You are on page 1of 326

INSTALLATION AND OPERATION MANUAL

Egate-2000
Carrier Ethernet Aggregation for PDH and SDH/SONET
Version 1.0

Egate-2000
Carrier Ethernet Aggregation for PDH and SDH/SONET
Version 1.0

Installation and Operation Manual Notice


This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD"). No part of this publication may be reproduced in any form whatsoever without prior written approval by RAD Data Communications. Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other intellectual property or other proprietary rights relating to this manual and to the Egate-2000 and any software components contained therein are proprietary products of RAD protected under international copyright law and shall be and remain solely with RAD. The Egate-2000 product name is owned by RAD. No right, license, or interest to such trademark is granted hereunder, and you agree that no such right, license, or interest shall be asserted by you with respect to such trademark. The RAD name, logo, logotype, and the terms EtherAccess, TDMoIP and TDMoIP Driven, and the product names Optimux and IPmux, are registered trademarks of RAD Data Communications Ltd. All other trademarks are the property of their respective holders. You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the Egate-2000. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute, license, or sell any product that supports substantially similar functionality as the Egate-2000, based on or derived in any way from the Egate-2000. Your undertaking in this paragraph shall survive the termination of this Agreement. This Agreement is effective upon your opening of the Egate-2000 package and shall continue until terminated. RAD may terminate this Agreement upon the breach by you of any term hereof. Upon such termination by RAD, you agree to return to RAD the Egate-2000 and all copies and portions thereof. For further information contact RAD at the address below or contact your local distributor.

International Headquarters RAD Data Communications Ltd. 24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel: 972-3-6458181 Fax: 972-3-6498250, 6474436 E-mail: market@rad.com

North America Headquarters RAD Data Communications Inc. 900 Corporate Drive Mahwah, NJ 07430, USA Tel: (201) 5291100, Toll free: 1-800-4447234 Fax: (201) 5295777 E-mail: market@radusa.com

20052009 RAD Data Communications Ltd.

Publication No. 531-200-05/12

Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the Egate-2000 to be delivered hereunder shall be free of defects in material and workmanship under normal use and service for a period of twelve (12) months following the date of shipment to DISTRIBUTOR. If, during the warranty period, any component part of the equipment becomes defective by reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the event that RAD requests the return of equipment, each party shall pay one-way shipping costs. RAD shall be released from all obligations under its warranty in the event that the equipment has been subjected to misuse, neglect, accident or improper installation, or if repairs or modifications were made by persons other than RAD's own authorized service personnel, unless such repairs by others were made with the written consent of RAD. The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties which extend beyond the face hereof, including, but not limited to, warranties of merchantability and fitness for a particular purpose, and in no event shall RAD be liable for consequential damages. RAD shall not be liable to any person for any special or indirect damages, including, but not limited to, lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale, handling, repair, maintenance or use of the Egate-2000, and in no event shall RAD's liability exceed the purchase price of the Egate-2000. DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to Egate-2000 and for ensuring that replacements and other adjustments required in connection with the said warranties are satisfactory. Software components in the Egate-2000 are provided "as is" and without warranty of any kind. RAD disclaims all warranties including the implied warranties of merchantability and fitness for a particular purpose. RAD shall not be liable for any loss of use, interruption of business or indirect, special, incidental or consequential damages of any kind. In spite of the above RAD shall do its best to provide error-free software products and shall offer free Software updates during the warranty period under this Agreement. RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims, demands, or actions arising out of or relating to this Agreement and the Egate-2000 shall not exceed the sum paid to RAD for the purchase of the Egate-2000. In no event shall RAD be liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been advised of the possibility of such damages. This Agreement shall be construed and governed in accordance with the laws of the State of Israel.

Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste equipment in protecting the environment, the owner of this RAD product is required to refrain from disposing of this product as unsorted municipal waste at the end of its life cycle. Upon termination of the units use, customers should provide for its collection for reuse, recycling or other form of environmentally conscientious disposal.

General Safety Instructions


The following instructions serve as a general guide for the safe installation and operation of telecommunications products. Additional instructions, if applicable, are included inside the manual.

Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential safety hazards regarding product operation or maintenance to operator or service personnel.

Warning

Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.

Protective ground: the marked lug or terminal should be connected to the building protective ground bus.

Warning

Some products may be equipped with a laser diode. In such cases, a label with the laser class and other warnings as applicable will be attached near the optical transmitter. The laser warning symbol may be also attached. Please observe the following precautions: Before turning on the equipment, make sure that the fiber optic cable is intact and is connected to the transmitter. Do not attempt to adjust the laser drive current. Do not use broken or unterminated fiber-optic cables/connectors or look straight at the laser beam. The use of optical devices with the equipment will increase eye hazard.

Use of controls, adjustments or performing procedures other than those specified herein, may result in hazardous radiation exposure. ATTENTION: The laser beam may be invisible! In some cases, the users may insert their own SFP laser transceivers into the product. Users are alerted that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are used. In particular, users are warned to use only agency approved products that comply with the local laser safety regulations for Class 1 laser products. Always observe standard safety precautions during installation, operation and maintenance of this product. Only qualified and authorized service personnel should carry out adjustment, maintenance or repairs to this product. No installation, adjustment, maintenance or repairs should be performed by either the operator or the user.

Handling Energized Products


General Safety Practices
Do not touch or tamper with the power supply when the power cord is connected. Line voltages may be present inside certain products even when the power switch (if installed) is in the OFF position or a fuse is blown. For DC-powered products, although the voltages levels are usually not hazardous, energy hazards may still exist. Before working on equipment connected to power lines or telecommunication lines, remove jewelry or any other metallic object that may come into contact with energized parts. Unless otherwise specified, all products are intended to be grounded during normal use. Grounding is provided by connecting the mains plug to a wall socket with a protective ground terminal. If a ground lug is provided on the product, it should be connected to the protective ground at all times, by a wire with a diameter of 18 AWG or wider. Rack-mounted equipment should be mounted only in grounded racks and cabinets. Always make the ground connection first and disconnect it last. Do not connect telecommunication cables to ungrounded equipment. Make sure that all other cables are disconnected before disconnecting the ground. Some products may have panels secured by thumbscrews with a slotted head. These panels may cover hazardous circuits or parts, such as power supplies. These thumbscrews should therefore always be tightened securely with a screwdriver after both initial installation and subsequent access to the panels.

Connecting AC Mains
Make sure that the electrical installation complies with local codes. Always connect the AC plug to a wall socket with a protective ground. The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Always connect the power cord first to the equipment and then to the wall socket. If a power switch is provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed in the building installation. In cases when the power distribution system is IT type, the switch must disconnect both poles simultaneously.

Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference to the ground. Any single pole can be externally grounded. Due to the high current capability of DC power systems, care should be taken when connecting the DC supply to avoid short-circuits and fire hazards. DC units should be installed in a restricted access area, i.e. an area where access is authorized only to qualified service and maintenance personnel. Make sure that the DC power supply is electrically isolated from any AC source and that the installation complies with the local codes.

The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate the circuit breaker of the panel board that services the equipment and switch it to the OFF position. When connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the positive pole and last the negative pole. Switch the circuit breaker back to the ON position. A readily accessible disconnect device that is suitably rated and approved should be incorporated in the building installation. If the DC power supply is floating, the switch must disconnect both poles simultaneously.

Connecting Data and Telecommunications Cables


Data and telecommunication interfaces are classified according to their safety status. The following table lists the status of several standard interfaces. If the status of a given port differs from the standard one, a notice will be given in the manual.

Ports V.11, V.28, V.35, V.36, RS-530, X.21, 10 BaseT, 100 BaseT, Unbalanced E1, E2, E3, STM, DS-2, DS-3, S-Interface ISDN, Analog voice E&M xDSL (without feeding voltage), Balanced E1, T1, Sub E1/T1

Safety Status SELV Safety Extra Low Voltage: Ports which do not present a safety hazard. Usually up to 30 VAC or 60 VDC.

TNV-1 Telecommunication Network Voltage-1: Ports whose normal operating voltage is within the limits of SELV, on which overvoltages from telecommunications networks are possible. TNV-2 Telecommunication Network Voltage-2: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are not possible. These ports are not permitted to be directly connected to external telephone and data lines. TNV-3 Telecommunication Network Voltage-3: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are possible.

FXS (Foreign Exchange Subscriber)

FXO (Foreign Exchange Office), xDSL (with feeding voltage), U-Interface ISDN

Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a qualified safety engineer. Always make sure that the equipment is grounded before connecting telecommunication cables. Do not disconnect the ground connection before disconnecting all telecommunications cables. Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra caution should be exercised during thunderstorms.

When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The grounding and bonding of the ground connections should comply with the local codes. The telecommunication wiring in the building may be damaged or present a fire hazard in case of contact between exposed external wires and the AC power lines. In order to reduce the risk, there are restrictions on the diameter of wires in the telecom cables, between the equipment and the mating connectors.

Caution

To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line cords.

Attention

Pour rduire les risques sincendie, utiliser seulement des conducteurs de tlcommunications 26 AWG ou de section suprieure.

Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such cases, a notice will be given in the installation instructions. Do not attempt to tamper with any carrier-provided equipment or connection hardware.

Electromagnetic Compatibility (EMC)


The equipment is designed and approved to comply with the electromagnetic regulations of major regulatory bodies. The following instructions may enhance the performance of the equipment and will provide better protection against excessive emission and better immunity against disturbances. A good ground connection is essential. When installing the equipment in a rack, make sure to remove all traces of paint from the mounting points. Use suitable lock-washers and torque. If an external grounding lug is provided, connect it to the ground bus using braided wire as short as possible. The equipment is designed to comply with EMC requirements when connecting it with unshielded twisted pair (UTP) cables. However, the use of shielded wires is always recommended, especially for high-rate data. In some cases, when unshielded wires are used, ferrite cores should be installed on certain cables. In such cases, special instructions are provided in the manual. Disconnect all wires which are not in permanent use, such as cables used for one-time configuration. The compliance of the equipment with the regulations for conducted emission on the data lines is dependent on the cable quality. The emission is tested for UTP with 80 dB longitudinal conversion loss (LCL). Unless otherwise specified or described in the manual, TNV-1 and TNV-3 ports provide secondary protection against surges on the data lines. Primary protectors should be provided in the building installation. The equipment is designed to provide adequate protection against electro-static discharge (ESD). However, it is good working practice to use caution when connecting cables terminated with plastic connectors (without a grounded metal hood, such as flat cables) to sensitive data lines. Before connecting such cables, discharge yourself by touching ground or wear an ESD preventive wrist strap.

FCC-15 User Information


This equipment has been tested and found to comply with the limits of the Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the Installation and Operation manual, may cause harmful interference to the radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

Canadian Emission Requirements


This Class A digital apparatus meets all the requirements of the Canadian Interference-Causing Equipment Regulation. Cet appareil numrique de la classe A respecte toutes les exigences du Rglement sur le matriel brouilleur du Canada.

Warning per EN 55022 (CISPR-22)


Warning
This is a class A product. In a domestic environment, this product may cause radio interference, in which case the user will be required to take adequate measures. Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre demand lutilisateur de prendre les mesures appropries. Das vorliegende Gert fllt unter die Funkstrgrenzwertklasse A. In Wohngebieten knnen beim Betrieb dieses Gertes Rundfunkstrrungen auftreten, fr deren Behebung der Benutzer verantwortlich ist.

Avertissement

Achtung

Mise au rebut du produit


Afin de faciliter la rutilisation, le recyclage ainsi que d'autres formes de rcupration d'quipement mis au rebut dans le cadre de la protection de l'environnement, il est demand au propritaire de ce produit RAD de ne pas mettre ce dernier au rebut en tant que dchet municipal non tri, une fois que le produit est arriv en fin de cycle de vie. Le client devrait proposer des solutions de rutilisation, de recyclage ou toute autre forme de mise au rebut de cette unit dans un esprit de protection de l'environnement, lorsqu'il aura fini de l'utiliser.

Franais
Avertissement

Instructions gnrales de scurit


Les instructions suivantes servent de guide gnral d'installation et d'opration scurises des produits de tlcommunications. Des instructions supplmentaires sont ventuellement indiques dans le manuel.

Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques potentiels de scurit pour l'oprateur ou le personnel de service, quant l'opration du produit ou sa maintenance.

Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le produit est sous tension ou connect des lignes externes de tlcommunications.

Mise la terre de protection : la cosse ou la borne marque devrait tre connecte la prise de terre de protection du btiment.

Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre optique est intact et qu'il est connect au transmetteur. Ne tentez pas d'ajuster le courant de la commande laser. N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans terminaison et n'observez pas directement un rayon laser. L'usage de priphriques optiques avec l'quipement augmentera le risque pour les yeux.

L'usage de contrles, ajustages ou procdures autres que celles spcifies ici pourrait rsulter en une dangereuse exposition aux radiations. ATTENTION : Le rayon laser peut tre invisible ! Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par l'agence et conformes la rglementation locale de scurit laser pour les produits laser de classe 1. Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation, d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou l'utilisateur.

Manipuler des produits sous tension


Rgles gnrales de scurit
Ne pas toucher ou altrer l'alimentation en courant lorsque le cble d'alimentation est branch. Des tensions de lignes peuvent tre prsentes dans certains produits, mme lorsque le commutateur (s'il est install) est en position OFF ou si le fusible est rompu. Pour les produits aliments par CC, les niveaux de tension ne sont gnralement pas dangereux mais des risques de courant peuvent toujours exister. Avant de travailler sur un quipement connect aux lignes de tension ou de tlcommunications, retirez vos bijoux ou tout autre objet mtallique pouvant venir en contact avec les pices sous tension. Sauf s'il en est autrement indiqu, tous les produits sont destins tre mis la terre durant l'usage normal. La mise la terre est fournie par la connexion de la fiche principale une prise murale quipe d'une borne protectrice de mise la terre. Si une cosse de mise la terre est fournie avec le produit, elle devrait tre connecte tout moment une mise la terre de protection par un conducteur de diamtre 18 AWG ou plus. L'quipement mont en chssis ne devrait tre mont que sur des chssis et dans des armoires mises la terre. Branchez toujours la mise la terre en premier et dbranchez-la en dernier. Ne branchez pas des cbles de tlcommunications un quipement qui n'est pas mis la terre. Assurez-vous que tous les autres cbles sont dbranchs avant de dconnecter la mise la terre.

Franais

Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant, sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut aussi tre joint. Avertissement Veuillez observer les prcautions suivantes :

Connexion au courant du secteur


Assurez-vous que l'installation lectrique est conforme la rglementation locale. Branchez toujours la fiche de secteur une prise murale quipe d'une borne protectrice de mise la terre. La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A. Branchez toujours le cble d'alimentation en premier l'quipement puis la prise murale. Si un commutateur est fourni avec l'quipement, fixez-le en position OFF. Si le cble d'alimentation ne peut pas tre facilement dbranch en cas d'urgence, assurez-vous qu'un coupe-circuit ou un disjoncteur d'urgence facilement accessible est install dans l'installation du btiment. Le disjoncteur devrait dconnecter simultanment les deux ples si le systme de distribution de courant est de type IT.

Franais

Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par rapport la mise la terre. Tout ple doit tre mis la terre en externe. A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques d'incendie. Les units CC devraient tre installes dans une zone accs restreint, une zone o l'accs n'est autoris qu'au personnel qualifi de service et de maintenance. Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que l'installation est conforme la rglementation locale. La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A. Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le ple ngatif. Remettez le coupe-circuit en position ON. Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du btiment. Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC est flottante.

Declaration of Conformity
Manufacturer's Name: Manufacturer's Address: RAD Data Communications Ltd. 24 Raoul Wallenberg St. Tel Aviv 69719 Israel

Declares that the product: Product Name: Egate-2000

Conforms to the following standard(s) or other normative document(s): EMC: EN 55022:1998 + A1:2000, A2: 2003 EN 55024: 1998 + A1:2001, A2:2003 Safety: EN 60950-1:2001 + A11:2004 Information technology equipment Radio disturbance characteristics Limits and methods of measurement. Information technology equipment Immunity characteristics Limits and methods of measurement. Information technology equipment Safety Part 1: General requirements

Supplementary Information: The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the Low Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product was tested in a typical configuration. Tel Aviv, 14 January 2008

Haim Karshen VP Quality European Contact: RAD Data Ottobrunn-Riemerling, Germany Communications GmbH, Otto-Hahn-Str. 28-30, 85521

Glossary
Address Agent Analog ANSI AWG Balanced

A coded representation of the origin or destination of data. In SNMP, this refers to the managed system. A continuous wave or signal (such as human voice). American National Standards Institute. The American Wire Gauge System, which specifies wire width. A transmission line in which voltages on the two conductors are equal in magnitude, but opposite in polarity, with respect to ground. The range of frequencies passing through a given circuit. The greater the bandwidth, the more information can be sent through the circuit in a given amount of time. Unit of signaling speed equivalent to the number of discrete conditions or events per second. If each signal event represents only one bit condition, baud rate equals bps (bits per second). The smallest unit of information in a binary system. Represents either a one or zero (1 or 0). A process used in time division multiplexing where individual bits from different lower speed channel sources are combined (one bit from one channel at a time) into one continuous higher speed bit stream. A measure of data transmission rate in serial transmission. A device interconnecting local area networks at the OSI data link layer, filtering and forwarding frames according to media access control (MAC) addresses. A storage device. Commonly used to compensate for differences in data rates or event timing when transmitting from one device to another. Also used to remove jitter. A transmission path or channel. A bus is typically an electrical connection with one or more conductors, where all attached devices receive all transmissions at the same time. A group of bits (normally 8 bits in length). A continuous signal at a fixed frequency that is capable of being modulated with a second (information carrying) signal.

Bandwidth

Baud

Bit Bit Interleaving/Multiplexing

bps (Bits Per Second) Bridge

Buffer

Bus

Byte Carrier

Cell

The 53-byte basic information unit within an ATM network. The user traffic is segmented into cells at the source and reassembled at the destination. An ATM cell consists of a 5-byte ATM header and a 48-byte ATM payload, which contains the user data. A path for electrical transmission between two or more points. Also called a link, line, circuit or facility. A term for the source(s) of timing signals used in synchronous transmission. Any of several techniques that reduce the number of bits required to represent information in data transmission or storage, thereby conserving bandwidth and/or memory. Device that serves as a wiring hub in a star-topology network. Sometimes refers to a device containing multiple modules of network equipment. A state in which the network is overloaded and starts to discard user data (frames, cells or packets). Information represented in digital form, including voice, text, facsimile and video. Layer 2 of the OSI model. The entity, which establishes, maintains, and releases data-link connections between elements in a network. Layer 2 is concerned with the transmission of units of information, or frames, and associated error checking. A unit used to measure relative increase or decrease in power, voltage or current, using a logarithmic scale. A measure of power in communications: the decibel in reference to one milliwatt (0 dBm = 1 milliwatt and -30 dBm = .001 milliwatt). See dB. The detection and isolation of a malfunction or mistake in a communications device, network or system. Differential delay is caused when traffic is split over different lines that may traverse shorter and longer paths. Products like the RAD IMX-2T1/E1 inverse multiplexer compensate for any differential delay (up to 64 msec) between the T1 lines, to properly reconstruct the original stream. The binary (1 or 0) output of a computer or terminal. In data communications, an alternating, non-continuous (pulsating) signal. The European standard for high speed digital transmission, operating at 34 Mbps.

Channel Clock Compression

Concentrator

Congestion Data Data Link Layer

dB (Decibel) dBm

Decibel Diagnostics Differential Delay

Digital E3

Encapsulation

Encapsulating data is a technique used by layered protocols in which a low level protocol accepts a message from a higher level protocol, then places it in the data portion of the lower-level frame. The logistics of encapsulation require that packets traveling over a physical network contain a sequence of headers. A local area network (LAN) technology which has extended into the wide area networks. Ethernet operates at many speeds, including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps. Ethernet operation, administration and maintenance (OAM) are a set of standardized protocols for measuring and controlling network performance. There are two layers of Ethernet OAM: Service OAM (provides end-to-end connectivity fault management per customer service instance, even in multi-operator networks) and Link or Segment OAM (detailed monitoring and troubleshooting of an individual physical or emulated link). A congestion control mechanism that results in an ATM system implementing flow control. A logical grouping of information sent as a link-layer unit over a transmission medium. The terms packet, datagram, segment, and message are also used to describe logical information groupings. At the physical and data link layers of the OSI model, bits are fit into units called frames. Frames contain source and destination information, flags to designate the start and end of the frame, plus information about the integrity of the frame. All other information, such as network protocols and the actual payload of data, is encapsulated in a packet, which is encapsulated in the frame. A circuit or device permitting transmission in two directions (sending and receiving) at the same time. A voice interface, emulating a PBX extension, as it appears to the CO (Central Office) for connecting a PBX extension to a multiplexer. A voice interface, emulating the extension interface of a PBX (or subscriber interface of a CO) for connecting a regular telephone set to a multiplexer. Gateways are points of entrance and exit from a communications network. Viewed as a physical entity, a gateway is that node that translates between two otherwise incompatible networks or network segments. Gateways perform code and protocol conversion to facilitate traffic between data highways of differing architecture. In telecommunications, the process of separating and segregating channels by combing, such that the broadest channel possible can be assembled and sent across the longest practical link. The aim is to minimize de-multiplexing traffic and reshuffling it electrically.

Ethernet

Ethernet OAM

Flow Control Frame

Framing

Full Duplex FXO (Foreign Exchange Office) FXS (Foreign Exchange Subscriber) Gateway

Grooming

Half Duplex Interface

A circuit or device capable of transmitting in two directions, but not at the same time. A shared boundary, defined by common physical interconnection characteristics, signal characteristics, and meanings of exchanged signals. Also known as an Internet address. A unique string of numbers that identifies a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers from 0 to 255, separated by periods (for example, 1.0.255.123). The deviation of a transmission signal in time or phase. It can introduce errors and loss of synchronization in high speed synchronous communications. A device that transmits an extremely narrow and coherent beam of electromagnetic energy in the visible light spectrum. Used as a light source for fiber optic transmission (generally more expensive, shorter lived, single mode only, for greater distances than LED). A type of diagnostic test in which the transmitted signal is returned to the sending device after passing through all or part of a communications link or network. A network that provides regional connectivity within a metropolitan area (such as a city). An application that receives Simple Network Management Protocol (SNMP) information from an agent. An agent and manager share a database of information, called the Management Information Base (MIB). An agent can use a message called a traps-PDU to send unsolicited information to the manager. A manager that uses the RADview MIB can query the RAD device, set parameters, sound alarms when certain conditions appear, and perform other administrative tasks. The source of timing signals (or the signals themselves) that all network stations use for synchronization. A fiber with a large core diameter; 50-200 microns compared with the wavelength of light. It therefore propagates more than one mode. With multimode fiber, light traverses multiple paths, some longer than others. This leads to dispersion, which reduces optical range. At one end of a communications link, a device that combines several lower speed transmission channels into a single high speed channel. A multiplexer at the other end reverses the process. Sometimes called a mux. See Bit Interleaving/Multiplexing. (1) An interconnected group of nodes. (2) A series of points, nodes, or stations connected by communications channels; the collection of equipment through which connections are made between data stations.

IP Address

Jitter

Laser

Loopback

MAN (Metropolitan Area Network) Manager

Master Clock Multimode Fiber

Multiplexer

Network

Node Packet parameters

A point of interconnection to a network. An ordered group of data and control signals transmitted through a network, as a subset of a larger message. Parameters are often called arguments, and the two words are used interchangeably. However, some computer languages such as C define argument to mean actual parameter (i.e., the value), and parameter to mean formal parameter. In RAD CLI, parameter means formal parameter, not value. The 48-byte segment of the ATM cell containing user data. Any adaptation of user data via the AAL will take place within the payload. Layer 1 of the OSI model. The layer concerned with electrical, mechanical, and handshaking procedures over the interface connecting a device to the transmission medium. The physical interface to a computer or multiplexer, for connection of terminals and modems. One or more characters in a command line interface to indicate that the computer is ready to accept typed input. A formal set of conventions governing the formatting and relative timing of message exchange between two communicating systems. Refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks. An interconnection device that connects individual LANs. Unlike bridges, which logically connect at OSI Layer 2, routers provide logical paths at OSI Layer 3. Like bridges, remote sites can be connected using routers over dedicated or switched lines to create WANs. A common mode of transmission, where the character bits are sent sequentially one at a time instead of in parallel. Describing an optical wave-guide or fiber that is designed to propagate light of only a single wavelength (typically 5-10 microns in diameter). In telecommunications, the absence of a signal. Equivalent to a binary 0. See Synchronous Transmission. Transmission in which data bits are sent at a fixed rate, with the transmitter and receiver synchronized.

Payload

Physical Layer

Port prompt Protocol

QoS (Quality of Service)

Router

Serial Transmission Single Mode

Space Sync Synchronous Transmission

T1

A digital transmission link with a capacity of 1.544 Mbps used in North America. Typically channelized into 24 DS0s, each capable of carrying a single voice conversation or data stream. Uses two pairs of twisted pair wires. A digital transmission link with a capacity of 45 Mbps, or 28 T1 lines. The virtual terminal protocol in the Internet suite of protocols. It lets users on one host access another host and work as terminal users of that remote host. Instead of dialing into the computer, the user connects to it over the Internet using Telnet. When issuing a Telnet session, it connects to the Telnet host and logs in. The connection enables the user to work with the remote machine as though a terminal was connected to it. The amount of information transferred through the network between two users in a given period, usually measured in the number of packets per second (pps). A portion of a serial multiplex of timeslot information dedicated to a single channel. In E1 and T1, one timeslot typically represents one 64 kbps channel. A device that is doing the Layer 2 bridging according to the VLAN tag in addition to the standard bridging parameters. A VLAN-aware device will not strip or add any VLAN header.

T3 Telnet

Throughput

Timeslot

VLAN-Aware

Publication No. 531-200-05/12

Order this publication by Catalog No. 803927

International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail market@rad.com

North America Headquarters


900 Corporate Drive Mahwah, NJ 07430, USA Tel. 201-5291100 Toll free 1-800-4447234 Fax 201-5295777 E-mail market@rad.com

www.rad.com

Contents
Chapter 1. Hardware Description 1.1 Using this Guide ......................................................................................................... 1-1 Who This Guide Is For ............................................................................................. 1-1 What This Guide Covers .......................................................................................... 1-1 What You Should Already Know .............................................................................. 1-1 Safety Signs Conventions ........................................................................................ 1-1 Mouse Operation Conventions ................................................................................ 1-2 Chapter Organization .............................................................................................. 1-2 Introduction- Egate-2000 ........................................................................................... 1-3 Front Panel ............................................................................................................. 1-3 Cards Overview ....................................................................................................... 1-3 Card Population Rule .................................................................................................. 1-4 Telecom bus allocation details................................................................................. 1-4 Card slot details ...................................................................................................... 1-4 Slot allotment ......................................................................................................... 1-4 Power Supply Unit ...................................................................................................... 1-5 DC Power Supply Unit Egate-2000M-PS ................................................................ 1-5 Front Panel ........................................................................................................ 1-5 Functional Description ............................................................................................ 1-6 Design Specifications .............................................................................................. 1-6 Cross Connect Card .................................................................................................... 1-8 Traffic and Cross Connect Card Egate-2000M-Main............................................... 1-8 Front Panel ........................................................................................................ 1-8 Card Status ........................................................................................................ 1-8 Power Specifications .......................................................................................... 1-8 Visual Indicator Details ....................................................................................... 1-8 SFP Port Visual Indications .................................................................................. 1-9 Backplane Interface ............................................................................................ 1-9 Diag Interface .................................................................................................. 1-10 Functional Description ...................................................................................... 1-10 Optical Subsystems .......................................................................................... 1-10 Egate-2000M-MNG Card ........................................................................................... 1-11 Front Panel ........................................................................................................... 1-11 Power Specifications ........................................................................................ 1-11 Visual Indicator Details ..................................................................................... 1-11 Backplane Interface .......................................................................................... 1-12 Ext. Clock Interface........................................................................................... 1-12 MNG-ETH Interface ........................................................................................... 1-13 Control Interface .............................................................................................. 1-13 MNG Interfaces ................................................................................................ 1-13 External Alarms Interface.................................................................................. 1-14 Functional Description .......................................................................................... 1-15 Ethernet Switching Card ........................................................................................... 1-15 Ethernet Switching Card Egate-2000M-8GbE ...................................................... 1-15 Front Panel ...................................................................................................... 1-15 Power specifications ........................................................................................ 1-16 Visual indicator details...................................................................................... 1-16 Traffic interfaces available on the card ............................................................. 1-16 Ethernet interface (Copper Ports) ..................................................................... 1-16

1.2

1.3

1.4

1.5

1.6

1.7

Egate-2000 Ver. 1.0

Table of Contents

Installation and Operation Manual

Ethernet interface (Optical Ports) ..................................................................... 1-17 Functional description ...................................................................................... 1-17 1.8 Fan Tray Unit ........................................................................................................... 1-18 Fan Tray Unit - FTU6 ............................................................................................. 1-18 Power specifications ........................................................................................ 1-18 Visual indicator details...................................................................................... 1-18 Functional description ...................................................................................... 1-18 1.9 Optical Interface Specification .................................................................................. 1-18 1.10 Glossary of Terms .................................................................................................... 1-19 Chapter 2. Installation and Comissioning Guide 2.1 Using this Guide ......................................................................................................... 2-1 Who This Guide Is For ............................................................................................. 2-1 What This Guide Covers .......................................................................................... 2-1 What You Should Already Know .............................................................................. 2-1 Safety Signs Conventions ........................................................................................ 2-1 Mouse Operation Conventions ................................................................................ 2-2 Chapter Organization .............................................................................................. 2-3 Understanding the Installation and Commissioning Process ........................................ 2-4 Understanding Installation Procedure ...................................................................... 2-5 Understanding Commissioning Procedure ................................................................ 2-5 Observing Safety Guidelines ....................................................................................... 2-5 Safety Standards Compliance .................................................................................. 2-5 Safety Recommendations ....................................................................................... 2-5 General Safety Guidelines ................................................................................... 2-5 Maintaining Safety With Electricity ...................................................................... 2-6 Preventing Electrostatic Discharge Damage......................................................... 2-6 General Site Requirements ................................................................................. 2-6 Site Environment ................................................................................................ 2-6 Preventive Site Configuration ............................................................................. 2-7 Configuring Equipment Racks ............................................................................. 2-7 Working with Power Supply Unit.............................................................................. 2-8 Preventing Damage to Card and Pluggable Module .................................................. 2-8 Dissipating Static Electricity .................................................................................... 2-9 Controlling Equipment Environment....................................................................... 2-10 Using Optical Fibers .............................................................................................. 2-10 Handling Optical Fibers ..................................................................................... 2-10 Splicing Optical Fibers....................................................................................... 2-11 Repairing Optical Fibers .................................................................................... 2-12 Receiving and Unpacking Network Elements ............................................................. 2-12 Verifying Shipment................................................................................................ 2-12 Handling Package.................................................................................................. 2-12 Storage ................................................................................................................ 2-12 Unpacking Network Element ................................................................................. 2-12 Installing the Network Element ................................................................................. 2-13 Installation Guidelines ........................................................................................... 2-13 Site Preparation .................................................................................................... 2-14 Installing Chassis into the Rack ............................................................................. 2-14 Connecting DC Power Supply ................................................................................. 2-15 Connecting 48 V Earthing Cable ............................................................................. 2-15 Connecting the Egate-2000M-Main Card ................................................................... 2-16 Alarm Connection ................................................................................................. 2-16 Craft Connection................................................................................................... 2-17
Egate-2000 Ver. 1.0

2.2

2.3

2.4

2.5

2.6

ii

Installation and Operation Manual

Table of Contents

2.7

2.8

2.9

2.10

2.11

2.12

2.13

2.14

ESI Connection ...................................................................................................... 2-17 MNG-ETH Connection ............................................................................................ 2-18 MNG Connection ................................................................................................... 2-18 Connecting Optical Cards.......................................................................................... 2-19 STM-1/OC-3 Connection ........................................................................................ 2-19 STM-4/OC-12 Connection ...................................................................................... 2-20 STM-16/OC-48 Connection .................................................................................... 2-21 Connecting Ethernet Cards ....................................................................................... 2-21 Connecting 100Base-Tx/1000Base-T Interface ...................................................... 2-21 Connecting 1000BASE-X Interface ......................................................................... 2-22 Node Commissioning................................................................................................ 2-23 Logging Into an Un-commissioned Network Element ............................................. 2-23 Connecting the PC to the LAN interface of the Network Element ........................... 2-23 Downloading Software from SLAT Page ................................................................. 2-24 Setting Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element .... 2-25 Verifying the Serial Numbers of Cards and Pluggable Modules of the Network Element ............................................................................................................................ 2-26 Nominating a Synchronization Reference Clock Source for the Network Element ... 2-27 Setting Network Element Date and Time ............................................................... 2-27 Backing Up or Restoring Network Element Configuration Data ............................... 2-28 Recording Data and Test Results .............................................................................. 2-29 Site Verification Checklist ...................................................................................... 2-29 Commissioning and Testing Report........................................................................ 2-30 Receiver Sensitivity Measurements for STM-1/OC-3 ............................................... 2-31 Receiver Sensitivity Measurements for STM-4/OC-12 ............................................. 2-31 Receiver Sensitivity Measurements for STM-16/OC-48 ........................................... 2-31 Synchronization Tests ........................................................................................... 2-32 BER (BIT Error Rate) Performance .......................................................................... 2-32 Protection Switching on Fiber breaks, STM LOS ..................................................... 2-32 General Procedures .................................................................................................. 2-33 Cleaning Fiber Connectors ..................................................................................... 2-33 Cleaning Optical Connectors .................................................................................. 2-34 Inspecting Fiber Connectors .................................................................................. 2-34 Inserting and Ejecting Cards .................................................................................. 2-35 Inserting and Ejecting Fan Tray .............................................................................. 2-36 General Configuration .............................................................................................. 2-37 Switch ON Node and PC Configuration .................................................................. 2-37 Logging into the System ....................................................................................... 2-37 Configuring Optical Ports ...................................................................................... 2-38 Configuring OSPF Parameters ................................................................................ 2-38 Configuring Ethernet Ports .................................................................................... 2-38 Configuring VCG Ports ........................................................................................... 2-39 Adding New VC To VCG.......................................................................................... 2-39 Configuring Timing Manager .................................................................................. 2-40 Checking Alarms.................................................................................................... 2-40 Connector Pin Assignment........................................................................................ 2-41 Power Connector .................................................................................................. 2-41 Alarm Input Connector .......................................................................................... 2-41 Alarm Output Connector ....................................................................................... 2-42 Ext. Clock Connector ............................................................................................. 2-42 MNG Connector .................................................................................................... 2-42 MNG-ETH Connector ............................................................................................. 2-43 Cable Color Coding ................................................................................................... 2-43 Power Cable.......................................................................................................... 2-43
iii

Egate-2000 Ver. 1.0

Table of Contents

Installation and Operation Manual

Alarm-In Cable ...................................................................................................... 2-44 Alarm-Out Cable ................................................................................................... 2-44 MNG Cable ............................................................................................................ 2-44 Ext. Clock Cable..................................................................................................... 2-45 Control Cable ........................................................................................................ 2-45 2.15 Glossary of Terms .................................................................................................... 2-46 B .......................................................................................................................... 2-46 D .......................................................................................................................... 2-46 E .......................................................................................................................... 2-46 F .......................................................................................................................... 2-46 L........................................................................................................................... 2-47 N .......................................................................................................................... 2-47 O .......................................................................................................................... 2-47 P .......................................................................................................................... 2-47 S .......................................................................................................................... 2-47 V .......................................................................................................................... 2-48 Chapter 3. Layer 2 Services 3.1 System Level Configuration ........................................................................................ 3-1 Viewing and Editing FDB Age and Mac-in-Mac Configuration .................................... 3-1 Port Configuration .................................................................................................. 3-2 Configuring or Editing Physical Port Parameters .................................................. 3-3 Configuring or Editing Switching Parameters ....................................................... 3-4 Creating Port Level Maintenance End Points (MEP) .............................................. 3-6 Verifying Performance Parameters At Port Level ................................................. 3-7 Provisioning Link Aggregation Group (LAG) Port....................................................... 3-8 Ethernet Ring Protection (ERP) ................................................................................. 3-10 Viewing Rings ....................................................................................................... 3-11 Viewing Ringlets ................................................................................................... 3-12 Services Provisioning ................................................................................................ 3-14 Link Protection Group (LPG) .................................................................................. 3-14 Service Configuration ....................................................................................... 3-15 ELINE Services ....................................................................................................... 3-15 Managing ELINE Services .................................................................................. 3-17 Working with ELAN Services .................................................................................. 3-19 Understanding CVLAN Forwarding ..................................................................... 3-19 Understanding SVLAN Forwarding ..................................................................... 3-20 Managing ELAN Services ................................................................................... 3-22 Viewing Static Unicast Entry ............................................................................. 3-23 Viewing Static Multicast Entry ........................................................................... 3-23 Viewing the Flowpoint Parameters.................................................................... 3-24 Adding Flowpoint to ELAN Service .................................................................... 3-25 Editing FlowPoint Template Parameters ............................................................ 3-27 Viewing Dynamic FDB Entries ............................................................................ 3-27 FlowPoint Template .............................................................................................. 3-28 802.1q Flowpoint Template .............................................................................. 3-28 802.1ad Flowpoint Template ............................................................................ 3-29 Provisioning FlowPoint Templates ..................................................................... 3-29 Viewing FlowPoint Templates ........................................................................... 3-30 Operation, Administration, and Maintenance (OAM) ................................................. 3-32 MEP/MIP ............................................................................................................... 3-33 Creating MEP .................................................................................................... 3-34 Creating MIP ......................................................................................................... 3-35
Egate-2000 Ver. 1.0

3.2

3.3

3.4

iv

Installation and Operation Manual

Table of Contents

3.5

3.6

3.7

Enabling CFM ........................................................................................................ 3-36 Verifying Performance Parameters ........................................................................ 3-37 Provisioning LBM................................................................................................... 3-39 Provisioning LTM ................................................................................................... 3-40 Setting Y1731 Parameters .................................................................................... 3-41 Viewing Y1731 Counters ....................................................................................... 3-42 Viewing FDV .......................................................................................................... 3-42 Provisioning LTM ................................................................................................... 3-44 Configuring L2CP (BPDU) Tunneling ....................................................................... 3-45 Ingress Quality of Service (QoS) ............................................................................... 3-46 Understanding Ingress Quality of Service (QoS) ..................................................... 3-46 Policer.............................................................................................................. 3-47 Managing Ingress Bandwidth Profile parameters .................................................... 3-48 Viewing Provisioned Ingress Bandwidth Profiles ................................................ 3-48 Managing Ingress QoS ...................................................................................... 3-49 Provisioning IngressL2MfQos ................................................................................. 3-50 Viewing IngressL2MfQos ....................................................................................... 3-51 Managing L2 QoS class rule ................................................................................... 3-51 Security ........................................................................................................... 3-52 Managing L2 ACL .................................................................................................. 3-54 Provisioning an Ingress Bandwidth Profile ......................................................... 3-56 Editing an Ingress Bandwidth Profile ................................................................. 3-57 Deleting Ingress Bandwidth Profile ................................................................... 3-58 Egress Quality of Service (QoS) ................................................................................ 3-59 Understanding Egress QoS .................................................................................... 3-59 Managing Scheduler profile ................................................................................... 3-62 Managing WRED profiles ....................................................................................... 3-63 Managing Egress Shaper Profiles ........................................................................... 3-66 Managing Egress Queues ...................................................................................... 3-67 Establishing Data Communication Network (DCN) ..................................................... 3-69 Working with Data Communication Network (DCN) ................................................ 3-69 Management Networks ......................................................................................... 3-71 Establishing Management Bridge Using Static Route .............................................. 3-73

Chapter 4. User Interface Guide 4.1 4.2 Chapter Organization ................................................................................................. 4-1 Getting Started with the Network Element Application ............................................... 4-2 System Requirements ............................................................................................. 4-2 Accessing Web User Interface Using LAN ................................................................. 4-2 Configuring Caching Mechanism .............................................................................. 4-3 Logging to the Network Application ........................................................................ 4-3 Logging Using CHAP ........................................................................................... 4-4 Setting Up the Network Element ............................................................................. 4-5 Logging out of the Network Application .................................................................. 4-6 Network element Information Pane ............................................................................ 4-6 Working with Network Element Information Pane .................................................... 4-6 Alarm Banner ..................................................................................................... 4-7 Title Pane ........................................................................................................... 4-7 Navigation Pane ................................................................................................. 4-8 Preview Pane ..................................................................................................... 4-8 Working with System Time Menu ................................................................................ 4-9 Setting Date and Time of the Network Element ....................................................... 4-9 Setting Time Zone ................................................................................................. 4-10
v

4.3

4.4

Egate-2000 Ver. 1.0

Table of Contents

Installation and Operation Manual

4.5

4.6

4.7 4.8

4.9

Setting Time Server for the Network Element ........................................................ 4-11 Node Slot View Page ................................................................................................ 4-13 Refreshing Node Slot View Page............................................................................ 4-13 Understanding Visual Indicators ............................................................................ 4-13 Viewing Card Parameters ...................................................................................... 4-14 Working with the Inventory Menu ............................................................................. 4-15 Understanding Node Inventory Parameters ........................................................... 4-15 Executing Forced Switch Over and Forced Sync Command...................................... 4-16 Deleting Card Configurations ................................................................................. 4-17 Deleting Pluggable Modules .................................................................................. 4-17 Working with the Shelf Sub-Menu ............................................................................ 4-18 Card Attributes ..................................................................................................... 4-18 Understanding the Protection Feature ...................................................................... 4-19 Working with Protection Menu .............................................................................. 4-20 Working with MSP/APS .......................................................................................... 4-20 Viewing MSP/APS Groups .................................................................................. 4-25 Provisioning MSP/APS Groups ........................................................................... 4-25 Editing MSP/APS Groups ................................................................................... 4-25 Executing External Commands on MSP/APS Groups ........................................... 4-26 Deleting MSP/APS Groups ................................................................................. 4-26 Working with Connection Protection ..................................................................... 4-26 Viewing SNCP/UPSR Protection ......................................................................... 4-28 Issuing External Commands .............................................................................. 4-28 Working with Timing Manager ............................................................................... 4-29 Viewing Timing Manager Protection Request ......................................................... 4-29 Executing External Command on a Synchronization Source .................................... 4-30 Adding Link Protection .......................................................................................... 4-30 Working with the Configuration Menu ...................................................................... 4-32 Managing MSP/APS Groups .................................................................................... 4-32 Viewing MSP/APS Groups .................................................................................. 4-33 Provisioning MSP/APS Group ............................................................................. 4-34 Editing MSP/APS Group ..................................................................................... 4-35 Deleting MSP/APS groups ................................................................................. 4-36 Managing Cross-connect ....................................................................................... 4-36 Filtering Cross-Connects ................................................................................... 4-40 Adding Cross-connects ..................................................................................... 4-40 Editing Cross-connects ..................................................................................... 4-40 Deleting Cross-connects ................................................................................... 4-40 Managing Overhead Tunnel ................................................................................... 4-41 Viewing Overhead Tunnels................................................................................ 4-42 Provisioning Overhead Tunnels ......................................................................... 4-42 Overhead Tunnels ............................................................................................ 4-42 Provisioning Environmental Alarm Input ................................................................. 4-42 Configuring SNMP Traps ........................................................................................ 4-43 Managing Facilities ................................................................................................ 4-44 Managing STM/OC Interfaces ............................................................................ 4-44 Provisioning STM/OC Ports ................................................................................ 4-46 Enabling Threshold Crossing Alert (TCA) Settings .............................................. 4-47 Setting TCA Profiles .......................................................................................... 4-48 Provisioning AUG/STS-N SPE ............................................................................. 4-48 Provisioning AU4/STS-3c/AU3/STS-1 ................................................................. 4-49 Editing AU4/STS-3c/AU3/STS-1 Performance Monitoring Parameters ................. 4-51 Provisioning Tributary Units (TU/VT).................................................................. 4-52 Configuring TU/VT Performance Monitoring Parameters .................................... 4-55
Egate-2000 Ver. 1.0

vi

Installation and Operation Manual

Table of Contents

Provisioning PDH Ports ..................................................................................... 4-56 Viewing TCA Profiles for PDH Ports ................................................................... 4-58 Provisioning TCA Profile for PDH Ports .............................................................. 4-58 Deleting TCA Profile of a PDH Port .................................................................... 4-59 Managing Ethernet Interface ............................................................................ 4-59 Provisioning VCG Interface ................................................................................ 4-61 Managing VCG Interface ................................................................................... 4-63 Viewing VC/VT Group ........................................................................................ 4-63 Adding a VC/VT to VCG ..................................................................................... 4-65 Provisioning Link Capacity Adjustment Scheme (LCAS) ...................................... 4-65 Deleting VC/VT From VCG .................................................................................. 4-67 Managing and Configuring DCN ............................................................................. 4-67 Viewing the Network Interfaces ........................................................................ 4-70 Editing network interfaces................................................................................ 4-70 Provisioning/Editing Embedded Communication Channel ................................... 4-71 Provisioning Management Channel ................................................................... 4-72 Understanding OSPF......................................................................................... 4-73 Configuring OSPF Area...................................................................................... 4-73 Disabling OSPF Area ......................................................................................... 4-74 Understanding Static Route .............................................................................. 4-74 Viewing Static Routes ....................................................................................... 4-75 Adding Static Routes ........................................................................................ 4-75 Deleting a Static Route..................................................................................... 4-76 Managing Proxy ARP Neighbor .......................................................................... 4-76 Viewing Proxy ARP Neighbors Configuration ...................................................... 4-77 Adding a Proxy ARP Neighbor ........................................................................... 4-77 Deleting a Proxy ARP Neighbor ......................................................................... 4-77 Working with the Serial Port ............................................................................. 4-78 Viewing Serial Port Information ........................................................................ 4-79 Editing Serial Port ............................................................................................. 4-79 Synchronizing Network Element ............................................................................ 4-79 Viewing and Editing the Synchronization Status ................................................ 4-80 Viewing Selected Timing References ................................................................. 4-83 Editing Selected Timing References .................................................................. 4-84 Deleting Nominated Timing Reference .............................................................. 4-85 Nominating Timing Reference ........................................................................... 4-85 4.10 Managing Faults ....................................................................................................... 4-86 Understanding Alarms ........................................................................................... 4-86 Viewing Active Alarms ........................................................................................... 4-86 Viewing Suppressed Alarms ................................................................................... 4-87 Provisioning Alarm Filters ...................................................................................... 4-88 Viewing Provisioned Alarm Filters .......................................................................... 4-88 Deleting Alarm Filters ............................................................................................ 4-89 Viewing Event History ........................................................................................... 4-89 Alarm Severity ...................................................................................................... 4-90 Setting Alarm Severity........................................................................................... 4-91 4.11 Defining Profiles ...................................................................................................... 4-91 Understanding Profiles .......................................................................................... 4-91 Working with STM Port Profiles ............................................................................. 4-92 Viewing STM/OC Port Profiles............................................................................ 4-93 Editing STM Port Profiles ....................................................................................... 4-96 Working with Path Alarm Profiles .......................................................................... 4-96 Viewing Path Alarm Profiles ................................................................................... 4-97 Provisioning Path Alarm Profiles ............................................................................ 4-99
Egate-2000 Ver. 1.0 vii

Table of Contents

Installation and Operation Manual

Deleting Path Alarm Profiles ................................................................................ 4-100 4.12 Performance Monitoring ......................................................................................... 4-100 Understanding Performance Monitoring .............................................................. 4-100 STM/OC Performance Statistics ........................................................................... 4-101 Viewing the Performance Statistics of the Regenerator Section - Multiplex Section ...................................................................................................................... 4-101 Viewing Performance Statistics of Path ........................................................... 4-104 Viewing performance statistics of tributary unit .............................................. 4-106 Viewing performance statistics of transceiver ................................................. 4-107 Viewing PDH (E1/DS1/E3/DS3) port performance statistics ............................. 4-108 Viewing Ethernet performance statistics ......................................................... 4-110 Viewing VCG performance statistics ................................................................ 4-112 Monitoring input voltage statistics ...................................................................... 4-114 Viewing Performance Statistics of Internal PDH Ports .......................................... 4-114 4.13 Security Management............................................................................................. 4-115 Access Group Privileges ....................................................................................... 4-115 4.14 Working with the Radius Server .............................................................................. 4-116 Working with RADIUS Server................................................................................ 4-116 Provisioning RADIUS Server............................................................................. 4-117 Enabling RADIUS Authentication ..................................................................... 4-118 Editing RADIUS Settings .................................................................................. 4-118 Managing User Accounts ..................................................................................... 4-118 Creating User Account .................................................................................... 4-119 Managing User Accounts ..................................................................................... 4-119 Creating User Account .................................................................................... 4-120 Disabling users ............................................................................................... 4-120 Enabling User-Lockout .................................................................................... 4-121 Provisioning Security Settings ......................................................................... 4-122 Blocking IPs .................................................................................................... 4-123 Audit Logs...................................................................................................... 4-125 HTTP Sessions .................................................................................................... 4-125 Viewing HTTP Session Information .................................................................. 4-126 Configuring HTTP Session ............................................................................... 4-126 Session history............................................................................................... 4-126 Invalid Logins History ..................................................................................... 4-127 4.15 Maintenance Operations ........................................................................................ 4-128 Viewing and Editing System Settings ................................................................... 4-128 Viewing System Changes ..................................................................................... 4-129 Viewing Load Availability ..................................................................................... 4-129 Rebooting cards ................................................................................................. 4-130 Warm Rebooting cards ........................................................................................ 4-130 Cold Rebooting cards .......................................................................................... 4-130 Restarting Network System ................................................................................. 4-131 Warm Restarting a network element .............................................................. 4-131 Cold Restarting a network element ................................................................. 4-131 Performing Loop-backs ....................................................................................... 4-131 Performing Loopback on STM ports ................................................................ 4-132 Viewing Stem Diagnostics ............................................................................... 4-133 Areas ............................................................................................................. 4-133 Database ....................................................................................................... 4-133 Interfaces ...................................................................................................... 4-134 Neighbors ...................................................................................................... 4-134 Statistics ........................................................................................................ 4-135 LSA expansions .............................................................................................. 4-136
viii Egate-2000 Ver. 1.0

Installation and Operation Manual

Table of Contents

AS externals ................................................................................................... 4-136 Routing table ................................................................................................. 4-137 Opaque-LSAs ................................................................................................. 4-137 Viewing System Information ........................................................................... 4-138 Accessing OSPF diagnostics data .................................................................... 4-140 Backing Up Configuration .................................................................................... 4-140 Backing up of configuration data .................................................................... 4-140 Restoring Configuration ................................................................................. 4-141 Restoring Factory Default settings.................................................................. 4-142 Upgrading Software ............................................................................................ 4-143 Upgrading Software ....................................................................................... 4-144 Downloading SSL Certificate ........................................................................... 4-145 Upgrading Firmware ....................................................................................... 4-145 4.16 Glossary of Terms .................................................................................................. 4-146 A ........................................................................................................................ 4-146 C ........................................................................................................................ 4-147 D ........................................................................................................................ 4-147 E ........................................................................................................................ 4-147 F ........................................................................................................................ 4-148 I ......................................................................................................................... 4-149 L......................................................................................................................... 4-149 M ....................................................................................................................... 4-150 N ........................................................................................................................ 4-151 O ........................................................................................................................ 4-151 Q ........................................................................................................................ 4-151 R ........................................................................................................................ 4-151 S ........................................................................................................................ 4-151 T ........................................................................................................................ 4-152 V ........................................................................................................................ 4-153

Egate-2000 Ver. 1.0

ix

Table of Contents

Installation and Operation Manual

Egate-2000 Ver. 1.0

Chapter 1 Hardware Description


1.1 Using this Guide

This section describes who should read this guide, how it is organized, and what conventions are used in the document.

Who This Guide Is For


This document is intended for Network Operators and System Engineers to help them understand the hardware of the system.

What This Guide Covers


This document provides information on hardware configuration, functions, capabilities, limitations, and physical characteristics of the product.

What You Should Already Know


Before you read this guide you need to be familiar with the general operating principles and procedures associated with the product. You must be fully trained to handle the equipment under minimum supervision.

Safety Signs Conventions


To prevent personal injury, equipment damage, and service interruptions, you must follow all precautionary messages given in the document in addition to all the local safety standards required by your company. The following symbols inserted in the document at various places represent important situations.

Table 1-1. Safety Signs Conventions


Symbols Meaning Caution Represents Situations that could result in equipment damage or loss of data.

Danger

Situation that could cause bodily injury. Failure to observe this precaution may result in personal injury, death, or equipment damage.

Egate-2000 Ver. 1.0

Using this Guide

1-1

Chapter 1 Hardware Description Symbols Meaning Hot Surface Represents

Installation and Operation Manual

Situation that could result in bodily burns.

Optical Safety

Staring directly into the optical connector output beam may cause irreparable damage to your eyes and even leading to loss of eye sight. Failure to observe this precaution may result in personal injury, death, or equipment damage.

Electric Shock Risk

Static Discharge Warning

Handle the equipment wearing a grounding wrist strap to discharge the static buildup. Failure to observe this precaution may result in equipment damage.

Mouse Operation Conventions


Table 1-2. Mouse Operation Conventions
Convention Click Double-click Drag Right-click Wheel button Description Refers to pressing and releasing a mouse button to select a screen object. Refers to pressing and releasing a mouse button twice in succession while the cursor is positioned over an object on-screen. Refers to the function of the mouse by which an element on the screen of a monitor is moved with the cursor, while holding down the mouse button and moving the mouse. Refers to pressing the right button on a two-button mouse. Refers to the third (middle) button on the mouse.

Chapter Organization
This document is organized as follows:

Table 1-3. Chapter Organization


Chapter Introduction- Egate-2000 Power Supply Unit Cross Connect Card Egate-2000M-MNG Card Scope This chapter gives the basic introduction of the EGATE2000 Network Element. This chapter describes about the Power Supply Unit used in the Egate-2000 Network Element. This chapter describes about the Cross Connect Cards used in the Egate-2000 Network Element. This chapter describes about the Egate-2000M-MNG Card used in the Egate-2000 Network Element.

1-2

Using this Guide

Egate-2000 Ver. 1.0

Installation and Operation Manual Chapter Ethernet Switching Card Fan Tray Unit Scope

Chapter 1 Hardware Description

This chapter describes about the Ethernet Switching Cards used in the Egate-2000 Network Element. This chapter describes about the Fan tray unit used in the Egate-2000 Network Element.

1.2

Introduction- Egate-2000

Egate-2000 is an STM-1/4/16, 4U high, multi-slot product (four service slots in addition to two aggregate card slots), supporting redundancy of cross-connect fabric, timing/synchronization subsystem, and control processor subsystem and east/west aggregate ports on separate cards. It also has redundant power supply modules enabling both power supply and power source redundancy.

Front Panel

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS LINK

5
ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS LINK

9
ACT LINK ACT

ESD

Figure 1-1. EGATE-2000 - Front Panel

Cards Overview
Table 1-4. Cards Overview
Cards Egate-2000M-PS Egate-2000M-Main Overview Provides a stable DC power Supply One STM-16/OC-48+ 2STM-4/OC-12 Or One STM-4/OC-12+ 4STM-1/OC3 All ports are with pluggable optics (SFP). Egate-2000M-MNG Provides application interfaces namely LAN, Alarm, Craft, Modem, Orderwire and Ethernet Management Interfaces.

Egate-2000 Ver. 1.0

Introduction- Egate-2000

1-3

Chapter 1 Hardware Description Cards Egate-2000M-8GbE Overview

Installation and Operation Manual

Provides line interface to 4 x Copper (100/1000Base-T) and 4 x Optical (1000BaseFX via SFP) Ethernet ports.

1.3

Card Population Rule

This chapter provides details regarding the card population rules to be followed while using a EGATE-2000 system.

Telecom bus allocation details


The system supports telecom buses with STM-8 capacity for the tributary card slots. While populating the cards, consider the following details relative to the telecom buses used by the aggregate cards.

Figure 1-2. EGATE-2000 Card Slot Diagram

Card slot details


Table 1-5. Card Slots
Slot Number Telecom Bus number 4 1 5 1 8 2 9 2

Slot allotment

1-4

Slots 1 and 3 for Power supply unit Slot 2 for Egate-2000M-MNG module
Egate-2000 Ver. 1.0

Card Population Rule

Installation and Operation Manual

Chapter 1 Hardware Description

Slot 4, 5, and 8, 9 for Egate-2000M-8GbE cards ( card occupies two slots) Slot 6 and 7 for Egate-2000M-Main cards Slot 10 for Fan tray unit

Note

Egate-2000M-8GbE is a double slot card occupying two tributary slots. This card is inserted into slots 5 and 9. The lower slot adjacent to the slot where Egate2000M-8GbE is jacked-in cannot be used. Example: If Egate-2000M-8GbE is jacked into slot-5, slot-4 gets blocked and if jacked in slot-9, slot-8 gets blocked."

1.4

Power Supply Unit

This chapter describes the Power Supply Unit (PSU).

DC Power Supply Unit Egate-2000M-PS


The Egate-2000M-PS is a part of the common unit of EGATE-2000 network element. The PSU supports load sharing on redundancy basis i.e if one PSU fails, other will become the active load driver and provide a stable DC power to other cards in the system. The PSU delivers 250 W power output, 12 V output voltage respectively.

When removing a card, the unit should not be replaced into the system for at least 5 seconds to ensure that unit capacitors have discharged.

Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.

Do not touch the heat sinks on the unit just after removal.

Front Panel
The front panel of this unit provides a power connector, a local safety ground connection, and the monitor ports to monitor the input and derived voltages from the card.

Egate-2000 Ver. 1.0

Power Supply Unit

1-5

Chapter 1 Hardware Description

Installation and Operation Manual

Egate-2000M-PS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS

Figure 1-3. Power Supply Unit

Functional Description
The PSU consists of a single output DC-DC converter and all the cards including the base card have hot-swap controller and buck converters as required. The output voltage is set to 12 V. The cards are required to derive the suitable voltages from the stable 12 V supplied by the PSU. The PSU can uniquely be identified by the serial number. The serial number information is stored in the EEPROM located on each PSU. PSU has the following protections: Input under-voltage Input over-voltage Input reverse polarity Output over-current Output Over-Voltage Output short-circuit Over-temperature

The Power supply card supports the monitoring of the following parameters: Input voltage 12 V output Board temperature

The accuracy of all these measurements is +/- 10%.

Design Specifications
Table below gives the operational specifications of the DC Power supply unit.

Table 1-6. Design Specifications


Specification Input voltage range Range Normal operation: -40 V to -72 V DC

1-6

Power Supply Unit

Egate-2000 Ver. 1.0

Installation and Operation Manual Specification Reverse polarity protection Input current Operating temperature range Output voltage Output current Ripple Dynamic response Efficiency Fuse Under voltage protection Over voltage protection EMI/EMC/Safety compliance Range Continuous

Chapter 1 Hardware Description

10 A Continuous, 7 A Maximum -5 C to 55 C 12 V 0.4 V 21 A 120 mVPP 500 mV (50% to 100% load step) > 80% @ > 50% load, 48 V input 10 A fast acting fuse Shutdown: 38 V 4 V Shutdown: 72 V 4 V IEC 60950-1 EN 60950-1 UL 60950-1 In-rush Current limiting as per : ETSI EN 300 132-2 ETSI EN 300 386 v1.3.2 (2003-05) requirements as applicable (equipments operating in telecommunication centers) ETSI EN 300 019 Part 1-1 EN55022 Class A EN61000-4-4 (500V) EN61000-4-2 (4.0 kV contact discharge and 8.0kV Air Discharge)

Hold-up time (Interruption) Power interface

2 ms Input: 3-pin Power D-connector Output: 16-pin PCIC series Over-temperature at 115C 10C and hysteresis of 8C min (Auto-recovery) Output Short-Circuit (Hiccup Mode) Output Over-Current (22.5A 1.25A) Output Over-Voltage (13.6 0.6V Latched Mode) Input Reverse Polarity Input Under-voltage (Auto Retry Mode)

Protections

Status indication ON/OFF switch

LED Status None

Egate-2000 Ver. 1.0

Power Supply Unit

1-7

Chapter 1 Hardware Description

Installation and Operation Manual

1.5

Cross Connect Card

This chapter gives an overview of the features and functional description of the traffic and cross-connect card.

Traffic and Cross Connect Card Egate-2000M-Main


This section gives an overview of the features and functional description of the Traffic and Cross-connect card EGATE-2000M-MAIN. EGATE-2000M-MAIN line card is an optical line interface base card that performs processing, data path processing, cross-connect switching, fabric and timing functions.

Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.

Front Panel
Egate-2000M-Main
ACTIVE STATUS CONTROL SYNC 5 4 3 2 1 5 4 3 2 1 STM-1/OC-3 STM-4/OC-12 STM-4/OC-12 STM-16/OC-48

Figure 1-4. Front Panel Egate-2000M-Main Card

Card Status
Card Status LEDs: Two LEDs: Active and Status give the card status indication SONET/SDH Status: One LED per port: sync. Gives the ports status.

Power Specifications
Table 1-7. Name of Table
Parameter Input Voltage Power Consumption Description 12V 34W

Visual Indicator Details


The visual indicators on the EGATE-2000M-MAIN card include two LEDs: ACTIVE and STATUS. Table gives possible LED status and their significance.

1-8

Cross Connect Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

Table 1-8. Visual Indicators


Card State Card initialization: State before the card initialize is complete on card insertion Card in service: Initialization complete and card in service. Card mis-match: Network Element has already configured the slot with some other card. Card fail during boot up. Card failed while in-service. Hard Reset: All devices reset, FPGAs cleared and reprogrammed. Goes to initializing state next. Soft Reset: Software is restarted, devices are reinitialized with provisioning. Goes to initializing state next. When the card is up as standby card. Status LED Amber (Steady) Green (Steady) Amber Red Red Amber Amber Active LED Amber (Steady) Green (Steady) Amber Amber Green Amber Amber

Green

Off

SFP Port Visual Indications


Table below gives details on SFP Port Transmitter (Tx) and Receiver (Rx) LED Status

Backplane Interface
Egate-2000M-Main card connects to the backplane through Euro connectors and receives the 12 V input through the backplane.

Diag Interface
The Diag interface is a USB connector located behind the name flap. This interface offers a serial connection to node using which a user can launch a terminal session to log onto the Operating System.

Note

The diagnostic interface is meant for use by authorized Networks personnel only.

Functional Description
Egate-2000M-Main card performs processing, data path processing, crossconnect switching, fabric and timing functions. Egate-2000M-Main card supports the following functional features:
Egate-2000 Ver. 1.0

Overhead and tributary processing on the optical ports. 64x64 STM-1/OC-3 cross-connect fabric. Visual indications for power and status/active. Hot-swap inrush current protection. Board temperature and voltage monitoring for extreme conditions. SONET/SDH port visual indication.
Cross Connect Card 1-9

Chapter 1 Hardware Description

Installation and Operation Manual

The key functions of Egate-2000M-Main card are described below: Processor Function: EGATE-2000M-MAIN card has a processor that performs the configuration, control and processing of all the other subsystems. The processor is a micro controller which has an on-board external memory to implement the required functions. The software residing in this block controls the overall management of the system. Processor card is a daughter card that interfaces with different memory interfaces like SDRAM, Flash Memory,PCMCIA and other memory. This function is also responsible for implementing watchdog logic for the system. Cross-connect Function: EGATE-2000M-MAIN card has a non blocking 64x64 STM-1/OC-3 cross-connect capacity, grooming the traffic at higher and lower order levels. The cross-connect function provides Line to Line, Line to Tributary, Tributary to Line, Tributary to Tributary type of cross-connects. The EGATE-2000M-MAIN card supports features like sharing of bandwidth among tributary slots and providing cross-connect capacity with an equivalent bandwidth of 12.5 G. Synchronization Function: EGATE-2000M-MAIN card has a Stratum-3 compliant clock generation unit. The PLL in synchronization unit can synchronize to a variety of timing sources, selected via the user interface. Synchronization Status Messaging (SSM) is implemented in the software to propagate the clock quality information to neighbouring elements and to select the best quality clock among a set of nominated clock sources. The synchronization unit is commonly called the timing module.

Optical Subsystems
The EGATE-2000M-MAIN card supports STM-1/4/16 interfaces. The card supports two modes of operation. 1xSTM-16(OC-48)+ 2xSTM-4(OC-12) 1xSTM-16(OC-48)+ 4xSTM-1(OC-3) 1xSTM-4(OC-12)+4xSTM-1(OC-3)

Note

The different modes listed above are configurable from slat page only.
Don't stare or look directly into the optical connector output beam, as this can cause irreparable damage to your eyes and even loss of eye sight.

Warning

Optical interface on these cards have two LEDs each indicating the status of receive and transmit signals.

1.6

Egate-2000M-MNG Card

This chapter gives an overview of the features and functional description of the Egate-2000M-MNG Card.

1-10

Egate-2000M-MNG Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

Static charge can damage the equipment. While handling cards for making system interconnections, wear an ESD strap to discharge the static buildup.

Front Panel

Figure 1-5. Front Panel - EGATE-2000M- MNG Card

Power Specifications
Table 1-9. Power Specifications
Field Input voltage Power consumption Description 12 V 10% 7W

Visual Indicator Details


The visual indicators on the Egate-2000M-MNG Card include two LEDs, the ACTIVE and the STATUS LEDs. Table gives possible LED status and their significance.

Table 1-10. Visual Indicator LEDs


Card State Card initialization: State before the card initialize is complete on card insertion Card in service: Initialization complete and card in service. Card mis-match: Network Element has already configured the slot with some other card. Card fail during boot up. Card failed while in-service. Hard Reset: All devices reset, FPGAs cleared and reprogrammed. Goes to initializing state next. Status LED Amber (Steady) Green (Steady) Amber Red Red Amber Active LED Amber (Steady) Green (Steady) Amber Amber Green Amber

Egate-2000 Ver. 1.0

Egate-2000M-MNG Card

1-11

Chapter 1 Hardware Description Card State Soft Reset: Software is restarted, devices are reinitialized with provisioning. Goes to initializing state next. Status LED Amber

Installation and Operation Manual Active LED Amber

Backplane Interface
Egate-2000M-MNG Card connects to the backplane through Euro connectors and receives the 12 V input through the backplane.

Ext. Clock Interface


The Egate-2000M-MNG Card provides ESI clock/ data interface on a RJ-45 connector. SDH Mode: The Ext. clock input is at 2.048 MHz and can be nominated as a reference for node synchronization. Loss-of-Signal (LOS) is detected on the clock input and this triggers to change over to the next synchronization reference. The timing reference failed alarm is reported on the user interface. The Ext. data input is at 2.048 Mbps. Both PCM30 and PCM31 (with/without CRC) framing can be used on the input. This input can be nominated as a reference for node synchronization. LOS, LOF and AIS are detected on this input and this triggers to change over to the next synchronization reference. The timing reference failed alarm is reported on the user interface. The Egate-2000M-MNG Card contains redundant timing interfaces. It can be synchronized from the following sources: Received STM-1 interfaces Clock derived from External clock Clock derived from External data

SONET Mode: The Ext. clock input is at 1.544 MHz and can be nominated as a reference for node synchronization. Loss-of-Signal (LOS) is detected on the clock input and this triggers a change over the next synchronization reference. The timing reference failed alarm is reported on the user interface. The Ext. data input is at 1.544 Mbps. Both SF and ESF (with or without CRC) framing can be used on the input. This input can be nominated as a reference for node synchronization. LOS, LOF and AIS are detected on this input and this triggers a change over the next synchronization reference. The Egate2000M-MNG card contains redundant timing interfaces. It can be synchronized from the following sources: Received OC-3 interfaces Clock derived from External clock Clock derived from External data

MNG-ETH Interface
The MNG-ETH Interface provides a CSMA/CD based LAN transceiver of an Ethernet link. The MNG-ETH interface is available as an RJ-45 connector. The Ethernet address is available in the non-volatile memory on the Egate-2000M-MNG Card.

1-12

Egate-2000M-MNG Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

The MNG-ETH interface physical layer is completely implemented in hardware. The physical layer device provides clock recovery, bit timing, equalization and a Jabber circuit. The Media Access Control (MAC) function is implemented in software available as part of the microcontroller. Jabber circuitry ensures that the transmitter does not hold up the interface for more than a full frame of data. The two available LEDs indicate the connector link status. The LAN interface is associated with two LEDs: Green and Amber. The following Table gives the possible LED status and their significance.

Table 1-11. LAN Interface


Card Status
Link speed 10 Mbps Link speed 100 Mbps NMS port up Receiver Activity

Green
On Blink on packet received

Amber
On -

Control Interface
The Local Control terminal is an additional LAN interface. The control port is provided through a RJ-45 connector. The additional LAN interface runs a DHCP server and the port has a fixed IP address192.168.1.254, which cannot be changed. The LAN port is therefore always available for debugging through the GUI or a telnet session if there is any problem with the local LAN. The active crossconnect and control card card directly drives the NMS interface LEDs. The crossconnect and control card does not do any processing on this interface.

MNG Interfaces
The MNG interface is a serial interface using which a network element can be managed remotely. The modem interface is provisioned using the PPP. A 64 kbps data channel is created between two network elements. The default baud rate setting is 9600 bauds with one stop bit and no parity. The F1 interface provides a RS-232C based serial interface for configuration using a local craft terminal. The network element can be remotely managed by provisioning user data channel. A 64 kbps data channel is created between two network elements. The MNG interface is multiplexed and is provided on the front panel for node/network management through RJ-45 connector. The NE is configured as the Data-Circuit terminating Equipment (DCE) and the local craft terminal is configured as the Data Terminating Equipment (DTE).

External Alarms Interface


The Egate-2000M-MNG Card provides seven external alarm inputs and four external alarm outputs. Alarm-In: The alarm inputs connect external triggers for events (such as open door or a shelf high temperature) to the Egate-2000M-MNG Card. When an event occurs, which activates the trigger connected to the external alarm input, the network element raises an environmental alarm. The external inputs are either enabled or disabled from the Network Element (NE) user

Egate-2000 Ver. 1.0

Egate-2000M-MNG Card

1-13

Chapter 1 Hardware Description

Installation and Operation Manual

interface. The severity, alarm text and the SNMP trap ID can be edited from the network element user interface. The Alarm-In interface is through a RJ-45 connector. Alarm-Out: The alarm outputs can be used to trigger the operation of external equipment, such as a generator, fan or audible alarm. The alarm outputs are caused by alarms detected by the NE. The alarm-out are classified as minor, major and critical. The Alarm-Out interface is through a RJ-45 connector. There are three alarm visual indications on the faceplate of the Egate-2000M-MNG Card card: Critical Alarm Major Alarm Minor Alarm

The following Table gives the Power and Alarm LED status of Egate-2000M-MNG Card.

Table 1-12. Egate-2000M-MNG Card status


LED Power LED Color Off Status Card not powering On

Green Critical LED Red

Card powered On Critical alarm detected by Network Element (NE)

Off Major LED Red

Default State. No Critical alarm detected Major alarm detected by NE

Off Minor LED Amber Off

Default State. No Major alarm detected Minor alarm detected by NE Default State. No Minor alarm detected

Functional Description
The Egate-2000M-MNG Card provides static user interfaces for configuration and visual indications. Egate-2000M-MNG Card has the following functional features: 10/100BaseTLAN interface ( MNG-ETH and Control I/F) LAN interface LEDs MNG I/F Craft interface (V.24 Asynchronous, with modem control lines Phy is RS232) M1 interface (V.24 Asynchronous, with modem control lines Phy is RS232)

1-14

Egate-2000M-MNG Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

F1 user channel interface (64 kbps V.24 Synchronous, with contradirectional clock interface Phy is RS232) (multiplexed with the Modem Interface)

Alarm LEDs (Critical, Major, Minor, Deferred) User configurable alarm inputs Alarm outputs for Critical, Major, Minor, Power and orderwire call

1.7

Ethernet Switching Card

This chapter gives an overview of the features and functional description of the Ethernet switching card.

Ethernet Switching Card Egate-2000M-8GbE


Egate-2000M-8GbE is a tributary interface card, which provides line interface to 4x100Base-TX /1000BASE-T Mbps (FE) and four optical Ethernet client interfaces (1000BASE-T) Ethernet ports. The WAN side consists of 128 interfaces (Virtually Concatenated Groups - VCG) with a combined capacity of STM-4/OC-12. Egate2000M-8GbE is capable of switching at L2 level and doing traffic classification on L2 and L3 level.

Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.

Front Panel
Egate-2000M-8GbE
GbE GbE CONTROL

8 ACTIVE STATUS LINK

ACT

LINK

ACT

Figure 1-6. Front Panel- Egate-2000M-8GbE Card

Power specifications
Table 1-13. Power Specifications
Parameter Input Voltage Range Power Consumption Specification 12 V 10% 60 W

Egate-2000 Ver. 1.0

Ethernet Switching Card

1-15

Chapter 1 Hardware Description

Installation and Operation Manual

Visual indicator details


The visual indicators on the Egate-2000M-8GbE card includes two LEDs, the ACTIVE and the STATUS LEDs. Two LEDs for each optical port is used for transmitter and receiver laser status. Table below gives the possible LED status and their significance.

Table 1-14. Visual Indicator Details


Card State Power ON: First LED activity noticed on card insertion. Card IS: Initialization complete and card in service (and not failed). Card mis-match Card fail during boot up. Card fail IS: Card failed while in-service. Hard Reset: All devices reset, FPGAs cleared and reprogrammed. Goes to initializing state next. Soft Reset: Software is restarted, devices are reinitialized with provisioning. Goes to initializing state next. Status LED Amber Green (Steady) Amber Red Red Amber Amber Active LED Amber Green (Steady) Amber Amber Green Amber Amber

Traffic interfaces available on the card


There are four 100Base-TX /1000BASE-T Ethernet interfaces and four 1000BASEX interfaces available on the card.

Ethernet interface (Copper Ports)


The card supports four 100Base-TX /1000BASE-T Ethernet interfaces. The electrical interface is supported via RJ-45 connectors. Table below gives the LED indication status of the LEDs on the RJ-45 connectors.

Table 1-15. Ethernet Interface LED Indicators


LED Link LED State Green LED (OFF) Status Link down

Green LED (ON) Activity LED Amber LED (OFF)

Link Up No Activity

Amber LED (ON)

Activity

Ethernet interface (Optical Ports)


Four optical single-rate Ethernet client interfaces (1000BASE-X) are provided with SFP modules.".
1-16 Ethernet Switching Card Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

Two LEDs for each optical port is used for transmitter and receiver laser status. Table gives the transmit and receive LED Status of the Laser.

Table 1-16. Ethernet Optical ports Led Indicators


LED Link LED Color Green LED (OFF) status Link down

Green LED (ON) Activity LED Amber LED (OFF)

Link Up No Activity

Amber LED (ON)

Activity

You should not stare directly into the optical connector output beam, as this can cause irreparable damage to your eyes and even loss of eye sight.

Functional description
Egate-2000M-8GbE card supports the following features: Four optical Ethernet client interfaces (1000BASE-FX) Four Ethernet client interfaces (100Base-TX /1000BASE-T) STM-4/OC-12 wan capacity and 128 wan interfaces (VCGs) for ETHoPDH and mixed ETHoPDH and ETHoSDH mode STM-16/OC-48 wan capacity and 64 wan interfaces (VCGs) for ETHoSDH mode only. PtP amd MPtMP Ethernet services Packet processing Layer 2 processing

1.8

Fan Tray Unit

Fan Tray Unit - FTU6


The Fan Tray Unit (FAN) is used in the EGATE-2000 network element to cool the equipment. There are four fans present in the fan tray unit. The FAN is designed to reduce five degree centigrade of the system temperature.

Egate-2000 Ver. 1.0

Fan Tray Unit

1-17

Chapter 1 Hardware Description

Installation and Operation Manual

Power specifications
Table 1-17. Power Specifications
Parameter Input voltage Power consumption Value 12 V 3W

Visual indicator details


The visual indicators in the FAN module are specified in the table below.

Table 1-18. Visual Indicator Details


State No Failure (Normal operation) Failure Detected on Monitoring Power to the Module Fails, LED does not get Power Status LED Green Red OFF

Functional description
The following are the functional features of FAN: Supports four fans Fuse on each fan power supply to isolate any failed fan from other fans Fan speed monitoring and Power supply monitoring through on board temperature sensing device Temperature monitoring on the airflow path Field replaceable Hot-swap capability Air filters are provided in the FAN to prevent the entry of dust particles

1.9

Optical Interface Specification

Please refer to the RAD SFP Datasheet for more information.

1.10 Glossary of Terms


LAN
Local Area Network. A computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs),

1-18

Glossary of Terms

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 1 Hardware Description

include their usually higher data-transfer rates, smaller geographic place, and lack of a need for leased telecommunication lines.

LOS
Loss of Signal is generally an indicator on a networking device to indicate that a network signal or connection has been lost.

MAC
Media Access Control. A sublayer of the Data Link Layer specified in the sevenlayer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically a local area network (LAN) or metropolitan area network (MAN).

MDI
Medium Dependent Interface. An Ethernet port connection typically used on the
Network Interface Card (NIC) or Integrated NIC port on a PC. Also referred to as an uplink port.

MDIX
Medium Dependent Interface Crossover. A female RJ-45 port connection on a
computer, router, hub, or switch. Straight through cables connect pins 1 and 2 (transmit) on an MDI device to pins 1 and 2 (receive) on an MDIX device. The X refers to the fact that transmit wires on an MDI device must be connected to receive wires on an MDIX device.

MSP
Multiplex Section Protection. A port level protection supported on the STM
interfaces. MSP schemes involve reserving a dedicated protection channel with the same capacity as the work channel.

PCMCIA
Personal Computer Memory Card International Association. An international standards body that defines and promotes the PC Card (formerly known as PCMCIA card) and ExpressCard standards. Although the organizations name refers to memory cards, their standards are not limited to memory devices.

PSU
Power Supply Unit.

PSU
Network Element. A manageable logical entity uniting one or more physical
devices.

Egate-2000 Ver. 1.0

Glossary of Terms

1-19

Chapter 1 Hardware Description

Installation and Operation Manual

RAI
Remote Alarm Indication; represents that the far end equipment has a problem
with the signal it is receiving from the upstream equipment.

SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.

SDRAM
Synchronous Dynamic Random Access Memory. A type of DRAM that can run at much higher clock speeds than conventional memory.

SFP
Small Form-factor Pluggable. A compact optical transceiver used in optical
communications for both telecommunication and data communications applications. It interfaces a network device mother board (for a switch, router or similar device) to a fiber optic or unshielded twisted pair networking cable.

TU
Path Overhead. Refers to overhead accessed, generated and processed by pathterminating equipment.

VC
Virtual Concatenation. A technique that allows SONET/SDH circuits to be grouped
into arbitrarily sized bandwidth increments for more efficient transport of client protocols.

VCAT
Virtual Concatenation. An inverse multiplexing technique used to split SDH/SONET
bandwidth into logical groups, which may be transported or routed independently.

VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller individual containers, which are grouped together and logically represented by a VCG.

1-20

Glossary of Terms

Egate-2000 Ver. 1.0

Chapter 2 Installation and Comissioning Guide


2.1 Using this Guide

This section describes who should read this guide, how it is organized, and what conventions are used in the document.

Who This Guide Is For


This document is intended for Technician or Field engineers who install and commission hardware or software on the customer premises.

What This Guide Covers


This document provides information to install the product and to initially configure the product to the point of verifying proper operation of the product in the network. The information provided in this document includes hardware/software installation, provision specific protocols, user accounts, services, interfaces, and related items to support the design of the network, and/or the network application in which the product is installed. This document does not cover installation of racks, electrical wiring, raceways, and other supporting equipments.

What You Should Already Know


Before you read this Guide you need to be comfortable in installing and commissioning the network element on the customer premises. You must have prior experience handling equipment under variety of circumstances. Personnel working directly on equipment must be: Trained, authorized, and qualified to carry out the tasks required. Able to follow safety guidelines specific to the product and all local customerspecific safety procedures.

Safety Signs Conventions


To prevent personal injury, equipment damage, and service interruptions, you must follow all precautionary messages given in the document in addition to all
Egate-2000 Ver. 1.0 Using this Guide 2-1

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

the local safety standards required by your company. The following symbols inserted in the document at various places represent important situations.

Table 2-1. Safety Signs


Symbols Meaning Caution Represents Situations that could result in equipment damage or loss of data.

Danger

Situation that could cause bodily injury. Failure to observe this precaution may result in personal injury, death, or equipment damage. Situation that could result in bodily burns.

Hot Surface

Optical Safety

Staring directly into the optical connector output beam may cause irreparable damage to your eyes and even leading to loss of eye sight. Failure to observe this precaution may result in personal injury, death, or equipment damage.

Electric Shock Risk

Static Discharge Warning

Handle the equipment wearing a grounding wrist strap to discharge the static buildup. Failure to observe this precaution may result in equipment damage.

Mouse Operation Conventions


Table 2-2. Mouse Operation Conventions
Convention Click Double-click Drag Right-click Wheel button Description Refers to pressing and releasing a mouse button to select a screen object. Refers to pressing and releasing a mouse button twice in succession while the cursor is positioned over an object on-screen. Refers to the function of the mouse by which an element on the screen of a monitor is moved with the cursor, while holding down the mouse button and moving the mouse. Refers to pressing the right button on a two-button mouse. Refers to the third (middle) button on the mouse.

2-2

Using this Guide

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Chapter Organization
This document is organized as follows:

Table 2-3. Chapter Organization


Chapter Understanding the Installation and Commissioning Process Observing Safety Guidelines Scope This chapter provides an overview of the Installation and Commissioning process flow of EGATE-2000 network element. This chapter contains safety guidelines that you must follow for personal safety and to operate the EGATE-2000 Network Element correctly. It also describes about the site environment and instructions to be followed during site preparation and equipment rack configuration This chapter describes the procedures to be followed during receiving and unpacking of the EGATE-2000 Network Element. It includes shipment verification, handling packages, and unpacking the equipment. This chapter describes procedures to be followed when installing EGATE-2000 network element. It includes preparing site for installation, installation guide lines, installing chassis into the rack, cabling, connecting DC power supply and connecting 48 V earthing cable. This chapter describes the Egate-2000M-Main card configuration supported in EGATE-2000 network element. This chapter describes the optical card configuration which includes STM-1/OC-3, STM-4/OC-12, and STM16/OC-48 connections. This chapter describes Egate-2000M-8GbE card connections which includes 100Base-Tx/1000Base-T and 1000BASE-X interface connections. This chapter describes the commissioning procedures that has to be performed on a newly installed EGATE-2000 network element. It includes logging into a uncommissioned network element, downloading software from SLAT page, setting Ethernet parameters, setting network element date and time, and nominating synchronization clock reference for the network element. This appendix provides various forms to record system data and test results during the commissioning process. This appendix describes the procedures to be followed when cleaning and inspecting optical and fiber connectors. It also describes the procedure to be followed during inserting and ejecting of cards.

Receiving and Unpacking Network Elements

Installing the Network Element

Connecting the Egate-2000M-Main Card Connecting Optical Cards

Connecting Ethernet Cards

Node Commissioning

Recording Data and Test Results General Procedures

Egate-2000 Ver. 1.0

Using this Guide

2-3

Chapter 2 Installation and Comissioning Guide Chapter General Configuration Scope

Installation and Operation Manual

This appendix describes the general procedures for configuring EGATE-2000 network element. It includes switching ON the node and PC configuration, logging into the network element, configuring optical ports, OSPF, Ethernet ports, VCG ports, timing manager, and checking alarms. This appendix provides connector pin details used for installing the network element. This appendix describes the color coding scheme used for different cables.

Connector Pin Assignment Cable Color Coding

2.2

Understanding the Installation and Commissioning Process

This chapter describes procedure followed during installation and commissioning process of Egate-2000 network element. Installation and Commissioning Process Overview The flowchart below shows the installation and commissioning process.

Figure 2-1. Installation and Commissioning Flow

2-4

Understanding the Installation and Commissioning Process

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Understanding Installation Procedure


Installation procedure comprises of: Receiving and unpacking the network element Installing the chassis on the rack Cabling of 48 V earthing cable, AC and DC power supply cables.

Understanding Commissioning Procedure


The commissioning is the formal hand over of the operational and maintenance responsibility for the end-product from the vendor to the operator. The process comprises of Operation and Performance qualification and includes environment compliance checks, verification of personnel protection equipment and qualification of containment systems.

2.3

Observing Safety Guidelines

This chapter provides important safety guidelines that you must follow for personnel safety and to operate the equipment correctly. It also describes about the site environment and instructions to be followed during site preparation and network element rack configuration. You must read and follow all the precautionary procedures before starting to operate the network element.

Safety Standards Compliance


The network element complies with the following safety standards: IEC/EN 60950-1 and UL 60950Information technology equipment - Safety, Part 1: General requirements. IEC 60825-1 and IEC 60825-2 Safety of Laser Products

Safety Recommendations
This section lists the safety recommendations that need to be followed for safe operation of the network element.

General Safety Guidelines


Keep the chassis clean and dust-free before, during and after the installation. Keep tools away from the area where you and others could fall over them. Avoid wearing loose cloths that could get caught in the chassis. Fasten your tie or scarf and roll up your sleeves before handling the equipment. Wear safety glasses if you are working under any conditions that might hazardous to your eyes. Do not perform any action that creates a potential hazard to people or make the equipment unsafe.
Observing Safety Guidelines 2-5

Egate-2000 Ver. 1.0

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Maintaining Safety With Electricity


Follow the listed guidelines while working on equipment powered by electricity: Locate the emergency power-off switch for the room in which you are working. Then, if an electrical accident occurs, you can act quickly to turn off the power. Disconnect all power by turning off the power and unplugging the power cord before: Installing or removing a chassis Working near power supplies Do not work alone if potentially hazardous conditions exist. Never assume that power is disconnected from a circuit. Always check the circuit to confirm. Look carefully for possible hazards in your work area, such as cords, and missing safety grounds. If an electrical accident occurs, proceed as follows: Turn off the system. Determine if the person needs rescue breathing or external cardiac compressions, then take appropriate action.

Preventing Electrostatic Discharge Damage


Electrostatic discharge (ESD) can damage equipment and impair electrical circuitry. ESD damage occurs when electronic components are improperly handled and can result in complete or intermittent failures. To ensure optimal electrostatic discharge protection: Always follow ESD-prevention when removing and replacing components. Ensure that the chassis is electrically connected to earth ground. Wear an ESD-preventive wrist strap, ensuring that it makes good skin contact. Connect the grounding clip to an unpainted surface of the chassis frame to safely ground ESD voltages. The wrist strap and cord must operate effectively to properly guard against ESD damage and shocks. If no wrist strap is available, ground yourself by touching the metal part of the chassis. For safety, periodically check the resistance value of the antistatic strap, which should be between 1 and 10 Mega Ohms (MOhm).

General Site Requirements


This section describes the requirements your site must meet for safe installation and operation of the system. Before installation, verify the site for readiness.

Site Environment
Network element can be mounted in a rack. The location of the network element, the layout of your network element rack including wiring room are extremely important for proper system operation. network element placed closer
2-6 Observing Safety Guidelines Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

inadequate ventilation, and inaccessible panels can cause system malfunctions and shutdowns, which results in system maintenance. While planning your site layout and network element locations, consider the precautions described in the section Preventive Site Configuration that follows to help avoid network element failures and reduce the possibility of environmentally caused shutdowns. If you are currently experiencing shutdowns or unusually high errors with your existing network element, these precautions may help you isolate the cause of failures and prevent potential problems.

Preventive Site Configuration


Take following precautions to plan an acceptable operating environment for your network element and to avoid environmental equipment failures: Electrical equipment generates heat. Without adequate air circulation, the ambient air temperature might not be adequate to cool equipment to acceptable operating temperatures. Ensure that the room in which you operate your system has proper ventilation. Damage from static discharge can cause immediate or intermittent equipment failure. Always follow the ESD prevention procedures to avoid damage to equipment. An open chassis allows air leaks, which may interrupt and redirect the flow of cooling air from internal components. Ensure that the chassis cover is secure to allow cooling air to flow effectively from right to left within it.

Caution Proper hydraulic/pneumatic material handling equipment must be used for


mounting the equipment. If the network element is heavy and the hydraulic equipment is not available then ensure that at least two installers are at the installation site.

Configuring Equipment Racks


While planning an acceptable equipment rack configuration, ensure that: An enclosed rack must have adequate ventilation and is not overly congested, since each unit generates heat. The enclosed rack should have lowered sides and a fan to provide cooling air. The rack frame does not block the intake or exhaust ports while mounting a chassis in an open rack. If the chassis is installed on slides, check whether chassis is placed at the right position into the rack. Adequate ventilation is available for equipment at the bottom of the rack. In an enclosed rack with a ventilation fan in the top, excessive heat generated by equipment near the bottom of the rack can be drawn upward and intake ports of the equipment.

Baffles helps isolating exhaust air from intake air, which also helps to draw cooling air through the chassis. The best placement of the baffles depends on the airflow patterns in the rack. Experiment with different arrangements to position the baffles effectively.

Egate-2000 Ver. 1.0

Observing Safety Guidelines

2-7

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Working with Power Supply Unit


When you install power feeds to the product input terminals or if you perform routine power maintenance, make sure that you do the following: Read the power procedures before you perform any function. Take the necessary precautions and use the appropriate insulated tools to perform any tasks.

The green LED continuously lit at the faceplate on the base card indicating that the card is functioning correctly and is powered up. If the green LED on the PSU is ON, the power at the associated feeder is present and the conditions can be assumed to be normal. Some of the possible cases when the green LED on the base card is not ON are: Damaged or non functional power supply unit Damaged or non functional base card Feeder low voltage or power failure Over-current failure Blown fuse in the power supply unit due to the reverse polarity condition at the input terminals.

The circuit breaker on the power supply unit is an electronic circuit breaker that cuts off the power to the card on over-current condition. Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.

Warning

Risk of personal injury, energy hazard: The battery feeds are capable of supplying very high current which, during an un intentional short, can cause burns. Read and understand the power procedures you are performing. Take necessary precautions and use the appropriate insulated tools when working with power.

Preventing Damage to Card and Pluggable Module


In this section, the generic term 'card' is used to refer to cards or pluggable modules as applicable. All cards are subject to damage by rough handling or by electrostatic discharges. These cards are shipped to the customer premises in shielded containers.

Note

Follow precautions for handling electrostatic sensitive devices.


While handling, installing, storing or replacing cards, take the following necessary precautions: Wear an antistatic wrist-strap, a heel grounder, or another personal grounding device before you remove a module from its package or from the shelf.

2-8

Observing Safety Guidelines

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Follow installation and removal procedures for each module. Make sure to understand and perform each precautionary message in these procedures (for example, opening or closing the latches of the card simultaneously). Do not touch the solder side of the module, the pin connector, or the components. Inspect all pin connectors for damage before using them on each module. Inspect each module for damage before inserting the component into the shelf. Store uninstalled cards separately in a shielded box. Do not stack cards on or against each other. Do not force cards into their packaging material. Do not store several cards in the same container. Allow each module to reach room temperature before you insert the module into the shelf. When not in use store pluggable modules in their protective static-dissipative containers to prevent damage to the exposed connector terminals. Leave spare cards in the original shielded containers until you need the cards. To prevent damage to cards in storage, follow procedures that prevent accumulation of dirt or dust on the pin connectors and damage to the printed-circuit board or its components wrapage. This situation is typical for printed-circuit boards stored in areas where the humidity can exceed 95% and the temperature can exceed 70 C.

While transporting cards, pack each module in its original shielded container and padding, or in an electrostatically shielded bag. In case the original packing material is lost, place the module in a shielded bag and use another container with sufficient padding.

Dissipating Static Electricity


The static electricity level in your body increases when you move around or come into contact with other charged surfaces. Excessive levels of static electricity can damage the equipment. You must either wear a properly functioning heel grounder (that attaches to your leg and foot) and/or an antistatic wrist-strap, or another grounding device when you work on any of the following: Network element chassis (including the metal frame and cover) Cables connected to cards Cards

Any one of the previously mentioned grounding devices dissipate electrostatic charges to the ground quickly and safely. Use grounding devices correctly to eliminate the ESD threat you pose to the equipment. When you wear an antistatic wrist-strap or a heel grounder, you must make sure the grounding straps are in contact with a moist part of your skin. Connect the grounding cord to the grounding plug on a grounded fixture of the product you

Egate-2000 Ver. 1.0

Observing Safety Guidelines

2-9

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

are working on, such as the shelf ESD jack, grounded fixtures are accessible on most of the products.

Caution Heel grounders or similar worn footwear attachments work when the floor is designed to dissipate static electricity. Also check for the ESD foot wear attachment connectivity to ground using suitable ESD tester. If the properties of the floor are unknown or in doubt, use a wrist-strap and make sure it is connected to a piece of electrostatic discharge (ESD) grounding equipment before proceeding with any maintenance or installation activity.
The following guidelines provide an optimal electrostatic discharge protection: Install bays on conductive floor coverings. Provide conductive shoes, antistatic wrist-straps and heel grounders to all personnel working on the equipment. Maintain local environmental conditions so that relative humidity around equipment to be serviced is in excess of 20% (preferably higher than 40%). This lowers the threat of developing damaging electrostatic levels.

Implement an ESD training and control program that educates personnel on the hazards of ESD and simple mitigation procedures that can easily be applied.

Controlling Equipment Environment


The maximum operational long-term ambient temperature of the system location is 40 C. A temperature above 40 C is permissible (according to ETSI EN 300 019-1-3 V2.1.2 Edition 2003-04 for Environmental Class 3.1: Temperature controlled locations and ETSI EN 300 019-2-3 V2.1.2 for Environmental Class T3.1 and T3.1E: Temperature controlled locations) provided the probability of occurrence is less than 1%. A temperature of 50 C is permissible but the duration should not exceed 72 continuous hours.

Using Optical Fibers


Optical fibers are either single mode or multiple mode. The information in the following sections applies to all optical fibers.

Handling Optical Fibers


When handling optical fibers: Wear safety glasses when you install optical fibers. Do not look into the opening of an optical fiber, or the opening of an optical fiber connector, if the optical fiber is active or the unit has the power turned on. Avoid direct exposure to optical fiber ends or optical connector ends where you can access the laser signal directly.

2-10

Observing Safety Guidelines

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Egate-2000 includes Class 1 lasers. For your safety:

Warning

Do not look directly into the optical connectors while the unit is operating. The laser beams are invisible. Do not attempt to adjust the laser drive current. The use of optical instruments with this product will increase eye hazard. Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an optical instrument. Use of controls or adjustment or performing procedures other than those specified herein may result in hazardous radiation exposure.

Splicing Optical Fibers


Before looking at a spliced optical fiber with a magnifier: Power off all laser sources to the optical fiber or disconnect the remote optical fiber end from the laser sources before you start splicing. The laser sources can be in a central office, on subscriber premises, or in a remote location. Disconnect all optical test sets from the optical fiber before you start splicing. The connections can be local or remote. Use only the optical instruments approved by your company. When splicing optical fibers: Clean your hands after you handle optical fibers. Small pieces of glass are not always visible and can damage your eyes. Do not handle pieces of optical fiber with your fingers. Use tweezers (preferably non metallic) or adhesive tape to lift and discard any loose optical fiber ends. Wear rubber gloves when you clean optical connectors. The gloves prevent direct contact with the isopropyl alcohol and prevent contamination of the ferrules with skin oils. Place all optical fiber clippings in a plastic container provided for that purpose. Handle optical fibers with caution. Place the optical fibers in a safe location during installation. Protect all optical fiber connectors with clean dust caps at all times.

Follow the manufacturer instructions when you use an optical test set. Incorrect calibration or control settings can create hazardous levels of radiation.

Eye Injury Risk: If you have a piece of a glass in your eye, get medical assistance immediately. Warning

Egate-2000 Ver. 1.0

Observing Safety Guidelines

2-11

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Repairing Optical Fibers


When an accidental break occurs in the optical fiber: 1. Report the location of the damaged optical fiber to both the central office and the field repair personnel. 2. Power-off all laser sources to the optical fiber or disconnect the remote optical fiber end from the laser sources. The laser sources can be in a central office, on subscriber premises, or in a remote location.

2.4

Receiving and Unpacking Network Elements

This chapter describes the procedures to be followed during receiving and unpacking of the Egate-2000 Network Element. These procedures must be followed when equipment is delivered to the customer as part of a supply-only contract.

Verifying Shipment
The network element and the corresponding accessories are delivered in two different cartons. Compare the package list information with the alphanumeric information provided on the shipping labels. The package list and shipping labels should contain the same information.

Handling Package
Identify the top face of the container, (identifiable by packing labels) and keep the top face uppermost at all times. The package contents are to be considered fragile at all times. Apply sufficient water-proofing if packages are to be handled in wet weather conditions.

Storage
Follow the below instructions when storing the packages: Unpack the network element only during installation. Preserve the packaging materials (after unpacking the network element) for future use. If the network element is damaged during shipment, preserve as much of the packaging as possible to allow customer service and the shipper to analyze the damage.

Unpacking Network Element


Before unpacking the network element, make sure that you have the following tools: Sharp pointed blade or knife

2-12

Receiving and Unpacking Network Elements

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Conductive bonded wrist strap

To unpack the system: 1. Remove the plastic shrink-wrap and open the top of the cardboard shipping container. 2. Take the equipment out of the shipping carton and remove the packing material. 3. Take the equipment out of the plastic protective bag. 4. The product shipping container contains the product configured as ordered. Static charge can damage the equipment. While unpacking and handling cards, or making network element interconnections, wear a grounding wrist strap to discharge the static buildup.

Warning

2.5

Installing the Network Element

This chapter describes procedures to be followed when installing Egate-2000 network element. These instructions are limited to address the installation of the Egate-2000 network element and cards supplied. The installation of racks, electrical wiring, raceways, and other equipment are not covered in this guide. The relevant local/state/federal or international (if applicable) codes and regulations should be followed during the installation process.

Installation Guidelines
The guidelines for Egate-2000 network element installation are as follows: Consider the effect of additional electronic equipment and its generated heat on the Egate-2000 network element. Make sure the equipment rack is properly bolted to the ground. Install the first network element on the rack in the lowest possible position. Ensure that the wire size and dimension requirements are based on cable length and local engineering standards and practices.

Note

Egate-2000 network element must only be installed in a Restricted Access Location (RAL) in accordance with IEC 950. In this context, RAL are defined as locations where access can be restricted to suitably trained personnel and where unsupervised members (of the general public) are not allowed. Egate-2000 must be properly installed in a rack with brackets or in other ways properly connected to a safety ground. The Egate-2000 48 V DC must not be powered on from a source external to the RAL. All the electrical interfaces used must be limited to Safety Extra-Low Voltage (SELV). During installation, do not use the handle of the FRU to lift or align the shelf. In an unlikely event of fan not rotating while installing the FTUs, though the power supply cord is working, it is recommended to remove those specific FTUs.

Egate-2000 Ver. 1.0

Installing the Network Element

2-13

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Site Preparation
The installation site should meet the following criteria: Power supply requirements: -40 V DC to -60 V DC. Circuit breaker requirements: 8 A.

Note

The instructions in this chapter primarily address the installation of the Egate2000 network element and cards supplied. The installation of racks, electrical wiring, raceways, and other equipment are not covered in this guide. The relevant local/state/federal or international (if applicable) codes and regulations should be followed when assembling the same.

Installing Chassis into the Rack


In addition to the standard installer tool kit, the following items are also required for installation: Phillips screwdriver (PH3) to install the EGATE-2000 network element to the rack. Phillips screwdriver (PH1) to install the earth cable to the EGATE-2000 network element. Eight M6 mounting screws and nuts Power cable Earth cable Plugs for optical adapters Cable ties

To install the chassis into the rack: 1. Move the Egate-2000 network element to the desired rack position. 2. Affix the Egate-2000 network element to the rack with four M6 screws and nuts. Figure below shows the installation of the chassis to the rack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-2. Installing Chassis into the Rack

2-14

Installing the Network Element

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Connecting DC Power Supply


Egate-2000 is powered to the Power Connector of -48 V DC with 0V return through the Egate-2000M-PS card. For cable color details, refer to the "Power Cable " section in the Appendix "Cable Color Coding on page ". To connect the DC Power Supply Unit (Egate-2000M-PS card): 1. Ensure that the circuit breaker feeding power to the Egate-2000 network element is switched off. 2. Plug in the power cable to the power supply connector. 3. Route the power cable securely along the left side of the rack. Figure below shows the Power connection of the chassis to the rack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-3. Connecting DC Power Supply Unit

Connecting 48 V Earthing Cable


Egate-2000 is grounded via the 48 V power connector to the rack ground. Egate2000 network element is grounded via an external screw terminal to the building earth. This option is used only when the network element is not installed in a rack. The location of the screw terminal is on the rear-left of the network element. To verify the 230 V earth connection: 1. Remove the phillips screw from the Egate-2000 network element. 2. Affix the earth cable to the network element. 3. Verify that the ground cable is secured firmly to the network element. 4. Route the earth cable securely along the rack and connect it according to local site practice.

Egate-2000 Ver. 1.0

Installing the Network Element

2-15

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

2.6

Connecting the Egate-2000M-Main Card

This chapter describes the Egate-2000M-Main card configuration supported in Egate-2000 network element.

Alarm Connection
The alarm terminals communicate to Egate-2000 through RJ-45 connectors on the Egate-2000M-Main card. Egate-2000 supports 7 inputs and 4 outputs. For cable color details, refer to the Alarm-In Cable and Alarm-Out Cable sections in the Appendix Cable Color Coding To connect the alarm cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector accordingly as indicated by the arrowheads marked against the connectors. 3. Route the alarm cable from the Alarm Out port securely along the right side of the rack and connect it to the audio/visual unit. Figure below shows the Alarm In connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-4. Alarm-In Connection


Figure below shows the Alarm Out connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-5. Alarm-Out Connection

2-16

Connecting the Egate-2000M-Main Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Control Connection
Control access terminals communicate to Egtate-2000 using an RJ-45 connector on craft interface of Egate-2000M-Main card. For cable color details, refer to the Control/MNG cable in the Appendix Cable Color Coding. Follow the given procedure for connecting control cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the control cable securely along the right side of the rack. Figure below shows the control connection of the chassis to the rack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS STATUS ACTIVE

STATUS gate

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-6. Control Connection

External Clock Connection


Ext.Clock connection is made through a RJ-45 connector on the Egate-2000MMNG card. For cable color coding details, refer to the section Ext. clock in the Appendix Cable Color Coding. Follow the given procedure for connecting clock cable: 1. Identify and label the cable. 2. Connect the cable to the clock RJ-45 connector. 3. Route the Clock Cable securely along the right side of the rack. Figure below the clock connection of the chassis to the subrack.

Egate-2000 Ver. 1.0

Connecting the Egate-2000M-Main Card

2-17

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-7. Ext. Clock Connection

MNG-ETH Connection
MNG-ETH access terminals communicate to EGATE-2000 using an RJ-45 connector on MNG-ETH interface on Egate-2000M-MNG card. For cable color details, refer to the Control Cable section in the Appendix Cable Color Coding. To connect the LAN cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the LAN cable securely along the right side of the rack. Figure below shows the LAN connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-8. LAN Connection

MNG Connection
MNG access terminals communicate to Egate-2000 using an RJ-45 connector on MNG interface on Egate-2000M-Main card. For cable color details, refer to the Control/MNG CAble section in the Appendix Cable Color Coding.

2-18

Connecting the Egate-2000M-Main Card

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

To connect MNG cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the MNG cable securely along the right side of the rack. Figure below shows the MNG connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-9. MNG Connection

2.7

Connecting Optical Cards

This chapter describes the optical card configuration which includes STM-1/OC-3, STM-4/OC-12, and STM-16/OC-48 connections.

STM-1/OC-3 Connection
STM-1/OC-3 traffic is received and transmitted from the Egate-2000 network element through a LC connector. This connectivity is available on the STM-1/OC-3 interface of Egate-2000M-Main card.

Note

Egate-2000-Main base card mode 1xSTM-4/OC-12/4xSTM-1/OC-3 and STM16/OC-48 + 2xSTM-4/OC-12 can be configured from SLAT only. To configure the STM-1/OC-3 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-1/OC-3 connection of the chassis to the rack for Egate-2000Main card.

Egate-2000 Ver. 1.0

Connecting Optical Cards

2-19

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-10. STM-1/OC-3 Connection

STM-4/OC-12 Connection
STM-4/OC-12 traffic is received and transmitted from the EGATE-2000 network element through STM-4/OC-12 interface of Egate-2000-Main card. The connectivity is made through LC connectors.

Note

Egate-2000-Main base card mode 1xSTM-4/OC-12+4xSTM-1/OC-3 or STM-16/OC48 + 2xSTM-4/OC-12 or STM-16/OC-48 + 4xSTM-1/OC-3 can be configured from SLAT only. To configure the STM-4/OC-12 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-4/OC-12 connection of the chassis to the rack for Egate2000-Main card.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS STATUS ACTIVE

STATUS gate

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-11. STM-4/OC-12 Connection

2-20

Connecting Optical Cards

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

STM-16/OC-48 Connection
STM-16/OC-48 traffic is received and transmitted from the EGATE-2000 network element through STM-16/OC-48 interface of Egate-2000-Main card. The connectivity is made through LC connectors.

Note

Egate-2000-Main base card mode 1xSTM-4/OC-12+4xSTM-1/OC-3 or STM-16/OC48 + 2xSTM-4/OC-12 or STM-16/OC-48 + 4xSTM-1/OC-3 can be configured from SLAT only.
To configure the STM-16/OC-48 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-16/OC-48 connection of the chassis to the rack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-12. STM-16/OC-48 Connection

2.8

Connecting Ethernet Cards

This chapter describes Egate-2000M-8GbE card connections which include 100Base-Tx/1000Base-T and 1000BASE-X interface connections.

Connecting 100Base-Tx/1000Base-T Interface


Ethernet traffic is received and transmitted from the Egate-2000 network element through 100Base-Tx/1000Base-T interface (2000M-8GbE card). The connectivity is made through RJ-45 connectors. To connect 100Base-Tx/1000Base-T interface to the rack: 1. Identify and label the Ethernet cables. 2. Connect the cable to RJ-45 connectors and ensure that the retention slide operates to hold the connector in place.

Egate-2000 Ver. 1.0

Connecting Ethernet Cards

2-21

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

3. Route the Ethernet cables securely along the right side of the rack. Figure below shows 100Base-Tx/1000Base-T connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS

STATUS gate

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-13. Connecting 100Base-Tx/1000Base-T Interface

Connecting 1000BASE-X Interface


The optical Ethernet traffic is received and transmitted from the Egate-2000 network element through a 1000BASE-X interface of Egate-2000 8GbE card. The connectivity is made through an LC connector. To connect the 1000BASE-X interface: 1. Identify and label the Ethernet cables. 2. Connect the cable to LC connectors, and ensure that retention slide operates to hold the connector in place. 3. Route the cables securely along the right side of the rack. Figure below shows 1000BASE-X connection of the chassis to the subrack.

Egate-2000M-PS

Egate-2000M-8GbE
GbE GbE CONTROL

4
8 7 6 5 4 3 2 1

FAN
STATUS

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

5
LINK ACT LINK ACT

gate 000 a Egate-2000M-Main C Egate-2000M-Main


S US ACTIVE STATUS ACTIVE STATUS gate 000 a Egate-2000M-Main C Egate-2000M-Main S US ACTIVE STATUS ACTIVE STATUS

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2

S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1

CO

CONTROL CONTROL

C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4

SYNC 5 SYNC 5 5

3 3 3

2 2 2

Egate-2000M-PS

Egate-2000M-8GbE
GbE

-48V/-60V

7.0/5.5A 48 V 12 V PWR STATUS


ACTIVE STATUS

RESET

GbE

CONTROL

9
LINK ACT LINK ACT

ESD

Figure 2-14. Connecting 1000BASE-X Interface

2-22

Connecting Ethernet Cards

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

2.9

Node Commissioning

Logging Into an Un-commissioned Network Element


Before logging into an un-commissioned Network Element, ensure that the PC is connected to the MNG-ETH interface of the network element through a crossover cable with RJ-45 connectors.

Note

Change the default username and for the default user account on the network element. The default user accounts and passwords are widely known.
To Login to an un-commissioned network element: 1. Launch the Netscape 4.75/ Internet Explorer 6.0 / Mozilla 1.7.15 browser and enter the URL http://192.168.1.254:20080/ . The default IP address of the MNG-ETH interface is 192.168.1.254. 2. If the network element does not respond, check the physical connection. Otherwise, contact your next level of support. 3. If the login screen appears enter the default user id and password at the login prompt, where: Username: su Password:1234

4. The Navigation menu of the network element is displayed. Node View is the default page of the WUI. 5. If the default page of the WUI does not appear or login failed, check whether the user id and password entered are correct. The user id and the password rules are given below:

Table 2-4. User Id and Password Details


Username
is unique. can be alphabetic/numeric/alphanumeric. supports special characters except space. supports up to 32 characters is case sensitive is unique. at least be eight characters long can be alphabetic/numeric/alphanumeric. supports special characters except space. is case sensitive. user ID cannot be identical.

Password

Connecting the PC to the MNG-ETH interface of the Network Element


Before connecting the PC to the MNG-ETH interface of the Network Element,
Egate-2000 Ver. 1.0 Node Commissioning 2-23

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Ensure that you have a PC and an Ethernet crossover cable with an RJ-45 connector. Ensure you have the network element IP address information, if the network element has already been commissioned.

Note

After powering up the network element you have to wait for approximately 5 minutes for the network element software to be up. The Status/Active LED indicates the up status of the network element. The IP address of the PC should be in the same IP subnet as that configured on the node.
Follow the procedure for connecting the PC to the MNG-ETH interface of the network element. 1. Connect the MNG-ETH port of the network element and the PC terminal with an Ethernet cable of RJ-45 connector type. 2. Configure the IP address of the PC to be in the same sub net as the network element. 3. If the above steps fail, check whether that you have used correct cables.

Note

While connecting to an un-commissioned network element, your PC IP address must be 192.168.1.xxx where xxx is between 1 and 253. While connecting to a commissioned network element, your PC IP address must reside in the same subnet as the network element. Also, configure the PC subnet mask to match the network elements subnet mask and the PC default gateway must be in the same LAN, where gateway is there.

Downloading Software from SLAT Page


Before delivering software from SLAT page, ensure that you have PC and an Ethernet crossover cable with RJ-45 connector. Network element IP address information if the network element has already been commissioned.

To download software from SLAT page: 1. Connect the laptop with static IP 192.168.1.x to the node so that, it can be accessed. 2. Launch the Netscape 4.75/Internet Explorer 6.0/ Mozilla 1.7.15 browser and enter the URL http://192.168.1.254:20080 3. Restore from a previous back up configuration. 4. Initialize node parameters. 5. Please install the software to proceed. 6. Click Please install the software to proceed. 7. Select the software download options 8. Deliver release from local machine 9. Deliver release from remote machine

2-24

Node Commissioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

10. If local machine is selected, provide the path of the file where you have the file store. 11. If a remote machine is selected, provide the following: User name Password IP of remote machine FTP (optional) Directory

12. Click Submit. The new software gets downloaded to the NE. On completing the download, the system will prompt you to initialize the node parameters like Node Name, Ethernet IP address, location and Router ID. On initializing the node parameters, node will go for warm reboot and while the node is coming up the software gets initialized on the NE. Once the node is up, issue a service disruptive reboot for the FPGAs to get programmed on the NE.

Note

After restoring the new database, the network element requires a hard reboot for the new configuration to take effect. You can verify the software Version from the description field of the default WUI page. The software version is in the format x.y, where "x" and y represents major and minor release respectively.

Setting Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element
Ethernet IP Each network element has a network management system (NMS) interface which is a 10/100 Mbps network interface controller (NIC) port. Ethernet IP is the IP address with which the network element communicates with the external world. Subnet mask length The subnet mask length is an optional parameter that corresponds to the Ethernet IP address. Sub-netting is used to set the subnet mask parameters.

Note

The subnet mask for a point-to-point connection (that is, a direct Ethernet connection between the WUI host and the network element) should be set to 32.
Router ID Network element communicate in the network over the embedded communication channel (ECC), using the router ID. A network element can be configured either as a gateway element (interconnecting two networks) or just a pass-through network element. Before setting the Ethernet IP, Subnet Mask, Router ID, and rate on the Network Element: 1. Log into network element WUI using the MNG-ETH port. 2. Ensure your PC is correctly connected to the network element through the MNG-ETH interface.

Egate-2000 Ver. 1.0

Node Commissioning

2-25

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

3. Ensure that you have the Ethernet IP address, router ID, sub net mask and static route IP of the network element to be configured. 4. Ensure the PC is configured in the same LAN as the network element. 5. To set the Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element, Click Initialize Node Parameters. 6. Enter the network element name in the name field. 7. Enter the functional router ID of the network in the router ID field of the NE information page. Network element uses same entered ID for communication over ECC path. 8. In the Ethernet IP field the IP address must be entered. The Ethernet IP of each network element in the network must be in different networks and unique. 9. Select the SDH/SONET mode in which the network element needs to function. 10. Click Submit. A confirmation page is displayed. 11. Click Accept Valid Modifications. A network element reboot warning is displayed.

Note

The network element name can be alphabetic/numeric/alphanumeric consisting of 1-20 characters. Special characters can also be used, except space. The default router ID displayed is 192.168.1.254. The node IP is to be set as 192.168.1.xxx, where xxx must be between 1 to 253. The last octet of the router ID and Ethernet IP must not be provisioned as 0 and 255 as they are reserved addresses and therefore should not be provisioned, The default Ethernet IP displayed is 192.168.1.254 The network element reboots after the Ethernet IP, subnet mask and the router ID are entered. After the network element is up, verify whether all the changes are reflected. If the changes are not reflected correctly, contact your next level of support. The PC IP configuration must be updated to ensure reachability to the newly provisioned IP address for the network element. Software Version is displayed in the description field of the default WUI page. The software Version is in the format x.y, where "x" is the major release and "y" is the minor release.

Note

Note Note

Verifying the Serial Numbers of Cards and Pluggable Modules of the Network Element
To verify the serial numbers of the chassis and the cards present in the network element: 1. Click Inventory in the Navigation menu. 2. Click on Node inventory link. The Node inventory page is displayed. 3. View the serial numbers of all the cards in the network element in the Node Inventory page.
2-26 Node Commissioning Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

4. Verify the serial numbers of all the cards with the shipment report. 5. Verify whether all the cards present in the chassis are listed with the correct information in the WUI Inventory application. 6. Verify whether the Power LED is turned on with green color for all the cards.

Nominating a Synchronization Reference Clock Source for the Network Element


To nominate a synchronization reference clock source for the network element: 1. Click Configuration in the Navigation menu. 2. Click Synchronization > Nominate Timing Reference. The Nominate Timing Reference page is displayed. 3. Select the clock reference type for a network element. Set the clock reference port and the priority for the clock reference selected. 4. Click Submit. Changes are applied and a confirmation message is displayed. 5. If the clock source is not nominated as expected, contact your next level of support.

Setting Network Element Date and Time


Use the following procedure to edit Network Element date and time: Setting date and time for a network element: 1. Click System Time in the Navigation menu. 2. Click Set time link. Set Node Time page is displayed. 3. Set date and time by selecting appropriate values from the drop-down menu. 4. Click Submit. The changes are applied and a confirmation message is displayed. Setting time zone for a network element: 1. Click System Time in the Navigation menu. 2. Click Set time zone link. Set Time Zone page is displayed. 3. Set the time zone by selecting appropriate value from the drop down menu. 4. Click Submit. 5. The changes are applied and a confirmation message is displayed. In case the drop down menu does not display the desired time zone, click Other Time Zones. The Other Time Zones page is displayed. 6. Enter the name of the time zone, the offset value, Enable Day light saving from drop down menu. Set the Day light saving time parameters as: Month Week Day

Egate-2000 Ver. 1.0

Node Commissioning

2-27

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Hour Minute

7. Click Submit. Changes are applied and a confirmation message is displayed. Setting time server for a network element: Click System Time in the Navigation menu. 1. Click Set time server link. Set Time Server page is displayed 2. Enable the field NTP Client Enable. 3. Enter the IP address of the server from which the network element is to derive the date and time. 4. Select the Synchronization interval from the drop-down menu. 5. Click Submit. Changes are applied and a confirmation message is displayed.

Note

Set the timing server of stratum level to 14 or less than 10. The network element will not synchronize to the server if the stratum level is not within the specified range. NTP servers provisioned may take five minutes to update current NTP server parameter.

Backing Up or Restoring Network Element Configuration Data


Before backing up or restoring the network element configuration data, ensure that: PC/Laptop is connected to the FTP server. IP address of the source/destination for the restore or backup operation is correct. Directory path from where the configuration file will be restored from or saved to is correct. Username and password of the FTP account is correct.

Note

If you have a Linux or Unix machine, enable the FTP server that comes along with it. If you are using a Windows machine, you must install FTP server such as 3Com. The FTP server for Windows is retrieved from the following location: http://support.3com.com/software/utilities_for_windows_32_bit.htm
To back up the network element configuration data, perform the following steps: 1. Click Maintenance > Configuration Management > Backup configuration/Restore configuration in the Navigation menu. Restore or Backup configuration page is displayed. 2. Enter the parameters for restoring/backing up the configuration data. 3. Click Submit. 4. Click Accept Valid Modifications. 5. A confirmation page displaying the successful completion of the restoration process appears.

2-28

Node Commissioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Note

The network element goes for a automatic reboot after committing the database for the new configuration to take effect.

2.10 Recording Data and Test Results


This appendix provides various forms to record system data and test results during the commissioning process. These forms must be filled and completed as and when you complete the tests during the network element commissioning process.

Site Verification Checklist


Table 2-5. Name of Table
SI No Site Verification Checkpoints Status (Yes/No) Measurements (Mts) Remarks

Is the Existing Rack width in line with the standard measurements details (19", 21", 23 ")? If yes, is there a Clearance for equipment with existing rack?

Can the existing room accommodate new Racks? If no, has a recommendation been done to the Customer or any alternative method suggested? Has the suggestions /recommendations recorded in the Remarks Column?

Are the Rack and equipments shipped to site?

Please provide the flooring details False flooring Non False flooring

4 5

Is the AC Power Supply at the Site being evaluated? Is the DC Power Cable and the Ground Cable extended till the Rack? If no, has a suggestion / recommendation been communicated? This should be recorded in the Remarks Column

Egate-2000 Ver. 1.0

Recording Data and Test Results

2-29

Chapter 2 Installation and Comissioning Guide SI No Site Verification Checkpoints Status (Yes/No)

Installation and Operation Manual Measurements (Mts) Remarks

Is there adequate distance between DCDB and rack for extension of Power cables If no, has a suggestion or recommendation been communicated? This has to be recorded in the Remarks Column

<< Record the measurement here >>

Is there adequate distance between Ground point and the rack? If no, has a suggestion or recommendation been communicated? Has this been recorded in the Remarks Column?

<< Record the measurement here >>

8 9

Is Rectifier available at Site and is powered on? Has Type of E1 DDF available and verified (Poyet, Krone, Wrapping, RJ45)? Is there adequate distance between Equipment and the DDF (For D62 to Open-end E1 Cable)? Is there an FDF available at the site? Is there adequate distance between the FDF and the equipment for fiber patch chords? Is there adequate distance between the DS3 DDF Panel and the Equipment?

10

<< Record the measurement here >>

11 12

<< Record the measurement here >> << Record the measurement here >>

13

Commissioning and Testing Report


Product description Name of the customer Location Ethernet IP Router ID Representative name Signature

2-30

Recording Data and Test Results

Egate-2000 Ver. 1.0

Installation and Operation Manual Customer representative name Signature Date

Chapter 2 Installation and Comissioning Guide

Receiver Sensitivity Measurements for STM-1/OC-3


Table 2-6. Name of Table
Parameter Laser Type Spec Measured Values Port 1 Tx output power (dBm) S1.1 L1.1 L1.2 Receiver Sensitivity (dBm) S1.1 L1.1 L1.2 -8 to -15 0 to -5 0 to -5 -8 to -28 -10 to -34 -10 to -34 Port 2

Receiver Sensitivity Measurements for STM-4/OC-12


Table 2-7. Receiver Sensitivity Measurements for STM-4/OC-12
Parameter Laser Type Spec Measured Values Port 1 Tx output power (dBm) S4.1 L4.1 L4.2 Receiver Sensitivity (dBm) S4.1 L4.1 L4.2 -8 to -15 2 to -3 2 to -3 -8 to -28 -8 to -28 -8 to -28 Port 2

Receiver Sensitivity Measurements for STM-16/OC-48


Table 2-8. Receiver Sensitivity Measurements for STM-16/OC-48
Parameter Laser Type Spec Measured Values Port 1 Tx output power (dBm) S16.1 0 to -5 Port 2

Egate-2000 Ver. 1.0

Recording Data and Test Results

2-31

Chapter 2 Installation and Comissioning Guide Parameter Laser Type L16.1 L16.2 Receiver Sensitivity (dBm) S16.1 L16.1 L16.2 Spec 3 to -2 3 to -2 -18 to 0 -27 to -7 -28 to -7

Installation and Operation Manual Measured Values

Synchronization Tests
Table 2-9. Synchronization Tests
Clock Status

STM-1/4 BITS clock, BITS data Internal Hold over

BER (BIT Error Rate) Performance


Table 2-10. BER Performance
Ethernet Ports Results Ethernet Ports Results

Protection Switching on Fiber breaks, STM LOS


Table 2-11. Protection Switching on Fiber breaks, STM LOS
Ethernet Protection Switching Work to protect Protect work

2-32

Recording Data and Test Results

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

2.11 General Procedures


This chapter describes the procedures to be followed when cleaning and inspecting optical and fiber connectors. It also describes the procedure to be followed when inserting and ejecting the cards and fan trays. It is recommended to always clean fiber-optic connectors before connecting to transmission equipment, test equipment, patch panels, or other connectors.

Cleaning Fiber Connectors


To clean fiber connectors: 1. Clean the fiber end with a new lint-free cleaning pad, lens tissue, or swab. Move the cleaning pad back and forth across the fiber end several times. If you are using a swab, gently rotate the swab as you wipe across the end face. 2. Clean the ferrules and other parts of the connector with a lint-free, non abrasive cleaning pad or lens tissue. After you finish, discard the used pad or tissue. 3. Aim a filtered, dry compressed-air dust remover at a shallow angle to the fiber end face and blow across the end face from a distance of 68 inches. 4. Verify whether the other end of the fiber is disconnected from its laser source. 5. Inspect the fiber-optic connector with an optical fiber scope to verify that it is free of dirt and dust. Then do either of the following: 6. If the connector is clean, cover the connector with a protective dust cover until ready to use it. 7. If the connector is not completely clean, continue with steps 6 through 14 to clean it with alcohol. 8. Apply 99% isopropyl or ethyl alcohol to a lint-free, non-abrasive cleaning pad or lens tissue. 9. Clean the ferrules and other parts of the connector with a lint-free, non abrasive cleaning pad or lens tissue. After you finish, discard the used pad or tissue. 10. Apply alcohol to a new, lint-free cleaning pad, lens tissue, or swab. 11. Clean the fiber end with a new lint-free cleaning pad, lens tissue, or swab. Move the cleaning pad back and forth across the fiber end several times. If you are using a swab, gently rotate the swab as you wipe across the end face. 12. Immediately dry the fiber ends with a clean, dry, lint-free cleaning pad or lens tissue. 13. Discard the used cleaning materials. 14. Aim a filtered, dry compressed-air dust remover at a shallow angle to the fiber end face and blow across the end face from a distance of 150-200 mm.
Egate-2000 Ver. 1.0 General Procedures 2-33

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

15. Inspect the fiber-optic connector with an optical fiber scope to verify whether it is free of dirt and dust. 16. Cover the connector with a protective dust cover until it is ready to be used.

Cleaning Optical Connectors


It is important to keep all interconnects as clean as possible. Since the singlemode fiber has a light-carrying core with diameter less than 10 micro meters, even a single microscopic speck of dust on the connector end can significantly attenuate the light traveling through the fiber. Clean connections are required for accurate and repeatable measurements. Leave the protective dust covers on the connectors when they are not in use. Observe the following guidelines to achieve the best performance: Visually inspect fiber ends to locate any signs of damage. Use dry connections whenever possible. Keep connectors covered when not in use.

For more information on cleaning procedure, refer to Cleaning Fiber Connectors

Caution Improper cleaning may result in high attenuation due to dirt or dust or may cause mechanical damage to the fiber end, resulting in performance degradation. While handling an optical fiber, take care not to exceed the minimum bed radius, 35 mm, Do not over tighten the cable tie wraps while dressing the cable.

Warning

DANGER: Do not look into the end of fiber-optic connectors or into faceplate connectors of installed circuit packs. The light source used in fiber-optic devices can damage your eyes
The following items are recommended for cleaning the optical connectors: 99% isopropyl or ethyl alcohol Lint-free, non abrasive optical-quality cleaning pads or lens tissue, or cotton or urethane-foam swabs. Pressurized dry-air duster. Optical fiber scope.

Inspecting Fiber Connectors


To inspect the fiber connectors: 1. Verify whether the other end of the fiber is disconnected from its laser source. 2. Visually inspect all fiber-optic connections before use. A minimum magnification of 200X is required for proper inspection.

2-34

General Procedures

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

3. Inspect the end of the fiber face with the optical fiber scope. Compare with figure below to determine the condition of the fiber end face. If you need to clean or polish the end face, refer to Cleaning Fiber Connectors

Figure 2-15. Fiber Intersection


Table below provides the recommended conditions for fiber connectors.

Table 2-12. Recommended Conditions for Fiber Connectors


Fiber End-Face Condition Ideal Light scratches Heavy scoring or scratches Chip outside the fiber core Chipped core Rough surface Dirt or debris Chipped face Cracked fiber Broken fiber Recommendation/Action No action required Polish with 0.3 micron film Repolish the face Repolish the face Unacceptable; reject the connector Repolish the face Clean or repolish the surface Unacceptable; reject the connector Unacceptable; reject the connector Unacceptable; reject the connector

Inserting and Ejecting Cards


This section details the insertion and ejection of the cards in a network element. The cards are provided with ejectors that aid in their insertion and ejection from the chassis.

Caution Static electricity: Static electricity can damage the equipment. While unpacking and handling cards, or making network element interconnections, wear a grounding wrist strap to discharge the static buildup.

Egate-2000 Ver. 1.0

General Procedures

2-35

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Caution If any of the plug-in units or interface modules need to be inserted or ejected, it is imperative that the following procedures are adopted to avoid possible damages to the connectors or spring fingers.
To insert a card in a network element: 1. Identify the correct position of the chassis. 2. Identify the appropriate slot into which the card is to be inserted. 3. Slide in the card along the guide ways provided on the chassis with the ejector levers in the horizontal position to engage the ejectors to the chassis groove. 4. Operate the two ejector levers (inwards) simultaneously to engage the card to the backplane. 5. Fasten the face plate to the chassis using Philips (PH1) screwdriver.

Caution RISK OF PERFORMANCE DEGRADATION: Failure to fasten the face plate to the chassis may result in intermittent failures, because of poor connectivity.
To eject a card from the network element: 1. Identify the card that is to be ejected. 2. Remove both screws located at either end of the face plate using Philips (PH1) screwdriver. 3. Operate the two ejector levers (outwards) to disengage the card from the backplane. 4. Slide out the card with the ejector levers in horizontal position along the guide ways.

Inserting and Ejecting Fan Tray


To insert a fan tray in a network element: 1. Identify the correct slot for the fan tray. 2. Slide the fan tray with carrier along the guide ways provided on the chassis. 3. To engage the fan tray to the backplane connector, push the carrier handle. 4. Fasten the carrier plate to the chassis using Philips (PH1) screwdriver.

Caution RISK OF PERFORMANCE DEGRADATION: Failure to fasten the face plate to the chassis may result in intermittent failures because of poor connectivity.
To eject a fan tray from a network element: 1. Remove the two screws located at either end of the carrier plate using Philips (PH1) screwdriver. 2. Pull the carrier handle to disengage the fan tray from the backplane connector.
2-36 General Procedures Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

3. Slide the fan assembly with carrier along the guide way till it comes out of the slot.

2.12 General Configuration


This appendix describes the general configuration procedures for Egate-2000 network element.

Switch ON Node and PC Configuration


Switch ON the Node, wait for at least 7 minutes for the node to completely come-up (before trying to ping or access the node (through Internet Explorer)). 1. The Factory default IP address is 192.168.1.254 or the one which is present on the sticker pasted on the Node. 2. Use a PC/Laptop and configure the PC/laptop 3. IP Address to: Replace the IP address in the 192.168.1.0 network 4. Subnet Mask to: 255.255.255.0 5. Connect the PC to the LAN/LCT interface of the multiplexer using a cross RJ45 LAN cable.

Logging into the System


To log into the system: 1. Connect the Ethernet port of PC/Laptop to the MNG-ETH port of the network element using a cross cable. Use straight cable only, if both Egate-2000 and PC/Laptop are connected through Hub/Switch. 2. Open the Internet Explorer in the Windows PC, Enter the address in the address space: http://192.168.1.254:20080. 3. Log into the WUI with following user name and password. 4. User Name: su 5. Password: 1234 6. Configuration: Name: Enter the Name of the Site/Location. (or any text for reference) Router ID: Enter the Router ID (Ex:192.168.254.1) Ethernet IP: Enter the Ethernet IP Contact: Enter the contact details Location: Enter the location name

7. Submit changes and Accept the Modifications. The network element will go for a soft reboot if values of Ethernet IP and Router ID are changed and after 3 minutes, you can login to the system. If you are connecting another Node
Egate-2000 Ver. 1.0 General Configuration 2-37

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

to this Local Node, then set the Remote node with the router ID and Ethernet IP as follows: 8. Router ID: Enter the Router ID (Ex: 192.168.254.2) 9. Ethernet IP: Enter the Ethernet IP

Configuring Optical Ports


To configure optical ports: 1. Click Configuration > Facilities > STM Ports > desired STM/OC port. 2. Change the following settings: Admin Status: Up TIM Action: tim_ignore

3. Submit changes and Accept Valid Modifications. 4. Click Configuration >Facilities > STM Ports > AU4 and change Signal Label to tug_structure 5. Submit changes and Accept Valid Modifications.

Configuring OSPF Parameters


To configure OSPF parameters: 1. Click Configuration > DCN > Network interface in the navigation menu. Network interface configuration page is displayed. 2. Click Provision ECC. Provision ECC page is displayed. 3. Select Port and ECC Byte Selection from the drop down menu and click Submit. 4. Select Enable in OSPF drop down menu and click Submit. A confirmation page is displayed. 5. Click Accept Valid Modifications.

Configuring Ethernet Ports


To configure the Ethernet port: 1. Click Configuration >Facilities > Ethernet in the navigation menu. Admin Status: Up Include Alarm Reporting Status: Report Link Integrity: Enable at both ends Auto Negotiation: Enable or Disable depending on end equipment configuration
Egate-2000 Ver. 1.0

2-38

General Configuration

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

Flow Control: Manual TX-Rx (select the flow control mode depending on the end equipment configuration). Threshold Enable for 15 min Interval: Enable or Disable Circuit Identifier: User dependent /Convenient

2. Click the intended Ethernet port. 3. Click Submit. A confirmation page is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. Repeat the above steps to configure the more Ethernet ports.

Configuring VCG Ports


To configure VCG ports: 1. Click Configuration > Facilities > VCG > VCG Group and configure following settings: LCAS : Enable (Has to be enabled at both ends) VCAT: Enable Operating Granularity: VC-12 depending on customer requirement Payload FCS: Enable Circuit Identifier: Any alphanumeric string to identify the interface

2. Click Submit. A confirmation page is displayed. 3. Click Accept Valid Modifications. Repeat the above steps to configure more VCG ports.

Adding New VC To VCG


To add new VC to VCG: 1. Click Configuration > Facilities > VCG. VCG interface configuration page is displayed. 2. Click VCG to be configured. Provisioning VCG Interface page is displayed. 3. Click Add new VC. Add VC to VCG page is displayed. Configure the following parameters: Number of connections: Enter the number of VCs to be created. Working Port: select a work port and corresponding K, L, M values Reversion Mode: Non-Revertive/Revertive. The default value is NonRevertive. The options Revertive and Non-Revertive are available when protection is enabled. WTR Time: Select value when Revertive is selected for Reversion Mode.

Egate-2000 Ver. 1.0

General Configuration

2-39

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Protection type on network: No Protection/50ms Protection/Slow Protection

4. Click Submit. A confirmation page is displayed. 5. Click on Accept Valid Modifications. A "Successfully Modified" message is displayed. 6. Repeat the above steps to add more VCs.

Configuring Timing Manager


To configure Timing Manager: 1. Click Configuration > Synchronization > Synchronization Status in the navigation menu and change QL Mode to Enable. To configure the following parameters refer to User Interface guide: QL Mode Output QL mode reversion mode WTR time output QL min QL

2. Click Submit. 3. Click Nominate timing reference. Provide the second reference source and assign the second priority to it. 4. Select a value from the drop-down menu for the following: Clock Reference Clock reference Port Priority

5. Click View Nominated timing reference to verify the nominated clock. Repeat the above steps to nominate more than one clock source.

Checking Alarms
To check the alarms: 1. To view current active alarms, click Faults > Active Alarms in the navigation menu. 2. To view all the alarms suppressed on the node, click Faults > Suppressed Alarms in the navigation menu. 3. To provision new alarm filters, click Faults > Alarm Filters in the Navigation menu.

2-40

General Configuration

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

4. To provision the alarm history, click Faults > Event history in the Navigation menu. 5. To view and change the severity of alarms, click Faults > Alarm Severity in the navigation menu. An asterisk appears before the name of alarms for which severity has been changed.

2.13 Connector Pin Assignment


This appendix details connector pin details used for installing the network element.

Power Connector
Table 2-13. Power Connector
Diagram Pin 1 2 3 Signals RET GND -48 V

Alarm Input Connector


Table 2-14. Alarm Input Connector
Diagram Pin Description

RJ-45
1 2 3 4 5 6 7 8 ALARMIN1 ALARMIN2 ALARMIN3 ALARMIN4 ALARMIN5 ALARMIN6 ALARMIN7 GND

Egate-2000 Ver. 1.0

Connector Pin Assignment

2-41

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Alarm Output Connector


Table 2-15. Alarm Output Connector
Diagram Pin Description

RJ-45
1 2 3 4 5 6 7 8 ALARMOUT4_COM ALARMOUT4 ALARMOUT3_COM ALARMOUT3 ALARMOUT2_COM ALARMOUT2 ALARMOUT1_COM ALARMOUT1

Ext. Clock Connector


Table 2-16. Ext. Clock Connector
Diagram Pin 1 2 3 4 5 6 7 8 6 Signals CLKIN+ CLKINDATAIN+ CLKOUTCLKOUT+ DATAINDATAOUT+ DATAOUTNC

MNG Connector
Table 2-17. MNG Connector
Diagram Pin 1 2 3 4 Description DSR CD DTR GND

2-42

Connector Pin Assignment

Egate-2000 Ver. 1.0

Installation and Operation Manual Diagram Pin 5 6 7 8

Chapter 2 Installation and Comissioning Guide Description RD TD CTS RTS

MNG-ETH Connector
Table 2-18. MNG-ETH Connector
Diagram Pin 1 2 3 4 5 6 7 8 Description TX_P TX_N RX_P Unused Unused RX_N Unused Unused

2.14 Cable Color Coding


This appendix describes the color coding scheme used for different cables.

Power Cable
Table 2-19. Power Cable
Pin 1 2 3 Color code Red Green Black

Egate-2000 Ver. 1.0

Cable Color Coding

2-43

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

Alarm-In Cable
Table 2-20. Alarm-In-Cable
Pin Color code Signal Pair

RJ-45
1 2 3 6 5 4 7 8 White/Orange Orange White/Green Green White/Blue Blue White/Brown Brown ALARMIN_1 ALARMIN_2 ALARMIN_3 ALARMIN_4 ALARMIN_5 ALARMIN_6 ALARMIN_7 GND P4 P3 P2 P1

Alarm-Out Cable
Table 2-21. Alarm-Out-Cable
Pin Color code Signal Pair

RJ-45
1 2 3 4 5 6 7 8 White/Orange Orange White/Green Green White/Blue Blue White/Brown Brown ALARMOUT4_COM ALARMOUT4 ALARMOUT3_COM ALARMOUT3 ALARMOUT2_COM ALARMOUT2 ALARMOUT1_COM ALARMOUT P4 P3 P2 P1

MNG Cable
Table 2-22. MNG Cable
Pin Color Code Signal Pin

RJ-45
1 2 3 Black White Red DSR CD DTR

DB9
6 1 4

2-44

Cable Color Coding

Egate-2000 Ver. 1.0

Installation and Operation Manual Pin 4 5 6 7 8 Color Code Green Brown Blue Orange Yellow Signal TD RD GND CTS RTS

Chapter 2 Installation and Comissioning Guide Pin 5 2 3 8 7

Ext. Clock Cable


Table 2-23. Ext. Clock Cable
PIn RJ-45
1 2 3 4 5 6 7 8 White/Orange Orange White/Green Green White/Blue Blue White/Brown Brown CLKINP/DATAINP CLKINN/DATAINN CLKINP/DATAINP CLKINN/DATAINN CLKOUTP/DATAOUTP CLKOUTN/DATAOUTN CLKOUTP/DATAOUTP CLKOUTN/DATAOUTN P1

Color Code

Signal

Pair

P2

P3

P4

Control Cable
Table 2-24. Control Cable
Pin Color Code Signal Pin

RJ-45
1 2 3 4 5 6 7 8 White/Orange Orange White/Green Blue White/Blue Green White/Brown Brown RXP RXN TXP Unused Unused TXN Unused Unused 3 6 1 4 5 2 7 8

Egate-2000 Ver. 1.0

Cable Color Coding

2-45

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

2.15 Glossary of Terms


B
Backplane
Passive circuit board providing the connectors for the front boards. Power distribution, management, and auxiliary signal connections are supported.

D
DCN
Data Communication Network is SDH network that enables OAM communication
between individual network elements as well as inter network element communication.

DHCP
Dynamic Host Configuration Protocol. A protocol used by networked devices (clients) to obtain various parameters necessary for the clients to operate in an Internet Protocol (IP) network. By using this protocol, system administration workload greatly decreases, and devices can be added to the network with minimal or no manual configurations.

DNS
Domain Name System. A database system that translates an IP address into a
domain name.

E
ELAN
Emulated Local Area Network. An emulated LAN is a set of clients and servers connected by virtual circuits over a network.

F
FTP
File Transfer Protocol. A standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet.

2-46

Glossary of Terms

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 2 Installation and Comissioning Guide

L
LC Connector
Lucent Connector. An optical fiber connector terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. LC connectors are replacing SC connectors in corporate networking environment due to its smaller size.

LFD
Plesiochronous Digital Hierarchy (PDH). A technology used in telecommunications
networks to transport large quantities of data over digital transport equipment such as fibre optic and microwave radio systems.

N
NMS
Network Management System. An integrated platform for managing network
elements across an intelligent optical network. The NMS collects and represents data from geographically dispersed network elements on to a console in a centralized Network Operations Center (NOC).

O
OSPF
Open Shortest Path First. A dynamic routing protocol for use in Internet Protocol
(IP) networks.

P
PSU
Network Element. A manageable logical entity uniting one or more physical
devices.

S
SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.
Egate-2000 Ver. 1.0 Glossary of Terms 2-47

Chapter 2 Installation and Comissioning Guide

Installation and Operation Manual

SONET
Synchronous Optical Network is an American National Standards Institute (ANSI) standard for high speed communication over fiber-optic networks. SONET uses time division multiplexing to send multiple data streams simultaneously.

STM
Synchronous Transport Module. The rate of transmission of the SDH (ITU-T fiber
optic network transmission) standard. The levels are STM-1, STM-4, STM-16 and STM-64.

V
VC
Virtual Concatenation. A technique that allows SONET/SDH circuits to be grouped
into arbitrarily sized bandwidth increments for more efficient transport of client protocols.

VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller individual containers, which are grouped together and logically represented by a VCG.

2-48

Glossary of Terms

Egate-2000 Ver. 1.0

Chapter 3 Layer 2 Services


This chapter introduces L2 services, concepts, provisioning and organization of the user interface. The following are described:

System Level Configuration Port Configuration Ethernet Ring Protection (ERP) Services Provisioning Operation, Administration, and Maintenance (OAM) Ingress Quality of Service (QoS) Egress Quality of Service (QoS) Establishing Data Communication Network (DCN).

3.1

System Level Configuration

One system level parameter of the L2 service configuration is the FDB (MAC table) Aging Time; this configures the aging time for E-Lan service VBIs (see ELAN services configuration later in this chapter).

Viewing and Editing FDB Age Configuration


To view system configuration information: Click L2 Services > ServiceSwitch-(slot number)> System in the navigation menu. The View System Configuration page is displayed.

Egate-2000 Ver. 1.0

System Level Configuration

3-1

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-1. Viewing System Configuration


To edit FDB age: 1. Click L2 Services > ServiceSwitch-(slot number)> System in the navigation menu. The View System Configuration page is displayed. 2. Click Edit link. The Edit System Configuration page is displayed. 3. To edit the FDB age, enter a value for the FDB aging. Acceptable values range from 10 seconds to 1 Million seconds. 4. Click Submit. A confirmation page is displayed. 5. Click Accept Valid Modifications. A Successfully Modified message is displayed.

Table 3-1. System Parameters


Field FDB Age(Secs) Description Ageing time is a feature of the whole switch where the stale entries are removed. The time value is between 10 seconds and 11.6 day and is configurable by software. Value must be entered in seconds only. For example: For 5 minutes enter the value as 300 seconds.

Port Configuration
Port configuration is composed of physical and logical (switching and service related) parameters. Port status and statistics are also viewed through the port screen. To view port information: Click L2 Services>ServiceSwitch-(SlotNo) >Port Configuration. The View Service Switch Port page is displayed.
3-2 System Level Configuration Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-2. Viewing Service Switch Port

Configuring or Editing Physical Port Parameters


To configure or edit Physical port parameters: 1. Do one of the following: Click the Edit link for the port to be updated. The Provisioning Ethernet Interface port page is displayed. OR Click the port link. The Port page is displayed. 2. Edit required values referring to the Ethernet Port Physical Parameters table. 3. Click Submit. A confirmation page is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Table 3-2. Edit Physical Switch Port Parameters


Parameter Admin Status Default Value Down Description Up: Sets the port in service. Down: Sets the port out of service. Alarm Reporting Status Link Status Report Down Allows you to choose Report/No-Report of Alarm for the particular port. Displays the link status of the Ethernet interface.

Egate-2000 Ver. 1.0

System Level Configuration

3-3

Chapter 3 Layer 2 Services Parameter MTU Auto-Negotiation Default Value 9600 Enable Description

Installation and Operation Manual

Displays the maximum transmission unit size for Ethernet frame in bytes. Allows you to enable or disable AutoNegotiation. When enabled, the communicating network elements exchange information about their speed and duplex capabilities and automatically configure themselves to take maximum advantage of their abilities. Displays the Autonegotiation status of the Ethernet port. Displays the speed and duplex mode of the link partner. Displays type of Ethernet port. Allows you to enter the name (Identity) of the Ethernet port.

Auto-Negotiation Status Link Partner Capabilities Medium Type LAN Circuit Identifier

Failed None 100/1000 Base-TX Editable

Configuring or Editing Switching Parameters


To configure or edit switching parameters: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Port Configuration. View Service Switch Port page is displayed. 2. Click the Edit link for the port to be updated. The Edit Ethernet Switching Params page is displayed. 3. Edit required values referring to the Ethernet Port Switching Parameters table. 4. Click Submit. A confirmation page is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Note

Performance parameters are available for these ports. Table 3-3. Edit Switching Parameters

Parameter Port Type

Default Value For copper ports: 802.1 q port {dot1 q Port} For optical ports: {dot1q Port} 1

Description Describes the port type. The following is available: 802.1 q port {dot1 q Port} QinQ port {dot1 ad Port}. PVID is port VLAN ID which is user configurable and can assign any no. between 1 and 4094 of any Ethernet or VCG port on per-port basis (default is 1).

Port Vlan ID

Note: This field is editable only in .1q interface.

3-4

System Level Configuration

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Port default priority Acceptable Frame Policy Default Value 0 Accept Only Vlan Tagged Description

Chapter 3 Layer 2 Services

Priority assigned to the port. The value can range from 0 to 7. It is per-port feature that controls the reception of VLAN Tagged and non VLAN Tagged frames on that port.

Note: This field is editable only in .1q interface.


CTAG MEP Status Editable -NADisplays the customer tag. Ethertype (default 08100) The MEP status. The field is not editable. No Alarm: No defect has occurred since the Fault Notification Generator was last reset. RDI_CCM: If one end has a wrong remote MEP configured then, MEP status is R_CCM and MEP status of other end is RDI_CCM RemoteCCM: Maintenance Domain (MD) level mismatch at both MEPs. ErrorCCM: Different CCM interval mismatch on both MEPs. XconCCM: Maintenance Association Identifier (MAID) mismatch on both ends. MAC Address 00:00:00:00:00:28 MAC address of the system. Vlan only is displayed for QinQ port {dot1 ad Port} [Vlan + Prio], [VLAN+DSCP] and Vlan only are displayed for 802.1 q port {dot1 q Port}. Enable Probe Port Enable Ingress Port Mirroring Ingress Probe Port Enable Egress Port Mirroring Egress Probe Port Performance Counters Link Integrity Timer Value(ms) Disable Disable None Disable None Enables the probe port for port mirroring. Enables mirroring the packets ingressing the port to the probe port. List of probe ports for mirroring traffic. Enables mirroring of packets egressing the port to the probe port. List of probe ports for mirroring traffic. Provides link to performance counters of individual ports. Displays the interval of the link and is applicable only for VCG ports.

FPCR Classification Type VLAN Only

Note

EoPDH card supports 128 VCGs by default and can be configured for 28 VCG support.

Egate-2000 Ver. 1.0

System Level Configuration

3-5

Chapter 3 Layer 2 Services

Installation and Operation Manual

Creating Port Level Maintenance End Points (MEP)


A port level MEP carried on untagged frames can be configured over the port (service level OAM is supported and described in the OAM section in this chapter). To create MEP: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Port Configuration. The View Service Switch Port page is displayed. 2. Click the Edit link displayed in the column "Edit Switching Parameters" port. The Edit Ethernet Switching Params page is displayed. 3. Click Create MEP. The Provision New MEP page is displayed.

Figure 3-3. Provisioning New MEP


4. Edit required values referring to the MEP Parameters table. 5. Click Create. A confirmation page is displayed. 6. Click Yes. A "Successfully Created" message is displayed.

Table 3-4. MEP Parameters


Parameter Maintenance Domain Level Default Value None Description The level assigned in the domain hierarchy. Acceptable values range from 0 - 7.

3-6

System Level Configuration

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Maintenance Domain Default Value Description

Chapter 3 Layer 2 Services

Name assigned to the maintenance domain. A Maintenance domain is an Administrative Domain for the purpose of managing and administering a network. Indicates the format of the Maintenance Association (MA) name. The name given to the MA. The name can be a set of alphanumeric characters. It is an interval at which CCMs are sent by a MEP. Acceptable values include - 3.33ms, 10ms, 100ms, 1s, 10s, 1min, 10min. The identifier assigned to a local MEP. Acceptable values range from 1 - 8191. The identifier assigned to a remote MEP at the same domain level. Acceptable values range from 1 - 8191.

Short MA Format Short MA Name CCM Interval

Character_String 3.33ms

MEPID Remote MEPID

Verifying Performance Parameters At Port Level


To verify the performance parameters at port level: 1. Click L2 Services > ServiceSwitch-(SlotNo) > Port Configuration in the navigation menu. The View Service Switch Port is displayed. 2. Click on Running Counters against the desired port. The Ethernet-Current interval statistics page is displayed. The following table describes the.

Table 3-5. Port Level Performance Parameters


Parameter Ethernet Interval Valid Packets RX/TX 64 Bytes Packets RX/TX 65-127 Bytes Packets RX/TX 128-255 Bytes Packets RX/TX 256-511 Bytes Packets RX/TX 512-1023 Bytes Packets RX/TX 1024-1518 Bytes Packets RX/TX 1519-1522 Bytes Unacceptable Frame Type Frames Received Description Indicates if the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Count of number of 64 byte length packets Count of number of 65-127 byte length packets Count of number of 128-255 byte length packets Count of number of 256-511 byte length packets Count of number of 512-1023 byte length packets. Count of number of 1024-1518 byte length packets. Count of number of 1519-1522 byte length packets Count of frames discarded based on frame policy. Count of number of valid frames received with correct FCS value

Egate-2000 Ver. 1.0

System Level Configuration

3-7

Chapter 3 Layer 2 Services

Installation and Operation Manual

Parameter Octets Received Frames Transmitted Octets Transmitted FCS Errors RX Frames Too Short RX

Description Count of number of bytes received Count of number of frames transmitted Count of number of bytes transmitted Count of number of received frames with incorrect FCS Count of number of received frames less then 64 bytes, with a correct FCS value. When in half-duplex mode, the actual Receive undersize frame count is determined by TUND, TXCL and TLCL - TBD Count of number of pause frames received on the interface Count of number of broadcast frames received on the interface. Count of number of broadcast frames transmitted on the interface. Count of number of multicast frames received on the interface. Count of number of multicast frames transmitted on the interface. Count of number of fragment frames transmitted on the interface. Count of number of received frames transmitted on the interface. Count of number of jabber frames transmitted on the interface. Count of number of jabber frames received on the interface. Count of number of receive frames discarded Count of number of transmit frames discarded Count of ingress frames which doesnot match any of the FP definitions. Count of frames discarded apart from the ingress definitions Count of frames discarded based on MT Count of number of 1522-9600 byte length packets

Pause Frames Received Broadcast Frames Received Broadcast Frames Transmitted Multicast Frames Received Multicast Frames Transmitted Frame Fragment TX Frame Fragment RX Frame Jabber TX Frame Jabber RX Discarded Rx packets Discarded Tx Packets Service Lookup Failure Ingress Other Discards MTU Discards Packets RX/TX > 1522 (Jumbo Frames)

For VCG Performance Counters, refer to Viewing VCG performance statistics section in the Performance Monitoring chapter.

Provisioning Link Aggregation Group (LAG) Port


Link aggregation is a method for using multiple parallel links between a pair of devices as if it is a single higher-bandwidth channel.Additional LAN interfaces are needed at each end of the aggregation. Additional slots may be consumed in the devices being interconnected. Additional complexity is required in the device drivers to support aggregated links. Controls (either manual or automatic) are needed to ensure that aggregations are properly configured and maintained.

3-8

System Level Configuration

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Egate-2000 supports static LAG (no LACP). Two LAG models are supported: Protection mode: up to 2 LAG members while only one of the ports is active (Tx and Rx) a given time. The STDBY port is down and brought up upon the Active port failure. Regular mode: Up to 8 LAG members, simultaneous Rx from all members and Tx distribution across all members.

A LAG group may include (and protect) members from the same Egate-2000M8GbE card. To provision LAG port: 1. Click L2 Services > ServiceSwitch-(slot number)> LAG Configuration. 2. The View LAGPort page is displayed.

Figure 3-4. View LAGPort Page


3. Click Provision a new LAGPort.

Figure 3-5. Provisioning LAG Port


4. Select LAG members. 5. Click Create. A confirmation page is displayed.
Egate-2000 Ver. 1.0 System Level Configuration 3-9

Chapter 3 Layer 2 Services

Installation and Operation Manual

Note

Select only MemberPorts with same bandwidth for provisioning LAG Ports.

3.2

Ethernet Ring Protection (ERP)

In ERP, a node in a ring is designated as Ring Protected Link (RPL) owner. The RPL owner has a RPL port and a non-RPL port. Under normal working condition, the RPL owner blocks traffic through the RPL port for the data VLANs that are protected by the ringlet. All nodes sends R-APS messages over control VLAN to all other nodes connected to them indicating their port status. RPL owner sends NR_RB (No request Root blocked) message to other nodes that its root port is blocked. NR_RB message is sent only by the RPL owner. This message indicates that link between the node adjacent to the RPL owner towards the RPL port and the RPL port is down for the protected Data VLANs, and thus avoiding the loops. Each link is monitored by its adjacent nodes. Protection switching is initiated when signal fail condition is detected on the link by the adjacent nodes. The nodes on both ends of the link on which failure occurred block the ports and report the failure by sending the R (SF) message to all the nodes in the ring. On receiving the link failure message, the RPL owner unblocks the RPL port and all the nodes flush their Forwarding Database (FDB). After the broken link is set right, the adjacent nodes of the link transmit R-APS (NR) message indicating they no longer have any request for protection. The RPL owner starts WTR timer on receiving the R-APS (NR) message. After the WTR timer expires, the RPL owner blocks the RPL node and transmits R_APS (NR_ NB) message to the nodes. Only the RPL port is blocked. All other ports are unblocked. After Flushing, the ring functions in normal working condition. The following figure illustrates the sequence of steps in ERP.

3-10

Ethernet Ring Protection (ERP)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-6. Ethernet Ring Protection Process


Even though ERP requires a closed physical path for operation, more complex topologies can also be protected by ERP through shared ports and links. In case a port on a node is to be shared across more than one ring, then the port can act as an RPL port only for the ringlet whose ring was created first.

Figure 3-7. Ethernet Ring Protection Example 1


In the figure above, the RPL Owner protects either Ring 1 or Ring 2 based on if the Ring 1 or Ring 2 was configured first. A ring can also be created such that the RPL owner is shared between a .1ad and .1q domain, in which case different ports on the RPL owner will serve the different rings.

Egate-2000 Ver. 1.0

Ethernet Ring Protection (ERP)

3-11

Chapter 3 Layer 2 Services

Installation and Operation Manual

Viewing Rings
To view configured rings, click L2 Services > ServiceSwitch-(slot number)> ERP> Ring in the navigation menu. The View Ring page is displayed. The configured rings are listed on the View Ring page.

Figure 3-8. Viewing Rings


The following table describes the Ring parameters.

Table 3-6. Ring Parameters


Field Ring Name Ring Id East Port West Port EastPort ProtectedRingId WestPort ProtectedRingId WTR Interval (min) GuardTimerInterval (msec.) Description The name given to the Ring. The Ring name can be a set of alphanumeric characters. Special characters are also allowed. The Identifier of the Ring. The acceptable values range from 1 - 255. The East port of the node. This field is not editable after provisioning. The West port of the node. This field is not editable after provisioning. It shows the ring id of the ring which was created first on the east port. It shows the ring id of the ring which was created first on the west port. The time taken for ring to switch the traffic route. Acceptable value 12. Time duration after which the messages expire. Default Value: 500 ms. Range: 10 ms to 2 seconds in steps of 10ms. Ring Type The Ring Type can be of two types: Closed Ring: Closed ring is a ring in which all nodes in the ring participate in ERP configuration. Open Ring: Open ring is a ring in which certain nodes in the ring do not participate in ERP configuration. The default value is closed Ring.

3-12

Ethernet Ring Protection (ERP)

Egate-2000 Ver. 1.0

Installation and Operation Manual Field Ring Name Open Port Description

Chapter 3 Layer 2 Services

The name given to the Ring. The Ring name can be a set of alphanumeric characters. Special characters are also allowed. The Open port is of three types: East Port West Port None The default value is none.

Viewing Ringlets
A Ringlet is a part of a ring and contains the set of VLANs in the ring which needs to be protected. A VLAN in a ring can be protected by only one Ringlet. A Ringlet has a unique Ringlet Id within a ring and a unique Control VLAN ID. An ELINE is internally created with the Control VLAN ID for forwarding the ERP control packets. Packets matching the ERP destination address and the VID are identified and forwarded to the other side of the ring if the ports are not blocked. To view configured Ringlets: Click L2 Services > ServiceSwitch-(slot number)> ERP > Ringlet in the navigation menu. View Ringlet page is displayed. The configured ringlets are listed on the View Ringlet page.

Figure 3-9. Viewing Ringlet


6. Click on the desired Ringlet. The parameters are displayed. Refer to the following table for a description of the Ringlet parameters.

Egate-2000 Ver. 1.0

Ethernet Ring Protection (ERP)

3-13

Chapter 3 Layer 2 Services

Installation and Operation Manual

Table 3-7. Ringlet Parameters


Field Ringlet Name EastPort Role WestPort Role Description The name given to the Ringlet. The name can be a set of alphanumeric characters. Special characters are allowed. The RPL role of the East or West port. RPL Port: An RPL port is present on an RPL Owner. The RPL port is blocked under normal working conditions. The RPL Owner unblocks the RPL port after receiving request for Automatic Protection Switching from other nodes in the ring or ringlet. Non-RPL Port: The port allows traffic during normal working conditions. The ports of all the non-RPL Owner nodes are Non-RPL port. The RPL Owner has at least one Non-RPL port. EastPort SharedGroupLink WestPort SharedGroupLink RingId Control VLANId Data VLAN List Ringlet State These fields are set true if the data VLANs are shared with some other ringlet on that port of the node. The ID of the ring to which the ringlet is a part. VLAN identifier of the Control VLAN. The Control VLAN is used to carry control messages. This VLAN is never blocked. Displays the list of VLAN that are to be protected by the ringlet. The state of the Ringlet. Init: The state in which a node comes after reboot. The node is in Initial state for a very brief moment. Idle: The state when the block is present at the RPL port of the RPL owner in the ring. Protect: The state of the ring when there is a link cut and the RPL port is unblocked. EastPort State WestPort State East port state defines if the East port is blocked or unblocked. West port state defines if the west port is blocked or unblocked.

3.3

Services Provisioning

Egate-2000 supports two types of services: E-Line services, E-LAN services. The following sections describe the services and related terms and concepts. Service Configuration: Basic Terms
Port Type Each pot (Ethernet or VCG) can be configured to one of two port types: .1q port: Relates to VLAN as CVID .1ad port: Relates to VLAN as SVID and allows tag stacking at port egress. ( and SVID pop at port ingress)

The port type impacts port functionality regarding QOS, OAM etc.

3-14

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual FPCR Classification Type FPCR Flow Point Template FPCR Flow Point Template Flow Point Micro Flows

Chapter 3 Layer 2 Services

The frames classified by flow points can be further classified into a micro flow based on DA, SA, Ethertype, P-bit and SVLAN. Each micro flow can be given a priority treatment that overrides the priority assigned at the flow level. For more details see Ingress Quality of Service (QoS). Point-to-point service Multipoint-to-multipoint service

E-Line Service E-LAN Service

Service Configuration: Scale


Maximum number of FP templates Maximum number of FPCRs Maximum number of FPCRs per template Maximum services E-LINE/E-LAN Maximum flow points Maximum flow points per ELAN service 1024 4096 10 200 400 132

ELINE Services
An ELINE service is a point-to-point service involving only two network interfaces on any constituent network element. The following figure shows an example of ELINE service involving different interfaces.

Egate-2000 Ver. 1.0

Services Provisioning

3-15

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-10. ELINE Service


An ELINE service can be created between: .1q to .1q interface: This E-Line service is configured using a single flow point that identifies the CVIDs to be forwarded between two q1. Ports. Forwarding, in this case, shall not change the packet and it is forwarded unchanged. .1q to 1ad interface: This E-Line service is configured using two flow points. One relates to CVIDs from the 1q port and the other to SVID (single SVID) on the 1ad port. Traffic from the 1q port is stacked with the SVID towards the 1ad port and popped at the opposite direction (from 1ad to 1q port). .1ad to .1ad interface: This E-Line service is configured using a single flow point that identifies the SVIDs to be forwarded between the two 1ad ports. The forwarding action in this case does not change the packet and it is forwarded unchanged.

In an ELINE service, for the traffic at customer site A to reach customer site B, the traffic has to be forwarded through each of the switches (1,2,3) using flow points. At A, customer services CVID 10-20 are being directed to .1ad interface with SVID = 100. The FP2 is SVID based. The FP-2 assigns an SVID tag of 100 and forwards the packet to the switch 2. At the ingress of the Switch 2, flowpoint FP-3 and FP4 are configured to allow packets with SVID value of 100. At the ingress of switch 3, the flowpoint FP-5 is configured to allow packets with SVID=100 and FP=6 with CVID value of 10-20.

Note

The encapsulation of .1q to .1ad will push SVID towards the .1ad port and from .1ad to .1q will pop the SVID towards the .1q port.

Managing ELINE Services


To view provisioned ELINE services: Click L2 Services > ServiceSwitch-(slot number)> Service provisioning > ELINE Services in the navigation menu.
Egate-2000 Ver. 1.0

3-16

Services Provisioning

Installation and Operation Manual

Chapter 3 Layer 2 Services

The provisioned ELINE services are displayed. Refer to the following table for a description of the ELINE Service Parameters.

Table 3-8. ELINE Service Parameters


Parameter Service Name Default Value Description The name given to the ELINE service. The name can be a set of alphanumeric characters. Special characters are also allowed. The administrative state of the Service. Up: The ELINE service is functional. Down: The ELINE service is not functional. FlowPoints FlowPointTemplate FP Admin State admin_up The name of the flow point. Displays a hyperlink to the flow point template attributes. The administrative state of the flow point. admin_down: There will not be any flow running through the flow point. admin_up: There will a flow running through the flow point. Running Counters Displays a hyperlink to the performance monitoring counters.

Admin State

Up

To view FlowPoint Template parameters: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. From the Service Name column, click the desired service name. The Edit ELINEService page is displayed. 3. Click the desired FlowPoint Template. The FlowPoint Template parameters are displayed.

Egate-2000 Ver. 1.0

Services Provisioning

3-17

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-11. Viewing FlowPoint Template parameters


To view PM counters at FP levels: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. From the Service Name column, click the desired service name. The Edit ELINEService page is displayed. 3. From the PM Counters column, click Running Counters. The FlowPoint-Current interval statistics page is displayed.

Table 3-9. Flow Point Parameters


Octets TX Octets RX Frames TX Frames RX Discards TX Discards RX Green Frames RX Yellow Frames RX Red Frames RX MF Green Frames RX MF Yellow Frames RX ACL Discards MF Red Frames RX Interval valid Timestamp The count of octets including padding octets successfully transmitted. The count of octets including padding octets successfully received. The count of frames successfully transmitted. The count of frames successfully received. The count of transmitted frames discarded. The count of received frames discarded. The count of green frames received. The count of yellow frames received. The count of red frames received. The count of Green frames received by the microflows. The count of Yellow frames received by the microflows. Displays the count of Packets dropped due to defined rules in ACL. The count of Red frames received by the microflows. Validity of the interval and the validity of the data during that interval. Displays the time at which the recorded event occurred.

3-18

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Working with ELAN Services


ELAN services comprise Point-to-Multipoint or Multipoint-to-multipoint services. The forwarding types for ELAN Service are CVLAN Forwarding and SVLAN Forwarding.

Understanding CVLAN Forwarding


CVLAN forwarding is one of the two E-LAN service types. CVLAN defines an SVL Virtual Bridge Instance (VBI), where the FDB is based on the MAC address only. Traffic at the ingress port is classified based on the flow point assigned to the ingress port of flow points from both 1q and 1ad ports. CVLAN forwarding allows binding of flow points from both 1q and 1ad ports. When the 1q port is connected to a CVLAN forwarding ELAN service, the appropriate SVID (identified by the FP) is stacked at the FP egress (stripped at the ingress).

Figure 3-12. CVLAN Forwarding VB

Egate-2000 Ver. 1.0

Services Provisioning

3-19

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-13. CVLAN Forwarding VBI-2


CVLAN forwarding can be used if an SVL bridge is required or if the SVID is tagged at the Egate-2000. In this case, local switching is performed between the users and SVID identifying the E-LAN service added towards the PSN.

Understanding SVLAN Forwarding


SVLAN forwarding is one of the two E-LAN service types. It defines an IVL virtual bridge instance (VBI), where the FDB is based on VLAN+MAC. SVLAN forwarding allows binding of the flow points from 1ad ports only. The traffic at the ingress port is classified based on the flow point assigned to the ingress port.

3-20

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-14. SVLAN Forwarding


SVLAN forwarding can be used if the IVL bridge is required, or if the SVID is tagged at the remote CPEs. In this case, switching is performed between all remote CPEs based on the SVID.

Figure 3-15. SVLAN Forwarding per Customer Domain


In this case, the E-LAN service is a single SVID.
in

Egate-2000 Ver. 1.0

Services Provisioning

3-21

Chapter 3 Layer 2 Services

Installation and Operation Manual

Managing ELAN Services


To view provisioned ELAN services: 1. Click L2 Services>ServiceSwitch-(slot number)>Service provisioning>ELAN Services in the navigation menu. The provisioned ELAN services are displayed.

Figure 3-16. Provisioning ELAN Service


2. Click on the desired service name. The Edit ELANService page is displayed.

Table 3-10. ELAN Service Parameters


Field VBI Service Type Service Name Forwarding Type Description Displays the ELAN_EVC. The name given to the ELAN Service. The name can be a set of alphanumeric characters. Special characters are also allowed. The forwarding type of the EVC. CVLAN Forwarding SVLAN Forwarding FDBLimiting State FDBLimiting Value VBI Admin State Indicates whether the limiting state is active or not. Indicates FDB limiting value. Range is 100 to 64K Mac addresses. The administrative state of the Service. Up: The ELAN service is functional.

On Edit ELANService page, you can:


3-22

View Static Unicast Entry View Static Multicast Entry


Egate-2000 Ver. 1.0

Services Provisioning

Installation and Operation Manual

Chapter 3 Layer 2 Services

View FlowPoint Parameters Add Flowpoint to ELAN Service Edit FlowPoint Template Parameters View Dynamic FDB Entries.

Viewing Static Unicast Entry


To view static unicast entry: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. From the Service Name column, click the desired service name. Edit ELANService page is displayed. 3. Click View Static Unicast FDB entries. Refer to the following table for a description of the Static Unicast Entry parameters.

Table 3-11. Static Unicast Entry Parameters


Parameter ELAN Service name Unicast Customer Mac Address Egress Flow Point Unicast Backbone MAC Address Description The name given to the ELAN service. Flow point to which the frames with DA as unicast customer MAC address will be forwarded. Unicast values are allowed. The Flowpoint at the egress of the network element. The address used to statically route a packet out of a .1q and .1ad interface. Unicast values are allowed.

Viewing Static Multicast Entry


To view static multicast entry 1. Click L2 Services > ServiceSwitch-(slot number)> Service provisioning > ELAN Services in the navigation menu. The provisioned ELINE services are displayed. 2. From the Service Name column, click the desired service name. The Edit ELANEService page is displayed. 3. Click View Static Multicast FDB entries. Refer to the following table for a description of the Static Multicast parameters.

Table 3-12. Static Multicast Parameters


Parameter ELAN Service name Multicast Mac Address/VLANID Description The name given to the ELAN service. Multicast MAC address for which Multicast group is being formed. Membership defined in the FlowPoint list list will determine the forwarding.

Egate-2000 Ver. 1.0

Services Provisioning

3-23

Chapter 3 Layer 2 Services Parameter FlowPoint list Description The flowpoints available in the ELAN service.

Installation and Operation Manual

Viewing the Flowpoint Parameters


To view the Flowpoint parameters, 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > FlowPointTemplates in the navigation menu. The View FlowPointTemplate screen is displayed. 2. Click the desired Flowpoint. The Edit Flowpoint page is displayed. Refer to the following table for a description of the flowpoint parameters.

Table 3-13. Flowpoint Parameters


Parameter EVC Interface FlowPoint Template FP Admin State Description The name given to the ELAN service. The interface involved in the service. Interface can be .1q and .1ad. The flowpoint template on which the flowpoint is based. The available FlowPoint templates. The administrative state of the flowpoint. admin_down: The flowpoint is not functional. admin_up: The flowpoint is functional. Ingress QoS: Treatment to frames before they enter the switch (see ingress QoS description in this chapter). Trust IngressColour Parameter to indicate if flowpoint should classify packets based on the color of the incoming packet. false: The packets are not classified based on the color of the incoming packet. true: The packets are classified based on the color of the incoming packet.

Notes:

If CoS trust mode is set as false, only the following cases are supported: 1q to 1ad If there is a DSCP match, the traffic is through. If there is a DSCP mismatch, traffic is dropped.

Color Source

The source of the packet color. None: The packets are not colored. DEI: The color of the packet is indicated by the DEI field.

Ingress Bandwidth Profile

The bandwidth profile used at the Ingress.

3-24

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Policer DropAction Description Displays the action on the packet by the flowpoint. Drop_None: Packets are not dropped.

Chapter 3 Layer 2 Services

Drop_Red: Packets marked red as per the Ingress Color Source are dropped. All packets are colored. The DEI bit is marked as G (0), Y (1) or R (1) irrespective of drop action. But this happens only when frame transformation happens from lower to higher encapsulation. Trust IngressPriority Parameter to indicate if flowpoint should classify packets based on priority. true: The packets are classified based on priority. false: The packets are not classified based on priority. Ingress PrioritySource The source of packet priority. Trust_None: No priority source is used to classify the packets. Trust_dot1p: The 802.1p priority is used to classify the packets. Default CoS Queue Id The identifier of the default CoS queue to which the packet is assigned. CoS Queue Id is used when the priority of the incoming packet is not trusted.

Egress QoS: Treatment to frames before they leave the switch CoS Queue Profile Shaper Profile Scheduler Profile Security Ingress L2 ACL Broadcast and Multicast Storm Control Profile DLF Flood Control Profile The Ingress ACL profile is the ingress QoS, a feature that allows filtering the frames based on L2 field. The Broadcast and Multicast Storm Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The DLF Flood Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The CoS Queue profile used in the Flowpoint. The Shaper Profile used in the Flowpoint. The Scheduler Profile used in the Flowpoint.

Adding Flowpoint to ELAN Service


To add flowpoint to ELAN service: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click on the desired service name. The Edit ELANService page is displayed. 3. Click Add new FlowPoint link. The Provision New FlowPoint page is displayed. 4. Configure the parameters according to Table 3-13. 5. Click Create.

Egate-2000 Ver. 1.0

Services Provisioning

3-25

Chapter 3 Layer 2 Services

Installation and Operation Manual

A confirmation page is displayed. 6. Click Yes. A Successfully Created message is displayed. To verify the performance parameters at FP level in ELAN service: 1. Click L2 Services> ServiceSwitch-(slot number) > Services provisioning> ELAN Services in the navigation menu. The Add new ELAN service page is displayed. 2. Click the desired service name. The Edit ELANService page is displayed. 3. Click Running Counters against appropriate FP. The page with the performance parameter as shown in the following table is displayed.

Table 3-14. Flowpoint Current Interval Performance Counters


Field Octets TX Octets RX Frames TX Frames RX Discards TX Discards RX Green Frames RX Yellow Frames RX Red Frames RX MF Green Frames RX MF Yellow Frames RX ACL Discards MF Red Frames RX Interval valid Timestamp Description The count of octets including padding octets successfully transmitted. The count of octets including padding octets successfully received. The count of frames successfully transmitted. The count of frames successfully received. The count of transmitted frames discarded. The count of received frames discarded. The count of green frames received. The count of yellow frames received. The count of red frames received. The count of Green frames received by the microflows. The count of Yellow frames received by the microflows. Displays the count of Packets dropped due to defined rules in ACL. The count of Red frames received by the microflows. Validity of the interval and the validity of the data during that interval. Displays the time at which the recorded event occurred.

Performance parameters are available at two levels: port level FlowPoint level

3-26

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Editing FlowPoint Template Parameters


To edit FlowPoint Template parameters 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELINE services are displayed. 2. From the Service Name column, click the desired service name. The Edit ELANEService page is displayed. 3. Click the desired FlowPoint Template. The FlowPoint Template parameters are displayed. 4. Click Edit in Edit column. The edit screen is displayed. 5. Enter CVLANID Range and click Submit.

Viewing Dynamic FDB Entries


To view the dynamic FDB entries: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed in the Input/Output area. 2. Click on the desired service name. The Edit ELANService page is displayed. 3. Click view Dynamic Unicast Fdb Entries. The DynamicFdbEntries page is displayed. 4. Click SlotNo. The dynamic FDB entries are displayed. Refer to the following table for a description of the parameters in the dynamic FDB entries page.

Table 3-15. Dynamic FDB Entry Parameters


Parameter ELAN Service ELAN Service Name ELAN Forwarding Type The name, given to the ELAN Service, can be a set of alphanumeric characters. Special characters are also allowed. The forwarding type of the EVC. CVLAN Forwarding SPVLAN Forwarding FDB Limit status Number of Entries Dynamic Entries Egate-2000 Ver. 1.0 Services Provisioning 3-27 Indicates whether the limiting state is active or not. Displays the count of FDB entries. If max limit of FDB entries is reached, new MAC packet will be dropped. Description

Chapter 3 Layer 2 Services Parameter Unicast MAC Address/vlanid Flow point Backbone MAC address Description

Installation and Operation Manual

Displays the Source Address (SA) of customer unicast MAC with respective VLAN ID. Displays the flowpoint from which the Unicast MAC address/vlanid is received. The address used to statically route a packet out of a .1q and .1ad interface. Unicast values are allowed.

FlowPoint Template
Flow Point is a combination of Flow Point Template and a Physical Interface. Flow Point (FP) acts like a virtual link below interface that directs traffic from interface, conforming to FPT, to the service of which FP is a part. FP also acts as a virtual link that directs traffic from service, conforming to FPT, to the interface over which FP is configured. A maximum of 400 Flow Points are supported. The type of FPT to be used for FP creation depends on the kind of service FP is being added to and on the type of interface over which FP is created. A flowpoint is an object that interfaces between EVC and the physical port. Its function is to identify flows belonging to a particular service (EVC) out of many associated with the port. The flowpoint template (FPT) is a collection of rules (FPCR) that get assigned to a flowpoint to identify flows on the port. An FPT can have many FPCRs (implying vlan ranges) but all based on the same FPT type.

802.1q Flowpoint Template


The following is the behavior of a 802.1q Flowpoint template: An 802.1q flowpoint template has classification rules based on CVIDs. The FPCR can be applied to any number of CVLANs and a CVLAN can have any number of FPCR. The FPCR applied to CVLANs can also be based on priority bits. The range for priority is 0-7. Flowpoints on the same port will not have overlapping FPCRs. The values assigned to the FP should not overlap. For example, an FP assigned to an Ethernet port 1 with CVID = 1 to 10 cannot have another FP with CVID in the range 5 to 10 on same FP (Ethernet port 1). Since with same CVID=1to 10 or 5 to 15 FPT another FP can be created in the same EVC.

Note

CVID value can be a single value or a range of values and the multiple VLAN ranges should be separated by commas.

802.1ad Flowpoint Template


An 802.1ad flowpoint template has classification rules based on SVID (can be range or single value).

3-28

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Note

SPVID value can be a single value or a range of values and the multiple VLAN ranges should be separated by commas.

Provisioning FlowPoint Templates


To provision a FlowPoint template: 1. Click L2 Services > ServiceSwitch-(slot number) > Services provisioning>FlowPointTemplates. View FlowPointTemplatepage is displayed. 2. Click Provision a new FlowPointTemplate 3. Enter description for FlowPointTemplate and select FPTemplate type. Refer Flowpoint template parameters table. 4. Click Create. A confirmation page is displayed. The following table describes the Flowpoint template parameters.

Table 3-16. Flowpoint Template Parameters


Parameter FlowpointTemplate Description CVLAN Range PBit Range SPVLAN Range CVLAN +DSCP Description Name of the FlowPoint. Acceptable values include alphanumeric characters. Special characters and space can also be included. The range of Customer VLANs allowed in a CVLAN flowpoint. Acceptable values range from 1 to 4094. The range of packet priority allowed in a CVLAN flowpoint. Acceptable values range from 0 to 7. The range of service provider VLANs allowed in an SPVLAN flowpoint. Acceptable values range from 1 to 4094. The range of Customer VLANs allowed in a CVLAN flowpoint. Acceptable values range from 1 to 4094. DSCP: Acceptable values range from 0 to 63 DSCP Mask : Acceptable values range from 0 to 255

Note

Flow point template is set based on port FPCR Classification Type. The FPCR Classification Type can be VLAN only or VLAN+Prio or VLAN+DSCP.

Viewing FlowPoint Templates


To view provisioned FlowPoint templates Click L2 Services > ServiceSwitch-(slot number) > Services Provisioning > FlowPoint Templates in the navigation menu. View FlowPointTemplate page is displayed.

Egate-2000 Ver. 1.0

Services Provisioning

3-29

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-17. Viewing FlowPointTemplate


To view the Flowpoint parameters 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > FlowPointTemplates in the navigation menu. The View FlowPointTemplate screen is displayed. 2. Click the desired Flowpoint. The Edit Flowpoint page is displayed. Refer to the following table for a description of the flowpoint parameters.
Parameter EVC Interface FlowPoint Template FP Admin State Description The name given to the ELAN service. The interface involved in the service. Interface can be .1q and .1ad. The flowpoint template on which the flowpoint is based. The available FlowPoint templates. The administrative state of the flowpoint. admin_down: The flowpoint is not functional. admin_up: The flowpoint is functional. Ingress QoS - Treatment to frames before they enter the switch Trust IngressColour Parameter to indicate if flowpoint should classify packets based on the color of the incoming packet. false: The packets are not classified based on the color of the incoming packet. true: The packets are classified based on the color of the incoming packet. NOTE: If CoS trust mode is set as false, only the following cases are supported: 1q to 1ad

Note: If there is a DSCP match, the traffic is through. If there is a DSCP mismatch, traffic is dropped.

3-30

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Color Source Description The source of the packet color. None: The packets are not colored.

Chapter 3 Layer 2 Services

DEI: The color of the packet is indicated by the DEI field. Ingress Bandwidth Profile Policer DropAction The bandwidth profile used at the Ingress. Displays the action on the packet by the flowpoint. Drop_None: Packets are not dropped. Drop_Red: Packets marked red as per the Ingress Color Source are dropped. All packets are colored. The DEI bit is marked as G (0), Y (1) or R (1) irrespective of drop action. But this happens only when frame transformation happens from lower to higher encapsulation. Trust IngressPriority Parameter to indicate if flowpoint should classify packets based on priority. true: The packets are classified based on priority. false: The packets are not classified based on priority. Ingress PrioritySource The source of packet priority. Trust_None: No priority source is used to classify the packets. Trust_dot1p: The 802.1p priority is used to classify the packets. Default CoS Queue Id The identifier of the default CoS queue to which the packet is assigned. CoS Queue Id is used when the priority of the incoming packet is not trusted.

Egress QoS - Treatment to frames before they leave the switch CoS Queue Profile Shaper Profile Scheduler Profile Security Ingress L2 ACL Broadcast and Multicast Storm Control Profile DLF Flood Control Profile The Ingress ACL profile is the ingress QoS, a feature that allows filtering the frames based on L2 field. The Broadcast and Multicast Storm Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The DLF Flood Control Profile used in the Flowpoint. The CoS Queue profile used in the Flowpoint. The Shaper Profile used in the Flowpoint. The Scheduler Profile used in the Flowpoint.

Note: Feature available only for ELAN service.

You can perform following actions from the Edit Flow point page: Provision IngressL2MfQos View All IngressL2MfQos

To edit a flowpoint Template: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > FlowPoint templates. View FlowPointTemplate page is displayed. 2. Click on the Flowpoint template you want to edit.

Egate-2000 Ver. 1.0

Services Provisioning

3-31

Chapter 3 Layer 2 Services

Installation and Operation Manual

3. Enter CVLANID Range and click Submit.

Link Protection Group (LPG)


EOPDH supports Link Protection Group for protecting Ethernet or VCG ports. In separate cards, LPG allows card redundancy at the ETH card level. LPG is created by selecting one port from work card and one port from protect card as part of the protection group. The unprotected ports can be configured independently. The redundancy implementation ensures that data is sent from either work card port or protect card port based on LPG status. ELINE Service: LPG implementation for ELINE service creates ELINE service using members of LPG. Addition of ingress profiles, egress profiles, L2ACL to Flow Points will be applied to both the cards. Deletion of ELINE service deletes the service from work card as well as protect Card. ELAN Service: LPG implementation for ELAN service adds a flow point associated with the port, similar ELAN service should be created on the protect card and identical flow point should be added to other members of LPG. This will ensure that traffic is restored through the protect card during protection switchover. Adding or deleting of ELAN service will be performed on both cards. Addition of ingress QoS profiles, egress QoS profiles, L2ACL to flow points of members of LPG will be applied to both the cards. All External commands to any LPG apply to other LPGs on that card also. For more about adding Link Protection refer to the Egate-2000 User Interface Guide.

Service Configuration
Each port (ETH or VCG) can be configured to one of the two port types: .1q port: relates to VLAN as CVID .1ad port: relates to VLAN as SVID and allows tag stacking at the port egress (and SVID pop at port ingress).

In addition, the port type impacts functionality regarding QoS, OAM etc. FPCR classification type: Per port classification key configuration. Defines the type of flow point templates (classification profiles) allowed to be used on this port. For the .1q port there are three options: VLAN VLAN+P-bit VLAN+DSCP

For the .1ad port it is VLAN only. FPCR: Classification rule Flow Point Template: Classification profile that can be several FPCRs Flow Point: Virtual link identified by a flow point template and ingress port. Micro Flows: The frames classified by flow points can be further classified into a microflow based on DA, SA, Ethertype, P-bit and SVLAN. Each microflow can be

3-32

Services Provisioning

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

given a priority treatment that overrides the priority assigned at the flow level, for details see ingress QoS section.

Table 3-17. Scale


Field Quantity

Maximum number of FP templates Maximum number of FPCRs Maximum number of FPCRs per template Maximum of E-LINE/E-LAN services Maximum of flow points Maximum of flow points per E-LAN service

1024 4096 10 200 400 132

3.4

Operation, Administration, and Maintenance (OAM)

Operation, Administration, and Maintenance (OAM) is implemented using Connectivity Fault Management (CFM) per 802.1ag/Y.1731 and PM (performance monitoring) per Y.1731. CFM monitors Ethernet links to locate and debug any faults in the network. CFM comprises of the Continuity Check Message (CCM) protocol. As per the CCM protocol, the Maintenance End Points (MEP) issues messages to detect faults in connectivity amongst themselves. CCM also allows MEPs to discover other MEPs within a domain. In addition, Egate-2000 supports Loopback(LBM/LBR) and Link Trace (LTM/LTR). The following PM (Y.1731) functionality is supported: 2-way Delay measurements Dual ended Loss Measurements

Once enabled, DM and LM are auto triggered every 15 minutes and results are binned. In CFM, a network is divided hierarchically into several domains for administrative purpose. Each domain is identified by a Maintenance Domain level (0-7). Higher identifier indicates higher hierarchy. A maintenance point is any port in a domain. MEPs reside at the edge of a domain. At each level, the connectivity between the MEPs can be checked using the CCM.

Egate-2000 Ver. 1.0

Operation, Administration, and Maintenance (OAM)

3-33

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-18. Connectivity Fault Management

MEP/MIP
The figures below illustrate the different cases where MEP and MIP are utilized in Egate-2000. The following figure illustrates Down MEP on a 1.ad flowpoint connected to an ELINE.

Figure 3-19. Down MEP on ELINE VB


The following figure illustrates Down MEP on a .1ad flowpoint connected to a ELAN VBI.

Figure 3-20. Down MEP on ELAN VB


The following figure illustrates MIP over a .1ad ELINE VBI. If intermediate nodes are present in ELINE service, EoPDH card supports the creation of MIPs.

3-34

Operation, Administration, and Maintenance (OAM)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-21. MIP Over.1ad ELINE VB

Creating MEP
To create a MEP 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint 1 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Create Mep. Provision New MEP page is displayed.

Figure 3-22. Provision MEP


5. Select or enter the parameters. 6. Click Create.

Egate-2000 Ver. 1.0

Operation, Administration, and Maintenance (OAM)

3-35

Chapter 3 Layer 2 Services

Installation and Operation Manual

A "Successfully Created" message is displayed. Refer to the following table for a description of the CFM parameters.

Table 3-18. CFM Parameters


Parameter Maintenance Domain Level Maintenance Domain Short MA Format Short MA Name CCM Interval Default Value None Character_String 3.33ms Description The level assigned in the domain hierarchy. Acceptable values range from 0 - 7. A Maintenance Domain is an Administrative Domain for the purpose of managing and administering a network Indicates the format of the Maintenance Association (MA) name. The name given to the MA. The name can be a set of alphanumeric characters. It is an interval at which CCMs are sent by a MEP. Acceptable values include - 3.33ms, 10ms, 100ms, 1s, 10s, 1min, 10min Priority for CCM messages. Acceptable values include 1 to 7. Primary VLAN ID. Acceptable values are determined by the CVLAN SVID range in the Flowpoint. The identifier assigned to a local MEP. Acceptable values range from 1 - 8191 The identifier assigned to a remote MEP at the same domain level. Acceptable values range from 1 - 8191.

CCM Priority Primary VID MEPID Remote MEPID

7 None None

Creating MIP
To create a MIP: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELNE services are displayed. 2. In FlowPoint Configuration table Service Name column, click the flowpoint name provisioned with 1ad port. Edit ELINEService page is displayed. 3. Click Create MIP. Provision New MIP page is displayed. 4. Select or enter the parameters. 5. Click Create. A "Successfully Created" message is displayed.

3-36

Operation, Administration, and Maintenance (OAM)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Enabling CFM
To enable CFM at port level: 1. Click L2 Services > Port Configuration in the navigation menu. The View Service Switch Port is displayed. 2. From the Edit Switching Parameters column, click Edit. The Edit Ethernet Switching Params page is displayed. 3. Click Create MEP. The Provision New MEP page is displayed. 4. Configure the parameters according to the CFM Parameters table above. 5. Click Submit. The confirmation page is displayed. 6. Click Yes. A "Successfully Created" message is displayed.

Figure 3-23. Provisioning MEP Table 3-19 lists the CFM parameters and Table 3-20 lists the CFM alarms raised
against MEPs.

Table 3-19. CFM Parameters


Parameter Maintenance Domain Level Maintenance Domain Default Value None Description The level assigned in the domain hierarchy. Acceptable values range from 0 - 7. A Maintenance Domain is an Administrative Domain for the purpose of managing and administering a network

Egate-2000 Ver. 1.0

Operation, Administration, and Maintenance (OAM)

3-37

Chapter 3 Layer 2 Services Parameter Maintenance Domain Level Short MA Format Short MA Name CCM Interval Default Value None Character_String 3.33ms Description

Installation and Operation Manual

The level assigned in the domain hierarchy. Acceptable values range from 0 - 7. Indicates the format of the Maintenance Association (MA) name. The name given to the MA. The name can be a set of alphanumeric characters. It is an interval at which CCMs are sent by a MEP. Acceptable values include - 3.33ms, 10ms, 100ms, 1s, 10s, 1min, 10min The identifier assigned to a local MEP. Acceptable values range from 1 - 8191 The identifier assigned to a remote MEP at the same domain level. Acceptable values range from 1 - 8191.

MEPID Remote MEPID

None None

Table 3-20. CFM Alarms


Scenario Remote CCM MAID mismatch Remote MEP incorrect Unexpected CCM interval state MD Level Incorrect Remote Defect Indication Alarm Displayed Connectivity check failed Unexpected MAID Unexpected MEPId CCM interval mismatch Unexpected MDLevel raised on the end with the higher MDLevel and Connectivity Check Failed at the other end RDI

Provisioning LBM
To provision LBM: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click LBM. View LBM page is displayed. 6. Click Start LBM.
3-38 Operation, Administration, and Maintenance (OAM) Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

LBM page is displayed.

Figure 3-24. Provisioning LTM


7. Select or enter the parameters. 8. Click Submit. The confirmation page is displayed. 9. Click Yes. A "Successfully Created" message is displayed.

Provisioning LTM
To provision LTM: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click LTM. View LTM page is displayed. 6. Click Start LTM.
Egate-2000 Ver. 1.0 Operation, Administration, and Maintenance (OAM) 3-39

Chapter 3 Layer 2 Services

Installation and Operation Manual

LTM page is displayed.

Figure 3-25. Provisioning LTM


7. Select or enter the parameters. 8. Click Submit. The confirmation page is displayed. 9. Click Yes. A "Successfully Created" message is displayed.

Setting Y1731 Parameters


To view FlowPoint level Y1731 Counters: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click Y1731. 6. Select or enter the MEP parameters.

3-40

Operation, Administration, and Maintenance (OAM)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-26. Viewing Y1731


7. Click Submit. The confirmation page is displayed. 8. Click Yes. A "Successfully Created" message is displayed.

Viewing Y1731 Counters


To view Y1731 Counters: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click Y1731 Counters.

Viewing FDV
For setting parameters for FDV, refer to Setting Y1731 Parameters.
Egate-2000 Ver. 1.0 Operation, Administration, and Maintenance (OAM) 3-41

Chapter 3 Layer 2 Services

Installation and Operation Manual

To view FDV: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click FDV. View FDV page is displayed.

Figure 3-27. View FDV Page

Configuring L2CP (BPDU) Tunneling


L2CP Tunneling is also known as BPDU tunneling. L2 Protocol Tunneling is supported for the following MAC range 01-80-C2-0000-00 to 01-80-C2-00-00-0F and for untagged frames only On a per MAC address basis, a node can be configured to either Drop, Tunnel the frame with the 01-80-C2-00-00-0y DA Tunneling BPDU is supported only on .1q interfaces

3-42

Operation, Administration, and Maintenance (OAM)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Frames with 01-80-C2-00-00-0y DA will be associated with the PVID on the port for ELINE service identification and port prio for QOS treatment if tunneling is enabled for a particular MAC address Tagged frames with 01-80-C2-00-00-0y DA will be treated as data frame If the identified service is of type ELAN, the frame will be dropped.

To configure BPDU tunneling: 1. Click L2 Services > ServiceSwitch-(slot number) > Port Configuration in the navigation menu. View Service Switch Port page is displayed. 2. Click edit in Edit Switching Parameters column against a ETH port in which BDPU Tunneling is enabled. Edit ETH<chassis-slot-port> Switching Params page is displayed. 3. Click Configure BPDU Tunneling. Edit INTERFACEL2CP-<chassis-slot-port-STM> page is displayed.

Figure 3-28. Configuring BPDU Tunneling


4. Select the appropriate values in Protocol Action column. 5. Click Submit.

3.5

Ingress Quality of Service (QoS)

This section covers L2 ACL, L2 QoS class rule, and Bandwidth Profile.

Understanding Ingress Quality of Service (QoS)


The Quality of Service (QoS) is a set of technologies for managing network traffic in a cost effective manner to enhance user experiences. QoS technologies allow measuring bandwidth, detecting changing network conditions (such as
Egate-2000 Ver. 1.0 Ingress Quality of Service (QoS) 3-43

Chapter 3 Layer 2 Services

Installation and Operation Manual

congestion or availability of bandwidth), and prioritize or throttle traffic. For example, QoS technologies can be applied to prioritize traffic for latency-sensitive applications (such as voice or video) and to control the impact of latencyinsensitive traffic (such as bulk data transfers). QoS also provides controlled jitter and improved loss characteristics. Ingress QoS in Egate-2000 determines packet color (later used by WRED for the enqueu process) and the packet priority used for P-bit remarking and priority queue.

Figure 3-29. Ingress QoS


The following features are implemented using QoS at the ingress: Classifier: The incoming traffic is classified at the ingress at the flowpoint level ( FP Template) and the micro flow level (L2_QoSClassRule) Policing :Determines the number of packets that are allowed into a network. Policer attributes are defined by the following bandwidth profilerssTCM, srTCM, and trTCM. Ingress QoS allows assigning a policer at the flow point level and at the micro flow level. Security: Determines if the packet should be sent or dropped and ensures security. Security is implemented using Access Control Lists.

Managing Ingress QoS


Ingress QoS is defined at both flow point level and MF (micro flow level). Micro Flow (MF) level classifiers can be applied to .1q and .1ad interfaces. The classifier identifies client signal flows and associates them with a Class of Service (CoS) and a bandwidth profile. A maximum of 8 micro flows can be configured per Flow Point. Packets are classified into micro flows which are assigned to traffic classes by looking at the layer2-layer3 headers of the packets. The classification can be

3-44

Ingress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

based on both .1q and .1ad interfaces. The following parameters can be used for the Micro flows classification: CVLANID Range SPVLANID Range P-Bit Range Source MAC Address Source MAC Mask Destination MAC Address Destination MAC Mask Ethernet Type Ethernet Type value.

The following are the steps to define Ingress QoS at the flowpoint level. 1. Define bandwidth profile. 2. Set the Trust Ingress Color for the flowpoint. Trust Ingress Color can be true or false (see behavorial diagram below). 3. Apply the bandwidth profile to the flowpoint. 4. Set the policer action: Red or Drop None. 5. Set whether to trust the Ingress Priority. When the trust ingress priority is set to false, at the egress, the packets are assigned to the Default CoS Queue Id assigned to the flowpoint. When the trust ingress priority is set to true, at the egress, the packets are assigned to the queue as indicated in the priority field of the packet. This goes for FP a .1q ports for 1.ad ports Trust prioirity configuration is NA as it is always Trust. The following are the steps to define microflows and ingress QoS per microflows (L2MFQoS): 1. Define the QoS class rules to identify a micrflow (L2_QoSClassRule). 2. Define an ingress bandwidth profile. The bandwidth profile at the MF level overrides the bandwidth profile selection at the FP level in case of MF hit. The bandwidth profile instance ID if equal and non-zero, bandwidth profile of MF created first will be shared. 3. Assign an instance for the Bandwidth profile. If the same Bandwidth profile and Bandwidth profile instance is assigned to two or more MFs, the token bucket of the bandwidth profile is shared among the MFs. If Bandwidth profile instance ID is equal and non-zero, first created Bandwidth profile of microflow will be shared. 4. Assign a CoS Queue ID. The CoS Queue ID is used to assign the packets to the queues at the egress. It is also used to assign priority to S-tag. The queue assignment here overrides the default queue assignment at the FP level in case of MF hit.

Egate-2000 Ver. 1.0

Ingress Quality of Service (QoS)

3-45

Chapter 3 Layer 2 Services

Installation and Operation Manual

Figure 3-30. Ingress Color Handling Table 3-21. Ingress QoS-priority Handling
Incoming frame type/ port type C-tagged/untagged frame/.1q port Configuration Trust Priority=False Behavior The outgoing S/C-tagged frame is per the priority from the flowpoint COS Queue ID The outgoing C-tagged frame is per the original priority The outgoing S-tagged frame has the priority copied from the Ctagged/priority field

Priority-tagged, C-tagged/.1q port

Trust Priority=True

S-tagged/.1ad port S-tagged/.1ad port

Trust Priority=False Trust Priority=True

Outgoing S/C tagged frame has an unchanged priority Outgoing S/C tagged frame has an unchanged priority

Provisioning IngressL2MfQos (micro flows configuration)


You can provision IngressL2MfQos, through ELINE Services menu or ELAN Services menu. To provision IngressL2MfQos through ELINE Services menu: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed.
3-46 Ingress Quality of Service (QoS) Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

3. In FlowPoint Configuration table FlowPoint 1 column orFlowPoint 2 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Provision IngressL2MfQos. 5. Select or enter the parameters. 6. Click Create. A "Successfully Created" message is displayed. To provision IngressL2MfQos through ELAN Services menu, 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. T he provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Provision IngressL2MfQos. 5. Select or enter the parameters. 6. Click Create. A "Successfully Created" message is displayed.

Egate-2000 Ver. 1.0

Ingress Quality of Service (QoS)

3-47

Chapter 3 Layer 2 Services

Installation and Operation Manual

Viewing IngressL2MfQos
You can view IngressL2MfQos, through ELINE Services menu or ELAN Services menu. To view IngressL2MfQos via ELINE Services menu: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint 1 column orFlowPoint 2 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click View All IngressL2MfQos. To view IngressL2MfQos via ELAN Services menu: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click View All IngressL2MfQos.

Managing L2 QoS class rule (microflows classification rules)


To view L2 QoS class rule: Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2QoSClassRule in the navigation menu. The View L2_QoSClassRule page is displayed. The View L2_QoSClassRule page lists all the L2 QoS class rules configured on the network element. To provision an L2 QoS class rule: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2QoSClassRule in the navigation menu. The View L2_QoSClassRule page is displayed. 2. Click the Provision a new L2_QoSClassRule link. The Provision New L2_QoSClassRule page is displayed. 3. Select or enter values referring to the L2 QoS Class Rule Parameters table.

3-48

Ingress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. To delete L2 QoS class rule: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2QoSClassRule in the navigation menu. The View L2_QoSClassRule page is displayed. 2. In the delete field, select the check box for the class rule(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Table 3-22. L2 QoS Class Rule and Access Control Entity (ACE) Parameters
Parameter CVLANID Range SPVLANID Range PBit Range Default Value 0 0 0 Description The range of values which the CVLANID can take. Acceptable values range from 1 to 4094. The range of values which the SVLANID can take. Acceptable values range from 1 to 4094. The range of values which the priority bit can take. Acceptable values range from 0 to 7. Source MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Source MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Destination MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Destination MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. The type of L2 Ethernet packets: ether_custom, ether_appletalk, ether_arp, ether_ibmsna, ether_ip4, ether_ip6, ether_ipx, ether_mplsmcast, ether_mplsucast, ether_netbios, ether_novell, ether_pppos, ether_rarp. Field is applicable only when ether_custom is selected for Ether Type. Values range from 1536 to 65535.

Source MAC Address Source MAC Mask Destination MAC Address Destination MAC Mask Ether Type

00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 ether_custom

Ether Type Value

Policer
The Bandwidth profiles include the following profilers to police the incoming traffic:
Egate-2000 Ver. 1.0 Ingress Quality of Service (QoS) 3-49

Chapter 3 Layer 2 Services

Installation and Operation Manual

Simple Two Color Marker (sTCM): Packets exceeding the CIR and CBS rate are marked Red and below CBS/CIR are marked as green Single rate Three Color Marker (srTCM): Packets exceeding the CIR and PBS rate are marked Red. Packets between PBS and CBS are marked yellow and packets below the CIR/CBS rate are marked green. Two rate Three Color Marker (trTCM): Packets exceeding PIR/PBS are marked red, packets between the CIR/CBS and PIR/PBS are marked yellow, while packets below the CIR/CBS are marked green.

Color aware profiles can only be applied if the color source is selected as DEI and trust ingress color as none. When we trust incoming color (by default color source is selected as DEI) no ingress bandwidth profile (color aware/ color unaware) can be applied. If color source and trust ingress color parameters are both selected as none, then, only color unaware profiles can be applied. If the Trust Ingress Color is set to False at the flowpoint, the DEI field in the packet is marked 0 for green and 1 for red for sTCM. In case of srTCM or trTCM profilers, the packets are marked as 0 for green and 1 for red or yellow. The marking happens only when the packet is forwarded from a .1q interface to .1ad interface.

Managing Ingress Bandwidth Profile parameters


Viewing Provisioned Ingress Bandwidth Profiles
To view provisioned Ingress bandwidth profiles: Click L2 Services>ServiceSwitch-(SlotNo)>Ingress QoS>Ingress BW profile in the navigation menu. The View IngressBwProfile page displays all the Bandwidth Profiles configured on the network element.

3-50

Ingress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-31. Ingress Bandwith Profile Parameters

Security
Security is implemented using the ACLs. An ACL has Access Control Entities (ACE) which define the matching criteria. Packets matching the matching criteria in an ACE get dropped by the ACL. An ACL can have any number of ACEs. A packet is dropped if the packet matches the matching criteria of any ACE. An ACL can be assigned to .1q and .1ad interfaces only. The following are the steps to assign an ACL to the flowpoint. 1. Define an ACL. 2. Assign ACEs for the ACL. 3. Assign the ACL to the flowpoint.

Managing L2 ACL
To view provisioned L2ACLs: Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. The View L2_ACL lists all the L2 ACLs configured on the network element. To provision an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the Provision a new L2_ACL link.

Egate-2000 Ver. 1.0

Ingress Quality of Service (QoS)

3-51

Chapter 3 Layer 2 Services

Installation and Operation Manual

The Provision New L2_ACL page is displayed. 3. Enter a name for the L2ACL. The name can be set of alphanumeric characters. Space and special characters are also allowed. 4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. To provision an L2 ACE: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the L2 ACL to be updated. 4. Click the Create L2 ACE link. The Provision New L2_ACE page is displayed. 5. Enter values referring to the L2 QoS Class Rule Parameters/Access Control Entity parameters. 6. Click Create. A confirmation page is displayed. 7. Click Yes. A "Successfully Created" message is displayed. To apply ACL to FP in ELAN: 1. To apply ACL to FP, click L2 Services > ServiceSwitch-(slot number) > Services Provisioning > ELAN services in the navigation menu. The ELAN services page is displayed. 2. Click the desired Service Name. The Edit ELAN service page is displayed. 3. Click on the desired Flow point. The edit FP port page is displayed. 4. Select the desired Ingress L2 ACL. 5. Click Submit. A "Successfully Created" message is displayed. To apply ACL to FP in ELINE: 1. To apply ACL to FP Click L2 Services > ServiceSwitch-(slot number) > Services Provisioning > ELINE services in the navigation menu.
3-52 Ingress Quality of Service (QoS) Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

The ELINE services page is displayed. 2. Click the desired Flow point. The edit FP port page is displayed. 3. Select the desired Ingress L2 ACL. 4. Click Submit. A "Successfully Created" message is displayed. While editing an L2 ACL, you can add or remove the associated ACEs, or edit the name of the L2 ACL. To edit an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed. 3. Click the Edit link or click the Edit link in the Edit column for the L2 ACL to be updated. 4. Edit the L2ACL name. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. To delete an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. In the delete field, select the check box for the L2 ACL(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed. To delete an ACE from an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed.

Egate-2000 Ver. 1.0

Ingress Quality of Service (QoS)

3-53

Chapter 3 Layer 2 Services

Installation and Operation Manual

3. Click the Edit link or click the edit link in the Edit column for the L2 ACL to be updated. The page is displayed. 4. In the L2ACE section, click the delete link for the ACE to be deleted. A confirmation page is displayed. 5. Click Confirm Delete. A "Successfully Deleted" message is displayed.

3.6

Egress Quality of Service (QoS)

This section covers L2 ACL, L2 QoS class rule, and Bandwidth Profile.

Understanding Egress QoS


Quality of Service is implemented at the egress by Schedulers and Shapers. Schedulers define the order for traffic flow from the CoS Queues while the shapers restrict the traffic flow from the CoS queues. The scheduling comes into play only when there is congestion at higher layer whereas shapers work irrespective of congestion. The scheduler assigns weights to the traffic flows or queues at the CoS level and FP level. Queues are forwarded based on the weights assigned to them. The weights determine the ratio in which the packets from the different queues are forwarded to the next stage. For example, if a CoS queue 1 and 2 are assigned a weight of 50 and 25, the packets are forwarded from the queues in the ratio of 2:1, that is, for every two packets forwarded from queue 1, one packet is forwarded from queue 2. The shaper restricts the number of packets forwarded at the flowpoint level based on the CIR, PIR, CBS and the PBS values defined at the flowpoint level respectively. The following figure shows the scheduling and shaping behavior at the egress.

3-54

Egress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Figure 3-32. Egress QoS


In case of congestion at the GigE interface, the packets are shaped at the flowpoint according to the applied flowpoint level shaper. If the cumulative traffic from the four flowpoints exceeds 1000Mbps at the GigE interface, the scheduler defined at the flowpoint level determines the traffic flow from each flowpoint.

Table 3-23 through Table 3-26 describe the following respectively:


Scheduler profile parameters WRED profile parameters Egress shaper profile parameters Egress queue parameters.

Table 3-23. Scheduler Profile Parameters


Parameter Scheduler Profile Name Default Value 0 Description The name given to the scheduler profile. The name can be a set of alphanumeric characters. Space and special characters are allowed. The level at which the Scheduler profile is applied. FP_level: Indicates the scheduler profile is applied at the flowpoint level. CoS_level: Indicates the scheduler profile is applied at the CoS level. Queue Weight 32 Weight assigned to the queue. Acceptable values range from 1 to 100.

Scheduler Level

FP_level

Egate-2000 Ver. 1.0

Egress Quality of Service (QoS)

3-55

Chapter 3 Layer 2 Services

Installation and Operation Manual

Table 3-24. WRED Profile Parameters


Parameter Red Queue Minimum or Red Min(KBytes) Default Value Description Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all red packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for red frames beyond which all red packets get dropped. Acceptable values: 0 to 1MB. Maximum percentage value for Red packets to be dropped. Acceptable values: 1 to 100. Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all green packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for green frames beyond which all green packets get dropped. Acceptable values include 0 - 1MBytes. Maximum percentage value for Green packets to be dropped. Acceptable values include 1 - 100.

Red Queue Maximum or Red Max(KBytes) Red Queue Maximum Drop (% age) or MaxDrop Probability(%age) Green Queue Minimum or Green Min(KBytes)

Green Queue Maximum or Green Max(KBytes) Green Queue Maximum Drop (% age) or MaxDrop Probability(%age) -

Yellow Queue Minimum or Yellow Min(KBytes)

Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all yellow packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for yellow frames beyond which all yellow packets get dropped. Acceptable values include 0 - MBytes. Maximum percentage value for Yellow packets to be dropped. Acceptable values include 1 - 100.

Yellow Queue Maximum or Yellow Max(KBytes)

Yellow Queue Maximum Drop (% age) or MaxDrop Probability(%age) WREDProfile Level

WRED is a queue management algorithm with congestion avoidance capabilities. Level at which the WRED profile is applied to. CoS_level: WRED profile is applied at the CoS level. This field is not configurable.

Note: Maximum limit of the WRED value should not be greater than 1MB.

3-56

Egress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Table 3-25. Egress Shaper Profile Parameters


Parameter CIR (kbps) Default Value Description Bandwidth available in a network at any time and in any state of congestion. The acceptable values range from 64Kbps to 500Mbps (for FP) and 64Kbps to 1Gbps. PIR (kbps) The maximum number of information units guaranteed for a burst of frames sent at the interface speed to remain CIRconformant. The acceptable values range from 16KB to 512KB. The Peak Information Rate (PIR) for the set CIR. The acceptable values range from 64Kbps to 500Mbps (for FP). The Peak Burst Size (PBS) for the set CBS. PBS is always greater than or equal to CBS value. The acceptable values range from 16KB to 512KB. Level to which the shaper profile is applied. Service level: Shaper profile is applied at the Flow Point Level. Minimum value for Shaper at service level is 8kbps and maximum value is 500 Mbps.

CBS

PBS ShaperProfileLevel Service level

Table 3-26. Egress Queue Parameters


Parameter Profile Name or CoSQueue Profile's Name Scheduler Mode Queue Scheduler Type Default Value Description Name given to the CoS Queue profile name. The name can be a set of alphanumeric characters. Space and special characters are allowed. The Scheduler Mode assigned at the Egress. This is not editable. The provisioned CoS Queues. The field is not editable. The scheduler type for the CoS queue. The field is not editable. Strict: Bandwidth is allocated to the queue on priority. Strict or Weighted Round Robin: Bandwidth is allocated based on weights assigned to the queues. NOTE: In Strict or Weighted Round Robin, bandwidth is allocated to the Weighted Round Robin queues only after serving the strict queues. Scheduler Profile Configured scheduler profiles. The scheduler profiles assign weight to the queues. Default value is Default COS Level Scheduler.

Strict or Weighted Round Robin -

Egate-2000 Ver. 1.0

Egress Quality of Service (QoS)

3-57

Chapter 3 Layer 2 Services Parameter Queue Mgmt Type Default Value taildrop Description

Installation and Operation Manual

Mechanism for managing queues. taildrop: The packets exceeding the maximum threshold of a queue are dropped. Green packets are dropped beyond 200Kbytes, Yellow packets are dropped beyond 144Kbytes and red packets are dropped beyond 72Kbytes. Wred: A packet is dropped based on its color and the queue length. The drop probability of a packet is set based on its position in the queue with respect to the minimum and maximum thresholds defined for the queue. Lists all the configured WRED Profiles.

WRED Profile

None

Profiles are listed only when Queue management type is chosen as WRED.

Managing Scheduler profile


To view Scheduler profiles, click L2 Services > ServiceSwitch-(slot number) > Egress QoS > SchedulerProfile in the navigation menu. The View SchedulerProfile page is displayed. The View SchedulerProfile page lists all the scheduler profiles configured on the network element. To provision a Scheduler profile: 1. Click L2 Services > ServiceSwitch-(slot number) > Egress QoS > SchedulerProfile in the navigation menu. The View SchedulerProfile page is displayed. 2. Click the Provision a new SchedulerProfile link. The Provision New SchedulerProfile page is displayed. 3. Select or enter values referring to the Scheduler Profile Parameters table. 4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. To edit the Scheduler profile: 1. Click L2 Services > ServiceSwitch-(slot number) > Egress QoS > SchedulerProfile in the navigation menu. The View SchedulerProfile page is displayed. 2. Click the desired SchedulerProfiles page to edit. The page is displayed. 3. Edit required values referring to the Scheduler Profile Parameters table. 4. Click Submit. A confirmation page is displayed.
3-58 Egress Quality of Service (QoS) Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. To delete the Scheduler profile: 1. Click L2 Services > ServiceSwitch-(slot number) > Egress QoS > SchedulerProfile in the navigation menu. The View SchedulerProfile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Managing WRED profiles


To view WRED profile: Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>WRED Profile in the navigation menu. The View WRED Profile page is displayed. The View WRED Profile page lists all the WRED profiles configured on the network element. To provision a WRED profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>WRED Profile in the navigation menu. The View WRED Profile page is displayed. 2. Click the Provision a new WREDProfile link. The Provision New WREDProfile page is displayed. 3. Select or enter values referring to the WRED Profile Parameters table. 4. Click Create. To edit a WRED profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>WRED Profile in the navigation menu. The View WRED Profile page is displayed. 2. Click the profile to be edited. The Profile page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the profile to be updated. 4. Edit required values referring to the WRED Profile Parameters table. 5. Click Submit.

Egate-2000 Ver. 1.0

Egress Quality of Service (QoS)

3-59

Chapter 3 Layer 2 Services

Installation and Operation Manual

A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Note

Queues minimum should satisfy the condition " RedQueueMin <= YellowQueueMin <= GreenQueueMin"
The following table describes the WRED Profile parameters.

Table 3-27. WRED Profile Parameters


Parameter Red Queue Minimum or Red Min(KBytes) Default Value Description Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all red packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for red frames beyond which all red packets get dropped. Acceptable values: 0 to 1MB. Maximum percentage value for Red packets to be dropped. Acceptable values: 1 to 100. Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all green packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for green frames beyond which all green packets get dropped. Acceptable values include 0 - 1MBytes. Maximum percentage value for Green packets to be dropped. Acceptable values: 0 to 100.

Red Queue Maximum or Red Max(KBytes) Red Queue Maximum Drop (% age) or MaxDrop Probability(%age) Green Queue Minimum or Green Min(KBytes)

Green Queue Maximum or Green Max(KBytes) Green Queue Maximum Drop (% age) or MaxDrop Probability(%age) -

Yellow Queue Minimum or Yellow Min(KBytes)

Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all yellow packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for yellow frames beyond which all yellow packets get dropped.

Yellow Queue Maximum or Yellow Max(KBytes)

Yellow Queue Maximum Drop (% age) or MaxDrop Probability(%age)

Maximum percentage value for Yellow packets to be dropped. Acceptable values: 1 to 100.

3-60

Egress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter WREDProfile Level Default Value Description

Chapter 3 Layer 2 Services

WRED is a queue management algorithm with congestion avoidance capabilities. Level at which the WRED profile is applied to. CoS_level: WRED profile is applied at the CoS level. This field is not configurable.

Note: Maximum limit of the WRED value should not be greater than 1MB.

Note

Queues maximum should satisfy the condition " RedQueueMax <= YellowQueueMax <= GreenQueueMax"
To delete WRED profiles: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>WRED Profile in the navigation menu. The View WRED Profile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Managing Egress Shaper Profiles


To view provisioned Egress shaper profiles: Click L2 Services > ServiceSwitch-(slot number) > Egress QoS > Egress Shaper Profile in the navigation menu The View EgressShaperProfile page displays all the Egress shaper profiles configured on the network element. To provision an Egress Shaper profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>Egress Shaper Profile in the navigation menu. The View EgressShaperProfile page is displayed. 2. Click the Provision a new EgressShaperProfile link. The Provision New EgressShaperProfile page is displayed. 3. 4. Select or enter values referring to the Egress Shaper Profile Parameters table. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed.
Egate-2000 Ver. 1.0 Egress Quality of Service (QoS) 3-61

Chapter 3 Layer 2 Services

Installation and Operation Manual

To edit an Egress shaper profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>Egress Shaper Profile in the navigation menu. The View EgressShaperProfile page is displayed. 2. Click the profile to be edited. The Shaper Profile page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the profile to be updated. 4. Edit required values referring to the Egress Shaper Profile Parameters table. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The following table describes the Egress Shaper Profile parameters.

Table 3-28. Egress Shaper Profile Parameters


Parameter CIR (kbps) Default Value Description Bandwidth available in a network at any time and in any state of congestion. The acceptable values range from 64Kbps to 500Mbps (for FP) . PIR (kbps) PBS ShaperProfileLevel Service level The maximum number of information units guaranteed for a burst of frames sent at the interface speed to remain CIRconformant. The acceptable values range from 16KB to 512KB. The Peak Information Rate (PIR) for the set CIR. The acceptable values range from 64Kbps to 500Mbps (for FP). The Peak Burst Size (PBS) for the set CBS. PBS is always equal to twice the CBS value. The acceptable values range from 16KB to 512KB. Level to which the shaper profile is applied. Service level: Shaper profile is applied at the Flow Point Level. Minimum value for Shaper at service level is 8kbps and maximum value is 500 Mbps.

CBS

To delete Egress shaper profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>Egress Shaper Profile in the navigation menu. The View EgressShaperProfile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed.

3-62

Egress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Managing Egress Queues


To view provisioned Egress Queues: Click L2 Services > ServiceSwitch-(SlotNo) > Egress QoS > Egress Queues Configuration in the navigation menu. The CoS Queue EgressQoS Configuration page displays all the egress queues configured on the network element. To provision Egress Queue Configuration: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Egress QoS>Egress Queues Configuration in the navigation menu. The CoS Queue EgressQoS Configuration page is displayed. 2. Click the Provision a new CosQEgressQos link. The Provision New CosQueue EgressQoS Configuration page is displayed. 3. Select or enter values referring to the Egress Queues Parameters table. 4. Click Create. To edit Egress Queue Configuration: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Egress QoS>Egress Queues Configuration in the navigation menu. The CoS Queue EgressQoS Configuration page is displayed. 2. Click the Egress queue to be edited. The Egress queue page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the Egress queue to be updated. 4. Edit required values referring to the Egress Queues Parameters table. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The following table describes Egress Queue parameters.

Table 3-29. Egress Queue Parameters


Parameter Profile Name or CoSQueue Profile's Name Default Value Description Name given to the CoS Queue profile name. The name can be a set of alphanumeric characters. Space and special characters are allowed.

Egate-2000 Ver. 1.0

Egress Quality of Service (QoS)

3-63

Chapter 3 Layer 2 Services Parameter Scheduler Mode Queue Scheduler Type Default Value Strict or Weighted Round Robin Description

Installation and Operation Manual

The Scheduler Mode assigned at the Egress. This is not editable. The provisioned CoS Queues. The field is not editable. The scheduler type for the CoS queue. The field is not editable. Strict: Bandwidth is allocated to the queue on priority. Strict or Weighted Round Robin: Bandwidth is allocated based on weights assigned to the queues. NOTE: In Strict or Weighted Round Robin, bandwidth is allocated to the Weighted Round Robin queues only after serving the strict queues.

Scheduler Profile

Configured scheduler profiles. The scheduler profiles assign weight to the queues. Default value is Default COS Level Scheduler. Mechanism for managing queues. taildrop: The packets exceeding the maximum threshold of a queue are dropped. Green packets are dropped beyond 200Kbytes, Yellow packets are dropped beyond 144Kbytes and red packets are dropped beyond 72Kbytes. Wred: A packet is dropped based on its color and the queue length. The drop probability of a packet is set based on its position in the queue with respect to the minimum and maximum thresholds defined for the queue.

Queue Mgmt Type

taildrop

WRED Profile

None

Lists all the configured WRED Profiles. Profiles are listed only when Queue management type is chosen as WRED.

To delete Egress Queues: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Egress QoS>Egress Queues Configuration in the navigation menu. The CoS Queue EgressQoS Configuration page is displayed. 2. In the delete field, select the check box for the queue(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

3-64

Egress Quality of Service (QoS)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

3.7

Establishing Data Communication Network (DCN)

The Data Communication Network (DCN) is established using static routes. The DCN gives you in-band communications and helps in achieving remote connectivity to all the nodes in the network through a single gateway node. The DCN scheme supports connectivity using static routes.

Working with Data Communication Network (DCN)


Egate-2000 supports Inband management over a L2 network of the host and the remote CPEs. All devices share the same broadcast domain (VLAN) as well as the NMS that can access each of the units. The following diagram shows the different management options.

Figure 3-33. Management Options


L2 DCN is supported over .1q and .1ad encapsulated interfaces Maximum of 8 L2 DCN instances are supported per EoPDH card All interfaces in a L2DCN instance should be of same encapsulation type Interfaces in a L2DCN should all be protected (LPG) or unprotected. L2DCN instance cannot have a mix of protected and unprotected interfaces Two or more instances of L2DCN communicate via IP-routing on EoPDH-Main card An instance of L2DCN can only include one front-panel physical interface

Egate-2000 Ver. 1.0

Establishing Data Communication Network (DCN)

3-65

Chapter 3 Layer 2 Services

Installation and Operation Manual

sL2 DCN with .1ad interfaces does not support ingress or egress of untagged frames On .1ad interface only single or outer tag is supported at egress or ingress. A SP-VLAN + C-VLAN as ip-interface is not supported. L2 DCN with .1q ports support ingress or egress of untagged frames based on the PVID configured on the .1q interfaces L2 DCN interfaces do not support OSPF Enabling L3 DCN by running either OSPF over NMS port or over optical DCC interfaces is not recommended.

Management Networks
To view Management Network: Click L2 Services > ServiceSwitch> DCN > ManagementNetwork in the navigation menu. The View ManagementNetwork page is displayed.

Figure 3-34. View Management Network


To provision a Management Network: 1. Click L2 Services > ServiceSwitch > DCN > ManagementNetwork in the navigation menu. The View ManagementNetwork page is displayed. 2. Click the Provision a new ManagementNetwork Entry link. The Provision New Management Network Entry page is displayed. 3. Select or enter values referring to the Management Network Parameters table. 4. Click Create. A confirmation page is displayed.
3-66 Establishing Data Communication Network (DCN) Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

5. Click Yes. A "Successfully Created" message is displayed.

Figure 3-35. Provisioning Management Network Table 3-30. Management Network Parameters
Parameter Management Network Type Description Displays the type of interface. You can select QinQ port{dot1ad Port} or 802.1q port {dot1q Port}. Management CVLAN Management Bridge MAC Enter the CVLAN ID participating in the Management Network. Enter any Unicast MAC address apart from the Mac address of the system. System shows the chassis MAC address as default. Management Bridge IP Management Bridge IPMaskLength Member Ports Enter the IP address of the network element participating in Management Network. Enter the mask length of the IP address participating in Management Network. Select the checkbox for the ports participating in the Management Network.

To delete Management Network: 1. Click L2 Services > ServiceSwitch> DCN > ManagementNetwork in the navigation menu. The View ManagementNetwork page is displayed. 2. In the delete field, select the check box for the Management Network to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete.

Egate-2000 Ver. 1.0

Establishing Data Communication Network (DCN)

3-67

Chapter 3 Layer 2 Services

Installation and Operation Manual

A "Successfully Deleted" message is displayed.

Establishing Management Bridge Using Static Route


For DCN to work between two different IP subnets, the nodes in the subnet #1 should be aware of routing the L3 IP packets to subnet #2, and vice versa. InBand Communication (IBC) can be achieved by either running dynamic routing protocols like OSPF over the DCN interfaces or by configuring appropriate default route or static routes at the NE. A route which is manually configured route at an NE is a static route. A static route is an entry in network element routing table that specifies how to reach an IP address through a particular gateway (network element or interface). Static routes provides static connectivity between routers, meaning the routes persists and do not change automatically during reboots unlike routing protocols. These routes persist across reboots.

Note

Only one static route entry can be provisioned for a destination.


To create a MgmtBridgeStaticRoute: 1. Click L2 Services > ServiceSwitch-(slot number) > DCN > ManagementBridge StaticRoute in the navigation menu. 2. Click Add New MgmtBridgeStaticRoute link. Creating MgmtBridgeStaticRoute page is displayed. 3. Select or enter MgmtBridgeStaticRoute parameters. Refer MgmtBridgeStaticRoute parameters for more information. 4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. The following table describes the MgmtBridgeStaticRoute parameters.

Table 3-31. MgmtBridgeStaticRoute Parameters


Parameter Destination Network Addr Destination Network Addr Mask Len Next Hop IP Address Default Value Description The IP address of the destination network element to which a route is to be added. Destination network address should be a valid unicast IP address. The length of the mask to be applied to the destination network element. The acceptable values are 0-32. IP address of the gateway router for reaching the destination network. The gateway router should be in the same L3 IP subnet as management network over which the static route is being configured. Management Network Bridge Interface which is to be used for reaching the destination network as specified by the static route.

ManagementNetwork

3-68

Establishing Data Communication Network (DCN)

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 3 Layer 2 Services

Note

Management network should be created prior to creating management bridge using static routes.
To delete a MgmtBridgeStaticRoute: 1. Click L2 Services > ServiceSwitch-(slot number) > DCN > ManagementBridge StaticRoute in the navigation menu. 2. Select the MgmtBridgeStaticRoute that you want to delete in Delete column. 3. Click Delete. A Deleted successfully message is displayed.

Egate-2000 Ver. 1.0

Establishing Data Communication Network (DCN)

3-69

Chapter 3 Layer 2 Services

Installation and Operation Manual

3-70

Establishing Data Communication Network (DCN)

Egate-2000 Ver. 1.0

Chapter 4 User Interface Guide


4.1 Chapter Organization
Table 4-1. Chapter Organization
Chapter Getting Started with the Network Element Application Scope This chapter covers setting up Network Element application. Logging in and logging out from the application. The Network Element user interface enables the user to provision and monitor the node parameters. This chapter describes the components of Network Element Information Pane. This chapter describes the System Time menu in the web user interface. This chapter describes the Node Slot View page, which provides the graphical representation of how the cards are allotted to the slots of the chassis. This chapter covers the functions of Inventory menu option. The Inventory menu in the web user interface provides the inventory of the modules, cards and SFPs in the network element. This chapter covers attributes of the cards present in the network element. This chapter describes the protection feature for a network element. The linear protection switching mechanism is coordinated by the K1 and K2 bytes in the Line Overhead. This chapter describes the Configuration menu in the WUI. Fault management deals with detecting and reporting faults by the network element. Alarms are raised to alert the user about fault conditions. Profiles define the behavior of the ports in the event of an alarm. This chapter describes the Profiles menu in the WUI. This chapter explains how you can monitor various performance statistics.

Network element Information Pane Working with System Time Menu Node Slot View Page

Working with the Inventory Menu

Working with the Shelf Sub-Menu Understanding the Protection Feature

Working with the Configuration Menu Managing Faults

Defining Profiles

Performance Monitoring

Egate-2000 Ver. 1.0

Chapter Organization

4-1

Chapter 4 User Interface Guide Chapter Security Management Scope

Installation and Operation Manual

This chapter describes about users and their privileges to access the network element. The network element provides four different user access groups (ADMIN, OPERATOR, OPERATOR2 and USER). The chapter describes the maintenance operations available on the network element.

Maintenance Operations

4.2

Getting Started with the Network Element Application

This section introduces the Network Element Application Interface. The Network Element user interface enables you to provision and monitor the node parameters. It also provides sequential procedure method to access, create, edit and delete the node details.

System Requirements
Before running the application, make sure your system satisfies the following configuration requirements.

Table 4-2. System Requirements


System Requirements Operating System Memory Browser Windows XP Windows 2000 Windows NT Linux 2.4 or 2.6 Red Hat

256 MB RAM or greater Mozilla 1.6 or 1.7 on Red Hat Linux and HP-UX Firefox 1.0 on Red Hat Linux 7.O and later Internet Explorer 7.0 and later on Windows

Accessing Web User Interface Using LAN


The Web User Interface of a network element is accessed remotely using DCC. You can also access a network element by adding a route on your personal computer and directing the IP requests to the gateway network element, or inband via the L2 access network.

Caution During multiple administrative and diagnostic logins, ensure that actions performed do not affect the work of other users. The commands are implemented on first-come-first-serve basis.
4-2 Getting Started with the Network Element Application Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

The URL http://192.168.1.254 has the default factory setting. After the system is commissioned, the network element is assigned the element specific URL. If you are unable to access the URL, ensure that Ethernet connectivity to the network element is proper Type of cable used is same (straight/cross) Ethernet interface on the PC/terminal is provisioned Correct URL entered to access the network element and There is no malfunction of the network element software

Note

To access the Web User Interface of the network element using LAN, connect the Ethernet interface of the craft PC/terminal to the MNG-ETH port of Egate-2000MMNG Card.
An Ethernet cross cable is used for direct connectivity between the Ethernet interface of the PC and the NMS port on the network element. An Ethernet straight cable connects the network element and the PC terminal through an Ethernet hub or switch.

Note

Ensure that you are using Netscape Navigator version 4.75 or higher or Internet Explorer version 5.0 or higher for setting up the network element software.

Configuring Caching Mechanism


Set the caching mechanism in the web browser to automatically refresh the alarm monitoring pages. To refresh the alarm monitoring page automatically in Internet Explorer: 1. Click Tools>Internet Options. 2. On General tab, under Temporary Internet files, click Settings. 3. In Settings dialog box, under Check for newer versions of stored pages, select Automatically, and then click OK. 4. Click OK in Internet Options.

Logging to the Network Application


To log in to the network element application: 1. Open web browser and enter the URL: http://192.168.1.254:20080/.The login page appears as shown below.

Egate-2000 Ver. 1.0

Getting Started with the Network Element Application

4-3

Chapter 4 User Interface Guide

Installation and Operation Manual

Figure 4-1. Logging to the Network Application


2. Enter user name as 'su' and password as '1234'. 3. Click Submit. The home page of the Network Element Application appears as shown below:

Figure 4-2. Network Element Home page

Logging Using CHAP


To log into the node using Challenge-Response Authentication (CHAP): 1. Open web browser and enter the URL: http://192.168.1.254:20080/.The login page appears. 2. Enter the username. 3. Enter the password. Default password is 'testing 123'. 4. Select Domain as CHALLENGE. 5. Click Submit. 6. Enter response. 7. Click Submit. Authentication result is displayed.

Note

For more information on CHAP, refer Enabling Challenge-Response Authentication.

4-4

Getting Started with the Network Element Application

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Setting Up the Network Element


To set up the network element: 1. Log in to the network element. The home page of the Network Element Application appears. 2. Enter the parameter values and click Submit. A confirmation page is displayed. 3. Click Accept Valid Modifications. A "Successfully Modified message is displayed. Using the Network Element Information pane, you can access and modify basic configuration information of a network element including Node name, Router ID, Ethernet IP, Contact and Location fields. Editing the fields on the NE Information Pane is service non-disruptive. The software reboots without affecting the commissioned traffic (warm reset) when Router ID or Ethernet IP is changed. The network element does not reboot for any changes made in name or location. Connectivity to the network element software is lost while rebooting. The default and acceptable values for the configurable network element parameters are as follows:

Table 4-3. Default configuration Values


Parameter
Name

Default Value
-

Description
Displays the identification label of the network element name. 0 - 20 character string. This field supports all alphanumeric, numbers, alphabets, underscore, and hyphen characters. Displays the configuration of the node. Displays the product code of the node. Displays the data mapping mode of the node. Allows the user to enter the IP address of the network element for in-band communication. The Router ID is unique in a network and is used by the Network Management System (NMS) to identify and enroll the network element. The value can be from 0.0.0.0 - 254.254.254.254. Allows the user to the IP address and the subnet mask for the network element for LAN port communication. The value can be from 0.0.0.0 254.254.254.254 The mask can take a value of 8, 16, or 24. Displays the MAC address of the network element.

Node Configuration Node Product Code AU Mode Router ID

192.168.1.254

Ethernet IP

192.168.1.254/24

MAC Address

Egate-2000 Ver. 1.0

Getting Started with the Network Element Application

4-5

Chapter 4 User Interface Guide

Installation and Operation Manual

Parameter
Contact

Default Value
-

Description
Allows the user to enter the contact details and contact number of the person maintaining the network element. The character string is 0 - 255. This field supports all alphanumeric and special characters. Allows the user to enter the location or site information where the network element is physically installed. The character string is 0 - 255. This field supports all alphanumeric and special characters. Displays the version of the software installed on the network element. Displays the mode of operation of the node.

Location

Software Version SDH Mode

Logging out of the Network Application


The Log Out option is provided at the top right of the Title Area. If you want to exit the application, click Log Out. To log in as a different user, click Change User and re-enter the user name and password.

4.3

Network element Information Pane

The NE information pane is the first screen that appears when you log into the network element application. The pane provides you with basic configuration information of a network element such as the node name, Ethernet IP, software version, location of the node and the name of an authorized user maintaining the node.

Working with Network Element Information Pane


The NE Information Pane is as shown below.

Figure 4-3. NE Information Page

4-6

Network element Information Pane

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

You can expand Navigation menu to access the nested submenus. On clicking an option, the details appear in the preview pane. When you delete, modify, or provision any feature; the system prompts for a confirmation and the changes made are applicable only after you click on Confirm button. During confirmation, the Cancel button is selected by default to avoid inadvertent submission of changes, as some web browsers automatically submit the form when Enter key is pressed on the keyboard. On confirming a change, system prompts for initiating a reboot and traffic disruption. The main screen is divided into four parts namely: Alarm Banner Title Pane Navigation Pane Preview Pane

Alarm Banner
The Alarm Banner displays the active alarms on the network element along with their severity levels. The Alarm Banner displays a check box, which provides an option to enable/disable auto refresh. The auto-refresh is enabled by default. Select the check box if you want to disable Auto-refresh option. The Alarm area also displays the last refresh time of the network element application.

Figure 4-4. Alarm Pane


The question mark above the alarm banner indicates the order in which the alarms are displayed in the banner: Critical, Major, Minor, and Warning, when the mouse is hovered over it. Based on the severity of alarms, color codes are assigned to them. Red represents major and critical type of alarms. Orange represents minor type of alarms.

Yellow represents warning type of alarms.

Title Pane
The Title Pane is located at the top frame in the application window and includes the following:
Egate-2000 Ver. 1.0

NMS port IP Address of the network element Network element name Uptime (the time duration for which the node has been up) Log out link
Network element Information Pane 4-7

Chapter 4 User Interface Guide

Installation and Operation Manual

Figure 4-5. Title Pane

Navigation Pane
The Navigation Pane displays a nested menu items for accessing the various network element functionalities, where you can access and review the card details.

Figure 4-6. Navigation Pane

Preview Pane
The Preview Pane displays the details of the menu items that are nested in the Navigation menu and list the parameters required to configure the network element as desired. Using Preview Pane you can: View the card details Modify the card details Delete the card details

4-8

Network element Information Pane

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-7. Preview Pane


In SDH mode, the default AV mode is AU-3. This needs to be modified to AU-4 for the common SDH case.

4.4

Working with System Time Menu

This chapter describes the System Time menu in the user interface.

Setting Date and Time of the Network Element


Setting the date, time, time zone and time server of a network element in a network is essential to track the time at which various activities were carried out (mainly alarms) in the network element. Based on the configured time and date set. Modifying the date and time does not affect any of the previously raised alarms. However, all the new alarms are stamped with the new date and time. Similarly, the event history does not change even after the date and time change reflects the change. You can change the network element time settings by editing values in the web user interface. For changes to take place in the operating system and logs, a service non-disruptive reset has to be applied. To set date and time: 1. Click System Time > Set Time. 2. Select values for the relevant fields. 3. Click Submit. 4. Click Accept Valid Modification. The table below describes the Date and Time parameters.

Egate-2000 Ver. 1.0

Working with System Time Menu

4-9

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-4. Name of Table


Parameter Date and Time Represents Current date and time relevant to the configured time zone. Acceptable Values Month: January to December Date: 1 to 31 Year: 2001 to 2036 Hour: 00 to 23 Minutes: 00 to 59 Seconds: 00 to 59

Setting Time Zone


You can set the time zone relevant to the location of the network element using the Set Time Zone menu. The Other Time Zone option for zone allows you to set time for zones that are not listed. You can also set Day Light Saving, if applicable for a particular time zone. To set time zone, 1. Click System Time > Set time zone in the Navigation menu. The Set Time Zone page is displayed. 2. Select the desired time zone from the zone drop-down menu. If the desired time zone is not listed in the Zone drop-down menu, click Other Time Zones. 3. Click Submit. The Other Time Zone page is displayed. 4. Enter or select values referring to the Time Zone Parameter table. 5. Click Submit. 6. Click Yes on the confirmation page that appears. A "Successfully Modified" message is displayed. 7. Apply warm reboot to the network element. The following table describes the Time Zone parameters.

Table 4-5. Time Zone Parameters


Parameter
Zone

Default Value
IST

Description
The time zone of the area in which the network element is placed. Acceptable values: any relevant time zone.

Offset Hours

-5

The hours by which the local time is offset from GMT. Acceptable values: -12 to 11.

4-10

Working with System Time Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Parameter
Offset Minutes

Default Value
30

Description
The minutes by which the local time is offset from GMT. Acceptable values: 0 to 59.

Daylight Saving

Disable

Parameter to configure Daylight saving. Enable: Daylight saving can be configured in the network element. Disable: Daylight saving cannot be configured in the network element.

DST String

Describes the DST period. Acceptable value: alphanumeric characters

DST Start (Month:Week:Day:Hour: Min)

The instance when DST starts. Month: January to December Week: 1st week - 4th week, Last week Day: Sunday to Saturday Hour: 0 - 23 Min: 0-59

DST Stop (Month:Week:Day:Hour: Min)

The instance when DST stops. Month: January to December Week: 1st week - 4th week, Last week Day: Sunday to Saturday Hour: 0 - 23 Min: 0-59

Setting Time Server for the Network Element


Set Time Server menu enables you to set a server or network element as master clock source in order to apply a uniform clock cycle in the network. All the network elements connected to the same server in a network function synchronously. The network element periodically synchronizes itself with the server to avoid an asynchronous state. In case a network element has to be synchronized with a NTP server for date and time, the NTP server address and synchronization interval for the network element should be set. Usually, the NMS server is nominated as the NTP server. To set the network time server: 1. Click System Time> Set time server in the Navigation menu. The Set Time Server page is displayed. 2. Select or Enter relevant parameters. 3. Click Submit. 4. Click Create. A "Successfully Created" message is displayed.

Egate-2000 Ver. 1.0

Working with System Time Menu

4-11

Chapter 4 User Interface Guide

Installation and Operation Manual

The following table describes the Network Time Server parameters.

Table 4-6. Network Time Server Parameters


Parameter NTP Client enable Default Value Disable Description Parameter to enable NTP client. Enable: NTP server can be nominated as synchronization source for date and time. Disable: NTP server cannot be nominated as synchronization source for date and time. NTP Server-0 The IP Address of the first time server. Acceptable values range from 0.0.0.0 255.254.254.254. NTP Server-1 NTP Server-2 NTP Server-3 NTP Server-4 Synchronization Interval (seconds) 1024 The IP Address of the second time server. Acceptable values range from 0.0.0.0 - 255.254.254.254. The IP Address of the Third time server. Acceptable values range from 0.0.0.0 - 255.254.254.254. The IP Address of the fourth server. Acceptable values range from 0.0.0.0 - 255.254.254.254. The IP Address of the fifth server. Acceptable values range from 0.0.0.0 - 255.254.254.254. The synchronization interval specifies (in seconds); defines how often the network element should poll the time server. Acceptable values: 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192, 16384 The current NTP server. The time offset in the network element with respect to the Synchronization server. The latest time when the network element was synchronized to the time server.

Current NTP server Current Time Offset Last Update Time

Note

In case the network elements in a network are synchronized to more than one NTP server, ensure that the NTP servers are synchronized to a common clock. Non-synchronous NTP servers may result in frequent reset of internal clock in the network elements, and it can be frequent oscillations of internal clock. Up to five NTP servers can be nominated on the network element. Timing server nominated must be of stratum level of 14 or less than 14. The network element will not synchronize to the server if the stratum level is out of range.

Note Note

4-12

Working with System Time Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

4.5

Node Slot View Page

This chapter describes the Node Slot View page options and provides the graphical representation of how the cards are allotted to the slots of the chassis.

Refreshing Node Slot View Page


The Node Slot View page is refreshed for every two seconds. 1. To view the Node slot click Node Slot View. The Node slot view preview pane is displayed.

Figure 4-8. Node slot view


2. To stop the automatic refreshing the page content, click Stop Refresh. 3. To resume the refresh function, click Start Refresh.

Understanding Visual Indicators


Three visual indicators are present on the card representing the status, alarm and active conditions of the module or card respectively. The color of the status, Light Emitting Diode (LED), indicates the status of the module or card. To view the details in the preview pane, click one of the cards. The lower portion of the pane displays the status of active alarms present on the card. The following table lists the visual indicators on the Node Slot View page.

Table 4-7. Visual Indicators


This LED Status LED With this Color Red Green Amber Represents Card Failure Normal Working Power Cycle Mismatch

Egate-2000 Ver. 1.0

Node Slot View Page

4-13

Chapter 4 User Interface Guide This LED Alarm LED With this Color Red Green Amber Active LED Red Green Amber

Installation and Operation Manual Represents Major/Critical alarms present on the network element Normal working Minor alarms present on the network element Card failure Normal working Power cycle mismatch

Viewing Card Parameters


To view card parameters, in the navigation menu, click Node Slot View. In the Node Slot View page that appears click the card to view its card parameters. The following table gives general information about the card parameters.

Table 4-8. Card Parameters


This Parameter Shelf Does This Displays the shelf number in which the network element is present. The value is always 1 in this release. Applies To Slot Displays the slot number in which the card is present. Equipment Present indicates that the card is present in the node Not present indicates that the card is not present in the node Product Code Displays the product code Base Card Chassis Fan Line Cards PSU Base Card Chassis Fan Line Cards PSU Base Card Chassis Fan Line Cards PSU Base Card Chassis Fan Line Cards PSU

4-14

Node Slot View Page

Egate-2000 Ver. 1.0

Installation and Operation Manual This Parameter Serial Number Does This Displays the unique serial number of a specific module

Chapter 4 User Interface Guide Applies To Base Card Chassis Fan Line Cards PSU Base Card Line Cards Base Cards Base Card Line Cards

Software Version

Displays the version of the software installed in the node Displays the temperature of the network element Displays the MAC address of the network element

Temperature Mac Address

Note

The slot view shows all the cards physically present in the network element. The view of the cards may or may not match with the physical orientation of the cards. Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned by clicking the Ports link provided on the respective pages.

Note

4.6

Working with the Inventory Menu

This chapter covers the functions of Inventory menu. The Inventory menu in the Web user interface provides the inventory of the modules, cards, and SFPs in the network element. You can view the details of physical presence, operation status, product code, and serial number of the elements in the Inventory.

Understanding Node Inventory Parameters


To view the node inventory, click Inventory > Node Inventory. The Node inventory preview pane is displayed.

Figure 4-9. Node Inventory


Egate-2000 Ver. 1.0 Working with the Inventory Menu 4-15

Chapter 4 User Interface Guide

Installation and Operation Manual

The following table describes various parameters associated with the Node Inventory.

Table 4-9. Node Inventory Parameters


Parameter Slot Description Displays the slot number in which the card is present. On clicking the slot hyperlink, the attributes such as shelf, product code, serial number, etc of the card present in the slot are displayed. Displays the type of the card. For example: PSM, FAN, MFC, etc. Displays the operating status of the card. For example: UP and DOWN. Displays whether card is currently jacked in or not. Displays the Product code of the card. Displays the identification number of a specific card.

Card Type Operational Status Equipment Product Code Serial Number

Note

The Node inventory does not refresh automatically. You need to manually refresh the page or the pane to view any changes made to the node inventory.

Executing Forced Switch Over and Forced Sync Command


In a redundant system, in the event of a primary card being jacked out for maintenance or due to failure, the traffic is switched automatically to the secondary card. A forced switch needs to be applied in case the secondary card needs to take up the primary role, with the primary card still present in the system. A forced sync needs to be applied before forced switch over so that the secondary card is synchronized to the primary before it can take up the role of a primary. When a redundant cross-connect (XCC) card is jacked in freshly, please wait for at least 5 minutes before performing any XCC switching activity. Attempt a physical cross-connect card switchover (either by Jacking OUT or hot wap) only when the Slave Ready for SwitchOver is YES. The Switch Over and Sync link is not displayed when the Slave Ready for SwitchOver status is NO. In a system, after a redundant cross-connect card is jacked in, please wait for the operational status and Equipment to become UP and Present respectively in the node inventory page before performing forced switchover. To apply Forced Switch Over or Forced Sync command: 1. Click Inventory > Node Inventory. The Node Inventory preview pane is displayed. 2. Click the Slot link for the primary redundant card. 3. Click Switch Over and Sync link.

4-16

Working with the Inventory Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Deleting Card Configurations


The network element retains the configuration of a card even after the card is removed from the slot. In such cases, the Node Inventory pane shows status DOWN for Operational Status and Not Present for the removed equipment. The configuration of the card has to be manually deleted in the View/Delete Cards page. In order to delete a card, first delete all cross-connections, DCN parameters and MSP/APS provisioned on the ports of the card and then jack out the card. To delete the configuration of the card that has been removed from the network element: 1. Click Inventory > Node Inventory. The Node inventory preview pane is displayed. 2. Click the Delete Cards. 3. Select the cards whose configuration is to be deleted in the Delete column. 4. Click Submit. 5. Click Confirm Delete.

Deleting Pluggable Modules


The Pluggable Modules describes the Small Form Factory-Pluggable (SFP) parameters. The SFPs are associated with the STM-N ports on the cross-connect card. The SFPs can be deleted without having to actually remove the SFP. The SFP auto provisions with the slotted SFP values. The following table describes the SFP parameters.

Table 4-10. SFP Parameters


Parameters Description

Name Port Operational Status Is Present

The name of the SFP. The STM-N port of the SFP in the network element. The operational status of the SFP. The physical presence of the SFP in the network element.
Present: The SFP is present in the network element. Not Present: The SFP is not present in the network element.

Laser Type Product Code

The laser type. Also specifies the capacity and range of the laser used in the particular interface. The product equipment code of the SFP.

Egate-2000 Ver. 1.0

Working with the Inventory Menu

4-17

Chapter 4 User Interface Guide

Installation and Operation Manual

Note

Lasers are specific to the interfaces. For example, a STM-N laser can be inserted only into an STM-N interface. The ranges that a Laser can have are Long Reach, Short Reach and Intermediate Reach.
To delete the configuration of pluggable modules from the network element: 1. Click Inventory > Node Inventory in the Navigation menu. 2. In the SFP section, click the Delete button in the Name column for the SFP to be deleted. 3. Click Confirm Delete. The Delete button enables you to delete the SFP. You do not require to physically remove the SFP before deleting. The SFP will auto provision with the slotted SFP values. The Node inventory page displays modules pluggable status along with the chassis information.

4.7

Working with the Shelf Sub-Menu

The Shelf submenu lists all the cards present in the network element. Each individual card link, when clicked, displays the physical parameters of the card.

Card Attributes
The following table gives general information about the physical attributes of the cards present in the network element:

Table 4-11. Physical Card Attributes


Parameter Shelf Attributes The shelf number in which the network element is present. This value is always 1 in this release. Applicable To Chassis Line cards Aggregate Card Cross connect card FAN PSU Slot The slot number in which the card is present. Chassis Line cards Aggregate Card Cross connect card FAN PSU

4-18

Working with the Shelf Sub-Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Equipment Attributes Present indicates that the card is present in the node. Not Present indicates that the card is not present in the node.

Chapter 4 User Interface Guide Applicable To Chassis Line cards Aggregate Card Cross connect card FAN PSU Chassis Line cards Aggregate Card Cross connect card FAN PSU Chassis Line cards Aggregate Card Cross connect card FAN PSU

Product Code

The product code of the module.

Serial Number

The unique serial number of a specific module.

Software Version Temperature

The version of the software installed in the node. The temperature of the network element. The MAC address of the network element Chassis Line cards Chassis

MAC Address

Note

Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned by clicking the Ports link provided on the respective pages.
Card

4.8

Understanding the Protection Feature

This chapter describes the protection feature for a network element. The linear protection switching mechanism is coordinated by the K1 and K2 bytes in the Line Overhead. Protection switching comes into effect in case of: Signal failure Signal degradation User initiated request

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-19

Chapter 4 User Interface Guide

Installation and Operation Manual

Working with Protection Menu


Using Protection menu, you can view: MSP/APS groups Connections Timing Manager Link Protection Group

Figure 4-10. Protection Menu

Working with MSP/APS


Multiplex Section Protection (MSP)/Automatic Protection Switching (APS) is a port level protection supported on the STM-1/4/OC-3/12 interfaces. The 1+1 protection scheme uses a complete duplication of services and implies that two identical lines are active at the same time (both working and protection lines are transmitting the same signal) allowing for a transparent switch from the working to the protection line. In other words, the traffic is permanently bridged on both the working and protection lines. The MSP/APS groups can be configured either 1WAY or 2WAY. MSP/APS protection switching is initiated in the event if a fault or alarm in the STM/SONET port in the network element or by user initiated switching commands. Protection switching is configured either in revertive or non-revertive mode: In revertive mode, traffic switches back to the work channel once the fault condition has cleared, after the Wait To Restore (WTR) period has elapsed. In non-revertive mode, traffic remains on the protect channel and does not automatically switch back to the work channel when the fault condition has cleared.

The MSP/APS configuration table lists the maximum number of connections supported in the MSP/APS configuration.

4-20

Understanding the Protection Feature

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-12. Maximum Number of Connections Supported in the MSP/APS Configuration


Capacity Max.No.Of Connections for STM-1/OC-3 Max. No. of connection for STM-4/OC-12 336 252 12 4

VC11/VT1.5 VC12/VT2 VC3/STS1 VC4/STS3c

84 63 3 1

The following figure shows the MSP/APS protection scheme in 1WAY and 2WAY configuration.

Figure 4-11. MSP/APS protection scheme in 1WAY and 2WAY configuration

Note

The local and remote network element must be provisioned with the same protection configuration. Configure the MSP/APS group before creating the desired cross-connects on the working port.
The MSP/APS configuration is applicable to STM-1/4 and OC-3/12 ports. The number of MSP/APS provisioned depends on the availability of optical ports. One MSP/APS protection group can be provisioned for every two optical ports in an network element. The work to protect switching between the A018 cards is more than 1000ms in case the card is jacked out. To minimize the traffic downtime to

Note

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-21

Chapter 4 User Interface Guide

Installation and Operation Manual

around 50 ms, remove the fibers from the ports of the A018 cards and then jack out the card. Also the cards should be jacked in with the fibers removed. The fibers should be inserted one by one, only after card comes up fully and the status and active LEDs are green. The MSP/APS Parameters table given below describes the MSP/APS parameters.

Table 4-13. MSP/APS Parameters


Parameter
Name

Default Value
-

Description
The name of the MSP/APS group, when you click MSP/APS, the Protection provisioning page is displayed. The channel configured to carry the traffic under normal working conditions. 'N' indicates the slot number. The channel configured to carry the traffic under protected (failure of work channel) conditions. 'N' indicates the slot number. The protection Mode is used as. 1+1, where the traffic is carried in both the work and the protect channel. The signal best received among the work and protect channel is considered by the receiver. The revertive mode of the protection. Revertive: This mode enables automatic switching to work channel from protect channel, once the fault on work channel is fixed. Non-Revertive: In this mode, traffic has to be manually switched from protect to work channel. Until traffic is manually switched back to work channel, traffic is carried on protect channel.

Working port

STM1-1-N-1/OC3-1-N-1

Protection port

STM1-1-N-2/OC3-1-N-2

Protection mode

1+1

Admin Reversion Mode or Revertive Mode

Non-Revertive

Admin Protection Switching Mode or Protection Switching Mode

1 WAY

Parameter to indicate if the protection is either in transmitting/receiving direction only or in both transmitting and receiving direction. 1WAY: Protection is in only one direction, either transmitting or receiving. 2WAY: Protection is in both transmitting and receiving directions.

4-22

Understanding the Protection Feature

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Parameter
WTRTime (minutes)

Default Value
5

Description
Time interval (in minutes) where the traffic must switch back to work channel on rectification of work channel, when admin reversion mode is set to revertive. The acceptable values range between 1 to 12 minutes. The protection architecture used on the network element is 1+1. The protection switching mode on the network element are between 1 WAY 2 WAY The reversion mode configured on the network element (Revertive/NonRevertive). The protection architecture used on the remote network element(1+1) The protection switching mode on the remote network element (1 WAY/2 WAY). Any external request is on the remote network element. Any external request is on the network element. External command issued on the MSP/APS protection. Parameter to enable or disable route diversity. Enable: Allows you to have two DCC links. You can also provision both on the work and protect ports. The ports act independently. Disable: When disabled, you are not allowed to delete the MSP/APS since the ports are not independent.

Operational Protection Architecture Operational Protection Switching Mode Operational Reversion Mode

1+1 1WAY, 2WAY

Non-Revertive

Remote Protection Architecture Remote Protection Switching Mode Remote Request Current Standing Request External Command Route Diversity

1+1 1 WAY No Request No Request Enable

Current status

Work

The active channel in which traffic is being currently carried. Work: The work channel carries the traffic. Protect: The protect channel carries the traffic if work channel is not functioning.

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-23

Chapter 4 User Interface Guide

Installation and Operation Manual

Parameter
Protection request

Default Value
Clear

Description
Protection request issued on the network element. None: Indicates no request for protection has been made Lockout Protection: Indicates MSP protection request is locked out and protection switching cannot be initiated. Clear: Indicates the lockout is cleared and protection switching can be initiated.

Switch status

No Request

The state of protection switching. Signal Failure in the Work port: if failure on the work port. Signal Fail on Protection: failure on the protect port. WTR: traffic is being switched from protect to work and the failure on the work has been cleared. No Request: ports are working properly. Force Switch to Work: Force Switch to Work command is issued on the protect port and the traffic is switched from protect to work port. Force Switch to Protect: Force Switch to Protect command is issued on the work port and the traffic is switched from work to protect port. Manual Switch to Work: Manual Switch to Work command is issued on the protect channel and the traffic is switched from the protect to work port. Manual Switch to Protect: Manual Switch to Protect command is issued on the work port and the traffic is switched from work to protect port. Reverse Request: MSP/APS protection request is locked out in the link partner and protection switching cannot be initiated. Do Not Revert: traffic has switched from protect to work and the failure on work has been cleared in non-revertive mode. Equip Fail on Protect: failure on the far end network element due to card jackout or FMECA failure.

4-24

Understanding the Protection Feature

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Automatic protection switches are initiated by the network element and are triggered by signal fail and degrade conditions at the section and line level only.

Viewing MSP/APS Groups


To view provisioned MSP/APS, click Protection>MSP/APS groups in the Navigation menu. The MSP/APS groups Preview pane is displayed.

Provisioning MSP/APS Groups


To provision MSP/APS groups: 1. Click Configuration > MSP/APS groups in the Navigation menu. The View MSP/APS groups Preview pane is displayed. 2. Click the Create MSP/APS group link. The Provision port protection Preview pane is displayed. 3. Select or enter values referring to the MSP/APS Parameters table. 4. Click Create. A confirmation Preview pane is displayed. 5. Click Yes. A "Successfully Created" message is displayed.

Note

MSP/APS on VC12 management channel is not supported for all the products. On failure of work channel, VC12 management channel goes down and comes up only on restoring the work channel.

Editing MSP/APS Groups


To edit MSP/APS groups: 1. Click Configuration > MSP/APS groups in the Navigation menu. The View MSP/APS groups Preview pane is displayed. 2. Click the MSP/APS group link in the Name column. The Protection Provisioning Preview pane is displayed. 3. Edit the required values referring to the MSP/APS Parameters table. 4. Click Submit. A confirmation Preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-25

Chapter 4 User Interface Guide

Installation and Operation Manual

Executing External Commands on MSP/APS Groups


To execute external commands on MSP/APS groups: 1. Click Protection > MSP/APS groups in the Navigation menu. The MSP/APS groups Preview pane is displayed. 2. Click the MSP/APS group link in the Name column. The Protection Provisioning Preview pane is displayed. 3. Click the required command to be issued on the protection.

Deleting MSP/APS Groups


To delete MSP/APS groups: 1. Click Configuration > MSP/APS in the navigation menu. The View MSP Ring Preview pane is displayed. 2. In the delete field, select the check box for the entries to be deleted. 3. Click Delete. A confirmation Preview pane is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Note

The MSP/APS group can be deleted only if there are no cross-connects or In Band Communication (IBC) interfaces (F2, F3 and F2F3) provisioned on the ports which make up the MSP/APS group.

Working with Connection Protection


Sub-Network Connection Protection (SNCP) is path protection switching that is initiated in the path terminating equipment when the network element is in SDH mode. Unidirectional Path Switched Ring (UPSR) is path protection switching that is initiated in the path terminating equipment when the network element is in SONET mode. In SNCP/UPSR, protection is initiated on a failure in the path. It is required to create two paths for each circuitone for work and other for protection. Traffic in the source network element is bridged on both working and the protection paths, so that the destination network element selects the signals from the working or protection paths. The SNCP/UPSR is a dedicated protection mechanism that operates in a unidirectional protection switching manner. The SNCP/UPSR is a protection scheme, which is applied on an individual basis to VC-n/STS-n (both HOVC and LOVC) signals. The entry and the exit network elements are designated during connection provisioning time. A network element can be both entry and exit network element in case of bidirectional SNCP/UPSR ring connection. The SNCP/UPSR ring groups are formed from unprotected facilities. When SNCP/UPSR ring connections are provisioned on these facilities, all intermediate nodes passthrough connections.

4-26

Understanding the Protection Feature

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

The SNCP/UPSR is provisioned only if the port used for working or protection is not a part of MSP/APS. There should be availability of minimum bandwidth on both the working and protection port. For example, to provision SNCP/UPSR, there should be at least one TU12/VT2 available on the working and protection ports. The SNCP/UPSR configuration is supported on STM-1/4/OC-3/12 interfaces. The SNCP/UPSR is provisioned in revertive and non-revertive mode. In revertive mode, traffic switches back to the work path once the fault condition has cleared, after the WTR period has elapsed. In non-revertive mode, traffic remains on the protect path until switched back to the work path manually, after the fault is cleared. The following table lists the maximum number of connections supported in the SNCP/UPSR configuration for STM -1/4/OC-3/12 interfaces.

Table 4-14. Maximum Number of Connections Supported in the SNCP/UPSR Configuration for STM -1/4/OC-3/12 Interfaces
Capacity Maximum number of connections for STM 84 63 3 1 Maximum number of connections for STM-4/OC-12 336 252 12 4

VC11/VT1.5 VC12/VT2 VC3/STS1 VC4/SS3c

SNCP/UPSR is provisioned while configuring protection for cross-connects. Refer to the Cross-Connects section for information on creating/editing cross-connects. The following figure illustrates switching in the case of single and dual fiber cuts.

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-27

Chapter 4 User Interface Guide

Installation and Operation Manual

Figure 4-12. Switching in single and dual fiber cuts

Viewing SNCP/UPSR Protection


To view provisioned SNCP/UPSR, click Protection > Connections in the Navigation menu. The Connection Protection Requests Preview pane is displayed.

Issuing External Commands


To issue external commands: 1. Click Protection > Connections in the Navigation menu. The Connection Protection Requests Preview pane is displayed. 2. Select the cross-connect on which the command is to be issued.
4-28 Understanding the Protection Feature Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

3. Click the command to be issued.

Working with Timing Manager


Using Timing manager option, you can view the synchronization source details such as the synchronization source, priority, protection request, etc. and give external commands to the synchronization sources. Table below describes Timing Manager parameters.

Table 4-15. Timing Manager Parameters


Parameter Clock Source Priority Quality Level Clock status Lockout Request Protection Request Description Displays the name of the clock source. Displays the priority set for the clock source Defines quality of the timing reference to which the node is locked to. By default, Quality Level is set to INVALID. Displays the status of the clock source. Displays the lockout request. Displays the protection request.

The Synchronization Source external commands table describes parameters and the descriptions issued on synchronization sources.

Table 4-16. Synchronization Sources


Parameter Release Forced Switch Description Clears the previous external requests. The network element switches to the selected clock source on an external request for forced switch. The network element cannot be switched to other clock sources unless the external request is cleared. Forced switch has a higher priority over manual switch. The network element switches to the selected clock source on an external manual switch request. Locks the clock source so that the network element is not synchronized to the clock source. Clears the lock on the clock source so that the network element can be synchronized to the clock source.

Manual Switch Lockout Source Clear Lockout

Viewing Timing Manager Protection Request


To view Timing Manager protection request: 1. Select Protection in the Navigation menu 2. Click on Timing Manager.
Egate-2000 Ver. 1.0 Understanding the Protection Feature 4-29

Chapter 4 User Interface Guide

Installation and Operation Manual

The Timing manager protection request appears in the preview pane.

Executing External Command on a Synchronization Source


To execute external command on a synchronization source: 1. Select Protection in the Navigation menu. 2. Click on Timing Manager. The Timing manager protection request preview pane is displayed. 3. In the Select column, select the check box for the clock source on which the command is to be issued. 4. Click the command to be issued. The command is successfully issued on the clock source.

Adding Link Protection


Enabling protection on VCGs makes protected VCG admin down. To ensure data path availability after protection switchover, perform protection switchover of VCGs along with protection switchover of Ethernet Port. For more information on Link Protection Group (LPG) refer to L2 Services. To add link protection: 1. Click Protection > Link Protection Group. The View Link Protection Group preview pane is displayed. 2. Click Provision a new LinkProtectionGroup. The Provision New LinkProtectionGroup preview pane is displayed.

4-30

Understanding the Protection Feature

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-13. Provision New Link Protection Group


3. Select the desired parameters. 4. Click Create to provision the link protection. The table details the parameters of Provision New LinkProtectionGroup.

Table 4-17. Provision New LinkProtectionGroup


Parameter Work Card Work Card Ports Protect Card Protect Card Ports Description Allows you to select the work card. Allows you to select the work ports. The ports listed will be from the above selected Work Card Allows you to select the protect card. The card type will be same as work card Allows you to select the protect ports. The ports listed will be from the above selected protect card

Egate-2000 Ver. 1.0

Understanding the Protection Feature

4-31

Chapter 4 User Interface Guide Parameter Link Protection Type Description

Installation and Operation Manual

Allows you to select the protection type AdminDown for Ethernet ports. For VCG ports, by default AdminDown will be selected. Displays the external command provisioned for the destination traffic. Select the desired command: ext_cmd_none ext_cmd_clear ext_cmd_lockout ext_cmd_FS ext_cmd_MS_to_protect ext_cmd_MS_to_working

External Command

4.9

Working with the Configuration Menu

This chapter describes the Configuration menu in the WUI. Using the Configuration menu.

Managing MSP/APS Groups


Multiplex Section Protection (MSP)/Automatic Protection Switching (APS) is a port level protection supported on the STM-1/4/OC-3/12 interfaces. The 1+1 protection scheme uses a complete duplication of services and implies that two identical lines are active at the same time (both working and protection lines are transmitting the same signal) allowing for a transparent switch from the working to the protection line. In other words, the traffic is permanently bridged on both the working and protection lines. The MSP/APS groups can be configured as 1WAY or 2WAY. MSP/APS protection switching can be initiated in the event if a fault or alarm in the SDH/SONET port in the network element or by user initiated switching commands. Protection switching can be configured either in revertive or non-revertive mode. In revertive mode, traffic switches back to the work channel once the fault condition has cleared, after the Wait To Restore (WTR) period has elapsed. In non-revertive mode, traffic remains on the protect channel and does not automatically switch back to the work channel when the fault condition has cleared. Table below lists the maximum number of connections supported in the MSP/APS configuration.

4-32

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-18. MSP/APS


Capacity Maximum number of connections for STM1/OC-3 84 63 3 1 Maximum number of connections for STM-4/OC-12 336 252 12 4 Maximum number of connections for STM -16/OC-48 1344 1008 48 16

VC 11/VT1.5 VC12/VT2 VC3/STS1 VC4/STS3c

Note

The local and remote network element must be provisioned with the same protection configuration. Configure the MSP/APS group before creating the desired cross-connects on the working port. MSP/APS configuration is applicable to STM-1/4 and OC-3/12 ports. The number of MSP/APS provisioned depends on the availability of optical ports. One MSP/APS protection group can be provisioned for every two optical ports in a network element.
Automatic protection switches are initiated by the network element and are triggered by signal fail and degrade conditions. Using MSP/APS group menu you can: view configured MSP/APS groups provision a new MSP/APS group edit MSP/APS groups delete MSP/APS groups

Note

Viewing MSP/APS Groups


To view MSP/APS groups: 1. Click Configuration. The sub menu items are listed. 2. Click MSP/APS groups. The View MSP/APS groups page is displayed. Table below describes the fields on the View MSP/APS groups page.

Table 4-19. MSP/APS groups


Field Name Description Displays the name of the MSP/APS group as a link. On clicking the link, the Protection provisioning page is displayed. Displays the channel configured to carry the traffic under normal working conditions.

Working port

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-33

Chapter 4 User Interface Guide Field Protection port Reversion Mode Description

Installation and Operation Manual

Displays the channel configured to carry the traffic under protected (failure of work channel) conditions. Revertive: This mode enables automatic switching to work channel from protect channel, once the fault on work channel is fixed. Non-Revertive: In this mode, traffic has to be manually switched from protect to work channel. Until traffic is manually switched back to work channel, traffic is carried on protect channel.

WTR Time (Wait to restore time)

Select a time interval (in minutes) after which the traffic must switch back to work channel on rectification of work channel, when admin reversion mode is set to revertive. Displays the active channel in which traffic is being currently carried. 1WAY: Only the Head end network element's receiver switches to the alternate receiver on receiving an alarm. 2WAY: Both the head end and tail end network element's receiver switches to the alternate receiver on receiving an alarm.

Current status Protection switching mode

Delete

Allows you to delete an MSP/APS group.

Provisioning MSP/APS Group


To provision MSP/APS group: 1. Click Configuration in the Main menu. The sub menu items are listed. 2. Click MSP/APS groups in the submenu. The View MSP/APS groups page is displayed. 3. Click Create MSP/APS group link in the View MSP/APS groups page. The Provision port protection page is displayed. 4. Select appropriate values and click Submit to create the MSP/APS group. A confirmation page is displayed on clicking Submit. 5. Click Yes. A Successfully Provisioned message is displayed.

Note

MSP/APS on VC12 management channel is not supported for all the products. On failure of work channel, VC12 management channel goes down and comes up only on restoring the work channel.
Table below gives the configurable MSP/APS protection group parameters with their default and acceptable values.

4-34

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-20. MSP/APS Protection Group Parameters


Parameter Working port Default Value STM1-1-N-1/ OC3-1-3-1 Acceptable Value STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2

(where N is the slot number in which the card is placed.) Protection port STM1-1-N-2/ OC3-1-3-2 STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2

(where N is the slot number in which the card is placed.) Protection Mode Admin Reversion Mode 1+1 Non-Revertive 1+1 WTRTime (minutes) Protection Switching mode 5 1 Way Non-Revertive Revertive

1 - 12 (See Note 2) 1 Way 2 Way Disable Enable

Route Diversity

Disable

Note

The WTR Time is applicable and provisionable only if the reversion mode is set to revertive. The default value for the work port is the first available port (in the ascending order either STM-1/OC-3 or STM-4/OC-12 interface).
The default value for the protect port will be the first available port, depending upon the type of interface chosen in the work port.

Note

Note

Editing MSP/APS Group


To edit MSP/APS group: 1. Click Configuration. The sub menu items are listed. 2. Click MSP/APS groups. The View MSP/APS groups page is displayed. 3. Click MSP/APS group link in the Name column. The Protection provisioning page is displayed.
Egate-2000 Ver. 1.0 Working with the Configuration Menu 4-35

Chapter 4 User Interface Guide

Installation and Operation Manual

4. Select suitable values for the editable parameters. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A Successfully Modified message is displayed.

Deleting MSP/APS groups


The MSP/APS group can be deleted only if there are no cross-connects or In Band Communication (IBC) interfaces (F2, F3 and F2F3) provisioned on the ports which make up the MSP/APS group. To delete a provisioned MSP/APS group, 1. Click Configuration. The sub menu items are listed. 2. Click MSP/APS groups. The View MSP/APS groups page is displayed. 3. Select the check box in the delete column of the MSP/APS group to be deleted. 4. Click Submit. A confirmation page is displayed. 5. Click Yes. A Successfully Deleted message is displayed.

Managing Cross-connect
The Cross-connect option enables you to create cross-connects in a network element and provision 1WAY, 2WAY, protected or unprotected cross-connects of different capacities.

4-36

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-14. Managing Cross Connect


The numbering scheme used here is as follows: VC/VT capacity-Chassis-Slot-Port-TUG3/STS # (K) - TUG2/VT (L) - VC12/VT # (M). TU capacity Chassis-Slot-Port-AU # - TU-Group- TU#.

The different type of cross-connects that can be configured are: Add Drop Add-drop Pass-through Hairpin

The cross-connects can be created on Ethernet and STM-1/4/OC-3/12 interfaces. The cross-connect can be 1-WAY or 2-WAY. Using the Cross-connect menu you can perform functions like Filter cross-connects Add cross-connects Edit a cross-connect Delete a cross-connect Edit VCG

The Cross-connects table describes the cross-connect parameters.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-37

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-21. Cross-Connect Parameters


Parameter Capacity Card Default Value All Description Capacity of the cross-connect to be filtered. Lists all cross-connect cards present in the network element. Select the card for which you want to see the provisioned crossconnects. The interface number on which the crossconnects are to be filtered. The AU4/STS-3c number The TUG3 number The TUG2 number The TU number

Port Number STM No/OCn K/STS# L (Group) #/VT M (VC number)#/VT#

All All All All All

Provisioning Cross-connects
Number of Connections 1 The number of cross-connects that need to be created. The capacity of the cross-connect. Acceptable values: Capacity VC12/VT2 VC11/VT1.5 VC12/VT2 VC3/STS1 VC4/STS3C VC4_4c/STS12C

Circuit Identifier

The name given for the cross-connect. The name can be a set of alphanumeric characters up to a maximum of 40 characters. Space and special characters such as '-' or '_' are allowed. The direction of the data flow in the crossconnect. Acceptable values: 1WAY 2WAY

Directionality

2 WAY

Working Source Port Working Destination Port Working Source STM No. Working Destination STM No.

The source port for work channel. All the available ports. The source port for the destination channel. All the available ports. The STM number at the source and destination of the work channel. Acceptable values range between 1 and STM4.

4-38

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Working Source Node ID Working Destination Node ID Default Value Description

Chapter 4 User Interface Guide

The Node ID of the traffic source. The Node ID of the traffic destination. Parameter to enable or disable source protection.

Source Protection Destination Protection

Disable

Enable: The protection path is enabled at the source/destination. Disable: The protection path is disabled at the source/destination.

Protection Source Port Protection Destination Port Protection Source STM No. Protection Destination STM No. K/STS L/VT M/VT

1 1 1 1

The source and the destination port for the protection channel. The STM number, at the source and destination for the protection channel. The TUG3 number. Acceptable values range between 1 to 3. The TUG2 number. Acceptable values range between 1 to 7. The TU number. Acceptable values range between 1 to 3 for VC12/VT2 and 1 - 4 for VC11/VT1.5.

Reversion Mode Parameters


The reversion mode of the protection at source. Source Port Revertive Non-revertive Revertive: The traffic is automatically switched to the work path from the protect path after the fault in the work path is rectified. Non-Revertive: The traffic has to be manually switched to the work path from the protect path after the fault in the work path is rectified.

Source WTR Time Destination Port Revertive

5 Non-revertive

1 to 12 minutes The reversion mode of the protection at destination. Revertive: The traffic is automatically switched to the work path from the protect path after the fault in the work path is rectified. Non-revertive: The traffic has to be manually switched to the work path from the protect path after the fault in the work path is rectified.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-39

Chapter 4 User Interface Guide Parameter Destination Wait-to-Restore Time (minutes) or Destination WTR Time Default Value 5

Installation and Operation Manual Description 1 to 12 minutes

Filtering Cross-Connects
When you click on the Filter button, it filters cross-connect based on the selected criteria for capacity, card, port number, etc. The filtered results are displayed in the Cross connects section of the Configure Cross-connects preview pane. The Select all button when clicked selects all the filtered cross-connects. The Deselect all button when clicked de-selects all the selected cross-connects. To filter cross-connects: 1. Click Configuration > Cross-connects. 2. Select criteria for filtering in the Filter Cross-connects section. 3. Click Filter.

Adding Cross-connects
To add cross-connects: 1. Click Configuration > Cross-connects. 2. Click the Add Cross-connect link. 3. Select the desired source and destination port. 4. Click Submit. A confirmation window is displayed. 5. Click Yes. A message "Successfully Added Cross-Connect" is displayed.

Editing Cross-connects
To edit cross-connects: 1. Click Configuration > Cross-connects in the Navigation menu. 2. Click the entry to be edited. The entry preview pane is displayed. Click the Edit link Or click the edit link in the Edit column for the entry to be updated. 3. Edit required values referring to Cross-connects parameters table. 4. Click Submit. 5. Click Accept Valid Modifications.

Deleting Cross-connects
To delete cross-connects: 1. Click Configuration > Cross-connects in the Navigation menu. 2. In the delete field, select the check box for the entries to be deleted.
4-40 Working with the Configuration Menu Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

3. Click Delete. 4. Click Confirm Delete.

Note

A maximum of 63 cross-connections can be deleted at once.

Managing Overhead Tunnel


Overhead Tunnel is a feature to pass through overhead bytes transparently between east and west fibers. Overhead tunnelling between two STM/OC ports of a Node (sandwiched between two other Nodes) can be created to bypass the management information carried between other Nodes using DCC_R/DCC_M/F1/E1/E2 bytes, without processing these bytes.

Note

Bytes used for In-band communication and orderwire cannot be used for configuring overhead tunnel.
Using Overhead tunnel menu, you can: View configured overhead tunnels Create new overhead tunnels Delete overhead tunnels

The following table describes the Overhead Tunnel parameters:

Table 4-22. Overhead Tunnel Parameteres


Parameter Tunnel Name Default Value Description The Tunnel name. The Tunnel name is a combination of the source and destination ports. This field is not configurable and the name is assigned on its own. The Source STM port. Acceptable values include all the available STM/OCn ports. The Destination STM port. Acceptable values include all the available STM/OCn ports. The overhead byte that is tunneled. Acceptable values include E1, E2, F1, DCC_R and DCC_M.

Source Port or Source Port Name

STM1-1-N-1/OC3-1

Destination Port or Destination Port Name

STM1-1-N-1/OC3-1

Overhead Byte

E1

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-41

Chapter 4 User Interface Guide

Installation and Operation Manual

Viewing Overhead Tunnels


To view provisioned overhead tunnels, click Configuration > Overhead tunnel in the Navigation menu. The Configure overhead tunnels preview pane lists the overhead tunnels configured on the network element.

Provisioning Overhead Tunnels


To provision overhead tunnel: 1. Click Configuration > Overhead tunnel in the navigation menu. 2. Click the Create Overhead tunnel link. 3. Select desired values. 4. Click Submit. 5. Click Yes.

Note

You can provision a maximum of 30 overhead bytes for overhead tunneling.

Overhead Tunnels
To delete overhead tunnel: 1. Click Configuration > Overhead tunnel in the Navigation menu. 2. In the delete field, select the check box for the entries to be deleted. 3. Click Delete. 4. Click Confirm Delete.

Provisioning Environmental Alarm Input


The network element is configured for customized environmental conditions such as power or air conditioning failure, equipment room door open and so on. The string entered in the Environmental Alarm field defines the alarm. The alarm is reported when the defined environmental condition is detected. To provision environmental alarms, 1. Click Configuration > Environmental alarm input in the Navigation menu. The Configure environmental alarms preview pane is displayed. 2. Enter the string with which the alarms have to be identified in the Environmental Alarm fields. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Yes. A "Successfully Created" message is displayed.

Note

The Environmental alarm can be a set of alphanumeric characters. The maximum number of characters allowed is 40.

4-42

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Configuring SNMP Traps


Simple Network Management Protocol (SNMP) is a set of protocols for managing complex networks. SNMP is an application-layer protocol that allows network devices to exchange management information. SNMP allows network administrator to find and interpret network problems and plan network growth. The SNMP is designed to provide asynchronous event notification to a Network Management System (NMS).

Figure 4-15. Provisioning SNMP Traps


SNMP trap is an SNMP application that uses the SNMP trap operation to send information to a network manager. Traps are sent when errors or specific events occur on the network. You can configure the SNMP traps from the Configuration menu. Table below describes the parameters associated with SNMP Trap.

Table 4-23. SNMP Trap Parameters


Parameter IP Address Port SNMP Version Default 162 SNMP_V1 Description Acceptable values range from 0.0.0.0 225.225.225.224. The port used in SNMP. The value cannot be changed. The SNMP version being used. Acceptable values include SNMP_V1 and SNMP_V2.

To configure SNMP traps: 1. Click Configure > SNMP traps in the Navigation menu. The SNMP trap destination IP addresses preview pane is displayed. 2. Enter the IP Address, Port and select the SNMP Version. 3. Click Submit. A Modify SNMP trap destination IP addresses preview pane is displayed.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-43

Chapter 4 User Interface Guide

Installation and Operation Manual

Managing Facilities
Using the the Facilities option, you can check, view, or edit the attributes of Optical ports, PDH ports, Ethernet ports, and VCG ports.

Figure 4-16. Managing Facilities

Managing STM/OC Interfaces


The STM/OCn Interface table describes the parameters, default value, and description.

Table 4-24. STM/OCn Interface


Parameters
Admin Status

Default Value
Up

Description
The administrative status of the port. Up: Sets the interfaces in service. Down: Sets the interfaces out of service.

Alarm Reporting Status

Report

The alarm reporting status. Report: Enables reporting of alarms on STM/OCn port. No-Report: Disables reporting of alarms on STM/OCn port.

STM/OCn Port Profile Line Coding Laser

Internal-NNI -

The STM/OCn port profile. The type of line coding being used (NRZ coding). This field is not configurable. The Laser being used. Click the link to view the Laser provisioning page.

4-44

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Parameters
ECC Byte Selection

Default Value
-

Description
The established Embedded Communication Channel (field is not configurable): ecc_DCC_M ecc_DCC_R ecc_F1 ecc_F2 ecc_F3 ecc_F2F3

Transmit J0

The section trace message is transmitted with Maximum length as specified by the Transmit J0 Length, padded with spaces for strings less than specified length. The length of the section trace is transmitted with values ranging between 1 to 16. The expected received section trace value. The length of expected received section trace with values ranging between 1 to 16. The received Section trace message. TIM Action settings control handling of mismatches between received and expected trace messages. tim_report: Reports alarm traffic affecting, on trace identifier mismatch. tim_ignore: Reports no action on trace identifier mismatch. tim_downstream_ais: Reports alarm indication signal (AIS) downstream (traffic affecting), on trace identifier mismatch.

Transmit J0 Length

16

Expected J0 Expected J0 Length Received J0

16 -

TIM Action

tim-ignore

TIM Action

tim-ignore

tim_report: Reports alarm traffic affecting, on trace identifier mismatch. tim_ignore: Reports no action on trace identifier mismatch. tim_downstream_ais: Reports alarm indication signal (AIS) downstream (traffic affecting), on trace identifier mismatch.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-45

Chapter 4 User Interface Guide

Installation and Operation Manual

Parameters
Signal Fail BER Threshold (B2)

Default Value
Disable

Description
Parameter to enable or disable Signal Fail BER thresholds. Enable: Enables selecting the threshold, on crossing, which Signal Fail alarm is raised for errors detected by B2. Threshold range is between 10e-3 to 10e-5. Disable: Signal Fail BER Thresholds are disabled.

Signal Degrade BER Threshold (B2)

Disable

BER thresholds. Enable: Threshold on crossing, which Signal Degrade alarm is raised for errors detected B2. Threshold can be set in the range between 10e-5 to 10e-9. Disable: Signal Degrade BER Thresholds are disabled.

Threshold (for TCA-15 min)

Disable

Parameter to enable threshold crossing alerts (TCA) for 15-min duration. Enable: TCA is user configured for 15 minutes interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds are changed from the TCA Settings link on the same page. Disable: TCA are disabled. Default -Default values for the thresholds are used.

Threshold (for TCA-1 day)

Disable

Parameter to enable TCA for 1-day duration. Enable: TCA is user configured for 1 day interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds are changed from the TCA Settings link on the same page. Disable: TCA are disabled. Default: Default values for the thresholds are used.

Identifier

The name for the STM/OC port. The name can be a set of alphanumeric characters.

Note

Alarms are not reported by enabling B1 thresholds

Provisioning STM/OC Ports


To provision STM/OC ports: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed.
4-46 Working with the Configuration Menu Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

2. Click the desired STM/OC port link. The corresponding Provisioning Interface preview pane is displayed. 3. Select or enter values referring to the STM/OCn Interface Parameters table. 4. Click Create. A confirmation preview pane is displayed. 5. Click Yes. A "Successfully Created" message is displayed.

Enabling Threshold Crossing Alert (TCA) Settings


By default, the Threshold Crossing Alert (TCA) settings are not editable. To edit them, first enable the TCA settings.

Table 4-25. Name of Table


Parameter Default Value 15 min Threshold RS-ES Threshold RS-SES Threshold RSBBE/RSCV Threshold MS-ES Threshold MS-SES Threshold MSBBE/MSCV 114 10 27000 1 day 10944 960 2592000 Threshold for Errored SecondsRegenerator Section Threshold for Severely Errored SecondsRegenerator Section Threshold for Background Block Errors/Code Violations-Regenerator Section Threshold for Errored Seconds-Multiplex Section Threshold for Severely Errored SecondsMultiplex Section Threshold for Background Block Errors/Code Violations-Multiplex Section Description

114 10 27000

10944 960 2592000

To enable TCA settings for 15-minute interval or 1-day duration: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired STM/OC port. The Provisioning interface preview pane for that STM/OC port is displayed. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-47

Chapter 4 User Interface Guide

Installation and Operation Manual

Setting TCA Profiles


To set TCA profiles for 15-minute or 1-day duration: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired STM/OC port. The Provisioning interface preview pane for that STM/OC port is displayed. To enable Set TCA for 15-min duration, click TCA Settings for 15-min duration link. The TCA settings for 15-minute duration page are displayed. To Set TCA for 1-day duration, click TCA Settings for 1-day duration link. The TCA settings for 1-day duration page are displayed. 3. Enter the threshold values in the respective text fields. Click Submit. The confirmation preview pane is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Provisioning AUG/STS-N SPE


To provision AUG/STS-N SPE perform the steps given below: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AUG/STS-N SPE link. The Provision AUG/STS-N SPE preview pane is displayed. 3. Select the Mapping structure for the AUG/STS-N SPE from the drop-down menu. Selecting Disable for Mapping structure will disable mapping on the AUG/STS-N SPE. 4. Click Submit. A "Successfully Modified" message is displayed.

Note

In the MSP/APS configuration, the AUG/STS-N SPE parameters need to be provisioned only for the working STM-1/4/OC-3/12 port of the protection group. The provisioned values are automatically propagated to the protection port. The signal label field is provisionable, but should not be edited as it will be automatically assigned a value depending on the type of cross-connect provisioned. AUG/STS-N SPE can be provisioned only if all the cross-connects associated with that AUG/STS-N SPE are unprovisioned or deleted. Options available in the Mapping structure depend on the mapping selected while initializing the network element. Refer to the Installation and Commissioning Procedures manual of the corresponding product for more information.

Note

Note

Note

4-48

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Provisioning AU4/STS-3c/AU3/STS-1
AU4/STS-3c is only for STM/OCn capacity. To provision AU-4/STS-3c/AU3/STS1: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS1 link. The corresponding Provision preview pane is displayed. 3. Select/Enter values referring to the AU4/STS-3c/AU3/STS1 Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modification. A Successfully Modified message is displayed. The table below describes the parameters and default values for AU4/STS3C/AU3/STS-1.

Table 4-26. AU4/STS-3C/AU3/STS-1 Parameters


Parameter Signal Label Default Value Unequipped, if there are no cross-connects provisioned. Tug_structure, if the lower order path (VC-3, VC-12) is AU4/STS-3c mapped or if VC-11 and VC-12 is AU3/STS-1 mapped. Asynchronous_container4, if the higher order path (VC-4) is AU4/STS-3c mapped Tug_structure if the lower order path (VC12) is AU3/STS-1 mapped. Asynchronous_container3 if the higher order path (VC-3) is AU4/STS-3c/AU3/STS-1 mapped. Description The payload signal label. The acceptable values include: unequipped equipped_non_specific tug_structure locked_tu_n asynchronous_container3 asynchronous_container4 atm_mapping dqdb_mapping fddi_mapping hdlc_ppp sdl_sss hdlc_laps sdl_srs eth_10g gfp test_O181 vc_ais The signal Label field will be automatically assigned a value depending on the type of cross-connect provisioned.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-49

Chapter 4 User Interface Guide Parameter Received Signal Label Default Value -

Installation and Operation Manual Description The payload type or the Signal label received on the AU path. For example, tug_structure, asynchronous_container3, unequipped, etc. The message transmitted in the AU/STS on J1 byte. The trace message can be of 16 or 64 characters long. The length of the section path trace to be sent. The length can be 16 or 64. The Transmit Trace Length and Expected Trace Length must be the same. The path trace that is expected to be received on AU/STS path. The received message can be 16 or 64 characters long. The Transmit Trace Length and Expected Trace Length must be the same. The length of the section path trace that is expected to be received. The length can be 16 or 64. The AU/STS path trace that is received. Parameter to indicate the threshold for signal fail Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e3, 1e-4, 1e-5 and Disable. When Disable is selected, no threshold exists for the signal fail BERs and alarms are not raised.

Transmit Trace

abcdabcdabcdabc

Transmit Trace Length

16

Expected Trace

abcdabcdabcdabc

Expected Trace Length

16

Received Trace Signal Fail BER Threshold

1e-3

4-50

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Signal Degrade BER Threshold Default Value 1e-6

Chapter 4 User Interface Guide Description Parameter to indicate the threshold for signal degrade Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3 to 1e-9 and Disable. When Disable is selected, no threshold exists for the signal degrade BERs and alarms are not raised. Parameter to enable or disable reporting of alarms raised on the interface. Report: Alarms raised are reported. Disable: Alarms raised are not reported.

Alarm reporting status

Report

Connection Type

Allow both lower order and higher order connection

Parameter to select the type of cross-connects that can be created. Allow both Lower Order and Higher Order Connections: Both lower and higher order connections can be created Allow Only Lower Order Connections: Only lower order connections can be created In Use Higher Order Connection: Only higher order connections can be created.

Path alarm profile

Mask TIM

Parameter to assign the alarm profile for the Path. mask TIM suppress TIM mask all except LOP mask all

Editing AU4/STS-3c/AU3/STS-1 Performance Monitoring Parameters


To edit the Performance monitoring thresholds, set the corresponding Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM/OCn port preview pane. You can configure the following performance monitoring parameters: Errored Seconds Severely Errored Seconds

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-51

Chapter 4 User Interface Guide

Installation and Operation Manual

Background Block Errors

Table below describes the performance monitoring parameters associated with AU4/STS-3c/AU3/STS-1.

Table 4-27. AU4/STS-3c/AU3/STS-1


Parameter Default Value 15 min Threshold ES 180 1 day 17280 Threshold for Errored Seconds. Acceptable values are 0 to 900 for 15 min duration and 0 to 86400 for 1 day duration. Threshold for Errored Seconds. Acceptable values are 0 to 900 for 15 min duration and 0 to 86400 for 1 day duration. Threshold for Errored Seconds. Acceptable values are 0 to 65535 for 15 minutes duration and 0 to 6291360 for 1 day duration. Description

Threshold SES

15

1440

Threshold BBE/CV

1100

105600

To edit AU4/STS-3c/AU3/STS-1: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS-1 link. The corresponding Provision preview pane is displayed. 3. Click TCA Settings for 15-min duration link to edit TCA settings for 15-min duration, or click TCA Settings for 1-day duration link to edit TCA settings for 1day duration. The corresponding TCA settings page is displayed. 4. Enter values referring to the AU4/STS-3c/AU3/STS-1 Parameters table. 5. Click Submit. A confirmation preview pane is displayed. 6. Click Accept Valid Modifications. A Successfully Modified message is displayed.

Provisioning Tributary Units (TU/VT)


Tributary Units (TU/VT) can be provisioned only after TU/VT cross-connects are created. Only when TU/VT is acting as a protecting member for a connection, it is possible to retrieve or view the TU/VT parameters. The Transmit Trace and Expected Trace field are editable only for add/drop cross-connects. The Expected trace field is not editable for pass through cross-connects.

4-52

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

To provision TU/VT: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click on desired AU4/STS-3c. The Provision AU4/STS-3c preview pane is displayed. 3. Click the desired AU3/STS-1. The Provision AU3/STS-1 preview pane is displayed. 4. Click on the desired TU/VT link. The Provision TU/VT preview pane is displayed. 5. Select/Enter values referring to the TU/VT Parameters table. 6. Click Submit. A confirmation preview pane is displayed. 7. Click Accept Valid Modifications. A Successfully Modified message is displayed. Table below describes the TU/VT parameters.

Table 4-28. TU/VT parameters


Parameter Signal Label Default Value Unequipped when there are no crossconnects provisioned Description The payload signal label. Acceptable values: unequipped equipped_non_specific asynchronous bit_synchronous byte_synchronous test_O181 vc_ais extended

The value assigned depends on the cross-connect provisioned. The Signal Label field is made user provisionable to avoid the Signal Label Mismatch in case of connectivity between network elements of multi vendor networks.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-53

Chapter 4 User Interface Guide Parameter Extended Signal Label Default Value GFP for add drop Ethernet crossconnects

Installation and Operation Manual Description The payload type or the Signal label received on the TU path. Acceptable values: ATM HDLC_PPP HDLC_LAPS VCAT_TEST GFP

The value assigned depends on the cross-connect provisioned. The Extended Signal Label option is ignored for TU-3/STS-1 and TU12/VT-2 pass through crossconnects. Received Signal label The payload type or signal label received on the TU/VT path. For example, tug structured, asynchronous_container3. The path transmitted in the TU. The trace length is not editable and it can be 16 characters long. The length of the section path trace to be sent. The length can be 16 or 64 The path trace that is expected on the TU path. The trace message is not editable and it can be 16 characters long. The length of the expected section path trace. The Length can be 16 or 64. The TU/VT path trace that is received. Parameter to indicate the threshold for signal fail Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3, 1e4, 1e-5 and Disable. When Disable is selected, no threshold exists for the signal fail BERs and alarms are not raised.

Transmit Trace

TX_Unallocated

16 Transmit Trace Length Expected trace RX_Unallocated

16 Expected Trace Length Received Trace Signal Fail BER Threshold

1e-3

4-54

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Signal Degrade BER Threshold Default Value 1e-6

Chapter 4 User Interface Guide Description Parameter to indicate the threshold for signal degrade Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3 to 1e-9 and Disable. When Disable is selected, no threshold exists for the signal degrade BERs and alarms are not raised. Parameter to enable or disable reporting of alarms raised on the interface. Report: Alarms raised are reported. Disable: Alarms raised are not reported.

Alarm Reporting Status

Report

Path Alarm Profile

mask TIM

Parameter to assign the alarm profile for the Path. mask TIM suppress TIM mask all except LOP mask all TIM-new

Note

Presence of unprovisioned TU/VT on the far end network element leads to no VCAT overhead transmission. The alarm raised due to this consequence is Loss of VCAT multiframe on TU/VT. If the STM/OCn ports are provisioned in an MSP/APS configuration, select the TU/VT for the corresponding work port to edit the TU/VT parameters. The settings will be automatically propagated to the protection TU/VT.

Note

Configuring TU/VT Performance Monitoring Parameters


You can edit following TU/VT Performance Monitoring thresholds: Errored Seconds Severely Errored Seconds Background Blocked Errors

The TU/VT Performance Monitoring Parameters table describes the parameters, default value, description.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-55

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-29. Monitoring Parameters


Parameters Default Value 15 min Threshold ES 120 1 day 11520 Threshold for Errored Seconds. Acceptable values range between 0 to 900 for 15 min duration and 0 to 86400 for 1 day duration. Threshold for Errored Seconds. Acceptable values range between 0 to 900 for 15 min duration and 0 to 86400 for 1 day duration. Threshold for Errored Seconds. Acceptable values are 0 to 65535 for 15 min duration and 0 to 6291360 for 1 day duration. Description

Threshold SES

15

1440

Threshold BBE/CV

300

28800

Note

To configure the TU/VT Performance monitoring thresholds, enable the corresponding Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM/OCn port preview pane.
To edit the TU/VT performance monitoring thresholds for 15-minutes and 1-day duration: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS-1. The corresponding provisioning preview pane is displayed. 3. Click the desired TU/VT link. The Provision TU/VT preview pane is displayed. 4. Click TCA Settings for 15-min duration link to edit TCA settings for 15-min duration, or click TCA Settings for 1-day duration link to edit TCA settings for 1-day duration. The corresponding TCA settings page is displayed. 5. Enter values referring to the TU/VT Performance Monitoring Parameters table. 6. Click Submit. .A confirmation preview pane is displayed. 7. Click Accept Valid Modifications. A Successfully Modified message is displayed.

Provisioning PDH Ports


To provision PDH ports: 1. Click Configuration > Facilities > E1/DS1/E3/DS3 in the Navigation menu. 2. Click E1/DS1/E3/DS3 in the sub menu. The E1/DS1/E3/DS3 Interface configuration preview pane is displayed.

4-56

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

3. Click the desired E1/DS1/E3/DS3 port. The Provision interface preview pane is displayed. 4. Select/Enter values referring to the PDH Interface Parameters table. 5. Click Submit. A confirmation preview pane is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. Table below describes the PDH Interface Parameters.

Table 4-30. PDH Interface Parameters


Parameter Admin Status Default Value Down Description The administrative status of the PDH port. Alarm Reporting Status Report Up: Sets the port in service. Down: Sets the port out of service.

The alarm reporting status of the PDH port. Report: Reports alarms raised on the port. No-Report: Alarms raised at the port are not reported.

Threshold (for TCA 15min/24-hour)

Disable

Parameter to enable or disable TCAs for 15minutes/24-hour duration on the PDH ports. Enable: Enables configuring threshold level (for TCA-15minutes/ 1-day) for TCA. Disable: Disables threshold level for TCA-15 min/1-day. Default TCA Profile: The default TCA profile is assigned.

Identifier -

The identifier for the port. The identifier can be any alphanumeric string. This string can be used to search on list of port. The framing application being used.

Framing Application Framing Type Unframed

Unframed framed

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-57

Chapter 4 User Interface Guide Parameter Line build out type Default Value DSx_0_133ft (for DS1) DS3_0_225ft (for DS3)

Installation and Operation Manual Description The Line build out type. This parameter is not applicable for E1/E3 ports. For DS1: DSx_0_133ft DSx_133_266ft DSx_266_399ft DSx_399_533ft DSx_533_655ft For DS3: DS3_0_225ft DS3_225_450ft Enable: The E1 signal is reconstituted to the primary reference source performance specifications. Disable: The E1 signal is not reconstituted to the primary reference source performance specifications and hence the synchronization information is lost.

E1 Retiming

Enable

Viewing TCA Profiles for PDH Ports


To view TCA profiles for PDH ports: 1. Click Configuration > Facilities > E1/DS1/E3/DS3 in the Navigation menu. 2. Click E1/DS1/E3/DS3 in the sub menu. The E1/DS1/E3/DS3 Interface configuration preview pane is displayed. 3. Click the desired E1/DS1/E3/DS3 port. The Provision interface preview pane is displayed. 4. Click the View TCA Profiles link. The View TCA Profile preview pane is displayed.

Provisioning TCA Profile for PDH Ports


PDH TCA Profile Parameters table describes the TCA profile parameters. To provision TCA profile for PDH ports: 1. Click Configuration > Facilities > E1/DS1/E3/DS3 in the Navigation menu. 2. Click E1/DS1/E3/DS3 in the sub menu. The E1/DS1/E3/DS3 Interface configuration preview pane is displayed. 3. Click the desired E1/DS1/E3/DS3 port. The Provision interface preview pane for E1/DS1/E3/DS3 port is displayed. Click the View TCA Profiles link. The View TCA Profile preview pane is displayed.
4-58 Working with the Configuration Menu Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

4. Click the Provision a new TCA Profile link. The Provision New TCA Profile preview pane is displayed. 5. Enter values referring to the PDH TCA Profile Parameters table. 6. Click Create. A confirmation preview pane is displayed. 7. Click Yes. A "Successfully Created" message is displayed.

Deleting TCA Profile of a PDH Port


To delete TCA profile of a PDH port: 1. Click Configuration > Facilities > E1/DS1/E3/DS3 in the Navigation menu. 2. Click E1/DS1/E3/DS3 in the sub menu. The E1/DS1/E3/DS3 Interface configuration preview pane is displayed. 3. Click the desired E1/DS1/E3/DS3 port. The Provision interface preview pane for E1/DS1/E3/DS3 port is displayed. 4. Click the View TCA Profiles link. The View TCA Profile preview pane is displayed. 5. Select the check box in the Delete column for the TCA Profile to be deleted. 6. Click Delete. A confirmation preview pane is displayed. 7. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Managing Ethernet Interface


Table below describes the parameters for Ethernet Interface.

Table 4-31. Ethernet Interface


Parameter Admin Status Default Value Down Parameter Functional state of the port. Up: The port is functional and forwards traffic Down: The port is not functional and cannot forward traffic Alarm Reporting Status Report Reporting status of alarms raised on the port. Report: Alarms raised on the port are reported. No-Report: Alarms raised on the port are not reported.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-59

Chapter 4 User Interface Guide Parameter Link Status Default Value Up

Installation and Operation Manual Parameter Status of links originating from the port. The field is not configurable. Up: The link is up and is capable of forwarding traffic. Down: The link is down and is not capable of forwarding traffic

MTU Auto-negotiation

9600 Disable

Maximum size of a packet that can be sent through the interface. Indicates if information on traffic speed, communication mode etc is shared while establishing a link between the ports. Enable: Information on traffic speed, communication mode, etc., is shared while establishing a link. Disable: Information on traffic speed, communication mode, etc., is not shared while establishing a link.

Speed and Duplex

1000 Mbps, Full Duplex when link is Up and autonegotiation is enabled Complete 1000 Full for optical links Disable

The speed and Duplex mode of the port. The field is not editable. The status of auto-negotiation with the link partner. The capabilities of the link partner. Performance monitoring thresholds for 15 minute intervals. Enable: Allows thresholds for 15 minute intervals to be defined. Disable: Does not allow thresholds to be defined for 15 minute intervals.

Auto-Negotiation Status Link Partner Capabilities Threshold Enable for 15interval

Medium Type LAN Circuit Identifier

100 Base-TX -

Ethernet port type: 100 Base-Tx or 100 Base-Fx. Ethernet port name.

To provision Ethernet interface: 1. Click Configuration > Facilities > Ethernet in the Navigation menu. The Ethernet Interface configuration preview pane is displayed. 2. Click the Ethernet port to be provisioned. The Provision Ethernet Interface Port is displayed. 3. Select or enter values referring to the Ethernet Interface Physical parameter table. 4. Click Submit. A confirmation preview pane is displayed.

4-60

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Provisioning VCG Interface


To provision the VCG interface: 1. Click Configuration > Facilities > VCG in the navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Select/Enter values referring to VCG Parameters table. 5. Click Submit. A confirmation preview pane is displayed. 6. Click Yes. A "Successfully Modified" message is displayed. The table below describes the VCG parameters and default value.

Table 4-32. VCG parameters


Parameter Admin Status Default Value Down Description The administrative status of the VCG port. Up: Sets the port in service. Down: Sets the port out of service. Alarm Reporting Status Report The alarm reporting status of the VCG port. Report: Reports alarms raised on the port. No-Report: Alarms raised at the port are not reported. Alarm Reporting status for VCG is provisionable for ELAN card only. LCAS Support Enable Parameter to enable or disable LCAS support on the VCG port. Enable: Traffic is not disrupted when a cross-connect in one of the node is not functional. Disable: The entire VCG port goes down when a single cross-connect in the port is not functional.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-61

Chapter 4 User Interface Guide Parameter Framing Type Default Value GFP-F

Installation and Operation Manual Description The framing standards for Ethernet over SDH/SONET as chosen while configuring the ETH card. The acceptable values include GFP-F. The maximum difference delay allowed. The value is not configurable. The CRC type. The field is not configurable. CRC-16: Configures VCG for CRC-16 type. CRC-32: Configures VCG for CRC-32 type.

Max Diff Delay allowed CRC Type

63msc CRC-32

VCAT

Enable

Parameter to indicate if the VC Group is provisioned to enable or disable virtual concatenation (VCAT). Enable: VCAT is enabled. Disable: VCAT is disabled.

Operating Granularity

VC-12/VT2

Granularity of the signals as chosen while configuring the ETH card. Acceptable values include VC11/VT11 VC12/VT2 VC3/STS1 VC4/STS3c VCG_E1/VCG_DS1 VCG_E3 VCG_DS3

Payload FCS

Enable

Parameter to enable or disable adding FCS. Enable: Allows the addition of the payload FCS as specified in GFP. Disable: Does not allow the addition of payload FCS as specified in GFP. It is recommended to keep the Payload FCS enabled.

4-62

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Remove channels with SD Default Value Disable

Chapter 4 User Interface Guide Description Parameter to enable or disable removal of channels with SD from VCAT. Enable: Channels are removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels. Disable: Channels are not removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels.

Remove Channels with MND

Enable

Allows you to enable or disable the removal of channels with MND (member not deskewable). Allows you to enable or disable the IgnoreRDI. IgnoreRDI in LFE should be enabled when 8XETH/4X10/100BT + 4X100FXL1 card is present on one end of the link and any Ethernet card (transport/switch) is present on the other end of the link and the link is provisioned for the 1+1 APS unidirectional protection. The identifier for the VCG. The name can be a set of alphanumeric characters of maximum 40 characters including space.

IgnoreRDI in LFE

Disable

VCG Circuit Identifier

Number of Channels

The number of channels configured for the group. Parameter not configurable.

Managing VCG Interface


The Virtual Concatenation Group (VCG) is a logical entity/group of Virtual Containers (VCs) or (VT). Each Ethernet card has eight Ethernet ports and eight VCG ports, such that each VCG logically corresponds to one Ethernet port. The number of Ethernet and VCG port is dependent on the card configuration.

Viewing VC/VT Group


To view VC/VT group: 1. Click Configuration > Facilities > VCG in the navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Click View VC/VT Group.
Egate-2000 Ver. 1.0 Working with the Configuration Menu 4-63

Chapter 4 User Interface Guide

Installation and Operation Manual

The View VC Group preview pane is displayed. Table below describes VC/VT parameters:

Table 4-33. VC/VT parameters


Parameter
Number of Connections CrossConnect Parameters Circuit Identifier Source Destination Capacity Directionality Operational Status RAD The name assigned to the VCG. The VCG port selected as Source. The VCG port selected as Destination. The rate of the VCG association. The direction (2WAY or 1WAY) of data flow in the VCG association. The operating status (working/down) of the channel. The status of the destination port (work or protect). The STM/OCn channel (i.e., VCG, TU/VT values selected for the STM/OCn port) to which the destination switches on failure. The port on the working channel. The port on the protection channel. The STM number at the source and destination for the protection channel. The TUG3 number. Acceptable values include 1 - 3 The TUG2 number. Acceptable values include 1 - 7. The TU number. Acceptable values include 1 - 3 for VC12/VT2 and 1 -4 for VC11/VT1.5. The reversion mode for the channel (revertive or Non-revertive) The WTR value for the channel. Only provisionable in revertive mode Transmitted LCAS control value on the associated Tx channel. The transmitting member channel status. The transmitting member sequence number

Defaullt Value
-

Description
The number of identical cross-connections to be created.

Destination Protection Status Destination Protection

Working Port Protection Port STM #/OCn K (TUG 3)/STS# L (TUG 2)/VT M (VC number)/VT#

1 1 1 1

Reversion Mode WTR Tx Control Tx Channel MST Tx Seq

Revertive -

4-64

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Parameter
Rx Control Rx Channel MST Rx Seq Internal PDH Port ID

Defaullt Value
-

Description
The received LCAS control value on the associated Rx channel. The receiving member channel status. The receiving member sequence number Displays the PDH port ID based on the operating granularity selected for VCG (VCG_E1/VCG_E3/VCG_DS3) Displays the protect PDH port ID, the protect channel created for any (VCG_E1/VCG_E3/VCG_DS3).

Internal PDH port Protect ID -

Adding a VC/VT to VCG


To add a VC/VT to VCG,: 1. Click Configuration > Facilities > VCG in the navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Click the desired VCG. The corresponding Provisioning VCG Interface preview pane is displayed. 5. Click Add new VC/VT link. The Add VC to VCG preview pane is displayed. 6. Select values as described in the VC/VT Parameters table. 7. Click Submit. A confirmation preview pane is displayed. 8. Click Yes. A Successfully Created message is displayed.

Note

You can configure the protection feature in the revertive mode, to enable reversion of traffic from the protect fiber to the working fiber. This happens after a specified time (wait to restore time).

Provisioning Link Capacity Adjustment Scheme (LCAS)


LS is a technology that allows the adjustment of data capacity in real time without loss of data. It can be defined as an adjustment scheme that hitlessly increases or decreases the capacity of a container that is transported SDH/SONET network using VC. LCAS offers the ability to automatically fine tune the bandwidth based on Quality of Service (QoS), Bandwidth on demand, Load Balancing and Fault recovery mechanism.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-65

Chapter 4 User Interface Guide

Installation and Operation Manual

Note

LCAS support needs to be enabled or disabled at both the transmitter and receiver.
To provision LCAS: 1. Click Configuration > Facilities > VCG in the Navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Click View VC/VT Group. The View VC Group preview pane is displayed. 5. Click the Lcas link in the edit LCAS column for the VC you want to edit. The corresponding Provisioning VCG Association preview pane is displayed. 6. Select Add for Transmit LCAS provision to enable the LCAS support. Select Remove for Transmit LCAS provision to disable LCAS support. 7. Click Submit. A confirmation preview pane is displayed. 8. Click Accept Valid Modifications. A Successfully Modified message is displayed. Table below describes the LCAS parameters.

Table 4-34. LCAS Parameters


Parameter VCG Status Direction Transmit LCAS Provision (Milliseconds) Default Value Add Description The name of the VC Group to which the channel is associated. The status of the channel as either up or down. The direction of VC on VCG. Parameter to provision LCAS. Add: Allows sending the data on a particular channel which is already part of the VCG. Remove: Disables sending the data on a particular channel which is already part of the VCG. Transmit Sequence Number Received Sequence Number Differential Delay (msc) Tx MST (Tx Channel) Displays the transmitting member sequence number. Displays the receiving member sequence number Displays the difference allowed for delay in the frames. Displays the transmitting member channel status.

4-66

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Tx CTRL (Tx Channel) Rx MST (Rx Channel) Rx CTRL (Rx Channel) (minutes) Default Value Description

Chapter 4 User Interface Guide

Displays the Transmitted LCAS control value on the associated Tx channel. Displays the receiving member channel status. Displays the Received LCAS control value on the associated Rx channel.

Deleting VC/VT From VCG


To delete a VC/VT from VCG: 1. Click Configuration > Facilities > VCG in the navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Click the desired VCG. The corresponding Provisioning VCG Interface preview pane is displayed. 5. Click View VC Group. The View VC Group preview pane is displayed. 6. Select the VC to be deleted and disable the LCAS on the selected VC by clicking the Edit LCAS link. 7. Select the check box in the Delete column, for the VCG to be deleted. 8. Click Submit. A confirmation preview pane is displayed. 9. Click Confirm Delete. A Successfully Deleted message is displayed.

Managing and Configuring DCN


Data Communication Network(DCN) is an Embedded Communication Channel (ECC) on the element. It can be provisioned to act as an OSPF router for ECC in remote management. It can exchange and maintain the routing information on both the ECC and LAN to which it is connected using the NMS port. The network element processes the router information on the NMS port, if the OSPF Ethernet parameter is enabled. Similarly, the routing information on the Data Communication channel is processed. The network element has the capability to use either IP or OSI as Layer-3 protocol for routing the data communication packets from the element management system. DCN also supports overhead tunneling. Using overhead tunneling you can transfer transparently the overhead data belonging to a different network element across the STM 1/4/OC-3/12 ports. The network elements also support the remote management using the embedded
Egate-2000 Ver. 1.0 Working with the Configuration Menu 4-67

Chapter 4 User Interface Guide

Installation and Operation Manual

communication channel (ECC) to allow the remote EMS/NMS to communicate to the network element for OAM&P applications. The following are supported provisioning of ECC over the following bytes or sets of bytes: DCC-R/SDCC DCC-M/LDCC F1 F2 F3 F2F3

Each SDH/SONET frame includes two Embedded Communication Channels (ECC) called Regenerator Section/Section and Multiplex Section/Line ECC for transporting management messages between network elements and management systems. These in-band data communication channels enable service providers Operation Support Systems (OSS) to manage SDH/SONET network elements without the need for an expensive out-of-band data communication network. VC12/VT2 management channel can be used to transport management communications between network elements and management systems. These management channels enable service providers to manage SDH/SONET network elements without the need of expensive out-of-band data communications network.

Note

If the ECC_bytes are enabled on the STM-1/4/OC-3/12 port, then the corresponding bytes cannot be used for tunneling.
The Network interface feature gives a list of all the active Network Interfaces with their attributes. Using Network interface menu, you can View network interface configuration Edit network interface configuration Provision ECC Delete network interface configuration

Table below describes the network interface parameters.

4-68

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-35. Network Interface parameters


Parameter Network interface short name Association Admin status Default Value Up Description The label of the interface. The network interface name as used by the operating system. The administrative status of the interface. Up: Sets the port in service. Down: Sets the port out of service. Layer 3 Layer 3 Protocol IP Address MTU IP The IP address of the network element 1518 The Layer 3 protocol used for the interface. The IP address of the interface. The maximum size of the packet that can be sent through the interface. Acceptable values: 248 - 1518.

Layer 2 Layer 2 protocol PPP, HDLC Framing The Layer 2 protocol used for the interface. The available Layer 2 protocols are: PPP, HDLC Framing Standard PPP, RFC 1661 The Layer 2 Protocol is MAC and is not editable. Magic Number Enable Enable: The network element distinguishes the packets received from other network elements from the packets received from itself during loopback. Disable: The network element cannot distinguish the packets received form other network elements from packets received from itself. Magic number is editable only when Standard PPP, RFC 1661 is selected for Layer 2 Protocol. Magic number is not applicable for LAN. OSPF

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-69

Chapter 4 User Interface Guide Parameter OSPF Default Value Enable

Installation and Operation Manual Description Parameter to enable or disable OSPF. Enable: Enables OSPF on the network element. Disable: Disables OSPF on the network element.

Hello Interval (sec)

10

The time interval after which the network element sends Hello messages. Acceptable values range from 1 to 65535. The Router Dead Interval should be an integral multiple of Hello Interval.

Router Dead Interval (sec)

30

The maximum duration for which the network element waits for response for the hello packet sent by it to the neighboring network element. Acceptable values include: Disable Authentication: The hello packets received are not authenticated. Simple Password: The hello packets received are authenticated against the password or key provisioned in the network element.

OSPF Authentication Mode

Disable Authentication

OSPF Authentication

Applicable only when Simple password is selected for OSPF Authentication mode. The password can be a set of alphanumeric characters having a maximum length of 8 characters.

Password/Key

Viewing the Network Interfaces


To view provisioned network interfaces, click Configuration > DCN > Network interface in the Navigation menu. The Network interface configuration preview pane gives details on the existing network interfaces.

Editing network interfaces


To edit network interfaces: 1. Click Configuration > DCN > Network interface in the Navigation menu. The Network interface configuration preview pane is displayed.
4-70 Working with the Configuration Menu Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

2. Click the edit link in the Edit column for the entry to be updated. The Edit Network interface provisioning preview pane is displayed. 3. Edit required values referring to Network Interface Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Provisioning/Editing Embedded Communication Channel


Table below describes the parameters associated with Embedded Communication Channel (ECC).

Table 4-36. Embedded Communication Channel


Parameter Port Default Value STM1-N-1/OC3 Description The port used for the ECC. Acceptable values include: STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2

where N is the slot number in which the card is placed. ECC Byte Selection ecc_disable The byte used for the embedded communication channel. ECC Path ecc_disable ecc_F1 ecc_F2 ecc_F3 ecc_F2F3 ecc_DCC_R/ecc_SDCC ecc_DCC_M/ecc_LDCC

The AU-n/STS-n over which the ECC is carried.

To provision or edit embedded communication channels: 1. Click Configuration > DCN > Network interface in the Navigation menu. The Network interface configuration preview pane is displayed. 2. Click the Provision ECC link. The Provision ECC preview pane is displayed. 3. Select or enter values referring to the Embedded Communication Channel table.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-71

Chapter 4 User Interface Guide

Installation and Operation Manual

4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Provisioning Management Channel


Table below describes the management channel parameters.

Table 4-37. Management Channel Parameters.


Parameter
Management Channel Type

Default Value
-

Description
The type of the management channel. Available values include: E1 VC12

Unprovisioned SDH Path Port STM1-1-N-1 The STM port used for the management channel when VC12 is selected for Management Channel Type. Acceptable values include: STM1-1-N-M STM4-1-N-M

Where N is the slot number in which the card is placed and M the STM port number. STM No 1 The STM used for the Management channel. 1 when STM1 port is selected. 1-4 when STM4 port is selected. K L M 1 1 1 The TUG3 number. Acceptable values range from 1 to 3. The TUG2 number. Acceptable values range from 1 to 7. The TU number. Acceptable values range from 1 to 3.

To provision management channel: 1. Click Configuration > DCN > Network interface in the navigation menu. The Network interface configuration preview pane is displayed. 2. Click the Provision Management Channel link. The Management channel configuration preview pane is displayed. 3. Select or enter values referring to the Management Channel Parameters table. 4. Click Submit.

4-72

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Understanding OSPF
The Open Shortest Path First (OSPF) is an interior gateway routing protocol based on the shortest path first or link-state algorithm. Routers use link-state algorithms to send routing information to all nodes in an internetwork by calculating the shortest path to each node based on the topography of the internet constructed by each node. Each router sends that portion of the routing table (keeps track of routes to particular network destinations) that describes the state of its own links, and the complete routing structure (topography). The advantage of shortest-path first algorithms is that it results in smaller and more frequent updates everywhere. The converge is quick, thus preventing problems like routing loops and count-toinfinity (when routers continuously increment the hop count to a particular network) which results in a stable network. The OSPF feature enables monitoring neighbors of a network element and debugging the routing information for In Band Communication (IBC). The OSPF parameters can be configured for all embedded control channel interfaces and for the LAN port to enable routing between these interfaces. OSPF as a routing algorithm is used to route IP packets through the shortest path. For this to happen, the routers need to properly establish the adjacency and then exchange their routing database with each other. OSPF authentication is used to avoid any malicious intentions of establishing adjacency, thereby avoiding any malicious intentions of knowing routing database of a network. The password configured in OSPF authentication mode is sent in OSPF packets. This is used to establish adjacency where the same password needs to be configured on both interfaces connected to each other. OSPF network can be divided into sub-sections called areas. An area is a group of OSPF networks, routers and links that have the same area identification. It helps in reducing the size of the router database, as router only possesses information about network topology that is within the area. The default area parameter is 0.0.0.1. Any valid IP address is an acceptable area parameter.

Configuring OSPF Area


To configure OSPF area: 6. Click Configuration > DCN > OSPF in the Navigation menu. The OSPF parameters configuration preview pane is displayed. 7. Enter relevant value for the Area text field. 8. Click Submit. A confirmation preview pane is displayed. 9. Click Yes. A "Successfully Created" message is displayed.
Egate-2000 Ver. 1.0 Working with the Configuration Menu 4-73

Chapter 4 User Interface Guide

Installation and Operation Manual

Note

The default OSPF area 0.0.0.1 is the area address of the backbone. Changing the OSPF area may cause a loss of communication to the network element.

Disabling OSPF Area


To disable OSPF area,: 1. Click Configuration > DCN > Network Interface in the Navigation menu. The Network interface configuration preview pane is displayed. 2. Click the edit link for the interface you want to edit. The Edit Network Interface Provisioning preview pane is displayed. 3. Select Disable for OSPF. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Caution Changing OSPF area may cause a loss of communication to the network element.

Understanding Static Route


Static route is an entry in network element routing table that specifies how to reach an IP address through a particular gateway (network element or Interface). Static routes are used to provide static connectivity between routers, meaning the routes do not change automatically unlike routing protocols. A static route allows the user to access a network element in any network by adding a destination network IP address and the IP address of next hop network element. Thus a user can establish a link.

Note

Any invalid static route added on a point to point interface is added in the WUI but is not added in the Kernel routing table. Any invalid static route added on a broadcast interface (eth) is blocked. The next hop IP Address has to be specified only when the static route is provisioned on eth0. If it is ecc interface, the Next Hop IP Address need not be specified. If the address is not specified or is invalid for eth0 interface, an error message is displayed on submit. For a redundant system, only one port is available for provisioning. Hence, for STM1/OC-3 and STM4/OC-12 redundant mode, ports STM4-1-N-2/OC12-1-N-2 are not available for provisioning.
Using Static Route menu, you can: View all the configured static routes Add a new static route Delete static routes

Note Note

4-74

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table below describe Static route parameters and their default value..

Table 4-38. Static Route Parameters


Parameter Destination Network IP Address Default Value Description The IP Address of the destination. Acceptable values range from 0.0.0.0 to 255.255.255.255. The Netmask (in number of bits) to be applied to Destination Network IP Address to determine the network for which this route is added. The mask length can range from 0 to 32. The IP address of the next hop element. Acceptable values range from 0.0.0.0 to 255.255.255.255. Parameter to enable or disable advertising the route. If enabled, the route is advertised to the neighboring network element. The name of the network interface for which the static route is added. This field is not configurable.

Destination Network Address Mask Length

Next Hop IP Address

Advertise Route

Disable

Network Interface

Viewing Static Routes


To view provisioned static routes, click Configuration > DCN > Static route in the Navigation menu. The Static routes configuration preview pane is displayed.

Adding Static Routes


To add the same static route on the Remote NE which is present on any other node in the network and advertised with OSPF, make the route advertised so that OSPF can manage the routing table properly. To add a static route: 1. Click Configuration > DCN > Static route in the Navigation menu. The Static routes configuration preview pane is displayed. 2. Click the Add a new Static Route link. The Creating Static Route is displayed. 3. Select or enter values referring to the Static Route Parameters table. 4. Click Submit. A "Successfully Created" message is displayed.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-75

Chapter 4 User Interface Guide

Installation and Operation Manual

Deleting a Static Route


To delete a static route: 1. Click Configuration > DCN > Static route in the Navigation menu. The Static routes configuration preview pane is displayed. 2. Select the check box in the Delete field for the static route to be deleted. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Managing Proxy ARP Neighbor


The Proxy ARP allows a gateway network element to respond to Address Resolution Protocol (ARP) requests for sub tending network elements that are within the same subnetwork as the customer DCN address range. The proxy ARP feature removes the need for customers to provision static routes on their routers and routing protocols (OSPF) between the gateway network elements and the customer DCN.

Note

The user has to manually add all the IP addresses of the network elements for which the network element has to respond. The network element sends a proxy ARP response for all ARP requests that contain the IP address of an added network element (regardless of whether that IP address is reachable or not from the network element).
The network element software supports viewing and adding of proxy ARP neighbors. Table below describes the parameters and default value for Proxy ARP Neighbor.

Table 4-39. Proxy ARP Neighbor


Parameters Neighbour network IP Address Default Value Description The IP address of the neighboring network element. Acceptable values range from 0.0.0.0 to 25.255.255.254. The interface of the neighboring network element. LAN-1-6 (Eth0) is the currently supported interface. The IP address of the destination network. Acceptable value includes any valid IP address of a network element in the same subnet that is reachable from the gateway network element.

NetInterfaceRef or Network Interface

LAN-1-6 (Eth0)

Destination Network IP Address

Using Proxy ARP Neighbours menu, you can: View all the proxy ARP neighbors

4-76

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Add new proxy ARP neighbors Delete proxy ARP neighbors

Viewing Proxy ARP Neighbors Configuration


To view provisioned proxy ARP neighbors, click Configuration > DCN > Proxy ARP Neighbor in the navigation menu. The Proxy ARP Neighbors configuration preview pane is displayed.

Adding a Proxy ARP Neighbor


To provision proxy ARP neighbor: 1. Click Configuration > DCN > Proxy ARP Neighbour in the Navigation menu. The Proxy ARP Neighbors configuration preview pane is displayed. 2. Click the Add a new Proxy ARP Neighbour link. The Creating Proxy ARP Neigbhour is displayed. 3. Select or enter values referring to Proxy ARP Neighbour Parameters table. 4. Click Submit. A "Successfully Created" message is displayed.

Note

The maximum number of Proxy Address Resolution Protocol (ARP) entries supported is 50. Ensure that the router ARP timers are set to less than 10 minutes to limit the DCN outage to 10 minutes.

Note

Deleting a Proxy ARP Neighbor


To delete proxy ARP neighbor: 1. Click Configuration > DCN > Proxy ARP Neighbor in the Navigation menu. The Proxy ARP Neighbors configuration preview pane is displayed. 2. In the delete field, select the check box for the entries to be deleted. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Confirm Delete. 5. A "Successfully Deleted" message is displayed.

Note

In the absence of static route, deleting Proxy ARP neighbours will result in loss of communication to the remote network elements.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-77

Chapter 4 User Interface Guide

Installation and Operation Manual

Working with the Serial Port


Serial port enables serial communication between two network elements. Once properly configured, the serial port can send and receive data. The network element utilizes serial ports as: User Data Channel (UDC) Point-to-Point Protocol (PPP)

For UDC application, overhead byte F1 is used for data communication purpose. Serial communication requires that you specify the transmission baud rate and application. PPP is used for modem application. The modem facility provides a serial point-to-point connectivity using PPP protocol and is terminated on IP. Table below describes the parameters associated with Serial port.

Table 4-40. Serial Port Parameters


Parameter STM/OC port Default Value STM1-1-N Description STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2

where N is the slot number in which the STM-1/4/OC3/12 cards are present. AUG AUG/STS3-1 The AUG involved in the serial port communication. Acceptable values include: AUG/STS3-1-N-1-1-1 AUG/STS3-1-N-1-2-1 AUG-/STS3-1-N-1-3-1 AUG-/STS3-1-N-1-4-1 AUG/STS3-1-N-1-3-1 AUG/STS3-1-N-1-4-1 AUG/STS3-1-N-1-1 to AUG/STS3-1

where N is the slot in which the STM/OC card is present. AU AUG/STS3-1 The AU involved in the serial port communication. Acceptable values include: AUG/STS3-1-N-1-1-1 AUG/STS3-1-N-1-2-1 AUG-/STS3-1-N-1-3-1 AUG-/STS3-1-N-1-4-1 AUG/STS3-1-N-1-1 to AUG/STS3-1

where N is the slot in which the STM/OC card is present. AUG/STS3-1-N-1-2-1, AUG/STS3-1-N-1-3-1, AUG/STS3-1N-1-4-1 are available only if the network element is working with STM-4/OC-12 capacity.

Note

When Login is selected for Application, the supported Baud Rate is 9600.
Egate-2000 Ver. 1.0

4-78

Working with the Configuration Menu

Installation and Operation Manual

Chapter 4 User Interface Guide

Note Note

The UDC application does not allow you to set the data rate for the baud rates listed. The Baud Rate is fixed at 9600.

A PPP connection between the network element M1F1 port and a PC is not possible without a modem.
Using Serial port menu, you can view and edit serial port configuration.

Viewing Serial Port Information


To view serial port information, click Configuration > DCN > Serial port in the Navigation menu. The Serial port configuration preview pane is displayed.

Editing Serial Port


To edit serial port: 1. Click Configuration > DCN > Serial port in the Navigation menu. The Serial port configuration preview pane is displayed. 2. Click the edit link in the Edit column for the port to be updated. The Serial port configuration preview pane is displayed. 3. Edit required values referring to the Serial Port Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Synchronizing Network Element


The Synchronization feature provides the timing and synchronization management functionality for the network element. All the SDH/SONET network elements in a network are synchronized to the same highly accurate clock called the Primary Reference Clock (PRC). PDH signals can be transported on an SDH/SONET frame, but they are multiplexed independently of the SDH/SONET timing. The frequency of the primary reference clock is passed on to the network elements through the traffic signal or through any external means like Global Positioning System (GPS) or via the Building Integrated Timing System (BITS). The BITS clock input/output is at 2.048MHz and can be nominated as a reference for node synchronization. Loss-of-Signal (LOS) is detected on the clock input and this alarm is used as a trigger to change over to the next synchronization reference. The timing Synchronization sources depend on: User or automatic timing protection switch requests in the network element Validity of the nominated sources (synchronization status values)

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-79

Chapter 4 User Interface Guide

Installation and Operation Manual

Priorities assigned to the source (user provisionable) Quality of the available signal on the nominated source (ppm offset less than or equal to +/- 9 ppm)

Viewing and Editing the Synchronization Status


The Synchronization state preview pane displays the synchronization state of the network element. The SSM timing alarms are displayed in the lower portion of the Synchronization status preview pane. The SSM timing alarms are automatically refreshed for every two seconds. To edit the synchronization status: 1. Click Configuration > Synchronization > Synchronization status in the navigation menu. The Synchronization state preview pane is displayed. 2. Enter/Select required values referring to the Synchronization State Parameters table. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Accept Valid Modifications. 5. A "Successfully Modified" message is displayed.

Table 4-41. Synchronization Status


Parameters
Application Baud Rate Admin Status

Default Value
Unprovision Application 9600 Down

Description
The application running on the serial interface. The operating rate of serial interface. The administrative status of the Serial port. Up: The port is in service Down: The port is out of service.

PPP Application IP Address IP address of the network element The IP address of the network element. Acceptable values range between 000.000.000.000 to 255.255.255.254. The maximum data unit that can be received. Acceptable values range from 128 to 1500. The maximum data unit that can be transmitted. Acceptable values range from 128 to 1500.

Max Receive unit

1500

Max Transmit unit

1280

4-80

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Parameters
UDC Application Overhead Byte

Default Value

Description

F1

The overhead byte used for serial port communication: F1

STM/OC port

STM1-1-N

STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2

where N is the slot number in which the STM-1/4/OC-3/12 cards are present.

Table below describes the Synchronization state parameters.

Table 4-42. Synchronization State Parameters


Parameter QL Mode Default Value Disabled Description Parameter to base the clock selection. Disabled: The clock is selected based on the priority assigned. Enabled: The clock is selected based on its quality and priority. Output QL Mode Manual Parameter to set the quality of the clock output. Auto: The output clock is the same as the source clock that is locked, provided QL Mode is enabled. Manual: Quality of output clock can be set manually. Manual should be selected for Output QL mode when QL Mode is disabled. Reversion Mode Manual Parameter to decide the clock switch mode in case of failure. Auto: The switching of the clock happens automatically. Manual: The switching of the clock has to be selected manually. WTRTime (minutes) 5 The time the clock takes to switch to previously locked clock when it is restored from failure. Acceptable values range from 0 - 12 minutes. Changes made to the WTR will not impact clocks that are already in WTR. The changes to the clocks will be applied on the next switch.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-81

Chapter 4 User Interface Guide Parameter Node output quality level Default Value DNU Description

Installation and Operation Manual

The quality of clock output. This parameter is editable only if the Output QL mode is set to Manual. Acceptable values include: PRC SSU_A SSU_B SEC DNU INVALID

Node minimum quality level

DNU

The minimum quality level expected by the network element to lock to a particular clock. If the clock does not have the QL as expected, then the BITS clock output will be squelched. Squelching is not done at the STM/OCn interfaces. Acceptable values include: PRC SSU_A SSU_B SEC DNU

Output quality level SETG Status Selected Clock Source

SEC Locked The clock that is selected

The actual value for the Quality of clock output. This field is not configurable. The status of the PLL within the network elements synchronization module. The clock source being used. This field is not configurable.

Table below describes the Configurable synchronization status parameters in SONET mode.

Table 4-43. Configurable Synchronization Status Parameters


Parameter QL Mode Default Value Disabled Description Parameter to base the clock selection. Disabled: The clock is selected based on the priority assigned. Enabled: The clock is selected based on its quality and priority. Output QL Mode Manual Parameter to set the quality of the clock output. Auto: The output clock is the same as the source clock that is locked, provided QL Mode is enabled. Manual: Quality of output clock can be set manually. Manual should be selected for Output QL mode when QL Mode is disabled.

4-82

Working with the Configuration Menu

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Reversion Mode Default Value Manual Description

Chapter 4 User Interface Guide

Parameter to decide the clock switch mode in case of failure. Auto: The switching of the clock happens automatically. Manual: The switching of the clock has to be selected manually.

WTRTime (minutes)

The time the clock takes to switch to previously locked clock when it is restored from failure. Acceptable values range from 1- 12 minutes. Changes made to the WTR will not impact clocks that are already in WTR. The changes to the clocks will be applied on the next switch.

Node output quality level

INVALID

The quality of clock output. This parameter is editable only if the Output QL mode is set to Manual. Acceptable values include: PRS STU ST2 TNC ST3E ST3 SMC DUS INVALID

Node minimum quality level

INVALID

The minimum quality level expected by the network element to lock to a particular clock. If the clock does not have the QL as expected, then the BITS clock output will be squelched. Squelching is not done at the STM/OCn interfaces. Acceptable values include: PRS STU ST2 TNC ST3E ST3 SMC DUS INVALID

Viewing Selected Timing References


The View nominated timing references preview pane is displayed. The View nominated timing references preview pane lists all the nominated timing references. The clock source tagged with an asterisk is the current active source. Table below describes the nominated timing reference parameters.
Egate-2000 Ver. 1.0 Working with the Configuration Menu 4-83

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-44. Timing Reference Parameters


Parameter Current Source Default Values Description Parameter to indicate if the clock source is the current source. The clock source tagged with an asterisk is the current active source. The nominated clock source. The priority assigned to the clock source. The acceptable values include 0 - 8. The quality of the timing reference to which the node is locked to. The availability status of the clock source as one of the following. Normal: The nominated clock is functioning normally. Signal Fail: No signal is being received from the nominated clock source. Admin down: The clock source is made out of service. Oper down: The clock is not available for synchronization. Lockout Request Off Parameter to exclude or include the clock source from selection. On: Excludes the clock source from selection. Off: The clock source is available for selection.

Clock Source Priority

The nominated clock source 0

Quality Level

DNU

Clock Status

Normal

To view selected timing references, click on Configuration > Synchronization > View Nominated timing references in the navigation menu.

Editing Selected Timing References


To edit timing references: 1. Click Configuration > Synchronization > View Nominated timing references in the Navigation menu.
4-84 Working with the Configuration Menu Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

The View nominated timing references preview pane is displayed. 2. Click the Clock Source link to edit the clock source information. The View nominated timing references preview pane is displayed. 3. Edit required values referring to the Nominated Timing References Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Deleting Nominated Timing Reference


To delete a nominated timing reference: 1. Click Configuration > Synchronization > View Nominated timing references in the Navigation menu. The View nominated timing references preview pane is displayed. 2. In the delete field, select the check box for the clock source to be deleted. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Note

If the network element is locked to a clock source that needs to be deleted, then lockout the network element from the clock source before deleting the clock.

Nominating Timing Reference


To nominate a timing reference: 1. Click Configuration > Synchronization > Nominate timing reference in the Navigation menu. The Nominate timing references preview pane is displayed. 2. Select or enter values for the required fields. For information on the parameters, refer to the Nominate Timing References Parameters table. 3. Click Submit. A "Successfully Created" message is displayed.

Note

A maximum of eight clocks can be nominated for a network element.

Egate-2000 Ver. 1.0

Working with the Configuration Menu

4-85

Chapter 4 User Interface Guide

Installation and Operation Manual

4.10 Managing Faults


Fault management deals with detecting and reporting faults by the network element. Alarms are raised to alert the user about fault conditions.

Understanding Alarms
Based on their severity, alarms are categorized as follows: Critical Major Minor Warnings

Viewing Active Alarms


Active alarms are raised on objects (such as a card, port, cross-connect, protection group, and trunk) when they deviate from their normal functioning. Each alarm indicates a specific type of deviation, for example, Signal Deterioration alarm indicates that the signal received on the receiving port is deteriorated. The active alarms are displayed in the Active Alarms page. The list of active alarms is refreshed after few seconds to include the new alarms raised on any object on the network element. A Stop Refresh button is provided in the Active Alarms page to stop the automatic refreshing of the page. The following table describes the active alarm parameters.

Table 4-45. Active Alarm Parameters


Parameter # Time Information Severity Object Acknowledgment Status Description Serial number of the alarm Time when the alarm was raised according to the local time Summary on the problem in the object Severity level of the alarmCritical, Major, Minor, Warning Object on which the alarm was raised. Parameter to indicate if alarms are acknowledged or not.

To view active alarms, click Faults > Active Alarms in the Navigation menu. The Active Alarms page is displayed.

4-86

Managing Faults

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-17. Viewing Active Alarms

The Active alarms page is automatically refreshed for every few seconds. A Start/Stop Refresh button is provided to facilitate or stop the refreshing of the page. The Active alarms page is automatically refreshed for every few seconds.

Note

The Active alarms page may not display the updated alarms on refreshing the Active alarms page in Internet Explorer versions 6.0.x on Windows XP and Windows 2000. To ensure display of the updated alarm list, set your browser settings as follows: On the menu bar of your browser, click Tools > Internet Options > General. In the General dialog box, click Settings in the Temporary Internet files section. In the Settings dialog box, for Check for newer versions of stored page select Every visit to the page. Click OK to close the Settings dialog box and click OK again to close the Internet dialog box.

Note

Viewing Suppressed Alarms


Suppressed alarms are alarms being suppressed from reporting on the active alarm page. Such alarms are listed on the Suppressed Alarms pane. The following table describes the suppressed alarm parameters.

Table 4-46. Suppressed Alarm Parameters


Parameter # Time Alarm Information Severity Object Description Serial number of the suppressed alarm Time at which the alarm was raised Suppressed alarm Severity of the suppressed alarm Object on which the alarm was raised

Egate-2000 Ver. 1.0

Managing Faults

4-87

Chapter 4 User Interface Guide Parameter Alarm suppressor Description

Installation and Operation Manual

The reason why the alarm is being suppressed and not being reported on the active alarms page

To view suppressed alarms, click Faults > Suppressed Alarms in the Navigation menu. The Suppressed Alarms page is displayed.

Figure 4-18. Viewing Suppressed Alarms

Provisioning Alarm Filters


To provision alarm filters: 1. Click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is displayed. 2. Click Provision a new Alarm Filter link. The Provision New Alarm Filter page is displayed. 3. Select or enter values referring to the Alarm Filter Parameter table. 4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed.

Viewing Provisioned Alarm Filters


Alarm Filters are objects that enable suppressing alarms on the required object such as card, tributary unit, and protection group. The following table describes the Alarm filter parameters.

4-88

Managing Faults

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-47. Alarm Filter Parameters


Parameter Alarm Filter / Name Default Value Description Name given to the Alarm filter. The name can be a set of alphanumeric characters. Object to which the alarm filter is applied.

Managed Object

Any object on the network element such as the Synchronization source, Timing reference, the Tributary Unit, Arithmetic Unit, cross-connect and so on All configured alarms on the network element -

Alarm / Alarm Class Type

Alarm that is filtered by the Alarm filter. The type of the managed object. For example, if the Managed Object is 'Port', the Type is all the ports available on the network element. If the Managed Object is 'Card', the Type is all the cards available on the network element.

To view provisioned alarm filters, click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is displayed.

Deleting Alarm Filters


To delete alarm filters: 1. Click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is displayed. 2. Select the filter(s) to be deleted in the delete field. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Viewing Event History


Event history provides information on fault management event log.

Egate-2000 Ver. 1.0

Managing Faults

4-89

Chapter 4 User Interface Guide

Installation and Operation Manual

Figure 4-19. Viewing Event History


The Next and Previous buttons displays the pane immediate to the current displayed pane. The Show All Events link opens a new window, in which all the events are listed. The Back to Node View link takes you to NE information pane. The Stop Refresh button, when clicked, stops automatic refresh of the Event History pane and is displayed as Start Refresh. The Start Refresh button when clicked starts the refresh of the Event History pane. The Last Refreshed field indicates when the pane was refreshed last. To view Event history, click Faults > Event history in the Navigation menu. The Event history is displayed.

Alarm Severity
Based on the severity levels, alarms are categorized as critical, major, minor, and warning based on their severity. You can set the severity of alarms in Alarm severity page. The alarm for which severity is changed is marked with an asterisk (*) in the Alarm column. The Restore Defaults button when clicked restores the default severity for the modified alarms. The Back to Node View link takes you to the NE information page.

4-90

Managing Faults

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-20. Viewing Alarm Severity


To view Alarm Severity, click Faults > Alarm severity in the Navigation menu. The Alarm severity page is displayed.

Setting Alarm Severity


To set alarm severity: 1. Click Faults > Alarm severity in the Navigation menu. The Alarm severity page is displayed. 2. In the Severity field, for the alarm whose severity is to be changed, select the desired severity level from the drop down menu. 3. Click Submit. The page refreshes with the changes made. The field modified is indicated by an asterisk (*). Click Reset to reject the changes. Click Restore Defaults to bring back the alarm severity levels to default values.

4.11 Defining Profiles


Profiles define the behavior of the ports in the event of an alarm. This chapter describes the Profiles menu in the WUI.

Understanding Profiles
The Profiles menu provides following two types of profiles: STM Port Profiles: define the path profiles to be applied for all Higher order/Lower order terminating/non-terminating cross-connects. Path Alarm Profiles: enable the alarm reporting control on all alarms available in the AU and TU objects.

Egate-2000 Ver. 1.0

Defining Profiles

4-91

Chapter 4 User Interface Guide

Installation and Operation Manual

Working with STM Port Profiles


Using STM Port Profile menu, you can: View STM port profiles Edit STM port profiles

There are two STM port profiles provided by default: Internal NNI: The Internal NNI profile indicates preferences within EMS domains. External NNI: The External NNI profile indicates preferences between different management domains.

Figure 4-21. Working with STM/OC Port Profiles


STM port profile is non-provisionable, but can be customized to point to different path profiles. The changes made will be applicable only for new connections. The existing connections will remain unchanged. Table below describes the STM parameters:

Table 4-48. STM parameters


Parameter Profile Name Terminating and UnProtected TU Alarm Profile Default Value Mask TIM Description The name assigned to the profiles. Acceptable values include: Terminating and Protected TU Alarm Profile Mask TIM Mask TIM Suppress TIM Mask all except LOP Mask all

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

4-92

Defining Profiles

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Passthrough and Unprotected TU Alarm Profile Default Value Mask all except LOP

Chapter 4 User Interface Guide Description Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and Protected TU Alarm Profile

Mask all except LOP

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Terminating and UnProtected AU Alarm Profile

Mask TIM

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Terminating and Protected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and UnProtected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and UnProtected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and Protected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Viewing STM/OC Port Profiles


STM/OC port profile is not provisionable, but can be customized to point to different path profiles. The changes made will be applicable only for new connections. The existing connections will remain unchanged.
Egate-2000 Ver. 1.0 Defining Profiles 4-93

Chapter 4 User Interface Guide

Installation and Operation Manual

Using STM/OC Port Profile menu, you can: View STM/OC port profiles Edit STM/OC port profiles

To view STM/OC Port Profiles: 1. Click Profiles > STM/OC Port Profile. The View STM/OC Port Profile preview pane is displayed. 2. Click the STM/OC port profile provided by default: Internal NNI: The Internal NNI profile indicates preferences within EMS domains. External NNI: The External NNI profile indicates preferences between different management domains. Figure 22: External and Internal NNI

Figure 4-23. External and Internal NN


The table below describes the STM/OC parameters.

Table 4-49. STM/OC Parameters


Parameter Profile Name Terminating and UnProtected TU Alarm Profile Default Value Mask TIM Description The name assigned to the profiles. Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

4-94

Defining Profiles

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Terminating and Protected TU Alarm Profile Default Value Mask TIM

Chapter 4 User Interface Guide Description Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and Unprotected TU Alarm Profile

Mask all except LOP

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and Protected TU Alarm Profile

Mask all except LOP

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Terminating and UnProtected AU Alarm Profile

Mask TIM

Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all

Terminating and Protected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and UnProtected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Passthrough and Protected AU Alarm Profile

Mask TIM

Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all

Egate-2000 Ver. 1.0

Defining Profiles

4-95

Chapter 4 User Interface Guide

Installation and Operation Manual

Editing STM Port Profiles


To edit STM port profiles: 1. Click Profiles > STM Port Profile. The View STM Port Profile preview pane is displayed. 2. Click the View profile to be edited. Selected View profile preview pane is displayed. 3. Click on the Edit link or Click on the edit link in the Edit column for the entry to be updated. The View STM Port Profile preview pane is displayed. 4. Edit required values and click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Working with Path Alarm Profiles

Figure 4-24. Working with Path Alarm Profiles


Table below describes the Path Alarm profile parameters.

4-96

Defining Profiles

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-50. Name of Table


Parameter Profile Name TIM Action Default Value Suppress TIM Description The name assigned to the profile. The acceptable values include a set of alphanumeric characters. Report TIM, No Downstream AIS: Reports the TIM alarm without affecting traffic. Ignore TIM: No alarm is reported or traffic affecting action is taken on TIM. Report TIM, Downstream AIS: Reports the TIM alarm and also transmits a downstream AIS so that traffic transmission is affected. Suppress TIM: Reports the TIM alarm, but in the suppressed alarm page, and there are no traffic affecting alarms. Report SLM, No Downstream AIS: On Signal Label Mismatch (SLM), PLM alarm is reported, but no downstream AIS is sent. Ignore SLM: No action is taken on SLM. Downstream AIS on SLM: Reports PLM alarm and sends AIS downstream (traffic affecting) on SLM. Suppress SLM: The SLM alarm is reported in the suppressed alarm page. Report UNEQ, No Downstream AIS: Reports the UNEQ alarm without affecting traffic. Ignore UNEQ: No alarm is reported or traffic affecting action is taken on an UNEQ. Downstream AIS on UNEQ: Reports the UNEQ alarm and also transmits downstream AIS. Traffic is affected. Suppress UNEQ: Reports the UNEQ alarm in the suppressed alarm page. There are no traffic affecting alarms.

Signal Label Mismatch Action

Report SLM, No downstream AIS

UNEQ Signal Label Action Report UNEQ, No downstream AIS

Masked Alarms List or Select Alarms for Masking

List of masked alarms. The alarms that can be masked are: Alarm Indication Signal Remote Defect Indication Loss Of Pointer Signal Degrade Signal Fail

Viewing Path Alarm Profiles


In the Path Alarm Profiles menu, you can: View path alarm profiles

Egate-2000 Ver. 1.0

Defining Profiles

4-97

Chapter 4 User Interface Guide

Installation and Operation Manual

Provision a new path alarm profile Delete path alarm profiles

To view path alarm profiles,click Profiles > Path Alarm Profiles. The View Path Alarm Profile preview pane is displayed.

Figure 4-25. View Path Alarm Profile


The configured alarm profiles are listed on this preview pane. Table below describes the Path Alarm profile parameters.

Table 4-51. Path Alarm Profile Parameters


Parameter Profile Name Default Value Description The name assigned to the profile. The acceptable values include a set of alphanumeric characters. Report TIM, No Downstream AIS: Reports the TIM alarm without affecting traffic. Ignore TIM: No alarm is reported or traffic affecting action is taken on TIM. Report TIM, Downstream AIS: Reports the TIM alarm and also transmits downstream AIS so that traffic is switched. Suppress TIM: Reports the TIM alarm, but in the suppressed alarm page, and there are no traffic affecting alarms. Report SLM, No Downstream AIS: On Signal Label Mismatch (SLM), PLM alarm is reported, but no downstream AIS is sent. Ignore SLM: No action is taken on SLM. Downstream AIS on SLM: Reports PLM alarm and sends AIS downstream (traffic affecting) on SLM. Suppress SLM: The SLM alarm is reported in the suppressed alarm page.

TIM Action

Suppress TIM

Signal Label Mismatch Action

Report SLM, No downstream AIS

4-98

Defining Profiles

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter UNEQ Signal Label Action Default Value Report UNEQ, No downstream AIS Description

Chapter 4 User Interface Guide

Report UNEQ, No Downstream AIS: Reports the UNEQ alarm without affecting traffic. Ignore UNEQ: No alarm is reported or traffic affecting action is taken on an UNEQ. Downstream AIS on UNEQ: Reports the UNEQ alarm and also transmits downstream AIS. Traffic is affected. Suppress UNEQ: Reports the UNEQ alarm in the suppressed alarm page. There are no traffic affecting alarms.

Masked Alarms List or Select Alarms for Masking

List of masked alarms. The alarms that can be masked are: Alarm Indication Signal Remote Defect Indication Loss Of Pointer Signal Degrade Signal Fail

Delete

Allows you to delete the alarm profile.

NOTE: Note Default path for alarm profiles are indicated with an asterisk and cannot be deleted.

Provisioning Path Alarm Profiles


To provision path alarm profiles: 1. Click Profiles > Path Alarm Profiles in the navigation menu. The View Path Alarm Profile is displayed. 2. Click the Provision a new Path Alarm Profile link. The Provision New Path Alarm Profile is displayed. 3. Select or enter values, refer to the Path Alarm Profile Parameters table. 4. Select Alarms For Masking. 5. Click Create. A confirmation preview pane is displayed. 6. Click Yes. A "Successfully Created" message is displayed.

Egate-2000 Ver. 1.0

Defining Profiles

4-99

Chapter 4 User Interface Guide

Installation and Operation Manual

Deleting Path Alarm Profiles


To delete path alarm profiles: 1. Click Profiles > Path Alarm Profiles. The View Path Alarm Profile preview pane is displayed. 2. In the delete field, select the check box for the profiles to be deleted. 3. Click Delete. A confirmation preview pane is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

Note

Default path alarm profiles are indicated with an asterisk. Default path alarm profiles cannot be deleted. A path alarm assigned to an AU/STS, TU/VT or STM cannot be deleted.

4.12 Performance Monitoring


This chapter explains how you can monitor various performance statistics. Performance Monitoring (PM) refers to the in-service, non-intrusive monitoring of transmission quality. It is the process that monitors the performance of a facility through performance data collection and analysis without interruptions to service.

Understanding Performance Monitoring


The functions of performance monitoring include: collection of PM counts reporting of PM counts storage of PM counts threshold crossing alerts when PM counts exceed their threshold settings

The network element monitors performance parameters for working and protection facilities separately. You can use performance monitoring to isolate intermittent faults without interrupting service. SDH/SONET performance monitoring is based on block error measurement. If one or more of the parity bits indicate a parity error when the BIP, BIP-8/BIP24xN or BIP-2 byte is checked, then only one block error is counted. The network element monitors the performance parameters and records the data for Current Interval: The Current interval statistics displays the performance statistics for the current time interval, previous 15 minutes, current day and the previous day. 15min intervals: The Interval statistics displays the performance statistics for 32 previous 15-minute intervals.
Egate-2000 Ver. 1.0

4-100

Performance Monitoring

Installation and Operation Manual

Chapter 4 User Interface Guide

Previous day: The Previous day's history displays the performance statistics for previous day. The performance monitoring parameters are categorized as follows: STM/OC performance monitoring parameters: You can monitor the performance of Regenerator section-Multiplex section/Section-Line, path, Tributary unit and Transceiver performance attributes. PDH performance monitoring parameters: You can monitor the path performance attributes of Ethernet performance monitoring parameters and VCG performance monitoring parameters

The Reset options are provided to reset the performance counter at the near and far end network elements. A value of '1' in the Interval Valid column indicates that there has been no interruption in the performance counter during the 15 minutes, current day or 24 hours interval. A value of '0' indicates that there has been an interruption in the performance counter such as the network element software restarting, facility administered down, reset, card being jacked out, etc.

STM/OC Performance Statistics


You can view the following performance statistics: Regenerator section-Multiplex section Path Tributary unit Transceiver Ethernet VCG

Viewing the Performance Statistics of the Regenerator Section - Multiplex Section


To view the performance statistics: 1. Click Performance in the Navigation menu. 2. Click Current interval > STM/OC. The STM/OC-Current interval statistics page is displayed. 3. Click 15min interval > STM/OC. The STM/OC-Interval statistics page is displayed. 4. Click Previous day > STM/OC. The STM/OC-Previous day's history page is displayed. 5. Click Regenerator Section - Multiplex section/Section-Line. The performance statistics of the Regenerator section/Section and the Multiplex section/Line is displayed.

Egate-2000 Ver. 1.0

Performance Monitoring

4-101

Chapter 4 User Interface Guide

Installation and Operation Manual

6. Reset options available under STM-Regenerator Section are: Reset Regeneration Section/Section Current 15 Min Statistics and Reset Regeneration Section/Section Current Day Statistics. 7. Reset options available under Multiplex section are: Reset Multiplex Section/Line Current 15 Min Statistics, Reset Multiplex Section/Line Current Day Statistics, Reset Multiplex Section/Line Current 15 Min (Far End), Reset Multiplex Section/Line Current Day (Far End) describes the Regenerator Section performance parameters when the network element is operated in SDH mode. Table below describes the Regenerator Section Performance Parameters in SDH mode.

Table 4-52. Regenerator Section Performance Parameters in SDH Mode


Parameter ES SES UAS SEP EB BBE ESR SESR BBER SEPI Interval Valid Desscrtiption The errored second in the regenerator section. The severely errored second in the regenerator section. The unavailable second in the regenerator section. The severely errored period in the regenerator section. The errored blocks in the regenerator section. The background block errors in the regenerator section. The errored seconds ratio in the regenerator section. The severely errored seconds ratio in the regenerator section. The background block error ratio in the regenerator section. The severely errored period intensity in the regenerator section. The validity of the interval and the validity of data during that interval in the regenerator section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

Table below describes the Section performance parameters when the network element is operated in SONET mode.

Table 4-53. Performance Parameters when the Network Element is Operated in SONET Mode
Parameter CV ES SES SEFS Description The code violations in the section. The errored second in the section. The severely errored second in the section. The severely errored framing seconds in the section.

4-102

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Interval Valid Description

Chapter 4 User Interface Guide

Interval Valid is the validity of the interval and the validity of data during that interval in the section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid

Table describes the Multiplex Section performance parameters when the network element is operated in SDH mode.
ES SES UAS SEP EB BBE ESR SESR BBER SEPI Interval Valid The errored second in the multiplex section. The severely errored second in the multiplex section. The unavailable second in the multiplex section. The severely errored period in the multiplex section. The errored blocks in the multiplex section. The background block errors in the multiplex section. The errored seconds ratio in the multiplex section. The severely errored seconds ratio in the multiplex section. The background block error ratio in the multiplex section. Displays the severely errored period intensity in the multiplex section. Interval Valid is the validity of the interval and the validity of data during that interval in the multiplex section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. ES-FE SES-FE BBE-FE UAS-FE SEP-FE Far End Interval Valid The errored seconds at far end in the multiplex section. The severely errored seconds at far end in the multiplex section. The background blocked errors at far end in the multiplex section. The unavailable seconds at far end in the multiplex section. The severely errored period at far end in the multiplex section. Displays the validity of data during that interval at far end in the multiplex section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

Table below describes the Line performance parameters when the network element is operated in SONET mode.

Table 4-54. Network Element in SONET Mode.


Parameter CV ES SES Description The code violations in the section. The errored second in the line section. The severely errored second in the line section.

Egate-2000 Ver. 1.0

Performance Monitoring

4-103

Chapter 4 User Interface Guide Parameter UAS FC Interval Valid Description

Installation and Operation Manual

The unavailable second in the line section. The failure count in the line section. Interval Valid is the validity of the interval and the validity of data during that interval in the line section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

ES-FE SES-FE CV-FE UAS-FE Far end Interval Valid

The errored seconds at far end in the line section. The severely errored seconds at far end in the line section. The code violation errors at far end in the line section. The unavailable seconds at far end in the line section. The validity of data during that interval at far end in the line section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

Viewing Performance Statistics of Path


To view performance statistics of path: 1. Click Performance in the navigation menu. 2. Click Current interval > STM/OC to view performance statistics on current interval. The STM/OC-Current interval statistics page is displayed. 3. Click 15min interval > STM/OC to view performance statistics for 15min interval. The STM/OC-Interval statistics page is displayed. 4. Click Previous day > STM/OC to view performance statistics for previous day. The STM/OC-Previous day's history page is displayed. 5. Click Path to view performance statistics of STM/OC path.

Note

The AU/STS hyperlink takes you to the corresponding performance statistics.


The reset options available for each port areReset All Current 15 Min Statistics, Reset All Current Day Statistics, Reset All Current 15 Min (Far End), Reset All Current Day (Far End), Reset AU/STS Current 15 Min Statistics, Reset AU Current Day Statistics, Reset AU/STS Current 15 Min (Far End), Reset AU/STS Current Day (Far End). The current interval statistics of the Path is available for the current time interval, previous 15 minutes, current day and the previous day. The following table describes the Path performance parameters when the network element is configured in SDH mode.

4-104

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-55. Network Element Configured in SDH Mode


Parameter ES SES UAS SEP EB BBE PPJE NPJE ESR SESR BBER SEPI Interval Valid Description The errored second. The severely errored second. The unavailable second. The severely errored period in the path The errored blocks. The background block errors. The positive pointer justification events. The negative pointer justification events. The errored seconds ratio. The severely errored seconds ratio. The background block error ratio. The severely errored period intensity in the path. Interval Valid is the validity of the interval and the validity of data during that interval. '1' indicates the data displayed during that interval is valid, while '0' indicates the data is not valid. The errored seconds at far end. The severely errored seconds at far end. The background blocked errors at far end. The unavailable seconds at far end. The severely errored period at far end in the path. The validity of data during that interval at far end. '1' indicates the data displayed during that interval is valid, while '0' indicates the data is not valid.

ES-FE SES-FE BBE-FE UAS-FE SEP-FE Far End Interval Valid

The following table describes the Path performance parameters when the network element is configured in SONET mode.

Egate-2000 Ver. 1.0

Performance Monitoring

4-105

Chapter 4 User Interface Guide

Installation and Operation Manual

CV ES SES UAS FC PPJE NPJE Interval Valid ES-FE SES-FE CV-FE UAS-FE Far End Interval Valid

The code violations in the path. The errored second. The severely errored second. The unavailable second. The failure count in the path The positive pointer justification events. The negative pointer justification events. Interval Valid is the validity of the interval and the validity of data during that interval. The errored seconds at far end. The severely errored seconds at far end. The code violation errors at far end in the line section. The unavailable seconds at far end. The validity of data during that interval at far end.

Viewing performance statistics of tributary unit


To view performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval > STM/OC to view performance statistics on current interval. The STM/OC-Current interval statistics page is displayed. 3. Click 15min interval > STM/OC to view performance statistics for 15min interval. The STM/OC-Interval statistics page is displayed. 4. Click Previous day > STM/OC to view performance statistics for previous day. The STM/OC-Previous day's history page is displayed. 5. Click Tributary Unit/Virtual Tributary. Click the desired TU/VT to view the performance statistics. The performance statistics of the Tributary Unit is displayed.

Note

The current interval statistics of the Tributary Unit is available for the current time interval, previous 15 minutes, current day and the previous day.
Reset options available for each TU areReset All Current 15 Min Statistics, Reset All Current Day Statistics and Reset All Current 15 Min (Far End), Reset All Current Day (Far End). The following table describes the Tributary Unit/Virtual Tributary performance parameters.

4-106

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-56. Tributary Unit/Virtual Tributary Performance


Parameter ES SES UAS SEP EB BBE ESR SESR BBER SEPI Interval Valid ES-FE SES-FE BBE-FE UAS-FE SEP-FE Far End Interval Valid Description The errored second. The severely errored second. The unavailable second. The severely errored period. The errored blocks. The background blocked error. The error seconds ratio. The severely error seconds ratio. The background blocked error ratio. The severely errored period intensity. The lower order path interval valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. The error seconds at far end. The severely error seconds at far end. The background blocked errors at far end. The unavailable seconds at far end. The severely errored period at far end. The validity of data during that interval at far end. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

Viewing performance statistics of transceiver


To view performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval > STM/OC to view performance statistics on current interval. The STM/OC-Current interval statistics page is displayed. 3. Click 15min interval > STM/OC to view performance statistics for 15min interval. The STM/OC-Interval statistics page is displayed. 4. Click Previous day > STM/OC to view performance statistics for previous day. The STM/OC-Previous day's history page is displayed. 5. Click Transceiver to view performance statistics for Transceiver. The performance statistics of the Transceiver is displayed. The following table describes the Path Performance Parameters.
Egate-2000 Ver. 1.0 Performance Monitoring 4-107

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-57. Path Performance Parameters


Parameter Received Power (dBm) Transmit Power (dBm) Laser Bias (mA) Laser Voltage (Volts) Laser Temperature (degrees C) Interval Valid Description The value of the received power. The value of the transmitted power. The Laser Bias value as received from the device. The Laser Voltage as received from the device. The Laser Temperature as received from the device. Indicates the validity of the interval. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

Viewing PDH (E1/DS1/E3/DS3) port performance statistics


The PDH performance statistics gives the line and path performance statistics of the E1/DS1/E3/DS3 ports. To view PDH performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval to view performance statistics on current interval. 3. Click E1/DS1/E3/DS3. The E1/DS1/E3/DS3-Current interval statistics page is displayed. 4. Click 15min interval to view PDH performance statistics for 15min interval. 5. Click E1/DS1/E3/DS3. The E1/DS1/E3/DS3-Interval statistics page is displayed. 6. Click Previous day to view PDH performance statistics for previous day. 7. Click E1/DS1/E3/DS3. The E1/DS1/E3/DS3-Previous day's history page is displayed. 8. Click the desired PDH port. The performance statistics of the PDH port chosen is displayed. The following table describes the performance parameters of the network element when operated in different modes.

Table 4-58. Performance Parameters of the Network Element


Parameter CV-L ES-L Description The coding violations occurring on the line. Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the line. The severely error seconds.

SES-L

4-108

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Line Interval Valid Description

Chapter 4 User Interface Guide

Indicates the validity of the interval. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

The following table describes E1 Path Performance Parameters in SDH Mode.

Table 4-59. E1 Path Performance Parameters in SDH Mode


Parameter EB-P BBE-P ES-P Description The errored blocks on the path. The background blocked error on the path. Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path. The severely errored seconds on the path. The unavailable seconds on the path. Indicates if the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

SES-P UAS-P Path Interval Valid

The following table describes DS1 Path Performance Parameters in SONET Mode.

Table 4-60. DS1 Path Performance Parameters in SONET Mode


Parameter CV-P ES-P Description The coding violations occurring on the path. Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the path. The severely errored seconds on the path. The unavailable seconds on the path. A count of one-second intervals containing one or more SEFs or one or more AIS defects on the path Count of one-second intervals containing one or more AIS defects. The valid interval on the path.

SES-P UAS-P SAS-P AISS-P Path Interval Valid

The following table describes E3/DS3 Line Performance Parameters.

Table 4-61. E3/DS3 Line Performance Parameters


Parameter CV-L Description The coding violations occurring on the line.

Egate-2000 Ver. 1.0

Performance Monitoring

4-109

Chapter 4 User Interface Guide Parameter ES-L Description

Installation and Operation Manual

Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the line. The severely errored seconds in the line. Indicates if interval is valid. 1 indicates the data displayed during that Interval is valid, while 0 indicates the data is not valid.

SES-L Line Interval Valid

The following table describes E3 Path Performance Parameters in SONET mode.

Table 4-62. E3 Path Performance Parameters in SONET mode


Parameter ES-P Description Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path. The severely errored second on the path. The unavailable second on the path. Indicates if the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.

SES-P UAS-P Path Interval Valid

The following table describes DS3 Path Performance Parameters in SONET Mode.

Table 4-63. DS3 Path Performance Parameters in SONET Mode


Parameter CV-P ES-P Description The coding violations occurring on the path. Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path. The severely Errored second on the path. The unavailable second on the path. The severely alarm seconds on the path. The AIS seconds on the path The valid interval on the path.

SES-P UAS-P SAS-P AISS-P Path Interval Valid

Note

The frame status of the port is displayed on the performance statistics page.

Viewing Ethernet performance statistics


The Ethernet performance statistics gives the Ethernet interface performance statistics.

4-110

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

To view Ethernet performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval to view performance statistics on current interval. 3. Click Ethernet. The Ethernet-Current interval statistics page is displayed. 4. Click the desired Ethernet port. The performance statistics of the selected Ethernet port is displayed. The following table describes the Ethernet Performance Parameters

Table 4-64. Ethernet Performance Parameters


Parameter Description Indicates if the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Count of number of 64 byte length packets. Count of number of 65-127 byte length packets Count of number of 128-255 byte length packets. Count of number of 256-511 byte length packets Count of number of 512-1023 byte length packets. Count of number of 1024-1518 byte length packets. Count of number of 1519-1522 byte length packets. Count of frames discarded based on frame policy. Count of number of valid frames received with correct FCS value. Count of number of bytes received. Count of number of frames transmitted. Count of number of bytes transmitted. Count of number of received frames with incorrect FCS. Count of number of received frames less then 64 bytes, with a correct FCS value. When in half-duplex mode, the actual Receive undersize frame count is determined by TUND, TXCL and TLCL - TBD. Count of number of pause frames received on the interface. Count of number of broadcast frames received on the interface. Count of number of broadcast frames transmitted on the interface. Count of number of multicast frames received on the interface. Performance Monitoring 4-111

Ethernet Interval Valid Packets RX/TX 64 Bytes Packets RX/TX 65-127 Bytes Packets RX/TX 128-255 Bytes Packets RX/TX 256-511Bytes Packets RX/TX 512-1023 Bytes Packets RX/TX 1024-1518 Bytes Packets RX/TX 1519-1522 Bytes Unacceptable Frame Type Frames Received Octets Received Frames Transmitted Octets Transmitted FCS Errors Frames Too Short RX

Pause Frames Received Broadcast Frames Received Broadcast Frames Transmitted Multicast Frames Received

Egate-2000 Ver. 1.0

Chapter 4 User Interface Guide Parameter Multicast Frames Transmitted Frame Fragment TX Frame Fragment RX Frame Jabber TX Frame Jabber RX Discarded Rx packets Discarded Tx Packets Service Lookup Failure Ingress Other Discards MTU Discards Packets RX/TX > 1522 (Jumbo Frames) Description

Installation and Operation Manual

Count of number of multicast frames transmitted on the interface. Count of number of fragment frames transmitted on the interface. Count of number of received frames transmitted on the interface. Count of number of jabber frames transmitted on the interface. Count of number of jabber frames received on the interface. Count of number of receive frames discarded. Count of number of transmit frames discarded. Count of ingress frames which does not match any of the FP definitions. Count of frames discarded apart from the ingress definitions. Count of frames discarded based on MT. Count of number of 1522-9600 byte length packets.

Viewing VCG performance statistics


The VCG performance statistics gives the Ethernet interface performance statistics. To view VCG performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval to view performance statistics on current interval. 3. Click VCG.

The VCG-Current interval statistics page is displayed.


4. Click 15min interval to view performance statistics for 15min interval. 5. Click VCG.

The VCG-Interval statistics page is displayed.


6. Click Previous day to view performance statistics for previous day. 7. Click VCG.

The VCG-Previous day's history page is displayed.


8. Click the desired VCG port. The performance statistics of the selected Ethernet port is displayed. The following table describes VCG Performance Parameters

4-112

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-65. VCG Performance Parameters


Binned Counters
Parameter Idle Seconds Description The count of idle second in VCG traffic. An idle second is a second in which no data frames or errored frames are received. This counter will be incremented in a nonES/non-SES/non-UAS second. The count of Errored Seconds. The count of Severely Error Seconds. The count of Un Available Seconds. The count of valid frames transmitted count. The count of valid frames received count. The count of valid bytes transmitted count. The count of valid bytes Received count. The GFP (Generic Framing Procedure as in G.7041) core header single errors correction count. The GFP type header single error correction count. The GFP core header CRC error count. The GFP type header CRC error count. The payload FCS incorrect count.

ES SES UAS Valid Frames Transmitted Valid Frames Received Valid bytes Transmitted Valid bytes Received Core Header Single Error Corrections Type Header Single Error Corrections Core Header CRC Errors Type Header CRC Errors Payload FCS Errors

Running Counters
Parameter Description Indicates whether the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Count of frames discarded based on frame policy. Count of frames discarded based on MT Count of ingress frames which does not match any of the FP definitions. Count of frames discarded apart from the ingress definitions Count of number of valid frames received with correct FCS value Count of number of bytes received Count of number of frames transmitted Count of number of bytes transmitted Count of number of receive frames discarded

VCG Interval Valid Unacceptable Frame Type MTU Discards Service Lookup Failure Ingress Other Discards Frames Received Octets Received Frames Transmitted Octets Transmitted Discarded Rx packets

Egate-2000 Ver. 1.0

Performance Monitoring

4-113

Chapter 4 User Interface Guide Parameter Discarded Tx Packets Description

Installation and Operation Manual

Count of number of transmit frames discarded

Monitoring input voltage statistics


This menu allows you to monitor the voltage input to the network element. To view the input voltage statistics, click Performance > input voltage monitor in the navigation menu. The Input Voltage Statistics page is displayed. The following table describes Input Voltage Statistics Parameters

Table 4-66. Input Voltage Statistics Parameters


Parameter Description

Card Name Index Voltage Value Current Voltage Value (volts) Voltage high Threshold (volts) Voltage low Threshold (volts) Admin Status

The name of the card. The index value of the card. The voltage value required to be provided at the backplane. The voltage value received currently at the backplane. The maximum voltage threshold. The minimum voltage threshold. The admin status of the card.

Viewing Performance Statistics of Internal PDH Ports


To view Internet PDH ports performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval to view performance statistics on current interval. 3. Click E1. The E1-Current interval statistics page is displayed. 4. Click the desired Ethernet port. The performance statistics of the selected Ethernet port is displayed. The following table describes the E1 Path Performance Attributes

Table 4-67. E1 Path Performance Attributes


Parameter EB-P BBE-P ES-P Description Displays the errored blocks on the path. Displays the background blocked error on the path. Displays the errored seconds path. Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path.

4-114

Performance Monitoring

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter SES-P UAS-P Path Interval Valid Description

Chapter 4 User Interface Guide

Displays the severely errored second on the path. Displays the unavailable second on the path. Displays the valid interval on the path.

4.13 Security Management


This chapter describes about users and their privileges to access the network element.

Access Group Privileges


To mange users, select Security > Manage users. Manage users screen is displayed.

Figure 4-26. Security Management


The network element provides four different user access groups (ADMIN, OPERATOR, OPERATOR2 and USER). The following table describes the Access Group Privileges:

Table 4-68. Access Group Privileges


Access Group USER OPERATOR Privileges Read-only access to all the management information including configuration, faults and performance. Can perform certain configuration operations such as port and acknowledgment of faults, resetting performance statistics, etc. Can configure node name, configure Router ID and Ethernet IP; perform maintenance operations such as software or configuration backup and restore; and all other operations similar to operator.

OPERATOR2

Egate-2000 Ver. 1.0

Security Management

4-115

Chapter 4 User Interface Guide Access Group ADMIN Privileges

Installation and Operation Manual

Can create and delete logins on the network element. Can configure Location, Contact, as well as management parameters such as Ethernet/Router IP Address/Masks.

4.14 Working with the Radius Server


Working with RADIUS Server
Remote Authentication Dial-In User Service (RADIUS) is an IETF protocol for communication between RADIUS clients on remote network elements and a RADIUS server. The RADIUS server provides centralized Authentication, Authorization and Accounting (AAA) services. When RADIUS setting is enabled on the network element, the network element will use the authentication details configured on a remote server rather than the authentication details present on the network element. The feature supports a primary and a secondary RADIUS server synchronized to each other. When the primary server is not reachable, the secondary server is used for authentication. The secondary RADIUS server will be used only if the primary is not reachable. If the primary is reachable, but the user name is not authenticated (because of incorrect password or username missing), the authentication process fails independent of the secondary server.

Note

If a user account is not authenticated, the user session expires after the maximum of three retries.
The network element keeps sending authentication request for every one hour. The caching mechanism implemented in the network element prevents every command or web-page access to be sent to the RADIUS server(s) for authentication. An already logged in session does not terminate if connectivity to the RADIUS server is lost or if username or password information is changed on the RADIUS server. However, when the RADIUS server is reachable, the cached authentication information is valid only for an hour, after which authentication failed message is displayed and the user is prompted to login again with the new username and password. If the RADIUS server is not reachable, the active session continues and the user is prompted to login again in the next hour.

Note

If the password has been changed in the RADIUS server, and if a user uses the new password to log into the network element, all logged in users will have to relogin with the new password.
The following table describes the configurable RADIUS Parameters.

4-116

Working with the Radius Server

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-69. Configurable RADIUS Parameters


Parameter View Server IP Default/Acceptable Values Default: 192.168.0.0 Acceptable: 0.0.00 254:254:254:254 Default: 30 Description Link to view RADIUS server details. IP address of the RADIUS server

RADIUS Cache Time out (Minutes) Domain RADIUS Secret

Displays the time in which communication should be established with the RADIUS server. Displays the domain name. Code for encrypting data sent to the RADIUS server. The same code needs to be configured on the RADIUS server also. Time duration (in seconds) within which communication should be established with the RADIUS server. Communication port of the RADIUS Server Priority of the RADIUS server

Timeout

Default: 15 Acceptable: 4 - 30 Default: 1812 Configurable Port Default: 1 Acceptable: 1 -2

Port Priority

Provisioning RADIUS Server


You can configure the following RADIUS server parameters: RADIUS server RADIUS secret Time out Port Priority

To provision RADIUS server: 1. Click Security > RADIUS settings in the navigation menu. The View RADIUS page is displayed. 2. Click Provision a new RADIUS Server link. The Provision New RADIUS Server is displayed. 3. Select or enter values referring to table RADIUS Parameters. 4. Click Create. A "Successfully Created" message is displayed.

Egate-2000 Ver. 1.0

Working with the Radius Server

4-117

Chapter 4 User Interface Guide

Installation and Operation Manual

Enabling RADIUS Authentication


To provision RADIUS authentication: 1. Click Security > RADIUS settings in the navigation menu. The View RADIUS page is displayed. 2. Select Enable for RADIUS Authentication field, listed above the View RADIUS page. 3. Click Submit. A "Successfully Modified" message is displayed.

Editing RADIUS Settings


To edit RADIUS settings: 1. Click Security> RADIUS settings in the navigation menu. The View RADIUS page is displayed. 2. Click the Edit link for the entry to be updated. The Edit RADIUS server page is displayed Or Click the entry name. The Edit RADIUS server page is displayed. 3. Edit required values. 4. Click Submit. A confirmation page is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Managing User Accounts


The Administrator creates and manages the user accounts for accessing the network element and ensures security by assigning each user a specific profile. The following table describes the User Account Parameters.

Table 4-70. User Account Parameters


Parameter Default Value Description Name assigned to the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having a maximum of 32 characters. User Name should be unique and is case sensitive. Access privilege assigned to the user account.

User Name

Access

USER

4-118

Working with the Radius Server

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter Default Value Description

Chapter 4 User Interface Guide

Parameter to indicate whether access is allowed or denied to the user. User Lockout Deny Access Allow access: The user is allowed to log-in to confirm the password access to the network element. Deny access: The user is denied access to the network element. Password assigned to the user for the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having exactly 8 characters. Password is case-sensitive. Password should be unique and different from User Name. Re-enter password to confirm the password.

Password

Confirm Password

Creating User Account


To create a user account: 1. Click Security> Manage users in the navigation menu. The Manage Users page is displayed. 2. Click the Add User button. A page for configuring a new user is displayed. 3. Select or enter values referring to the User Account Parameters table. 4. Click Submit. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. 6. Click the Edit link for the entry to be updated. The Edit RADIUS server page is displayed. Or Click the entry name. The Edit RADIUS server page is displayed. 7. Edit required values. 8. Click Submit. A confirmation page is displayed. 9. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Managing User Accounts


The Administrator creates and manages the user accounts for accessing the network element and ensures security by assigning each user a specific profile. The following table describes the User Account Parameters.

Egate-2000 Ver. 1.0

Working with the Radius Server

4-119

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-71. User Account Parameters


Parameter Default Value Description

User Name

Name assigned to the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having a maximum of 32 characters. User Name should be unique and is case sensitive. Access privilege assigned to the user account. Parameter to indicate whether access is allowed or denied to the user.

Access

USER

User Lockout

Deny Access

Allow access: The user is allowed to log-in to confirm the password access to the network element. Deny access: The user is denied access to the network element. Password assigned to the user for the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having exactly 8 characters. Password is case-sensitive. Password should be unique and different from User Name. Re-enter password to confirm the password.

Password

Confirm Password

Creating User Account


To create a user account: 1. Click Security> Manage users in the navigation menu. The Manage Users page is displayed. 2. Click the Add User button. A page for configuring a new user is displayed. 3. Select or enter values referring to the User Account Parameters table. 4. Click Submit. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. 6. Click Yes. A "Successfully Created" message is displayed.

Disabling users
The users with administrator privileges can disable a user account by setting the "User lockout" parameter. When the user is locked out during an active session, the authentication information stored in the cache is used for the session till the user logs out. The next time the user attempts to log into the network element, access is denied.
4-120 Working with the Radius Server Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Enabling User-Lockout
User-Lockout is usually done to prevent password guessing and unauthorized access to network element. Administrator needs to configure the following parameters to the network element: Max Invalid Login attempts: The maximum invalid login attempts, after which the user account would get locked out. Lockout Time: Time duration during which the locked users cannot connect to network element. During this lockout time, the authorized users cannot even connect to network element. After the lockout time expires, the user authentication would proceed as normal.

NOTE: In User lockout feature RADIUS users with ADMIN privilege can be locked through debug interfaces, namely telnet, ssh, ftp. RADIUS user, created with same name as LOCAL user will not be locked out, if the LOCAL user is an ADMIN.
To Enable Users Lockout: 1. Login to the network element with admin access privilege. 2. Click Security in the Navigation menu. 3. Click Security Settings. The Security settings page is displayed. 4. Select Enable UserLock Settings. 5. Click Submit. A success message is displayed. The following table describes the parameters on the Locked Users page

Table 4-72. Locked Users page


Field Maximum Invalid Attempt Count Lockout Time (seconds) Description The maximum invalid login attempts, after which the user would get locked out. Time duration during which the locked users cannot connect to NE. During this lockout time, the authorized users even cannot connect to NE. After the lockout time expires, the user authentication would proceed as normal. Allows to enter user name Displays timeout Allows to enter IP address Allows to unlock

User Name Timeout IPAddress Unlock

To configure UserLock: 1. Log on to the network element with admin access privilege.

Egate-2000 Ver. 1.0

Working with the Radius Server

4-121

Chapter 4 User Interface Guide

Installation and Operation Manual

2. Click Security in the Navigation menu. 3. Click Lock Users. 4. Set Lockout Time (seconds) 5. Set Maximum Invalid Attempt Count. 6. Click Submit. A success message is displayed. To View/Unlock Locked Users: 1. Log into the network element with admin access privilege. 2. Click Security in the Navigation menu. 3. Click Lock Users. 4. Select a user from the list. 5. Set Maximum Invalid Attempt Count. 6. Click Unlock.

A success message is displayed. Note


In User lockout feature RADIUS users with ADMIN privilege can be locked through debug interfaces, namely telnet, ssh, ftp. RADIUS user, created with same name as LOCAL user will not be locked out, if the LOCAL user is an ADMIN.

Provisioning Security Settings


The following table describes the parameters on the Security settings page.

Table 4-73. Security Settings Page


Field BlockedPorts BlockedIPs CHAP Settings Description Click the link to view blocked services Click the link to view blocked IPs Challenge-Response Authentication (CHAP) CHAP Secret Enable Disable

Challenge-Response Authentication (CHAP) Allows to enter the CHAP secret

Login Warning Login Notice UserLock Settings

Allows to enter the Login warning Allows to enter the Login Notice Enable Disable Enable Disable

Local Auth on Fallback

Challenge-Response Authentication (CHAP) is a method for proving your identity over an insecure medium without giving any information out to eavesdroppers
4-122 Working with the Radius Server Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

that may enable them to identify themselves as you. When CHAP method is enabled on the network element, the network element will use CHAP algorithm. The feature enables a secure authentication mechanism which can be used along with the normal LOCAL/RADIUS authentication mechanisms. To Enable Challenge-Response Authentication: 1. Click Security in the Navigation menu. 2. Click Security Settings. 3. Set the secret in TextBox, CHAP Secret (By default it is "testing123"). 4. Select Enable for CHAP Settings (By default it is enabled). 5. Click Submit. A success message is displayed. 6. To log into the node using Challenge-Response Authentication, 7. Enter Username. 8. Select Domain as CHALLENGE 9. Click Submit. 10. Enter response. 11. Click Submit. Authentication result is displayed.

Blocking IPs
Admin can block the IP's so that it disallows complete access to Network Element from that source IP. This feature is useful to block the malicious IP Address attempting to gain unauthorized access to Network Element. To View Blocked IPs: 1. Click Security in the Navigation menu. 2. 3. Click Security Settings. Select BlockedIPs link. The list of Blocked IPs is displayed. 4. To Block IP, 5. Log into the network element with admin access privilege. 6. Click Security in the Navigation menu. 7. Click Security Settings. 8. Select BlockedIPs link The list of Blocked IPs page is displayed. 9. Click Block a New IP link. 10. Enter IP in the IPAddress. 11. Click BlockIP.
Egate-2000 Ver. 1.0 Working with the Radius Server 4-123

Chapter 4 User Interface Guide

Installation and Operation Manual

A success message is displayed. 12. To Unblock IP, 13. Click Security in the Navigation menu 14. Click Security Settings. 15. Select BlockedIPs link 16. Select one of the IP in the list 17. Click UnblockIp. The open ports to NE might be unused and can be vulnerable to attacks from outside. Port scanners such as nmap utility can be used to determine the open ports on the NE. The hacker can stop/affect NE functionalities by detecting the vulnerabilities in any of these open ports. Administrator should block such vulnerable ports. After upgrading the services with latest patches, administrator can unblock these ports. To View Blocked Ports: 1. Click Security in the Navigation menu 2. Click Security Settings. 3. Click BlockedPorts link. The list of Blocked Ports is displayed. 4. To Block Ports, 5. Log into the network element with admin access privilege. 6. Click Security in the Navigation menu. 7. Click Security Settings. 8. Select BlockedPorts link List of Blocked Services page is displayed 9. Click Block a New Service. 10. Enter port number to be blocked. 11. Click BlockService. A success message is displayed. 12. To Unblock Port, 13. Click Security in the Navigation menu. 14. Click Security Settings. 15. Select BlockedPorts link. 16. Select one of the Ports from the list. 17. Click DeleteService. A success message is displayed.

4-124

Working with the Radius Server

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Audit Logs
To view Audit logs: 1. Click Security in the navigation menu. The sub menu items are listed, based on the type of operation done 2. Click Audit Logs. The Audit Log page is displayed. The following table describes the parameters on the Audit Log page.

Table 4-74. Audit Log page


Field Index Operation Description Displays the Index number of the log. Displays the type of operation done Object Attributes Time Session Interface User Host LATEST OLDER Add Change Delete

Displays the object ID on which the operation is done. Displays the attributes associated with object. Displays the Date and Time of the operation. Displays the Session number. Displays the type of interface used for the operation. Displays the name of the user. Displays the IP address of the Host. Click link to display the latest set of audit log. Click link to display the older set of audit log.

HTTP Sessions
The HTTP sessions menu enables you to configure the maximum number of HTTP sessions on the network element and the HTTP session timeout. The menu also displays all the active HTTP sessions at any point in time. The following table describes the HTTP Session Parameters:

Table 4-75. HTTP Session Parameters


Parameter Default/Accepta ble Values 60 10 Description

Session Timeout (Minutes) Maximum HTTP Sessions

The time duration after which the session times out. The maximum number of HTTP sessions allowed on the network element. Working with the Radius Server 4-125

Egate-2000 Ver. 1.0

Chapter 4 User Interface Guide Parameter Default/Accepta ble Values Description

Installation and Operation Manual

Index User Host Client Established Last Activity Domain Connection Security Force-out

The Index number assigned to the session. The user logged into the network element. The remote IP address from which the network element is accessed. Displays the Browser name at the Host IP which is being used for the HTTP session. The date and time when the session was established. The date and time when the session was closed.

Displays the domain name. Displays Secure if login is HTTPS session and Insecure if the login is HTTP session The admin can terminate the HTTP session of the user or operator forcibly

Viewing HTTP Session Information


Click Security > User Session > HTTP Sessions in the navigation menu. The information on the Active HTTP sessions is displayed on the Input/Output area.

Configuring HTTP Session


To configure the maximum HTTP sessions allowed on the system and the session timeout parameters: 1. Click Security > HTTP Sessions in the navigation menu. The information on the Active HTTP sessions is displayed on the Input/Output area. 2. Enter values for the HTTP Session Timeout and Maximum HTTP sessions referring to the table mentioned under HTTP Sessions. 3. Click Submit. A confirmation page is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Session history
To view active Sessions History: 1. Click Security in the navigation menu. The sub menu items are listed. 2. Click User Sessions.

4-126

Working with the Radius Server

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

3. Click Sessions History. The information on the Sessions history page is displayed. The following table describes the parameters on the Sessions History Page

Table 4-76. Name of Table


Field Index Status User Domain Connection Security Client Host Established Closed Description Displays the Index number of the log. Displays status of the link. Displays the name of the user. Displays domain name. Displays connection security. Displays the client details. Displays the IP address of the Host. Displays the Date and Time at which the session was established. Displays date and time at which the session was closed.

Invalid Logins History


The InvalidLogins History link provides the details of active sessions. The following table describes the parameters on InvalidLogins History Page
Field Index User Domain Connection Security Client Host Established LATEST NEXT PREVIOUS Description Displays index number. Displays user name. Displays domain name Displays Connection Security Displays the client details. Displays the Host Displays the Established Click LATEST link to view the latest sessions history page. Click NEXT link to view the next list of sessions history page. Click PREVIOUS link to view the previous list of sessions history page.

To view InvalidLogins History: 1. Click Security in the navigation menu. The sub menu items are listed.

Egate-2000 Ver. 1.0

Working with the Radius Server

4-127

Chapter 4 User Interface Guide

Installation and Operation Manual

2. Click User sessions. The sub menu items are listed. 3. Click InvalidLogins History. The Invalid Login Sessions History page is displayed.

4.15 Maintenance Operations


This chapter describes the operations available under Maintenance in the Navigation menu.

Viewing and Editing System Settings


The System settings menu helps you to set the crash recovery option for the network element. It also allows you to set the time zone for the performance day bin rollover. The following table describes the System Setting Parameters

Table 4-77. System Setting Parameters


Parameter Performance Day Bin Rollover timezone Default Value Local Description Parameter to set timezone for performance day bin rollover. GMT: Performance Day Bin Rollover is set as per GMT Time zone. Local: Performance Day Bin Rollover is set as per GMT Time zone.

To view and edit system settings: 1. Click Maintenance > System Settings in the navigation menu. The System Settings preview pane is displayed.

4-128

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Figure 4-27. Maintenance Operations


2. Select values referring to table above. 3. Click Submit.

A "Successfully Modified" message is displayed.

Viewing System Changes


The System Changes explains the system level changes like node upgrade, card delete and SFP delete. The following table lists the parameters on the System Changes page.

Table 4-78. System Changes


Parameter Operation Time Detail Description Displays the operation performed on the node. Displays the time of operation performed on the node. Displays the operation details of the event performed on the node.

To view system changes, click Maintenance > System Changes in the navigation menu. The System Changes preview pane is displayed.

Viewing Load Availability


The Load Availability link details the information about the software release. To view load availability,click Maintenance > Load availability in the navigation menu. The Load Availability preview pane is displayed. The following table lists the parameters on the Load Availability page.

Egate-2000 Ver. 1.0

Maintenance Operations

4-129

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-79. Load Availability


Field Software Image Firmware Image Documentation Image Catalog Unified Tarkit Available Description Displays the software release of the network element. Displays the firmware release of the network element. Displays the documentation bundle available for the software release. Displays the catalog file name. True indicates that Unified Tarkit is available. False indicates that Unified Tarkit is not available.

Rebooting cards
Cards need to be rebooted in case of FPGA upgrades or when alarms are not reported properly on the card. Cards can be rebooted in two ways: Warm reboot: Warm reboot does not affect traffic on the card. Cold reboot: Cold reboot disrupts traffic on the card for the period while the card is rebooting.

Warm Rebooting cards


To warm reboot cards: 1. Click Maintenance > Warm Reboot cards in the navigation menu. The Warm Reboot cards preview pane is displayed. 2. Select the cards to be rebooted in the Warm Reboot column. 3. Click Submit. A "Successfully Modified" message is displayed.

Cold Rebooting cards


To cold reboot cards: 1. Click Maintenance > Cold Reboot cards in the navigation menu. The Cold Reboot cards preview pane is displayed. 2. Select the cards to be rebooted in the Cold Reboot column. 3. Click Submit. A "Successfully Modified" message is displayed.

4-130

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Restarting Network System


The System Restart Options enable you to restart the network system in two modes: Warm restart is a service non-disruptive process in which the traffic is not affected during the restart period. Cold restart is a disruptive process in which the traffic is affected during the restart period.

Warm Restarting a network element


To restart a network element in the warm restart mode: 1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load management preview pane is displayed. 2. Click the Warm restart button. The network element restarts in the warm restart mode.

Cold Restarting a network element


To restart a network element cold restart mode: 1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load management preview pane is displayed. 2. Click Cold restart button. The network element restarts in the cold restart mode.

Performing Loop-backs
Loopbacks are performed to check the continuity on SDH/SONET or Ethernet ports. The ports can be configured for facility loopback. The exact location of failure can be detected using loopbacks. You can perform facility to test the optical (STM-1/4 or OC-3/12) connectivity of the network element. When a facility loopback is operated on optical ports, AIS is sent downstream.

Caution Facility loopback is traffic affecting. Application of facility or terminal loopback on


the near end port (with respect to NMS server) of a remotely managed node will result in loss of connectivity with the node and the downstream network. Hence, while applying loopbacks, the node should be provided with IBC protection.

Egate-2000 Ver. 1.0

Maintenance Operations

4-131

Chapter 4 User Interface Guide

Installation and Operation Manual

Figure 4-28. Ethernet connectivity to NMS server


Figure above shows the connectivity of the nodes of the nodes to the NMS server. Facility or terminal loopbacks can be created at the near end ports of Node A without loss of connectivity due to presence of Ethernet connectivity. But, provisioning loopbacks at the near end and far end ports of Node B and Node C will lead to loss of connectivity to the downstream network. The following table describes the loop-back mode parameters

Table 4-80. Loop-Back Mode


Parameter Normal Operation Facility Loopback Description Normal operation is configured on the Ethernet ports. Loopback is configured at the ingress.

Performing Loopback on STM ports


To perform loopback on STM ports: 1. Click Maintenance > Loop-Backs > STM/OCn in the navigation menu. The STM/OCn Port loopback preview pane is displayed. 2. Click the port on which you want to perform the loopback. The Port maintenance preview pane is displayed. 3. Select the desired loopback operation from the LoopBack Mode drop-down menu. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

4-132

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Viewing Stem Diagnostics


The Diagnostics menu enables the user to view the system diagnostics and the OSPF related information. The OSPF monitor enables monitoring the neighbors of a particular node and debugging the routing information for the IBC (In Band Communication). The OSPF parameters can be configured for all the embedded control channel interfaces and for the NMS port to enable routing between these interfaces. System diagnostics data comprises log files and dump files which provide information on faults. The diagnostic data can be used for analyzing problems arising in any network element. The following OSPF protocol member parameters can be accessed in the Diagnostics menu.

Areas
The Area indicates the Open Shortest Path First area to which an attached network belongs. The area data structure contains all the information used to run the basic OSPF routing algorithm. Each area maintains its own link-state database. A network belongs to a single area, and a router interface connects to a single area. Each router adjacency also belongs to a single area. The following table describes the OSPF area parameters:

Table 4-81. Name of Table


Field Area #Ifcs #Routers #LSAs (Link State Advertisement) Xsum Comments Description Displays the area ID, which is a 32-bit number identifying the area. Displays the number of ECC interfaces which are part of the area. Displays the number of reachable routers in the area. Displays the total LSAs in the network pertaining to this area. Displays the checksum on the area database maintained by the node. Displays the description of the area capability transit/stub/demand-capable/no-import.

Database
The Database member displays the format and function of the LSA. The following table describes the OSPF Database Parameters:

Egate-2000 Ver. 1.0

Maintenance Operations

4-133

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-82. OSPF Database Parameters


Field LSA Type LS ID Adv.Rtr LS Seqno Xsum Length Age Description Displays the format and function of the LSA. Displays LS ID. Displays the OSPF Router ID of the Router originating the LSA. Displays the signed 32-bit integer used to detect old and duplicate LSAs. Displays the checksum of the complete contents of the LSA, except the LS age field. Displays the size in bytes of the LSA. Displays the age of the LSA in seconds.

Interfaces
The Interfaces member displays the type of physical network interface. Different interfaces are eth, hdlcppp or ecc. The following table describes the OSPF interface parameters:

Table 4-83. OSPF Interface Parameters


Field Phys Add Area Type Description Displays the name of physical network interface. Different interfaces are eth, hdlcppp, ecc. Displays the address of the interface available. Displays the area of the OSPF network to which interface belongs. Indicates the type of the link. Types of links can be BCast (Broadcast) P-P (Point-to-Point) State #Nbr #Adj Cost Displays the state of the OSPF process. Displays the number of neighbors on the link. Displays the number of adjacencies maintained by the network element's OSPF database. Displays the metric used to quantify links which the network element has with other network elements.

Neighbors
The Neighbors member displays the name of the physical network interface, address, router ID and state of the neighbors. The following table describes the OSPF neighbors parameters:

4-134

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

Table 4-84. OSPF Neighbors Parameters


Field Phys Add ID State Description Displays the name of physical network interface. Different interfaces are eth, hdlcppp, ecc. Displays the address of the neighboring network element. Displays the OSPF router Id of the neighboring network element. Displays the state of the OSPF process. Full: Indicates completion of the OSPF process, where the routing information has been completely exchanged with the neighbour. Exchange: Indicates that information exchange between the neighbors is underway. 1-Way: Indicates traffic transmission is possible only from the network element to its neighbour and not vice versa, due to some error/defect. 2-Way: Indicates that traffic transmission is possible from network element as well as from its neighbour. #DD #Req #Rxmt Displays the number of database descriptor packets being received by the network element. Displays the number of requests received by the network element for a database description over that interface. Displays the number of retransmissions of database descriptions requested by the neighbors due to errors/defects in the previous transmission.

Statistics
The Statistics member displays the checksum of number of external LSAs received by the network element and also the checksum of the Autonomous System (AS) externals. The following table describes the OSPF statistics parameters:.

Table 4-85. OSPF Statistics Parameters


Field Router ID # AS-external-LSAs ASE checksum #ASEs originated ASEs (Autonomous System External) allowed #Dijkstras #Areas Description Displays the 32-bit number assigned to each router running the OSPF protocol. Displays the number of external LSAs received by the network element. Displays the checksum of the AS externals. Displays the number of external LSAs originated by the network element. Displays the maximum number of AS-external-LSAs in the database. Displays the number of times the dijkstra algorithm run on the LSA database. Displays the number of areas the network element is a part of.

Egate-2000 Ver. 1.0

Maintenance Operations

4-135

Chapter 4 User Interface Guide Field #Nbrs in Exchange MOSPF enabled Inter-area multicast Inter-AS multicast In overflow state Ospfd version Description

Installation and Operation Manual

Displays the number of #Nbrs undergoing a database exchange. Displays if multicast OSPF is enabled or not. Displays if Inter-area multicast is supported or not. Not supported. Displays if the number of external LSAs has exceeded the upper limit. Displays the version of the OSPF software running in the network element.

LSA expansions
The LSA Expansion member allows selecting the format and function of the LSA. The following table describes the OSPF LSA expansions parameters:

Field Area ID LS Type

Description Select the identity of set of networks grouped together by the OSPF. Select the format and function of the LSA. The following formats are available:


LS ID Adv Rtr

router-LSA network-LSA summary-LSA ASBR-summary-LSA AS-external-LSA group-membership-LSA

Enter the routing domain that is being described by the LSA. Enter the OSPF Router ID of the router originating the LSA.

AS externals
The AS externals member displays the number of LSAs in the database of the autonomous system. The following table describes the OSPF AS externals parameters:

Table 4-86. OSPF AS Externals Parameters


Field LSA Type LS ID Adv Rtr Description Displays the format and function of the LSA. Displays the routing domain that is being described by the LSA. Displays the OSPF Router ID of the router originating the LSA.

4-136

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual Field LS Seqno Xsum Length Age Description

Chapter 4 User Interface Guide

Displays the signed 32-bit integer used to detect old and duplicate LSAs. Displays the checksum of the complete contents of the LSA, excepting the LS age field. Displays the size in bytes of the LSA. Displays the age of the LSA in seconds.

Routing table
The Routing Table member displays all the neighboring network element information indicating the number of hops to reach any node. The following table describes the OSPF Routing table parameters:

Table 4-87. OSPF Routing Table Parameters


Field Prefix Type Description Displays the Prefix for the address. Select the format and function of the LSA. The following formats are available: router-LSA network-LSA summary-LSA ASBR-summary-LSA AS-external-LSA group-membership-LSA Cost Ifc Next-hop #Paths Enter the routing domain that is being described by the LSA. Enter the OSPF Router ID of the router originating the LSA. Displays the IP address of the next network element through the link. Displays the number of paths available to the destination network element/network from the source network element.

Opaque-LSAs
The Opaque-LSA member displays the checksum of the complete contents of the Opaque LSAs. The following table describes the OSPF Opaque-LSAs parameters:

Egate-2000 Ver. 1.0

Maintenance Operations

4-137

Chapter 4 User Interface Guide

Installation and Operation Manual

Table 4-88. OSPF Opaque-LSAs Parameters


Field Phyint IP Address Area LS type LS ID Adv. Rtr LS Seqno Xsum Length Age Description Displays the name of physical network interface. Displays the set of networks grouped together by the OSPF. Displays the set of networks grouped together by the Area. Displays the piece of routing domain that is being described by the LSA. Displays the OSPF Router ID of the router originating the LSA. Displays the signed 32-bit integer used to detect old and duplicate LSAs. Displays the checksum of the complete contents of the LSA, except the LS age field. Displays the size in bytes of the LSA. Displays the length of the LSA in seconds. Displays the age of the LSA in seconds.

Viewing System Information


You can view the system information of the network element using system information menu. The following table lists the System menu parameters.

Table 4-89. System Menu Parameters.


Field ifconfig Routing Table ARP Description Displays the information about interfaces of the network element. Displays the information of IP routing of the network element discovered automatically through OSPF protocol. Displays the Address Resolution Protocol (ARP). ARP is the method for finding a link layer of the host (hardware) address when only the respective Internet Layer (IP) or some other Network Layer address is known. Enables the user to know the reachability of any adjacent network elements by putting the IP address in the specified box. Displays the number of hops or distance to reach any other adjacent network element in the network.

Ping

Trace route

4-138

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual Field Netstat Description

Chapter 4 User Interface Guide

Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics.

To view system information: 1. Navigate to Maintenance > Diagnostic > DCN Monitor > System in the navigation menu. 2. Click on the desired System menu parameter that you want to view the information. The following table describes the Routing Table parameters.

Table 4-90. Routing Table Parameters


Parameter Field Destination Gateway Genmask Routing Table Flags Metric Ref Use Iface Address HWtype ARP HWaddress Flags Mask Ping c Ping s start ping Trace Trace start trace Proto Description Displays the destination IP of the network element. Displays the IP address of the gateway network element. Displays the subnet mask. Unused Unused Unused Unused Displays the type of interface. Displays the host's link layer (hardware) address. Displays the hardware type. Displays the hardware address. Unused Unused Enter the IP address. Displays the number of packets to ping. Displays the number of bytes (size) of the packet. Click this button to start the search operation and fetch the Ping Statistics. Enter the IP address to trace and print a network path to the host. Click this button to start the search operation and fetch the Trace Statistics. Displays the type of protocol.

Netstat

Egate-2000 Ver. 1.0

Maintenance Operations

4-139

Chapter 4 User Interface Guide Parameter Field Recv-Q Send-Q Local Address Foreign Address State PID/Program name Description

Installation and Operation Manual

Specifies the number of bytes which are not received. Specifies the Number of Bytes not send to destination. Displays the local IP address. Displays the remote IP address. Unused Displays the program name.

Accessing OSPF diagnostics data


To access OSPF diagnostic data, click Maintenance > Diagnostics > DCN Monitor > OSPF in the navigation menu. The Areas member preview pane is displayed.

Backing Up Configuration
The user interface provides options for backing up the configuration and storing it on a selected server. Backup configuration is used for saving the network element configuration. This command copies the existing snapshot of the configuration and stores it to the server mentioned using the FTP protocol. In case of backup failure, a backup operation failure alarm is raised. This command obtains the configuration, using the FTP protocol from a remote server, performs checks and accepts the configuration if applicable to the network element. In case of failure, a restore failure alarm is raised. Restoring the configuration can be done by either restoring from remote machine via FTP or from the local machine using HTTP. The network element gives an error message for the cause of the failure. The messages may be due to one of the following reasons: Username, password authentication failure Unable to reach the server IP address Incorrect permissions to transfer file

The network element can recover from restoration operation failures due to network unavailability by using FTP timeout of 15 seconds. The network element verifies the validity of the restored configuration. The activation of restored configuration shall be non-service affecting for the unaffected configuration. If the verification fails, the restored configuration is rejected and configuration restore failure alarm is raised. The network element raises an alarm on detecting configuration corruption or version mismatch without affecting traffic.

Backing up of configuration data


To take backup of configuration data: 1. Click Maintenance > Configuration management > Backup Configuration in the navigation menu.
4-140 Maintenance Operations Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

The Backup Configuration preview pane is displayed. 2. Select or enter values referring to Configuration Backup Parameters table. 3. Click Submit. You are connected to a PC on which you want to back up the configuration data. 4. Create a backup file in the PC.

Note

It is recommended to perform a network element database backup on a daily basis.


The following table describes the Configuration Backup Parameters

Table 4-91. Configuration Backup Parameters


Parameter User Name Password IP Address FTP Port (optional) Directory Default Value Description The user name of the system on which the configuration backup is to be created. The password of the system on which the configuration backup is to be created. The IP address of the system where the configuration backup is created. The FTP port number for establishing connection with system having the configuration backup. The Directory in which the back up file is to be placed.

Note

The Node Configuration state is displayed at the bottom of the preview pane and is refreshed for every few seconds. The Configuration state displayed is the last operation performed with the configuration management.

Restoring Configuration
To restore configuration: 1. Click Maintenance > Configuration management > Restore Configuration in the navigation menu. The Restore Configuration preview pane is displayed. 2. Edit required values referring to the below table. 3. Click Submit. You are connected to the PC from which you want to restore configuration. 4. Locate and click the configuration file. The configuration is restored on the network element. 5. Click Commit for the restored configuration to take effect.

Egate-2000 Ver. 1.0

Maintenance Operations

4-141

Chapter 4 User Interface Guide

Installation and Operation Manual

Note

The remote server should have an FTP server installed on it to carry out the Restore configuration data command. For a Linux system, FTP server is inbuilt. For a windows system, an IIS server provided along with windows or any third party server such as 3com server needs to be installed.
The following table describes the Restore Configuration Parameters

Table 4-92. Restore Configuration Parameters


Parameter Configuration Operation Default Value Restore Configuration from Remote Machine Description Parameter to select if the configuration is to be backed up from Remote machine or local machine. Restore Configuration from Remote Machine: Configuration is backed up from remote machine. Restore Configuration from Local Machine: Configuration is backed up from local machine. User Name Password IP Address FTP Port (optional) Directory The user name of the system where the backup configuration is present. The password of the system on which the backup is present. The IP address of the system where the backup is present. The FTP port number for establishing connection with system having the configuration backup. The Directory in which backup configuration file is present.

Note

Cold reboot the shelf after committing the configuration. The Node Configuration state is displayed at the bottom of the preview pane.

Caution The restoration of configuration data of a network element is service disruptive.


The new configuration data requires backup. Restoration could be done from a system which has an FTP server.

Restoring Factory Default settings


The Restore factory defaults menu is used when all configuration data of a node is to be deleted or when the node has to be brought down with the factory default settings. While restoring the factory defaults, all configuration information, event history and performance data are deleted. The factory defaults can be restored only by the ADMIN user.

Note

The password used for login is the same as the login password of the node. If the wrong password is entered, WUI will log out.

4-142

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

To restore factory default settings: 1. Click Maintenance > Configuration management > Restore factory defaults in the navigation menu. The Restore factory defaults preview pane is displayed. 2. Check the option "Also Delete All User Profiles" to delete all the user profile. 3. Enter the password to proceed. 4. Click Restore factory defaults button.

The network element is re-initialized. Note All configuration information, event history and performance data will be deleted on restoring factory default settings. The Restore factory default operation brings down existing traffic. Perform this action only when the network element requires re-initialization. A power cycle is necessary after the operation. The Restore factory default operation does not delete configured user names and profiles. To delete the user names and profiles, select the Also delete All User Profiles check box.

Upgrading Software
Users with ADMIN privileges can download software, firmware and documentation from either the local machine using HTTP or a remote machine using FTP with all the upgrade binaries available on the FTP server. The process of downloading and activating software does not affect services. During the software download operation, existing functionality of the network element remains unaffected, unless otherwise stated in the release notes. You can download the SSL certificate through the user interface. A firmware upgrade involves the upgrade of boot loader, root file system and operating system. The firmware bundle is checked for checksum and the version. Firmware download is non-service affecting and requires a warm restart to take effect. During documentation upgrade, the documentation bundle is checked for checksum and the version. The five steps involved in the unified upgrade operations are: Software download: Downloads the software from remote or local machine onto the network element. The upgrade bundle present in the remote server is usually in the form of a tar kit containing a catalogue, the software and firmware. If the upgrade bundle does not contain the software and firmware, the software and firmware needs to be upgraded separately. When upgrading from a local machine, the software and firmware is usually upgraded separately. Check upgrade: Checks the downloaded software files for corruption. Also checks if the downloaded software file is the correct one required for upgrade. Load upgrade: Loads the downloaded content into the proper directory on the network element.

Egate-2000 Ver. 1.0

Maintenance Operations

4-143

Chapter 4 User Interface Guide

Installation and Operation Manual

Invoke upgrade: Invokes the new software on the network element. The node goes for a warm reboot. After invoking, the new software and firmware comes into effect and the network element is upgraded. Commit upgrade: On committing upgrade, the user cannot revert back to the previous software.

Note

Only software image files (with extension .img) can be downloaded using HTTP, where as firmware files, software load and documentation can be downloaded using FTP. The Upgrade operations menu is applicable only for some products.

Upgrading Software
To upgrade software: 1. Click Maintenance > Upgrade Operations > Unified Upgrade in the navigation menu. The Unified Upgrade preview pane is displayed. 2. Edit required values referring to the table. 3. Click Submit. The software download state is displayed at the bottom of the preview pane. 4. Click Stop/Start Refresh button to stop or start the refreshing of the software download state. The following table describes the Unified upgrade parameters.

Table 4-93. Unified Upgrade Parameters


Parameter Software Download Operation Default Value Deliver release from Remote machine Description User name Password IP Address Retrieve Release: Retrieves the current software version. Retrieve state: Retrieves the current state of upgrade. Retrieve space: Retrieves the free disk area in the partition meant for upgrade. Deliver release from local machine: Retrieves files from local machine using HTTP. Deliver release from remote machine: Retrieves files from Remote machine using FTP. Check release: Checks if the software is the correct software to be downloaded.

User name of the system where the catalog. xml along with software, firmware resides. The password of the system where the catalog. xml along with software, firmware resides. The IP address of the system where the catalog.xml along with software, firmware resides.

4-144

Maintenance Operations

Egate-2000 Ver. 1.0

Installation and Operation Manual Parameter FTP Port (optional) Directory Default Value Description

Chapter 4 User Interface Guide

The FTP port number for establishing connection with system where the catalog.xml along with software, firmware resides. The Directory where the catalog.xml along with software, firmware resides.

Note

User name, Password, IP Address, FTP Port and Directory are present only when the 'Deliver release from remote machine' is selected for Software Download Operation. For 'Deliver release from local machine', the File Name text field is displayed to enter the file name.

Downloading SSL Certificate


This option enables the user to upgrade the SSL certificate through the user interface. To download an SSL certificate: 1. Click Maintenance > Upgrade operations > SSL certificate in the navigation menu. The SSL Certificate Download page is displayed. 2. Enter the required data against the fields. 3. Click Submit. The following table describes the parameters of SSL certificate download page

Table 4-94. SSL Certificate


Field Username Password IP Address FTP port(Optional) Description Allows you to enter the username of the system from where you are downloading the certificate. Allows you to enter the password of the system. Allows you to enter the IP address of the system from where you are downloading the certificate. Allows you to enter the FTP port number for accessing the remote server (It is an optional field. If left blank, default port values 20 and 21 are used). Allows you to enter the source directory address to download the certificate. Allows you to enter name of the certificate.

Directory File name

Upgrading Firmware
To upgrade firmware from remote machine: 1. Click Maintenance > Upgrade Operations > Firmware in the navigation menu. The Firmware download preview pane is displayed.
Egate-2000 Ver. 1.0 Maintenance Operations 4-145

Chapter 4 User Interface Guide

Installation and Operation Manual

2. Enter or select required values referring to table below. 3. Click Submit. The desired firmware is downloaded to the network element. 4. To upgrade firmware from local machine, 5. Click Maintenance > Upgrade Operations > Firmware in the navigation menu. The Firmware download preview pane is displayed. 6. Click the Download Firmware from local machine link. Enter or browse for the Firmware file name and click Submit. The firmware is downloaded on to the cross-connect card.

Note

While upgrading firmware in the Primary cross-connect card, the firmware is downloaded to both the primary and the secondary cross-connect cards. After the system is up after warm reboot on successful download, the primary and the secondary cross-connect cards have the same firmware.
The following table describes the Firmware download parameters

Table 4-95. Firmware


Fields User name Password IP Address FTP port (optional) Directory File name Card Name Description Enter the user name of the PC to be accessed. Enter the password of the PC to be accessed. Enter the IP address of the PC to be accessed. Enter the FTP port number for accessing the remote server.(It is an optional field) Enter the directory where the firmware file is located. Enter the firmware file name. Select the intelligent card for which firmware is to be downloaded.

4.16 Glossary of Terms


A
APS
Automatic Protection Switching. Automatic Protection Switching is the capability
of a transmission system to detect a failure on a working facility and to switch to a standby facility to recover the traffic. This capability has a positive effect on the overall system availability. Only the Multiplex Section in SDH is protected in this automatic fashion. The Multiplex Section protection mechanisms are coordinated by the K1 and K2 bytes in the Multiplex Section Overhead. Path protection is managed at a higher level by network management functions.
4-146 Glossary of Terms Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

ARP
Address Resolution Protocol. A protocol in the TCP/IP suite used to associate logical addresses to physical addresses.

AU
Administrative Unit is the information structure which provides adaptation between the Higher-Order path layer and the Multiplex Section layer. The Virtual Container (VC) plus the pointers (H1, H2, H3 bytes) is called the Administrative Unit (AU).

C
CFM
Connectivity Fault Management. Ethernet CFM is an end-to-end, per-serviceinstance (refers to per VLAN) Ethernet layer OAM protocol, that includes proactive connectivity monitoring, fault verification, and fault isolation. End-toend can be PE to PE or Customer Edge to Customer Edge.

CRC
Cyclic Redundancy Check. A type of function that takes as input a data stream of
any length and produces as output a value of a certain fixed size. The term CRC is often used to denote either the function or the function's output.

CVLAN
Customer VLAN. Two sets of VLAN tags are used so that customers and carriers
can define a C-VLAN (customer VLAN).

D
DCN
Data Communication Network is SDH network that enables OAM communication between individual network elements as well as inter network element communication.

E
ELAN
Emulated Local Area Network. An emulated LAN is a set of clients and servers connected by virtual circuits over a network.

Egate-2000 Ver. 1.0

Glossary of Terms

4-147

Chapter 4 User Interface Guide

Installation and Operation Manual

EPLAN
Ethernet Private Local Area Network puts service access points as a basic unit to
realize the multipoint-to-multipoint transparent transmission of Ethernet MAC frame.

ERP
Ethernet Ring Protection. A mechanism used for reliable switching and avoiding
loops without using spanning tree protocols.

EVC
Ethernet Virtual Circuit. An entity that associates ports subscribing to the same
service.

EVPLAN
Ethernet Virtual Private Local Area Network. Permit service multiplexing at the Ethernet user-to-network interface. In EVPLAN, different users share the SDH bandwidth, the VLAN tag distinguishes data from different users.

F
FDB
Forwarding Database is a database that contains information that maps the
Media Access Control (MAC) address of each known device to the switch port where the device address was learned. The FDB also shows which other ports have seen frames destined for a particular MAC address.

FPCR
Flowpoint Classification Rule.

FPT
Flowpoint Template is a collection of rules (FPCR) that get assigned to a flowpoint to identify flows on the port. A flowpoint is based on a template comprising one or more classification rules. The flowpoint template is specific for 802.1q and 802.1ad interface.

FTP
File Transfer Protocol. A standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet.

4-148

Glossary of Terms

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

I
IP
Internet Protocol. Network layer protocol in the TCP/IP stack offering a
connectionless internetwork service and providing features for addressing, typeof-service specification, fragmentation and reassembly, and security.

IP-Address
Internet Protocol Address. A 32-bit address assigned to host using TCP/IP. An IP
address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods (dotted decimal format). Each address consists of a network number, an optional sub-network number, and a host number.

L
L2CP
Layer 2 Control Protocol is a set of different protocol that is applied at the UNI or per EVC. Link Aggregation Control Protocol (LACP) and Spanning Tree Protocol (STP) are Layer 2 control protocols.

LAG
Link Aggregation Group. A method for using multiple parallel links between a pair of devices as if it is a single higher-bandwidth channel.

LAN
Local Area Network. A computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates, smaller geographic place, and lack of a need for leased telecommunication lines.

LCAS
Link Capacity Adjustment Scheme. A method to dynamically increase or decrease
the bandwidth of virtual concatenated containers.

LED
Light Emitting Diode. A semiconductor diode that emits incoherent narrowspectrum light when electrically biased in the forward direction of the p-n junction. This effect is a form of electro-luminescence.

LFD
Plesiochronous Digital Hierarchy (PDH). A technology used in telecommunications
networks to transport large quantities of data over digital transport equipment such as fibre optic and microwave radio systems.
Egate-2000 Ver. 1.0 Glossary of Terms 4-149

Chapter 4 User Interface Guide

Installation and Operation Manual

M
MAC
Media Access Control. A sublayer of the Data Link Layer specified in the sevenlayer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically a local area network (LAN) or metropolitan area network (MAN).

MAC Address
Media Access Control address. An addresstypically made up of numbers and lettersassigned to your hardware that uniquely identifies its place on the network.

MEP
Maintenance End Points. Connectivity Fault Management (CFM) divides the network into maintenance domains in the form of hierarchy levels, which are then allocated to users, service providers and operators. CFM assigns maintenance end points (MEPs) to the edges of each domain. This helps define the relationships between all entities from a maintenance perspective, to allow each entity to monitor the layers under its responsibility and easily localize problems.

MIM
MAC-in-MAC is an encapsulation scheme used by provider edge node for frame
forwarding and to make Ethernet frame more scalable. The MiM encapsulation scheme reduces the forwarding table size in the core network, but not in the provider edge nodes which need to maintain the entries of mapping end users MAC address to provider edge MAC address.

MSP
Multiplex Section Protection. A port level protection supported on the STM
interfaces. MSP schemes involve reserving a dedicated protection channel with the same capacity as the work channel.

MSPP
Multi-Service Provisioning Platform enable service providers to offer customers new bundled services at the transport, switching and routing layers of the network.

4-150

Glossary of Terms

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

N
NMS
Network Management System. An integrated platform for managing network
elements across an intelligent optical network. The NMS collects and represents data from geographically dispersed network elements on to a console in a centralized Network Operations Center (NOC).

NNI
Network to Network Interface. An interface which specifies signaling and
management functions between two networks.

O
OAM
Operation Administration Maintenance. A general term used to describe the
processes, activities, tools, standards, etc involved with operating, administering, managing and maintaining any system.

OSPF
Open Shortest Path First. A dynamic routing protocol for use in Internet Protocol
(IP) networks.

Q
QoS
Quality of Service. A mechanism that allows service providers to offer different classes of service to their customers.

R
RPL
Ring Protected Link. RPL owner node is a central node in Ethernet ring protection
switching which blocks one of the ports to ensure that there is no loop formed for the Ethernet traffic. The link which gets blocked by the RPL is called Ring Protection Link.

S
SD
Signal Degrade.

Egate-2000 Ver. 1.0

Glossary of Terms

4-151

Chapter 4 User Interface Guide

Installation and Operation Manual

SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.

SFP
Small Form-factor Pluggable. A compact optical transceiver used in optical
communications for both telecommunication and data communications applications. It interfaces a network device mother board (for a switch, router or similar device) to a fiber optic or unshielded twisted pair networking cable.

SNMP
Simple Network Management Protocol. SNMP is used in network management
systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects.

SONET
Synchronous Optical Network is an American National Standards Institute (ANSI) standard for high speed communication over fiber-optic networks. SONET uses time division multiplexing to send multiple data streams simultaneously.

STM
Synchronous Transport Module. The rate of transmission of the SDH (ITU-T fiber
optic network transmission) standard. The levels are STM-1, STM-4, STM-16 and STM-64.

SVLAN
S-VLAN Service Provider VLAN. A port VLAN ID configurable by the service provider
and can assign any value between 1 and 4094 of any Ethernet or VCG port on per-port basis.

T
TCA
Threshold Crossing Alert is set on B1, B2 and B3 bytes for Signal Failure (SF) and Signal Degrade (SD) conditions. The SD and SF conditions are sourced from error counts of B1, B2 and B3 parity bytes. TCA set for the B1, B2 and B3 bytes print a log message to the console when the TCA setting is enabled.

4-152

Glossary of Terms

Egate-2000 Ver. 1.0

Installation and Operation Manual

Chapter 4 User Interface Guide

TU
Tributary Unit is an information structure which provides adaptation between the
lower order path layer and the higher order path layer. It contains the Virtual Container and a tributary unit pointer.

V
VC
Virtual Container. A technique that allows SONET/SDH circuits to be grouped into arbitrarily sized bandwidth increments for more efficient transport of client protocols.

VCAT
Virtual Concatenation. An inverse multiplexing technique used to split SDH/SONET
bandwidth into logical groups, which may be transported or routed independently.

VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller
individual containers, which are grouped together and logically represented by a VCG.

4.17 Technical Support


Technical support for this product can be obtained from the local partner from whom it was purchased. RADcare Global Professional Services offers a wide variety of service, support and training options, including expert consulting and troubleshooting assistance, online tools, regular training programs, and various equipment coverage options. For further information, please contact the RAD partner nearest you or one of RAD's offices worldwide. RAD Data Communications would like your help in improving its product documentation. Please send us an e-mail with your comments. Thank you for your assistance!

Egate-2000 Ver. 1.0

Technical Support

4-153

Chapter 4 User Interface Guide

Installation and Operation Manual

4-154

Technical Support

Egate-2000 Ver. 1.0

Publication No. 531-200-05/12

Order this publication by Catalog No. 803927

International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail market@rad.com

North America Headquarters


900 Corporate Drive Mahwah, NJ 07430, USA Tel. 201-5291100 Toll free 1-800-4447234 Fax 201-5295777 E-mail market@rad.com

www.rad.com