Académique Documents
Professionnel Documents
Culture Documents
Version: V2.04.02
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: 800@zte.com.cn
LEGAL INFORMATION
Copyright © 2015 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
Glossary .......................................................................................................... I
II
Intended Audience
This manual is intended for:
l Commissioning engineers
l Maintenance engineers
Chapter 2, NE Basic Data Describes the configuration flow and configuration example of ZXMW
Configuration NR8120A/8120D NE basic data.
Chapter 3, Radio Link Data Describes the configuration flow and configuration example of ZXMW
Configuration NR8120A/8120D radio link data.
Chapter 4, TDM Service Describes the configuration flow and configuration example of ZXMW
Data Configuration NR8120A/8120D TDM service data.
Chapter 5, Ethernet Service Describes the configuration flow and configuration example of ZXMW
Data Configuration NR8120A/8120D Ethernet service data.
Chapter 6, Clock Data Describes the configuration flow and configuration example of ZXMW
Configuration NR8120A/8120D clock data.
Conventions
This manual uses the following conventions.
II
Context
The second method of logging in to the Web LMT helps log in to the entire network
management system, which is NetNumen M31 (MW). Before using the second method to
log in to the Web LMT, users must use the first method to log in to the Web LMT once.
The detailed procedures are described as follows:
1. Log in to the Web LMT through the RCMUC/RCMUD boards' LMT interface.
2. In the left pane, select Setup > System > Parameter. The system parameter
configuration page is displayed.
3. Modify the IP address, which should be unique in the entire network.
4. Log in to Web LMT through the RCMUC/RCMUD boards' NMS interface.
The following describes how to log in to the Web LMT by using the first method.
1-1
Steps
1. Right-click the My Network Places icon on the desktop, and click Properties from the
shortcut menu. Right-click the local connection icon, and click Properties, see Figure
1-1.
1-2
3. Click OK.
4. Use an Ethernet cable to connect the LMT interface of the IDU's RCMUC/RCMUD
with the PC.
Note:
This is the method of logging in through the RCMUC/RCMUD board's LMT interface.
For the method of logging in through the RCMUC/RCMUD board's NMS interface, you
should connect the NMS interface to the PC.
You must enable the NMS interface before using it, because this interface is disabled
by default.
5. Run the Internet Explorer. Enter the IP address of the IDU's LMT interface, for
example, http://192.168.1.16, and press Enter. The Web LMT login dialog box is
displayed, see Figure 1-3.
1-3
6. Enter the user name in User Name and the password in Password. Then, click
LOGIN. After the login succeeds, the system interface is displayed, see Figure 1-4.
– End of Steps –
1-4
Steps
1. In the left pane, select Maintenance > Version > IDU Version.
2. Check the IDU version in the Version Management area, see Figure 1-5.
Note:
Package status description:
l The RUNNING status indicates a running IDU version.
l The VALID status indicates an activated backup IDU version.
l The NOT VALID status indicates a backup IDU version that is not activated.
3. Click the Query button in the Hardware Version Information area, see Figure 1-6.
1-5
6. (Optional) In the left pane, select Maintenance > Version > AOU. Check the AOU
version in the right pane, see Figure 1-8.
7. Ensure that the IDU, ODU and AOU versions are correct. If not, update the versions.
Note:
It is unnecessary to update the ODU version manually. The system will update the
ODU version to the latest automatically.
– End of Steps –
1-6
Table of Contents
Configuring the NE Information ..................................................................................2-1
Configuring the NE Time ............................................................................................2-4
Configuring the NMS ..................................................................................................2-8
Configuring AOU Host ..............................................................................................2-10
Steps
1. In the left pane, select Setup > System > Parameter. The system parameter
configuration page is displayed, see Figure 2-1.
2-1
2. Set the NE information. For a description of the parameters, refer to Table 2-1.
NE Type NR8120D NR8120D Sets the equipment type. It is set to the default
value NR8120D and cannot be modified.
2-2
Subnet Mask - 255.255.255. Sets the subnet mask of an NE. It is used with
0 the Device IP Address parameter to separate
the IP address of an NE into two parts: network
address and host address.
Default IP addresses 193.254.1.1 Sets the default gateway for an NE. It is the IP
Gateway except those address of an IP router that can be reached
start with directly.
127 or 192, When the NE sends a data packet, if there is no
broadcast available gateway, the data packet is sent to the
addresses, default gateway for processing.
and multicast
addresses
2-3
After this task is completed, users can log in to the Web LMT through the
RCMUC/RCMUD's NMS interface (the NMS interface is On and enabled). The PC's
IP address and the NE's IP address must be configured in the same network segment.
3. Click Apply.
– End of Steps –
Steps
Configuring the NE Time Zone
1. In the left pane, select Setup > System > Time. The system time configuration page
is displayed, see Figure 2-2.
2-4
2. In the Time Zone Management area, select System Time Zone or Custom Time
Zone. And select the time zone of the NE from the drop-down list, see Figure 2-3.
3. Click Apply.
Configuring the NE Time
4. Click the System Time text box in the System Time Management area. The calendar
is displayed, see Figure 2-4.
2-5
5. In the System Time text box, move the cursor to the time part, delete the incorrect
time, and enter the accurate time in the form of HH:MM:SS.
6. Click Apply.
Configuring SNTP Management
7. In the SNTP Management area, configure the parameters. For a description of the
parameters, refer to Table 2-2.
Table 2-2 SNTP Management Parameters
2-6
range from
0 to 224,
excluding 0
and 224.
8. Click Apply.
Configuring the DST Time
9. In the Summer Time Management area, configure the Daylight Saving Time (DST)
parameters. For a description of the parameters, refer to Table 2-3.
Start Time MM: 1–12 01-01 00:00 Sets the start time of the DST
(MM-dd HH:mm) dd: 1–30 (31) system.
hh: 0–23
mm: 0–59
2-7
End Time MM: 1–12 01-01 00:00 Sets the end time of the DST
(MM-dd HH:mm) dd: 1–30 (31) system.
hh: 0–23
mm: 0–59
Steps
1. In the left pane, select Setup > NMS. The NMS configuration page is displayed, see
Figure 2-5.
2-8
2. Enter the network management VLAN ID, and then click Apply.
3. Select the required bandwidth, and then click Apply.
4. In the left pane, select Security > SNMP. The SNMP configuration page is displayed,
see Figure 2-6.
6. Click Add. The SNMP IP Address Configuration dialog box is displayed, see Figure
2-7.
2-9
7. Enter the NMS name in the Name text box, enter the NMS IP address in the IP
Address text box, select Enable as the status, and then click Apply. Then, the NMS
IP address is added to the IP address list.
– End of Steps –
Steps
Configuring host mode
1. In the left pane, select Setup > Port Mode. The Port Mode page is displayed, see
Figure 2-8.
2. In the Mode drop-down list of a port, select Hosted, see Figure 2-9.
2-10
3. Click Apply.
Configuring AOU Protection Group
4. In the left pane, select Setup > AOU Protection Group. The AOU Protection Group
page is displayed, see Figure 2-10.
Note:
To configure an AOU protection group, at least two ports are configured as Hosted.
5. In the Select Port area, select Master Port and Protection Port from the drop-down
list (the left side of + indicates the master port and the right side of + indicates the
protection port).
6. Click Add. The AOU protection group is added, see Figure 2-11.
2-11
2-12
Table of Contents
Configuring the Work Mode ........................................................................................3-2
Configuring ODU Parameters.....................................................................................3-3
Configuring the ATPC Function ..................................................................................3-5
Configuring the ACM Function....................................................................................3-6
Configuring the PIS Function......................................................................................3-9
3-1
Caution!
The configuration of work mode results in instantaneous service disconnection.
Steps
1. In the left pane, select Radio Link > Basic Configuration. The radio link configuration
page is displayed, see Figure 3-1.
Note:
Current Capacity is calculated by the default bandwidth and modulation mode.
2. Click the tab of the transmit unit to be configured. In the Transmit Unit Info area,
the information of the current transmission unit, such as slot number, capacity, and
whether ACM is supported, is displayed.
3-2
3. Select the bandwidth and the modulation mode from the Bandwidth and Modulation
Mode lists respectively, see Figure 3-2.
Bandwidth: 7 M, 14 M, 28 M, 56 M and 40 M.
Modulation Mode: QPSK , 16QAM , 32QAM , 64QAM , 128QAM , 256QAM ,
512QAM, 1024QAM, 1024QAM Light and 2048QAM.
4. Select or clear Set also remote unit as required.
l If Synchronize bandwidth to remote NE is selected, the bandwidth setting at
the remote end is synchronized with the local end.
l If Synchronize bandwidth to remote NE is cleared and the operation mode of
the remote end is different from the local end, the communication link is broken.
5. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Radio Link > Basic Configuration. The radio link configuration
page is displayed. In the RF Parameter Configuration area, configure Frequency
Parameter (kHz) and Power Parameter (dBm), see Figure 3-3.
3-3
2. In accordance with the frequencies in the microwave link planning, enter the
frequencies of the the master ODU and slave ODU in TX Frequency Configuration
text box. The transmit frequency must be within the range which is set by TX
Frequency Range.
3. When ODU Type is SRU, select the duplex spacing of the master/slave ODU from the
T/R Spacing drop-down list.
When ODU Type is Others, configure RX Frequency Configuration. The value must
be within the TX Frequency Range.
4. In the TX Power Configuration text box, enter the transmit power of the master ODU
and the slave ODU. The configured transmit power must be within the range which is
set by TX Power Range.
5. (Optional) Select Synchronize TX frequency configuration to remote NE..
l If you modify the transmit frequency or receive frequency for the local end and
clear Synchronize TX frequency configuration to remote NE., the link in use
will be disconnected after you click Apply.
l If you modify the transmit frequency or receive frequency for the local end and
select Synchronize TX frequency configuration to remote NE., both the
transmit frequency and receive frequency for the remote end are modified after
you click Apply and the link in use will not be disconnected.
6. Click Apply.
– End of Steps –
3-4
Context
l During the process of exchanging microwave link's antennas, ATPC Switch should be
set to OFF, and the transmission power of ODU should be set to an appropriate value.
l The ATPC function can be accomplished only when it is enabled on both ends.
l After the ATPC function is disabled, the transmission power of ODU return to the value
before ATPC is enabled. That may lead to instantaneous link disconnection.
Steps
1. In the left pane, select Radio Link > Basic Configuration, and select ATPC
Parameter Configuration, see Figure 3-4.
2. Configure the ATPC parameters. For a description of the parameters, refer to Table
3-1.
ATPC Enable l Enable Disable Determines whether to enable the ATPC). With
l Disable this function, the system transmission power
can be adjusted within a certain range according
to the remote end receiving level.
3-5
High –70 to –30 –45 Sets the highest transmission power of the
Threshold ATPC function. The ATPC function automatically
adjusts the transmission power at the local end
according to the receive level at the remote end.
If the receive level at the remote end is not within
the ATPC adjustment range, it is necessary
to adjust the transmission power to make the
receive level at the remote end be within the
adjustment range.
If the ODU transmission power is adjusted to
the power threshold but the receive level at the
remote end is not within the ATPC adjustment
range, the transmission power will not be
adjusted.
Low –70 to –30 –65 Sets the lowest received level at the remote end.
Threshold
Min Tx Power –20 to 40 0 Sets the lowest transmission power at the local
(dBm) end. It ensures that the receiving condition
at the remote end is not affected by signal
degradation due to low transmission power at
the local end during ATPC adjustment.
The priority of this parameter is higher than
ATPC low threshold.
3. Click Apply.
– End of Steps –
3-6
Context
l During the process of exchanging microwave link's antennas, ACM Switch should be
set to OFF.
l The ACM function can be implemented only after it is enabled at both ends of the link.
l The change of ACM Switch status results in instantaneous link disconnection.
Steps
1. In the left pane, select Radio Link > Basic Configuration, and select ACM
Configuration, see Figure 3-5.
2. Configure the ACM parameters. For a description of the parameters, refer to Table
3-2.
ACM Enable l Enable Disable Sets whether the ACM function is enabled.
l Disable The ACM function enables the coding and
modulation modes to be automatically
adjusted according to channel quality.
3-7
Record ACM Log l Enable Disable Sets whether the Record ACM Log
l Disable function is enabled.
3. Click Apply.
– End of Steps –
3-8
Prerequisite
l You have already added the MU board.
l This function does not support the PLA interface.
Steps
Configuring the PIS parameters
1. In the left pane, select Radio Link > PIS. The PIS configuration page is displayed.
2. Select the port to be configured, and click Modify. The PIS dialog box is displayed,
see Figure 3-6.
3-9
4. Click Apply.
Configuring Frame Header Compress
5. In the left pane, select Radio Link > Frame Header Compress Configuration. The
Frame Header Compress Configuration page is displayed.
6. Select the port to be configured, and click Modify. The Frame Header Compress
Configuration dialog box is displayed, see Figure 3-7.
8. Click Apply .
– End of Steps –
3-10
3 Configure the SNCP+ Required if TDM service 1:1 ring protection needs to be configured.
protection route. For the configuration procedure, refer to “4.3 Configuring an
SNCP+ Protection Route”.
Table of Contents
Configuring a P2P Route............................................................................................4-1
Configuring an SNCP Protection Route ......................................................................4-3
Configuring an SNCP+ Protection Route ....................................................................4-5
Configuring the CES Function ....................................................................................4-8
Steps
1. In the left pane, select TDM > P2P. The TDM P2P route configuration page is
displayed, see Figure 4-1.
4-1
2. Click Add, the P2P Route Configuration dialog box is displayed, see Figure 4-2.
TN is the transmit unit number configured on the shelf (generally, it is the slot number
where the service board is located).
4-2
Steps
1. In the left pane, select TDM > SNCP. The TDM SNCP route configuration page is
displayed, see Figure 4-3.
4-3
Note:
The priority level is from 1 to 6. The smaller value of Priority is, the higher the
corresponding priority level is.
5. In the Hold-Off Time (ms) text box, enter the hold-off time.
If the current channel is not restored within the specified hold-off time, the service will
be switched to the other channel. This parameter helps avoid frequent switchover.
6. Set Shelf No., TN, and Port No. at the source end (including the active and protected).
TN is the transmit unit number configured on the shelf (generally, it is the slot number
where the service board is located).
7. Set Shelf No., TN, and Port No. at the destination end.
TN is the transmit unit number configured on the shelf (generally, it is the slot number
where the service board is located).
4-4
4-5
Steps
Configure a P2P route
1. In the left pane, select TDM > SNCP+ > P2P. The P2P Route Configuration page is
displayed, see Figure 4-6.
2. Click Add. The P2P Route Configuration dialog box is displayed, see Figure 4-7.
4-6
8. Click Add. The SNCP+ Route Configuration dialog box is displayed, see Figure 4-9.
4-7
a. Select an SNCP item in the SNCP route list, and click Switch. The SNCP Switch
dialog box is displayed, see Figure 4-10.
4-8
Steps
1. In the left pane, select TDM > CES > Configuration. The CESoETH Configuration
page is displayed, see Figure 4-11.
2. Click Add. The CESoETH Configuration dialog box is displayed, see Figure 4-12.
3. Configure the required parameters and click Apply. For a description of the
parameters, refer to Table 4-1.
4-9
4-10
VLAN ID 1–2047 1 Sets the ID of the inner VLAN tag of the CES
packet when double tags are used. The outer
VLAN tag is configured on the Ethernet VLAN
configuration page.
4-11
b. Select the Slot No., Port No., Time Slot, and Date. Then, click Query. The
performance data of each CES service in 15 minutes or 24 hours is displayed.
The query result includes the information of CESoETH Frames Transmitted,
CESoETH Payload Octets Transmitted, CESoETH Frames Received, CESoETH
Payload Octets Received, Lost Frames, Re-Ordered Frames, Malformed Frames,
and Jitter Buffer Overruns.
– End of Steps –
4-12
3.2 Configure Required for the Customer or User Defined port type.
the VLAN For the configuration procedures, refer to “5.3.2
mapping Configuring Protocol-Based VLAN Parameters” and
mode. “5.3.3 Configuring MAC-based VLAN Parameters”.
5-1
5-2
Table of Contents
Configuring Ethernet Ports .........................................................................................5-4
Configuring the Ethernet MAC Address ......................................................................5-8
Configuring a VLAN..................................................................................................5-11
Configuring QoS.......................................................................................................5-17
Configuring the LLDP Function.................................................................................5-36
Configuring the LACP Function ................................................................................5-40
Configuring EFM ......................................................................................................5-45
Configuring CFM ......................................................................................................5-49
Configuring ERPS ....................................................................................................5-59
Configuring ERPS2.0 ...............................................................................................5-61
Configuring ELPS.....................................................................................................5-68
Configuring the XSTP Function ................................................................................5-71
Configuring LCPT.....................................................................................................5-82
Configuring OSPF ....................................................................................................5-84
5-3
Steps
Configuring Physical Ethernet Interfaces
1. In the left pane, select Home > Home. The board page is displayed, see Figure 5-1.
5-4
a. In the left pane, select ETH > Port Related > Port Mirror. The port mirroring
configuration page is displayed. Click Add. The port mirroring dialog box is
displayed, see Figure 5-3.
5-5
c. Click Apply.
d. Use the same method to configure other required mirrored ports.
5-6
b. From the Port drop-down list, select the port to be configured. Select the MAC
address. When a record is selected, the specified MAC address frame uses L2
packet control policy (that is, transparent transmission) when passing through the
port if the corresponding protocol is disabled.
c. Click Apply.
6. Configure Jumbo frame:
a. In the left pane, select ETH > Port Related > Jumbo Frame. The Jumbo Frame
configuration page is displayed, see Figure 5-5.
b. For each port, the frame length can be limited through the configuration of the
Jumbo frame value. The value range is 1522 to 9600. The default value is 1518.
After the configuration, click Apply.
7. Configure the isolated ports group:
5-7
a. In the left pane, select ETH > Port Related > Isolated Ports Group. The isolated
ports group configuration page is displayed, see Figure 5-6.
Steps
Configuring a Dynamic Ethernet MAC Address
1. In the left pane, select ETH > MAC > Dynamic. The dynamic MAC management
configuration page is displayed, see Figure 5-7.
5-8
MAC Address 0–1048575 300 Defines the aging time for the MAC
Aging Time (s) address. A MAC address will be
learned again after the aging time.
0 means no aging.
MAC Address l IVL IVL Defines the learning style of the MAC
Learn Style l SVL address.
IVL indicates that each VLAN has a
table of mapping relations between
MAC addresses and ports. The same
MAC address can be present in multiple
tables.
SVL indicates that a switch has a table
which records the mapping relations
between MAC addresses, VLANs, and
ports. In the table, an MAC address
can be present only once and belong
to only one VLAN.
5-9
3. Click Apply.
4. Select a resource port, and click Modify. The Dynamic MAC Port Manage dialog
box is displayed, see Figure 5-8.
5. Set MAC LearningLimit and set MAC Self-Learning Status to Enable. Then, click
Apply.
Configuring a Static Ethernet MAC Address
6. In the left pane, select ETH > MAC > Static. The Static MAC Manage configuration
page is displayed, see Figure 5-9.
7. Click Add. The Static Mac Configuration dialog box is displayed, see Figure 5-10.
5-10
Access An Access port is used to connect the VLAN switch with a device that cannot
identify VLAN tags, for example, work station. This port type transmits only
frames without VLAN tags and can be associated with only one VLAN.
Trunk A Trunk port is used to connect two devices that can identify VLAN tags and
transmit services of multiple VLANs. This port type transmits only frames with
VLAN tags and can bear multiple VLANs.
Hybrid A Hybrid port can transmit frames with or without tags. However, for a specific
VLAN, the frames transmitted by this port type must be all with tags or all
without tags.
Customer A Customer port is used to identify an inner VLAN tag or untagged packet, and
add a specified outer VLAN tag. The frames whose TPID of the inner VLAN
tag is consistent with the setting will be discarded.
Provider A Provided port is used to identify the outer VLAN tags that are consistent with
the configured TPID and transmit them. At the same time, the inconsistent
frames are discarded.
5-11
UserDefine A UserDefine port is used for VLAN Tag in VLAN Tag (QinQ). It can be
configured flexibly based on the actual requirement.
QinQ allows adding a VLAN tag to the original 802.1Q tag packet. The original
tag becomes the inner tag and the VLAN is marked as CVLAN. The added tag
becomes the outer tag and the VLAN is marked as SVLAN.
Steps
1. In the left pane, select ETH > VLAN > Port Info Configuration. The VLAN port
information page is displayed, see Figure 5-11.
2. Select the port to be configured and click Modify. The Port Configuration dialog box
is displayed, see Figure 5-12.
5-12
3. Set Port Type, Port Default Priority, PVID, and VLAN ID.
l The PVID must be within the VLAN ID.
l The VLAN IDs to be added or deleted can be continuous or discrete. To add
continuous VLAN IDs, use the symbol -, for example, 1-10.
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > Protocol Based Configuration. The
protocol-based VLAN configuration page is displayed.
2. Click Add. The VLAN Configuration Based on Protocol dialog box is displayed,
see Figure 5-13.
5-13
4. Click Add.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > MAC Based Configuration. The MAC-based
VLAN configuration page is displayed.
5-14
2. Click Add. The VLAN Configuration Based on MAC dialog box is displayed, see
Figure 5-14.
3. Configure the VLAN parameters based on MAC address. For a description of the
parameters, refer to Table 5-4.
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > Translation Rule Configuration. The
Translation Rule Configuration page is displayed.
2. Click Add, the Translation Rule Configuration dialog box is displayed, see Figure
5-15.
5-15
Type l Ingress Ingress Inner Describes how to match the outer and inner of
Outer the translation rule.
l Ingress
Inner
l Egress
Outer
l Egress
Inner
5-16
Double Tags l Unmodi- Unmodified Describes the outer action of double tags.
Outer Action fied
l Add
l Replace
Double Tags l Unmodi- Unmodified Describes the inner action of double tags.
Inner Action fied
l Delete
l Replace
Single Outer l Unmodi- Unmodified Describes the outer action of a single outer tag.
Tag Outer fied
Action l Add
l Replace
Single Outer l Unmodi- Unmodified Describes the inner action of a single outer tag.
Tag Inner fied
Action l Add
Single Inner Add Add Describes the outer action of a single inner tag.
Tag Outer
Action
Single Inner l Unmodi- Unmodified Describes the inner action of a single inner tag.
Tag Inner fied
Action l Delete
l Replace
4. Click Apply.
– End of Steps –
Ingress Traffic classification Traffic classification is to classify packets into different priorities
or services.
For the configuration procedures, refer to “5.4.1 Configuring Queue
Priorities” and “5.4.3 Configuring the Access Control Policy (ACL)”.
Traffic policing Traffic policing is to limit the traffic entering a network to the
allowed range. If the packet traffic of some connection is too large,
traffic policing will discard the packet or reset its priority to protect
network resources and the operator's investment.
For the configuration procedure, refer to “5.4.2 Configuring Access
Rate Control (CAR)”.
5-17
Traffic shaping Traffic shaping is to limit the traffic of a packet type from a port so
that packets can be sent at an even speed;
Buffer and token bucket are normally used to implement traffic
shaping. The token bucket controls the rate for sending packets.
The packets exceeding the rate limit are cached in the buffer and
waits to be sent as scheduled.
For the configuration procedure, refer to “5.4.7 Configuring the
Flow Rate Limit Policy”.
Steps
1. In the left panel, select ETH > QoS > Priority Mapping. The queue priority
configuration page is displayed, see Figure 5-16.
5-18
2. Select the line where the port to be configured is located, and click Modify. The
Priority Mapping dialog box is displayed, see Figure 5-17, Figure 5-18.
Figure 5-17 Port Queue Priority Configuration Dialog Box (802.1p Page)
Figure 5-18 Port Queue Priority Configuration Dialog Box (DSCP Page)
CAR is an attribute of an ACL. It is used to determine the packet color of an ACL stream,
and then determine the attributes such as forwarding features, queue mapping, and color
relocating of the data stream.
A configured CAR item cannot be modified but added or deleted. After a CAR item is
deleted, its associated ACL is also deleted.
5-19
Steps
1. In the left pane, select ETH > QoS > CAR. The CAR configuration page is displayed,
see Figure 5-19.
2. Click Add. The CAR dialog box is displayed, see Figure 5-20.
3. Configure the access rate control parameters. For a description of the parameters,
refer to Table 5-6.
Color Mode l Color- Color Blind Sets the mode of coloring the access rate
Blind control.
l Color- l Color Blind: The system ignores the
Aware previous color modes but re-colors the
messages according to the CIR and
PIR configuration on the current CAR
configuration window. The messages lower
than CIR are colored green. The messages
lower than PIR and higher than CIR are
5-20
CIR (kbit/s) 0–1000000 0 Controls the minimum rate for messages using
CAR.
CIR Rate should be smaller than or equal to PIR
Rate.
PIR (kbit/s) 0–1000000 0 Controls the peak rate for messages using
CAR.PIR Rate should be greater than or equal
to CIR Rate.
PBS (kbit) 10–1000000 10 Sets the maximum peak traffic volume in the
token bucket algorithm.
Packet l Forward Forward Sets the methods for processing frames in the
Process l Remark CAR policy. Messages with different colors
Method l Discard use the same method. The following takes red
frames as an example:
l Forward: The system directly forwards red
frames.
l Remark: The system re-colors the red
frames according to the re-marked COS
queue and re-marked color and map them
to the new COS queue.
l Discard: The system does not process red
frames and directly discards them.
Remark CoS l Green Green Defines the COS color for a remarked frame:
Color l Yellow
l Red
5-21
4. Click Apply.
– End of Steps –
Prerequisite
The CAR policy is configured.
Steps
1. In the left pane, select ETH > QoS > ACL. The ACL configuration page is displayed,
see Figure 5-21.
2. Click Add. The ACL Configuration dialog box is displayed, see Figure 5-22 and
Figure 5-23
5-22
3. Configure the ACL policy parameters. For a description of the parameters, refer to
Table 5-7.
5-23
Map Queue BE, AF1, AF2, Disable Sets the mapping queue when the
AF3, AF4, EF, ACL policy is used. The queues using
CS6, CS7, the ACL policy will be mapped to the
Disable selected Cos queue.
Time Mode l Unlimited Unlimited Sets the scenarios for using the ACL
l Relative time policy:
l Absolute l Unlimited: All scenarios are
time allowed.
l Absolute Time: GPS time, for
example, 09:20 January 30, 2012.
The ACL policy is used during the
period between the end time and
the start time.
l Relative Time: the time relative to
the current time, for example, 30
minutes later. The ACL policy is
used during the period between the
end time and the start time.
Start Time l Abso- l Absolute Indicates the time from when the ACL
lute Time: Time: 2011- policy takes effect if the time mode is
2011-01-01 01-01 00:00 set to Relative Time or Absolute Time.
00:00–2099- Monday The format is year-month-day HH:MM
12-31 l Relative week.
23:59 Mon- Time: 00:00
day–Sunday Monday
l Relative
Time: 00:00
5-24
–23:59 Mon-
day–Sunday
End Time l Abso- l Absolute Indicates the time after when the ACL
lute time: time: 2011- policy is invalid if the time mode is set to
2011-01-01 01-30 23:59 Relative Time or Absolute Time. The
00:00–2099- Monday format is year-month-day HH:MM week.
12-31 l Relative
23:59 Mon- time: 23:59
day–Sunday Monday
l Rela-
tive time:
00:00–23:59
Mon-
day–Sunday
Rule area
DSCP Match Value: Match Value: 0 Sets the DSCP rule in the ACL policy.
0–63 Wildcards: 0 It is used to set the DSCP priority for
Wildcards: 0–63 Enable: No IP packets. If the actual value in the
Enable: Yes, No packet is different from the configured
value, the packet cannot use the rule.
Match Value: DSCP priority of the IP
packet, used to identify the data level.
Wildcards: mask
Enable: determines whether to enable
the rule.
Outer VLAN Match Value: 0–7 Match Value: 0 Sets the priority of the outer VLAN
Priority Mask Symbol: Wildcards: 0 when the ACL policy is used. If the
0–7 Enable: No actual value in the packet is different
Enable: Yes, No from the configured value, the packet
cannot use the rule.
Match Value: priority of the outer VLAN
Wildcards: mask
Enabled: determines whether to enable
the rule.
5-25
Inner VLAN Match Value: 0–7 Match Value: 0 Sets the priority of the inner VLAN when
Priority Wildcards: 0–7 Wildcards: 0 the ACL policy is used. If the actual
Enable: Yes, No Enable: No value in the packet is different from the
configured value, the packet cannot use
the rule.
Match Value: priority of the inner VLAN
Wildcards: mask
Enable: determines whether to enable
the rule.
TCP/UDP Match Value: Match Value: 1 Sets the source port of layer 4
Source Port 1–65535 Wildcards: 1 (TCP/UDP) when the ACL policy is
Wildcards: Enable: No used. If the actual value in the packet is
1–65535 different from the configured value, the
Enable: Yes, No packet cannot use the rule.
Match Value: layer4 source port
Wildcards: mask
Enable: determines whether to enable
the rule.
TCP/UDP Match Value: Match Value: 1 Sets the destination port of layer 4
Destination 1–65535 Wildcards: 1 (TCP/UDP) when the ACL policy is
Port Mask Symbol: Enable: No used. If the actual value in the packet is
1–65535 different from the configured value, the
Enable: Yes, No packet cannot use the rule.
Match Value: layer4 destination port
Wildcards: mask
Enable: determines whether to enable
the rule.
Source IP Match Value: Match Value: Sets the source IP address when
00.00.00.00–255. 10.10.10.10 the ACL policy is used. If the actual
255.255.255 Wildcards: value in the packet is different from the
Wildcards: 255.0.0.0 configured value, the packet cannot use
00.00.00.00–255. Enable: false the rule.
255.255.255 Match Value: source IP address
Enable: Yes, No Wildcards: mask
Enable: determines whether to enable
the rule.
5-26
Destination Match Value: Match Value: Sets the destination IP address when
IP 00.00.00.00–255. 10.10.10.10 ACL policy is used. If the actual value
255.255.255 Wildcards: in the packet is different from the
Wildcards: 255.0.0.0 configured value, the packet cannot use
00.00.00.00–255. Enable: No the rule.
255.255.255 Match Value: destination IP address
Enable: Yes, No Wildcards: mask
Enable: determines whether to enable
the rule.
Source MAC Match Value: Match Value: Sets the source MAC address/destina-
& Destination 00-00-00-00-00- 22-22-22-22- tion MAC address when the ACL policy
MAC 00–255-255-255- 22-22 is used. If the actual value in the packet
255-255-255 Wildcards: 22-22- is different from the configured value,
Wildcards: 22-22-22-22 the packet cannot use the rule.
00-00-00-00-00- Enable: No Match Value: source MAC
00–255-255-255- address/destination MAC address
255-255-255 Wildcards: mask
Enable: Yes, No Enable: determines whether to enable
the rule.
Source MAC Match Value: Match Value: Sets the source MAC address when
00-00-00-00-00- 22-22-22-22- the ACL policy is used. If the actual
00–255-255-255- 22-22 value in the packet is different from the
255-255-255 Wildcards: configured value, the packet cannot use
Wildcards: FF-FF-FF-FF- the rule.
00-00-00-00-00- FF-FF Match Value: source MAC address
00–255-255-255- Enable: No Wildcards: mask
255-255-255 Enable: determines whether to enable
Enable: Yes, No the rule.
Destination Match Value: Match Value: Sets the destination MAC address
MAC 00-00-00-00-00- 22-22-22-22- when the ACL policy is used. If the
00–255-255-255- 22-22 actual value in the packet is different
255-255-255 Wildcards: from the configured value, the packet
Wildcards: FF-FF-FF-FF- cannot use the rule.
00-00-00-00-00- FF-FF Match Value: destination MAC address
00–255-255-255- Enable: No Wildcards: mask
255-255-255 Enable: determines whether to enable
Enable: Yes, No the rule.
5-27
IPV6 Traffic Match Value: Match Value: 1 Sets the Ip6 TrafficClass value when
Class 1–255 Wildcards: 1 the ACL policy is used. If the actual
Wildcards: 1–255 Enable: No value in the packet is different from the
Enable: Yes, No configured value, the packet cannot use
the rule.
Match Value: IPv6TrafficClass value
Wildcards: mask
Enable: determines whether to enable
the rule.
Outer VLAN Match Value: Match Value: 1 Sets the outer VLAN ID when ACL
ID 1–4094 Wildcards: 1 policy is used. If the actual value in the
Wildcards: Enable: No packet is different from the configured
1–4095 value, the packet cannot use the rule.
Enable: Yes, No Match Value: outer VLAN ID
Wildcards: mask
Enable: determines whether to enable
the rule.
Inner VLAN Match Value: Match Value: 1 Sets the inner VLAN ID when ACL
ID 1–4094 Wildcards: 1 policy is used. If the actual value in the
Wildcards: Enable: No packet is different from the configured
1–4095 value, the packet cannot use the rule.
Enable: Yes, No Match Value: inner VLAN ID
Wildcards: mask
Enable: determines whether to enable
the rule.
Ethernet Match Value: Match Value: 1 Sets the Ethernet type when the ACL
Type 1–65535 Wildcards: 1 policy is used. If the actual value in the
Wildcards: Enable: No packet is different from the configured
1–65535 value, the packet cannot use the rule.
Enable: Yes, No Match Value: Ethernet type
Wildcards: mask
Enable: determines whether to enable
the rule.
MPLS Match Value: 0–7 Match Value: 0 Describes whether MPLS is used.
Wildcards: 0–7 Wildcards: 0
Enable: Yes, No Enable: No
4. Click Apply.
– End of Steps –
5-28
Steps
1. In the left pane, select ETH > QoS > Queue Management. The queue management
policy configuration page is displayed, see Figure 5-24.
5-29
5-30
Congestion l Tail Drop Tail Drop Sets the policy for dropping packets in
Management l RED congestion mode.
Policy Select l WRED l Tail Drop
l Random Early Detection
l Weighted Random Early Detection
a. Click Modify after the port name, configure the port parameter, see Figure 5-28.
5-31
b. Click Modify after the queue name, configure the quene parameter, see Figure
5-29.
– End of Steps –
Prerequisite
The queue priority is configured. Otherwise, the default priority is mapped and takes effect.
Steps
1. In the left pane, select ETH > QoS > DEI& Priority Egress. The DEI & Priority
Egress Modification page is displayed, see Figure 5-30.
5-32
2. Select a port and click Modify. The DEI & Priority Egress Modification dialog box
is displayed, see Figure 5-31.
Steps
1. In the left pane, select ETH > QoS > Packet Aging. The packet aging configuration
page is displayed, see Figure 5-32.
5-33
2. Configure the packet aging parameters. For a description of the parameters, refer to
Table 5-9.
3. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > QoS > Flow Rate Limit. The QoS flow rate limit
configuration page is displayed, see Figure 5-33.
5-34
2. Select the port to be configured and click Modify. The flow rate limit configuration
dialog box is displayed, see Figure 5-34.
3. Configure the flow rate limit parameters. For a description of the parameters, refer to
Table 5-10.
5-35
4. Click Apply.
– End of Steps –
Steps
1. LLDP global configurations:
a. In the left pane, select ETH > LLDP > Global Configuration. The LLDP global
configuration page is displayed, see Figure 5-35.
5-36
Hello Time 5–32768 30 Specifies the period for sending the Hello
(s) packet for all ports.
5-37
Restart 1–10 2 Specifies the time for waiting for the local
Delay (s) LLDP port to change from being prohibited
to re-initialized. It can avoid frequent port
initialization due to frequent switching of
operating modes.
c. Click Apply.
2. LLDP port configurations:
a. In the left pane, select ETH > LLDP > Port Configuration. The LLDP port
configuration page is displayed, see Figure 5-36.
5-38
b. Click Add. The LLDP Port Configuration dialog box is displayed, see Figure
5-37.
c. Configure the LLDP port parameters. For a description of the parameters, refer to
Table 5-12.
5-39
d. Click Apply.
– End of Steps –
The LACP function enables multiple physical links to be bound into a logical link and form
a link aggregation group. It accomplishes the following functions:
l Increasing bandwidth: The width of the bound physical links is the sum of the
bandwidths of all physical links in the link aggregation group.
5-40
l Improving system stability and availability: The aggregation link is available even if
one physical link is disconnected.
l Sharing load: The aggregation link sends data in accordance with a policy to achieve
load balancing.
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Steps
1. In the left pane, select ETH > Port Related > Port Configuration. The port
configuration page is displayed. Ensure that the ports for configuring aggregation are
all enabled. If not, enable the disabled ports.
2. Configure the LACP port:
a. In the left pane, select ETH > LACP > Port Configuration. The LACP port
configuration page is displayed. Click Add. The Port Configuration dialog box
displayed, see Figure 5-38.
b. From the Port drop-down list, select the port to be aggregated. Configure the
LACP port parameters.
For a description of the parameters, refer to Table 5-13.
Port Port names in - Specifies the port and its slot for
the drop-down configuring the LACP protocol.
list The ports that can be configured as
LACP ports are Ethernet physical
port and Ethernet air interface. An
5-41
Port Priority 1–65535 32768 Sets the priority for selecting member
ports in dynamic aggregation. A higher
priority level indicates that the port is
more easily to be aggregated.
Port Work l Active Mode Active Mode Indicates whether the port actively
Mode l Passive sends LACP packets.
Mode l Active Mode: indicates that the
l ON port actively sends packets.
l Passive Mode: indicates that the
port does not actively send packets.
l Enable: indicates that the port does
not send packets.
c. Click Apply.
d. Use the same method to add other ports to be aggregated.
3. Configure the LACP aggregation group:
a. In the left pane, select ETH > LACP > LAG Configuration. The LACP
aggregation group configuration page is displayed.
b. Click Add. The LAG Configuration dialog box displayed, see Figure 5-39.
5-42
5-43
d. Click Apply.
6. Open the LMT interfaces at both ends. Select ETH > LACP > LAG Info and query the
LAG information, see Figure 5-40.
If the Port Number is equal to the Active Port Number, the LAG is operating normally.
5-44
– End of Steps –
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Context
EFM detection has the following features:
l Sensitive to link faults.
l Checks only the link status of one hop rather than the point-to-point link connectivity
between devices of multiple hops.
l Ignores VLAN faults of protocol packets. For example, if a link has faults in a service
VLAN, EFM does not report alarms until the link is totally disconnected.
Steps
1. In the left pane, select ETH > OAM_EFM > Global Configuration. The global EFM
configuration page is displayed, see Figure 5-41.
5-45
2. Configure the EFM global parameters, and click Apply. For a description of the
parameters, refer to Table 5-15.
EFM Global l Enable Disable Determines whether to enable the EFM protocol
Configuration l Disable globally.
Loopback 1–10 1 Specifies the time for waiting for the remote end
Timeout (s) to respond a loopback test. If the time expires,
the loopback test fails.
Link Monitor l Enable Disable Determines whether to enable the EFM protocol
l Disable link performance detection. If it is enabled, the
system detects related links in accordance with
the related protocols and report any exceptions.
3. In the left pane, select ETH > OAM_EFM > Port Configuration. The EFM port
configuration page is displayed, see Figure 5-42.
5-46
4. Click Add. The EFM Interface Modification dialog box is displayed, see Figure 5-43.
5. Modify the parameters. For a description of the parameters, refer to Table 5-16.
Port Port names - Specifies the port for configuring EFM protocols.
in the drop- The EFM function cannot be configured on an air
down list interface.
Status l Enable Disable Determines whether the port uses EFM protocols.
l Disable
5-47
Interface Active mode Active Specifies whether the EFM uses the active or
EFM Mode Passive mode passive mode.
l In active mode, the system can initiate the
discovering process and loopback tests.
l In passive mode, the system cannot initiate
the discovering process or loopback tests.
Link Monitor l Enable Disable Determines whether to enable the link monitoring
Function l Disable function on the port.
Errored 100–60000 1000 Specifies the size of the window for determining
Frame whether the period of error frame exceeds the
Period threshold.
Window (ms)
5-48
6. Click Apply.
– End of Steps –
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Steps
Configuring MD
1. In the left pane, select ETH > OAM_CFM > Global&MD Configuration. The global
and MD configuration page is displayed, see Figure 5-44.
5-49
2. Configure CFM global parameters. For a description of the parameters, refer to Table
5-17.
4. Configure the MD parameters and click Apply. For a description of the parameters,
refer to Table 5-18.
5-50
MD Level 0–7, with 0 indicating 0 Defines the level and scope of Ethernet
the lowest priority and OAM. The level of an MD limits the
7 the highest effective scope of OAM. MDs with
different levels and scopes can provide
users with different OAM services.
The OAM packets in the same MD can
be normally sent and received. The OAM
packets with a higher MD level are directly
transparently transmitted instead of being
processed. The OAM packets with a
lower MD level are directly discarded.
The maintenance scope of each MD
can be defined as required. The
recommended definitions of the values
are:
l 0–2: Operator
l 3–4: Service provider
l 5–7: Customer
Configuring MA
5. In the left pane, select ETH > OAM_CFM > MA Configuration. The MA configuration
page is displayed, see Figure 5-46.
5-51
6. Click Add. The MA Configuration dialog box is displayed, see Figure 5-47.
7. Configure the required parameters. For a description of the parameters, refer to Table
5-19.
5-52
CCM Interval l 3.33 ms 100 ms Specifies the period for sending CC test
l 10 ms packets. CC tests are used to test the
l 100 ms service connectivity.
l 1s Set this parameter to 3.33 ms or 10 ms for
l 10 s high priority services.
l 1 min
l 10 min
8. Click Apply.
Configuring MP
9. In the left pane, select ETH > OAM_CFM > MP Configuration. The MP configuration
page is displayed, see Figure 5-48.
10. Click Add. The MP Configuration dialog box is displayed, see Figure 5-49.
5-53
11. Configure the required parameters. For a description of the parameters, refer to Table
5-20.
5-54
5-55
5-56
5-57
Locate Port Port resource IDs - Specifies the port and its slot for configuring
in the drop-down MP.
list The ports allowing MP configuration are
Ethernet physical ports and Ethernet air
interfaces.
If an Ethernet physical port or air interface
is involved in LACP or PLA aggregation,
the MP can be configured only on the
aggregated port. Members of an aggregation
cannot be configured with MP.
On the RCUB board, only the second
Ethernet electrical port, that is, the GbE port,
allows MP configuration.
This parameter only needs to be configured
for LMEP and MIP. For RMEP, it does not
need configuration.
5-58
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
l The XSTP, which conflicts with the ERPS, is disabled.
l The CFM protocol parameters are configured.
Steps
1. In the left pane, select ETH > ERPS > Global Configuration. The ERPS global
configuration page is displayed, see Figure 5-50.
5-59
2. Configure the ERPS parameters. For a description of the parameters, refer to Table
5-21.
Eastward Port names - Specifies the port and its slot for configuring the
Port in the drop- eastward port of the ERPS protocol.
down list
Westward Resource - Specifies the port and its slot for configuring the
Port IDs in the westward port of the ERPS protocol.
drop-down Only the port configured with LMEP allows the
list configuration of ERPS west port. In addition, the
ERPS function must be enabled for the LMEP.
The westward port and eastward port must be
different.
If an ERPS westward/eastward port is deleted
or added to the aggregation group, the LMEP
5-60
RPL Port l NULL Eastward Determines whether to specify the eastward port
l East- Port or westward port as the RPL port.
ward The RPL port needs to be configured for the
Port NE that is configured as RPL Owner.. For other
l West- NEs, grayed and is not allowed to be configured.
ward
Port
WTR Timer 5–12 5 Specifies the duration for waiting for restoration.
(min) 1 min/step After a link is interrupted, the duration specified
by the Wait To Restore (WRT) Timer parameter
is required for services to restore from the
standby link to the original link. After the services
are restored, the standby link, which is the link
on the RPL port of the RPL OWNER, is blocked.
Hold Off 0–10000 ms, 0 Specifies the time period after which the system
Timer (ms) 100 ms/step reports link interruption and initiates ring network
protection.
The Hold Off timer is designed under the
expectation that the faulty link can be restored
in a certain period.
Guard Timer 10–2000, 10 500 Specifies the time period after which the devices
(ms) ms/step at both ends of a link that is restored from faults
start receiving packets. This timer is designed to
prevent packet expiration.
3. Click Apply.
– End of Steps –
5-61
ERPS 2010 version introduces the concept of multiple rings and multiple instances based
on ERPS 2008 version. It defines VLAN group as a set of one or multiple VLANs. An
ERPS instance is defined as a protocol entity that protects a VLAN group on a physical
ring. All ERPS Instances are independent of one another. They run the ERPS protocol
separately. By blocking different standby links, the ERPS 2.0 protocol implements load
balancing and link protection for different VLANs on the link.
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
l XSTP, ERPSV1, and ELPS, which conflict with ERPS2.0, are disabled.
l The CFM protocol parameters are configured (Enable ERPS parameters when the
MP is configured).
Steps
1. In the left pane, select ETH > ERPS2.0 > Global Configuration. The ERPS2.0 global
configuration page is displayed, see Figure 5-51.
2. Configure the ERPS2.0 parameters. Click Apply. For a description of the parameters,
refer to Table 5-22.
5-62
3. Click Add. The ERPS2.0 Configuration dialog box is displayed, see Figure 5-52.
4. Configure the VLAN group parameters. Click Apply. For a description of the
parameters, refer to Table 5-23.
5. In the left pane, select ETH > ERPS2.0 > Ring Configuration. The Ring
Configuration page is displayed.
6. Click Add. The RPS2.0 Configuration dialog box is displayed, see Figure 5-53.
5-63
7. Configure the ERPS2.0 ring parameters. Click Apply. For a description of the
parameters, refer to Table 5-24.
Rpl Role l RPL Other One ERPS ring only has one RPL owner and
Owner one RPL neighbor at most.
l RPL
Neigh-
bor
l Other
Revertive l Non-Re- Revertive This parameter is valid only when Rpl Role is
Mode vertive set to RPL Owner.
l Re-
vertive
5-64
RPL Port l West - This parameter is valid only when Rpl Role is
Port set to RPL Owner
l East
Port
RAPS Virtual l Disable Enable Determines whether the virtual channel of the
Channel l Enable minor ring is enabled. The control packets of the
minor ring can be propagated in the major ring
after RAPS Virtual Channel is set to Enable.
This parameter is configured only when Ring
Role is set to Minor Ring.
HoldOff- 0–10000 0 Specifies the time period after which the system
Timer(ms) 100 ms/step reports link interruption and initiates ring network
protection.
The Hold Off timer is designed under the
expectation that the faulty link can be restored
in a certain period.
5-65
Guard- 10–2000 500 Specifies the time period after which the devices
Timer(ms) 10 ms/step at both ends of a link that is restored from faults
start receiving packets. This timer is designed to
prevent packet expiration.
8. In the left pane, select ETH > ERPS2.0 > Management CMD. The Management CMD
page is displayed, see Figure 5-54.
5-66
– End of Steps –
5-67
Prerequisite
l The ports where the working channel and protection channel are located are
configured with Ethernet OAM.
l For the MA configuration, the CCM interval is set to 3.3 ms or 10 ms. The sending
intervals of the working channel and protection channel are consistent, and the VLAN
is a single-layer VLAN.
l For the MP configuration, the MP type is Down MP, and ELPS is enabled.
Context
ITU G.8031 is a line protection switching specification defined by ITU-T for VLAN-based
Ethernet. To provide protection, all working resources are configured with protection
resources, such as channels and bandwidth. Compared with the spanning tree protection
defined by IEEE, this protection mechanism, defined by ITU G.8031, supports network
resource switching rapidly and easily in a predictable way, and is easier for the operator to
effectively plan the network, query the network state, and achieve carrier-grade operation.
This specification describes 1+1 unidirectional switching, 1+1 bidirectional switching, 1:1
bidirectional switching, and the APS protocol on which bidirectional switching is dependent.
Only 1:1 bidirectional switching is supported.
Steps
Adding protection group
1. In the left pane, select ETH > ELPS > Protection Group Configuration. The ELPS
Protection Group Configuration page is displayed, see Figure 5-55.
2. Click Add. The protection group addition dialog box is displayed, see Figure 5-56.
5-68
3. Configure ELPS parameters. For a description of the parameters, refer to Table 5-26.
5-69
– End of Steps –
5-70
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Steps
1. Global configuration:
a. In the left pane, select ETH > XSTP > Global Configuration. The XSTP Global
Configuration page is displayed, see Figure 5-58.
5-71
5-72
5-73
5-74
5-75
2. Iinstance configuration:
a. In the left pane, select ETH > XSTP > Instance Configuration. The XSTP
Instance Configuration page is displayed, see Figure 5-59.
b. To modify an instance, select the instance in the list and click Modify. To add an
instance, click Add. The XSTP Instance Configuration dialog box is displayed,
see Figure 5-60.
5-76
3. Port configuration:
a. In the left pane, select ETH > XSTP > Port Configuration. The XSTP Port
Configuration page is displayed, see Figure 5-61.
5-77
b. Select the port to be modified and click Modify. The XSTP Port Configuration
dialog box is displayed, see Figure 5-62.
5-78
5-79
a. In the left pane, select ETH > XSTP > Port Instance Configuration. The XSTP
Port Instance Configuration page is displayed.
b. To modify an item, select the item in the list and click Modify. To add an item,
click Add. The XSTP Port Instance Configuration dialog box is displayed, see
Figure 5-63.
5-80
a. In the left pane, select ETH > XSTP > Port Protection Configuration. The XSTP
Port Protection Configuration page is displayed.
b. To modify an item, select the item in the list and click Modify. To add an item,
click Add. The XSTP Port Protection Configuration dialog box is displayed,
see Figure 5-64.
5-81
Note:
l If the role of the root port configured with Loop Guard is changed, the root
port changes to Discarding state and remains in the Discarding state without
forwarding packets. In this way, loops cannot be formed in the network.
l For the port configured as Root Guard, the port role can only be the specified
port. Once the port receives a configuration message with higher priority, the
status changes to listening and the ports do not forward packets, which also
means the port link is disconnected. If no configuration messages with higher
priority are received in a long period, the port restores to the original state.
– End of Steps –
5-82
3. The base station controller will send orders to the affected base stations to adjust the
traffic rate.
Steps
1. In the left pane, select ETH > LCPT > Core Node Configuration. The Core Node
Configuration page is displayed, see Figure 5-65.
2. From the drop-down list in the Direct Port area, select the port as required.
3. Click Apply.
4. In the left pane, select ETH > LCPT > End Node Configuration. The End Node
Configuration page is displayed, see Figure 5-66.
5. Click Add. The End Node Configuration dialog box is displayed, see Figure 5-67.
6. Configure the end node parameters. For a description of the parameters, refer to Table
5-33.
5-83
7. Click Apply.
8. In the left pane, select ETH > LCPT > Up and Down Info. The Up Info and Down
Info pages are displayed, see Figure 5-68.
– End of Steps –
Context
The OSPF configuration principle is as follows:
l If the Ethernet air interface is used to implement OSPF, only the area ID of the
interface needs to be configured. Other parameters use the defaults. Because OSPF
configurations can be propagated through the air interface, the OSPF configuration
5-84
on one device can take effect on other devices. In this case, in initial state, you only
need to configure OSPF on one device.
l If a panel interface is used to implement OSPF, the IP address and mask of the
interface must be configured. The interface must be configured in the same network
segment as that of the device that the interface is directly connected to.
Steps
1. Configure the OSPF instance.
a. In the left pane, select Routing > OSPF > Instance Configuration. The OSPF
default instance configuration page is displayed, see Figure 5-69.
b. Configure the default OSPF instance. For a description of the parameters, refer
to Table 5-34.
5-85
c. Click Apply.
2. Configure the OSPF interface.
a. In the left pane, select Routing > OSPF > Interface Configuration. The OSPF
interface configuration page is displayed.
b. Click Add. The Interface Configuration dialog box is displayed, see Figure 5-70.
5-86
Interface Interface - Sets the port and slot that the OSPF
resource ID resource IDs interface is configured on.
in the drop-down
list
5-87
5-88
d. Click Apply.
3. Configure the STUB area.
a. In the left pane, select Routing > OSPF > STUB Area Configuration. The STUB
Area Configuration page is displayed, see Figure 5-71.
b. Click Add. Configure the STUB area parameters, and then click Apply. For a
description of the parameters, refer to Table 5-36.
Do not Send l En- Disable Determines whether the ABR in the STUB
Type-3 LSA abled area is allowed to send Type-3 LSA
Information l Dis- information to the internal of the STUB area.
abled
a. In the left pane, select Routing > OSPF > NSSA Area Configuration. The NSSA
Area Configuration page is displayed, see Figure 5-72.
5-89
b. Click Add. Configure the NSSA area parameters, and then click Apply. For a
description of the parameters, refer to Table 5-37.
Type-7 LSA 1–16777215 1 Sets Type-7 LSA default metric value that
Default must be larger than 0.
Metric
Metric Type l Ex- External The OSPF supports two external metric types.
ternal Type 2 External Type 1 uses the same measure unit
Type 1 as that of the OSPF interface value (that is the
l Ex- metric value in the connection status).
ternal The metric of External Type 2 is larger than
Type 2 the internal path metric of any AS. When
External Type 2 is used and a packet is
routed, the metric is the path between ASs. It
is unnecessary to convert the external metric
to the connection state value.
Do not Send l En- Disable Determines whether the ABR in the NSSA
Type-3 LSA abled area is allowed to send Type-3 LSA
Information l Dis- information to the internal of the NSSA area.
abled
5-90
b. Click Add. Configure the virtual connection parameters, and then click Apply. For
a description of the parameters, refer to Table 5-38.
– End of Steps –
5-91
5-92
2 Configure physical (Required) Based on the planned clock network topology, configure
clock ports. the physical clock ports. The physical clock ports support clock input
and output. The ports that support SSM are Ethernet ports, radio
ports, and STM-N ports.
l If the clock source is selected in accordance with the SSM
algorithm and the site uses the Ethernet, radio, and STM-N
ports as the clock output port, physical clock ports must be
configured.
l The clock ports must be configured if the clock needs to be
obtained from an external source. If no external clock is
needed, the clock port does not need configuration.
l If the site serves as the Precision Time Protocol (PTP) common
clock or PTP edge clock, the physical clock port of PTP type
needs to be configured. If the site serves only as the PTP
transparent clock, the physical clock port of PTP type does not
need to be configured.
For the configuration procedure, refer to “6.2 Configuring Physical
Clock Ports”.
3 Configure global Required if the clock source needs to be selected based on quality
SSM parameters. or the clock topology is ring.
For the configuration procedure, refer to “6.3 Configuring SSM
Global Parameters”.
4 Configure the PTP Required if the PTP clock source needs to be configured.
clock. For the configuration procedure, refer to “6.4 Configuring the PTP
Clock ”.
6-1
6 Query the selected Required if the current clock source needs to be checked.
clock source. For the configuration procedure, refer to “6.6 Querying the Selected
Clock Source”.
Table of Contents
Configuring Global Clock Parameters.........................................................................6-2
Configuring Physical Clock Ports................................................................................6-3
Configuring SSM Global Parameters ..........................................................................6-4
Configuring the PTP Clock ........................................................................................6-6
Configuring Air Interface TC .....................................................................................6-10
Querying the Selected Clock Source ........................................................................6-10
Steps
1. In the left pane, select Clock > Management > Global Configuration. The global
configuration page is displayed, see Figure 6-1.
6-2
3. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Clock > Management > Port Configuration. The clock port
configuration page is displayed, see Figure 6-2.
6-3
2. The information of all configurable clock resources is displayed in the page. Select the
clock source to be added, and click Add. The Clock Port Configuration dialog box
is displayed, see Figure 6-3.
– End of Steps –
6-4
Steps
1. In the left pane, select Clock > SSM > Global Configuration. The SSM global
configuration page is displayed, see Figure 6-4.
2. Configure the SSM global parameters. For a description of the parameters, refer to
Table 6-1.
3. Click Apply.
– End of Steps –
6-5
The parameters include Precision Time Protocol (PTP) clock type, whether to serve
as a slave clock only, whether to enable BMC algorithm configuration, packet loss rate
threshold, Clock Priority1 configuration, Clock Priority2 configuration, clock precision,
and clock level.
l Configure PTP port parameters
The parameters include physical port information, PTP logical port, PTP port switch,
destination device IP address and gateway of PTP packets, port status, whether to use
unicast negotiation (for unicast mode only), packet transmission interval and duration,
packet protocol type, and link compensation.
l Manually configure the asymmetry compensation value for the 1588 clock.
l Manually configure the cable delay compensation value
It is an asymmetry compensation for AOU, including the cable delay compensation
value from IDU to AOU and the cable delay compensation value from AOU to IDU.
Prerequisite
l The board where the PTP port resides is configured.
l The Ethernet port application is configured for the board.
Steps
Configuring the 1588 clock port
1. In the left pane, select Clock > Management > Port Configuration, and click Add.
In the displayed dialog box, set the clock type to PTP, or PTP+SyncE, and set other
parameters, see Figure 6-5.
6-6
2. Click Apply.
Configuring PTP global parameters
3. In the left pane, select Clock > PTP > Global Configuration. The global configuration
page is displayed, see Figure 6-6.
6-7
7. Click Apply.
Configuring the asymmetry compensation value for the 1588 clock
6-8
8. In the left pane, select Clock > PTP > Asymmetry Compensation Value
Configuration. The Asymmetry Compensation Value Configuration page is
displayed, see Figure 6-8.
9. Select a port to be configured, and click Modify. In the displayed dialog box, set
Asymmetry Compensation Value, see Figure 6-9.
Compensation value range: –100,000 ns to 100,000 ns.
6-9
12. Select the required port and click Modify. The Cable Delay Compensation Value
Configuration dialog box is displayed, see Figure 6-11.
13. Set the cable delay compensation value in both directions. The allowed range is -0 ns
to 100000 ns.
14. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Clock > Radio Port TC > Port Configuration. The Port
Configuration page is displayed, see Figure 6-12.
6-10
Steps
1. In the left pane, select Clock > Info > Clock Source. The clock source information
page is displayed, see Figure 6-13.
2. View the clock information, such as rack, shelf, slot, PortId, clock type, configuration
mode, SSM payload, and SSM priority, clock port index, and PLL status.
– End of Steps –
6-11
6-12
Steps
1. In the left pane, select Routing > Static Routing. The Static Routing Configuration
page is displayed.
2. Click Add. The Static Routing Configuration dialog box is displayed, see Figure
7-1. For a description of the parameters, refer to Table 7-1.
7-1
3. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Maintenance > Auxiliary Service > EOW. The EOW
configuration page is displayed, see Figure 7-2.
7-2
2. Configure the parameters of all related sites. For a description of the parameters, refer
to Table 7-2.
Global l Open An EOW call can be made only when both sites at
Enable l Close the two ends and the relay sites are globally enabled.
Site Type l Call Site For a point-to-point call, the Site Type at both ends
l Relay Site are configured as Call Site.
For a cross-site call, the Site Type at both ends
are configured as Call Site and the relay sites are
configured as Relay Site. Multiple relay sites are
allowed.
3. Insert the headset into the EOW interface of the RCMUC/RCMUD board, and then
press Call. After hearing the buzzer sound, the opposite party insert a headset and
start the conversation.
The devices at the ends of a point-to-point calling can communicate with each other.
7-3
The devices at the ends of a cross-site calling can communicate with each other.
The relay devices only serve for back-to-back transmission of voice data on the air
interface.
– End of Steps –
Prerequisite
For EDI input alarm configuration, all ports are connected to the alarm generation devices.
For EDI output alarm configuration, all output ports are connected to the alarm detection
devices.
Steps
l Configuring EDI Input Alarms
1. In the left pane, select Home > Home. The board interface diagram is displayed,
see Figure 7-3.
7-4
3. In the left pane, select Maintenance > Auxiliary Service > EDI > Input. The EDI
input page is displayed, see Figure 7-5.
4. Select a record, and click Modify. The EDI IN dialog box is displayed, see Figure
7-6.
1. In the left pane, select Home > Home, and double-click the EDI out / SC interface
to enable it.
2. In the left pane, select Maintenance > Auxiliary Service > EDI > Output. The
EDI output configuration page is displayed, see Figure 7-7.
7-5
3. Select an output record, and click Modify. The EDI OUT dialog box is displayed,
see Figure 7-8.
Prerequisite
For the port monitoring function, the monitoring interface is correctly connected to the
cabinet to be monitored.
Steps
1. In the left pane, select Home > Home.
7-6
4. Select a record, and click Modify. The configuration information is expanded, see
Figure 7-10.
Prerequisite
You have already logged in to the LMT as the administrator.
Steps
Configuring the Lockout Information
1. In the left pane, select Security Management > User. The User Security page is
displayed, see Figure 7-11.
7-7
2. In the User Security Management area, configure the Lockout Threshold and the
Lockout Time. For a description of the lockout parameters, refer to the following table.
Lockout 1–10 Integer 5 Number of times that a user is allowed to enter wrong
Thresh- passwords. The user will be locked if this threshold
old is exceeded.
Lockout 10, 20, 30, 40, 10 Time (minute) for locking a user. The user will be
Time 50, 60 automatically unlocked when the time is exceeded.
3. Click Apply.
Configuring User Disable/Enable
4. In the User Management area, select the user name to be modified. Click Modify.
The User Info Configuration dialog box is displayed, see Figure 7-12.
7-8
Steps
1. In the left pane, select Security > Radio Encryption. The Radio Encryption page
is displayed, see Figure 7-13.
3. Click Apply.
– End of Steps –
7-9
7-10
Steps
1. In the left pane, select Setup > System > Parameter. The NE information page is
displayed, see Figure 8-1.
8-1
Red Critical
Orange Major
Yellow Minor
Steps
1. Log in to the Web LMT.
2. In the left pane, select Alarm > Current.
3. In the Current Alarm area in the right pane, select the slot No. and alarm level, and
then click Query. The query result is displayed in the lower part, see Figure 8-2.
4. Select an alarm, and click Detail to view the alarm details, see .
8-2
Figure 8.1
– End of Steps –
Steps
1. In the left pane, select Alarm > History.
2. Check the history alarms in the right pane, see Figure 8-3.
– End of Steps –
8-3
8-4
CC
- Connection Confirmation
CFM
- Connectivity Fault Management
CIR
- Committed Information Rate
DR
- Designated Router
EDI
- External Device Interface
EFM
- Ethernet in the First Mile
EOW
- Engineering Order-Wire
ERPS
- Ethernet Ring Protection Switching
IDU
- Indoor Unit
IP
- Internet Protocol
LACP
- Link Aggregation Control Protocol
LLDP
- Link Layer Discovery Protocol
LMEP
- Local Maintenance association End Point
LMT
- Local Maintenance Terminal
MA
- Maintenance Association
MAC
- Message Authentication Code
MIB
- Management Information Base
MIP
- Maintenance domain Intermediate Point
MP
- Maintenance Point
MSE
- Mean Square Error
MSTP
- Multiple Spanning Tree Protocol
NBMA
- Non-Broadcast Multiple Access
NMS
- Network Management System
ODU
- Outdoor Unit
OSPF
- Open Shortest Path First
OUI
- Organizationally Unique Identifier
PBS
- Peak Burst Size
PIR
- Peak Information Rate
II
PTP
- Precision Time Protocol
QoS
- Quality of Service
RED
- Random Early Detection
RMEP
- Remote Maintenance association End Point
RSTP
- Rapid Spanning Tree Protocol
SNCP
- Sub-Network Connection Protection
SNMP
- Simple Network Management Protocol
SSM
- Synchronization Status Message
STP
- Spanning Tree Protocol
SVLAN
- Service Virtual Local Area Network
TCP
- Transmission Control Protocol
TDM
- Time Division Multiplexing
VLAN
- Virtual Local Area Network
WRED
- Weighted Random Early Detection
III