Sie sind auf Seite 1von 182

INSTALLATION AND

OPERATION MANUAL

ETX-102
Basic Ethernet Demarcation Device
Version 3.8

The Access Company

ETX-102
Basic Ethernet Demarcation Device
Version 3.8

Installation and Operation Manual


Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the ETX-102 and
any software components contained therein are proprietary products of RAD protected under
international copyright law and shall be and remain solely with RAD.
The ETX-102 product name is owned by RAD. No right, license, or interest to such trademark is
granted hereunder, and you agree that no such right, license, or interest shall be asserted by
you with respect to such trademark. The RAD name, logo, logotype, and the terms EtherAccess,
TDMoIP and TDMoIP Driven, and the product names Optimux and IPmux, are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their
respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
ETX-102. You are prohibited from, and shall not, directly or indirectly, develop, market,
distribute, license, or sell any product that supports substantially similar functionality as the
ETX-102, based on or derived in any way from the ETX-102. Your undertaking in this paragraph
shall survive the termination of this Agreement.
This Agreement is effective upon your opening of the ETX-102 package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof.
Upon such termination by RAD, you agree to return to RAD the ETX-102 and all copies and
portions thereof.
For further information contact RAD at the address below or contact your local distributor.

International Headquarters
RAD Data Communications Ltd.

North America Headquarters


RAD Data Communications Inc.

24 Raoul Wallenberg Street


Tel Aviv 69719, Israel
Tel: 972-3-6458181
Fax: 972-3-6498250, 6474436
E-mail: market@rad.com

900 Corporate Drive


Mahwah, NJ 07430, USA
Tel: (201) 5291100, Toll free: 1-800-4447234
Fax: (201) 5295777
E-mail: market@rad.com

20042011 RAD Data Communications Ltd.

Publication No. 377-200-0(/1#

Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-102 to be delivered hereunder shall
be free of defects in material and workmanship under normal use and service for a period of
twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-102, and in no event shall
RAD's liability exceed the purchase price of the ETX-102.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-102 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the ETX-102 are provided "as is" and without warranty of any kind.
RAD disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-102 shall
not exceed the sum paid to RAD for the purchase of the ETX-102. In no event shall RAD be liable
for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if
RAD has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.

Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the units use,
customers should provide for its collection for reuse, recycling or other form
of environmentally conscientious disposal.

General Safety Instructions


The following instructions serve as a general guide for the safe installation and operation of
telecommunications products. Additional instructions, if applicable, are included inside the
manual.

Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or service
personnel.

Warning

Danger of electric shock! Avoid any contact with the marked surface while the
product is energized or connected to outdoor telecommunication lines.

Protective ground: the marked lug or terminal should be connected to the building
protective ground bus.

Warning

Some products may be equipped with a laser diode. In such cases, a label with the
laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:

Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the transmitter.

Do not attempt to adjust the laser drive current.

Do not use broken or unterminated fiber-optic cables/connectors or look


straight at the laser beam.

The use of optical devices with the equipment will increase eye hazard.

Use of controls, adjustments or performing procedures other than those


specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.

Handling Energized Products


General Safety Practices
Do not touch or tamper with the power supply when the power cord is connected. Line voltages
may be present inside certain products even when the power switch (if installed) is in the OFF
position or a fuse is blown. For DC-powered products, although the voltages levels are usually
not hazardous, energy hazards may still exist.
Before working on equipment connected to power lines or telecommunication lines, remove
jewelry or any other metallic object that may come into contact with energized parts.
Unless otherwise specified, all products are intended to be grounded during normal use.
Grounding is provided by connecting the mains plug to a wall socket with a protective ground
terminal. If a ground lug is provided on the product, it should be connected to the protective
ground at all times, by a wire with a diameter of 18 AWG or wider. Rack-mounted equipment
should be mounted only in grounded racks and cabinets.
Always make the ground connection first and disconnect it last. Do not connect
telecommunication cables to ungrounded equipment. Make sure that all other cables are
disconnected before disconnecting the ground.
Some products may have panels secured by thumbscrews with a slotted head. These panels may
cover hazardous circuits or parts, such as power supplies. These thumbscrews should therefore
always be tightened securely with a screwdriver after both initial installation and subsequent
access to the panels.

Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.

Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.

The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.

Connecting Data and Telecommunications Cables


Data and telecommunication interfaces are classified according to their safety status.
The following table lists the status of several standard interfaces. If the status of a given port
differs from the standard one, a notice will be given in the manual.

Ports

Safety Status

V.11, V.28, V.35, V.36, RS-530, X.21,


10 BaseT, 100 BaseT, Unbalanced E1,
E2, E3, STM, DS-2, DS-3, S-Interface
ISDN, Analog voice E&M

SELV

xDSL (without feeding voltage),


Balanced E1, T1, Sub E1/T1

TNV-1 Telecommunication Network Voltage-1:


Ports whose normal operating voltage is within the
limits of SELV, on which overvoltages from
telecommunications networks are possible.

FXS (Foreign Exchange Subscriber)

TNV-2 Telecommunication Network Voltage-2:


Ports whose normal operating voltage exceeds the
limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are not possible. These
ports are not permitted to be directly connected to
external telephone and data lines.

FXO (Foreign Exchange Office), xDSL


(with feeding voltage), U-Interface
ISDN

TNV-3 Telecommunication Network Voltage-3:


Ports whose normal operating voltage exceeds the
limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are possible.

Safety Extra Low Voltage:


Ports which do not present a safety hazard. Usually
up to 30 VAC or 60 VDC.

Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.

When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.

Caution

To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line
cords.

Attention

Pour rduire les risques sincendie, utiliser seulement des conducteurs de


tlcommunications 26 AWG ou de section suprieure.

Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.

Electromagnetic Compatibility (EMC)


The equipment is designed and approved to comply with the electromagnetic regulations of
major regulatory bodies. The following instructions may enhance the performance of the
equipment and will provide better protection against excessive emission and better immunity
against disturbances.
A good ground connection is essential. When installing the equipment in a rack, make sure to
remove all traces of paint from the mounting points. Use suitable lock-washers and torque. If an
external grounding lug is provided, connect it to the ground bus using braided wire as short as
possible.
The equipment is designed to comply with EMC requirements when connecting it with unshielded
twisted pair (UTP) cables. However, the use of shielded wires is always recommended, especially
for high-rate data. In some cases, when unshielded wires are used, ferrite cores should be
installed on certain cables. In such cases, special instructions are provided in the manual.
Disconnect all wires which are not in permanent use, such as cables used for one-time
configuration.
The compliance of the equipment with the regulations for conducted emission on the data lines
is dependent on the cable quality. The emission is tested for UTP with 80 dB longitudinal
conversion loss (LCL).
Unless otherwise specified or described in the manual, TNV-1 and TNV-3 ports provide secondary
protection against surges on the data lines. Primary protectors should be provided in the building
installation.
The equipment is designed to provide adequate protection against electro-static discharge (ESD).
However, it is good working practice to use caution when connecting cables terminated with
plastic connectors (without a grounded metal hood, such as flat cables) to sensitive data lines.
Before connecting such cables, discharge yourself by touching ground or wear an ESD preventive
wrist strap.

FCC-15 User Information


This equipment has been tested and found to comply with the limits of the Class A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses and can radiate radio frequency energy and, if not installed and used
in accordance with the Installation and Operation manual, may cause harmful interference to the
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own
expense.

Canadian Emission Requirements


This Class A digital apparatus meets all the requirements of the Canadian Interference-Causing
Equipment Regulation.
Cet appareil numrique de la classe A respecte toutes les exigences du Rglement sur le matriel
brouilleur du Canada.

Warning per EN 55022 (CISPR-22)


Warning

Avertissement

Achtung

This is a class A product. In a domestic environment, this product may cause radio
interference, in which case the user will be required to take adequate measures.
Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet
appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre
demand lutilisateur de prendre les mesures appropries.
Das vorliegende Gert fllt unter die Funkstrgrenzwertklasse A. In Wohngebieten
knnen beim Betrieb dieses Gertes Rundfunkstrrungen auftreten, fr deren
Behebung der Benutzer verantwortlich ist.

Franais

Mise au rebut du produit


Afin de faciliter la rutilisation, le recyclage ainsi que d'autres formes de
rcupration d'quipement mis au rebut dans le cadre de la protection de
l'environnement, il est demand au propritaire de ce produit RAD de ne pas
mettre ce dernier au rebut en tant que dchet municipal non tri, une fois
que le produit est arriv en fin de cycle de vie. Le client devrait proposer des
solutions de rutilisation, de recyclage ou toute autre forme de mise au rebut
de cette unit dans un esprit de protection de l'environnement, lorsqu'il aura
fini de l'utiliser.

Instructions gnrales de scurit


Les instructions suivantes servent de guide gnral d'installation et d'opration scurises des
produits de tlcommunications. Des instructions supplmentaires sont ventuellement
indiques dans le manuel.

Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques
potentiels de scurit pour l'oprateur ou le personnel de service, quant
l'opration du produit ou sa maintenance.

Avertissement
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le
produit est sous tension ou connect des lignes externes de tlcommunications.

Mise la terre de protection : la cosse ou la borne marque devrait tre connecte


la prise de terre de protection du btiment.

Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre


optique est intact et qu'il est connect au transmetteur.

Ne tentez pas d'ajuster le courant de la commande laser.

N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans


terminaison et n'observez pas directement un rayon laser.

L'usage de priphriques optiques avec l'quipement augmentera le risque pour


les yeux.

L'usage de contrles, ajustages ou procdures autres que celles spcifies ici


pourrait rsulter en une dangereuse exposition aux radiations.
ATTENTION : Le rayon laser peut tre invisible !

Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de
tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus
particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par
l'agence et conformes la rglementation locale de scurit laser pour les produits laser de
classe 1.
Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la
maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer
l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation,
d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou
l'utilisateur.

Manipuler des produits sous tension


Rgles gnrales de scurit
Ne pas toucher ou altrer l'alimentation en courant lorsque le cble d'alimentation est branch.
Des tensions de lignes peuvent tre prsentes dans certains produits, mme lorsque le
commutateur (s'il est install) est en position OFF ou si le fusible est rompu. Pour les produits
aliments par CC, les niveaux de tension ne sont gnralement pas dangereux mais des risques
de courant peuvent toujours exister.
Avant de travailler sur un quipement connect aux lignes de tension ou de tlcommunications,
retirez vos bijoux ou tout autre objet mtallique pouvant venir en contact avec les pices sous
tension.
Sauf s'il en est autrement indiqu, tous les produits sont destins tre mis la terre durant
l'usage normal. La mise la terre est fournie par la connexion de la fiche principale une prise
murale quipe d'une borne protectrice de mise la terre. Si une cosse de mise la terre est
fournie avec le produit, elle devrait tre connecte tout moment une mise la terre de
protection par un conducteur de diamtre 18 AWG ou plus. L'quipement mont en chssis ne
devrait tre mont que sur des chssis et dans des armoires mises la terre.
Branchez toujours la mise la terre en premier et dbranchez-la en dernier. Ne branchez pas des
cbles de tlcommunications un quipement qui n'est pas mis la terre. Assurez-vous que
tous les autres cbles sont dbranchs avant de dconnecter la mise la terre.

Franais

Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une
tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant,
sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut
aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :

Franais

Connexion au courant du secteur


Assurez-vous que l'installation lectrique est conforme la rglementation locale.
Branchez toujours la fiche de secteur une prise murale quipe d'une borne protectrice de mise
la terre.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de
court-circuit dpassant 35A (40A aux Etats-Unis et Canada).
Branchez toujours le cble d'alimentation en premier l'quipement puis la prise murale. Si un
commutateur est fourni avec l'quipement, fixez-le en position OFF. Si le cble d'alimentation ne
peut pas tre facilement dbranch en cas d'urgence, assurez-vous qu'un coupe-circuit ou un
disjoncteur d'urgence facilement accessible est install dans l'installation du btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si le systme de distribution de
courant est de type IT.

Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de
court-circuit dpassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.

Declaration of Conformity
Manufacturer's Name:

RAD Data Communications Ltd.

Manufacturer's Address:

24 Raoul Wallenberg St.


Tel Aviv 69719
Israel

Declares that the product:


Product Name:

ETX-102

Conforms to the following standard(s) or other normative document(s):


EMC

Safety

EN 55022:2006 +
A1:2007

Information technology equipment Radio disturbance


characteristics Limits and methods of measurement.

EN 55024:1998 +
A1:2001, A2:2003

Information technology equipment Immunity characteristics


Limits and methods of measurement.

EN 61000-3-2:2006

Electromagnetic compatibility (EMC) - Part 3-2: Limits


Limits for harmonic current emissions (equipment input current
16A per phase)

EN 61000-3-3:1995
+ A1:2001, A2:2005

Electromagnetic compatibility (EMC) Part 3-3: Limits


Limitation of voltage changes, voltage fluctuations and flicker in
public low-voltage supply systems, for equipment with rated
current 16A per phase and not subject to conditional
connection.

EN 60950-1:2005

Information technology equipment Safety Part 1:


General requirements.

Supplementary Information:
The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the Low
Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product
was tested in a typical configuration.
Tel Aviv, 15 July 2010

Nathaniel Shomroni
Approvals Coordinator

European
Contact:

RAD Data Communications GmbH


Otto-Hahn-Str. 28-30, 85521 Ottobrunn-Riemerling, Germany

Glossary
Address

A coded representation of the origin or destination of data.

Agent

In SNMP, this refers to the managed system.

Analog

A continuous wave or signal (such as human voice).

ANSI

American National Standards Institute.

AWG

The American Wire Gauge System, which specifies wire width.

Balanced

A transmission line in which voltages on the two conductors are


equal in magnitude, but opposite in polarity, with respect to
ground.

Bandwidth

The range of frequencies passing through a given circuit. The


greater the bandwidth, the more information can be sent through
the circuit in a given amount of time.

Baud

Unit of signaling speed equivalent to the number of discrete


conditions or events per second. If each signal event represents
only one bit condition, baud rate equals bps (bits per second).

Best Effort

A QoS class in which no specific traffic parameters and no


absolute guarantees are provided.

Bit

The smallest unit of information in a binary system. Represents


either a one or zero (1 or 0).

Bit
Interleaving/Multiplexing

A process used in time division multiplexing where individual bits


from different lower speed channel sources are combined (one bit
from one channel at a time) into one continuous higher speed bit
stream.

bps (Bits Per Second)

A measure of data transmission rate in serial transmission.

Bridge

A device interconnecting local area networks at the OSI data link


layer, filtering and forwarding frames according to media access
control (MAC) addresses.

Buffer

A storage device. Commonly used to compensate for differences


in data rates or event timing when transmitting from one device to
another. Also used to remove jitter.

Bus

A transmission path or channel. A bus is typically an electrical


connection with one or more conductors, where all attached
devices receive all transmissions at the same time.

Byte

A group of bits (normally 8 bits in length).

Carrier

A continuous signal at a fixed frequency that is capable of being


modulated with a second (information carrying) signal.

Cell

The 53-byte basic information unit within an ATM network. The


user traffic is segmented into cells at the source and reassembled
at the destination. An ATM cell consists of a 5-byte ATM header
and a 48-byte ATM payload, which contains the user data.

Channel

A path for electrical transmission between two or more points.


Also called a link, line, circuit or facility.

Clock

A term for the source(s) of timing signals used in synchronous


transmission.

Data

Information represented in digital form, including voice, text,


facsimile and video.

Data Link Layer

Layer 2 of the OSI model. The entity, which establishes, maintains,


and releases data-link connections between elements in a
network. Layer 2 is concerned with the transmission of units of
information, or frames, and associated error checking.

dB (Decibel)

A unit used to measure relative increase or decrease in power,


voltage or current, using a logarithmic scale.

dBm

A measure of power in communications: the decibel in reference


to one milliwatt (0 dBm = 1 milliwatt and -30 dBm = .001
milliwatt).

Decibel

See dB.

Diagnostics

The detection and isolation of a malfunction or mistake in a


communications device, network or system.

Digital

The binary (1 or 0) output of a computer or terminal. In data


communications, an alternating, non-continuous (pulsating) signal.

E3

The European standard for high speed digital transmission,


operating at 34 Mbps.

Encapsulation

Encapsulating data is a technique used by layered protocols in


which a low level protocol accepts a message from a higher level
protocol, then places it in the data portion of the lower-level
frame. The logistics of encapsulation require that packets traveling
over a physical network contain a sequence of headers.

Ethernet

A local area network (LAN) technology which has extended into


the wide area networks. Ethernet operates at many speeds,
including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast
Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and
100 Gbps.

Ethernet OAM

Ethernet operation, administration and maintenance (OAM) are a


set of standardized protocols for measuring and controlling
network performance. There are two layers of Ethernet OAM:
Service OAM (provides end-to-end connectivity fault management
per customer service instance, even in multi-operator networks)
and Link or Segment OAM (detailed monitoring and
troubleshooting of an individual physical or emulated link).

Flow Control

A congestion control mechanism that results in an ATM system


implementing flow control.

Frame

A logical grouping of information sent as a link-layer unit over a


transmission medium. The terms packet, datagram, segment, and
message are also used to describe logical information groupings.

Framing

At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame,
plus information about the integrity of the frame. All other
information, such as network protocols and the actual payload of
data, is encapsulated in a packet, which is encapsulated in the
frame.

Full Duplex

A circuit or device permitting transmission in two directions


(sending and receiving) at the same time.

FXO (Foreign Exchange


Office)

A voice interface, emulating a PBX extension, as it appears to the


CO (Central Office) for connecting a PBX extension to a
multiplexer.

FXS (Foreign Exchange


Subscriber)

A voice interface, emulating the extension interface of a PBX (or


subscriber interface of a CO) for connecting a regular telephone
set to a multiplexer.

Gateway

Gateways are points of entrance and exit from a communications


network. Viewed as a physical entity, a gateway is that node that
translates between two otherwise incompatible networks or
network segments. Gateways perform code and protocol
conversion to facilitate traffic between data highways of differing
architecture.

Half Duplex

A circuit or device capable of transmitting in two directions, but


not at the same time.

Impedance

The combined effect of resistance, inductance and capacitance on


a transmitted signal. Impedance varies at different frequencies.

Interface

A shared boundary, defined by common physical interconnection


characteristics, signal characteristics, and meanings of exchanged
signals.

IP Address

Also known as an Internet address. A unique string of numbers


that identifies a computer or device on a TCP/IP network. The
format of an IP address is a 32-bit numeric address written as four
numbers from 0 to 255, separated by periods (for example,
1.0.255.123).

Jitter

The deviation of a transmission signal in time or phase. It can


introduce errors and loss of synchronization in high speed
synchronous communications.

Laser

A device that transmits an extremely narrow and coherent beam


of electromagnetic energy in the visible light spectrum. Used as a
light source for fiber optic transmission (generally more expensive,
shorter lived, single mode only, for greater distances than LED).

Loopback

A type of diagnostic test in which the transmitted signal is


returned to the sending device after passing through all or part of
a communications link or network.

Manager

An application that receives Simple Network Management Protocol


(SNMP) information from an agent. An agent and manager share a
database of information, called the Management Information Base
(MIB). An agent can use a message called a traps-PDU to send
unsolicited information to the manager. A manager that uses the
RADview MIB can query the RAD device, set parameters, sound
alarms when certain conditions appear, and perform other
administrative tasks.

Multiplexer

At one end of a communications link, a device that combines


several lower speed transmission channels into a single high speed
channel. A multiplexer at the other end reverses the process.
Sometimes called a mux. See Bit Interleaving/Multiplexing.

Network

(1) An interconnected group of nodes. (2) A series of points,


nodes, or stations connected by communications channels; the
collection of equipment through which connections are made
between data stations.

Node

A point of interconnection to a network.

Packet

An ordered group of data and control signals transmitted through


a network, as a subset of a larger message.

parameters

Parameters are often called arguments, and the two words are
used interchangeably. However, some computer languages such as
C define argument to mean actual parameter (i.e., the value), and
parameter to mean formal parameter. In RAD CLI, parameter
means formal parameter, not value.

Payload

The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.

Physical Layer

Layer 1 of the OSI model. The layer concerned with electrical,


mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.

Port

The physical interface to a computer or multiplexer, for connection


of terminals and modems.

Prioritization

Also called CoS (class of service), classifies traffic into categories


such as high, medium, and low. The lower the priority, the more
drop eligible is a packet. When the network gets busy,
prioritization ensures critical or high-rated traffic is passed first,
and packets from the lowest categories may be dropped.

Protocol

A formal set of conventions governing the formatting and relative


timing of message exchange between two communicating
systems.

RADIUS (Remote
Authentication Dial-In
User Service)

An authentication, authorization and accounting protocol for


applications such as network access or IP mobility. Many network
services require the presentation of security credentials (such as a
username and password or security certificate) in order to connect
to the network. Before access to the network is granted, this
information is passed to a network access server (NAS) device
over the link-layer protocol, then to a RADIUS server over the
RADIUS protocol. The RADIUS server checks that the information is
correct using authentication schemes like PAP, CHAP or EAP.

Router

An interconnection device that connects individual LANs. Unlike


bridges, which logically connect at OSI Layer 2, routers provide
logical paths at OSI Layer 3. Like bridges, remote sites can be
connected using routers over dedicated or switched lines to create
WANs.

Routing

The process of selecting the most efficient circuit path for a


message.

Serial Transmission

A common mode of transmission, where the character bits are


sent sequentially one at a time instead of in parallel.

SFP (Small Form-factor


Pluggable)

A compact optical transceiver used in optical communications. It


interfaces a network device (a switch, router or similar device) to a
fiber optic or unshielded twisted pair networking cable. It is a
popular industry format.

Single Mode

Describing an optical wave-guide or fiber that is designed to


propagate light of only a single wavelength (typically 5-10 microns
in diameter).

Synchronous
Transmission

Transmission in which data bits are sent at a fixed rate, with the
transmitter and receiver synchronized.

T1

A digital transmission link with a capacity of 1.544 Mbps used in


North America. Typically channelized into 24 DS0s, each capable of
carrying a single voice conversation or data stream. Uses two pairs
of twisted pair wires.

Telnet

The virtual terminal protocol in the Internet suite of protocols. It


lets users on one host access another host and work as terminal
users of that remote host. Instead of dialing into the computer,
the user connects to it over the Internet using Telnet. When
issuing a Telnet session, it connects to the Telnet host and logs in.
The connection enables the user to work with the remote machine
as though a terminal was connected to it.

VLAN-Aware

A device that is doing the Layer 2 bridging according to the VLAN


tag in addition to the standard bridging parameters. A VLAN-aware
device will not strip or add any VLAN header.

VLAN Stacking

A technique that lets carriers offer multiple virtual LANs over a


single circuit. In essence, the carrier creates an Ethernet virtual
private network to tunnel customer VLANs across its WAN; this
helps avoid name conflicts among customers of service providers
who connect to the carrier. Stacking works by assigning two VLAN
IDs to each frame header. One is a "backbone" VLAN ID used by
the service provider; the other one has up to 4,096 unique 802.1Q
VLAN tags.

Quick Start Guide


Installation of ETX-102 should be carried out only by an experienced technician. If
you are familiar with ETX-102, use this guide to prepare the units for operation.

1.

Installing the Unit

Connecting the Interfaces


1. Insert the rear end of the SFP into the socket, and push slowly backwards to
mate the connectors until the SFP clicks into place. If you feel resistance
before the connectors are fully mated, retract the SFP using the latch wire as
a pulling handle, and then repeat the procedure.
2. Connect the LANs to the appropriate network or user RJ-45 connectors.
3. Connect the control terminal to the rear panel CONTROL connector.
or
Connect a Telnet host, or a PC running a Web browsing application to one of
the Ethernet ports.

Note

A valid IP address must be assigned to ETX-102 to allow Telnet or Web


management.

Connecting the Power

Connect the power cable to the power connector on the ETX-102 rear panel.
The unit has no power switch. Operation starts when the power is applied
to the rear panel power connector.

2.

Configuring the Unit

Configure ETX-102 to the desired operation mode via an ASCII terminal connected
to the rear panel CONTROL port. Alternatively, you can manage
ETX-102 over Telnet or a PC running a Web browsing application via one of the
Ethernet ports.

Starting a Terminal Session

To start a terminal session:


1. Turn on the control terminal PC and set its default port parameters to
115,200 baud; 8 bits/character; 1 stop bit; no parity.

ETX-102 Ver. 3.8

Configuring the Unit

Quick Start Guide

Installation and Operation Manual

2. Set the terminal emulator to ANSI VT100 emulation (for optimal view of
system menus).
3. Enter your user name and password and proceed with the management
session.

Note

The ETX-102 default user name is user (case-sensitive), default password is


1234.

Configuring the Unit Parameters


The management software provides a Quick Setup menu, which includes the most
basic parameters necessary for configuration.

To configure ETX-102:

From the Quick Setup menu (Main > Configuration > Quick Setup), configure
the following parameters:
Host IP address
Host IP mask
Default gateway
Host tagging
Host VLAN ID
VLAN mode
Forwarding mode
DHCP client.

Configuring the Unit

ETX-102 Ver. 3.8

Contents
Chapter 1. Introduction
1.1 Overview.................................................................................................................... 1-1
Device Options ....................................................................................................... 1-1
Applications ............................................................................................................ 1-1
Features ................................................................................................................. 1-2
1.2 Physical Description ................................................................................................... 1-5
1.3 Functional Description................................................................................................ 1-6
Network Port Redundancy ...................................................................................... 1-6
Bridge..................................................................................................................... 1-8
Fault Propagation ................................................................................................. 1-11
Diagnostic Loopbacks ........................................................................................... 1-12
1.4 Technical Specifications............................................................................................ 1-13
Chapter 2. Installation and Setup
2.1
2.2
2.3
2.4
2.5
2.6
2.7

Site Requirements and Prerequisites .......................................................................... 2-1


Package Contents ...................................................................................................... 2-2
Mounting the Unit ...................................................................................................... 2-2
Installing SFP Modules ................................................................................................ 2-2
Connecting to the Ethernet Equipment ....................................................................... 2-3
Connecting to the ASCII Terminal ................................................................................ 2-4
Connecting to Power .................................................................................................. 2-5
Connecting AC Power .............................................................................................. 2-5
Connecting DC Power.............................................................................................. 2-5

Chapter 3. Operation
3.1
3.2
3.3
3.4

Turning On the Unit ................................................................................................... 3-1


Front Panel Indicators ................................................................................................ 3-2
Default Settings ......................................................................................................... 3-2
Configuration and Management Alternatives .............................................................. 3-7
Working with Terminal ............................................................................................ 3-7
Working with Web Terminal................................................................................... 3-10
Menu Maps ........................................................................................................... 3-12
3.5 Turning Off the Unit ................................................................................................. 3-14
Chapter 4. Configuration
4.1 Configuring for Management ...................................................................................... 4-1
Configuring IP Host Parameters ............................................................................... 4-1
Entering Device Information .................................................................................... 4-3
Configuring Communities ........................................................................................ 4-4
Configuring the Host Encapsulation ......................................................................... 4-5
Configuring the Network Managers ......................................................................... 4-6
Configuring SNMPv3 ................................................................................................ 4-7
Controlling Management Access ............................................................................ 4-13
Configuring Control Port Parameters ..................................................................... 4-16
4.2 Configuring for Operation ........................................................................................ 4-17
Configuring the Link Protection ............................................................................. 4-17
Configuring Ethernet Ports at the Physical Layer.................................................... 4-19

ETX-102 Ver. 3.8

Table of Contents

Installation and Operation Manual

Configuring the Bridge .......................................................................................... 4-22


Configuring OAM ................................................................................................... 4-30
Configuring Quality of Service (QoS) ..................................................................... 4-36
4.3 Additional Tasks ....................................................................................................... 4-40
Displaying Inventory.............................................................................................. 4-41
Displaying Status .................................................................................................. 4-41
Setting the Date, Time and NTP Server Parameters................................................ 4-49
Configuring User Access ........................................................................................ 4-50
Configuring Syslog Parameters .............................................................................. 4-51
Transferring Software and Configuration Files ....................................................... 4-52
Swapping Software Files ....................................................................................... 4-54
Resetting ETX-102 ................................................................................................ 4-54
Chapter 5. Diagnostics and Troubleshooting
5.1 Monitoring Performance ............................................................................................. 5-1
Displaying End-to-End Statistics .............................................................................. 5-1
Displaying Ethernet Statistics .................................................................................. 5-3
5.2 Handling Events and Traps ......................................................................................... 5-6
Displaying Events .................................................................................................... 5-6
Configuring Event Reporting (RMON Counters) ........................................................ 5-7
Clearing Events ....................................................................................................... 5-9
Masking Alarm Traps ............................................................................................. 5-12
Configuring the Trap Delay .................................................................................... 5-12
5.3 Testing ETX-102 ....................................................................................................... 5-13
Running a Ping Test .............................................................................................. 5-13
Tracing the Route ................................................................................................. 5-14
Running Loopbacks ............................................................................................... 5-14
Testing the Cables ................................................................................................ 5-17
Running the VLAN Test ......................................................................................... 5-18
5.4 Frequently Asked Questions ..................................................................................... 5-19
5.5 Technical Support .................................................................................................... 5-20
Chapter 6. Software Upgrade
6.1
6.2
6.3
6.4

Compatibility Requirements ........................................................................................ 6-1


Impact ....................................................................................................................... 6-1
Software Upgrade Options ......................................................................................... 6-1
Prerequisites .............................................................................................................. 6-2
Software Files ......................................................................................................... 6-2
System Requirements ............................................................................................. 6-2
6.5 Upgrading ETX-102 Software via the File Utilities Menu .............................................. 6-2
Verifying the Host Parameters ................................................................................ 6-3
Pinging the PC ........................................................................................................ 6-4
Activating the TFTP Server ....................................................................................... 6-4
Downloading the New Software Release File to ETX-102 ......................................... 6-6
6.6 Upgrading ETX-102 Software via the Boot Menu ......................................................... 6-7
Using the XMODEM Protocol ................................................................................... 6-8
Using TFTP ............................................................................................................ 6-10
6.7 Verifying Upgrade Results ........................................................................................ 6-11
Chapter 7. Application Tutorial
7.1 Configuring the VLAN Stacking Application .................................................................. 7-1

ii

ETX-102 Ver. 3.8

Installation and Operation Manual

Table of Contents

Configuration Sequence .......................................................................................... 7-2


Configuring System Parameters............................................................................... 7-2
Configuring Ethernet Interfaces at the Physical Layer .............................................. 7-4
Configuring the Bridge ............................................................................................ 7-4
Configuring QoS...................................................................................................... 7-6
7.2 Configuring a VLAN-Aware Application ........................................................................ 7-7
Configuration Sequence .......................................................................................... 7-8
Configuring System Parameters............................................................................... 7-9
Configuring Ethernet Interfaces at the Physical Layer .............................................. 7-9
Configuring the Bridge ............................................................................................ 7-9
Appendix A. Connector Wiring
Appendix B. Operation, Administration, and Maintenance (OAM)

ETX-102 Ver. 3.8

iii

Table of Contents

iv

Installation and Operation Manual

ETX-102 Ver. 3.8

Chapter 1
Introduction
1.1

Overview

ETX-102 is a carrier-class demarcation device owned and operated by the service


provider and installed at the customer premises, providing a demarcation point
between the private LAN and the operators network. ETX-102 offers flexible
network and user port combinations. The network ports support link aggregation
according to IEEE 802.3ad requirements. The user ports accept traffic, providing
different port-based services. At the physical level, ETX-102 supports
autonegotiation, flow control, and fault propagation. The unit can be managed
via a local terminal port, or via one of its Ethernet ports (inband management).
ETX-102 includes a DHCP client utility that obtains the IP address, IP mask, and
default gateway values.

Device Options
Several versions of the unit are available, offering different combinations of
Ethernet ports and enclosure types.

Ethernet ports:

Ports 1 and 2 Any standard Fast Ethernet SFP or built-in 10/100BaseT

Ports 36 Built-in 10/100BaseT.

Enclosure type Plastic (regular unit) or metal (temperature-hardened


version).

Applications
In a typical application ETX-102 provides Ethernet access to a packet-switched
network (Figure 1-1) or next generation SDH/SONET network Figure 1-2) over a
fiber optic local loop.

ETX-102 Ver. 3.8

Overview

1-1

Chapter 1 Introduction

Installation and Operation Manual

Figure 1-1. Three Methods of Providing Managed Ethernet Services over a PSN

Figure 1-2. Providing Managed Ethernet Services over a Next-Generation SDH/SONET


Network

Features
Network Interface
ETX-102 includes two network ports. The network ports use industry-standard
SFP (Small Form-Factor Pluggable) hot-swappable optical transceivers. Refer to
the SFP data sheet for the complete list of the SFPs supported by ETX-102.
Alternatively, ETX-102 can be ordered with built-in RJ-45 ports supporting
autonegotiation and flow control

User Interface
ETX-102 user interfaces terminate in up to four built-in RJ-45 ports that support
autonegotiation and flow control.

Link Redundancy
The unit supports link aggregation (1+1) based on 802.3ad requirements.
Dual homing technology (1:1) allows ETX-102 to be connected to two different
upstream devices.

1-2

Overview

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 1 Introduction

Bridge
The bridge operates in VLAN-aware or VLAN-unaware mode, in accordance with
802.1Q. Learning and filtering can be enabled or disabled.
The unit can append a VLAN tag (provider VLAN) at user port ingress and remove
it at network port ingress. The provider VLAN includes provider VID and priority
(VLAN stacking).

QoS
ETX-102 supports traffic prioritization and rate limitation.

Traffic Classification and Prioritization


ETX-102 provides four priority queues for each user port. The traffic can be
classified and mapped into the priority queues according to the VLAN priority,
DSCP, IP TOS, or per port basis.

Rate Limitation
ETX-102 supports an egress rate limitation per port (network and user) and
ingress rate limitation per user port.

Fault Propagation
The unit provides the network-to-user fault propagation mechanism. When the
fault propagation is enabled, the user port shuts itself down when a link failure is
detected at the network port.

Management
Setup, monitoring and diagnostics tests can be performed using one of the
following methods:

Out-of-band via ASCII terminal connected to the V.24/RS-232 DCE control port

Inband management via one of the Ethernet ports, for network management
using Telnet or terminal Web-based application:

ETX-102 can be managed via a third-party SNMP-based NMS, using SNMPv3.


The ETX-102 device provides a user-friendly Web-based terminal management
system for remote device configuration and maintenance that is embedded into
ETX-102 and provided at no extra cost. It can be run from any standard Web
browser.

Inband Management
For the inband management, the host of ETX-102 can be configured to the
tagged or untagged operation:

ETX-102 Ver. 3.8

When the host tagging is enabled, the host packets receive a VLAN tag,
creating a dedicated management VLAN.

When tagging is disabled, no traffic separation is performed and management


packets can be forwarded to the user port.

Overview

1-3

Chapter 1 Introduction

Installation and Operation Manual

Security
The following security protocols are provided by ETX-102 to ensure client-server
communication privacy and correct user authentication:

RADIUS (client authentication only)

SSL for Web-based management application

SSH for Secure Shell communication session

SNMPv3 for secure SNMP sessions.

Ethernet OAM
ETX-102 provides tools to monitor and troubleshoot an Ethernet network and
quickly detect failures. Two OAM types are provided:

End-to-end (path) based on IEEE 802.1ag and Y.1731 for continuity check,
non-intrusive loopback and performance management, including Frame Delay,
Frame Delay Variation, Frame Loss, Availability etc

Single segment (link) according to IEEE 802.3ah for remote management and
fault indication, including remote loopback, dying gasp, and MIB parameters
retrieval.

Appendix B provides a more detailed description of the OAM functions.

Remote Monitoring
The Syslog protocol is used by ETX-102 to generate and transport event
notification messages over IP networks to the central Syslog server. The Syslog
operation is compliant with the RFC 3164 requirements.
ETX-102 supports DDM (Digital Data Management) SFPs according to Sff-8472
Version 9.3.

DHCP Client
When enabled, the DHCP client of ETX-102 automatically requests an IP address,
IP mask and default gateway from the DHCP server. In addition, ETX-102
automatically defines a network manager with a valid IP address and subnet
mask.

Statistics Collection
ETX-102 collects Ethernet performance statistics for the physical layers of the
network/user ports, OAM flows and VLANs.
In addition to the regular statistics collection, ETX-102 allows you to receive
reports when one of the available counters (physical layer or end-to-end OAM)
rise above or drop below the set thresholds within the specified sampling period
of time. These reports can be sent as SNMP traps to the defined network
management stations and/or be written to the event log.

Dying Gasp
Some of the ETX-102 units feature a dying gasp mechanism. If a power failure
occurs, ETX-102 sends traps to the defined network management stations,
informing the failure.

1-4

Overview

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 1 Introduction

Network Time Protocol


The Network Time Protocol (NTP) provides the means of synchronizing all
managed elements across the network to a reliable clock source. ETX-102
supports the client side of the NTP v.3, based on RFC 1305.

Diagnostic Tools
A built-in ping utility allows checking IP connectivity by pinging remote IP hosts.
The Trace Route application can quickly trace a route from ETX-102 to any other
network device.
Loopbacks can be closed on any of the ETX-102 ports. Only one loopback can be
active at a time. Layer-2 loopback with MAC address swapping enables
end-to-end connectivity verification.
The quality of the copper cables, connectors and terminations can be checked by
running a Virtual Cable Test (VCT). During the test, ETX-102 transmits a signal of
known amplitude (+1V) down each of the two pairs of an attached cable, testing
the Rx and Tx pairs sequentially. The signal travels down the cable until it reflects
off of a cable imperfection. By measuring the magnitude of the reflection and the
time it takes for the reflection to come back, ETX-102 estimates the approximate
distance to the location of a cable break or short.

1.2

Physical Description

Figure 1-3 shows a 3D view of a typical ETX-102 unit.

Figure 1-3. ETX-102, 3D View


The front panel includes several LEDs that display the status of power, Ethernet
links, and alarms. For a detailed description of the front panel, see Chapter 3.
The rear panel includes AC/DC power connector, network and user Ethernet ports,
and V.24 terminal connector. The ETX-102 rear panel is described in greater detail
in Chapter 2.
ETX-102/H is a temperature-hardened version intended for industrial installations.
It requires temperature-hardened SFP transceivers.

ETX-102 Ver. 3.8

Physical Description

1-5

Chapter 1 Introduction

Installation and Operation Manual

1.3

Functional Description

Network Port Redundancy


The two network interfaces can be configured to operate either independently,
as two separate Ethernet interfaces, or used as a single Ethernet interface with
line redundancy.

Link aggregation mode in accordance with IEEE 802.3ad (without LACP). This
mode inherently provides redundancy: if one of the Gigabit Ethernet ports
fails, the traffic is transmitted on the other.

1:1 bidirectional protection (redundancy) mode. In this mode, at any time


only one of the ports is actively carrying traffic. With 1:1 bidirectional
redundancy, the recovery mode (revertive or non-revertive), and the
restoration time in the revertive mode, can be selected in accordance with
the application requirements.

Using Link Aggregation


The two network Ethernet ports can be operated as a single logical interface,
using link aggregation in accordance with IEEE 802.3ad without LACP (Link
Aggregation Control Protocol). In the virtual link group only one link transmits at a
time. If a failure occurs on the transmitting link, ETX-102 switches to the standby
link in the group. The flip is performed by reassigning destination ports.
With link aggregation, the two network ports serve as a single logical interface.
The two ports must be connected to the same switch/router, as shown in
Figure 1-4.

Figure 1-4. Link Aggregation Redundancy Mode


Using link aggregation inherently provides redundancy, because if one of the
network ports fails, the other can continue transferring traffic. Therefore, link
aggregation per IEEE 802.3ad has inherent APS (Automatic Protection Switching)
characteristics.
Failure of one of the links is detected by sensing the loss of valid signals at a
port, in which case the whole traffic is sent through the remaining port. The
switching time is less than a second.
Link aggregation always provides revertive recovery, because that as soon as the
down port returns to normal, the full bandwidth is again available.
The equipment connected to the network ports must use compatible switching
criteria for redundancy to be available:

1-6

For networks using Layer 2 switching: the criterion is signal loss

Functional Description

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 1 Introduction

For networks using Layer 3 routing: the router must support IEEE 802.3ad or
other link aggregation protocol that views the aggregated link as a single
logical interface.

As the two network ports serve as a single logical interface, the learning tables
do not change as a result of the interface flip.

Using 1:1 Bidirectional Redundancy


As an alternative to link aggregation, the two ETX-102 network ports can be
configured for 1:1 bidirectional mode (dual homing). With this mode, two
topologies can be used:

Connection of both network ports to the same switch/router, as shown in

Figure 1-4.

Connection of the network ports to different switch/routers, as shown in

Figure 1-5. The main advantage of this topology is its higher availability,
because each port can be routed along a different path through the network.

Figure 1-5. 1:1 Bidirectional Redundancy Mode (Dual Homing)


With 1:1 bidirectional redundancy mode, at any time only one of the ports is
actively carrying traffic, and the other port serves as the backup port. A RAD
proprietary redundancy algorithm, based on loss of signal, is used to detect line
failure. The protection switching (flipping) time is less than 1 second. It also
depends on the network relearning time or aging.
The recovery mode after a protection switching can be selected in accordance
with the application requirements:

Non-revertive mode ETX-102 will not automatically flip back after the failed
port returns to normal operation, but only when the currently used port fails,
or after a manual flip command.

Revertive mode ETX-102 will flip back to the original port when it returns to
normal operation. Flipping back can be delayed by specifying a restoration
time, during which alarms are ignored. As a result, ETX-102 starts evaluating
the criteria for protection switching (flipping) only after the restoration time
expires, thereby ensuring that another flip cannot occur before the specified
time expires.

When flip occurs, ETX-102 clears the MAC tables, enabling more efficient address
relearning.

Bridge
ETX-102 has a multi-port bridging capability handling up to six bridge ports. The
bridge supports VLAN-aware and VLAN-unaware modes of operation.

ETX-102 Ver. 3.8

Functional Description

1-7

Chapter 1 Introduction

Installation and Operation Manual

Each mode comprises the following processes:

Ingress: Checks each frame entering the bridge to decide if and how this
frame should be passed on to the forwarding process

Learning: Learns new MAC table entries (MAC only or MAC VID pairs)

Aging: Checks the forwarding MAC table periodically

Forwarding: Decides to which bridge port(s) to forward the frame

Transmission (VLAN-aware mode only): Selects the format of the transmitted


frame at the output port: with VLAN ID (tagged) or without VLAN ID
(untagged).

These processes are described below for each mode.

VLAN-Aware Mode
This mode enables the creation of subgroups of bridge ports within the bridge.
Each subgroup is associated with a unique VLAN ID (VID). Frames containing a VID
can be forwarded only between bridge ports that are members of this specific
VLAN, enabling a total separation between different VLAN users within the same
bridge.

Ingress Process
The ingress process is composed of three steps:

Frame Admission: Two modes of operation (configured per bridge port):

Admit All Frames: All frames arriving from the port are admitted and
proceed to the ingress filtering process. PVID is assigned to untagged or
priority-only tagged frames.

Admit Only Tagged Frames: Only VLAN tagged frames are admitted and
allowed to proceed to the ingress filtering process. Untagged or priorityonly tagged frames are discarded.

Ingress Filtering: Works in one of the following modes (configured per bridge
port):

Enable Performs ingress filtering according to VIDs. Only frames that


share a VID assigned to this bridge port are admitted

Disable All frames are forwarded.


Only admitted frames that pass filtering are submitted to learning and
forwarding processes.

PVID Assignment: Is per bridge port configuration:


In case the received frame does not contain a VLAN ID (untagged or
priority-only tagged frames), the bridge port PVID is assigned to these
frames before they pass to the forwarding process.
Accordingly, the untagged/priority-tagged frames that have passed the
admission/ingress filtering, are tagged with PVID and proceed to the
forwarding process.

1-8

Functional Description

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 1 Introduction

For untagged frames that were tagged during this process to VID=PVID,
the priority tag is assigned at the VLAN priority field, according to the
default priority configuration.
Frames that pass this stage are submitted to the forwarding and learning
processes.

Learning Process
The learning process observes the source MAC address (SA) and the VID of the
received frame, and updates the forwarding database (MAC table) with the MAC
VID pair and with the bridge port from which the frame was received.
Entries in the MAC table can be dynamic (inserted by the learning process) or
static (inserted by configuration). A dynamic entry has an aging time associated
with it.
The ETX-102 VLAN-aware bridge is an Independent VLAN Learning (IVL) bridge.
The learning process inserts a new dynamic entry into the MAC table. This entry
consists of a MAC-VID pair and bridge port.

If the MAC-VID pair already exists for the same port, the aging time is
updated

If the MAC-VID pair already exists but for a different bridge port (dynamic
entry), the new entry overrides the existing one

If the MAC-VID pair already exists for a different bridge port (static entry), the
static entry prevails.

Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry-aging period that has exceeded the configured aging time limit is deleted.
The aging period represents the time passed since the last frame for this entry
entered the bridge. The periodic check of the MAC table (aging time intervals)
results an actual aging time that can reach up to twice the value that was
configured for the bridge.

Forwarding Process
The forwarding process is performed based on the frame destination MAC VID
pair. The frame is forwarded to the bridge port that was specified in the MAC
table for this MAC VID pair entry.
Untagged frames are forwarded according to the PVID that was attached to the
frame during the ingress process.
Frames are forwarded, dropped, or flooded according to the following guidelines:

Forwarded: If the bridge port of the pair entry (DA, VID) in the MAC table is
both an active bridge port and a member of the VLAN, the frame is forwarded
to that bridge port only.

Dropped:

ETX-102 Ver. 3.8

If the bridge port for the pair entry (DA, VID) in the MAC table is the port
on which the frame was received, the frame is dropped.

Functional Description

1-9

Chapter 1 Introduction

Installation and Operation Manual

If there are no active ports associated with the frames VID, or if the VID
is not defined at all, the frame is dropped.

Flooded:

If the pair (DA, VID) is not learned and does not exist in the MAC table,
the frame is transmitted to all bridge ports that are associated with the
frames VLAN ID.

Multicasts and broadcasts are flooded only through the bridge ports
whose VLAN ID is identical to the frames VLAN ID.

Transmission Process
After the forwarding process identifies the destination bridge port(s) to which
the frames must be transmitted, the frames are transmitted in the appropriate
format.
The frame format can be configured for each VLAN port membership:

Egress tagged: In this mode:

VLAN-tagged frames are transmitted unchanged.

Untagged frames are transmitted tagged with priority according to the


default priority of the ingress bridge port, and VID=PVID of the port from
which they entered.

Priority-tagged frames are transmitted tagged with original priority and


VID = PVID.

Egress untagged: In this mode, all frames are transmitted as untagged.

VLAN-Unaware Mode
In this mode the bridge forwarding ignores the VLAN ID of VLAN-tagged frames.
Each Ethernet packet received from each bridge port is forwarded according to its
destination MAC address.

Ingress Process
All frames are accepted in this mode: untagged, priority-tagged, or VLAN-tagged.
Learning and forwarding is based on the MAC addresses, with no regard to the
VLAN. This mode is also known as transparent mode.

Learning Process
The learning process observes the source MAC address (SA) of the received frame
and updates the forwarding database (FDB) with the MAC address and the bridge
port that the frame was received from. (FDB is also referred to as MAC table).
The learning process inserts a new entry into the MAC table. This entry consists
of the MAC and bridge port.

1-10

If the MAC already exists for the same bridge port, the aging time is updated.

If the MAC already exists, but for a different bridge port, (dynamic entry) the
new entry overrides the existing one.

Functional Description

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 1 Introduction

Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry aging time period that has exceeded the configured Aging Time Limit is
deleted. The aging time period is the period of time since the last frame for this
entry entered the bridge. The periodic check of the MAC table (aging time
intervals), results in an actual aging time that can reach up to twice the value that
was configured by the user.

Forwarding Process
The forwarding process is performed based on the frame MAC Destination
Address (MDA). The frame is forwarded to the bridge/port specified in the MAC
table for this MAC.
Frames are forwarded, dropped, or flooded at this stage:

Forwarded: A frame is forwarded according to its DA, to the bridge port


where its DA was learned.

Dropped: If the port for that DA entry in the MAC table is the port on which
the frame was received, the frame is dropped.

Flooded:

If there is no information regarding the DA in the MAC table, the frame is


flooded to all ports

Frames with multicast or broadcast addresses are flooded to all ports.

Transmission Process
The frames are transmitted according to the tag handling configured for the
bridge port:

None: The frames are transmitted unchanged, that is no tags are added or
removed.

Stack: In the user-to-network direction, the bridge port PVID is added to


frames (stacking) before transmitting them. In the network-to-user direction,
VLAN tag is removed from frames (stripping) before transmitting them.

Fault Propagation
If a network link fails, ETX-102 propagates this condition to user ports (all or only
some of them), see Figure 1-6. The user-configurable time-to-restore parameter
specifies the time period ETX-102 waits before enabling user interfaces once the
network interface is restored.

Figure 1-6. Fault Propagation

ETX-102 Ver. 3.8

Functional Description

1-11

Chapter 1 Introduction

Installation and Operation Manual

Diagnostic Loopbacks
ETX-102 supports the following diagnostics loopbacks:

1-12

Layer-1 loopback performed at the PHY of the bridge ports. When the
loopback is active the data forwarded to a bridge port is looped from the Tx
path to the Rx path, disrupting the traffic. This loopback cannot pass through
Ethernet bridges.

Layer-2 loopback with MAC address swapping, when ETX-102 exchanges


source and destination MAC addresses of the incoming packets. This loopback
can be performed per VLAN (or EVC), it passes through Ethernet bridges and
does not disrupt traffic flows, which are not being tested.

Functional Description

ETX-102 Ver. 3.8

Installation and Operation Manual

1.4
Network
Interface

Chapter 1 Introduction

Technical Specifications

Number of Ports

Up to 2 RJ-45 or fiber optic SFPs

Note: Port 2 can be configured to operate as a network


or as a user port.
Type

SFP (100BaseFx, 100BaseLX10, 100BaseBx10)


Built-in 10/100BaseT

User Interface

Electrical Operation
Mode

10/100 Mbps (copper), full or half duplex,


autonegotiation

Number of Ports

Up to 4 RJ-45 ports

Type

Built-in 10/100BaseT

Electrical Operation
Mode

10/100 Mbps (copper), full or half duplex,


autonegotiation

Internal Bridge Forwarding Mode

Standard
Compliance

Management

Indicators

Power

ETX-102 Ver. 3.8

Transparent/filtered, VLAN-aware/VLAN-unaware

Number of VLANs

64

Maximum Frame
Size

1,632 bytes

IEEE

802.3, 802.3u, 802.1D, 802.1Q, 802.1p, 802.1ag,


802.3ad, 802.3ah

MEF

MEF 9, MEF 14

Out-of-Band

Via dedicated terminal port; V.24/RS-232 DCE;


9.6, 19.2, 38.4, 57.6, 115.2 kbps; DB-9 female
connector

Inband

Via one of the Ethernet ports

TST/ALM/PWR
(green/orange/red)

Loopback, alarm, and power status

NET 1, NET 2,
USER 36 (green)

Link/activity status of the network/user port

AC/DC Source

100240 VAC or 48/60 VDC nominal (4072 VDC)

DC Source

WRDC: 24/48/60 VDC nominal (1872 VDC)

Power Consumption

6.1W max

Technical Specifications

1-13

Chapter 1 Introduction

Physical

Environment

Installation and Operation Manual

ETX-102
(Plastic Enclosure)

Height: 43 mm (1.7 in)


Width: 220 mm (8.6 in)
Depth: 170 mm (6.7 in)
Weight: 0.5 kg (1.1 lb)

ETX-102/H
(Metal Enclosure)

Height: 47 mm (1.8 in)


Width: 215 mm (8.4 in)
Depth: 147 mm (5.8 in)
Weight: 0.7 kg (1.5 lb)

Temperature

ETX-102: 0C50C (32C122F)


ETX-102/H: -40 to 65C (-40 to 149F)

Humidity

1-14

Technical Specifications

Up to 90%, non-condensing

ETX-102 Ver. 3.8

Chapter 2
Installation and Setup
This chapter describes installation and setup procedures for the ETX-102 unit.
After installing the unit, refer to Chapter 3 for the operating instructions.
If a problem is encountered, refer to Chapter 5 for test and diagnostic
instructions.

Internal settings, adjustment, maintenance, and repairs may be performed only


by a skilled technician who is aware of the hazards involved.

Warning

Grounding

Always observe standard safety precautions during installation, operation, and


maintenance of this product.
For your protection and to prevent possible damage to equipment when a fault
condition, e.g., a lightning stroke or contact with high-voltage power lines, occurs
on the cables connected to the equipment, ETX-102 must be properly grounded
at any time. Any interruption of the protective (grounding) connection inside or
outside the equipment, or the disconnection of the protective ground terminal
can make this equipment dangerous. Intentional interruption is prohibited.

2.1

Site Requirements and Prerequisites

AC-powered ETX-102 units should be installed within 1.5m (5 ft) of an


easily-accessible grounded AC outlet capable of furnishing the voltage in
accordance with ETX-102 nominal supply voltage.
DC-powered ETX-102 units require a -48 VDC power source, which must be
adequately isolated from the main supply.

Note

Refer also to the sections describing connections of AC and DC mains at the


beginning of the manual.
Allow at least 90 cm (36 in) of frontal clearance for operating and maintenance
accessibility. Allow at least 10 cm (4 in) clearance at the rear of the unit for signal
lines and interface cables.
The ambient operating temperature of ETX-102 is 0 to 50C (32 to 122F), at a
relative humidity of up to 90%, non-condensing.

ETX-102 Ver. 3.8

Site Requirements and Prerequisites

2-1

Chapter 2 Installation and Setup

2.2

Installation and Operation Manual

Package Contents

The ETX-102 package includes the following items:

One ETX-102 unit

Matching SFP modules (if ordered)

AC power cord or DC connection kit

Optional accessories included if ordered:


RM-33-2 rack mount kit for ETX-102 with plastic enclosure
RM-35/P1 rack mount kit for mounting one ETX-102/H unit with metal
enclosure
RM-35/P2 rack mount kit for mounting two ETX-102/H units with metal
enclosures
WM-35 wall mount kit for ETX-102/H unit with metal enclosure
CBL-DB9F-DB9M-STR, control port cable.

2.3

Mounting the Unit

ETX-102 is designed for installation as a desktop unit. It can also be mounted in a


19" rack.

For rack mounting instructions, refer to:


RM-33-2 installation kit manual (ETX-102 in a plastic enclosure)
RM-35 installation kit manual (ETX-102/H in a metal enclosure)

For wall mounting instructions, refer to:


Drilling template at the end of the manual (ETX-102 in a plastic enclosure)
WM-35 installation kit manual (ETX-102/H in a metal enclosure)

If ETX-102 is to be used as a desktop unit, place and secure the unit on a


stable, non-movable surface.

Refer to the clearance and temperature requirements in Site Requirements and


Prerequisites.

2.4

Installing SFP Modules

ETX-102 uses SFP modules with LC fiber optic connectors.


Third-party SFP optical transceivers must be agency-approved, complying with the
local laser safety regulations for Class 1 laser equipment.

Warning

2-2

Installing SFP Modules

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 2 Installation and Setup

To install the SFP modules:


1. Lock the wire latch of each SFP module by lifting it up until it clicks into place,
as illustrated in Figure 2-1.

Note

Some SFP models have a plastic door instead of a wire latch.

Figure 2-1. Locking the SFP Wire Latch


2. Carefully remove the dust covers from the SFP slot.
3. Insert the rear end of SFP into the socket, and push slowly backwards to
mate the connectors until the SFP clicks into place. If you feel resistance
before the connectors are fully mated, retract the SFP using the wire latch as
a pulling handle, and then repeat the procedure.
4. Remove the protective rubber caps from the SFP modules.

To remove the SFP module:


1. Disconnect the fiber optic cables from the SFP module.
2. Unlock the wire latch by lowering it downwards (as opposed to locking).
3. Hold the wire latch and pull the SFP module out of the Ethernet port.

2.5

Connecting to the Ethernet Equipment

ETX-102 can be connected to the Ethernet equipment via the fiber optic LC
designated 100Fx or 8-pin RJ-45 electrical port designated 10/100BT. Refer to
Appendix A for the RJ-45 connector pinout.

To connect to the Ethernet equipment with fiber optic interface:

ETX-102 Ver. 3.8

Connect ETX-102 to the Ethernet network equipment using a standard fiber


optic cable terminated with an LC connector.

Connecting to the Ethernet Equipment

2-3

Chapter 2 Installation and Setup

Installation and Operation Manual

NET

NET/USER

100Fx

10/100BT

10/100BT

10/100BT

10/100BT

CONTROL

USER

DCE

Figure 2-2. 100Fx Optic Connector

To connect to the Ethernet equipment with a copper interface:

Note

Connect ETX-102 to the Ethernet network equipment using a standard


straight UTP cable terminated with an RJ-45 connector.

In order to comply with electromagnetic compatibility requirements (Class B), it is


recommended to use shielded cables when connecting to the RJ-45 port of the
ETX-102 electrical network or user interface.

CONTROL

NET

NET/USER

USER
4

100Fx

10/100BT

10/100BT

10/100BT

10/100BT

DCE

Figure 2-3. 10/100BT Electrical Connectors

2.6

Connecting to the ASCII Terminal

ETX-102 can be connected to an ASCII terminal via a 9-pin D-type female


connector designated CONTROL. Refer to Appendix A for the connector pinout.

NET

NET/USER

100Fx

10/100BT

10/100BT

10/100BT

10/100BT

CONTROL

USER

DCE

Figure 2-4. CONTROL Connector

To connect to an ASCII terminal:


1. Connect the male 9-pin D-type connector of CBL-DB9F-DB9M-STR straight
cable available from RAD to the CONTROL connector.
2. Connect the other connector of the CBL-DB9F-DB9M-STR cable to an ASCII
terminal.

2-4

Connecting to the ASCII Terminal

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 2 Installation and Setup

Caution Terminal cables must have a frame ground connection. Use ungrounded cables

when connecting a supervisory terminal to a DC-powered unit with floating


ground. Using improper terminal cable may result in damage to the supervisory
terminal port.

2.7

Connecting to Power

ETX-102 accepts either 100240 VAC or 48/60 VDC power through the same
power inlet.

Warning

Before connecting or disconnecting any communication cable, the unit must be


grounded by connecting its power cord to a power outlet with a ground terminal,
and by connecting the ground terminal on the panel (if provided) to a protective
ground.
Any interruption of the protective (grounding) conductor (inside or outside the
instrument) or disconnecting of the protective ground terminal can make this
unit dangerous. Intentional interruption is prohibited.

Note

Refer also to the sections describing connections of AC and DC mains at the


beginning of the manual.

Connecting AC Power
AC power is supplied to ETX-102 through a standard 3-prong socket. AC power
should be supplied via a 1.5m (5 ft) standard power cable terminated by a
standard 3-prong socket. A cable is provided with the unit.

To connect AC power:
1. Connect the power cable to the power connector on the ETX-102 rear panel.
2. Connect the power cable to the mains outlet.
The unit turns on automatically upon connection to the mains.

Connecting DC Power
An unterminated power cord for the 48/60 VDC power connection is supplied
with the unit.

To connect DC power:

ETX-102 Ver. 3.8

Refer to the DC power supply connection supplement for instructions how to


wire the DC adapters. The DC supplement is provided at the end of the
manual.

Connecting to Power

2-5

Chapter 2 Installation and Setup

2-6

Connecting to Power

Installation and Operation Manual

ETX-102 Ver. 3.8

Chapter 3
Operation
This chapter:

Explains power-on and power-off procedures

Provides a detailed description of the front panel controls and indicators and
their functions

Lists alternative methods of the product configuration, explaining ASCII


terminal and Web browser management applications and illustrating
management menus.

For a detailed explanation of parameters in the menus, see Chapter 4.

3.1

Turning On the Unit

To turn on ETX-102:

Connect the power cord to the mains.


The PWR indicator lights up and remains lit as long as ETX-102 receives
power.

ETX-102 requires no operator attention once installed, with the exception of


occasional monitoring of front panel indicators. Intervention is only required
when ETX-102 must be configured to its operational requirements, or diagnostic
tests are performed.

ETX-102 Ver. 3.8

Turning On the Unit

3-1

Chapter 3 Operation

3.2

Installation and Operation Manual

Front Panel Indicators

The unit's LEDs are located on the front panel (see Figure 3-1). Table 3-1 lists the
functions of the ETX-102 LED indicators.

Figure 3-1. ETX-102 Front Panel


Table 3-1. ETX-102 LEDs and Controls
Name

Type

Function

TST/ALM/PWR

Green/
orange/
red LED

ON (green) Device is starting up


ON (orange) Power is ON and device has completed startup
Blinking (orange) Diagnostic loopback is active
ON (red) One of the Ethernet links is down

NET 1, NET 2,
USER 36

Green LEDs

ON Corresponding Ethernet link is OK


Blinking Data is being transmitted or received on the corresponding Ethernet
link

3.3

Default Settings

The following table lists the default settings of the ETX-102 configuration
parameters.

Table 3-2. Default Settings


Type

Parameter

Default Value

IP address

0.0.0.0

IP mask

0.0.0.0

Default gateway

0.0.0.0

Default IP

0.0.0.0

DHCP

Enable

Name

ETX-102

Location

The Location of the Device

Contact Person

Name of Contact Person

Telnet/SSH Access

Enable

SNMP Access

Disable

System

Host

Device Info

Management Access

3-2

Default Settings

ETX-102 Ver. 3.8

Installation and Operation Manual


Type

User Access

RADIUS Parameters

Chapter 3 Operation
Parameter

Default Value

Web Access

Enable

RADIUS Authentication

Disable

User Name

su

Permission

Read Only

Access

All

Server IP Address

0.0.0.0

Shared Secret
Number of Retries

Timeout (in seconds)

Authentication Port

1812

Accounting Port

1813

Read Community

public

Write Community

private

Trap Community

public

Host Tagging

Tagged

Host VLAN ID

300

Host VLAN Priority

Security Definition

Network Only

Alarm ID

Trap Status

Masked

Alarm Description

Dropped Frames

Port Label

Port 1

Rising Alarm Threshold

Falling Alarm Threshold

Sampling Interval

Event Type

None

SNMPv3

SNMPv3

Disable

SNMPv3 Settings

Authentication Protocol

usmNoAuthProtocol

Privacy Protocol

usmNoPrivProtocol

Message Processing Model

SNMPv3

Security Model

Any

Security Level

noAuthNoPriv

Baud rate

115200

Host

Encapsulation

Alarm Trap Mask

Alarm Threshold
Configuration

Control Port

ETX-102 Ver. 3.8

Default Settings

3-3

Chapter 3 Operation
Type

Syslog

Installation and Operation Manual


Parameter

Default Value

Set Scrolling Window Size

Security timeout

10

Logging Status

Disable

Device UDP Port

514

Facility

Local 1

Severity Level

Major

Server Access

Disable

Server IP Address

0.0.0.0

Server UDP Port

514

Traps Delay
Date/Time

Protection (LAG)

Protection (1:1)

Physical Layers

Ethernet

0
NTP Mode

Disable

NTP Server IP Address

0.0.0.0

GMT

NTP Update Interval

Redundancy Method

LAG

Wait to Restore

Recovery Mode

Revertive

Wait to Restore

Shut Down Duration Upon Flip

Set Active Port

None

Fault Propagation WTR

Administrative Status

Up

Autonegotiation

Enable

Max Capability Advertised/Speed


& Duplex

100base - TX full duplex mode

Flow Control

Disable

MDIX Auto Cross Over

Enable

Fault Propagation

Disable

Link OAM (802.3ah)

Disable

OAM MNG

Disable

ID

Put your string here

SP VLAN

Local MEP ID

Remote MEP ID

OAM

EVC

MEP

3-4

Default Settings

ETX-102 Ver. 3.8

Installation and Operation Manual


Type

Services

Event Reporting
(Frame Loss Ratio,
Unavailability Ratio)

Event Reporting
(Frame Above Delay,
Frame Above Delay Variation)

Bridge

Network Port

User Port

OAM

MD Names

EVC

ETX-102 Ver. 3.8

Chapter 3 Operation
Parameter

Default Value

OAM Mode

Disable

Continuity Verification Mode

Disable

OAM Destination Address Type

Multicast

OAM Destination MAC Address

00-00-00-00-00-00

Default Priority

PM

Disabled

Service Priority

Delay Objective

Delay Variation Objective

Event Reporting Type

None

Rising Threshold

1E-10

Falling Threshold

1E-10

Event Reporting Type

None

Rising Threshold

Falling Threshold

Sampling Interval

VLAN Mode

Unaware

Forwarding Mode

Filter

Aging Time

300

Ingress Filtering

Enable

Accept Frame Type

All

Port VID

Default Priority Tag

Cnode Level 1 State

Disable

Ingress Filtering

Enable

Accept Frame Type

All

Port VID \ Stacking VID

Default Priority Tag

Tag Handling

None

Standard OAM MAC Address

01-80-C2-00-00-30

Standard OAM EtherType

8902

MD Format

String

MD Name

None

EVC Name

Put your string here

Default Settings

3-5

Chapter 3 Operation
Type

MA ID

MEP

Services

Event Reporting
(Frame Loss Ratio,
Unavailability Ratio)

Event Reporting
(Frame Above Delay,
Frame Above Delay Variation)

Installation and Operation Manual


Parameter

Default Value

SP VLAN

Protocol Type

Standard

MD ID

MA Format

String

MA Name

DEFAULT

Local ID

OAM Destination Address Type

Mulicast

OAM Destination MAC Address

00-00-00-00-00-00

Remote ID

MD Level

OAM Mode

Disable

CC Interval

1 second

PM

Disabled

Service Priority

Delay Objective

Delay Variation Objective

Event Reporting Type

None

Rising Threshold

1E-10

Falling Threshold

1E-10

Event Reporting Type

None

Rising Threshold

Falling Threshold

Sampling Interval

Classification

802.1p

Rate Limitation

No Limit

Burst Size

96

Limit Packet Type

All

Rate Limitation

No Limit

Destination IP Address

0.0.0.0

Number of Frames to Send

QoS

Priority
Rate Limitation
Ingress

Egress
Diagnostics

Ping

3-6

Default Settings

ETX-102 Ver. 3.8

Installation and Operation Manual


Type

Loopbacks

VLAN Test

3.4

Chapter 3 Operation
Parameter

Default Value

MAC Swap

Disable

Looped Data

All

VLAN ID

Direction

Local

Forced Source Mac

00-00-00-00-00-00

Forced Destination Mac

00-00-00-00-00-00

Loopback Timeout

Loopback State

Disable

Port

Network 1

VLAN ID

State

Off

Configuration and Management Alternatives

After installation, there are no special operating procedures for ETX-102. Once it
is powered up, the unit operates automatically. The unit operational status can
be monitored constantly.
If required, ETX-102 can be reconfigured. ETX-102 can be managed using the
following ports and applications:

Local out-of-band management via an ASCII terminal connected to the


RS-232 port. Usually, preliminary configuration of the system parameters is
performed via ASCII terminal. Once the ETX-102 host IP parameters are set, it
is possible to access it via Telnet or Web browser for further configuration.

Remote inband management via user or network port. Remote management


is performed via Telnet or Web browser.

The following functions are supported by the ETX-102 management software:

Viewing system information

Modifying configuration and mode of operation, including setting system


default values and resetting the unit

Monitoring ETX-102 performance

Initiating connectivity tests

Uploading and downloading software and configuration files.

Working with Terminal


ETX-102 has a V.24/RS-232 asynchronous DCE port, designated CONTROL and
terminated in a 9-pin D-type female connector. The control port continuously
monitors the incoming data stream and immediately responds to any input string
received through this port.

ETX-102 Ver. 3.8

Configuration and Management Alternatives

3-7

Chapter 3 Operation

Installation and Operation Manual

The ETX-102 control port can be configured to communicate at the following


rates: 9.6, 19.2, 38.4, 57.6 or 115.2 kbps.

To start a terminal control session:


1. Make sure all ETX-102 cables and connectors are properly connected.
2. Connect ETX-102 to a PC equipped with an ASCII terminal emulation
application (for example, Windows Hyper Terminal or Procomm).
3. Turn on the control terminal PC and set its port parameters to 115,200 baud;
8 bits/character; 1 stop bit; no parity.
4. Set the terminal emulator to ANSI VT100 emulation (for optimal view of
system menus).
5. When the initialization and self-test are over, press any key to display the
user name and password entry fields.

Login
To prevent unauthorized modification of the operating parameters, ETX-102
supports two access levels: .

Note

Superuser can perform all the activities supported by the ETX-102


management facility, including defining new users.

Users access rights (full control or read only) are defined by the superuser.
Users are not allowed to create new users.

It is recommended to change default passwords to prevent unauthorized access


to the unit.
To enter as a superuser:
1. Enter su for user name.
2. Enter 1234 for password.
This allows you to configure all the parameters of ETX-102, and to change the
su and user passwords.

To enter as a user:
1. Enter user for user name.
2. Enter 1234 for password.

Note

If the password is invalid in three consecutive attempts, the system becomes


inaccessible for 15 minutes.

Choosing Options

How to use the terminal to perform a desired activity:

3-8

To select a menu item, type the corresponding line number and then press
<Enter>. This will either

Configuration and Management Alternatives

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 3 Operation

display a submenu or a parameter selection screen

or
let you type the (free text) parameter value in the same row

or
toggle the current value of the corresponding parameter (relevant to
ENABLE/DISABLE or ON/OFF selections).

The type of response to be expected after selecting a menu item is indicated


as follows:
>

Selecting that item will display a submenu or a parameter


selection screen.

...

Selecting that item will let you type the desired value in the
same line.

Nothing

When neither symbol is displayed, selecting that item will toggle


the current selection, now shown in brackets (for example, this
will change ENABLE to DISABLE or vice versa).

When a menu does not fit on one screen (because it includes many lines), it
is displayed on two consecutive pages. In this case, you will see (N) after
the last line on the first page and (P) after the last line on the second page:

While on the first page, press N to display the second page

While on the second page, press P to return to the first page.

When a configuration screen is organized as a table, a special set of keys is


used for navigation within the table (such screens always have a ? (help)
option that displays these keys). The following keys may be used for
navigation within tables:

L move to the left

R move to the right

^D scroll down

^U scroll up

In addition, the following shortcuts are also available:

Tab select the next cell that may be changed

G followed by <row number>,<col number> select a specific cell. For


example, type G2,5 to select the fifth cell in the second row.

The current value of a parameter is listed within parentheses ( ). To change a


parameter value on a parameter selection screen:

Type the line number corresponding to the desired value, and then press
<Enter>

To enter a value which requires free text entry, type in the desired string
and then press <Enter>. Use backspace to erase the current string.
Note that whenever applicable, the allowed range of values of a
parameter is listed within square brackets [ ].

ETX-102 Ver. 3.8

Configuration and Management Alternatives

3-9

Chapter 3 Operation

Installation and Operation Manual

The entry is checked after pressing <Enter>, and it is accepted only if it is


valid:

If you make an error, for example, if you press a key not active on the
current screen or select an invalid parameter value, an ERROR indicator
appears in the right-hand corner. This indicator disappears as soon as
you make a correct operation.

If you select a parameter value incompatible with the current operating


state or other parameters, you will see a message that explains the error.

When done with the current screen, press <Esc> to return to the previous
screen, or type ! to return directly to the main menu.

Ending a Terminal Configuration Session

To end the current terminal session:

Type &.

After a session is ended, it is necessary to enter again a valid user name and
password to start a new session.

Working with Web Terminal


Web Browser Requirements
The following Web browsers can be used to access the ETX-102 supervision utility
from any location that enables access to the ETX-102 using Internet protocols.

Internet Explorer 6.0 and up, running on Windows

Netscape Communicator 7.0 and up, running on Windows, HPOV or Linux

Firefox 1.0.4 and up, running on Windows

Mozilla 1.4.3 and up, running on Linux.

However, before using Web access, it is necessary to perform a preliminary


configuration of ETX-102.
When using a Web browser, pay attention to the following points:

3-10

Enable scripts

Configure the firewall that is probably installed on your PC in order to allow


access to the destination IP address

Disable pop-up blocking software (such as Google Popup Blocker); you may
also have to configure your spyware/adware protection program to accept
traffic from/to the destination IP address

Browsers store the last viewed pages in a special cache. To prevent


configuration errors, it is absolutely necessary to flush the browsers cache
whenever you return to the same screen.

Configuration and Management Alternatives

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 3 Operation

Login

To manage ETX-102 via Web terminal:


1. Open the Web browser.
2. Enter the IP address of ETX-102 in the address field of the browser in the
following format: http://IP address (IP address stands for the actual
ETX-102 IP address).
3. After entering the address, press <Enter> to command the browser to
connect.
4. After the opening window is displayed, click LOGIN.
5. In the Password Entry window, log in by entering your user name (user) and
password (1234).
The Main menu is displayed.
6. Use standard browser operating procedures to perform the desired activities.

Notes

It is recommended to change default passwords to prevent unauthorized

access to the unit.


ETX-102 allows up to three management sessions to be active at a time. This

includes up to two network sessions (Telnet, Web) and one ASCII terminal
session.
If no user input is detected for five minutes during the Web terminal session,

ETX-102 automatically disconnects from the management station.

Navigating the Web Terminal Menus


The Web-based remote access terminal management software provides a
user-friendly interface for configuring, collecting statistics, and performing
diagnostic tests on the ETX-102 units.

To choose an option:
1. Click a link in the Web screen to display the next menu.
2. Once the target screen is displayed, select a value from the drop-down box or
enter it in a text box.
At the left-hand bottom corner are some auxiliary management tools:

ETX-102 Ver. 3.8

Status shows the number of users currently managing ETX-102

Trace opens an additional pane for system messages, progress indicators


(ping, software and configuration file downloads) and alarms. It is
recommended to keep the trace pane open all the time.

Refresh All refreshes all display elements.

Configuration and Management Alternatives

3-11

Chapter 3 Operation

Installation and Operation Manual

Menu Maps
Use these menu trees as a reference aid while performing configuration and
control functions. Chapter 4 illustrates menus and explains parameters. Table 3-2
lists default values.
Main Menu
Inventory
Configuration
Monitoring
Diagnostics
Utilities

Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS

Quick Setup
Host IP Address
Host IP Mask
Default Gateway
Host Tagging
Host VLAN ID
VLAN Mode
Forwarding Mode
DHCP Client

Figure 3-2. Main Menu > Configuration > Quick Setup


Device Info
Name
Location
Contact Person

Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS

System
Host
Management
Control Port
Date/Time
Factory Default
Protection

Host
IP Address
IP Mask
Default Gateway
Default IP
DHCP
DHCP Status

Host

Encapsulation

Read Community
Write Community
Trap Community
Encapsulation

Host Tagging
Host VLAN ID
Host VLAN Priority
Security Definition

Users

SNMPv3 Settings
Users
Targets & Notify
SNMPv1/v3 Mapping
SNMPv3 Factory Defaults
Summary Target Table
Summary User Table

Management
Device Info
SNMPv3
Host
Manager List
SNMPv3 Settings
Management Access
Alarm Trap Mask
Alarm Threshold Configuration
Traps Delay

Security Name
Authentication Protocol
Authentication Password
Privacy Protocol
Privacy Password

Targets and Notify


Target Params
Target Address
Notify
Trap

Target Params
Name
Message Processing Model
Security Model
Security Name
Security Level

Target Address
Name
IP Address
Params Name
Address Mask
Tag List

Notify
Name
Tag

Trap
Trap Name
Notify Name

User Access

Control Port
Management Access

Baud Rate
Set Scrolling Window Size
Security Timeout

User Access
Telnet/SSH Access
SNMP Access
Web Access
Access Policy
RADIUS Parameters

Date/Time
Time
Date
NTP Mode
NTP Server IP Address
GMT (+/- XX)
NTP Update Interval

Alarm Trap Mask


Alarm ID
Trap Status

Access Policy
1st Level
2nd Level

RADIUS Parameters
Serve Access
Server IP Address
Key String
Number of Retries
Timeout
Authentication Port

Protection
Redundancy Method
Recovery Mode (1:1 only)
Wait to Restore
Shut Down Duration Upon Flip (1:1 only)
Set Active Port (1:1 only)

User Name
Access
'su' Password
New Password
Confirm New Password

Alarm Threshold Configuration


Alarm Description
Port Label
Rising Alarm Threshold
Falling Alarm Threshold
Sampling Interval
Event Type

Figure 3-3. Configuration > System

3-12

Configuration and Management Alternatives

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 3 Operation

Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS

Physical Layers
Ethernet
Fault Propagation WTR

Ethernet (Network)
Administrative Status
User Name
Flow Control
OAM (802.3ah)
OAM MNG

or
Ethernet (User)
Administrative Status
User Name
Autonegotiation
Max Capability Advertised
Flow Control
MDIX Auto Cross Over
MDIX Manual Switch
Fault Propagation
OAM (802.3ah)
OAM MNG

Figure 3-4. Configuration > Physical Layers


Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS

Bridge
VLAN Mode
Forwarding Mode
Aging Time
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership

Bridge Port
(User)

Bridge Port
(Network)
Ingress Filtering
Accept Frame Type
Port VID/Stacking VID
Default Priority Tag

or

Ingress Filtering
Accept Frame Type
Port VID/Stacking VID
Default Priority Tag
Tag Handling

Egress Tagged Ports


Egress Untagged Ports

Figure 3-5. Configuration > Bridge

Figure 3-6. Configuration > OAM

ETX-102 Ver. 3.8

Configuration and Management Alternatives

3-13

Chapter 3 Operation

Installation and Operation Manual

Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS

QoS

Priority

Priority
Rate Limitation

Classification
Mapping

Rate Limitation
Ingress
Egress

Ingress
Rate Limitation
Burst Size
Limit Packet Type

Egress
Rate Limitation

Figure 3-7. Configuration > QoS


Monitoring

Main Menu
Inventory
Configuration
Monitoring
Diagnostics
Utilities

System
Physical Layers
OAM
Bridge

Diagnostics
Ping
Trace Route
Loopback
VCT Test
VLAN Test

Utilities
File Utilities
Reset

System
Connection Status
Connected Managers
Event Log

Physical Layers
Ethernet Status
Ethernet Statistics

End-to-End
Status
Statistics

OAM

Statistics
15 Min. Intervals
24 Hours Counters
Service Counters

Link (802.3ah)

End-to-End
Link (802ah)

Status

Bridge
MAC Bridge
VLAN Table

File Utilities
S/W & File Transfer using TFTP
Swap Main Application File with Backup

Figure 3-8. Monitoring, Diagnostics and Utilities

3.5

To power off the unit:

3-14

Turning Off the Unit

Remove the power cord from the power source.

Turning Off the Unit

ETX-102 Ver. 3.8

Chapter 4
Configuration
This chapter illustrates the configuration ETX-102 screens and explains their
parameters.
The menu tree of the ETX-102 management software is shown in Chapter 3.
For your convenience, parameters that are mandatory for configuration, such as
IP settings of the ETX-102 host or forwarding mode, are given in the Quick Setup
menu (Main menu > Configuration > Quick Setup). This menu is explained in the
Quick Start Guide at the beginning of the manual, and the menu parameters are
explained in the relevant sections of the configuration chapter.

4.1

Configuring for Management

Usually, initial configuration of the management parameters is performed via an


ASCII terminal. Once the ETX-102 host IP parameters are set, it is possible to
access it via Telnet or Web for operation configuration. Perform the following
steps in order to configure ETX-102 for management:

Configuring IP Host Parameters

Entering Device Information

Configuring Communities

Configuring the Host Encapsulation

Configuring the Network Managers.

Configuring IP Host Parameters


ETX-102 can be managed by a network management station which is located on
the LAN connected to the one of the units Ethernet ports. In order to establish a
proper connection, it is necessary to configure the following: host IP address,
subnet mask, default gateway. Also it is possible to enable or disable the ETX-102
DHCP client.

ETX-102 Ver. 3.8

Configuring for Management

4-1

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>System>Host
1.
2.
3.
4.
5.
6.

IP Address
IP Mask
Default gateway
DHCP
Default IP
`DHCP Status

...
...
...
...
...
>

(0.0.0.0)
(255.255.255.0)
(0.0.0.0)
(Enable)
(0.0.0.0)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-1. Host Menu

Configuring the DHCP Client


To facilitate integration of a new device into a DHCP IP network, if no IP address
has been manually configured, ETX-102 automatically requests one from the
DHCP server upon booting. ETX-102 is shipped with the DHCP client set to Enable.

To enable the DHCP client:


1. From the System menu, select Host.
The Host menu appears.
2. From the Host menu, select DHCP Client, and choose Enable.
ETX-102 starts broadcasting requests for an IP address. When the DHCP
server is found, ETX-102 receives from it all necessary host IP
parameters.
3. From the Host IP menu, select DHCP Status to view the current status of the
ETX-102 DHCP client:

Note

Server ID IP address of the DHCP server

Lease expiration time Time when the IP address lease expires

Current status Current status of the DHCP client (Locating available


server, Waiting for confirmation of lease, etc)

When the IP address lease is about to expire, DHCP client automatically requests
lease extension.
To disable the DHCP client:

From the Host menu, select DHCP Client, and choose Disable.
ETX-102 sets the host IP address to 0.0.0.0, while preserving the IP mask
and default gateway values. Telnet or HTTP connection to ETX-102 is
disrupted and the unit can be accessed only using a previously defined
default IP address (see the next section for instructions on how to enter
a default IP address).

4-2

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Setting Host IP Parameters


ETX-102 allows entering IP parameters manually or using parameters acquired
from the DHCP server.

To define the IP parameters manually:


1. Disable the DHCP client.
ETX-102 releases the current IP address by sending the release message
to the DHCP server, sets all host IP parameters to 0.0.0.0 and reboots
itself automatically.
2. From the Host menu, perform the following:

Note

Select IP Address to define the host IP address

Select IP Mask to define the host IP mask.

Select Default Gateway to set the default gateway IP address

Select Default IP to enter a default IP address. Configuring a default IP


address is necessary if you want to preserve a Telnet or HTTP connection
to ETX-102 after disabling its DHCP client.

The default gateway must be in the same subnet as the host.


To acquire a new IP address from the DHCP server:
1. From the Host IP menu, set all host IP parameters (host IP, IP mask and
default gateway) to 0.0.0.0.
2. Enable the DHCP client.
ETX-102 reboots itself automatically and acquires new IP parameters
from the DHCP server at startup.

Entering Device Information


The ETX-102 management software allows you to assign a name to the unit, add
its description, specify its location to distinguish it from the other devices
installed in your system, and assign a contact person.

To enter device information:


1. From the System menu, select Management.
2. From the Management menu, select Device Info.
The Device Info menu appears (see Figure 4-2).
3. From the Device Info menu, select Device Name and enter a desired name for
the ETX-102 unit.
4. Select Device Location and enter the desired name for the current ETX-102
location.
5. Select Contact Person and enter name of a contact person.

ETX-102 Ver. 3.8

Configuring for Management

4-3

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>System>Management>Device Info
Description
... (ETH NTU: Boot: 2.01, Hw: 3.01, Sw: 3.80)

1. Name
... (ETX-102)
2. Location
... (The Location of the Device)
3. Contact Person ... (Name of Contact Person)
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-2. Device Info Menu

Configuring Communities
For establishing a proper management link, you must specify the SNMP trap,
read, and write communities.

To configure ETX-102 communities:


1. From the Management menu, select Host.
The Host (Management) menu is displayed (see Figure 4-3).
2. From the Host menu, do the following:

Select Read Community to enter the name of a community with read-only


authorization.

Select Write Community to enter the name of a community with write


authorization.

Select Trap Community to enter the name of a community to which


ETX-102 sends traps.

ETX-102
Configuration>System>Management>Host
IP Address
... (0.0.0.0)
IP Mask
... (0.0.0.0)
Default Gateway
... (0.0.0.0)
1.
2.
3.
4.

Read Community
Write Community
Trap Community
Encapsulation

... (Public)
... (Public)
... (Public)
>

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-3. Host (Management) Menu

4-4

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Configuring the Host Encapsulation


ETX-102 management software allows you to create a dedicated management
VLAN in order to separate management traffic from the user data. In addition, it
is possible to restrict the management traffic to the network or user ports or
allow inband management via any of the ETX-102 ports.

To configure the host encapsulation:


1. From the Host menu (Figure 4-3), select Encapsulation.
The Encapsulation menu is displayed (see Figure 4-4).
2. From the Encapsulation menu, do the following:

Select Host tagging, and choose Tagged or Untagged to consider or


ignore the VLAN tagging of the management traffic coming from the
management station.

If host tagging is enabled, select Host VLAN ID to enter the ID of the host
VLAN (14094).

If the host tagging is enabled, select Host VLAN priority to specify priority
of the host VLAN (07).

Select Security Definition and define the ports from which the manager
can access ETX-102. Possible values depend on the VLAN mode (aware or
unaware) of the ETX-102 bridge, selected in the Bridge menu (see
Configuring the Bridge below).

All ETX-102 can be accessed via any of its ports (available in


VLAN-aware and VLAN-unaware mode). In VLAN-aware mode, an
ETX-102 port and the ETX-102 host must be members of the same
VLAN to allow access to the unit via this port.
Network Only ETX-102 can be accessed via the network port only
(available only in the VLAN-unaware mode)
User Only ETX-102 can be accessed via one of its user ports
(available only in the VLAN-unaware mode).

ETX-102
Configuration>System>Management>Host>Encapsulation
1.
2.
3.
4.

Host Tagging
Host VLAN ID [1 - 4094]
Host VLAN Priority [0 - 7]
Security Definition

(Tagged)
... (300)
... (7)
(All)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-4. Encapsulation Menu

ETX-102 Ver. 3.8

Configuring for Management

4-5

Chapter 4 Configuration

Installation and Operation Manual

Configuring the Network Managers


You can define or modify the network management stations to which the SNMP
agent of ETX-102 sends traps. Up to ten managers can be defined. Entering the
IP address and corresponding subnet mask defines each management station. In
addition, you can temporarily prevent a manager station from receiving traps by
masking the network manager. Before editing the manager list, it is necessary to
add at least one network manager.

To add a network manager:


1. From the Management menu, select Manager List.
The Management List menu appears (see Figure 4-5).
2. From the Management List menu, type a to add a management station.
The Management List menu display changes, entering the Add mode
(see Figure 4-6).
3. When in Add mode, perform the following:

Select Manager IP, and enter the IP address of the management station.

Select Manager Trap Mask, and select Enable or Disable to mask or


unmask traps for the selected management station.

Select SNMP Traps UDP Port and define a UDP port to be used for sending
SNMP traps to the network manager.

Select Save All to save the network manager.

Press <Esc> to return to the Edit mode.

To edit the manager list:


1. From the Management List menu, move the cursor to the Trap Mask field by
pressing <Tab>.
2. Toggle between Enable and Disable to mask or unmask traps for the selected
management station.
ETX-102 supports SNMP traps for the following events:

Cold start

Link up

Link down

Authentication failure

TFTP status change

Agent status change

Power failure

Rising alarm

Falling alarm.

Refer to trap list in Chapter 5 for the detailed description of the ETX-102 traps.

4-6

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To remove a network manager:


1. From the Manager List, select a network manager that you intend to remove.
2. Type r to remove the selected network manager from the list.

To clear the manager list:

From the Manager List, type x to delete all network managers.

ETX-102
Configuration>System>Management>Manager List
Manager ID
IP Address
Trap Mask
1.
1.1.1.1
Disable
Disable

SNMP Traps UDP Port


162

2.

2.2.2.2

162

3.

3.3.3.3

Disable

162

4.

4.4.4.4

Disable

162

A add R remove X clear table


ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-5. Manager List Menu


ETX-102
Configuration>System> Management > Manager List
Manager ID
(1)
1. IP Address
... (1.1.1.1)
2. Trap Mask
... (Disable)
3. SNMP Traps UDP Port
... (162)
4. Save All
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-6. Manager List Menu, Add Mode

Configuring SNMPv3
ETX-102 supports SNMP version 3 entity, providing secure access to the device by
authenticating and encrypting packets transmitted over the network.
Follow these steps to configure the SNMPv3 entity:
1. Enable SNMPv3.
2. Add a new user.
3. Add a new notification entry.
4. Assign traps to notification entries.
5. Configure target (NMS) parameters.
6. Specify target address, define its parameter set and assign notification tags.
7. Map SNMPv3 setting to SNMPv1 settings (if necessary).

ETX-102 Ver. 3.8

Configuring for Management

4-7

Chapter 4 Configuration

Installation and Operation Manual

Enabling SNMPv3

To enable SNMPv3:
1. From the Management menu (Configuration > System > Management), select
SNMPv3 to enable the SNMPv3 entity.
The SNMPv3 Settings line is added to the Management menu.
2. From the Management menu, select SNMPv3 Settings.
The SNMPv3 Settings menu is displayed.
The SNMPv3 Settings menu includes the following information:

Engine Boots (The number of times that the SNMP engine has reinitialized
since its identification was last configured.)

Engine Time (The number of seconds since the last SNMP engine boot)

SNMP Message Size (The maximum length of an SNMP message (in


octets) that the SNMP engine can send or receive and process.)

ETX-102
Configuration>System>Management>SNMPv3 Settings
Engine Boots
(2)
Engine Time
(276)
SNMP Message Size
... (1500)
1. Users
>
2. Targets & Notify
>
3. SNMPv1/v3 Mapping
>
4. SNMPv3 Factory Defaults
5. Summary User Table
[]
6. Summary Target Table
[]
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-7. SNMPv3 Settings Menu

Adding SNMPv3 Users


ETX-102 supports up to ten SNMPv3 managers with different authorization and
privacy attributes.

Note

Access control policy is defined via the vacmSecurityToGroupTable and


vacmAccessTable tables, which can be accessed via an SNMP browser only.
To add an SNMPv3 user:
1. From the Users menu (Configuration > System > Management > SNMPv3
Settings > Users), perform the following:

4-8

Select Security Name and enter security name for a new user (up to 32
alphanumeric characters).

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Select Authentication Protocol and define the authentication protocol to


be used for authenticating the user:

usmNoAuthProtocol (No authentication is performed)

usmHMACMD5AuthProtocol (MD5 protocol)

usmHMACSHAAuthProtocol (SHA protocol)

Select Privacy Protocol and define the type of privacy protocol to be used
for encryption:

usmNoPrivProtocol (Privacy protocol is not used)

usmDESPrivProtocol (DES protocol)

Select Authentication Password and define the authentication password


of the user. This is not available if authentication has been disabled.

Select Privacy Password and define the private key used for encryption.
This is not available if privacy has been disabled.

2. To view the summary of the SNMPv3 user configuration, select Summary User
Table from the SNMPv3 Settings (Configuration > System > Management >
SNMPv3 Settings) menu.

To delete an SNMPv3 user:


1. From the Users menu (Configuration > System > Management > SNMPv3
Settings > Users), type f or b to select an SNMPv3 user.
2. Type r to delete the selected user.

Adding Notification Entries

To add a notification entry:


1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Notify.
The Notify menu is displayed (see Figure 4-8).
2. From the Notify menu, perform the following:

ETX-102 Ver. 3.8

Name (ASCII string identifying the notification entry)

Tag (A tag value to be associated with the current notification entry. This
tag is used to identify the current notification entry when configuring the
target address.)

Configuring for Management

4-9

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Notify
Type
1. Name
2. Tag

> ()
...()
...()

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-8. Notify Menu

Assigning Traps
One or more traps must be assigned to each notification entry.

To assign traps to notification entries:


1. From the Target & Notify menu, select Trap.
The Trap menu is displayed.
2. From the Trap menu, configure the following:

Tag Name (A tag from the list of previously defined notification tags)

Trap (A trap to be assigned to the selected tag).

ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Trap
1. Tag Name
2. Trap

>()
>()

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-9. Trap Menu

Configuring Target Parameters


A target is an SNMPv3 network management station to which ETX-102 is going to
send trap notifications. A set of parameters has to be configured and assigned to
each target.

To configure target parameters:


1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Params.
The Target Params menu is displayed (see Figure 4-10).
2. From the Target Params menu, configure the following:

4-10

Name (An ASCII string identifying current set of target parameters)

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Message Processing Model (The Message Processing Model to be used


when generating SNMP messages using this entry):

SNMPv1

SNMPv2c

SNMPv2u
SNMPv3

Chapter 4 Configuration

Security Model (The Security Model to be used when generating SNMP


messages using this entry):

Any

SNMPv1

SNMPv2c

User-Based Security Model (USM)

Security Name (Identification of the principal on whose behalf SNMP


messages are to be generated using this entry. This can be either
SNMPv3 user or SNMPv1/SNMPv2 community string.)

Security Level (The level of security to be used when generating SNMP


messages using this entry):

noAuthNoPriv (Authorization and privacy are disabled)

authNoPriv (Authorization is enabled, privacy is disabled)

authPriv (Authorization and privacy are enabled)

ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Target Params
1.
2.
3.
4.
5.

Name
Message Processing Model
Security Model
Security Name
Security Level

...
>
>
...
>

()
()
()
()
()

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-10. Target Params Menu

Configuring Target Address


Each target must have a valid IP address and IP mask. Also, previously-configured
parameter set and notification tags must be assigned to the target.

To configure the target address:


1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Address.
The Target Address menu is displayed (see Figure 4-11).

ETX-102 Ver. 3.8

Configuring for Management

4-11

Chapter 4 Configuration

Installation and Operation Manual

2. From the Target Address menu, configure the following:

Name (ASCII string identifying the target)

IP Address (Valid IP address of the NMS. The IP address must be in


xxx.xxx.xxx.xxx:162 format, where 162 is a standard SNMP port used for
sending traps.)

Params Name (Name of the previously defined target parameter set to be


assigned to this target)

Address Mask (An IP mask of the NMS)

Tag List (List of previously defined notification tags).

3. To view the summary of the SNMPv3 target configuration, select Summary


Target Table from the SNMPv3 Settings (Configuration > System >
Management > SNMPv3 Settings) menu.
ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Target Address
1.
2.
3.
4.
5.

Name
IP Address
Params Name
Address Mask
Tag List

...
...
...
...
...

()
()
()
()
()

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-11. Target Address Menu

Mapping SNMPv1 to SNMPv3


ETX-102 supports coexistence of different SNMP versions by mapping
SNMPv1/SNMPv2 community name to the SNMPv3 security name value. The
mapping is performed according to the RFC 3584 requirements.

To map SNMPv1 to SNMPv3:


1. From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select SNMPv1/v3 Mapping.
The SNMPv1/v3 Mapping menu is displayed.
2. From the SNMPv1/v3 Mapping menu, select the following:

4-12

Community Index (SNMP community index)

Community String (SNMPv2/SNMPv2 community name)

Security Name (SNMPv3 security name to me mapped to the


SNMPv2/SNMPv2 community name)

Transport Tag (Specifies a set of transport endpoints which are used in


two ways:

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To specify the transport endpoints from which an SNMP entity


accepts management requests
To specify the transport endpoints to which a notification may be
sent using the community string matching the corresponding instance
of community name.)

ETX-102
Configuration>System>Management> SNMPv3 Settings> SNMPv1/v3 Mapping
1.
2.
3.
4.

Community Index
Community Name
Security Name
Transport Tag

...
...
...
...

()
()
()
()

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-12. SNMPv1/v3 Mapping Menu

Controlling Management Access


You can enable or disable access to the ETX-102 management system via an SNMP,
Telnet or Web-based application. By disabling SNMP, Telnet or Web, you prevent
unauthorized access to the system when security of the ETX-102 IP address has
been compromised. When SNMP, Telnet and Web access is disabled, ETX-102 can
be managed via an ASCII terminal only. In addition, you can limit access to the
device to only the stations defined in the manager list. Table 4-1 details
management access implementation, depending whether the network managers
are defined or not.

To define the management access method:


1. From the Management menu, select Management Access.
The Management Access menu appears (see Figure 4-13).
2. From the Management Access menu, select Telnet/SSH Access to configure
Telnet access, select SNMP Access to configure SNMP access, or select Web
Access to configure Web access.
3. Define access mode for each management method:

ETX-102 Ver. 3.8

Enable (Telnet, SNMP or Web access is enabled)

Disable (Telnet, SNMP or Web access is disabled)

Manager Only (Access is allowed only for the stations appearing in the
manager list)

Enable Secure (Secure access (SSH-enabled for Secure Shell or SSLenabled for Web) is enabled)

Manager Only Secure (Secure access (SSH-enabled for Secure Shell or


SSL-enabled for Web) is allowed only for the stations appearing in the
manager list).

Configuring for Management

4-13

Chapter 4 Configuration

Installation and Operation Manual

Table 4-1. Management Access Implementation


Access Method

SNMP Access

Telnet Access

Web Access

Mode

Who is Allowed to Access ETX-102


Network
Manager(s) Defined

Network
Manager(s) not
Defined

Enable

Anybody

Anybody

Disable

Nobody

Nobody

Managers Only

Only defined
network managers

Nobody

Enable/Enable Secure

Anybody

Anybody

Disable

Nobody

Nobody

Managers Only/
Managers Only Secure

Only defined
network managers

Nobody

Enable/Enable Secure

Anybody

Anybody

Disable

Nobody

Nobody

Managers Only/
Managers Only Secure

Only defined
network managers

Nobody

ETX-102
Configuration>System>Management>Management Access
1.
2.
3.
4.
5.
6.

User Access
TELNET/SSH access
SNMP access
WEB access
RADIUS Authentication
RADIUS Parameters

>
>
>
>
>
>

(Enable)
(Disable)
(Enable)
(Enable Remote)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-13. Management Access Menu

Defining Access Policy


Access policy allows configuration of multiple authentication protocols. User
authentication is performed in the order the methods are selected. If the first
authentication method is not available, the next selected method is used.
However if the authentication is rejected by the first method, the next method is
not used.

4-14

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To define the access policy:


From the Access Policy menu (Configuration > System > Management >
Management Access > Access Policy), configure the following:

1st Level (First level of authentication):

RADIUS (ETX-102 uses authentication database stored at the RADIUS


server)

Local (ETX-102 uses locally stored authentication database)

2nd Level (Second level of authentication. Available only when the 1st level
authentication is set to RADIUS.):

None (Second authentication level is disabled, access to ETX-102 is


allowed only using the 1st level method.)

Local (ETX-102 uses locally stored authentication database)

Configuring RADIUS Client


The RADIUS (Remote Authentication Dial-In User Service) is a client/server
security protocol. Security information is stored in a central location, known as
the RADIUS server. RADIUS clients, such as ETX-102, communicate with the
RADIUS server to authenticate users. ETX-102 supports up to four RADIUS
servers.

To configure RADIUS client:


1. From the RADIUS Parameters menu (Configuration > System > Management >
Management Access > RADIUS Parameters), type f to select a RADIUS server
that you intend to configure.
The Server Status parameters indicate the current status of the selected
server. The status can be one of the following:

Connected Selected server is currently operating as an active RADIUS


server

Not Connected Selected server is a backup RADIUS server

Disconnected Connection to the selected server has timed out.

2. Configure the following parameters:

ETX-102 Ver. 3.8

Server Access (Disables or enables the RADIUS server)

Server IP Address (IP address of the RADIUS server)

Key String (The shared secret is a password used by RADIUS to


authenticate the client. ETX-102 encrypts the user-password, if present;
using the secret it shares with the RADIUS server.): Any alphanumeric
string up to 16 characters

Number of retries (The number of retries to be made when sending


request to the RADIUS server): 05

Timeout (The maximum time ETX-102 waits for a single request response
from the RADIUS server (in seconds). After this time the request is
retransmitted.): 060

Configuring for Management

4-15

Chapter 4 Configuration

Installation and Operation Manual

Authentication Port (The UDP port number to be used for the RADIUS
authentication application. Make sure to define the same value in the
RADIUS server.): any valid UDP port number.

Configuring Control Port Parameters


ETX-102 embedded software enables you to configure the serial port parameters,
which include specifying terminal baud rate, scrolling window size and security timeout.

To access the Control Port menu:

From the System Configuration menu, select Control Port.


The Control Port menu appears (see Figure 4-14).
ETX-102

Configuration>System>Control Port
Terminal Type
Data Bits
Parity
Stop Bits
Flow Control

(VT100)
(8)
(None)
(1)
(None)

1. Baud Rate
2. Set Scrolling Window Size[0 - 11]
3. Security Timeout (min)[0 - 60]

>(115200 bps)
(4)
(10)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-14. Control Port Menu

To configure the control port data rate:


1. From the Control Port menu, select Baud Rate.
The Baud Rate menu appears (see Figure 4-15).
2. Select the terminal rate by typing the number corresponding to the desired
value, and pressing <Enter>.

Note

The Baud Rate parameter is masked during Telnet and Web sessions.

ETX-102
Configuration>System>Control Port>Baud Rate
1.
2.
3.
4.
5.

(115200 bps)

9600 bps
19200 bps
38400 bps
57600 bps
115200 bps

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-15. Baud Rate Menu

4-16

Configuring for Management

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Setting Scrolling Window Size


User-configurable size of the scrolling window specifies the height of the area
that is reserved for status information. This area is located at the bottom of the
screen.

To set scrolling window size:

From the Control Port menu (Figure 4-14), select Set Scrolling Window Size to
set the size of the status information section at the bottom of the screen in
the range of 0 to 11.

Configuring Security Timeout


The timeout specifies a time interval after which ETX-102 automatically
disconnects from the supervisory terminal or Telnet host if no input from the
user is detected. The timeout value can be in the range of 1 to 60 minutes.

To configure the security timeout:

From the Control Port menu (Figure 4-14), select Security Timeout to set to
in the range of 1 to 60 minutes.
The display is refreshed and a new value appears.

Note

Security timeout value is not valid for Web management, where it is permanently
set to 10 minutes.

4.2

Configuring for Operation

The recommended configuration procedure for ETX-102 includes the following


stages:
1. Configuring device-level parameters (link protection)
2. Configuring network and user Ethernet interfaces at the physical level
3. Configuring internal bridge
4. Configuring QoS parameters.

Configuring the Link Protection


The ETX-102 uses two network link protection modes:

Note

ETX-102 Ver. 3.8

LAG (Link Aggregation Group)

1:1.

Before configuring the link protection make sure that both network ports have
identical bridge port parameters (ingress filtering mode, port VID etc) and are the
members of the same VLAN.

Configuring for Operation

4-17

Chapter 4 Configuration

Installation and Operation Manual

To select the link redundancy method:


1. From the System menu (Configuration > System), select Protection.
The Protection menu (LAG mode) is displayed (Figure 4-16).
2. From the Protection menu select Redundancy Method and choose the
required method:

Note

LAG Both network links are combined into one virtual group, but only
one link transmits data at a time. If a failure occurs on the transmitting
link, ETX-102 switches to the standby link in the group.

In the LAG mode the first link to have its Administrative Status to be set to Up

becomes an active link of the group and starts data transmission. Refer to the
Configuring Network and User Ethernet Interfaces section below for

instructions on how to change the administrative status of the link.


In the LAG mode both network links receive data, but only one of them

transmits.

1:1 Both network ports operate independently, one of them is active,


the other on standby. The traffic is automatically switched to the
standby port in case the active network port or its link fails.
ETX-102

Configuration>System>Protection
GROUP ID
Port Members
1. Redundancy Method

>
>

2. Wait to Restore (sec) [0-720]

(1)
(1,2)
>

(LAG)

... (0)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-16. Protection Menu (LAG Mode)

To configure the LAG link protection

From the Protection menu (LAG mode), select Wait to Restore and define a
period of time between link restoration and using the link for the data
transfer.

To configure the 1:1 link protection:

From the Protection menu (1:1 mode), perform the following:


1. Define port recovery mode:

Non-revertive (Traffic keeps on being sent over the secondary port


(network port 2) after the primary port recovery)
Revertive (Traffic is switched back to the primary port (network port
1) after the primary port recovery)

2. Define Wait to Restore time (Period of time between link restoration and
using the link for the data transfer): 0720 sec

4-18

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

3. Define Shut Down Duration upon Flip time (Period of time during which
the failed link suspends its transmission in order to inform the remote
device of the link failure): 030 sec.
4. Select a permanently active network port:

None (None of the network ports is configured as permanently


active)
Port 1 (Port 1 is configured as a permanently active link. Even if port
1 fails, the traffic is not switched to the standby port.)
Port 2 (Port 2 is configured as a permanently active link. Even if port
2 fails, the traffic is not switched to the standby port.)
ETX-102

Configuration>System>Protection
GROUP ID
Port Members

>
>

(1)
(1, 2)

1. Redundancy Method

>

(1:1)

2. Recovery Mode

>

(Non Revertive)

3. Wait to Restore (sec) [0-720]

... (0)

4. Shut Down Duration Upon Flip (sec)[0-30]

... (0)

5. Set Active Port

>

(None)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-17. Protection Menu (1:1 Mode)

Configuring Ethernet Ports at the Physical Layer


ETX-102 includes two SFP-based FE or GbE network ports, one SFP-based user
port, and three 10/100BasetT user ports. The following parameters can be
configured for the Ethernet ports at the physical level:

ETX-102 Ver. 3.8

Flow control as per IEEE 802.3 (network and user ports)

Fault propagation (10/100BaseT ports)

Autonegotiation (10/100BaseT ports)

Maximum advertised capability for autonegotiation procedure

Data rate and duplex mode, when autonegotiation is disabled

Automatic MDIX cross-over function (10/100BaseT ports)

Fault propagation Wait-to-Restore time

Link OAM (802.3ah) mode

Tunneling of management traffic between two devices implementing OAM.

Configuring for Operation

4-19

Chapter 4 Configuration

Installation and Operation Manual

Configuring Network and User Ethernet Interfaces

To configure Ethernet ports:


1. From the Physical Layers menu, select Ethernet.
The Ethernet menu appears (see Figure 4-18).
2. Type f or b to select the Ethernet port.
3. From the Ethernet menu, configure the following:

Up (The network port is enabled)

Down (The network port is disabled)

User Name (Description of the port)

Autonegotiation:

4-20

Administrative Status:

Enable (Autonegotiation is enabled)

Disable (Autonegotiation is disabled)

Max Capability Advertised (The highest traffic handling capability to be


advertised during the autonegotiation process. Relevant for the
10/100BaseT ports only.):

10BaseT Half Duplex

10BaseT Full Duplex

100BaseT Half Duplex

100BaseT Full Duplex.

Speed & Duplex (Data rate and duplex mode of the Ethernet port, when
the autonegotiation is disabled. Relevant for the 10/100BaseT ports
only.):

10BaseT Half Duplex

10BaseT Full Duplex

100BaseT Half Duplex

100BaseT Full Duplex.

Flow Control (Data flow control method based on Ethernet Pause frames.
Relevant for the 10/100BaseT ports only.):

Enable (Flow control is enabled)

Disable (Flow control is disabled).

MDIX Auto Cross Over (Correction of connection polarity errors for the
user ports. This allows using straight or crossed cables for connecting
user Ethernet ports.)

Enable (MDIX auto cross-over is enabled)

Disable (MDIX auto cross-over is disabled)

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

Chapter 4 Configuration

Disable the MDIX automatic cross-over function before running the physical
loopbacks on the ETX-102 user ports.

MDIX Manual Switch (User port connection type, when the MDIX
automatic cross-over function is disabled.

Cross (Cross-over connection)

Straight (Straight connection).

Fault Propagation, only for user ports (When enabled, fault propagation
mechanism disconnects the current user Ethernet interfaces, when the
network interface is down.)

Enable (Fault propagation is enabled)

Disable (Fault propagation is disabled).

OAM (802.3ah) (Controls OAM link operation for the current port as per
IEEE 802.3ah requirements):

Enable (OAM (802.3ah) operation is enabled)

Disable (OAM (802.3ah) operation is disabled).

OAM MNG (Controls tunneling of SNMP traffic using OAM 802.3ah


protocol. This parameter is available when the OAM 802.3ah operation is
enabled.)

Enable (SNMP tunneling is enabled)

Disable (SNMP tunneling is disabled).

ETX-102
Configuration>Physical Layers >Ethernet
Interface
Port Label
Ethernet Port
1. Administrative Status
2. User Name
3. Auto Negotiation
4. Speed & Duplex
5. Flow Control
6. MDIX Auto Cross Over
7. MDIX Manual Switch
8. OAM (802.3ah)
9. OAM MNG
ESC-prev.menu; !-main menu; &-exit

>
>
>

>

(RJ45)
(1)
(Network 1)
(Up)
(ETH 1)
(Disable)
(10baseT Half Duplex)
(Enable)
(Disable)
(Cross)
(Enable)
(Disable)
1 Mngr/s

Figure 4-18. Ethernet Menu (Network Port)

ETX-102 Ver. 3.8

Configuring for Operation

4-21

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>Physical Layers >Ethernet
Interface
Port Label
Ethernet Port
1. Administrative Status
2. User Name
3. Auto-Negotiation
4. Speed & Duplex
5. Flow Control
6. MDIX Auto Cross Over
7. MDIX Manual Switch
8. Fault Propagation
9. OAM (802.3ah)
10.OAM MNG
ESC-prev.menu; !-main menu; &-exit

>
>
>

(RJ45)
(4)
(User 2)
(Up)
... (ETH 4)
(Disable)
>
(10baseT Half Duplex)
(Enable)
(Disable)
(Cross)
(Disable)
(Enable)
(Disable)
1 Mngr/s

Figure 4-19. Ethernet Menu (User Port)

Configuring the Fault Propagation Wait-to-Restore Time


If the fault propagation feature is enabled, you can also specify the wait-torestore (WTR) time for the user interfaces. WTR is the time period ETX-102 waits
before enabling user interfaces once the network interface is restored.

To configure the fault propagation WTR time:

From the Physical Layers menu (see Figure 4-20), select Fault Propagation
WTR and select the required fault propagation WTR in the range of 03600
seconds (0 disables the WTR).
ETX-102

Configuration>Physical Layers
1. Ethernet
2. Fault Propagation WTR (sec) [0 3600]

>
...(0)

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-20. Physical Ports Menu

Configuring the Bridge


The ETX-102 bridge connects Ethernet ports of the unit. The bridge operates in
VLAN-aware and VLAN-unaware mode. Learning and filtering can be enabled or
disabled. Static MAC addresses are stored in the MAC table. Each bridge port can
be assigned to a VLAN.

4-22

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To configure the bridge:


1. From the Configuration menu, select Bridge.
The Bridge menu is displayed (see Figure 4-21).
2. From the Bridge menu, configure the following:

VLAN Mode:

Aware (ETX-102 bridge handles VLANs)

Unaware (ETX-102 bridge does not handle VLANs)

Forwarding Mode (Operation mode of the bridge):

Transparent (No filtering is performed. ETX-102 forwards all received


frames.)
Filter (ETX-102 filters traffic according the received MAC addresses)

Aging Time (Amount of time a LAN node (station) is allowed to be


inactive before it is removed from the network): 300 to 4080 seconds.
ETX-102

Configuration>Bridge
1.
2.
3.
4.
5.
6.

VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port

(Unaware)
(Filter)
...(300)
[]>
>

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-21. Bridge Menu (VLAN-Unaware)

Configuring MAC Table


You can add static MAC addresses to the ETX-102 MAC table. When the bridge
operates in the VLAN-aware mode, it is possible to assign VLAN ID to a MAC address.

To add a static MAC addresses:


1. From the Bridge menu, select Static MAC Table.
The Static MAC Table appears (see Figure 4-22).
2. From the Static MAC Table, type A to add a static MAC address.
The Static MAC Table display changes, entering the Add mode
(see Figure 4-24).
3. When in Add mode, perform the following:

ETX-102 Ver. 3.8

Select MAC Address, and enter a new MAC address.

Select Received Bridge Port, and choose an ETX-102 interface that this
MAC address will be attached to.

Specify the status of this MAC table entry permanent or forbidden.


Configuring for Operation

4-23

Chapter 4 Configuration

Installation and Operation Manual

If the bridge operates in the VLAN-aware mode, specify VLAN ID with


which frames from the current MAC address are expected to arrive.

Save the changes.

Press <Esc> to return to the Static MAC Table.

To remove a static address from the table:

From the Static MAC Table (Figure 4-22), select a MAC address that you want
to remove and type R.
The static MAC address is deleted from the table.

To delete static addresses from the MAC table:


1. From the Static MAC Table (Figure 4-22), type C to delete all static MAC
addresses.
ETX-102 displays the following message: Are you sure??? (Y/N)
2. Type Y to confirm deletion of all static MAC addresses from the table.

To delete learned addresses from the MAC table:


1. From the Bridge menu, select Erase MAC Table to delete all learned addresses
from the MAC table.
ETX-102 displays the following message: MAC table will be
cleared. Continue??? (Y/N)
2. Type Y to confirm deletion of all learned MAC addresses from the table.

ETX-102
Configuration>Configuration>Bridge>Static MAC Table
MAC Address
Received Bridge Port
1 10-00-00-00-00-00
Network
A - Add

R Remove

C - Clear Table

ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-22. Static MAC Table (VLAN-Unaware)


ETX-102
Configuration>Configuration>Bridge>Static MAC Table
VLAN ID MAC Address
Received Bridge Port
1
1
10-00-00-00-00-00
Network
A - Add R Remove C - Clear Table
ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-23. Static MAC Table (VLAN-Aware)

4-24

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

ETX-102
Configuration>Configuration>Bridge>Static MAC Table
1. Vlan Id[1 - 4094]
(0)
2. MAC Address
... (10-00-00-00-00-00)
3. Status
(Permanent)
4. Received Bridge Port
>
(Network)
5. Save All
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-24. Static MAC Table, Add Mode (VLAN-Aware)

Defining Port 2 as Network or User


Port 2 can be defined as network port 2 or user port 1. When it is configured as a
network port, link aggregation/redundancy becomes available.

To define port 2 type:


1. From the Bridge Port menu (Configuration > Bridge > Bridge Port), type f to
navigate to port 2.
2. Select Bridge Port and define its type: Network 2 or User 1.
You are prompted to confirm the change.
3. Type Y to confirm.
ETX-102 resets automatically with its configuration reset to defaults
(except for management-related parameters).

Configuring Network Bridge Ports


ETX-102 network bridge ports support filtering of incoming user traffic, accepting
all frames or only those that have VLAN tags. The untagged frames can be
assigned PVID and priority by the network bridge ports.

To configure network bridge ports:


1. From the Bridge menu, select Bridge Port.
The Bridge Port menu is displayed (see Figure 4-25).
2. From the Bridge Port menu, type f to select a network bridge port, and
configure the following:

Ingress Filtering (Controls filtering of the incoming user traffic)

Disable (Network bridge port accepts all incoming frames)

Accept Frame Type (Specifies the frame types to be accepted by the


network port)

ETX-102 Ver. 3.8

Enable (Network bridge port accepts only frames with tags of the
VLANs, which include the network port as a member.)

All (Network bridge port accepts all frames (tagged, untagged,


priority-tagged). Untagged and priority-tagged frames receive PVID of
the network bridge port.)

Configuring for Operation

4-25

Chapter 4 Configuration

Installation and Operation Manual

Note

Tag only (Network bridge port accepts only tagged frames, discarding
untagged and priority-tagged).

The Ingress Filtering and Accept Frame Type parameters are available only in
VLAN-aware mode.

Port VID (Port VID to be added by the network bridge port to untagged
and priority-tagged frames): 14094

Default Priority Tag (Default priority tag to be added by the network


bridge port to the incoming untagged frames, or to the frames coming
from the user ports with assigned port priority): 07..

ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
Bridge Port

(Network)

1. Ingress Filtering

>

2. Accept Frame Type

(Enable)
(All)

3. Port VID [1 - 4094]

... (1)

4. Default Priority Tag [0- 7]


>

... (0)

f - forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-25. Bridge Port Menu (Network)

Configuring User Bridge Ports


ETX-102 user bridge ports support filtering of incoming traffic, accepting all
frames or only those that have VLAN tags. The incoming frames can be assigned
PVID and priority by the user bridge ports.

To configure user bridge ports:


1. From the Bridge menu, select Bridge Port.
The Bridge Port menu is displayed (see Figure 4-26).
2. From the Bridge Port menu, type f to select the user bridge port that you
intend to configure, and set the following parameters:

Ingress Filtering (Controls filtering of the incoming traffic)

4-26

Enable (User bridge port accepts only frames with tags of the VLANs,
which include this user port as a member.)
Disable (User bridge port accepts all incoming frames)

Accept Frame Type (Specifies the frame types to be accepted by the user
bridge port)

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

All (User bridge port accepts all frames (tagged, untagged,


priority-tagged). Untagged and priority-tagged frames can receive
PVID of the user bridge port.)
Tag only (User bridge port accepts only tagged frames, discarding
untagged and priority-tagged)

The Ingress Filtering and Accept Frame Type parameters are available only in
VLAN-aware mode.

Note

Chapter 4 Configuration

Port VID (Port VID to be added by the user bridge port to the arriving
frames): 14094

PVID operation depends on the tag handling mode:


None PVID is added to untagged and priority-tagged frames only.
Stack (allowed only in VLAN-unaware mode) PVID is added to all frames

(tagged, untagged, or priority tagged) arriving network-to-user. VLAN tag is


removed from user-to-network frames.

Default Priority Tag (Default priority tag to be added by the user bridge
port to untagged frames. No default priority tags are added to frames
arriving with assigned port priority): 05.

Tag Handling (Defines if user ports add port VID only to untagged or to all
arriving frames)

None (PVID is added to the untagged and priority-tagged frames


only)
Stack (PVID is added to all arriving frames).

ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
(3)
Bridge Port
>
(User1)
1. Ingress Filtering
>
(Enable)
2. Accept Frame Type

(All)

3. Port VID\Stacking VID [1 - 4094] ... (1)


4. Default Priority Tag [0 - 5]
5. Tag Handling

... (0)
(None)

>
F - Forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-26. Bridge Port Menu (User 1)

Configuring VLAN Membership


Each ETX-102 port can be defined as a VLAN member. The ports can also be
configured to add or to strip the VLAN tag at the egress.

ETX-102 Ver. 3.8

Configuring for Operation

4-27

Chapter 4 Configuration

Installation and Operation Manual

To configure the VLAN membership:


1. From the Bridge menu, select VLAN Membership.
The VLAN Membership menu is displayed (see Figure 4-27).
2. From VLAN Membership menu, type a to add a new VLAN and enter the new
VLAN number, or type f to select an existing VLAN to which you intend to
assign the ETX-102 port.
3. When the number of the required VLAN is displayed at the top of the menu,
do the following:

Note

Select Egress Tagged Ports to assign network and/or user ports to be the
tagged members of the current VLAN. These ports add the current VLAN
tag to all frames at egress.

Select Egress Untagged Ports to assign network and/or user ports to be


the untagged members of the current VLAN. These ports strip the current
VLAN tag from all frames at egress.

Each port can be an untagged member in only one VLAN.


To assign an ETX-102 port to a VLAN:
1. From the Egress Tagged Ports or Egress Untagged Ports menu, type a to add
a port.
The display changes, entering the Add mode (see Figure 4-27).
2. When in Add mode, perform the following:
a. Select the ETX-102 port range, displayed as [1 3], [1 4] or any other
combination, depending on the number of ports available in ETX-102 and
enter the desired port number.
b. Repeat step 1 for all ETX-102 ports that you intend to define as
egress-tagged or egress-untagged for the current VLAN.
c.

Select Save All to save the changes.

d. Press <Esc> to return to the VLAN Membership menu.


e. Save the changes.

To delete ETX-102 ports assigned to VLAN:


1. From the Egress Tagged Ports or Egress Untagged Ports menu, select Delete
Range and specify network or user ports that you intend to disconnect from
the current VLAN and save the changes
The ports which will be disconnected are selected one after another or as a
group in the x-y format in the ascending order.
For example, if you want to disconnect ports 1, 2 and 3 from the VLAN, you
can do it in the following succession: Delete Range 1, Delete Range 2, Delete
Range 3, Save All.
Alternatively, you can specify the port range and do it in just two steps, as
follows: Delete Range 1-3, Save All.
2. Press <Esc> to return to the VLAN Membership menu.

4-28

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

3. Save the changes.

ETX-102 Ver. 3.8

Configuring for Operation

4-29

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>Bridge>VLAN Membership>Egress Tagged Ports
1. [1 - 3]... (-)
2. Save All
>
Please select item <1 to 2>
ESC-prev.menu; !-main menu; &-exit; A-add

1 Mngr/s

Figure 4-27. Egress Tagged Ports Menu, Add Mode

Configuring OAM
ETX-102 has the following capabilities for providing operation, administration,
and maintenance (OAM) in packet-switched networks:

Continuity check

Non-intrusive loopback which used to detect loss of bidirectional continuity.

Performance measurements (per service when using the proprietary protocol)

OAM diagnostics (loopback and trace route utility).

To configure the OAM:


1. Define the standard OAM MAC address and EtherType.
2. Assign a name to a Maintenance Domain (MD):

Define an MD format

Specify an MD name

3. Create an EVC (Ethernet Virtual Connection), define its ID and VLAN. The EVC
must be a VLAN member of the network port.
4. Configure MA (Maintenance Association, if the OAM protocol is set to
Standard
5. Configure the MEPs (Maintenance Entity Endpoints)

Assign IDs to the local and remote MEPs

Set OAM destination address type

Define OAM and continuity verification modes

Provide destination addresses for OAM messages

Define an MD level

Set default priority, if you do not intend to define OAM services.

6. Enable OAM services, if the OAM protocol is set to Proprietary


7. Configure the enabled OAM services:
a. Define performance monitoring mechanism
b. Provide service priority

4-30

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

c.

Chapter 4 Configuration

Set objectives (thresholds) for measurement parameters.

Defining Standard OAM MAC Address and Ether Type


The standard OAM MAC address and Ether type can be changed to match your
OAM service requirements.

To define standard OAM MAC address and Ether Type:

From the End-to-End menu (Configuration > OAM > End-To-End), configure
the following:

Standard multicast OAM MAC address

Standard OAM EtherType: 0ffff.


ETX-102

Configuration>OAM>End-to-End
1. MD Names

>

2. Standard OAM MAC Address

... (01-80-C2-00-00-30)

3. Standard OAM EtherType[0 - ffff] ... (8902)


4. EVCs
>

>

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-28. End-to-End Menu

Assigning a Name to Maintenance Domain (MD)


Maintenance Domain is a domain or part of a domain for which the faults in
connectivity are to be managed. Each MD is administered separately. Each
Maintenance Domain is assigned a Maintenance Domain Name. The name must
be unique amongst all those used or available to an operator, and to facilitate
easy identification of administrative responsibility for the Maintenance Domain.

To assign a name to a maintenance domain:


1. From the MD Names menu (Configuration > OAM > End-To-End >MD Names),
type f or b to select a maintenance domain.

Note

MD ID 1 is read-only and its parameters cannot be changed.


2. Type a to add a new name.
3. Define the following:

ETX-102 Ver. 3.8

MD Format (Format of the MD name):

None (No name is defined)

String (Alphanumeric value)

DNS-like (DNS format)

MAC + UINT (MAC and UINT format)

Configuring for Operation

4-31

Chapter 4 Configuration

Installation and Operation Manual

MD Name (Maintenance domain name, according to the selected format).

ETX-102
Configuration>OAM>End-to-End>MD Names
MD ID[1 - 64]
... (2)
1. MD Format
2. MD Name
>

>
(String)
... (None)

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-29. MD Names Menu, Add Mode

Configuring the EVC


EVC (Ethernet Virtual Connection) is an association of ETX-102 units used for
OAM message exchange. ETX-102 supports up to 16 EVCs. EVCs can be defined in
the VLAN-aware and VLAN stacking modes only. Changing VLAN mode to
Unaware, deletes all existing EVCs.

To add and configure an EVC:


1. From the EVCs menu (Configuration > OAM > End-to-End > EVCs), type a to
add an EVC.
2. Enter a new EVC number.
3. Type f or b to select an EVC you intend to configure and perform the
following:
4. Select EVC Name and enter an alphanumeric string of up to 100 characters.
This string is unique and it is used for EVC identification in the maintenance
domain (managed network). The EVC name must be the same for the local
and remote units. When used with the proprietary protocol type, EVC names
serve as Maintenance Association identifiers.

Note

The network bridge port must be a member in the SP VLAN.


5. Define SP VLAN, VLAN tag attached to OAM messages sent over the current
EVC. The SP VLAN must be different from the host VLAN: 14094.
6. Define the Protocol Type, you can choose the standard protocol or the RAD
proprietary protocol:

4-32

Proprietary (RAD proprietary OAM protocol)

Standard (Standard OAM protocol).

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

ETX-102
Configuration>OAM>End-to-End>EVCs
EVC[1 - 64]

... (1)

1. EVC Name

... (Put your string here)

2. SP VLAN[1 - 4094]

... (0)

3. Protocol Type

(Standard)

4. MAID

>

5. MEP

>

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-30. EVCs Menu

Defining the MA Names


When the OAM protocol is set to Standard, it is necessary to define Maintenance
Association (MA) names. The MAs are Maintenance Entities (MEs) that belong to
the same service in an OAM domain.

To define the MA names:


1. From the MA ID menu (Configuration > OAM > End-To-End > EVCs > MA ID),
type f or b to select a maintenance domain (MD ID). Possible values are 1, 2
or 3.
2. Define the MA format and the MA name:

MA Format (Format of the MA name):

String (Alphanumeric value)

Primary VLAN

Unsigned Int 16

ICC (According to ITU-T Y.1731 requirements).

MA Name (Maintenance association name, according to selected format).

ETX-102
Configuration>OAM>End-to-End>EVCs>MAID
EVC ID
1. MD ID[1 64]
MD Format
2. MA Format
3. MA Name
>

... (test)
... (Put your string here)

F-Forward MD ID; B-Backward MD ID; S-Save


ESC-prev.menu; !-main menu; &-exit

ETX-102 Ver. 3.8

1 Mngr/s

Configuring for Operation

4-33

Chapter 4 Configuration

Installation and Operation Manual

Figure 4-31. MAID Menu

Configuring the MEP


Once the EVC was created, it is necessary to define its MEPs (Maintenance
Endpoints) and configure other OAM parameters.

To configure the MEP:

From the MEP menu (Configuration > OAM > End-to-End > EVCs > MEP),
define the following:

Local MEP ID (Identification number of the local maintenance endpoint. It


must be different from the remote MEP ID and unique for the
maintenance domain.): 18191

OAM Destination Address Type (Type of the MAC address to which the
OAM messages are sent. If the multicast OAM destination address is
selected, you can define up to five remote MEPs.):

Multicast (multicast address defined in the Standard OAM MAC


address)
Unicast (User-defined unicast address)

Remote MEP ID (Identification number of the remote maintenance


endpoint, terminating the maintenance entity. It must be different from
the local MEP ID and unique for the maintenance domain.): 18191
1. From the Remote ID menu (Configuration > OAM > End-To-End > EVCs
> MEP > Remote ID), type a to add a new remote MEP.
2. Type 1 to add the first remote MEP and enter its number in the
18191 range.
3. If the OAM destination address type is set to Multicast, type a, then
type 2 to add the second remote MEP and enter its number.
4. Repeat steps 1 and 2 to define up to five remote MEPs.
5. Save the changes.
6. To delete remote MEPs, select Delete Range and enter the remote
MEP ID that you intend to delete. You can also enter ID ranges to
delete multiple remote MEPs. For example, entering 1100 in the
Delete Range line, deletes all MEPs within the 1100 range, inclusive.

MD Level (OAM Maintenance Domain level. Domains discard OAM frames


belonging to lower level domains; frames belonging to higher level
domains are passed transparently. MD level of the Proprietary OAM mode
it is permanently set to 3.): 07

OAM Mode (OAM behavior):

Disabled (No continuity check is performed)

Initiate (ETX-102 initiates and reacts to OAM CC messages)

4-34

React (ETX-102 only reacts to OAM CC messages, without initiating


them)

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

Chapter 4 Configuration

Continuity Verification Mode (Continuity check method. The Continuity


Verification Mode can be configured when the OAM Mode is set to Initiate
or React and the OAM Mode is Proprietary.):

Disabled (No continuity check is performed)

LB-based (Continuity check is performed via loopback messages)

CC-based (Continuity check is performed via received OAM packets)

When the OAM mode is set to Initiate, the continuity verification mode can be
either LB- or CC-based only. In the React OAM mode only CC-based verification is
available.

OAM Destination MAC Address (User-defined MAC address to which the


OAM messages are sent. It is available only if the OAM destination
address type is set to Unicast.)

Default Priority (Priority of the OAM CC messages): 07

CC Interval (Interval between CC messages): 100 ms, 1 sec, 10 sec, 1 min,


10 min.

ETX-102
Configuration>OAM>End-to-End>EVCs>MEP
EVCs ID
... (1)
1. Local ID

[1-8191]

... (0)

2. OAM Destination Address Type

(Unicast)

3. Remote ID

>

(1)

4. MD Level {0-7]

... (3)

5. OAM Mode

>

6. OAM Destination MAC Address

... (00-00-00-00-00-00)

7. Default CC Priority[0 - 7]

... (0)

8. CC Interval

>

(Initiate)

(1 Second)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-32. MEP Menu

Configuring OAM Services


Three OAM services are defined automatically for each created proprietary EVC.
Each service has its own identification number (13), priority level and set of
variation objectives (thresholds).

To configure the OAM services:


1. From the Service menu (Configuration > OAM > End-to-End > EVCs > MEP >
Services), select one of the three available services by typing f or b.
2. Define the following parameters of the selected service:

ETX-102 Ver. 3.8

Configuring for Operation

4-35

Chapter 4 Configuration

Installation and Operation Manual

Performance Monitoring:

Enabled (Performance monitoring is enabled)

Disabled (Performance monitoring is disabled)

Service Priority (P (priority) bit value sent in OAM messages originating


from the selected service): 07

Delay Objective (Delay objective for the specified service. You can display
the total number of frames above or below defined delay objective for the
15-min or 24-hour intervals via Connection Statistics screen, see
Chapter 5).

Delay Variation Objective (Delay variation objective for the specified


service. You can display the total number of frames above or below
defined delay variation objective for the 15-min or 24-hour intervals via
Connection Statistics screen, see Chapter 5).

Event Report (OAM counter to be monitored and its rising/falling


thresholds, and sampling intervals. See Chapter 5 for the detailed
description.

ETX-102
Configuration> OAM>End-to-End>Services
Service[1 - 3]

... (1)

1. Performance Monitoring

(Enabled)

2. Service Priority[0 - 7]

... (0)

3. Delay Objective(msec)

... (0)

4. Delay Variation Objective(msec)

... (0)

Event Report
5. Frame Loss Ratio

>

6. Frames Above Delay

>

7. Frames Above Delay Variation

>

8. Unavailability Ratio

>

>
Please select item <1 to 8>
FForward; S-Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-33. Services Menu

Configuring Quality of Service (QoS)


ETX-102 supports configuration of two QoS categories: priority and rate
limitation. QoS configuration is performed via the QoS menu (Main menu > QoS).

Configuring the Traffic Priority


ETX-102 provides four priority queues for each user port. User traffic can be
prioritized according to the VLAN priority, DSCP, IP TOS or per port basis.

4-36

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To select the traffic priority type:


1. From the Configuration menu, select QoS.
The QoS menu is displayed.
2. From the QoS menu, select Priority.
The Priority menu is displayed (see Figure 4-34).
3. From the Priority menu, select Classification and choose one of the following
traffic prioritization methods:

802.1p (Traffic is prioritized according to VLAN priority)

DSCP frame DSCP field (Traffic is prioritized according to the


Differentiated Services Codepoint, as specified in RFC 2474).

TOS (Traffic is prioritized according to IP ToS field)

Per Port (Traffic is prioritized according to port default priority).


ETX-102

Configuration>QoS>Priority
1. Classification

>(802.1p)

2. Mapping

>

S - save
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-34. Priority Menu

To define the priority mapping:


1. Once the priority type is defined, select Mapping from the Priority menu.
The Mapping menu appears. The Mapping menu changes according to the
selected priority type (802.1p, DSCP, TOS, per port). Figure 4-35
illustrates the Mapping menu for the 802.1p priority.
2. From the Mapping menu, define the following:

ETX-102 Ver. 3.8

802.1p priority assign each priority tag, supported by IEEE 802.1p (17)
to a specific priority queue (traffic class 0 (lowest), traffic class 13)

DSCP priority assign each DS codepoint (063) to a specific priority


queue (traffic class 0 (lowest), traffic class 13)

TOS priority assign each IP ToS field value (07) to a specific priority
queue (traffic class 0 (lowest), traffic class 13)

Per port priority assign priority to the user traffic according to the
default priority of a bridge port.

Configuring for Operation

4-37

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Configuration>Configuration>QoS>Priority>Mapping (802.1p)
1. User priority 0

>(Traffic class 0)

2. User priority 1

>(Traffic class 0)

3. User priority 2

>(Traffic class 1)

4. User priority 3

>(Traffic class 1)

5. User priority 4

>(Traffic class 2)

6. User priority 5

>(Traffic class 2)

7. User priority 6

>(Traffic class 2)

8. User priority 7

>(Traffic class 3)

>
S - Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-35. Mapping (802.1p) Menu

Configuring Rate Limitation


ETX-102 supports data rate limitation at the egress and ingress of the network
and user ports. ETX-102 limits the data rate proper, without taking into account
Ethernet frame intergaps.

Configuring Ingress Rate Limitation


Via ingress rate limitation the user controls the rate of traffic received at the
network and user interfaces. The traffic that exceeds the selected rate limitation
value for an ETX-102 port is dropped. In addition to that ETX-102 defines
maximum packet burst for each rate limitation value. This enables service
providers to compensate their subscribers for underused bandwidth by allowing
temporary traffic bursts. Also, the rate limitation can be applied to all packets or
to certain types (broadcast, multicast, etc).

To configure the ingress rate limitation:


1. From the Rate Limitation menu (Configuration > QoS > Rate Limitation),
select Ingress.
The Ingress menu is displayed (Figure 4-36).
2. From the Ingress menu, type f to select the network or user port to which
you intend to apply rate and burst limitation.
3. Select Rate Limitation and define the maximum ingress data rate allowed on
the port (see Table 4-2).
4. If you defined a rate limitation, select Burst Size and define the maximum
allowed size of the packet buffer (in kilobytes) to be used by the port when
traffic bursts occur. See Table 4-2 for the allowed burst values depending on
configured port rate limitation. Traffic bursts are permitted only if the traffic
has been sent to the ETX-102 below the rate limit for a certain period of
time.

4-38

Configuring for Operation

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

Chapter 4 Configuration

The following rate/burst limit combinations are not allowed:


12 kilobyte burst for 45 Mbps rate
12 kilobyte burst for 71 Mbps rate
12 and 24 kilobyte burst for 90 Mbps rate.
5. Select Limit Packet Type and choose a packet type to which the rate/burst
limitation is to be applied:

All The limitation is applied to all arriving packets

Broadcast The limitation is applied to broadcast packets

Multicast & Flooded The limitation is applied to broadcast, multicast


and flooded packets

Broadcast & Multicast The limitation is applied to broadcast and


multicast packets

Broadcast The limitation is applied to broadcast packets.

ETX-102
Configuration>QoS>Rate Limitation>Ingress
Port Label
> (1)
Ethernet Port
> (Network)
1. Rate Limitation
>
2. Burst Size (in kB) >
3. Limit Packet Type >
>

(2Mbps)
(12K)
(All)

F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-36. Ingress Rate Limitation Menu


Table 4-2. Rate and Burst Limitation
Rate Limit

Burst Size
12 kB

24 kB

48 kB

96 kB

1 Mbps

2 Mbps

3 Mbps

4 Mbps

5 Mbps

Rate Limit

Burst Size
12 kB

24 kB

48 kB

96 kB

20 Mbps

25 Mbps

30 Mbps

35 Mbps

40 Mbps

6 Mbps

45 Mbps

7 Mbps

50 Mbps

8 Mbps

60 Mbps

9 Mbps

71 Mbps

ETX-102 Ver. 3.8

Configuring for Operation

4-39

Chapter 4 Configuration

Rate Limit

Installation and Operation Manual


Burst Size

12 kB

24 kB

48 kB

96 kB

10 Mbps

15 Mbps

Rate Limit

Burst Size
12 kB

24 kB

48 kB

96 kB

83 Mbps

90 Mbps

Configuring Egress Rate Limitation

To configure the egress rate limitation:


1. From the QoS menu, select Rate Limitation.
The Rate Limitation menu is displayed.
2. From the Rate Limitation menu, select Egress.
The Egress menu is displayed.
3. From the Egress menu, type f to select the network or user port to which you
intend to apply rate limitation.
4. Select Rate Limitation and define the maximum egress data rate allowed on
the port (see Table 4-2).

ETX-102
Configuration>QoS>Rate Limitation>Egress
Port Label
> (1)
Port
> (User 1)
1. Rate Limitation
>

>

(No Limit)

F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-37. Egress Rate Limitation Menu

4.3

Additional Tasks

This section describes additional operations supported by the ETX-102


management software, including the following:

4-40

Displaying inventory

Displaying ETX-102 status at the system, physical, and application levels

Setting data, time, and NTP

Changing user names and passwords

Configuring Syslog parameters

Transferring software and configuration files

Resetting the unit.

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Displaying Inventory
The ETX-102 inventory displays description of the unit, its hardware revision and
power supply type.

To display the ETX-102 inventory:


1. From the Main menu, select Inventory.
The Inventory menu appears (see Figure 4-38).
2. In the Inventory screen, use the arrow keys to navigate between the pages.
ETX-102

Inventory
Id
1
2
| 3
v 4
5
6
7

Description
RAD.ETX-102.Chassis
RAD.ETX-102.Power Supply
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
->>

Vendor Type
00
00
00
00
00
00
00

Class
3
6
10
10
10
10
10

Entity Name
ETX-102
Power Supply
Network Port 1
Network Port 2
User Port 1
User Port 2
User Port 3

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-38. Inventory Screen

Displaying Status
The ETX-102 software provides access to the following status information:

System level MAC address, presence of SSL/SSH security keys, connection


status, system uptime period, list of managers currently connected to
ETX-102, link protection status

Physical ports Ethernet and SFP status

OAM level EVC and link (802.3ah) status

Bridge level MAC table, VLAN table.

The status information is available via the Monitoring menu.

Displaying System Status Information


System menu specifies MAC address of the ETX-102 unit and provides access to
the information on the interface connection status, SSL/SSH security keys,
currently connected managers and link protection status for 1:1 redundancy
mode. For description of ETX-102 system messages, which are displayed via the
Event Log screen, refer to Chapter 5.

ETX-102 Ver. 3.8

Additional Tasks

4-41

Chapter 4 Configuration

Installation and Operation Manual

Displaying Interface Connection Information

To display interface connection information:


1. From the Monitoring menu, select System.
The System menu is displayed (see Figure 4-39).
The System menu includes the following information:

MAC address of ETX-102

Presence of SSL/SSH security keys.

2. From the System menu, select Connection Status.


The Connection Status screen is displayed (see Figure 4-40).
The Connection Status screen includes the following information:

Description Ethernet Network Port or Ethernet User Port

Type Type of the interface according to the IF MIB

Status Administrative status of the link (Up or Down), as set via the
Ethernet network (Figure 4-18) and Ethernet user (Figure 4-19) menus.

Operation Actual operational status of the link (Up or Down).

3. From the Connection Status screen, type R to refresh the display.


ETX-102
Monitoring>System
MAC Address
Security key

(00-22-F4-27-F4-68)
()

1.
2.
3.
4.

[]
>
>
>

Connection Status
Connected Managers
Event Log
Protection Status

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-39. System Menu


ETX-102
Monitoring>System>Connection Status
Index
Description
Type
1
ETHERNET NETWORK PORT
fastEtherFx
2
ETHERNET USER PORT 1
fastEther
3
ETHERNET USER PORT 2
fastEther
R - Refresh Table
ESC-prev.menu; !-main menu; &-exit; ?-help

Admin Status
Up
Up
Up

Operation
Up
Down
Up

Figure 4-40. Connection Status Screen

4-42

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Displaying List of Connected Managers

To display list of managers currently connected to ETX-102:

From the System menu (Figure 4-39), select Connected Managers.


The Connected Managers screen is displayed (Figure 4-41).
The Connected Managers screen includes the following information:

IP Address IP address of the connected remote agent. For an ASCII


terminal connection (UART), this field remains empty.

Terminal Type Type of the terminal used by the manager (UART, Telnet,
SSL, SSH)

User Name The login user name.

Monitoring>System>Connected
Index
IP Address
1
2
158.15.163.20
3
158.15.163.30
4
158.15.163.40
R - Refresh Table
ESC-prev.menu; !-main menu;

ETX-102
Managers
Terminal Type
UART
SSH
SSL
Telnet

User Name
su
su
user
user

&-exit; ?-help

Figure 4-41. Connected Managers Screen

Displaying the Link Protection Status


When the network port redundancy is configured to the 1:1 mode, it is possible
to display the current protection status.

To display the link protection status:

From the System menu (Figure 4-39), select Protection Status.


The Protection Status screen is displayed (see Figure 4-42).
The Protection Status screen includes the following information:

Active Port Currently active network port.


ETX-102

Monitoring>System>Protection Status
GROUP ID
> (1)
Port Members
> (1, 2)
Active Port

(1)

ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-42. Protection Status Screen

ETX-102 Ver. 3.8

Additional Tasks

4-43

Chapter 4 Configuration

Installation and Operation Manual

Displaying the Physical Layer Status


You can view the status of the Ethernet connections at the physical level. For
description of ETX-102 Ethernet statistic data, refer to Chapter 5. In addition, you
can access the SFP status information.

Displaying the Ethernet Physical Layer Information

To display the physical layer information:


1. From the Monitoring menu, select Physical Layers.
The Physical Ports menu is displayed.
2. From the Physical Ports menu, select Ethernet Status.
The Ethernet Status screen is displayed (see Figure 4-43).
3. From the Ethernet Status screen, type F to toggle between the network and
user Ethernet ports.
The Ethernet Status screen includes the following information:

Port Type Fiber optic interface characteristics of the current port

Administrative Status Administrative status of the link (Up or Down), as


set via the Ethernet network (Figure 4-18) and Ethernet user
(Figure 4-19) menus.

Operational Status Actual operational status of the link (Up or Down)

Actual Speed & Duplex Current data rate and duplex mode of the link

Actual Flow Control Current flow control status (Enable or Disable).

ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port
Port Type
Administrative Status
Operational Status
Actual Speed & Duplex
Actual Flow Control

>
>

>
>

(1)
(Network 1)
(100FX SFP Not Install)
(Down)
(Not Present)
(100Mbps - Full Duplex)
(Disable)

>
F - Forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-43. Ethernet Status Screen

Displaying SFP Information


ETX-102 identifies the SFPs inserted in its network and user ports and displays
the link status information, as well as the optical parameters of the transceivers.

4-44

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

Chapter 4 Configuration

When managing ETX-102 via SNMP, increase the NMS timeout period to ensure
correct retrieval of the SFP status information.
To display the SFP link status information:

From the Link Status screen (Monitoring > Physical Layer > SFP > Link Status),
type f or b to toggle between the available user or network ports.
The Link Status screen includes the following information:

SFP connector type

Manufacturers name

Manufacturers SFP designation

Typical maximum range in kilometers

Wavelength

Fiber type.

ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port

(1)
(Network 1)

Connector Type
Manufacturer Name
Manufacturer PN
Typical Max. Range
Wave Length
Fiber Type
>
F - Forward
ESC-prev.menu; !-main

...
>
>

(SC)
(RAD)
(1234)
(20km)
(1310nm)
(MM)

menu; &-exit

1 Mngr/s

Figure 4-44. SFP Link Status Screen

To display the current optical parameters of the SFPs:


1. From the Optical Parameters screen (Monitoring > Physical Layer > SFP >
Optical Parameters), type f or b to toggle between the available user or
network ports.
The Optical Parameters screen includes the following information:

SFP transmit optical power (-40 dBm to + 8.2 dBm at 0.1 dBm resolution)

Laser bias current (0 mA to 131 mA at 0.1 mA resolution)

Laser temperature (0 C to 100 C at 1 C resolution)

SFP receive optical power (-40 dBm to + 8.2 dBm at 0.1 dBm resolution)

Internally measured transceiver supply voltage (-40 dBm to + 8.2 dBm at


0.1 dBm resolution)

2. Select History to display the minimum and maximum values recorded for each
optical parameter.

ETX-102 Ver. 3.8

Additional Tasks

4-45

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port

(1)
(Network 1)

TX Optical Power
LASER Bias
LASER Temp
Rx Optical Power
Supply Voltage
History

...
...
...
...
...
[]

(-6.1 dBm)
(1.7 mA)
(33 C/ 93 F)
(-23.5 dBm)
(3.31 V)

1.
>
F - Forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-45. SFP Link Status Screen

Displaying EVC Connection Status


At the connection level ETX-102 provides information on the EVC ID, EVC VLAN
and EVC status.

To display the EVC connection status information:


1. From the End-to-End menu (Monitoring > OAM > End-to-End), select Status.
The EVC Connection Status menu is displayed (see Figure 4-46).
2. From the End-to-End Status screen type F or B to toggle between the active
EVCs.
ETX-102

Monitoring>OAM>End-to-End>Status
EVC ID
EVC SP VLAN[1 - 4094]
EVC Status
1. EVC[1 - 64]

...
...
>
...

(EVC1)
(1)
(Not Applicable)
(1)

Please select item <1 to 1>


F - Forward; B - Backward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-46. End-to-End Status Screen

Displaying the Link Status


At the link level ETX-102 provides status information according to the IEEE
802.3ah requirements. The 802.3ah link status collection must be enabled at the
physical level for each ETX-102 network and user interface.

4-46

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To display link OAM status:


1. From the Link (802.3ah) menu (Monitoring > OAM > Link (802.3ah)), select
Status.
The Link (802.3ah) Status screen is displayed.
2. From the Link (802.3ah) Status screen, type F to toggle between the network
and user Ethernet ports.
The Link (802.3ah) Status screen includes the following information:

Local Discovery State (Detection of an OAM sublayer presence in remote


unit)

Remote Revision (Current revision of information TLV)

Remote MAC Addr. (MAC address of remote unit)

Remote Capabilities (OAM capabilities of remote unit):

Vars Retrieval

Link Events

Loopback

Unidirectional

OAM Mode.

ETX-102
Monitoring> OAM> Link (802.3ah)>Status
Port Label
Ethernet Port

> (1)
> (Network 1)

Local OAM mode


Local Discovery State
Remote revision
Remote Mac Addr.

> (Active)
> (Passive Wait)
> (0)
(00-00-00-00-00-00)

Remote Capabilities
Vars Retrieval
Link Events
Loopback
Unidirectional
Remote OAM mode

>
>
>
>
>

(Supported)
(Supported)
(Supported)
(Supported)
(Active)

F- Forward
ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-47. Link (802.3ah) Status Screen

ETX-102 Ver. 3.8

Additional Tasks

4-47

Chapter 4 Configuration

Installation and Operation Manual

Displaying the Bridge Level Status


At the bridge level ETX-102 provides information on the MAC addresses (static
and learned), their bridge ports, and VLAN assignments (VLAN-aware mode). It is
also possible to display VLAN table, summarizing information on all existing
VLANs, member ports, and port egress tagging mode (tagged or untagged). In
addition, the link aggregation status information is available

To display the MAC table:


1. From the Monitoring menu, select Bridge.
The Bridge menu appears.
2. From the Bridge menu, select MAC Table.
The MAC Table screen appears (see Figure 4-48).
The MAC Table screen includes the following information:

MAC Address Existing MAC address

Status Static or Learned

Bridge Port User or Network

VLAN A VLAN the current MAC address belongs to (VLAN-aware mode only).

3. Type R to refresh the MAC table.


ETX-102
Monitoring>Bridge>MAC
MAC Address
10-00-00-00-00-00
10-00-00-00-00-01
R - Refresh table
ESC-prev.menu; !-main

Table
Status
Static
Learned

Bridge Port
Network
User1

VLAN
5
7

menu; &-exit; ?-help

Figure 4-48. MAC Table

To display the VLAN table:

From the Bridge menu, select VLAN Table.


The VLAN Table screen appears (see Figure 4-49).
The VLAN Table screen includes the following information:

4-48

VLAN ID

Egress tagging mode of a port.

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

ETX-102
Monitoring>Bridge>VLAN Table
Network Port User Port 1 User Port 2
VLAN 1
tag
VLAN 1024
untag

User Port 3

User Port 4
tag

ESC-prev.menu; !-main menu; &-exit; ?-help

Figure 4-49. VLAN Table

Setting the Date, Time and NTP Server Parameters


You can set the date and time for the ETX-102 internal real-time clock. In
addition, you can add an NTP server, to lock ETX-102 to a reliable clock source.

To set date, time and NTP server parameters:


1. From the System menu, select Date/time.
The Date/Time menu appears (see Figure 4-50).
2. From the Date/Time menu, select Time, and enter the current time in the
hh:mm:ss format.
3. Select Date, and enter the current date in the yyyy:mm:dd format.
4. Select NTP Mode and enable (Unicast Client) or disable it.
5. Select NTP Server IP Address and define the IP address of the NTP server.
6. Select GMT (+/- XX) and define time zone in reference to Greenwich Mean
Time (GMT) with an hour resolution: -12 to +12.
7. Select NTP Update Interval and define a period of time after which ETX-102
polls the NTP server: 11440 minutes.
ETX-102

Configuration>System>Date/Time
1.
2.
3.
4.
5.
6.

Time <HH:MM:SS>
Date <YYYY-MM-DD>
NTP Mode
NTP Server IP Address
GMT (+/- XX)
NTP Update Interval (Min)[1 1440]

... (09:12:06)
... (2004-01-18)
>
(Unicast Client)
... (0.0.0.0)
>
(0)
... (1)

>
Please select item <1 to 2>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-50. Date/Time Menu

ETX-102 Ver. 3.8

Additional Tasks

4-49

Chapter 4 Configuration

Installation and Operation Manual

Configuring User Access


ETX-102 management software allows you to define new users, their
management and access rights. Only superusers (su) can create new users, the
regular users are limited to changing their current passwords, even if they were
given full management and access rights. Up to eight users can be created in
addition to the user and su users that exist by default.

To add a new user:


1. Make sure that you logged in as su.
2. From the Management Access menu, select User access.
The User Access menu is displayed (see Figure 4-51).
3. From the User Access menu, do the following:

Select User name, and enter a name for a new user.

Select Permission, and specify the users access rights (full control or
read-only).

Select Access, and specify the users access methods (ASCII terminal,
Telnet, Web browser, Telnet and Web browser, or all of them).

Select su password, and enter your current superuser password.

Select New password, and assign a password to a new user name.

Select Confirm and re-enter the new user password to confirm it.

Save new settings by typing S, when asked.

To delete an existing user:

From the User Access menu, do the following:

Type F to display a user that you intend to delete.

Select su password, and enter your current superuser password.

Type D to delete the current user.

ETX-102
Configuration>System>Management>Management access>User access
1.
2.
3.
4.
5.
6.

User name
Permission
Access
su password
New password
Confirm New Password

...
>
>
...
...
...

(su)
(Full Control)
(All)
()
()
()

>
Please select item <1 to 6>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-51. User Access Menu

4-50

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

Configuring Syslog Parameters


To allow logging/sharing of system events on an external server, you need to
configure the Syslog server parameters.

To configure the Syslog parameters:

From the Syslog menu (Configuration > System > Syslog), configure the
following:

Note

Device Logging Status (Enables or disables event logging):

Enable (ETX-102 logs events onto Syslog server)

Disable (ETX-102 logs the events internally)

Server IP Address (IP address of the Syslog server to which the event logs
are sent): 0.0.0.0255.255.255.255

Server UDP Port (The UDP port of the Syslog server): 165535

Device UDP Port (The local UDP port from which the Syslog messages are
sent: 165535

The UDP port values cannot be changed when the logging status is enabled.

Facility (The software module, task or function from which the Syslog
messages are sent): Local 17

Severity Level (Only events with the severity which equals or exceeds the
selected severity level are sent):

Critical corresponds to the Emergency (0) severity level of Syslog


Major corresponds to the Alert (1) and Critical (2) severity levels of
Syslog

Minor corresponds to the Error (3) severity level of Syslog

Warning corresponds to the Warning (4) severity level of Syslog

Event corresponds to the Notice (5) severity level of Syslog

Info corresponds to the Informational (6) severity level of Syslog

Debug corresponds to the Debug (7) severity level of Syslog.

Configuration>System>Syslog
1. Device logging status

> (Disable)

2. Device UDP port

> (514)

3. Facility

> (Local 1)

4. Severity level

> (Major)

5. Server Parameters

>

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-52. Syslog Menu

ETX-102 Ver. 3.8

Additional Tasks

4-51

Chapter 4 Configuration

Installation and Operation Manual

To configure a Syslog server:

From the Server Parameters menu (Configuration > System > Syslog > Server
Parameters), configure the following:

Server Sequence Number (Sequence number of the Syslog server)

Server Access (Controls the access to the Syslog server):

Enable (Access to the Syslog server is enabled)

Disable (Access to the Syslog server is disabled)

Server IP Address (IP address of the Syslog server)

Server UDP Port (UDP port of the Syslog server): 165535

Configuration>System>Syslog>Server Parameters
1. Server Sequence Number
2. Server Access
3. Server IP Address

...
>
...

(1)
(Disable)
(0.0.0.0)

4. Server UDP Port[1 65535]

...

(514)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-53. Syslog Server Parameters Menu

Transferring Software and Configuration Files


This section presents procedures for installing new software releases into the
ETX-102 units and transferring configuration files.
ETX-102 stores two software versions, each of them in one of the two 1.15 MB
partitions of its flash memory, which also contains a boot program. The software
is stored in compressed format. The main version is decompressed and loaded
into the ETX-102 RAM upon power-up. The backup software is kept for backup
purposes. If the main software becomes corrupted, you can swap it with the
backup. By default, ETX-102 is delivered with active software only.
New software releases are distributed as *.img files, which are downloaded to
ETX-102. When starting a download, ETX-102 erases the current backup and
places the new software in the backup partition. When downloading is complete,
the unit checks the integrity of the new software file. If it is correct, the backup
and active files are swapped. The new software release becomes active and the
former active software becomes the backup. If a failure occurs during
downloading, the new version is erased. In this case, only one version is left
stored in the flash memory. The backup software can be downloaded to the unit
and swapped with the main software later.
Configuration files can be uploaded for storage and backup.
Management software allows file transfer via TFTP only. The software files can
also be downloaded to ETX-102 via Boot Manager, using XMODEM or TFTP. For
details on upgrading the device software, refer to Chapter 6.

4-52

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

To transfer files via TFTP:


1. From the Main menu, select Utilities.
The Utilities menu appears.
2. From the Utilities menu, select File Utilities.
The File Utilities menu appears.
3. From the File Utilities menu, select S/W & File Transfer using TFTP.
The S/W & File Transfer using TFTP menu is displayed (see Figure 4-54).
4. From the S/W & File Transfer using TFTP menu, perform the following:

Select File Name, and enter a file name:

For downloading, you specify name of the file, which is to be


downloaded to ETX-102.
For uploading, you specify a name, under which the file is going to be
saved on the remote server.

Select Command to start the desired procedure:

No Operation (TFTP file transfer is disabled)


Software Download (Transferring a software file from the TFTP server
to ETX-102)
Software Upload (Transferring a software file from ETX-102 to the
TFTP server)
Configuration Download (Transferring a configuration file from the
TFTP server to ETX-102)
Configuration Upload (Transferring a configuration file from ETX-102
to the TFTP server)
Software Download and Reset (Transferring a software file from the
TFTP server to ETX-102 and resetting the unit)
Software Download to Backup (Transferring a software file from the
TFTP server to the backup partition of ETX-102).

Select Server IP, and enter IP address of TFTP server.

Define Retry Timeout (Interval between connection retries in seconds).

Define Total Timeout (TFTP connection timeout in seconds)

Select Save to save the changes.


ETX-102 starts file transfer.

ETX-102 Ver. 3.8

View status of the current TFTP transfer:

TFTP Starting Upload

TFTP Starting Download

TFTP Upload Failed

TFTP Download Failed.

Additional Tasks

4-53

Chapter 4 Configuration

Installation and Operation Manual

ETX-102
Utilities>File Utilities>S/W & File Transfer using TFTP
1.
2.
3.
4.
5.
6.

File name
Command
Server IP
Retry Timeout(sec)[0 - 1000]
Total Timeout(sec)[0 - 1000]
View Transfer Status

...
>
...
...
...
>

(FILE.IMG)
(No Operation)
(0.0.0.0)
(1)
(5)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-54. S/W & File Transfer using TFTP Menu

Swapping Software Files


When the software file is downloaded to the backup partition, it can be swapped
with the main software file.

To swap software files:


1. From the File Utilities menu, select Swap Main Application File With Backup.
ETX-102 displays the following message: Backup application file
will be active after reset. Continue ??? (Y/N).
2. Type Y to complete the swap.

Resetting ETX-102
ETX-102 supports two types of reset:

Reset to the default setting

Overall reset of the device.

Resetting to Factory Defaults


You can reset ETX-102 to its default settings. All configuration parameters can be
reset to their default values, or you can reset ETX-102 without affecting its
management settings (host IP address, mask, default gateway, and the network
managers).

To reset ETX-102 to the default settings:


1. From the System menu, select Factory Default.
The Factory Default menu is displayed (see Figure 4-55).
2. From the Factory Default menu, do the following:

4-54

Select Full to reset all configuration parameters to their defaults

Select Except Management to reset all configuration parameters, except


for the management settings.

Additional Tasks

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 4 Configuration

ETX-102 displays the following message: Configuration will be


lost and system will be reset. Continue??? (Y/N).
3. Type Y to confirm the reset.
ETX-102 performs the specified type of reset.
ETX-102
Configuration>System>Factory default
1. Full
2. Except management
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-55. Factory Default

Resetting the Unit


You can perform an overall reset of ETX-102.

To reset ETX-102:
1. From the Utilities menu (Main menu>Utilities), select Reset.
The following confirmation message appears: System will be reset.
Continue??? (Y/N)
2. Type Y to confirm the reset.

ETX-102 Ver. 3.8

Additional Tasks

4-55

Chapter 4 Configuration

4-56

Additional Tasks

Installation and Operation Manual

ETX-102 Ver. 3.8

Chapter 5
Diagnostics and
Troubleshooting
This chapter describes how to:

Display system messages

Monitor performance

Run diagnostic tests.

5.1

Monitoring Performance

Performance monitoring data is collected at the EVC and physical levels.

Displaying End-to-End Statistics


You can display end-to-end connectivity and performance monitoring data for the
existing EVCs and their services. The statistics are available for the 15-minute and
24-hour periods.

To display the OAM statistics:


1. From the End-To-End menu (Monitoring > OAM > End-to-End), select
Statistics.
The Statistics menu is displayed.
2. From the Statistics menu, select the following:

15 Min Intervals (OAM statistics for a selected 15-min interval)

24 Hours Counters (OAM statistics for the last 24 hours)

Service Counters (Total OAM statistics collected since the service was
enabled)

3. Selected OAM statistic screen is displayed (see Figure 5-1 and Figure 5-2).
Table 5-1 and Table 5-2 explain the OAM statistic parameters.
4. Type f or b to select an EVC.
5. Type Ctrl + f or Ctrl + b to select an interval (196).

Note

ETX-102 Ver. 3.8

No interval selection is available for the 24-hour statistics.

Monitoring Performance

5-1

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

ETX-102
Monitoring>OAM>End-To-End>Statistics>15 Min. Intervals
Frames Above Delay Obj....
Frames Below Delay Obj....
Frames Above DV Obj.
...
Frames Below DV Obj.
...
Frames Transmitted
...
Frames Loss
...
Unavailable Seconds
...
1. Interval
2. EVC
3. Service

(0)
(0)
(0)
(0)
(101902)
(0)
(101899)

Elapsed Time

... (102767)

Min. RT Delay (Msec)


Avg. RT Delay (Msec)
Max. RT Delay (Msec)

... (0.0)
... (0.0)
... (0.0)

Avg. DV
Max. DV

... (0.0)
... (0.0)

... (0)
... (1)
... (1)

>
Please select item <1 to 3>
F - Forward(EVC); B - Backward(EVC); ^F - Forward(Int.); ^B - Backward(Int.)
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s

Figure 5-1. End-to-End Statistics (15-Minute Interval)


Table 5-1. OAM Statistic Parameters
Parameter

Description

Frames Above Delay Obj.

Number of frames that exceeded delay objective

Frames Below Delay Obj.

Number of frames below or equal delay objective

Frames Above DV Obj.

Number of frames that exceeded delay variation objective

Frames Below DV Obj.

Number of frames below or equal delay variation objective

Frames Transmitted

Total number of OAM frames transmitted in the current interval

Frames Lost

Number of frames lost in the current interval

Unavailable Seconds

Number of seconds during which the service was unavailable in the current
interval

Elapsed Time

Time (in seconds) elapsed from beginning of the interval 0900

Min. RT Delay

Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Avg. RT Delay

Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Max. RT Delay

Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)

Avg. DV

Average delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

Max. DV

Maximum delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

5-2

Monitoring Performance

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

ETX-102
Monitoring>OAM>End-To-End>Statistics>Service Counters
EVC
... (1)
Service
... (1)
OAM transmitted frames counter...
OAM Frames lost counter
...
OAM Frame loss ratio(*E-10)
...
Elapsed time
...
Unavailable seconds
...
Unavailability ratio(*E-10)
...

(2087328632)
(0
(0)
(1487)
(0)
(0)

>
F - Forward(EVC); B - Backward(EVC)
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-2. End-to-End Service Counters


Table 5-2. Service OAM Statistic Parameters
Parameter

Description

OAM Transmitted Frames Counter

Total number of OAM frames transmitted since the service was


enabled

OAM Frames Loss Counter

Total number of OAM frames lost since the service was enabled

OAM Frame Loss Ratio

Total number of lost OAM frames divided by total number of


transmitted OAM frames since the service was enabled

Elapsed Time

Time (in seconds) elapsed since the service was enabled

Unavailable Seconds

Total number of unavailable seconds since the service was enabled

Unavailability Ratio

Total number of unavailable seconds divided by elapsed time

Displaying Ethernet Statistics


You can display statistic data for the network and user Ethernet ports at the
physical layer.

To display the Ethernet statistics:


1. From the Physical Layers menu, select Ethernet Statistics.
The Ethernet Statistics screen appears (see Figure 5-3).
2. From the Ethernet Statistics screen, type f or b to toggle between network
and user interface statistics. Table 5-3 describes the Ethernet statistic
registers.
3. Type Ctrl + D to display the next page of the counters or Ctrl + U to display
the previous page.
4. Type C to reset the counters.
5. Type R to refresh the screen.

ETX-102 Ver. 3.8

Monitoring Performance

5-3

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

ETX-102
Monitoring>Physical Layers>Ethernet Statistics
Port Label
Ethernet Port
|
v Counter
Total Frames
Total Octets
Correct Frames
FCS Errors
Jabber Errors
Fragments Errors
Undersized Frames
Oversizes Frames
Discard Frames
Collisions
Errors

(1)
(Network 1)
--- RX --(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)

--- TX --(0)
(0)
(0)

(0)
(0)
(0)

F Forward; C Clear Statistics; R Refresh Statistics


ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-3. Ethernet Statistics (Page 1)


ETX-102
Monitoring>Physical Layers>Ethernet Statistics
^
| Port Label
(1)
Ethernet Port
(Network 1)
Counter
Unicast Frames
Multicast Frames
Broadcast Frames

--- RX --(0)
(0)
(0)

--- TX --(0)
(0)
(0)

In
64
In
65- 127
In 128- 255
In 256- 511
In 512-1023
In 1024-long

(0)
(0)
(0)
(0)
(0)
(0)

(0)
(0)
(0)
(0)
(0)
(0)

Octets
Octets
Octets
Octets
Octets
Octets

F Forward; C Clear Statistics; R Refresh Statistics


ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-4. Ethernet Statistics (Page 2)

5-4

Monitoring Performance

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

Table 5-3. Ethernet Statistics Parameters


Parameter

Description

RX
Total Frames

The total number of correct frames received

Total Octets

The total number of octets received, including framing characters

Correct Frames

The number of frames successfully received

FCS Errors

Total number of frames received on a particular interface that is an integral


number of octets in length, but do not pass the FCS check. This count does not
include frames received with Frame-Too-Long or Frame-Too-Short error.

Jabber Errors

Total number of long frames received with invalid CRC

Fragments Errors

Total number of frames, which are less than 64 octets in length (excluding framing
bits, but including FCS octets) and had either a bad Frame Check Sequence (FCS)
with an integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (alignment error)

Undersized Frames

Total number of received short frames with size under 64 bytes and with valid CRC

Oversized Frames

Total number of received long frames with size over 1518 bytes and with valid CRC

Discard Frames

Total number of frames that were discarded even though no errors had been
detected

Unicast Frames

Total number of unicast received frames

Multicast Frames

Total number of multicast received frames

Broadcast Frames

Total number of broadcast received frames

In 64 Octets

Total number of received 64-byte packets

In 65-127 Octets

Total number of received 65127-byte packets

In 128-255 Octets

Total number of received 128255-byte packets

In 256-511 Octets

Total number of received 256511-byte packets

In 512-1023 Octets

Total number of received 5121023-byte packets

In 1024-long Octets

Total number of received 1024-byte packets

TX
Total Frames

Total number of correct frames transmitted

Total Octets

Total number of octets transmitted, including framing characters

Correct Frames

Total number of frames successfully transmitted

Collisions

Total number of occurred collisions

Discards

Total number of discarded frames

Errors

Total number of transmission errors

Unicast Frames

Total number of unicast transmitted frames

Multicast Frames

Total number of multicast transmitted frames

Broadcast Frames

Total number of broadcast transmitted frames

In 64 Octets

Total number of transmitted 64-byte packets

In 65-127 Octets

Total number of transmitted 65127-byte packets

ETX-102 Ver. 3.8

Monitoring Performance

5-5

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

Parameter

Description

In 128-255 Octets

Total number of transmitted 128255-byte packets

In 256-511 Octets

Total number of transmitted 256511-byte packets

In 512-1023 Octets

Total number of transmitted 5121023-byte packets

In 1024-long Octets

Total number of transmitted 1024-byte packets

5.2

Handling Events and Traps

ETX-102 maintains a log file that can hold up to 100 events (system messages).
All events are time-stamped.

Displaying Events

To access the event log:


1. From the Monitoring menu, select System.
The System menu is displayed.
2. From the System menu, select Event Log.
The Event Log menu appears.
3. From the Event Log menu, select Read Log File.
The Event Log is displayed (see Figure 5-5).
4. In the Event Log screen, use the Ctrl + U and Ctrl + D keys to scroll the alarm
list up and down.

ETX-102
Monitoring>System>Event Log>Read Log File

|
v

1
2
3
4
5
6
7
8

Log Entry
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16

19:50:08
19:22:32
19:22:13
19:22:12
19:22:12
19:22:12
19:22:12
19:22:11

LOGIN VIA TERMINAL


LOGIN VIA TERMINAL
LINK DOWN
LINK DOWN
LINK DOWN
LINK DOWN
LINK DOWN
COLD START

PORT
PORT
PORT
PORT
PORT

5
4
3
2
1

>
^D - Scroll Down , ^U - Scroll Up
ESC-prev.menu; !-main menu; &-exit; ?-help

1 Mngr/s

Figure 5-5. Event Log

5-6

Handling Events and Traps

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

Configuring Event Reporting (RMON Counters)


In addition to the regular statistics collection, ETX-102 allows you to receive
reports when one of the available counters (physical layer or OAM) rises above or
drops below the set thresholds within the specified sampling period of time.
These reports can be sent as SNMP traps to the defined network management
stations or written to the event log.

To configure event reporting (physical layer counters):


1. From the Alarm Threshold Configuration menu (Configuration > System >
Management > Alarm Threshold Configuration), type a to add a new RMON
instance.
2. For each RMON instance configure the following:

Alarm Description (Name of the counter to be monitored):

Dropped Frames

Undersize Frames

Oversize Frames

Fragmented Frames

Jabbers

Port Label (Switch port on which the current RMON instance is active):
None, Port 16
Rising Alarm Threshold (The report is sent if the selected counter has
been above the rising threshold for ten consecutive seconds): 160
Falling Alarm Threshold (The report is sent if the selected counter has
been below the falling threshold for ten consecutive seconds): 160
Sampling Interval (Period of time in seconds during which the data is
sampled and compared with the rising and falling thresholds):
160 seconds
Event Type (Method of event reporting):

None (Reports are not sent)

Log (Reports are recorded as events in the event log)

Trap (Reports are sent as SNMP traps)

Log and Trap (Reports are recorded as events in the event log and
sent as SNMP traps).

Refer to Table 5-4 for the description of the events recorded in the event
log when a counter exceeds or drops below the set threshold.

ETX-102 Ver. 3.8

Handling Events and Traps

5-7

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

ETX-102
Configuration>System>Management>Alarm Threshold Configuration
1. Alarm Description

>

(Dropped Frames)

2. Port Label

>

(None)

3. Rising Alarm Threshold

... (0)

4. Falling Alarm Threshold

... (0)

5. Sampling Interval[1 - 60]

... (0)

6. Event Type

>

(None)

>
Please select item <1 to 6>
A - Add New RMON ; S - Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-6. Alarm Threshold Configuration

To configure event reporting (OAM counters):


1. From the Event Reporting menu (Configuration > Connection > EVCs > Service
> Event Reporting), select an OAM counter to be monitored:

Frame Loss Ratio


Frames Above Delay
Frames Above Delay Variation
Unavailability Ratio

2. For each OAM counter define:

Rising Threshold (The report is sent if the selected counter has been
above the rising threshold for ten consecutive seconds)

Note

5-8

1E-3, 1E-4, 1E-5, 1E-6, 1E-7, 1E-8, 1E-9, 1E-10 for Frame Loss Ratio
and Unavailability Ratio

Falling Threshold (The report is sent if the selected counter has been
below the falling threshold for ten consecutive seconds):

14294967296 for Frames Above Delay and Frames Above Delay


Variation

14294967296 for Frames Above Delay and Frames Above Delay


Variation
1E-3, 1E-4, 1E-5, 1E-6, 1E-7, 1E-8, 1E-9, 1E-10 for Frame Loss Ratio
and Unavailability Ratio

Sampling Interval (Period of time in seconds during which the data is


sampled and compared with the rising and falling thresholds):
160 seconds

Sampling interval configuration is not available for the Frame Loss Ratio and
Unavailability Ratio counters.

Handling Events and Traps

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

Event Reporting Type (Method of event reporting):

None (Reports are not sent)

Log (Reports are recorded as events in the event log)

Trap (Reports are sent as SNMP traps)

Log and Trap (Reports are recorded as events in the event log and
sent as SNMP traps).

Refer to Table 5-4 for the description of the events recorded in the event
log when a counter exceeds or drops below the set threshold.

Clearing Events

To clear the event log:

From the Event Log menu, select Clear Log File.


All events are deleted from the log.

Table 5-4 presents the event types that appear in the event log.
Table 5-4. Event List
Event

Description

COLD START

The unit has been restarted

FATAL ERROR XX

Hardware failure has been detected

FATAL ERROR AT XX LINE XX

Hardware failure has been detected

SYSTEM USER RESET

Overall reset was performed by the user

LINK DOWN (PORT 1 \ PORT 2 Network or user Ethernet port has been disconnected
\ PORT 3)
LINK UP PORT (PORT 1 \
PORT 2 \ PORT 3)

Network or user Ethernet port has been connected

LINK ADMIN DOWN PORT


(PORT 1 \ PORT 2 \ PORT 3)

Network or user Ethernet port has been disabled by the user

LOGIN VIA (TELNET, WEB,


TERMINAL)

ETX-102 has been accessed via Telnet, Web or terminal

INVALID LOGIN VIA (TELNET,


WEB, TERMINAL)

Invalid user name or password was detected during initialization of Telnet, Web
or terminal control session

IP X.X.X.X ASSIGNED BY
SERVER X.X.X.X

IP address X.X.X.X has been assigned by DHCP server X.X.X.X

IP X.X.X.X IS RELEASED

IP address X.X.X.X has been released by ETX-102

LOG FILE RECOVERED

Log file corruption has been detected and fixed at startup.

CONNECTIVITY MISMATCH EVC No EVC ID or MEP ID mismatch has been detected on EVC X
X OFF
CONNECTIVITY MISMATCH EVC EVC ID or MEP ID mismatch has been detected on EVC X
X ON

ETX-102 Ver. 3.8

Handling Events and Traps

5-9

Chapter 5 Diagnostics and Troubleshooting


Event

Description

CC FAILURE EVC X OFF

Continuity check on EVC X has failed

CC FAILURE EVC X OFF

Continuity check on EVC X has been restored

Installation and Operation Manual

DROPPED FRAMES EXCEEDED Number of dropped frames exceeded configured threshold on port X
PORT X
DROPPED FRAMES DROPPED
BELOW PORT X

Number of dropped frames dropped below configured threshold on port X

UNDERSIZED FRAMES
EXCEEDED PORT X

Number of undersized frames exceeded configured threshold on port X

UNDERSIZED FRAMES
DROPPED BELOW PORT X

Number of undersized frames dropped below configured threshold on port X

OVERSIZED FRAMES
EXCEEDED PORT X

Number of oversized frames exceeded configured threshold on port X

OVERSIZED FRAMES DROPPED Number of oversized frames dropped below configured threshold on port X
BELOW PORT X
FRAGMENTED FRAMES
EXCEEDED PORT X

Number of fragmented frames exceeded configured threshold on port X

FRAGMENTED FRAMES
DROPPED BELOW PORT X

Number of fragmented frames dropped below configured threshold over port X

JABBERS EXCEEDED PORT X

Number of jabbers exceeded configured threshold on port X

JABBERS DROPPED BELOW


PORT X

Number of jabbers dropped below configured threshold on port X

FRAMES LOSS RATIO


EXCEEDED EVC X SVC Y

Frames loss ratio exceeded configured threshold for service Y on EVC X

FRAMES LOSS RATIO


Frames loss ratio dropped below configured threshold for service Y on EVC X
DROPPED BELOW EVC X SVC Y
FRAMES ABOVE DELAY
EXCEEDED EVC X SVC Y

Number of frames above delay exceeded configured threshold for service Y on


EVC X

FRAMES ABOVE DELAY


Number of frames above delay dropped below configured threshold for service Y
DROPPED BELOW EVC X SVC Y on EVC X
FRMS ABOVE DEL VAR
EXCEEDED EVC X SVC Y

Frames above delay variation exceeded configured threshold for service Y on EVC
X

FRMS ABOVE DEL VAR


Frames above delay variation dropped below configured threshold for service Y
DROPPED BELOW EVC X SVC Y on EVC X
UNAVAIL RATIO EXCEEDED
EVC X SVC Y

Unavailability ratio exceeded configured threshold for service Y on EVC X

UNAVAIL RATIO DROPPED


BELOW EVC X SVC Y

Unavailability ratio dropped below configured threshold for service Y on EVC X

OAM (802.3ah) REMOTE


DYING GASP PORT X

Dying gasp indication has been received from the remote partner on OAM link on
port X

5-10

Handling Events and Traps

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

Event

Description

OAM (802.3ah)
CONNECTIVITY FAIL PORT X
ON

OAM connectivity has been lost on port X

OAM (802.3ah)
CONNECTIVITY FAIL PORT X
OFF

OAM connectivity has been restored on port X

OAM (802.3ah) REMOTE LINK Indication of the OAM connectivity failure has been received from the remote
FAIL PORT X ON
partner on OAM link on port X
OAM (802.3ah) REMOTE LINK Indication of the OAM connectivity recovery has been received from the remote
FAIL PORT X OFF
partner on OAM link on port X
OAM (802.3ah) REMOTE
Indication of the critical errors has been received from the remote partner on
CRITICAL ERRORS PORT X ON OAM link on port X
OAM (802.3ah) REMOTE
Indication of the critical error termination has been received from the remote
CRITICAL ERRORS PORT X OFF partner on OAM link on port X
OAM (802.3ah) REMOTE
LOOPBACK PORT X ON

Indication of the remote loopback activation has been received from the remote
partner on OAM link on port X

OAM (802.3ah) REMOTE


LOOPBACK PORT X OFF

Indication of the remote loopback deactivation has been received from the
remote partner on OAM link on port X

Table 5-5. Trap List


Trap

Description

OID

Maskable

coldStart

The unit has been restarted

1.3.6.1.6.3.1.1.5.1

No

authenticationFailure

User authentication has failed

1.3.6.1.6.3.1.1.5.5

No

linkDown

Network or user Ethernet port has


been disconnected

1.3.6.1.6.3.1.1.5.3

Yes

linkUp

Network or user Ethernet port has


been connected

1.3.6.1.6.3.1.1.5.4

Yes

tftpStatusChangeTrap

TFTP session status has changed

1.3.6.1.4.1.164.6.1.0.1

No

agnStatusChangeTrap

SNMP agent status has changed

1.3.6.1.4.1.164.6.1.0.2

No

agnPowerFailureTrap

ETX-102 power supply is about to


fail

1.3.6.1.4.1.164.6.1.0.13

No

successfulLogin

Successful login to ETX-102 has


been detected

1.3.6.1.4.1.164.6.1.0.24

Yes

failedLogin

Failed login to ETX-102 has been


detected

1.3.6.1.4.1.164.6.1.0.25

Yes

prtStatusChangeTrap

An SFP has been removed from one


of the ports

1.3.6.1.4.1.164.6.1.0.3

No

ETX-102 Ver. 3.8

Handling Events and Traps

5-11

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

Masking Alarm Traps


You can mask some ETX-102 alarm traps to prevent them from being sent to the
management stations.

To mask alarm traps:


1. From the Management menu (Configuration > System > Management), select
Alarm trap mask.
The Alarm Trap Mask menu appears (see Figure 5-7).
2. From the Alarm Traps Mask menu, select Alarm ID to choose a maskable trap
that you intend to mask (see Table 5-5).

Note

List of the alarm traps can be displayed by typing ? for Help.


3. Select Trap Status to enable or disable masking of the selected alarm trap.

ETX-102
Configuration>System>Management>Alarm trap mask
Active alarm traps:

>

1. Alarm ID <use 'help'> [1-3]

... (1)

2. Trap status
>
? - Help
ESC-prev.menu; !-main menu; &-exit

(1, 2, 3)

(Active)

1 Mngr/s

Figure 5-7. Alarm Trap Mask Menu

Configuring the Trap Delay


You can define a delay between the unit power up and sending the first trap to
the NMS. This prevents the ETX-102 traps from being dropped by a peer device
that may not be ready to forward the traps to the NMS.

To configure the trap delay:

5-12

From the Management menu (Configuration > System > Management), select
Traps Delay and define a period of time between completing the power-up
procedure and sending the first trap to the NMS: 0100 seconds.

Handling Events and Traps

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

ETX-102
Configuration>System>Management
1. Device Info

>

2. SNMPv3

>

3. Host

>

4. Manager List

[]>

5. Management Access

>

6. Alarm Trap Mask

>

7. Alarm Threshold Configuration

>

8. Traps Delay[0 - 100]

...

(Disable)

(0)

>
? - Help
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-8. Management Menu

5.3

Testing the Unit

ETX-102 checks network integrity by running ping or trace route tests. In


addition, the user can close loopbacks on the switch ports, run a cable integrity
and VLAN test.

Running a Ping Test


You can ping a remote host to check the ETX-102 IP connectivity.

To ping an IP host:
1. From the Main menu, select Diagnostics.
The Diagnostics menu appears.
2. From the Diagnostics menu, select Ping.
The Ping menu appears (see Figure 5-9).
3. From the Ping menu, configure the following:

Destination IP Address (IP address of the host that you intend to ping):
0.0.0.0 to 255.255.255.255.

Number of frames to send: 050. When set to 0, ETX-102 starts endless


pinging.

4. Select Send Ping to start sending pings.


5. Select Stop Ping to stop the ping test.

ETX-102 Ver. 3.8

Testing the Unit

5-13

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

ETX-102
Diagnostics>Ping
1.
2.
3.
4.

Destination IP Address
Number of Frames to Send[0 - 50]
Send Ping
Stop Ping

... (0.0.0.0)
... (1)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-9. Ping Menu

Tracing the Route


This diagnostic utility traces the route through the network from ETX-102 to the
destination host. The trace route utility supports up to 30 hops.

To trace a route:
1. From the Diagnostics menu, select Trace Route.
The Trace Route menu is displayed (see Figure 5-10).
2. From the Trace Route menu, select Destination IP Address and enter an IP
address of the host to which you intend to trace route.
3. Select Display Trace Route to start tracing.
ETX-102 starts tracing the route, displaying the IP addresses of all hop
nodes.
4. Select Stop Trace Route to stop the tracing.
ETX-102

Diagnostics>Trace Route
1. Destination IP Address
2. Display Trace Route
3. Stop Trace Route

... (0.0.0.0)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-10. Trace Route Menu

Running Loopbacks
ETX-102 supports two loopback types:

5-14

Regular loopback run at the PHY of the bridge ports. When the loopback is
active the data forwarded to a bridge port is looped from the Tx path to the
Rx path.

Testing the Unit

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

MAC Swap loopback which supports exchanging source and destination MAC
addresses of the incoming packets. The user can define loopback direction
(ingress or egress) and type of data to be looped back (all data except for
packets with management VLAN tag or only packets with a specific VLAN tag).

To run a regular loopback:


1. From the Diagnostics menu, select Loopbacks.
The Loopbacks menu is displayed (Figure 5-13).
2. From the Loopbacks menu, type f to select the port that you intend to run
loopback on.
3. From the Loopbacks menu, configure the following:

Note

Loopback Timeout (Specifies a period of time, after which the loopback is


automatically disabled. Setting timeout to 0 disables the timeout.):
03600 seconds.

Loopback State (Controls loopback activation)

Enable Loopback is activated

Disable Loopback is deactivated.

Only one loopback can be run at a time.


To run a MAC Swap loopback:
1. From the Diagnostics menu, select Loopbacks.
The Loopbacks menu is displayed (Figure 5-13).
2. From the Loopbacks menu, type f to select the port that you intend to run
loopback on.
3. From the Loopbacks menu, configure the following:

MAC Swap (Enables or disables exchanging source and destination MAC


addresses:

Enable MAC address swap is enabled

Disable MAC address swap is disabled

Looped Data (Defines which data will be looped back):

Notes

All Except MNG All packets, excluding the ones with management
VLAN tag, are looped back. The management traffic remains intact.
Specific VLAN Only packets with specific VLAN tag are looped back.

MAC Swap loopback cannot be run on network port 2.


Specific VLAN mode is not available for a bridge port with tag handling set to

Stack.
All Except MNG mode is not available for the user ports.

Note

ETX-102 Ver. 3.8

VLAN ID (Specifies VLAN value for the Specific VLAN mode): 14094

Specific VLAN ID must be different from the host VLAN ID.

Testing the Unit

5-15

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

Direction (Defines direction in which the loopback is to be closed):

Local The loopback is closed towards the user interface


(see Figure 5-11)
Remote The loopback is closed towards the network interface
(see Figure 5-12).

Network
Interface

User
Interface

ETX-102

Figure 5-11. Local Loopback

Network
Interface

User
Interface

ETX-102

Figure 5-12. Remote Loopback


The following MAC Swap loopbacks cannot be activated:

Note

5-16

When the Tag Handling is set to Stack: Specific VLAN local and
specific VLAN remote loopbacks on user ports, specific VLAN local
loopback on network port
When the VLAN mode is set to VLAN-aware: Specific VLAN remote
loopback on network port, specific VLAN local loopback on user ports
When the VLAN mode is set to VLAN-unaware and Host Tagging to
Untagged: specific VLAN local loopback on user ports

Forced Source MAC (A MAC address to be used instead of the original


source MAC address)

Forced Destination MAC (A MAC address to be used instead of the original


destination MAC address)

Loopback Timeout (Specifies a period of time, after which the loopback is


automatically disabled. Setting timeout to 0 disables the timeout.):
03600 seconds.

State (Controls loopback activation)

Enable Loopback is activated

Disable Loopback is deactivated.

Only one loopback can be run at a time.

Testing the Unit

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 5 Diagnostics and Troubleshooting

ETX-102
Diagnostics>Loopbacks
Port Label
(1)
Port
(Network)
1. MAC Swap
2. Looped Data
3. VLAN ID [1 - 4095]
4. Direction
5. Forced Source Mac
6. Forced Destination Mac
7. Loopback Timeout (sec) [0-3600]
8. State
>
F - Forward
S - Save
ESC-prev.menu; !-main menu; &-exit

(Enable)
(Specific VLAN)
(1)
(Remote)
... (00-00-00-00-00-00)
... (00-00-00-00-00-00)
... (0)
(Disable)

1 Mngr/s

Figure 5-13. Loopbacks Menu (MAC Swap is Enabled)

Testing the Cables


The user can check the quality of the copper cables, connectors and terminations
by running a Virtual Cable Test (VCT). During the test ETX-102 transmits a signal
of known amplitude (+1V) down each of the two pairs of an attached cable,
testing the Rx and Tx pairs sequentially. The signal travels down the cable until it
reflects off of a cable imperfection. By measuring magnitude of the reflection and
the time it takes for the reflection to come back, ETX-102 estimates an
approximate distance to the location of a cable break or short.

To run the VCT:


1. From the Diagnostics menu, select VCT Test.
The VCT Test menu is displayed (see Figure 5-14).
2. From the VCT Test menu, type f to select an ETX-102 user port, which cable
you intend to test.
3. From the VCT Test menu, select Start Test to initiate the VCT on the selected
port.
The VCT results are displayed for the receive and transmit wires:

Tx/Rx test results:

ETX-102 Ver. 3.8

Fail The CAT5 cable pair has a non-compliant termination i.e. less
than 85 or greater than 115.
Normal The CAT5 cable pair is normal and has a termination between
the IEEE specified limits of 85 to 115

Open The CAT5 cable pair is not terminated.

Short The CAT5 cable pair is shorted

Short to Pair A/B/C/D The CAT5 cable pair is shorted to pair A/B/C/D

Testing the Unit

5-17

Chapter 5 Diagnostics and Troubleshooting

Installation and Operation Manual

Coupled with Pair A/B/C/D The CAT5 cable pair has abnormal
coupling with pair A/B/C/D i.e. the impedance between the pairs is
between 40 and 200.

Rx/Tx distance of reflection: Approximate distance to the location of a


cable break or short in meters.
ETX-102

Diagnostics>VCT Test
Port Label

>

(3)

Port

>

(User 2)

Pair A Test Result

>

(Normal)

Pair A Distance of Reflection

... (0 m)

Pair B Test Result

>

Pair B Distance of Reflection

... (0 m)

Pair C Test Result

>

Pair C Distance of Reflection

... (0 m)

Pair D Test Result

>

Pair D Distance of Reflection

... (0 m)

1. Start Test

(Normal)
(Normal)
(Normal)

(No Op)

>
F - Forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-14. VCT Test Menu

Running the VLAN Test


ETX-102 can be configured to collect and display transmitted and received packet
and octets count per specified port and VLAN.

To run the VLAN test:


1. From the Diagnostics menu, select VLAN Test.
The VLAN Test menu is displayed (see Figure 5-15).
2. From the VLAN Test menu, select the following:

VLAN ID (ID of the VLAN to be tested)

Ethernet Port (ETX-102 network or user port)

State (Enables or disables or VLAN testing)

VLAN test results:

5-18

Rx Octets (Number of bytes received on the selected VLAN and port)

Tx Octets (Number of bytes transmitted on the selected VLAN and port)

Rx Frames (Number of frames received on the selected VLAN and port)

Tx Frames (Number of frames transmitted on the selected VLAN and port)

Testing the Unit

ETX-102 Ver. 3.8

Installation and Operation Manual

Note

Chapter 5 Diagnostics and Troubleshooting

VLAN test cannot be run on network port 2 or management VLAN (ID of the

VLAN to be tested must be different from the host VLAN ID.


Only one VLAN test can be run at a time.

To clear the VLAN test results:

From the VLAN Test menu, type C.


The VLAN test counters are cleared.
ETX-102

Diagnostics>VLAN Test
Rx Octets

Tx Octets

Rx Frames

Tx Frames

(0)
(0)
(0)
(0)

1. VLAN ID[1 4094]


2. Ethernet Port
3. State

(1)
(Network 1)
(Enable)

>
F - Forward
C - Clear counters
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 5-15. VLAN Test Menu

5.4

Frequently Asked Questions

Q: What is the flip time from the main link to the backup link when link
redundancy is enabled?
A: For ETX-102 with two fiber uplinks the flip time is below 50 ms. For ETX-102
with two copper network links, the flip time is 400700 ms.

ETX-102 Ver. 3.8

Technical Support

5-19

Chapter 5 Diagnostics and Troubleshooting

5.5

Installation and Operation Manual

Technical Support

Technical support for this product can be obtained from the local partner from
whom it was purchased.
RADcare Global Professional Services offers a wide variety of service, support and
training options, including expert consulting and troubleshooting assistance,
online tools, regular training programs, and various equipment coverage options.
For further information, please contact the RAD partner nearest you or one of
RAD's offices worldwide.
RAD Data Communications would like your help in improving its product
documentation. Please send us an e-mail with your comments.
Thank you for your assistance!

5-20

Technical Support

ETX-102 Ver. 3.8

Chapter 6
Software Upgrade
This chapter explains how to upgrade ETX-102 to version 3.8.
Software upgrade is required to fix product limitations, enable new features, or
to make the unit compatible with other devices that are already running the new
software version.
The information in this chapter includes the following:

Detailed conditions required for the upgrade

Any impact the upgrade may have on the system

Overview of downloading options

Upgrade via the File Utilities menu

Upgrade via the Boot menu.

6.1

Compatibility Requirements

Following are the software releases that can be upgraded to version 3.8 or
higher, as well as the hardware revisions that can accept the software version
3.8.

Software 3.5 and above

Hardware 2.0 and above.

6.2

Impact

ETX-102 resets automatically after the software upgrade, resulting in up to


two minutes of downtime.
Upgrade to version 3.8 does not affect any user settings.

6.3

Software Upgrade Options

Application software can be downloaded to ETX-102 the File Utilities menu using
TFTP, or via the Boot menu, using XMODEM or TFTP.

ETX-102 Ver. 3.8

Software Upgrade Options

6-1

Chapter 6 Software Upgrade

6.4

Installation and Operation Manual

Prerequisites

This section lists the software file names and outlines system requirements
needed for the upgrade procedure.

Software Files
The version 3.8 release is distributed as a software file named ETX-102 3.8.img.
The file can be obtained from the local RAD business partner from whom the
device was purchased.

System Requirements
Before starting the upgrade, verify that you have the following:

For upgrade via TFTP:

Operational ETX-102 unit with valid IP parameters configured for the host

Connection to a PC with a TFTP server application (such as 3Cdaemon or


PumpKIN) and a valid IP address

Software file (ETX-102 3.8.img) stored on the PC

For upgrade via XMODEM:

Operational ETX-102 unit

Connection to a PC with a terminal emulation application (such as


HyperTerminal)

Software file (ETX-102 3.8.img) stored on the PC.

6.5

Upgrading ETX-102 Software via the File


Utilities Menu

The recommended software downloading method is to use the S/W & File
Transfer using TFTP option in the File Utilities menu.
Network administrators can use this procedure to distribute new software
releases to all the managed ETX-102 units in the network from a central location.

Figure 6-1. Downloading a Software Application File to ETX-102 via TFTP

6-2

Upgrading ETX-102 Software via the File Utilities Menu

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 6 Software Upgrade

Use the following procedure to download software release 3.8 to ETX-102 via the
File Utilities menu.
1. Verify that ETX-102 3.8.img is stored on the PC with the TFTP server
application.
2. Verify that the ETX-102 host has valid IP parameters.
3. Ping the PC to verify the connection.
4. Activate the TFTP server application.
5. Download ETX-102 3.8.img from the PC to ETX-102.

Note

Configuration values shown in this chapter are examples only.

Verifying the Host Parameters


The ETX-102 host must have host IP parameters configured according to your
network requirements. Otherwise you will not be able to establish a proper
communication session with the TFTP server. Refer to the following manual
sections for additional information:

Connecting to the ASCII Terminal in Chapter 2

Working with Terminal in Chapter 3

Configuring IP Host Parameters and Configuring the Host Encapsulation in


Chapter 4.

To verify the ETX-102 host parameters:


1. Display the Host IP menu (Configuration > System > Host IP), and verify that
the host IP address, IP mask, and default gateway are configured according to
your network requirements.
ETX-102

Configuration>System>Host IP
1. IP address

... (192.168.10.2)

2. IP mask

... (255.255.255.0)

3. Default gateway

... (192.168.10.3)

4. DHCP

(Disable)

5. Default IP

... (0.0.0.0

>
Please select item <1 to 5>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 6-2. Host IP Menu


2. Display the Encapsulation menu (Configuration > System > Management >
Host > Encapsulation), and verify that the host encapsulation parameters
(host VLAN, security definition) are configured according to your network
requirements.
ETX-102 Ver. 3.8

Upgrading ETX-102 Software via the File Utilities Menu

6-3

Chapter 6 Software Upgrade

Installation and Operation Manual

ETX-102
Configuration>System>Management>Host>Encapsulation
1.
2.
3.
4.

Host Tagging
Host VLAN ID [1 - 4094]
Host VLAN Priority [0 - 7]
Security Definition

(Tagged)
... (300)
... (7)
(All)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 6-3. Host Encapsulation Menu

Pinging the PC
Check the integrity of the communication link between ETX-102 and the PC by
sending a ping from the unit to the PC.

To ping the PC:


1. From the Ping menu (Diagnostics > Ping), enter the IP address of the PC as
the destination IP address of the ping.
2. Select Send Ping to start sending pings.
A reply from the PC indicates a proper communication link
3. If the ping request times out, check the link between ETX-102 and the PC
(physical path, configuration parameters, etc.)
ETX-102

Diagnostics>Ping
1.
2.
3.
4.

Destination IP Address
Number of Frames to Send[0 - 50]
Send Ping
Stop Ping

... (192.168.10.20)
... (1)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 6-4. Pinging the PC

Activating the TFTP Server


Once the TFTP server is activated on the PC, it waits for any TFTP file transfer
request originating from the product, and carries out the received request
automatically. The Transferring Software and Configuration Files section in
Chapter 4 explains how to prepare your PC for the TFTP file transfer.
TFTP file transfers are carried out through Port 69. Make sure that the firewall
you are using on the server allows communication through this port

6-4

Upgrading ETX-102 Software via the File Utilities Menu

ETX-102 Ver. 3.8

Installation and Operation Manual

To run the TFTP server:

Chapter 6 Software Upgrade

Activate a TFTP server application, such as 3Cdaemon (available from


www.3com.com) or PumpKIN (available from http://kin.klever.net/pumpkin/).

To allow communication through Port 69 in Windows XP:


1. Double-click the My Network Places icon, located on the desktop.
The My Network Place window appears.
2. On the Network Tasks sidebar, click View network connections.
The available network connections are displayed.

Figure 6-5. View Network Connections


3. On the Network Tasks sidebar, click Change Windows Firewall settings.
The Windows Firewall dialog box appears.

Figure 6-6. Change Firewall Settings


4. Click the Exceptions tab.

ETX-102 Ver. 3.8

Upgrading ETX-102 Software via the File Utilities Menu

6-5

Chapter 6 Software Upgrade

Installation and Operation Manual

Figure 6-7. Windows Firewall Dialog Box Exceptions Tab


5. Check whether Port 69 appears on the exceptions list. If it does not, click
Add Port and add it to the list of exceptions.

Note

Different firewall types require different configuration. Refer to your firewall's


documentation to check how TFTP file transfers can be allowed to pass through it
using a UDP-type port.

Downloading the New Software Release File to ETX-102


This procedure is used to replace the current software version with the new
software release (ETX-102 3.8.img).

To download the new software release file:


1. From the S/W & File Transfer using TFTP menu (Utilities > File Utilities > S/W
& File Transfer using TFTP), enter the following:

File name ETX-102 3.8.img

Command Software Download

Server IP IP address of the PC.

2. Save your changes to initiate the download.

6-6

Upgrading ETX-102 Software via the File Utilities Menu

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 6 Software Upgrade

The software download begins. When the process is completed, ETX-102


resets automatically. After the reset, the new software release
(ETX-102 3.8.img) replaces the current software version and becomes
active.
ETX-102
Utilities>File Utilities>S/W & File Transfer using TFTP
1. File name

... (ETX-102 3.8.img)

2. Command

>

3. Server IP

... (192.168.10.20)

4. Retry timeout(sec)[0 - 1000]

... (1)

5. Total timeout(sec)[0 - 1000]

... (5)

6. View transfer status

>

>
ESC-prev.menu; !-main menu; &-exit

(Software Download)

1 Mngr/s

Figure 6-8. Transferring New Software Release Using TFTP

6.6

Upgrading ETX-102 Software via the Boot Menu

Software downloading can also be performed using the Boot menu. The Boot
menu can be reached while ETX-102 performs initialization, for example, after
power-up.
You may need to start the loading from the Boot menu when it is not possible to
activate TFTP from the S/W & File Transfer using TFTP menu (for example,
because the ETX-102 software has not yet been downloaded or is corrupted).

Caution The Boot menu procedures are recommended only for use by authorized
personnel, because this menu provides many additional options that are intended
for use only by technical support personnel.
Two software downloading options are available from the Boot menu:

Downloading using the XMODEM protocol. This is usually performed by


downloading from a PC directly connected to the CONTROL DCE port of the
unit.

Figure 6-9. Downloading a Software Application File to ETX-102 via XMODEM

ETX-102 Ver. 3.8

Upgrading ETX-102 Software via the Boot Menu

6-7

Chapter 6 Software Upgrade

Installation and Operation Manual

Downloading using TFTP. This is usually performed by downloading from a


remote location that provides an IP communication path to an Ethernet port
of ETX-102.

To access the Boot menu:


1. Configure the communication parameters of the selected PC serial port for
asynchronous communication to the data rate configured in ETX-102 for the
control port (see Configuring Control Port Parameters in Chapter 4), no parity,
one start bit, eight data bits, and one stop bit. Turn all types of flow control
off.
2. Turn off ETX-102.
3. Activate the terminal application.
4. Turn on ETX-102 and immediately start pressing the <Enter> key several
times in sequence until you see the Boot screen. A typical screen is shown
below (the exact version and date displayed by your ETX-102 may be
different).

Note

If you miss the timing, ETX-102 performs a regular reboot process (this process
starts with Loading and ends with a message to press <Enter> a few times to
display the log in screen).

RAD ETX_102 Boot Version 1.00 (Nov 9 2004)


RAD Boot Manager Version 7.01 (Nov 9 2004)
0 - Exit Boot-Manager
1 - Dir
2 - Set Active Software Copy
3 - Delete Software Copy
4 - Download Files or an Application by XMODEM
5 - Format flash
6 - Show basic hardware information
7 - Reset board
8 - System Configuration.
9 - Download an Application by TFTP
Press the ESC key to go back to the Main Menu.
Select:

Figure 6-10. Boot Menu

Using the XMODEM Protocol


Use the following procedure to download software release 3.8 to ETX-102 via
XMODEM.

To download software release via XMODEM:


1. Verify that ETX-102 3.8.img is stored on the PC with the terminal application.
2. From the Boot menu, select Download Files or an Application by XMODEM.

6-8

Upgrading ETX-102 Software via the Boot Menu

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 6 Software Upgrade

A message is displayed that requests the partition number to which the


new software is to be downloaded, and offers a recommended value.
Select Copy number for download ( 1 )
3. If there is no special reason to select a different value, type the
recommended number and then press <Enter>.
Select: 1
4. The process starts, and the following is displayed:
Erasing Partition please wait ....
Please start the XMODEM download.
5. Start the transfer in accordance with the program you are using. For example,
if you are using the Windows HyperTerminal utility:

Select Transfer in the HyperTerminal menu bar, and then select Send File
on the Transfer menu.
The Send File window is displayed:

Select the prescribed ETX-102 software file name (you can use the
Browse function to find it).
In the Protocol field, select Xmodem.

When ready, press Send in the Send File window.


You can now monitor the progress of the downloading in the Send File
window.

Note

If downloading fails, the partially downloaded software is erased. In this case,


only active software is left in the flash memory. To download the new software,
you must repeat the whole procedure.
Once the downloading is completed, ETX-102 saves the new release as
the active image, the former active image becomes the backup, and the
boot sequence continues normally. A sequence of messages similar to
the following is displayed:

Loading ...
Decompressing to RAM.
Processing archive: FLASH
Extracting ETX-102.BIN
..........................................................
.................................................................... CRC OK
Running ...
*******************************************************************
* In order to start working - press the ENTER button for few times*
*******************************************************************

6. At this stage, press the <Enter> key several times to go to the login screen.
ETX-102 Ver. 3.8

Upgrading ETX-102 Software via the Boot Menu

6-9

Chapter 6 Software Upgrade

Installation and Operation Manual

Using TFTP
Use the following procedure to download software release 3.8 to ETX-102 via
TFTP.
1. Verify that ETX-102 3.8.img is stored on the PC with the TFTP server
application.
2. Define IP parameters via the Boot Manager menu.
3. Activate the TFTP server application.

Note

Configure the connection timeout of the TFTP server to be more than 30 seconds
to prevent an automatic disconnection during the backup partition deletion
(about 25 seconds).
4. Download ETX-102 3.8.img from the PC to ETX-102.

To define IP parameters via the Boot Manager menu:


1. From the Boot menu (Figure 6-10), select System Configuration to start the
configuration of the ETX-102 IP communication parameters, as needed for
TFTP transfer.
The parameters are displayed in consecutive lines. For each parameter,
you can accept the current values by simply pressing <Enter> to continue,
or type a new value:

IP Address: Used to select the IP address of ETX-102. To change the


current value, type the desired IP address in the dotted quad format,
and then <Enter> to continue.
IP Mask: Used to select the IP subnet mask of ETX-102. To change the
current value, type the IP subnet mask address in the dotted quad
format, and then <Enter> to continue.
Default Gateway Address: When the TFTP server is located on a
different LAN, you must define the IP address of the default gateway
to be used by ETX-102. Make sure to select an IP address within the
subnet of the assigned ETX-102 IP address. To change the current
value, type the desired IP address in the dotted quad format, and
then <Enter> to end the configuration.
If no default gateway is needed, for example, because the TFTP
server is attached to the same LAN as the ETX-102 device being
upgraded, enter 0.0.0.0.

2. Press <Enter> to display the Boot menu.


3. Select Reset board to reset ETX-102.
The new parameters take effect after the reset is completed.

To download software from the Boot menu using TFTP:


1. From the Boot menu, select Download an Application by TFTP and then press
<Enter> to start the TFTP transfer.
Please Enter the Target File Name message is displayed.

6-10

Upgrading ETX-102 Software via the Boot Menu

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 6 Software Upgrade

2. Enter the name of the desired software distribution file (make sure to include
the path, when necessary). When done, press <Enter> to continue.
Please Enter the Server IP address message is displayed.
3. Enter the IP address of the server on which the software distribution file
resides and then <Enter> to continue.
If no errors are detected, ETX-102 automatically erases the backup
partition (it takes about 25 seconds), and the downloading process
starts. Once the downloading is completed, ETX-102 saves the new
release as the active image, and the former active image becomes the
backup.
4. After the transfer is successfully completed, return to the Boot menu and
select Exit Boot-Manager.
When the ETX-102 initialization is ended, the unit loads the new
software.

Note

If downloading fails, repeat the whole procedure.

6.7

Verifying Upgrade Results

To verify that the upgrade was successful, use the Terminal application and log
on to ETX-102 via HyperTerminal to view the Inventory screen (Main Menu >
Inventory), indicating the active software version in the SW Rev column.

ETX-102 Ver. 3.8

Verifying Upgrade Results

6-11

Chapter 6 Software Upgrade

6-12

Verifying Upgrade Results

Installation and Operation Manual

ETX-102 Ver. 3.8

Chapter 7
Application Tutorial
This chapter provides detailed instructions for setting up a typical application
using two ETX-102 units.

7.1

Configuring the VLAN Stacking Application

This section provides an overview of an Ethernet access application, with two


ETX-102 units operating opposite each other (see Figure 7-1).

Figure 7-1. VLAN Stacking Application


VLAN stacking application requirements:

Receiving three user traffic feeds via separate user ports:


Port 1 real time traffic
Port 2 priority data
Port 3 best effort data

Service level definition (SLD):


Assigning rate limit to each data stream
Configuring per port ingress priority.
Assigning different port VID to each data stream.

ETX-102 Ver. 3.8

Configuring the VLAN Stacking Application

7-1

Chapter 7 Application Tutorial

Installation and Operation Manual

Configuration Sequence
There are four basic configuration steps that need to be followed when deploying
ETX-102 units. Configure:
1. System parameters (setting host IP, defining network managers, configuring
management VLAN)
2. Network and user interfaces at the physical layer (if necessary)
3. The internal bridge (bridge mode, port VIDs)
4. QoS (priority and rate limitation).

Table 7-1. Configuration Summary (System)


Device

Host IP

Manager IP

Manager VLAN, Priority

ETX-102 (A)

192.168.10.2

192.168.10.100

7, 7

ETX-102 (B)

192.168.10.1

192.168.10.100

7, 7

Table 7-2. Configuration Summary (Bridge and QoS)


Traffic Type

Allocated Rate

SPVLAN

Default Priority Tag

Priority Queue

Real time traffic

5 Mbps

Priority 2

Priority data

10 Mbps

Priority 1

Best effort data

40 Mbps

Priority 0

Configuring System Parameters


This section explains how to configure ETX-102 units. The configuration
procedure is similar for both units, except for defining different host IP
addresses. Refer to Chapter 3 for explanation of how to select management
options and save the changes.

Configuring Host IP Parameters

To configure the host IP parameters:


1. Display the Host IP menu (Configuration > System > Host IP), and configure
the IP address and mask of the host:
ETX-102 (A) host IP address 192.168.10.2
ETX-102 (B) host IP address 192.168.10.1
2. Save the changes.

7-2

Configuring the VLAN Stacking Application

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 7 Application Tutorial

ETX-102
Configuration>System>Host
1. IP address
2. IP mask
3. Default gateway
4. DHCP
5. Default IP

... (192.168.10.2)
... (255.255.255.0)
... (0.0.0.0)
(Disable)
... (0.0.0.0)

>
Please select item <1 to 5>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-2. Configuring Host IP Parameters for ETX-102 (A)

Defining Management VLAN

To define management VLAN:


1. Display the Encapsulation menu (Configuration > System > Management >
Host > Encapsulation), and configure the following:
Host Tagging Tagged
Host VLAN ID 7
Host VLAN Priority 7
2. Save the changes.

ETX-102
Configuration>System>Management>Host>Encapsulation
1. Host Tagging
(Tagged)
2. Host VLAN ID [1 - 4094]
... (7)
3. Host VLAN Priority [0 - 7]
... (7)
4. Security Definition
(All)
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-3. Defining Management VLAN

Adding a Network Manager

To add a network manager:


1. Display the Manager List menu (Configuration > System > Management >
Manager List), and add a new network manager as follows:
2. Type a to enter the Add mode.
3. When in Add mode, select Manager IP, and enter the IP address of the
management station 192.168.10.100.
4. Save the changes.

ETX-102 Ver. 3.8

Configuring the VLAN Stacking Application

7-3

Chapter 7 Application Tutorial

Installation and Operation Manual

ETX-102
Configuration>System> Management > Manager List
Manager ID
(1)
1. IP Address
... (192.168.10.100)
2. Trap Mask
... (Disable)
3. SNMP Traps UDP Port
... (162)
4. Save All
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-4. Manager List Menu, Add Mode

Configuring Ethernet Interfaces at the Physical Layer

To configure the Ethernet interfaces at the physical layer:

Display the Ethernet menu (Configuration > Physical Ports > Ethernet), and
configure the following parameters according to your application
requirements:
Autonegotiation
Maximum advertised capability
Speed and duplex mode
Flow control
Fault propagation.

Configuring the Bridge


Configuring the Bridge Mode
In the VLAN stacking application, it is necessary to configure the ETX-102 internal
bridge to the VLAN-unaware mode.

To configure the bridge mode:

7-4

Display the Bridge menu (Configuration > Bridge), and set the VLAN mode to
Unaware.

Configuring the VLAN Stacking Application

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 7 Application Tutorial

ETX-102
Configuration>Bridge
1.
2.
3.
4.
5.
6.
7.

VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership

(Unaware)
(Transparent)
...(300)
[]>
>
>

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-5. Configuring Bridge Mode

Configuring the Bridge User Ports

To configure the bridge ports:

Display the Bridge Port menu (Configuration > Bridge > Bridge Port), and
perform the following:
1. Type f to select User1 (user port 1).
2. Set Port VID\Stacking VID to 4
3. Set Default Priority Tag to 2
4. Set Tag Handling to Stack.
5. Repeat steps 14 for user ports 2 and 3, selecting the following values:

User 2 Port VID\Stacking VID 5, User 2 Default Priority Tag 1

User 3 Port VID\Stacking VID 6, User 3 Default Priority Tag 0

ETX-102
Configuration>Configuration>Bridge>Bridge Port
Bridge Port
(User1)
1. Ingress Filtering

>

2. Accept Frame Type

(Enable)
(All)

3. Port VID\Stacking VID [1 - 4094] ... (4)


4. Default Priority Tag [0 - 2]
5. Tag Handling

... (2)
(Stack)

>
f - forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-6. Configuring User Bridge Ports

ETX-102 Ver. 3.8

Configuring the VLAN Stacking Application

7-5

Chapter 7 Application Tutorial

Installation and Operation Manual

Configuring QoS
It is necessary to select priority type and ingress rate limit for all user ports.

Selecting the Priority Type

To select the priority type:

Display the Priority menu (Configuration > QoS > Priority), and set the
Classification to Port Default Priority. In this case the use traffic coming from
the different port is to prioritized according to the default priority tag setting
(see Configuring the Bridge User Ports above).
ETX-102

Configuration>QoS>Priority
1. Classification

>(Port Default Priority)

2. Mapping

>

S - save
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-7. Configuring Priority


ETX-102
Configuration>QoS>Priority>Mapping>Port Default Priority
1. User priority 0

>(Traffic class 0)

2. User priority 1

>(Traffic class 0)

3. User priority 2

>(Traffic class 1)

4. User priority 3

>(Traffic class 1)

5. User priority 4

>(Traffic class 2)

6. User priority 5

>(Traffic class 2)

7. User priority 6

>(Traffic class 2)

8. User priority 7

>(Traffic class 2)

>
S - Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-8. Mapping Priorities to Traffic Classes

Selecting the Rate Limit

To select the rate limit:

7-6

Display the Port Rate Limitation menu (Configuration > QoS > Rate Limitation
> Ingress), and perform the following:

Configuring the VLAN Stacking Application

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 7 Application Tutorial

Type f to select User1 (user port 1).


Set Priority 0 to 5 Mbps.
Repeat steps 12 for user ports 2 and 3, selecting the following values:

User 2 Priority 10 Mbps


User 3 Priority 40 Mbps.

ETX-102
Configuration>QoS>Rate Limitation>Ingress
Port Label
> (1)
Port
> (User1)
1. Rate Limitation

> (5 Mbps)

2. Burst Size (in kB)

> (96)

3. Limit Packet Type


>

> (All)

F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-9. Defining Port Rate Limits

7.2

Configuring a VLAN-Aware Application

Figure 7-10 illustrates a typical Ethernet switching application. The application is


as follows:

ETX-102 (A):
When receiving untagged user data from its user ports 1 and 2, it adds
two different VIDs to the data streams
Sends the user data to the remote ETX-102 (B) and ETX-102 (C) via its
network interface
When receiving tagged data from the remote ETX-102 (B) and ETX-102
(C), it strips the VID tags and forwards the untagged data to the user
equipment via its user ports 1 and 2.

Remote ETX-102 (B) and ETX-102 (C):


Receive tagged data from the local ETX-102 (A)
Strip the VID tags and forward the untagged data to the user equipment via
their user ports: user port 1 for ETX-102 (B) and user port 2 for ETX-102
(C).
When receiving untagged data from the user equipment, they add VID tags
to it and forward the data to the local ETX-102 (A) via their network
interfaces.

ETX-102 Ver. 3.8

Configuring a VLAN-Aware Application

7-7

Chapter 7 Application Tutorial

Installation and Operation Manual

Figure 7-10. VLAN-Aware Application

Configuration Sequence
There are four basic configuration steps that need to be followed when deploying
ETX-102 units. Configure:
1. System parameters (setting host IP, defining network managers, configuring
management VLAN)
2. Network and user interfaces at the physical layer (if necessary)
3. The internal bridge (bridge mode, port VID)
4. VLAN membership.

Table 7-3. Configuration Summary (System)


Device

Host IP

Manager IP

Manager VLAN, Priority

ETX-102 (A)

192.168.10.2

192.168.10.100

7, 7

ETX-102 (B)

192.168.10.1

192.168.10.100

7, 7

ETX-102 (C)

192.168.10.3

192.168.10.100

7, 7

Table 7-4. Configuration Summary (Bridge Ports)

7-8

Device

Port

Port VID

ETX-102 (A)

User 1

10

ETX-102 (A)

User 2

20

ETX-102 (B)

User 1

10

ETX-102 (C)

User 2

20

Configuring a VLAN-Aware Application

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 7 Application Tutorial

Table 7-5. Configuration Summary (VLAN Membership)


Device

VLAN

Egress Tagged Port

Egress Untagged Port

ETX-102 (A)

10

1 (network)

2 (user 1)

ETX-102 (A)

20

1 (network)

3 (user 2)

ETX-102 (B)

10

1 (network)

2 (user 1)

ETX-102 (C)

20

1 (network)

3 (user 2)

Configuring System Parameters


Refer to the Configuring System Parameters section above for instruction on how
to configure the system parameters of the ETX-102 units.

Configuring Ethernet Interfaces at the Physical Layer


Refer to the Configuring Ethernet Interfaces at the Physical Layer section above
for instruction on how to configure physical layer of the Ethernet parameters.

Configuring the Bridge


Configuring the Bridge Mode
In the VLAN-aware application, it is necessary to configure the ETX-102 internal
bridge to the VLAN-aware mode.

To configure the bridge mode:

Display the Bridge menu (Configuration > Bridge), and set the following:
VLAN Mode Aware
Forwarding Mode Filter.
ETX-102

Configuration>Bridge
1.
2.
3.
4.
5.
6.
7.

VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership

(Aware)
(Filter)
...(300)
[]>
>
>

ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-11. Configuring Bridge Mode

ETX-102 Ver. 3.8

Configuring a VLAN-Aware Application

7-9

Chapter 7 Application Tutorial

Installation and Operation Manual

Configuring the User Bridge Ports

To configure the user bridge ports:

Display the Bridge Port menu (Configuration > Bridge > Bridge Port), and
perform the following:
Type f to select the ETX-102 (A) user port 1 (User1).
Set Port VID\Stacking VID to 10.
Repeat steps 12 for ETX-102 (A) user port 2, setting its VID to 10.
Repeat steps 12 for ETX-102 (B) user port 1, setting its VID to 10.
Repeat steps 12 for ETX-102 (C) user port 2, setting its VID to 20.

ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
(2)
Bridge Port
(User1)
1. Ingress Filtering

>

2. Accept Frame Type

(Enable)
(All)

3. Port VID\Stacking VID [1 - 4094] ... (10)


4. Default Priority Tag [0 - 2]

... (0)

5. Tag Handling

(None)

>
f - forward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-12. Configuring User Bridge Ports (ETX-102 (A))

Configuring VLAN Membership.

To configure VLAN membership:


1. From the VLAN Membership menu (Configuration > Applications > Bridge >
VLAN Membership), type a to invoke the Add mode.
2. In the Add mode, set VLAN ID to 10 (see Figure 7-13).
3. Save the changes.

7-10

Configuring a VLAN-Aware Application

ETX-102 Ver. 3.8

Installation and Operation Manual

Chapter 7 Application Tutorial

ETX-102
Configuration>Bridge>Vlan Membership
Vlan Id[1 - 4094]
... (10)
1. Egress Tagged Ports
>
(-)
2. Egress Untagged Ports >
(-)
>
Please select item <1 to 2>
a add new VLAN; f - forward; b - backward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-13. Defining VLAN ID 10 for ETX-102 (A)


4. Select Egress Tagged Ports and type a to invoke the Add mode.
5. In the Add mode, set Egress Tagged Port to 1 and Egress Untagged Port to 2.
6. Repeat steps 15 to add VLAN 20 and configure Egress Tagged Port to 1 and
Egress Untagged Port to 3.
7. Repeat steps 15 for ETX-102 (B) to add VLAN 10 and configure Egress
Tagged Port to 1 and Egress Untagged Port to 2.
8. Repeat steps 15 for ETX-102 (C) to add VLAN 20 and configure Egress
Tagged Port to 1 and Egress Untagged Port to 3.
ETX-102
Configuration>Bridge>Vlan Membership
Vlan Id[1 - 4094]
... (10)
1. Egress Tagged Ports
>
(1)
2. Egress Untagged Ports >
(2)
>
Please select item <1 to 2>
a add new VLAN; f - forward; b - backward
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 7-14. Configuring User 1 and Network Port as VLAN 10 Members

ETX-102 Ver. 3.8

Configuring a VLAN-Aware Application

7-11

Chapter 7 Application Tutorial

7-12

Configuring a VLAN-Aware Application

Installation and Operation Manual

ETX-102 Ver. 3.8

Appendix A
Connector Wiring
A.1

Ethernet Connectors

The Ethernet electrical interface terminates in 8-pin RJ-45 connectors, wired in


accordance with Table A-1.

Table A-1. Ethernet Connector Pinout

A.2

Pin

Function

Rx+

Rx

Tx+

4, 5

Tx

7, 8

CONTROL Connector

The control terminal interface terminates in a V.24/RS-232 9-pin D-type female


DCE connector. Table A-2 lists the CONTROL connector pin assignments.

Table A-2. CONTROL Connector Pinout

ETX-102 Ver. 3.8

Pin

Function

Transmit Data (output)

Receive Data (input)

CONTROL Connector

A-1

Appendix A Connector Wiring

A-2

CONTROL Connector

Installation and Operation Manual

ETX-102 Ver. 3.8

Appendix B
Operation,
Administration, and
Maintenance (OAM)
B.1

Introduction

ETX-102 supports standard implementation of Ethernet OAM based on Y.1731


and IEEE P802.1ag, and pre-standard implementation based on Y.1731. The
pre-standard implementation is only used for performance measurements when
using two RAD units working opposite each other or when working opposite a
RAD device with an older version of RAD Ethernet OAM software. This appendix
describes the pre-standard implementation. The standard implementation can be
found in the documentation of standards Y.1731 and IEEE P802.1ag.
ETX-102 has the following capabilities for providing operation, administration,
and maintenance (OAM) in packet-switched networks:

Continuity check

Non-intrusive loopback which is used to detect loss of bidirectional continuity

Performance measurements (per service).

Table B-1 lists the Ethernet OAM-related terms used in the appendix.
Table B-1. Ethernet OAM Terminology

ETX-102 Ver. 3.8

Term

Description

UNI

User Network Interface. The physical demarcation point


between the responsibility of the Service Provider and the
responsibility of the Subscriber

UNI_C

Customer side of a UNI link

UNI_N

Network side of a UNI link

Service frame

An Ethernet frame transmitted across the UNI toward the


Service Provider or an Ethernet frame transmitted across the
UNI toward the Subscriber.

Flow

Ethernet Virtual Connection : An association of two or more


UNIs that limits the exchange of Service Frames to UNIs in the
Ethernet Virtual Connection

Point-to-point Flow

Flow connecting exactly two UNIs

Introduction

B-1

Appendix B Operation, Administration, and Maintenance (OAM)

Installation and Operation Manual

Term

Description

Multipoint-to-Multipoint
Flow

Flow connecting two or more UNIs

Service Instance / Class


of service (CoS)

A set of Service Frames that have a commitment from the


Service Provider to receive a particular level of performance

Service Instance
Identifier (CoS ID)

Service Frame delivery performance is specified for all Service


Frames transported within a flow with a particular Class of
Service instance. The Class of Service instance is identified by a
Class of Service Identifier associated with each Service Frame
(Class of service can be identified by more than one
parameter/frame attribute)

MEP

Proactive OAM reference point which is capable to initiate and


terminate proactive OAM frames. MEP is also capable to initiate
and react to diagnostics OAM frames.

MIP

A provisioned OAM reference point which is capable to respond


to diagnostics OAM frames initiated by the MEP.

MEP Service Instance


Source

The receiver of OAM frames in each Service Instance

MEP Service Instance


Destination

The transmitter of OAM frames in each Service Instance

B.2

Reference Architecture

Figure B-1 illustrates two OAM flows:

OAM flow originating from the CPE


The CPE-to-CPE OAM flow is transferred transparently by ETX-102 and treated
as data.

OAM flow originating from the ETX-102 devices.


The ETX-102 OAM flow runs on a data flow on the same VLAN.
The ETX-102 units terminate the OAM flow and can be referred as a
Maintenance Entity (ME). Each device supports up to 8 such MEs. In this case,
the ETX-102 units act as MEPs (Maintenance End-Points) and not as a MIP
(Maintenance Intermediate Points) and all measurements are performed on
the UNI_N to UNI_N segment.

B-2

Reference Architecture

ETX-102 Ver. 3.8

Installation and Operation Manual

Appendix B Operation, Administration, and Maintenance (OAM)

Figure B-1. OAM Architecture

Handling of OAM Levels


UNI_C to UNI_N Direction
In the UNI_C to UNI_N direction ETX-102 blocks all OAM messages with OAM level
greater than 2. Messages with other OAM levels are passed transparently.

Network Ingress to UNI_N Direction


All OAM messages coming from the network ingress with the ETX MAC address or
with the special OAM multicast address are sent to the CPU. All other OAM
messages are passed transparently to the user ports as per the respective flow
definition.

B.3

OAM Entities

This section describes the OAM entities hierarchy. Figure B-2 illustrates the
relationship between UNI, flow and Service Instance (COS ID), when one or more
service instances belong to one flow and one or more flow belong to a UNI. From
the OAM perspective, the continuity messages and defects are activated per flow,
and the PM is activated per service instance.

Note

A flow can belong only to one UNI in the same ETX-102.

Figure B-2. UNI, Flow and Service Instance (COS ID)


Figure B-3, Figure B-4 and Figure B-5 illustrate different combinations of UNIs,
flows and service instances. Each UNI contains at least one flow, which contain at
least one service instance.

ETX-102 Ver. 3.8

In the one flow per UNI case (Figure B-3), the PM and CC are transmitted
once.
OAM Entities

B-3

Appendix B Operation, Administration, and Maintenance (OAM)

Installation and Operation Manual

Figure B-3. One Flow per UNI

In case of multiple flows per UNI (Figure B-4), PM and CC are transmitted
three times.

Figure B-4. Multiple Flows per UNI

In case of one flow and multiple CoS (Service Instances) per UNI (Figure B-5),
the PM is transmitted three times and the CC once.

Figure B-5. One Flow and Multiple CoS (Service Instances) per UNI

B.4

OAM Flows

Figure B-6 illustrates a typical OAM traffic flow. The OAM message is transmitted
from the source MEP 1 to the destination MEP 2 and the reply is transmitted back
The source is also a destination for messages from the other direction.
The OAM interval is one second, so each NTU transmits one request and one
reply and receive one request and one reply. Total of four messages are
transmitted per second per service instance.
OAM Message
Request
MEP 1

Source

MEP 2
OAM Message
Reply

Destination

Figure B-6. OAM Flow

OAM Message Addressing


The OAM defines two modes of addressing, unicast and multicast. Unicast
addressing is used for point-to-point connections, while multicast addressing is
B-4

OAM Flows

ETX-102 Ver. 3.8

Installation and Operation Manual

Appendix B Operation, Administration, and Maintenance (OAM)

used in cases where the MAC address of the destination MEP is not known.
ETX-102 supports only point-to-point flows.

OAM Message Association


On the receiver side the OAM frame is associated with a flow and a service.

Flow Association
When an OAM frame is associated with a flow, the following steps are performed:

Request message reception


When a request message is received, the VLAN is extracted to find the Flow
ID. The Flow ID found at the receiver is compared against the Flow ID in the
frame. If the IDs are equal, further service association is made. If it is not
found, the Flow ID no match notification is returned in the reply message.

Reply message reception


When a reply message is received, the VLAN is extracted to find the Flow ID.
The Flow ID found at the receiver is compared against the Flow ID in the
frame. If the IDs are equal, further service association is made. If it is not
found, the frame is discarded and connectivity alarm is issued.

Service Association
When an OAM frame is associated with a service, the following steps are
performed:

Request message reception


The class of service characteristics are extracted from the frame and must be
matched to an entry in the flows <-> services table at the receiver. If they are
matched, the frame is processed. If not, the service ID is returned with the
Not Found notification.

Reply message reception


The class of service characteristics are extracted from the frame and must be
matched to an entry in the flow <-> services table at the receiver. If they are
matched, the frame is processed. If not, the frame is discarded.

Ethernet Loopback (ETH-LB)


The ETH-LB can be used to verify connectivity. The ETH-LB is performed by
sending a request ETH-LB message to the remote unit and expecting an ETH-LB
reply message back to verify connectivity. When the insertion rate of ETH-LB
messages is much slower compared to data rate between the flow points, ETH-LB
is suitable to perform in-service connectivity verification and to measure round
trip delays.
The message is initiated by the local device and runs periodically making it
suitable for fault detection.
Unicast ETH-LB request message is sent from a MEP to a specific MEP (remote
device). The DA of the request message is a unicast MAC address of destination
device. Upon receipt of the request message, the MEP responds with unicast ETHETX-102 Ver. 3.8

OAM Flows

B-5

Appendix B Operation, Administration, and Maintenance (OAM)

Installation and Operation Manual

LB reply message. The DA of the reply message is a unicast MAC address of


requesting device, learned from request message.

Continuity Check (ETH-CC)


Ethernet Continuity Check (ETH-CC) can be used to detect continuity failures
across flows between a given pair of edge service point on a flow. Continuity
failures are caused by:

Major failures (link failure, device failure, network path failure etc)

Minor failures (software failure, memory corruption, incorrect configuration


etc).

The ETH-CC signal is generated by one MEP. Upon receipt of the first ETH-CC
signal from a sending MEP, the receiving MEP detects continuity with sending MEP
and expects to receive further periodic ETH-CC signals. Once the receiving MEP
stops receiving periodic ETH-CC signals from sending MEP, it declares continuity
failure. The MEP that detects the continuity failure notifies the operator by
sending an alarm or a trap.

OAM Procedures
This section discusses the continuity check (CC) and the performance
measurement (PM) procedures.

Continuity Check Procedure


The loopback message and the ETH-CC messages are used for continuity check. In
case the services are defined and PM collection is enabled, they are also used to
carry PM messages. If PM collection is disabled, the messages are used for
continuity check only.
If the RX CC mode of the receiver is configured to CC-based, the continuity
detection is based on ETH-CC. If the mode is set to LB-based, the continuity
detection is based on ETH-LB. If the mode is disabled, the continuity detection is
not performed.

ETH-LB Method
The ETH-LB method includes the following elements:

Unicast ETH-LB transmission


Unicast ETH-LB request message is transmitted by a MEP (ETX-102) every
1 second. The transmitted Transaction Identifier is retained for at least
5 seconds after the unicast ETH-LB signal is transmitted. The Transaction
Identifier must be changed for every unicast ETH-LB message, and no
Transaction Identifier from the same MEP is allowed to be repeated within
1 minute.

Unicast ETH-LB reception and reply transmission


Whenever a valid unicast ETH-LB request message is received by MEP
(ETX-102), a unicast ETH-LB reply message is generated and transmitted to
the requesting MEP. Every field in the unicast ETH-LB request message is
copied to the unicast ETH-LB reply message with the following exceptions:

B-6

OAM Flows

ETX-102 Ver. 3.8

Installation and Operation Manual

Appendix B Operation, Administration, and Maintenance (OAM)

The source and destination MAC addresses are swapped.

The OpCode field is vendor-specific oxFE.

The Flow and MEP ID are processed as follows: if the Flow/MEP ID do not
exist in the device, it changes them to No Match otherwise they are left
intact.

Unicast ETH-LB reply receipt


When a unicast ETH-LB reply message is received by a MEP (ETX-102)
diagnostic flow termination function, it examines the TLVs returned in the
unicast ETH-LB reply message. The signal is declared invalid if the TLVs do not
match those sent in the corresponding unicast ETH-LB request signal,
including MEP ID and Flow ID.

Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-LB mechanism.

Loss of continuity declaration


After the source device sends an ETH-LB message a timer is set with a
3.52 second timeout. If the destination device does send reply within the
timeout, the source enters the loss of continuity state. Upon reply from
the destination, the source resets the timer to 23.5 seconds. Regarding
the continuity check message, the source checks only the Flow ID with
the MEP ID. When the source enters the loss of continuity state, it adds
24 to Unavailable Seconds counter. The 23.5 second period is calculated
as a sliding window.
Loss of continuity state is cleared after 3.52 seconds with at least
21 reply messages from the destination. In this case the Unavailable
Seconds counter decreased by 24.

Connectivity mismatch declaration


If the source Flow ID is not equal to the destination Flow ID as recorded
in the reply message for 10 consecutive times, the source enters in to
misconnection state.
Misconnection state is cleared after 10 consecutive reply messages with
the correct flow name from the destination.
The Unavailable counter is maintained by the service according to the
number of PM messages that did not receive replies. If a mismatch
notification is received to the LB request, the frame is dropped and reply
message is not sent. This is why the service becomes unavailable (no
reply) in case of mismatch and the unavailable counter is raised.

ETH-CC Method
The ETH-CC method includes the following elements:

ETH-CC transmission
Unicast ETH-CC request message is transmitted by a MEP (ETX-102) every
1 second. The transmitted Transaction Identifier is retained for at least
5 seconds after the unicast ETH-CC signal is transmitted. The Transaction
Identifier must be changed for every Unicast ETH-CC message, and no

ETX-102 Ver. 3.8

OAM Flows

B-7

Appendix B Operation, Administration, and Maintenance (OAM)

Installation and Operation Manual

Transaction Identifier from the same MEP is allowed to be repeated within


1 minute.

Unicast ETH-CC reply receipt


When a unicast ETH-CC message is received by a MEP (ETX-102) diagnostic
flow termination function, it examines the TLVs returned in the unicast
ETH-CC message, and declares the signal invalid if the TLVs do not match
those sent in the corresponding exiting MEP ID and Flow ID.

Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-CC mechanism.

Loss of continuity declaration


When the MEP receives the ETH-CC message a timer is set with a
3.5 seconds timeout. If the source does send another message during
this period, the destination enters the loss of continuity state. Upon
receipt of the ETH-CC message, the destination resets the timer to
3.5 seconds. Regarding the continuity check message, the destination
check the Flow ID and the MEP ID. When the destination enters the loss
of continuity state, it adds 4 to the Unavailable Seconds counter. The
3.5 second period is calculated as a sliding window.
Loss of continuity state is cleared after 3.5 seconds with at least
2 messages from the source. In this case the Unavailable Seconds counter
is decreased by 4.

Connectivity mismatch declaration


If the source Flow ID is not equal to the destination Flow ID for
10 consecutive times, the destination enters in to misconnection state.
Misconnection state is cleared after 10 consecutive reply messages with
the correct flow name from the source.
The Unavailable counter is maintained by the service according to the
number of PM messages that did not receive replies. If a mismatch
notification is received to the LB request, the frame is dropped and reply
message is not sent. This is why the service becomes unavailable (no
reply) in case of mismatch and the unavailable counter is raised.

Performance Measurement
ETX-102 measures performance in 15-minute intervals. It also stores
performance history data from the last 24 hours (96 intervals). Table B-2 lists the
PM counters supported by ETX-102.

Table B-2. PM Counters


Parameter

Description

Frames Above Delay Obj.

Number of frames that exceeded delay objective

Frames Below Delay Obj.

Number of frames below or equal delay objective

Frames Above DV Obj.

Number of frames that exceeded delay variation objective

Frames Below DV Obj.

Number of frames below or equal delay variation objective

B-8

OAM Flows

ETX-102 Ver. 3.8

Installation and Operation Manual

Appendix B Operation, Administration, and Maintenance (OAM)

Parameter

Description

Frames Transmitted

Total number of OAM frames transmitted in the current interval

Frames Lost

Number of frames lost in the current interval

Unavailable Seconds

Number of seconds during which the service was unavailable in the current
interval

Elapsed Time

Time (in seconds) elapsed from beginning of the interval 0900

Min. RT Delay

Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Avg. RT Delay

Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Max. RT Delay

Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)

Avg. DV

Average delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

Max. DV

Maximum delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

OAM Transmitted Frames


Counter

Total number of OAM frames transmitted since the service was enabled

OAM Frames Loss Counter

Total number of OAM frames lost since the service was enabled

OAM Frame Loss Ratio

Total number of lost OAM frames divided by total number of transmitted


OAM frames since the service was enabled

Elapsed Time

Time (in seconds) elapsed since the service was enabled

Unavailable Seconds

Total number of unavailable seconds since the service was enabled

Unavailability Ratio

Total number of unavailable seconds divided by elapsed time

B.5

RMON Counters

In addition to the regular statistics collection, ETX-102 supports proactive SLA


measurements per ETX-102 port, as per RMON-based RFC 2819. The device
sends reports when one of the available counters (physical layer or OAM) rise
above or drop below the set thresholds within the specified sampling period of
time. These reports can be sent as SNMP traps to the defined network
management stations or be written to the event log.
The following counters can be monitored:

ETX-102 Ver. 3.8

Frame Loss Ratio

Frames Above Delay

Frames Above Delay Variation

Unavailability Ratio.

RMON Counters

B-9

Appendix B Operation, Administration, and Maintenance (OAM)

B-10

RMON Counters

Installation and Operation Manual

ETX-102 Ver. 3.8

Supplement

AC/DC Adapter
(AD) Plug
for DC Power Supply Connection

Note

Ignore this supplement if the unit is AC-powered.


Certain units are equipped with a wide-range
AC/DC power supply. These units are equipped
with a standard AC-type 3-prong power input
connector located on the unit rear panel. This
power input connector can be used for both AC
and DC voltage inputs.
For DC operation, a compatible straight or
90-degree AC/DC Adapter (AD) plug for attaching
to your DC power supply cable is supplied with
your RAD product (see Figure 1 and Figure 2).

Figure 1. Straight AD Plug

Connect the wires of your DC power supply cable


to the AD plug, according to the voltage polarity
and assembly instructions provided on page 2.

Figure 2. 90-Degree AD Plug


Caution

Prepare all connections to the AD plug before inserting it into the units power
connector.

Publication No. SUP-930-07/08

The Access Company

AC/DC Adapter (AD) Plug

To prepare the AD plug and connect it


to the DC power supply cable:
1. Loosen the cover screw on the bottom
of the AD plug to open it (see
Figure 3).
2. Run your DC power supply cable
through the removable cable guard
and through the open cable clamp.
3. Place each DC wire lead into the
appropriate AD plug wire terminal
according to the voltage polarity
mapping shown. Afterwards, tighten
the terminal screws closely.
4. Fit the cable guard in its slot and then
close the clamp over the cable.
Tighten the clamp screws to secure
the cable.
5. Reassemble the two halves of the AD
plug and tighten the cover screw.

Figure 3. AD Plug Details

6. Connect the assembled power supply


cable to the unit.

Note: You have to flip over the


non-90-degree AD plug type by
180 degrees to insert it into the unit.
After inserting it, verify that the blue
(negative) wire is connected to the
POWER and the brown (positive) wire is
connected to the RETURN.
Reversing the wire voltage polarity will not cause damage to the unit, but the
internal protection fuse will not function.

Warning

Always connect a ground wire to the AD plugs chassis (frame) ground


terminal. Connecting the unit without a protective ground, or interrupting the
grounding (for example, by using an extension power cord without a
grounding conductor) can damage the unit or the equipment connected to it!
The AD adapter is not intended for field wiring.

Supplement

Terminal Block
Connector
for DC Power Supply Connection

Note

Ignore this supplement if the unit is AC-powered.


Certain DC-powered units are equipped
with a plastic 3-pin VDC-IN power input
connector, located on the unit rear
panel. Different variations of the
connector are shown in Figure 1. All
are functionally identical.
0

Supplied with such units is a kit


including a mating Terminal Block (TB)
type connector plug for attaching to
your power supply cable.
Connect the wires of your power
supply cable to the TB plug, according
to the voltage polarity and assembly
instructions provided on the following
pages.

Caution

Figure 1. TB DC Input Connector Types


Appearing on Unit Panels

Prepare all connections to the TB plug before inserting it into the units VDC-IN
connector.

Publication No. SUP-220-06/08

The Access Company

Terminal Block Connector

To prepare and connect the power


supply cable with the TB Plug:

Note: Refer to Figure 2 for assistance.


1

1. Strip the insulation of your power


supply wires according to the
dimensions shown.
2. Place each wire lead into the
appropriate TB plug terminal according
to the voltage polarity mapping shown
in Figure 3. (If a terminal is not already
open, loosen its screw.) Afterwards,
tighten the three terminal screws to
close them.
2

3. Pull a nylon cable tie (supplied) around


the power supply cable to secure it
firmly to the TB plug grip, passing the
tie through the holes on the grip.

Figure 2. TB Plug Assembly

4. Isolate the exposed terminal


screws/wire leads using a plastic
sleeve or insulating tape to avoid a
short-circuit.
5. Connect the assembled power supply
cable to the unit by inserting the
TB plug into the units VDC-IN
connector until it snaps into place.

Figure 3. Mapping of the Power Supply Wire


Leads to the TB Plug Terminals

Reversing the wire voltage polarity can cause damage to the unit!

Warning

Always connect a ground wire to the TB plugs chassis (frame) ground


terminal. Connecting the unit without a protective ground, or interruption of
the grounding (for example, by using an extension power cord without a
grounding conductor) can cause harm to the unit or to the equipment
connected to it!

Terminal Block Connector

Note: Certain TB plugs are equipped with


captive screws for securing the assembled
cables TB plug to the units VDC-IN
connector (C and E types only). To secure
the plug, tighten the two screws on the
plug into the corresponding holes on the
sides of the input connector as shown in
Figure 4.
3

Figure 4. TB Plug with Captive Screws (optional)

To disconnect the TB plug:


1. If the TB plug is equipped with captive screws, loosen the captive screws
(see Figure 4).
4

2. If the units VDC-IN connector is type B, lift the locking latch (see Figure 1).
5

3. Pull out the TB plug carefully.

Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.

Terminal Block Connector

Supplement

Drilling Template for Wall Installation


Front Panel

176 mm (6.92 in)

2
101.6 mm (4 in)

This panel is drawn to scale.


To drill the holes for a wall installation, tear this page out
of the manual or print it on letter-size paper (8.5"x11.0") and
hold it against the wall.
LEDs facing up - drill at 1.
LEDs facing down - drill at 2.
LEDs facing left - drill at 3.
377-901-02/06

Publication No. 377-200-0(/1#

Order this publication by Catalog No. 803612

International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com

North America Headquarters


900 Corporate Drive
Mahwah, NJ 07430, USA
Tel. 201-5291100
Toll free 1-800-4447234
Fax 201-5295777
E-mail market@rad.com

www.rad.com

The Access Company

Das könnte Ihnen auch gefallen