Beruflich Dokumente
Kultur Dokumente
OPERATION MANUAL
ETX-102
Basic Ethernet Demarcation Device
Version 3.8
ETX-102
Basic Ethernet Demarcation Device
Version 3.8
International Headquarters
RAD Data Communications Ltd.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-102 to be delivered hereunder shall
be free of defects in material and workmanship under normal use and service for a period of
twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-102, and in no event shall
RAD's liability exceed the purchase price of the ETX-102.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-102 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the ETX-102 are provided "as is" and without warranty of any kind.
RAD disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-102 shall
not exceed the sum paid to RAD for the purchase of the ETX-102. In no event shall RAD be liable
for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if
RAD has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the units use,
customers should provide for its collection for reuse, recycling or other form
of environmentally conscientious disposal.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or service
personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while the
product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building
protective ground bus.
Warning
Some products may be equipped with a laser diode. In such cases, a label with the
laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:
Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the transmitter.
The use of optical devices with the equipment will increase eye hazard.
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports
Safety Status
SELV
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line
cords.
Attention
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Avertissement
Achtung
This is a class A product. In a domestic environment, this product may cause radio
interference, in which case the user will be required to take adequate measures.
Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet
appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre
demand lutilisateur de prendre les mesures appropries.
Das vorliegende Gert fllt unter die Funkstrgrenzwertklasse A. In Wohngebieten
knnen beim Betrieb dieses Gertes Rundfunkstrrungen auftreten, fr deren
Behebung der Benutzer verantwortlich ist.
Franais
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques
potentiels de scurit pour l'oprateur ou le personnel de service, quant
l'opration du produit ou sa maintenance.
Avertissement
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le
produit est sous tension ou connect des lignes externes de tlcommunications.
Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de
tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus
particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par
l'agence et conformes la rglementation locale de scurit laser pour les produits laser de
classe 1.
Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la
maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer
l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation,
d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou
l'utilisateur.
Franais
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une
tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant,
sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut
aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :
Franais
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de
court-circuit dpassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.
Declaration of Conformity
Manufacturer's Name:
Manufacturer's Address:
ETX-102
Safety
EN 55022:2006 +
A1:2007
EN 55024:1998 +
A1:2001, A2:2003
EN 61000-3-2:2006
EN 61000-3-3:1995
+ A1:2001, A2:2005
EN 60950-1:2005
Supplementary Information:
The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the Low
Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product
was tested in a typical configuration.
Tel Aviv, 15 July 2010
Nathaniel Shomroni
Approvals Coordinator
European
Contact:
Glossary
Address
Agent
Analog
ANSI
AWG
Balanced
Bandwidth
Baud
Best Effort
Bit
Bit
Interleaving/Multiplexing
Bridge
Buffer
Bus
Byte
Carrier
Cell
Channel
Clock
Data
dB (Decibel)
dBm
Decibel
See dB.
Diagnostics
Digital
E3
Encapsulation
Ethernet
Ethernet OAM
Flow Control
Frame
Framing
At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame,
plus information about the integrity of the frame. All other
information, such as network protocols and the actual payload of
data, is encapsulated in a packet, which is encapsulated in the
frame.
Full Duplex
Gateway
Half Duplex
Impedance
Interface
IP Address
Jitter
Laser
Loopback
Manager
Multiplexer
Network
Node
Packet
parameters
Parameters are often called arguments, and the two words are
used interchangeably. However, some computer languages such as
C define argument to mean actual parameter (i.e., the value), and
parameter to mean formal parameter. In RAD CLI, parameter
means formal parameter, not value.
Payload
The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.
Physical Layer
Port
Prioritization
Protocol
RADIUS (Remote
Authentication Dial-In
User Service)
Router
Routing
Serial Transmission
Single Mode
Synchronous
Transmission
Transmission in which data bits are sent at a fixed rate, with the
transmitter and receiver synchronized.
T1
Telnet
VLAN-Aware
VLAN Stacking
1.
Note
Connect the power cable to the power connector on the ETX-102 rear panel.
The unit has no power switch. Operation starts when the power is applied
to the rear panel power connector.
2.
Configure ETX-102 to the desired operation mode via an ASCII terminal connected
to the rear panel CONTROL port. Alternatively, you can manage
ETX-102 over Telnet or a PC running a Web browsing application via one of the
Ethernet ports.
2. Set the terminal emulator to ANSI VT100 emulation (for optimal view of
system menus).
3. Enter your user name and password and proceed with the management
session.
Note
To configure ETX-102:
From the Quick Setup menu (Main > Configuration > Quick Setup), configure
the following parameters:
Host IP address
Host IP mask
Default gateway
Host tagging
Host VLAN ID
VLAN mode
Forwarding mode
DHCP client.
Contents
Chapter 1. Introduction
1.1 Overview.................................................................................................................... 1-1
Device Options ....................................................................................................... 1-1
Applications ............................................................................................................ 1-1
Features ................................................................................................................. 1-2
1.2 Physical Description ................................................................................................... 1-5
1.3 Functional Description................................................................................................ 1-6
Network Port Redundancy ...................................................................................... 1-6
Bridge..................................................................................................................... 1-8
Fault Propagation ................................................................................................. 1-11
Diagnostic Loopbacks ........................................................................................... 1-12
1.4 Technical Specifications............................................................................................ 1-13
Chapter 2. Installation and Setup
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Chapter 3. Operation
3.1
3.2
3.3
3.4
Table of Contents
ii
Table of Contents
iii
Table of Contents
iv
Chapter 1
Introduction
1.1
Overview
Device Options
Several versions of the unit are available, offering different combinations of
Ethernet ports and enclosure types.
Ethernet ports:
Applications
In a typical application ETX-102 provides Ethernet access to a packet-switched
network (Figure 1-1) or next generation SDH/SONET network Figure 1-2) over a
fiber optic local loop.
Overview
1-1
Chapter 1 Introduction
Figure 1-1. Three Methods of Providing Managed Ethernet Services over a PSN
Features
Network Interface
ETX-102 includes two network ports. The network ports use industry-standard
SFP (Small Form-Factor Pluggable) hot-swappable optical transceivers. Refer to
the SFP data sheet for the complete list of the SFPs supported by ETX-102.
Alternatively, ETX-102 can be ordered with built-in RJ-45 ports supporting
autonegotiation and flow control
User Interface
ETX-102 user interfaces terminate in up to four built-in RJ-45 ports that support
autonegotiation and flow control.
Link Redundancy
The unit supports link aggregation (1+1) based on 802.3ad requirements.
Dual homing technology (1:1) allows ETX-102 to be connected to two different
upstream devices.
1-2
Overview
Chapter 1 Introduction
Bridge
The bridge operates in VLAN-aware or VLAN-unaware mode, in accordance with
802.1Q. Learning and filtering can be enabled or disabled.
The unit can append a VLAN tag (provider VLAN) at user port ingress and remove
it at network port ingress. The provider VLAN includes provider VID and priority
(VLAN stacking).
QoS
ETX-102 supports traffic prioritization and rate limitation.
Rate Limitation
ETX-102 supports an egress rate limitation per port (network and user) and
ingress rate limitation per user port.
Fault Propagation
The unit provides the network-to-user fault propagation mechanism. When the
fault propagation is enabled, the user port shuts itself down when a link failure is
detected at the network port.
Management
Setup, monitoring and diagnostics tests can be performed using one of the
following methods:
Out-of-band via ASCII terminal connected to the V.24/RS-232 DCE control port
Inband management via one of the Ethernet ports, for network management
using Telnet or terminal Web-based application:
Inband Management
For the inband management, the host of ETX-102 can be configured to the
tagged or untagged operation:
When the host tagging is enabled, the host packets receive a VLAN tag,
creating a dedicated management VLAN.
Overview
1-3
Chapter 1 Introduction
Security
The following security protocols are provided by ETX-102 to ensure client-server
communication privacy and correct user authentication:
Ethernet OAM
ETX-102 provides tools to monitor and troubleshoot an Ethernet network and
quickly detect failures. Two OAM types are provided:
End-to-end (path) based on IEEE 802.1ag and Y.1731 for continuity check,
non-intrusive loopback and performance management, including Frame Delay,
Frame Delay Variation, Frame Loss, Availability etc
Single segment (link) according to IEEE 802.3ah for remote management and
fault indication, including remote loopback, dying gasp, and MIB parameters
retrieval.
Remote Monitoring
The Syslog protocol is used by ETX-102 to generate and transport event
notification messages over IP networks to the central Syslog server. The Syslog
operation is compliant with the RFC 3164 requirements.
ETX-102 supports DDM (Digital Data Management) SFPs according to Sff-8472
Version 9.3.
DHCP Client
When enabled, the DHCP client of ETX-102 automatically requests an IP address,
IP mask and default gateway from the DHCP server. In addition, ETX-102
automatically defines a network manager with a valid IP address and subnet
mask.
Statistics Collection
ETX-102 collects Ethernet performance statistics for the physical layers of the
network/user ports, OAM flows and VLANs.
In addition to the regular statistics collection, ETX-102 allows you to receive
reports when one of the available counters (physical layer or end-to-end OAM)
rise above or drop below the set thresholds within the specified sampling period
of time. These reports can be sent as SNMP traps to the defined network
management stations and/or be written to the event log.
Dying Gasp
Some of the ETX-102 units feature a dying gasp mechanism. If a power failure
occurs, ETX-102 sends traps to the defined network management stations,
informing the failure.
1-4
Overview
Chapter 1 Introduction
Diagnostic Tools
A built-in ping utility allows checking IP connectivity by pinging remote IP hosts.
The Trace Route application can quickly trace a route from ETX-102 to any other
network device.
Loopbacks can be closed on any of the ETX-102 ports. Only one loopback can be
active at a time. Layer-2 loopback with MAC address swapping enables
end-to-end connectivity verification.
The quality of the copper cables, connectors and terminations can be checked by
running a Virtual Cable Test (VCT). During the test, ETX-102 transmits a signal of
known amplitude (+1V) down each of the two pairs of an attached cable, testing
the Rx and Tx pairs sequentially. The signal travels down the cable until it reflects
off of a cable imperfection. By measuring the magnitude of the reflection and the
time it takes for the reflection to come back, ETX-102 estimates the approximate
distance to the location of a cable break or short.
1.2
Physical Description
Physical Description
1-5
Chapter 1 Introduction
1.3
Functional Description
Link aggregation mode in accordance with IEEE 802.3ad (without LACP). This
mode inherently provides redundancy: if one of the Gigabit Ethernet ports
fails, the traffic is transmitted on the other.
1-6
Functional Description
Chapter 1 Introduction
For networks using Layer 3 routing: the router must support IEEE 802.3ad or
other link aggregation protocol that views the aggregated link as a single
logical interface.
As the two network ports serve as a single logical interface, the learning tables
do not change as a result of the interface flip.
Figure 1-4.
Figure 1-5. The main advantage of this topology is its higher availability,
because each port can be routed along a different path through the network.
Non-revertive mode ETX-102 will not automatically flip back after the failed
port returns to normal operation, but only when the currently used port fails,
or after a manual flip command.
Revertive mode ETX-102 will flip back to the original port when it returns to
normal operation. Flipping back can be delayed by specifying a restoration
time, during which alarms are ignored. As a result, ETX-102 starts evaluating
the criteria for protection switching (flipping) only after the restoration time
expires, thereby ensuring that another flip cannot occur before the specified
time expires.
When flip occurs, ETX-102 clears the MAC tables, enabling more efficient address
relearning.
Bridge
ETX-102 has a multi-port bridging capability handling up to six bridge ports. The
bridge supports VLAN-aware and VLAN-unaware modes of operation.
Functional Description
1-7
Chapter 1 Introduction
Ingress: Checks each frame entering the bridge to decide if and how this
frame should be passed on to the forwarding process
Learning: Learns new MAC table entries (MAC only or MAC VID pairs)
VLAN-Aware Mode
This mode enables the creation of subgroups of bridge ports within the bridge.
Each subgroup is associated with a unique VLAN ID (VID). Frames containing a VID
can be forwarded only between bridge ports that are members of this specific
VLAN, enabling a total separation between different VLAN users within the same
bridge.
Ingress Process
The ingress process is composed of three steps:
Admit All Frames: All frames arriving from the port are admitted and
proceed to the ingress filtering process. PVID is assigned to untagged or
priority-only tagged frames.
Admit Only Tagged Frames: Only VLAN tagged frames are admitted and
allowed to proceed to the ingress filtering process. Untagged or priorityonly tagged frames are discarded.
Ingress Filtering: Works in one of the following modes (configured per bridge
port):
1-8
Functional Description
Chapter 1 Introduction
For untagged frames that were tagged during this process to VID=PVID,
the priority tag is assigned at the VLAN priority field, according to the
default priority configuration.
Frames that pass this stage are submitted to the forwarding and learning
processes.
Learning Process
The learning process observes the source MAC address (SA) and the VID of the
received frame, and updates the forwarding database (MAC table) with the MAC
VID pair and with the bridge port from which the frame was received.
Entries in the MAC table can be dynamic (inserted by the learning process) or
static (inserted by configuration). A dynamic entry has an aging time associated
with it.
The ETX-102 VLAN-aware bridge is an Independent VLAN Learning (IVL) bridge.
The learning process inserts a new dynamic entry into the MAC table. This entry
consists of a MAC-VID pair and bridge port.
If the MAC-VID pair already exists for the same port, the aging time is
updated
If the MAC-VID pair already exists but for a different bridge port (dynamic
entry), the new entry overrides the existing one
If the MAC-VID pair already exists for a different bridge port (static entry), the
static entry prevails.
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry-aging period that has exceeded the configured aging time limit is deleted.
The aging period represents the time passed since the last frame for this entry
entered the bridge. The periodic check of the MAC table (aging time intervals)
results an actual aging time that can reach up to twice the value that was
configured for the bridge.
Forwarding Process
The forwarding process is performed based on the frame destination MAC VID
pair. The frame is forwarded to the bridge port that was specified in the MAC
table for this MAC VID pair entry.
Untagged frames are forwarded according to the PVID that was attached to the
frame during the ingress process.
Frames are forwarded, dropped, or flooded according to the following guidelines:
Forwarded: If the bridge port of the pair entry (DA, VID) in the MAC table is
both an active bridge port and a member of the VLAN, the frame is forwarded
to that bridge port only.
Dropped:
If the bridge port for the pair entry (DA, VID) in the MAC table is the port
on which the frame was received, the frame is dropped.
Functional Description
1-9
Chapter 1 Introduction
If there are no active ports associated with the frames VID, or if the VID
is not defined at all, the frame is dropped.
Flooded:
If the pair (DA, VID) is not learned and does not exist in the MAC table,
the frame is transmitted to all bridge ports that are associated with the
frames VLAN ID.
Multicasts and broadcasts are flooded only through the bridge ports
whose VLAN ID is identical to the frames VLAN ID.
Transmission Process
After the forwarding process identifies the destination bridge port(s) to which
the frames must be transmitted, the frames are transmitted in the appropriate
format.
The frame format can be configured for each VLAN port membership:
VLAN-Unaware Mode
In this mode the bridge forwarding ignores the VLAN ID of VLAN-tagged frames.
Each Ethernet packet received from each bridge port is forwarded according to its
destination MAC address.
Ingress Process
All frames are accepted in this mode: untagged, priority-tagged, or VLAN-tagged.
Learning and forwarding is based on the MAC addresses, with no regard to the
VLAN. This mode is also known as transparent mode.
Learning Process
The learning process observes the source MAC address (SA) of the received frame
and updates the forwarding database (FDB) with the MAC address and the bridge
port that the frame was received from. (FDB is also referred to as MAC table).
The learning process inserts a new entry into the MAC table. This entry consists
of the MAC and bridge port.
1-10
If the MAC already exists for the same bridge port, the aging time is updated.
If the MAC already exists, but for a different bridge port, (dynamic entry) the
new entry overrides the existing one.
Functional Description
Chapter 1 Introduction
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry aging time period that has exceeded the configured Aging Time Limit is
deleted. The aging time period is the period of time since the last frame for this
entry entered the bridge. The periodic check of the MAC table (aging time
intervals), results in an actual aging time that can reach up to twice the value that
was configured by the user.
Forwarding Process
The forwarding process is performed based on the frame MAC Destination
Address (MDA). The frame is forwarded to the bridge/port specified in the MAC
table for this MAC.
Frames are forwarded, dropped, or flooded at this stage:
Dropped: If the port for that DA entry in the MAC table is the port on which
the frame was received, the frame is dropped.
Flooded:
Transmission Process
The frames are transmitted according to the tag handling configured for the
bridge port:
None: The frames are transmitted unchanged, that is no tags are added or
removed.
Fault Propagation
If a network link fails, ETX-102 propagates this condition to user ports (all or only
some of them), see Figure 1-6. The user-configurable time-to-restore parameter
specifies the time period ETX-102 waits before enabling user interfaces once the
network interface is restored.
Functional Description
1-11
Chapter 1 Introduction
Diagnostic Loopbacks
ETX-102 supports the following diagnostics loopbacks:
1-12
Layer-1 loopback performed at the PHY of the bridge ports. When the
loopback is active the data forwarded to a bridge port is looped from the Tx
path to the Rx path, disrupting the traffic. This loopback cannot pass through
Ethernet bridges.
Functional Description
1.4
Network
Interface
Chapter 1 Introduction
Technical Specifications
Number of Ports
User Interface
Electrical Operation
Mode
Number of Ports
Up to 4 RJ-45 ports
Type
Built-in 10/100BaseT
Electrical Operation
Mode
Standard
Compliance
Management
Indicators
Power
Transparent/filtered, VLAN-aware/VLAN-unaware
Number of VLANs
64
Maximum Frame
Size
1,632 bytes
IEEE
MEF
MEF 9, MEF 14
Out-of-Band
Inband
TST/ALM/PWR
(green/orange/red)
NET 1, NET 2,
USER 36 (green)
AC/DC Source
DC Source
Power Consumption
6.1W max
Technical Specifications
1-13
Chapter 1 Introduction
Physical
Environment
ETX-102
(Plastic Enclosure)
ETX-102/H
(Metal Enclosure)
Temperature
Humidity
1-14
Technical Specifications
Up to 90%, non-condensing
Chapter 2
Installation and Setup
This chapter describes installation and setup procedures for the ETX-102 unit.
After installing the unit, refer to Chapter 3 for the operating instructions.
If a problem is encountered, refer to Chapter 5 for test and diagnostic
instructions.
Warning
Grounding
2.1
Note
2-1
2.2
Package Contents
2.3
2.4
Warning
2-2
Note
2.5
ETX-102 can be connected to the Ethernet equipment via the fiber optic LC
designated 100Fx or 8-pin RJ-45 electrical port designated 10/100BT. Refer to
Appendix A for the RJ-45 connector pinout.
2-3
NET
NET/USER
100Fx
10/100BT
10/100BT
10/100BT
10/100BT
CONTROL
USER
DCE
Note
CONTROL
NET
NET/USER
USER
4
100Fx
10/100BT
10/100BT
10/100BT
10/100BT
DCE
2.6
NET
NET/USER
100Fx
10/100BT
10/100BT
10/100BT
10/100BT
CONTROL
USER
DCE
2-4
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
2.7
Connecting to Power
ETX-102 accepts either 100240 VAC or 48/60 VDC power through the same
power inlet.
Warning
Note
Connecting AC Power
AC power is supplied to ETX-102 through a standard 3-prong socket. AC power
should be supplied via a 1.5m (5 ft) standard power cable terminated by a
standard 3-prong socket. A cable is provided with the unit.
To connect AC power:
1. Connect the power cable to the power connector on the ETX-102 rear panel.
2. Connect the power cable to the mains outlet.
The unit turns on automatically upon connection to the mains.
Connecting DC Power
An unterminated power cord for the 48/60 VDC power connection is supplied
with the unit.
To connect DC power:
Connecting to Power
2-5
2-6
Connecting to Power
Chapter 3
Operation
This chapter:
Provides a detailed description of the front panel controls and indicators and
their functions
3.1
To turn on ETX-102:
3-1
Chapter 3 Operation
3.2
The unit's LEDs are located on the front panel (see Figure 3-1). Table 3-1 lists the
functions of the ETX-102 LED indicators.
Type
Function
TST/ALM/PWR
Green/
orange/
red LED
NET 1, NET 2,
USER 36
Green LEDs
3.3
Default Settings
The following table lists the default settings of the ETX-102 configuration
parameters.
Parameter
Default Value
IP address
0.0.0.0
IP mask
0.0.0.0
Default gateway
0.0.0.0
Default IP
0.0.0.0
DHCP
Enable
Name
ETX-102
Location
Contact Person
Telnet/SSH Access
Enable
SNMP Access
Disable
System
Host
Device Info
Management Access
3-2
Default Settings
User Access
RADIUS Parameters
Chapter 3 Operation
Parameter
Default Value
Web Access
Enable
RADIUS Authentication
Disable
User Name
su
Permission
Read Only
Access
All
Server IP Address
0.0.0.0
Shared Secret
Number of Retries
Authentication Port
1812
Accounting Port
1813
Read Community
public
Write Community
private
Trap Community
public
Host Tagging
Tagged
Host VLAN ID
300
Security Definition
Network Only
Alarm ID
Trap Status
Masked
Alarm Description
Dropped Frames
Port Label
Port 1
Sampling Interval
Event Type
None
SNMPv3
SNMPv3
Disable
SNMPv3 Settings
Authentication Protocol
usmNoAuthProtocol
Privacy Protocol
usmNoPrivProtocol
SNMPv3
Security Model
Any
Security Level
noAuthNoPriv
Baud rate
115200
Host
Encapsulation
Alarm Threshold
Configuration
Control Port
Default Settings
3-3
Chapter 3 Operation
Type
Syslog
Default Value
Security timeout
10
Logging Status
Disable
514
Facility
Local 1
Severity Level
Major
Server Access
Disable
Server IP Address
0.0.0.0
514
Traps Delay
Date/Time
Protection (LAG)
Protection (1:1)
Physical Layers
Ethernet
0
NTP Mode
Disable
0.0.0.0
GMT
Redundancy Method
LAG
Wait to Restore
Recovery Mode
Revertive
Wait to Restore
None
Administrative Status
Up
Autonegotiation
Enable
Flow Control
Disable
Enable
Fault Propagation
Disable
Disable
OAM MNG
Disable
ID
SP VLAN
Local MEP ID
Remote MEP ID
OAM
EVC
MEP
3-4
Default Settings
Services
Event Reporting
(Frame Loss Ratio,
Unavailability Ratio)
Event Reporting
(Frame Above Delay,
Frame Above Delay Variation)
Bridge
Network Port
User Port
OAM
MD Names
EVC
Chapter 3 Operation
Parameter
Default Value
OAM Mode
Disable
Disable
Multicast
00-00-00-00-00-00
Default Priority
PM
Disabled
Service Priority
Delay Objective
None
Rising Threshold
1E-10
Falling Threshold
1E-10
None
Rising Threshold
Falling Threshold
Sampling Interval
VLAN Mode
Unaware
Forwarding Mode
Filter
Aging Time
300
Ingress Filtering
Enable
All
Port VID
Disable
Ingress Filtering
Enable
All
Tag Handling
None
01-80-C2-00-00-30
8902
MD Format
String
MD Name
None
EVC Name
Default Settings
3-5
Chapter 3 Operation
Type
MA ID
MEP
Services
Event Reporting
(Frame Loss Ratio,
Unavailability Ratio)
Event Reporting
(Frame Above Delay,
Frame Above Delay Variation)
Default Value
SP VLAN
Protocol Type
Standard
MD ID
MA Format
String
MA Name
DEFAULT
Local ID
Mulicast
00-00-00-00-00-00
Remote ID
MD Level
OAM Mode
Disable
CC Interval
1 second
PM
Disabled
Service Priority
Delay Objective
None
Rising Threshold
1E-10
Falling Threshold
1E-10
None
Rising Threshold
Falling Threshold
Sampling Interval
Classification
802.1p
Rate Limitation
No Limit
Burst Size
96
All
Rate Limitation
No Limit
Destination IP Address
0.0.0.0
QoS
Priority
Rate Limitation
Ingress
Egress
Diagnostics
Ping
3-6
Default Settings
Loopbacks
VLAN Test
3.4
Chapter 3 Operation
Parameter
Default Value
MAC Swap
Disable
Looped Data
All
VLAN ID
Direction
Local
00-00-00-00-00-00
00-00-00-00-00-00
Loopback Timeout
Loopback State
Disable
Port
Network 1
VLAN ID
State
Off
After installation, there are no special operating procedures for ETX-102. Once it
is powered up, the unit operates automatically. The unit operational status can
be monitored constantly.
If required, ETX-102 can be reconfigured. ETX-102 can be managed using the
following ports and applications:
3-7
Chapter 3 Operation
Login
To prevent unauthorized modification of the operating parameters, ETX-102
supports two access levels: .
Note
Users access rights (full control or read only) are defined by the superuser.
Users are not allowed to create new users.
To enter as a user:
1. Enter user for user name.
2. Enter 1234 for password.
Note
Choosing Options
3-8
To select a menu item, type the corresponding line number and then press
<Enter>. This will either
Chapter 3 Operation
or
let you type the (free text) parameter value in the same row
or
toggle the current value of the corresponding parameter (relevant to
ENABLE/DISABLE or ON/OFF selections).
...
Selecting that item will let you type the desired value in the
same line.
Nothing
When a menu does not fit on one screen (because it includes many lines), it
is displayed on two consecutive pages. In this case, you will see (N) after
the last line on the first page and (P) after the last line on the second page:
^D scroll down
^U scroll up
Type the line number corresponding to the desired value, and then press
<Enter>
To enter a value which requires free text entry, type in the desired string
and then press <Enter>. Use backspace to erase the current string.
Note that whenever applicable, the allowed range of values of a
parameter is listed within square brackets [ ].
3-9
Chapter 3 Operation
If you make an error, for example, if you press a key not active on the
current screen or select an invalid parameter value, an ERROR indicator
appears in the right-hand corner. This indicator disappears as soon as
you make a correct operation.
When done with the current screen, press <Esc> to return to the previous
screen, or type ! to return directly to the main menu.
Type &.
After a session is ended, it is necessary to enter again a valid user name and
password to start a new session.
3-10
Enable scripts
Disable pop-up blocking software (such as Google Popup Blocker); you may
also have to configure your spyware/adware protection program to accept
traffic from/to the destination IP address
Chapter 3 Operation
Login
Notes
includes up to two network sessions (Telnet, Web) and one ASCII terminal
session.
If no user input is detected for five minutes during the Web terminal session,
To choose an option:
1. Click a link in the Web screen to display the next menu.
2. Once the target screen is displayed, select a value from the drop-down box or
enter it in a text box.
At the left-hand bottom corner are some auxiliary management tools:
3-11
Chapter 3 Operation
Menu Maps
Use these menu trees as a reference aid while performing configuration and
control functions. Chapter 4 illustrates menus and explains parameters. Table 3-2
lists default values.
Main Menu
Inventory
Configuration
Monitoring
Diagnostics
Utilities
Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS
Quick Setup
Host IP Address
Host IP Mask
Default Gateway
Host Tagging
Host VLAN ID
VLAN Mode
Forwarding Mode
DHCP Client
Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS
System
Host
Management
Control Port
Date/Time
Factory Default
Protection
Host
IP Address
IP Mask
Default Gateway
Default IP
DHCP
DHCP Status
Host
Encapsulation
Read Community
Write Community
Trap Community
Encapsulation
Host Tagging
Host VLAN ID
Host VLAN Priority
Security Definition
Users
SNMPv3 Settings
Users
Targets & Notify
SNMPv1/v3 Mapping
SNMPv3 Factory Defaults
Summary Target Table
Summary User Table
Management
Device Info
SNMPv3
Host
Manager List
SNMPv3 Settings
Management Access
Alarm Trap Mask
Alarm Threshold Configuration
Traps Delay
Security Name
Authentication Protocol
Authentication Password
Privacy Protocol
Privacy Password
Target Params
Name
Message Processing Model
Security Model
Security Name
Security Level
Target Address
Name
IP Address
Params Name
Address Mask
Tag List
Notify
Name
Tag
Trap
Trap Name
Notify Name
User Access
Control Port
Management Access
Baud Rate
Set Scrolling Window Size
Security Timeout
User Access
Telnet/SSH Access
SNMP Access
Web Access
Access Policy
RADIUS Parameters
Date/Time
Time
Date
NTP Mode
NTP Server IP Address
GMT (+/- XX)
NTP Update Interval
Access Policy
1st Level
2nd Level
RADIUS Parameters
Serve Access
Server IP Address
Key String
Number of Retries
Timeout
Authentication Port
Protection
Redundancy Method
Recovery Mode (1:1 only)
Wait to Restore
Shut Down Duration Upon Flip (1:1 only)
Set Active Port (1:1 only)
User Name
Access
'su' Password
New Password
Confirm New Password
3-12
Chapter 3 Operation
Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS
Physical Layers
Ethernet
Fault Propagation WTR
Ethernet (Network)
Administrative Status
User Name
Flow Control
OAM (802.3ah)
OAM MNG
or
Ethernet (User)
Administrative Status
User Name
Autonegotiation
Max Capability Advertised
Flow Control
MDIX Auto Cross Over
MDIX Manual Switch
Fault Propagation
OAM (802.3ah)
OAM MNG
Bridge
VLAN Mode
Forwarding Mode
Aging Time
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership
Bridge Port
(User)
Bridge Port
(Network)
Ingress Filtering
Accept Frame Type
Port VID/Stacking VID
Default Priority Tag
or
Ingress Filtering
Accept Frame Type
Port VID/Stacking VID
Default Priority Tag
Tag Handling
3-13
Chapter 3 Operation
Configuration
Quick Setup
System
Physical Layers
OAM
Bridge
QoS
QoS
Priority
Priority
Rate Limitation
Classification
Mapping
Rate Limitation
Ingress
Egress
Ingress
Rate Limitation
Burst Size
Limit Packet Type
Egress
Rate Limitation
Main Menu
Inventory
Configuration
Monitoring
Diagnostics
Utilities
System
Physical Layers
OAM
Bridge
Diagnostics
Ping
Trace Route
Loopback
VCT Test
VLAN Test
Utilities
File Utilities
Reset
System
Connection Status
Connected Managers
Event Log
Physical Layers
Ethernet Status
Ethernet Statistics
End-to-End
Status
Statistics
OAM
Statistics
15 Min. Intervals
24 Hours Counters
Service Counters
Link (802.3ah)
End-to-End
Link (802ah)
Status
Bridge
MAC Bridge
VLAN Table
File Utilities
S/W & File Transfer using TFTP
Swap Main Application File with Backup
3.5
3-14
Chapter 4
Configuration
This chapter illustrates the configuration ETX-102 screens and explains their
parameters.
The menu tree of the ETX-102 management software is shown in Chapter 3.
For your convenience, parameters that are mandatory for configuration, such as
IP settings of the ETX-102 host or forwarding mode, are given in the Quick Setup
menu (Main menu > Configuration > Quick Setup). This menu is explained in the
Quick Start Guide at the beginning of the manual, and the menu parameters are
explained in the relevant sections of the configuration chapter.
4.1
Configuring Communities
4-1
Chapter 4 Configuration
ETX-102
Configuration>System>Host
1.
2.
3.
4.
5.
6.
IP Address
IP Mask
Default gateway
DHCP
Default IP
`DHCP Status
...
...
...
...
...
>
(0.0.0.0)
(255.255.255.0)
(0.0.0.0)
(Enable)
(0.0.0.0)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Note
When the IP address lease is about to expire, DHCP client automatically requests
lease extension.
To disable the DHCP client:
From the Host menu, select DHCP Client, and choose Disable.
ETX-102 sets the host IP address to 0.0.0.0, while preserving the IP mask
and default gateway values. Telnet or HTTP connection to ETX-102 is
disrupted and the unit can be accessed only using a previously defined
default IP address (see the next section for instructions on how to enter
a default IP address).
4-2
Chapter 4 Configuration
Note
4-3
Chapter 4 Configuration
ETX-102
Configuration>System>Management>Device Info
Description
... (ETH NTU: Boot: 2.01, Hw: 3.01, Sw: 3.80)
1. Name
... (ETX-102)
2. Location
... (The Location of the Device)
3. Contact Person ... (Name of Contact Person)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Configuring Communities
For establishing a proper management link, you must specify the SNMP trap,
read, and write communities.
ETX-102
Configuration>System>Management>Host
IP Address
... (0.0.0.0)
IP Mask
... (0.0.0.0)
Default Gateway
... (0.0.0.0)
1.
2.
3.
4.
Read Community
Write Community
Trap Community
Encapsulation
... (Public)
... (Public)
... (Public)
>
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-4
Chapter 4 Configuration
If host tagging is enabled, select Host VLAN ID to enter the ID of the host
VLAN (14094).
If the host tagging is enabled, select Host VLAN priority to specify priority
of the host VLAN (07).
Select Security Definition and define the ports from which the manager
can access ETX-102. Possible values depend on the VLAN mode (aware or
unaware) of the ETX-102 bridge, selected in the Bridge menu (see
Configuring the Bridge below).
ETX-102
Configuration>System>Management>Host>Encapsulation
1.
2.
3.
4.
Host Tagging
Host VLAN ID [1 - 4094]
Host VLAN Priority [0 - 7]
Security Definition
(Tagged)
... (300)
... (7)
(All)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-5
Chapter 4 Configuration
Select Manager IP, and enter the IP address of the management station.
Select SNMP Traps UDP Port and define a UDP port to be used for sending
SNMP traps to the network manager.
Cold start
Link up
Link down
Authentication failure
Power failure
Rising alarm
Falling alarm.
Refer to trap list in Chapter 5 for the detailed description of the ETX-102 traps.
4-6
Chapter 4 Configuration
ETX-102
Configuration>System>Management>Manager List
Manager ID
IP Address
Trap Mask
1.
1.1.1.1
Disable
Disable
2.
2.2.2.2
162
3.
3.3.3.3
Disable
162
4.
4.4.4.4
Disable
162
1 Mngr/s
Configuring SNMPv3
ETX-102 supports SNMP version 3 entity, providing secure access to the device by
authenticating and encrypting packets transmitted over the network.
Follow these steps to configure the SNMPv3 entity:
1. Enable SNMPv3.
2. Add a new user.
3. Add a new notification entry.
4. Assign traps to notification entries.
5. Configure target (NMS) parameters.
6. Specify target address, define its parameter set and assign notification tags.
7. Map SNMPv3 setting to SNMPv1 settings (if necessary).
4-7
Chapter 4 Configuration
Enabling SNMPv3
To enable SNMPv3:
1. From the Management menu (Configuration > System > Management), select
SNMPv3 to enable the SNMPv3 entity.
The SNMPv3 Settings line is added to the Management menu.
2. From the Management menu, select SNMPv3 Settings.
The SNMPv3 Settings menu is displayed.
The SNMPv3 Settings menu includes the following information:
Engine Boots (The number of times that the SNMP engine has reinitialized
since its identification was last configured.)
Engine Time (The number of seconds since the last SNMP engine boot)
ETX-102
Configuration>System>Management>SNMPv3 Settings
Engine Boots
(2)
Engine Time
(276)
SNMP Message Size
... (1500)
1. Users
>
2. Targets & Notify
>
3. SNMPv1/v3 Mapping
>
4. SNMPv3 Factory Defaults
5. Summary User Table
[]
6. Summary Target Table
[]
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Note
4-8
Select Security Name and enter security name for a new user (up to 32
alphanumeric characters).
Chapter 4 Configuration
Select Privacy Protocol and define the type of privacy protocol to be used
for encryption:
Select Privacy Password and define the private key used for encryption.
This is not available if privacy has been disabled.
2. To view the summary of the SNMPv3 user configuration, select Summary User
Table from the SNMPv3 Settings (Configuration > System > Management >
SNMPv3 Settings) menu.
Tag (A tag value to be associated with the current notification entry. This
tag is used to identify the current notification entry when configuring the
target address.)
4-9
Chapter 4 Configuration
ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Notify
Type
1. Name
2. Tag
> ()
...()
...()
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Assigning Traps
One or more traps must be assigned to each notification entry.
Tag Name (A tag from the list of previously defined notification tags)
ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Trap
1. Tag Name
2. Trap
>()
>()
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-10
SNMPv1
SNMPv2c
SNMPv2u
SNMPv3
Chapter 4 Configuration
Any
SNMPv1
SNMPv2c
ETX-102
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Target Params
1.
2.
3.
4.
5.
Name
Message Processing Model
Security Model
Security Name
Security Level
...
>
>
...
>
()
()
()
()
()
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-11
Chapter 4 Configuration
Name
IP Address
Params Name
Address Mask
Tag List
...
...
...
...
...
()
()
()
()
()
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-12
Chapter 4 Configuration
ETX-102
Configuration>System>Management> SNMPv3 Settings> SNMPv1/v3 Mapping
1.
2.
3.
4.
Community Index
Community Name
Security Name
Transport Tag
...
...
...
...
()
()
()
()
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Manager Only (Access is allowed only for the stations appearing in the
manager list)
Enable Secure (Secure access (SSH-enabled for Secure Shell or SSLenabled for Web) is enabled)
4-13
Chapter 4 Configuration
SNMP Access
Telnet Access
Web Access
Mode
Network
Manager(s) not
Defined
Enable
Anybody
Anybody
Disable
Nobody
Nobody
Managers Only
Only defined
network managers
Nobody
Enable/Enable Secure
Anybody
Anybody
Disable
Nobody
Nobody
Managers Only/
Managers Only Secure
Only defined
network managers
Nobody
Enable/Enable Secure
Anybody
Anybody
Disable
Nobody
Nobody
Managers Only/
Managers Only Secure
Only defined
network managers
Nobody
ETX-102
Configuration>System>Management>Management Access
1.
2.
3.
4.
5.
6.
User Access
TELNET/SSH access
SNMP access
WEB access
RADIUS Authentication
RADIUS Parameters
>
>
>
>
>
>
(Enable)
(Disable)
(Enable)
(Enable Remote)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-14
Chapter 4 Configuration
2nd Level (Second level of authentication. Available only when the 1st level
authentication is set to RADIUS.):
Timeout (The maximum time ETX-102 waits for a single request response
from the RADIUS server (in seconds). After this time the request is
retransmitted.): 060
4-15
Chapter 4 Configuration
Authentication Port (The UDP port number to be used for the RADIUS
authentication application. Make sure to define the same value in the
RADIUS server.): any valid UDP port number.
Configuration>System>Control Port
Terminal Type
Data Bits
Parity
Stop Bits
Flow Control
(VT100)
(8)
(None)
(1)
(None)
1. Baud Rate
2. Set Scrolling Window Size[0 - 11]
3. Security Timeout (min)[0 - 60]
>(115200 bps)
(4)
(10)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Note
The Baud Rate parameter is masked during Telnet and Web sessions.
ETX-102
Configuration>System>Control Port>Baud Rate
1.
2.
3.
4.
5.
(115200 bps)
9600 bps
19200 bps
38400 bps
57600 bps
115200 bps
1 Mngr/s
4-16
Chapter 4 Configuration
From the Control Port menu (Figure 4-14), select Set Scrolling Window Size to
set the size of the status information section at the bottom of the screen in
the range of 0 to 11.
From the Control Port menu (Figure 4-14), select Security Timeout to set to
in the range of 1 to 60 minutes.
The display is refreshed and a new value appears.
Note
Security timeout value is not valid for Web management, where it is permanently
set to 10 minutes.
4.2
Note
1:1.
Before configuring the link protection make sure that both network ports have
identical bridge port parameters (ingress filtering mode, port VID etc) and are the
members of the same VLAN.
4-17
Chapter 4 Configuration
Note
LAG Both network links are combined into one virtual group, but only
one link transmits data at a time. If a failure occurs on the transmitting
link, ETX-102 switches to the standby link in the group.
In the LAG mode the first link to have its Administrative Status to be set to Up
becomes an active link of the group and starts data transmission. Refer to the
Configuring Network and User Ethernet Interfaces section below for
transmits.
Configuration>System>Protection
GROUP ID
Port Members
1. Redundancy Method
>
>
(1)
(1,2)
>
(LAG)
... (0)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
From the Protection menu (LAG mode), select Wait to Restore and define a
period of time between link restoration and using the link for the data
transfer.
2. Define Wait to Restore time (Period of time between link restoration and
using the link for the data transfer): 0720 sec
4-18
Chapter 4 Configuration
3. Define Shut Down Duration upon Flip time (Period of time during which
the failed link suspends its transmission in order to inform the remote
device of the link failure): 030 sec.
4. Select a permanently active network port:
Configuration>System>Protection
GROUP ID
Port Members
>
>
(1)
(1, 2)
1. Redundancy Method
>
(1:1)
2. Recovery Mode
>
(Non Revertive)
... (0)
... (0)
>
(None)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-19
Chapter 4 Configuration
Autonegotiation:
4-20
Administrative Status:
Speed & Duplex (Data rate and duplex mode of the Ethernet port, when
the autonegotiation is disabled. Relevant for the 10/100BaseT ports
only.):
Flow Control (Data flow control method based on Ethernet Pause frames.
Relevant for the 10/100BaseT ports only.):
MDIX Auto Cross Over (Correction of connection polarity errors for the
user ports. This allows using straight or crossed cables for connecting
user Ethernet ports.)
Note
Chapter 4 Configuration
Disable the MDIX automatic cross-over function before running the physical
loopbacks on the ETX-102 user ports.
MDIX Manual Switch (User port connection type, when the MDIX
automatic cross-over function is disabled.
Fault Propagation, only for user ports (When enabled, fault propagation
mechanism disconnects the current user Ethernet interfaces, when the
network interface is down.)
OAM (802.3ah) (Controls OAM link operation for the current port as per
IEEE 802.3ah requirements):
ETX-102
Configuration>Physical Layers >Ethernet
Interface
Port Label
Ethernet Port
1. Administrative Status
2. User Name
3. Auto Negotiation
4. Speed & Duplex
5. Flow Control
6. MDIX Auto Cross Over
7. MDIX Manual Switch
8. OAM (802.3ah)
9. OAM MNG
ESC-prev.menu; !-main menu; &-exit
>
>
>
>
(RJ45)
(1)
(Network 1)
(Up)
(ETH 1)
(Disable)
(10baseT Half Duplex)
(Enable)
(Disable)
(Cross)
(Enable)
(Disable)
1 Mngr/s
4-21
Chapter 4 Configuration
ETX-102
Configuration>Physical Layers >Ethernet
Interface
Port Label
Ethernet Port
1. Administrative Status
2. User Name
3. Auto-Negotiation
4. Speed & Duplex
5. Flow Control
6. MDIX Auto Cross Over
7. MDIX Manual Switch
8. Fault Propagation
9. OAM (802.3ah)
10.OAM MNG
ESC-prev.menu; !-main menu; &-exit
>
>
>
(RJ45)
(4)
(User 2)
(Up)
... (ETH 4)
(Disable)
>
(10baseT Half Duplex)
(Enable)
(Disable)
(Cross)
(Disable)
(Enable)
(Disable)
1 Mngr/s
From the Physical Layers menu (see Figure 4-20), select Fault Propagation
WTR and select the required fault propagation WTR in the range of 03600
seconds (0 disables the WTR).
ETX-102
Configuration>Physical Layers
1. Ethernet
2. Fault Propagation WTR (sec) [0 3600]
>
...(0)
1 Mngr/s
4-22
Chapter 4 Configuration
VLAN Mode:
Configuration>Bridge
1.
2.
3.
4.
5.
6.
VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port
(Unaware)
(Filter)
...(300)
[]>
>
1 Mngr/s
Select Received Bridge Port, and choose an ETX-102 interface that this
MAC address will be attached to.
4-23
Chapter 4 Configuration
From the Static MAC Table (Figure 4-22), select a MAC address that you want
to remove and type R.
The static MAC address is deleted from the table.
ETX-102
Configuration>Configuration>Bridge>Static MAC Table
MAC Address
Received Bridge Port
1 10-00-00-00-00-00
Network
A - Add
R Remove
C - Clear Table
4-24
Chapter 4 Configuration
ETX-102
Configuration>Configuration>Bridge>Static MAC Table
1. Vlan Id[1 - 4094]
(0)
2. MAC Address
... (10-00-00-00-00-00)
3. Status
(Permanent)
4. Received Bridge Port
>
(Network)
5. Save All
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Enable (Network bridge port accepts only frames with tags of the
VLANs, which include the network port as a member.)
4-25
Chapter 4 Configuration
Note
Tag only (Network bridge port accepts only tagged frames, discarding
untagged and priority-tagged).
The Ingress Filtering and Accept Frame Type parameters are available only in
VLAN-aware mode.
Port VID (Port VID to be added by the network bridge port to untagged
and priority-tagged frames): 14094
ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
Bridge Port
(Network)
1. Ingress Filtering
>
(Enable)
(All)
... (1)
... (0)
f - forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-26
Enable (User bridge port accepts only frames with tags of the VLANs,
which include this user port as a member.)
Disable (User bridge port accepts all incoming frames)
Accept Frame Type (Specifies the frame types to be accepted by the user
bridge port)
Note
The Ingress Filtering and Accept Frame Type parameters are available only in
VLAN-aware mode.
Note
Chapter 4 Configuration
Port VID (Port VID to be added by the user bridge port to the arriving
frames): 14094
Default Priority Tag (Default priority tag to be added by the user bridge
port to untagged frames. No default priority tags are added to frames
arriving with assigned port priority): 05.
Tag Handling (Defines if user ports add port VID only to untagged or to all
arriving frames)
ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
(3)
Bridge Port
>
(User1)
1. Ingress Filtering
>
(Enable)
2. Accept Frame Type
(All)
... (0)
(None)
>
F - Forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-27
Chapter 4 Configuration
Note
Select Egress Tagged Ports to assign network and/or user ports to be the
tagged members of the current VLAN. These ports add the current VLAN
tag to all frames at egress.
4-28
Chapter 4 Configuration
4-29
Chapter 4 Configuration
ETX-102
Configuration>Bridge>VLAN Membership>Egress Tagged Ports
1. [1 - 3]... (-)
2. Save All
>
Please select item <1 to 2>
ESC-prev.menu; !-main menu; &-exit; A-add
1 Mngr/s
Configuring OAM
ETX-102 has the following capabilities for providing operation, administration,
and maintenance (OAM) in packet-switched networks:
Continuity check
Define an MD format
Specify an MD name
3. Create an EVC (Ethernet Virtual Connection), define its ID and VLAN. The EVC
must be a VLAN member of the network port.
4. Configure MA (Maintenance Association, if the OAM protocol is set to
Standard
5. Configure the MEPs (Maintenance Entity Endpoints)
Define an MD level
4-30
c.
Chapter 4 Configuration
From the End-to-End menu (Configuration > OAM > End-To-End), configure
the following:
Configuration>OAM>End-to-End
1. MD Names
>
... (01-80-C2-00-00-30)
>
1 Mngr/s
Note
4-31
Chapter 4 Configuration
ETX-102
Configuration>OAM>End-to-End>MD Names
MD ID[1 - 64]
... (2)
1. MD Format
2. MD Name
>
>
(String)
... (None)
1 Mngr/s
Note
4-32
Chapter 4 Configuration
ETX-102
Configuration>OAM>End-to-End>EVCs
EVC[1 - 64]
... (1)
1. EVC Name
2. SP VLAN[1 - 4094]
... (0)
3. Protocol Type
(Standard)
4. MAID
>
5. MEP
>
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Primary VLAN
Unsigned Int 16
ETX-102
Configuration>OAM>End-to-End>EVCs>MAID
EVC ID
1. MD ID[1 64]
MD Format
2. MA Format
3. MA Name
>
... (test)
... (Put your string here)
1 Mngr/s
4-33
Chapter 4 Configuration
From the MEP menu (Configuration > OAM > End-to-End > EVCs > MEP),
define the following:
OAM Destination Address Type (Type of the MAC address to which the
OAM messages are sent. If the multicast OAM destination address is
selected, you can define up to five remote MEPs.):
4-34
Note
Chapter 4 Configuration
When the OAM mode is set to Initiate, the continuity verification mode can be
either LB- or CC-based only. In the React OAM mode only CC-based verification is
available.
ETX-102
Configuration>OAM>End-to-End>EVCs>MEP
EVCs ID
... (1)
1. Local ID
[1-8191]
... (0)
(Unicast)
3. Remote ID
>
(1)
4. MD Level {0-7]
... (3)
5. OAM Mode
>
... (00-00-00-00-00-00)
7. Default CC Priority[0 - 7]
... (0)
8. CC Interval
>
(Initiate)
(1 Second)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-35
Chapter 4 Configuration
Performance Monitoring:
Delay Objective (Delay objective for the specified service. You can display
the total number of frames above or below defined delay objective for the
15-min or 24-hour intervals via Connection Statistics screen, see
Chapter 5).
ETX-102
Configuration> OAM>End-to-End>Services
Service[1 - 3]
... (1)
1. Performance Monitoring
(Enabled)
2. Service Priority[0 - 7]
... (0)
3. Delay Objective(msec)
... (0)
... (0)
Event Report
5. Frame Loss Ratio
>
>
>
8. Unavailability Ratio
>
>
Please select item <1 to 8>
FForward; S-Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-36
Chapter 4 Configuration
Configuration>QoS>Priority
1. Classification
>(802.1p)
2. Mapping
>
S - save
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
802.1p priority assign each priority tag, supported by IEEE 802.1p (17)
to a specific priority queue (traffic class 0 (lowest), traffic class 13)
TOS priority assign each IP ToS field value (07) to a specific priority
queue (traffic class 0 (lowest), traffic class 13)
Per port priority assign priority to the user traffic according to the
default priority of a bridge port.
4-37
Chapter 4 Configuration
ETX-102
Configuration>Configuration>QoS>Priority>Mapping (802.1p)
1. User priority 0
>(Traffic class 0)
2. User priority 1
>(Traffic class 0)
3. User priority 2
>(Traffic class 1)
4. User priority 3
>(Traffic class 1)
5. User priority 4
>(Traffic class 2)
6. User priority 5
>(Traffic class 2)
7. User priority 6
>(Traffic class 2)
8. User priority 7
>(Traffic class 3)
>
S - Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-38
Note
Chapter 4 Configuration
ETX-102
Configuration>QoS>Rate Limitation>Ingress
Port Label
> (1)
Ethernet Port
> (Network)
1. Rate Limitation
>
2. Burst Size (in kB) >
3. Limit Packet Type >
>
(2Mbps)
(12K)
(All)
F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Burst Size
12 kB
24 kB
48 kB
96 kB
1 Mbps
2 Mbps
3 Mbps
4 Mbps
5 Mbps
Rate Limit
Burst Size
12 kB
24 kB
48 kB
96 kB
20 Mbps
25 Mbps
30 Mbps
35 Mbps
40 Mbps
6 Mbps
45 Mbps
7 Mbps
50 Mbps
8 Mbps
60 Mbps
9 Mbps
71 Mbps
4-39
Chapter 4 Configuration
Rate Limit
12 kB
24 kB
48 kB
96 kB
10 Mbps
15 Mbps
Rate Limit
Burst Size
12 kB
24 kB
48 kB
96 kB
83 Mbps
90 Mbps
ETX-102
Configuration>QoS>Rate Limitation>Egress
Port Label
> (1)
Port
> (User 1)
1. Rate Limitation
>
>
(No Limit)
F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4.3
Additional Tasks
4-40
Displaying inventory
Additional Tasks
Chapter 4 Configuration
Displaying Inventory
The ETX-102 inventory displays description of the unit, its hardware revision and
power supply type.
Inventory
Id
1
2
| 3
v 4
5
6
7
Description
RAD.ETX-102.Chassis
RAD.ETX-102.Power Supply
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
RAD.ETX-102.Port
->>
Vendor Type
00
00
00
00
00
00
00
Class
3
6
10
10
10
10
10
Entity Name
ETX-102
Power Supply
Network Port 1
Network Port 2
User Port 1
User Port 2
User Port 3
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Displaying Status
The ETX-102 software provides access to the following status information:
Additional Tasks
4-41
Chapter 4 Configuration
Status Administrative status of the link (Up or Down), as set via the
Ethernet network (Figure 4-18) and Ethernet user (Figure 4-19) menus.
(00-22-F4-27-F4-68)
()
1.
2.
3.
4.
[]
>
>
>
Connection Status
Connected Managers
Event Log
Protection Status
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Admin Status
Up
Up
Up
Operation
Up
Down
Up
4-42
Additional Tasks
Chapter 4 Configuration
Terminal Type Type of the terminal used by the manager (UART, Telnet,
SSL, SSH)
Monitoring>System>Connected
Index
IP Address
1
2
158.15.163.20
3
158.15.163.30
4
158.15.163.40
R - Refresh Table
ESC-prev.menu; !-main menu;
ETX-102
Managers
Terminal Type
UART
SSH
SSL
Telnet
User Name
su
su
user
user
&-exit; ?-help
Monitoring>System>Protection Status
GROUP ID
> (1)
Port Members
> (1, 2)
Active Port
(1)
Additional Tasks
4-43
Chapter 4 Configuration
Actual Speed & Duplex Current data rate and duplex mode of the link
ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port
Port Type
Administrative Status
Operational Status
Actual Speed & Duplex
Actual Flow Control
>
>
>
>
(1)
(Network 1)
(100FX SFP Not Install)
(Down)
(Not Present)
(100Mbps - Full Duplex)
(Disable)
>
F - Forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-44
Additional Tasks
Note
Chapter 4 Configuration
When managing ETX-102 via SNMP, increase the NMS timeout period to ensure
correct retrieval of the SFP status information.
To display the SFP link status information:
From the Link Status screen (Monitoring > Physical Layer > SFP > Link Status),
type f or b to toggle between the available user or network ports.
The Link Status screen includes the following information:
Manufacturers name
Wavelength
Fiber type.
ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port
(1)
(Network 1)
Connector Type
Manufacturer Name
Manufacturer PN
Typical Max. Range
Wave Length
Fiber Type
>
F - Forward
ESC-prev.menu; !-main
...
>
>
(SC)
(RAD)
(1234)
(20km)
(1310nm)
(MM)
menu; &-exit
1 Mngr/s
SFP transmit optical power (-40 dBm to + 8.2 dBm at 0.1 dBm resolution)
SFP receive optical power (-40 dBm to + 8.2 dBm at 0.1 dBm resolution)
2. Select History to display the minimum and maximum values recorded for each
optical parameter.
Additional Tasks
4-45
Chapter 4 Configuration
ETX-102
Monitoring>Physical Layers>Ethernet Status
Port Label
Ethernet Port
(1)
(Network 1)
TX Optical Power
LASER Bias
LASER Temp
Rx Optical Power
Supply Voltage
History
...
...
...
...
...
[]
(-6.1 dBm)
(1.7 mA)
(33 C/ 93 F)
(-23.5 dBm)
(3.31 V)
1.
>
F - Forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Monitoring>OAM>End-to-End>Status
EVC ID
EVC SP VLAN[1 - 4094]
EVC Status
1. EVC[1 - 64]
...
...
>
...
(EVC1)
(1)
(Not Applicable)
(1)
1 Mngr/s
4-46
Additional Tasks
Chapter 4 Configuration
Vars Retrieval
Link Events
Loopback
Unidirectional
OAM Mode.
ETX-102
Monitoring> OAM> Link (802.3ah)>Status
Port Label
Ethernet Port
> (1)
> (Network 1)
> (Active)
> (Passive Wait)
> (0)
(00-00-00-00-00-00)
Remote Capabilities
Vars Retrieval
Link Events
Loopback
Unidirectional
Remote OAM mode
>
>
>
>
>
(Supported)
(Supported)
(Supported)
(Supported)
(Active)
F- Forward
ESC-prev.menu; !-main menu; &-exit; ?-help
Additional Tasks
4-47
Chapter 4 Configuration
VLAN A VLAN the current MAC address belongs to (VLAN-aware mode only).
Table
Status
Static
Learned
Bridge Port
Network
User1
VLAN
5
7
4-48
VLAN ID
Additional Tasks
Chapter 4 Configuration
ETX-102
Monitoring>Bridge>VLAN Table
Network Port User Port 1 User Port 2
VLAN 1
tag
VLAN 1024
untag
User Port 3
User Port 4
tag
Configuration>System>Date/Time
1.
2.
3.
4.
5.
6.
Time <HH:MM:SS>
Date <YYYY-MM-DD>
NTP Mode
NTP Server IP Address
GMT (+/- XX)
NTP Update Interval (Min)[1 1440]
... (09:12:06)
... (2004-01-18)
>
(Unicast Client)
... (0.0.0.0)
>
(0)
... (1)
>
Please select item <1 to 2>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Additional Tasks
4-49
Chapter 4 Configuration
Select Permission, and specify the users access rights (full control or
read-only).
Select Access, and specify the users access methods (ASCII terminal,
Telnet, Web browser, Telnet and Web browser, or all of them).
Select Confirm and re-enter the new user password to confirm it.
ETX-102
Configuration>System>Management>Management access>User access
1.
2.
3.
4.
5.
6.
User name
Permission
Access
su password
New password
Confirm New Password
...
>
>
...
...
...
(su)
(Full Control)
(All)
()
()
()
>
Please select item <1 to 6>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-50
Additional Tasks
Chapter 4 Configuration
From the Syslog menu (Configuration > System > Syslog), configure the
following:
Note
Server IP Address (IP address of the Syslog server to which the event logs
are sent): 0.0.0.0255.255.255.255
Server UDP Port (The UDP port of the Syslog server): 165535
Device UDP Port (The local UDP port from which the Syslog messages are
sent: 165535
The UDP port values cannot be changed when the logging status is enabled.
Facility (The software module, task or function from which the Syslog
messages are sent): Local 17
Severity Level (Only events with the severity which equals or exceeds the
selected severity level are sent):
Configuration>System>Syslog
1. Device logging status
> (Disable)
> (514)
3. Facility
> (Local 1)
4. Severity level
> (Major)
5. Server Parameters
>
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Additional Tasks
4-51
Chapter 4 Configuration
From the Server Parameters menu (Configuration > System > Syslog > Server
Parameters), configure the following:
Configuration>System>Syslog>Server Parameters
1. Server Sequence Number
2. Server Access
3. Server IP Address
...
>
...
(1)
(Disable)
(0.0.0.0)
...
(514)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-52
Additional Tasks
Chapter 4 Configuration
Additional Tasks
4-53
Chapter 4 Configuration
ETX-102
Utilities>File Utilities>S/W & File Transfer using TFTP
1.
2.
3.
4.
5.
6.
File name
Command
Server IP
Retry Timeout(sec)[0 - 1000]
Total Timeout(sec)[0 - 1000]
View Transfer Status
...
>
...
...
...
>
(FILE.IMG)
(No Operation)
(0.0.0.0)
(1)
(5)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Resetting ETX-102
ETX-102 supports two types of reset:
4-54
Additional Tasks
Chapter 4 Configuration
1 Mngr/s
To reset ETX-102:
1. From the Utilities menu (Main menu>Utilities), select Reset.
The following confirmation message appears: System will be reset.
Continue??? (Y/N)
2. Type Y to confirm the reset.
Additional Tasks
4-55
Chapter 4 Configuration
4-56
Additional Tasks
Chapter 5
Diagnostics and
Troubleshooting
This chapter describes how to:
Monitor performance
5.1
Monitoring Performance
Service Counters (Total OAM statistics collected since the service was
enabled)
3. Selected OAM statistic screen is displayed (see Figure 5-1 and Figure 5-2).
Table 5-1 and Table 5-2 explain the OAM statistic parameters.
4. Type f or b to select an EVC.
5. Type Ctrl + f or Ctrl + b to select an interval (196).
Note
Monitoring Performance
5-1
ETX-102
Monitoring>OAM>End-To-End>Statistics>15 Min. Intervals
Frames Above Delay Obj....
Frames Below Delay Obj....
Frames Above DV Obj.
...
Frames Below DV Obj.
...
Frames Transmitted
...
Frames Loss
...
Unavailable Seconds
...
1. Interval
2. EVC
3. Service
(0)
(0)
(0)
(0)
(101902)
(0)
(101899)
Elapsed Time
... (102767)
... (0.0)
... (0.0)
... (0.0)
Avg. DV
Max. DV
... (0.0)
... (0.0)
... (0)
... (1)
... (1)
>
Please select item <1 to 3>
F - Forward(EVC); B - Backward(EVC); ^F - Forward(Int.); ^B - Backward(Int.)
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Description
Frames Transmitted
Frames Lost
Unavailable Seconds
Number of seconds during which the service was unavailable in the current
interval
Elapsed Time
Min. RT Delay
Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Avg. RT Delay
Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Max. RT Delay
Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)
Avg. DV
Max. DV
5-2
Monitoring Performance
ETX-102
Monitoring>OAM>End-To-End>Statistics>Service Counters
EVC
... (1)
Service
... (1)
OAM transmitted frames counter...
OAM Frames lost counter
...
OAM Frame loss ratio(*E-10)
...
Elapsed time
...
Unavailable seconds
...
Unavailability ratio(*E-10)
...
(2087328632)
(0
(0)
(1487)
(0)
(0)
>
F - Forward(EVC); B - Backward(EVC)
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Description
Total number of OAM frames lost since the service was enabled
Elapsed Time
Unavailable Seconds
Unavailability Ratio
Monitoring Performance
5-3
ETX-102
Monitoring>Physical Layers>Ethernet Statistics
Port Label
Ethernet Port
|
v Counter
Total Frames
Total Octets
Correct Frames
FCS Errors
Jabber Errors
Fragments Errors
Undersized Frames
Oversizes Frames
Discard Frames
Collisions
Errors
(1)
(Network 1)
--- RX --(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
--- TX --(0)
(0)
(0)
(0)
(0)
(0)
1 Mngr/s
--- RX --(0)
(0)
(0)
--- TX --(0)
(0)
(0)
In
64
In
65- 127
In 128- 255
In 256- 511
In 512-1023
In 1024-long
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
Octets
Octets
Octets
Octets
Octets
Octets
1 Mngr/s
5-4
Monitoring Performance
Description
RX
Total Frames
Total Octets
Correct Frames
FCS Errors
Jabber Errors
Fragments Errors
Total number of frames, which are less than 64 octets in length (excluding framing
bits, but including FCS octets) and had either a bad Frame Check Sequence (FCS)
with an integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (alignment error)
Undersized Frames
Total number of received short frames with size under 64 bytes and with valid CRC
Oversized Frames
Total number of received long frames with size over 1518 bytes and with valid CRC
Discard Frames
Total number of frames that were discarded even though no errors had been
detected
Unicast Frames
Multicast Frames
Broadcast Frames
In 64 Octets
In 65-127 Octets
In 128-255 Octets
In 256-511 Octets
In 512-1023 Octets
In 1024-long Octets
TX
Total Frames
Total Octets
Correct Frames
Collisions
Discards
Errors
Unicast Frames
Multicast Frames
Broadcast Frames
In 64 Octets
In 65-127 Octets
Monitoring Performance
5-5
Parameter
Description
In 128-255 Octets
In 256-511 Octets
In 512-1023 Octets
In 1024-long Octets
5.2
ETX-102 maintains a log file that can hold up to 100 events (system messages).
All events are time-stamped.
Displaying Events
ETX-102
Monitoring>System>Event Log>Read Log File
|
v
1
2
3
4
5
6
7
8
Log Entry
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
2005-03-16
19:50:08
19:22:32
19:22:13
19:22:12
19:22:12
19:22:12
19:22:12
19:22:11
PORT
PORT
PORT
PORT
PORT
5
4
3
2
1
>
^D - Scroll Down , ^U - Scroll Up
ESC-prev.menu; !-main menu; &-exit; ?-help
1 Mngr/s
5-6
Dropped Frames
Undersize Frames
Oversize Frames
Fragmented Frames
Jabbers
Port Label (Switch port on which the current RMON instance is active):
None, Port 16
Rising Alarm Threshold (The report is sent if the selected counter has
been above the rising threshold for ten consecutive seconds): 160
Falling Alarm Threshold (The report is sent if the selected counter has
been below the falling threshold for ten consecutive seconds): 160
Sampling Interval (Period of time in seconds during which the data is
sampled and compared with the rising and falling thresholds):
160 seconds
Event Type (Method of event reporting):
Log and Trap (Reports are recorded as events in the event log and
sent as SNMP traps).
Refer to Table 5-4 for the description of the events recorded in the event
log when a counter exceeds or drops below the set threshold.
5-7
ETX-102
Configuration>System>Management>Alarm Threshold Configuration
1. Alarm Description
>
(Dropped Frames)
2. Port Label
>
(None)
... (0)
... (0)
... (0)
6. Event Type
>
(None)
>
Please select item <1 to 6>
A - Add New RMON ; S - Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Rising Threshold (The report is sent if the selected counter has been
above the rising threshold for ten consecutive seconds)
Note
5-8
1E-3, 1E-4, 1E-5, 1E-6, 1E-7, 1E-8, 1E-9, 1E-10 for Frame Loss Ratio
and Unavailability Ratio
Falling Threshold (The report is sent if the selected counter has been
below the falling threshold for ten consecutive seconds):
Sampling interval configuration is not available for the Frame Loss Ratio and
Unavailability Ratio counters.
Log and Trap (Reports are recorded as events in the event log and
sent as SNMP traps).
Refer to Table 5-4 for the description of the events recorded in the event
log when a counter exceeds or drops below the set threshold.
Clearing Events
Table 5-4 presents the event types that appear in the event log.
Table 5-4. Event List
Event
Description
COLD START
FATAL ERROR XX
LINK DOWN (PORT 1 \ PORT 2 Network or user Ethernet port has been disconnected
\ PORT 3)
LINK UP PORT (PORT 1 \
PORT 2 \ PORT 3)
Invalid user name or password was detected during initialization of Telnet, Web
or terminal control session
IP X.X.X.X ASSIGNED BY
SERVER X.X.X.X
IP X.X.X.X IS RELEASED
CONNECTIVITY MISMATCH EVC No EVC ID or MEP ID mismatch has been detected on EVC X
X OFF
CONNECTIVITY MISMATCH EVC EVC ID or MEP ID mismatch has been detected on EVC X
X ON
5-9
Description
DROPPED FRAMES EXCEEDED Number of dropped frames exceeded configured threshold on port X
PORT X
DROPPED FRAMES DROPPED
BELOW PORT X
UNDERSIZED FRAMES
EXCEEDED PORT X
UNDERSIZED FRAMES
DROPPED BELOW PORT X
OVERSIZED FRAMES
EXCEEDED PORT X
OVERSIZED FRAMES DROPPED Number of oversized frames dropped below configured threshold on port X
BELOW PORT X
FRAGMENTED FRAMES
EXCEEDED PORT X
FRAGMENTED FRAMES
DROPPED BELOW PORT X
Frames above delay variation exceeded configured threshold for service Y on EVC
X
Dying gasp indication has been received from the remote partner on OAM link on
port X
5-10
Event
Description
OAM (802.3ah)
CONNECTIVITY FAIL PORT X
ON
OAM (802.3ah)
CONNECTIVITY FAIL PORT X
OFF
OAM (802.3ah) REMOTE LINK Indication of the OAM connectivity failure has been received from the remote
FAIL PORT X ON
partner on OAM link on port X
OAM (802.3ah) REMOTE LINK Indication of the OAM connectivity recovery has been received from the remote
FAIL PORT X OFF
partner on OAM link on port X
OAM (802.3ah) REMOTE
Indication of the critical errors has been received from the remote partner on
CRITICAL ERRORS PORT X ON OAM link on port X
OAM (802.3ah) REMOTE
Indication of the critical error termination has been received from the remote
CRITICAL ERRORS PORT X OFF partner on OAM link on port X
OAM (802.3ah) REMOTE
LOOPBACK PORT X ON
Indication of the remote loopback activation has been received from the remote
partner on OAM link on port X
Indication of the remote loopback deactivation has been received from the
remote partner on OAM link on port X
Description
OID
Maskable
coldStart
1.3.6.1.6.3.1.1.5.1
No
authenticationFailure
1.3.6.1.6.3.1.1.5.5
No
linkDown
1.3.6.1.6.3.1.1.5.3
Yes
linkUp
1.3.6.1.6.3.1.1.5.4
Yes
tftpStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.1
No
agnStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.2
No
agnPowerFailureTrap
1.3.6.1.4.1.164.6.1.0.13
No
successfulLogin
1.3.6.1.4.1.164.6.1.0.24
Yes
failedLogin
1.3.6.1.4.1.164.6.1.0.25
Yes
prtStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.3
No
5-11
Note
ETX-102
Configuration>System>Management>Alarm trap mask
Active alarm traps:
>
... (1)
2. Trap status
>
? - Help
ESC-prev.menu; !-main menu; &-exit
(1, 2, 3)
(Active)
1 Mngr/s
5-12
From the Management menu (Configuration > System > Management), select
Traps Delay and define a period of time between completing the power-up
procedure and sending the first trap to the NMS: 0100 seconds.
ETX-102
Configuration>System>Management
1. Device Info
>
2. SNMPv3
>
3. Host
>
4. Manager List
[]>
5. Management Access
>
>
>
...
(Disable)
(0)
>
? - Help
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
5.3
To ping an IP host:
1. From the Main menu, select Diagnostics.
The Diagnostics menu appears.
2. From the Diagnostics menu, select Ping.
The Ping menu appears (see Figure 5-9).
3. From the Ping menu, configure the following:
Destination IP Address (IP address of the host that you intend to ping):
0.0.0.0 to 255.255.255.255.
5-13
ETX-102
Diagnostics>Ping
1.
2.
3.
4.
Destination IP Address
Number of Frames to Send[0 - 50]
Send Ping
Stop Ping
... (0.0.0.0)
... (1)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
To trace a route:
1. From the Diagnostics menu, select Trace Route.
The Trace Route menu is displayed (see Figure 5-10).
2. From the Trace Route menu, select Destination IP Address and enter an IP
address of the host to which you intend to trace route.
3. Select Display Trace Route to start tracing.
ETX-102 starts tracing the route, displaying the IP addresses of all hop
nodes.
4. Select Stop Trace Route to stop the tracing.
ETX-102
Diagnostics>Trace Route
1. Destination IP Address
2. Display Trace Route
3. Stop Trace Route
... (0.0.0.0)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Running Loopbacks
ETX-102 supports two loopback types:
5-14
Regular loopback run at the PHY of the bridge ports. When the loopback is
active the data forwarded to a bridge port is looped from the Tx path to the
Rx path.
MAC Swap loopback which supports exchanging source and destination MAC
addresses of the incoming packets. The user can define loopback direction
(ingress or egress) and type of data to be looped back (all data except for
packets with management VLAN tag or only packets with a specific VLAN tag).
Note
Notes
All Except MNG All packets, excluding the ones with management
VLAN tag, are looped back. The management traffic remains intact.
Specific VLAN Only packets with specific VLAN tag are looped back.
Stack.
All Except MNG mode is not available for the user ports.
Note
VLAN ID (Specifies VLAN value for the Specific VLAN mode): 14094
5-15
Network
Interface
User
Interface
ETX-102
Network
Interface
User
Interface
ETX-102
Note
5-16
When the Tag Handling is set to Stack: Specific VLAN local and
specific VLAN remote loopbacks on user ports, specific VLAN local
loopback on network port
When the VLAN mode is set to VLAN-aware: Specific VLAN remote
loopback on network port, specific VLAN local loopback on user ports
When the VLAN mode is set to VLAN-unaware and Host Tagging to
Untagged: specific VLAN local loopback on user ports
ETX-102
Diagnostics>Loopbacks
Port Label
(1)
Port
(Network)
1. MAC Swap
2. Looped Data
3. VLAN ID [1 - 4095]
4. Direction
5. Forced Source Mac
6. Forced Destination Mac
7. Loopback Timeout (sec) [0-3600]
8. State
>
F - Forward
S - Save
ESC-prev.menu; !-main menu; &-exit
(Enable)
(Specific VLAN)
(1)
(Remote)
... (00-00-00-00-00-00)
... (00-00-00-00-00-00)
... (0)
(Disable)
1 Mngr/s
Fail The CAT5 cable pair has a non-compliant termination i.e. less
than 85 or greater than 115.
Normal The CAT5 cable pair is normal and has a termination between
the IEEE specified limits of 85 to 115
Short to Pair A/B/C/D The CAT5 cable pair is shorted to pair A/B/C/D
5-17
Coupled with Pair A/B/C/D The CAT5 cable pair has abnormal
coupling with pair A/B/C/D i.e. the impedance between the pairs is
between 40 and 200.
Diagnostics>VCT Test
Port Label
>
(3)
Port
>
(User 2)
>
(Normal)
... (0 m)
>
... (0 m)
>
... (0 m)
>
... (0 m)
1. Start Test
(Normal)
(Normal)
(Normal)
(No Op)
>
F - Forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
5-18
Note
VLAN test cannot be run on network port 2 or management VLAN (ID of the
Diagnostics>VLAN Test
Rx Octets
Tx Octets
Rx Frames
Tx Frames
(0)
(0)
(0)
(0)
(1)
(Network 1)
(Enable)
>
F - Forward
C - Clear counters
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
5.4
Q: What is the flip time from the main link to the backup link when link
redundancy is enabled?
A: For ETX-102 with two fiber uplinks the flip time is below 50 ms. For ETX-102
with two copper network links, the flip time is 400700 ms.
Technical Support
5-19
5.5
Technical Support
Technical support for this product can be obtained from the local partner from
whom it was purchased.
RADcare Global Professional Services offers a wide variety of service, support and
training options, including expert consulting and troubleshooting assistance,
online tools, regular training programs, and various equipment coverage options.
For further information, please contact the RAD partner nearest you or one of
RAD's offices worldwide.
RAD Data Communications would like your help in improving its product
documentation. Please send us an e-mail with your comments.
Thank you for your assistance!
5-20
Technical Support
Chapter 6
Software Upgrade
This chapter explains how to upgrade ETX-102 to version 3.8.
Software upgrade is required to fix product limitations, enable new features, or
to make the unit compatible with other devices that are already running the new
software version.
The information in this chapter includes the following:
6.1
Compatibility Requirements
Following are the software releases that can be upgraded to version 3.8 or
higher, as well as the hardware revisions that can accept the software version
3.8.
6.2
Impact
6.3
Application software can be downloaded to ETX-102 the File Utilities menu using
TFTP, or via the Boot menu, using XMODEM or TFTP.
6-1
6.4
Prerequisites
This section lists the software file names and outlines system requirements
needed for the upgrade procedure.
Software Files
The version 3.8 release is distributed as a software file named ETX-102 3.8.img.
The file can be obtained from the local RAD business partner from whom the
device was purchased.
System Requirements
Before starting the upgrade, verify that you have the following:
Operational ETX-102 unit with valid IP parameters configured for the host
6.5
The recommended software downloading method is to use the S/W & File
Transfer using TFTP option in the File Utilities menu.
Network administrators can use this procedure to distribute new software
releases to all the managed ETX-102 units in the network from a central location.
6-2
Use the following procedure to download software release 3.8 to ETX-102 via the
File Utilities menu.
1. Verify that ETX-102 3.8.img is stored on the PC with the TFTP server
application.
2. Verify that the ETX-102 host has valid IP parameters.
3. Ping the PC to verify the connection.
4. Activate the TFTP server application.
5. Download ETX-102 3.8.img from the PC to ETX-102.
Note
Configuration>System>Host IP
1. IP address
... (192.168.10.2)
2. IP mask
... (255.255.255.0)
3. Default gateway
... (192.168.10.3)
4. DHCP
(Disable)
5. Default IP
... (0.0.0.0
>
Please select item <1 to 5>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
6-3
ETX-102
Configuration>System>Management>Host>Encapsulation
1.
2.
3.
4.
Host Tagging
Host VLAN ID [1 - 4094]
Host VLAN Priority [0 - 7]
Security Definition
(Tagged)
... (300)
... (7)
(All)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Pinging the PC
Check the integrity of the communication link between ETX-102 and the PC by
sending a ping from the unit to the PC.
Diagnostics>Ping
1.
2.
3.
4.
Destination IP Address
Number of Frames to Send[0 - 50]
Send Ping
Stop Ping
... (192.168.10.20)
... (1)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
6-4
6-5
Note
6-6
2. Command
>
3. Server IP
... (192.168.10.20)
... (1)
... (5)
>
>
ESC-prev.menu; !-main menu; &-exit
(Software Download)
1 Mngr/s
6.6
Software downloading can also be performed using the Boot menu. The Boot
menu can be reached while ETX-102 performs initialization, for example, after
power-up.
You may need to start the loading from the Boot menu when it is not possible to
activate TFTP from the S/W & File Transfer using TFTP menu (for example,
because the ETX-102 software has not yet been downloaded or is corrupted).
Caution The Boot menu procedures are recommended only for use by authorized
personnel, because this menu provides many additional options that are intended
for use only by technical support personnel.
Two software downloading options are available from the Boot menu:
6-7
Note
If you miss the timing, ETX-102 performs a regular reboot process (this process
starts with Loading and ends with a message to press <Enter> a few times to
display the log in screen).
6-8
Select Transfer in the HyperTerminal menu bar, and then select Send File
on the Transfer menu.
The Send File window is displayed:
Select the prescribed ETX-102 software file name (you can use the
Browse function to find it).
In the Protocol field, select Xmodem.
Note
Loading ...
Decompressing to RAM.
Processing archive: FLASH
Extracting ETX-102.BIN
..........................................................
.................................................................... CRC OK
Running ...
*******************************************************************
* In order to start working - press the ENTER button for few times*
*******************************************************************
6. At this stage, press the <Enter> key several times to go to the login screen.
ETX-102 Ver. 3.8
6-9
Using TFTP
Use the following procedure to download software release 3.8 to ETX-102 via
TFTP.
1. Verify that ETX-102 3.8.img is stored on the PC with the TFTP server
application.
2. Define IP parameters via the Boot Manager menu.
3. Activate the TFTP server application.
Note
Configure the connection timeout of the TFTP server to be more than 30 seconds
to prevent an automatic disconnection during the backup partition deletion
(about 25 seconds).
4. Download ETX-102 3.8.img from the PC to ETX-102.
6-10
2. Enter the name of the desired software distribution file (make sure to include
the path, when necessary). When done, press <Enter> to continue.
Please Enter the Server IP address message is displayed.
3. Enter the IP address of the server on which the software distribution file
resides and then <Enter> to continue.
If no errors are detected, ETX-102 automatically erases the backup
partition (it takes about 25 seconds), and the downloading process
starts. Once the downloading is completed, ETX-102 saves the new
release as the active image, and the former active image becomes the
backup.
4. After the transfer is successfully completed, return to the Boot menu and
select Exit Boot-Manager.
When the ETX-102 initialization is ended, the unit loads the new
software.
Note
6.7
To verify that the upgrade was successful, use the Terminal application and log
on to ETX-102 via HyperTerminal to view the Inventory screen (Main Menu >
Inventory), indicating the active software version in the SW Rev column.
6-11
6-12
Chapter 7
Application Tutorial
This chapter provides detailed instructions for setting up a typical application
using two ETX-102 units.
7.1
7-1
Configuration Sequence
There are four basic configuration steps that need to be followed when deploying
ETX-102 units. Configure:
1. System parameters (setting host IP, defining network managers, configuring
management VLAN)
2. Network and user interfaces at the physical layer (if necessary)
3. The internal bridge (bridge mode, port VIDs)
4. QoS (priority and rate limitation).
Host IP
Manager IP
ETX-102 (A)
192.168.10.2
192.168.10.100
7, 7
ETX-102 (B)
192.168.10.1
192.168.10.100
7, 7
Allocated Rate
SPVLAN
Priority Queue
5 Mbps
Priority 2
Priority data
10 Mbps
Priority 1
40 Mbps
Priority 0
7-2
ETX-102
Configuration>System>Host
1. IP address
2. IP mask
3. Default gateway
4. DHCP
5. Default IP
... (192.168.10.2)
... (255.255.255.0)
... (0.0.0.0)
(Disable)
... (0.0.0.0)
>
Please select item <1 to 5>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
ETX-102
Configuration>System>Management>Host>Encapsulation
1. Host Tagging
(Tagged)
2. Host VLAN ID [1 - 4094]
... (7)
3. Host VLAN Priority [0 - 7]
... (7)
4. Security Definition
(All)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
7-3
ETX-102
Configuration>System> Management > Manager List
Manager ID
(1)
1. IP Address
... (192.168.10.100)
2. Trap Mask
... (Disable)
3. SNMP Traps UDP Port
... (162)
4. Save All
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Display the Ethernet menu (Configuration > Physical Ports > Ethernet), and
configure the following parameters according to your application
requirements:
Autonegotiation
Maximum advertised capability
Speed and duplex mode
Flow control
Fault propagation.
7-4
Display the Bridge menu (Configuration > Bridge), and set the VLAN mode to
Unaware.
ETX-102
Configuration>Bridge
1.
2.
3.
4.
5.
6.
7.
VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership
(Unaware)
(Transparent)
...(300)
[]>
>
>
1 Mngr/s
Display the Bridge Port menu (Configuration > Bridge > Bridge Port), and
perform the following:
1. Type f to select User1 (user port 1).
2. Set Port VID\Stacking VID to 4
3. Set Default Priority Tag to 2
4. Set Tag Handling to Stack.
5. Repeat steps 14 for user ports 2 and 3, selecting the following values:
ETX-102
Configuration>Configuration>Bridge>Bridge Port
Bridge Port
(User1)
1. Ingress Filtering
>
(Enable)
(All)
... (2)
(Stack)
>
f - forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
7-5
Configuring QoS
It is necessary to select priority type and ingress rate limit for all user ports.
Display the Priority menu (Configuration > QoS > Priority), and set the
Classification to Port Default Priority. In this case the use traffic coming from
the different port is to prioritized according to the default priority tag setting
(see Configuring the Bridge User Ports above).
ETX-102
Configuration>QoS>Priority
1. Classification
2. Mapping
>
S - save
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
>(Traffic class 0)
2. User priority 1
>(Traffic class 0)
3. User priority 2
>(Traffic class 1)
4. User priority 3
>(Traffic class 1)
5. User priority 4
>(Traffic class 2)
6. User priority 5
>(Traffic class 2)
7. User priority 6
>(Traffic class 2)
8. User priority 7
>(Traffic class 2)
>
S - Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
7-6
Display the Port Rate Limitation menu (Configuration > QoS > Rate Limitation
> Ingress), and perform the following:
ETX-102
Configuration>QoS>Rate Limitation>Ingress
Port Label
> (1)
Port
> (User1)
1. Rate Limitation
> (5 Mbps)
> (96)
> (All)
F - Forward
S Save
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
7.2
ETX-102 (A):
When receiving untagged user data from its user ports 1 and 2, it adds
two different VIDs to the data streams
Sends the user data to the remote ETX-102 (B) and ETX-102 (C) via its
network interface
When receiving tagged data from the remote ETX-102 (B) and ETX-102
(C), it strips the VID tags and forwards the untagged data to the user
equipment via its user ports 1 and 2.
7-7
Configuration Sequence
There are four basic configuration steps that need to be followed when deploying
ETX-102 units. Configure:
1. System parameters (setting host IP, defining network managers, configuring
management VLAN)
2. Network and user interfaces at the physical layer (if necessary)
3. The internal bridge (bridge mode, port VID)
4. VLAN membership.
Host IP
Manager IP
ETX-102 (A)
192.168.10.2
192.168.10.100
7, 7
ETX-102 (B)
192.168.10.1
192.168.10.100
7, 7
ETX-102 (C)
192.168.10.3
192.168.10.100
7, 7
7-8
Device
Port
Port VID
ETX-102 (A)
User 1
10
ETX-102 (A)
User 2
20
ETX-102 (B)
User 1
10
ETX-102 (C)
User 2
20
VLAN
ETX-102 (A)
10
1 (network)
2 (user 1)
ETX-102 (A)
20
1 (network)
3 (user 2)
ETX-102 (B)
10
1 (network)
2 (user 1)
ETX-102 (C)
20
1 (network)
3 (user 2)
Display the Bridge menu (Configuration > Bridge), and set the following:
VLAN Mode Aware
Forwarding Mode Filter.
ETX-102
Configuration>Bridge
1.
2.
3.
4.
5.
6.
7.
VLAN Mode
Forwarding Mode
Aging Time[300 - 4080]
Static MAC Table
Erase MAC Table
Bridge Port
VLAN Membership
(Aware)
(Filter)
...(300)
[]>
>
>
1 Mngr/s
7-9
Display the Bridge Port menu (Configuration > Bridge > Bridge Port), and
perform the following:
Type f to select the ETX-102 (A) user port 1 (User1).
Set Port VID\Stacking VID to 10.
Repeat steps 12 for ETX-102 (A) user port 2, setting its VID to 10.
Repeat steps 12 for ETX-102 (B) user port 1, setting its VID to 10.
Repeat steps 12 for ETX-102 (C) user port 2, setting its VID to 20.
ETX-102
Configuration>Configuration>Bridge>Bridge Port
Port Label
(2)
Bridge Port
(User1)
1. Ingress Filtering
>
(Enable)
(All)
... (0)
5. Tag Handling
(None)
>
f - forward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
7-10
ETX-102
Configuration>Bridge>Vlan Membership
Vlan Id[1 - 4094]
... (10)
1. Egress Tagged Ports
>
(-)
2. Egress Untagged Ports >
(-)
>
Please select item <1 to 2>
a add new VLAN; f - forward; b - backward
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
1 Mngr/s
7-11
7-12
Appendix A
Connector Wiring
A.1
Ethernet Connectors
A.2
Pin
Function
Rx+
Rx
Tx+
4, 5
Tx
7, 8
CONTROL Connector
Pin
Function
CONTROL Connector
A-1
A-2
CONTROL Connector
Appendix B
Operation,
Administration, and
Maintenance (OAM)
B.1
Introduction
Continuity check
Table B-1 lists the Ethernet OAM-related terms used in the appendix.
Table B-1. Ethernet OAM Terminology
Term
Description
UNI
UNI_C
UNI_N
Service frame
Flow
Point-to-point Flow
Introduction
B-1
Term
Description
Multipoint-to-Multipoint
Flow
Service Instance
Identifier (CoS ID)
MEP
MIP
B.2
Reference Architecture
B-2
Reference Architecture
B.3
OAM Entities
This section describes the OAM entities hierarchy. Figure B-2 illustrates the
relationship between UNI, flow and Service Instance (COS ID), when one or more
service instances belong to one flow and one or more flow belong to a UNI. From
the OAM perspective, the continuity messages and defects are activated per flow,
and the PM is activated per service instance.
Note
In the one flow per UNI case (Figure B-3), the PM and CC are transmitted
once.
OAM Entities
B-3
In case of multiple flows per UNI (Figure B-4), PM and CC are transmitted
three times.
In case of one flow and multiple CoS (Service Instances) per UNI (Figure B-5),
the PM is transmitted three times and the CC once.
Figure B-5. One Flow and Multiple CoS (Service Instances) per UNI
B.4
OAM Flows
Figure B-6 illustrates a typical OAM traffic flow. The OAM message is transmitted
from the source MEP 1 to the destination MEP 2 and the reply is transmitted back
The source is also a destination for messages from the other direction.
The OAM interval is one second, so each NTU transmits one request and one
reply and receive one request and one reply. Total of four messages are
transmitted per second per service instance.
OAM Message
Request
MEP 1
Source
MEP 2
OAM Message
Reply
Destination
OAM Flows
used in cases where the MAC address of the destination MEP is not known.
ETX-102 supports only point-to-point flows.
Flow Association
When an OAM frame is associated with a flow, the following steps are performed:
Service Association
When an OAM frame is associated with a service, the following steps are
performed:
OAM Flows
B-5
Major failures (link failure, device failure, network path failure etc)
The ETH-CC signal is generated by one MEP. Upon receipt of the first ETH-CC
signal from a sending MEP, the receiving MEP detects continuity with sending MEP
and expects to receive further periodic ETH-CC signals. Once the receiving MEP
stops receiving periodic ETH-CC signals from sending MEP, it declares continuity
failure. The MEP that detects the continuity failure notifies the operator by
sending an alarm or a trap.
OAM Procedures
This section discusses the continuity check (CC) and the performance
measurement (PM) procedures.
ETH-LB Method
The ETH-LB method includes the following elements:
B-6
OAM Flows
The Flow and MEP ID are processed as follows: if the Flow/MEP ID do not
exist in the device, it changes them to No Match otherwise they are left
intact.
Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-LB mechanism.
ETH-CC Method
The ETH-CC method includes the following elements:
ETH-CC transmission
Unicast ETH-CC request message is transmitted by a MEP (ETX-102) every
1 second. The transmitted Transaction Identifier is retained for at least
5 seconds after the unicast ETH-CC signal is transmitted. The Transaction
Identifier must be changed for every Unicast ETH-CC message, and no
OAM Flows
B-7
Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-CC mechanism.
Performance Measurement
ETX-102 measures performance in 15-minute intervals. It also stores
performance history data from the last 24 hours (96 intervals). Table B-2 lists the
PM counters supported by ETX-102.
Description
B-8
OAM Flows
Parameter
Description
Frames Transmitted
Frames Lost
Unavailable Seconds
Number of seconds during which the service was unavailable in the current
interval
Elapsed Time
Min. RT Delay
Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Avg. RT Delay
Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Max. RT Delay
Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)
Avg. DV
Max. DV
Total number of OAM frames transmitted since the service was enabled
Total number of OAM frames lost since the service was enabled
Elapsed Time
Unavailable Seconds
Unavailability Ratio
B.5
RMON Counters
Unavailability Ratio.
RMON Counters
B-9
B-10
RMON Counters
Supplement
AC/DC Adapter
(AD) Plug
for DC Power Supply Connection
Note
Prepare all connections to the AD plug before inserting it into the units power
connector.
Warning
Supplement
Terminal Block
Connector
for DC Power Supply Connection
Note
Caution
Prepare all connections to the TB plug before inserting it into the units VDC-IN
connector.
Reversing the wire voltage polarity can cause damage to the unit!
Warning
2. If the units VDC-IN connector is type B, lift the locking latch (see Figure 1).
5
Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.
Supplement
2
101.6 mm (4 in)
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com
www.rad.com