 9-3
modify settings, 9-8
.............................................................
V VCn cross-connection, 4-1

....................................................................................................................................................................................................................................
1646 SM
IN-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Index
....................................................................................................................................................................................................................................

VLAN profile, 5-7

....................................................................................................................................................................................................................................
1646 SM
IN-2
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Vous aimerez peut-être aussi