P. 1
106890491 IP 10G BASIC Course Handbook v3 1

106890491 IP 10G BASIC Course Handbook v3 1

|Views: 44|Likes:
Published by Serge Zykov

More info:

Published by: Serge Zykov on Feb 27, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/05/2013

pdf

text

original

Sections

  • General
  • Getting Started
  • Managing the License

IP-10G Basic Course

Visit our Customer Training Portal at Training.Ceragon.Com or contact us at training@ceragon.com

Trainee Name:

 

Ceragon Training Agenda

Product: IP-10 G Course: Basic Operation and Maintenance Duration: 2 days (Theory + Practice)

DAY ONE Greetings and Course Opening IP-10 G-Series Nodal Solution Introduction Introduction to ODU Front Panel Overview Physical Overview System Architecture & Design:      Standalone VS. Shelf IP allocation in a shelf Management Modes (In Band, OOB, WSC) Switch Mode (Pipe, Managed, Metro) Protection Mode

1

Ceragon Training Agenda

v2.2

Page 1

 

Ceragon Training Agenda

DAY TWO Installation (Practical Exercise using the Element Management System):         Standalone guidelines Installing IDU in a shelf Protection mode (Main and Extensions) Setting IP address via CLI Setting up a radio link (frequency, Link ID, RSL, TSL, ATPC, MSE, MRMC, ASP) Setting MNG in a standalone IDU Setting MNG in a shelf Setting MNG using Wayside Channel

Troubleshooting Tools & Maintenance:        Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download

Licensing (retrieving license and installing license on IDU) Trap Configuration Course Summary / Exam

2

Ceragon Training Agenda

v2.2

Page 2

6/13/2010

Ceragon in a Nutshell

Ceragon FibeAir Family

OA&M

Service Management

Security

Carrier Ethernet Switch ACM
Gigabit Ethernet Fast Ethernet

TDM Cross Connect
XPIC Multi Radio SD/FD

Radio Ethernet + TDM
10-500Mbps, 7-56MHz

Native2

E1/T1

Ch-STM1/ OC3
Terminal Mux

RFU (6-38GHz)
2
Proprietary and Confidential

Page 29

1

6/13/2010

RFUs

FibeAir RFU-HP

FibeAir RFU-HS

FibeAir RFU-P

FibeAir RFU-C

FibeAir RFU-D

High power
(e.g. Smaller antennas – reduced cost)

Standard power

3

Proprietary and Confidential

CERAGON MAST - Mobile Architecture for Service Transport
ISPs Fixed  Networks Cable  TV

Cellular Backhaul

Rural Access

PDH xDSL Subscribers IP DSLAM IP/ETH  Customer  Network SDH/SONET RING PSTN
4
Proprietary and Confidential

Page 30

2

Mobile Architecture for Service Transport Complete end-to-end network architecture. networking and service p g delivery needs • A true end-to-end. scalable and cost-optimized solution for scaling up their networks Regardless of transport technology or the service being carried MAST offers a complete set of tools to ensure high QoS & full OA&M functionality across entire networks • Allows risk-free migration to IP/Ethernet • Simplifies fixed and mobile network designs • Giving operators a single p g p g point of contact for all the transport. flexible and future-proof networks in a simple and cost efficient manner 5 Proprietary and Confidential FibeAir IP-10R1 – Main features • • • • • Unique Adaptive Coding & Modulation (ACM) Enhanced radio efficiency and capacity for Ethernet traffic Integrated Carrier Ethernet switching functionality Enhanced QoS for differentiated services Supported configurations • 1+0 • 1+1 HSB – Fully-redundant! • Nodal solution with ring • Extensive and secure management solution 6 Proprietary and Confidential Page 31 3 . service-oriented package MAST allows customers to design highly scalable.6/13/2010 CERAGON MAST . powering operators with a highly efficient.

174 153 .148 127 .342 262 .ETSI 7MHz ACM Point 1 2 3 4 5 6 7 8 Modulation QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 4 6 8 10 12 13 16 16 Ethernet Capacity (Mbps) 9.217 202 .54 53 .430 350 .182 156 .374 ACM Point 1 2 3 4 5 6 7 8 Modulation QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 16 16 16 16 16 16 16 56MHz Ethernet Capacity (Mbps) 76 .60 49 – 70 57 – 82 69 .239 183 .125 28MHz ACM Point 1 2 3 4 5 6 7 8 Modulation QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 16 16 16 16 16 16 16 Ethernet Capacity (Mbps) 38 .501 372 .6/13/2010 IP-10R1 Integrated Carrier Ethernet switch 3 modes for Ethernet switching: • Metro switch – Carrier Ethernet switching is enabled • Managed Switch – 802.76 77 .115 87 .1 L2 switch • Smart pipe – Carrier Ethernet switching is disabled • Only a single Ethernet interface is enabled for user traffic • The unit operates as a point-to-point Ethernet MW radio IP-10 IP-10 Ethernet User Interfaces Carrier Ethernet Switch Radio interface Ethernet User Interface Radio interface Metro/Managed switch mode Smart pipe mode Extensive Carrier Ethernet feature-set eliminates the need for external switches 7 Proprietary and Confidential IP-10R1 radio capacity .305 239 .110 103 .41 42 .109 114 .5 – 13.223 167 .288 251 .262 ACM Point 1 2 3 4 5 6 7 8 40MHz Modulation QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 16 16 16 16 16 16 16 Ethernet Capacity (Mbps) 56 .219 188 .98 81 .531 8 Proprietary and Confidential Page 32 4 .5 14 – 20 19 – 28 24 – 34 28 – 40 32 – 46 38 – 54 42 – 60 ACM Point 1 2 3 4 5 6 7 8 14MHz Modulation QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 8 12 16 16 16 16 16 16 Ethernet Capacity (Mbps) 20 .358 301 .80 82 .29 29 .117 122 .163 151 .269 214 .

This unique approach allows you to plan and build optimal all-IP or hybrid TDM-IP backhaul networks which make it ideal for any RAN (Radio Access Network) • • • • 10 In addition. the microwave carrier supports native IP/Ethernet traffic together with optional native PDH PDH. while both dynamically share the same overall bandwidth.15 msecs @ 400 Mbps.6/13/2010 Wireless Carrier Ethernet Ring Example configuration (1+0 ring) N x GE/FE N x GE/FE N x GE/FE Wireless Carrier Ethernet Ring (up to 500Mbps) Integrated Ethernet Switching 9 Proprietary and Confidential N x GE/FE Native2 Microwave Radio Technology • At the heart of the IP-10 solution is Ceragon's market-leading Native2 • • • microwave technology. Native2 ensures: Very low link latency of <0. Very low overhead mapping for both ETH & TDM traffic High precision native TDM synchronization distribution Proprietary and Confidential Page 33 5 . Neither traffic type is mapped over the other. With this technology.

NG-SDH/SONET at the aggregation Carrier Ethernet (MW links) SDH/SONET (Hybrid Fiber/MW) Native Ethernet Ethernet over SDH/SONET Hub Site FE/GE GE GE RNC FibeAir IP-10 Tail site FibeAir IP-10 NG-SDH MSPP NG-SDH MSPP Core Site Ethernet services are transported natively over Carrier Ethernet based MW radio links. Ethernet services are mapped over SDH/SONET SDH/SONET MW links are used where fiber connections not available 11 Proprietary and Confidential IP/MPLS complementary solution Carrier Ethernet at the access. IP/MPLS edge router acts as gateway between the Carrier Ethernet and IP/MPLS based networks. NG-SDH/SONET MSPP node acts as gateway between the Carrier Ethernet and NGSDH/SONET based networks. Both Ethernet and E1/T1 services are mapped over MPLS using pseudo-wires or routed using IP High-capacity “IP/MPLSaware" Ethernet MW radio is used where fiber connections not available 12 Proprietary and Confidential Page 34 6 .6/13/2010 NG-SDH/SONET complementary solution Carrier Ethernet at the access. IP/MPLS at the aggregation Carrier Ethernet (MW links) IP/MPLS (Hybrid Fiber/MW) Native Ethernet Ethernet PWs or IP routing Hub Site FE/GE GE GE RNC Tail site FibeAir IP-10 FibeAir IP-10 MPLS Router MPLS Router Core Site Ethernet services are transported natively over Carrier Ethernet based MW radio links.

1p VLAN ID IPv4 DSCP/TOS.overview • 4 CoS/priority queues per switch port • Advanced CoS/priority classification based on L2/L3 header fields: • • • • • Source Port VLAN 802 1 802.1ag CFM (Connectivity Fault Management) Proprietary and Confidential Page 35 7 . IPv6 TC Highest priority to BPDUs Priority Queues W1 .6/13/2010 IP-10R1 integrated QoS support .Hi h t priority Highest i it Classify Arrivals W2 Scheduling departures • Advanced ingress traffic rate-limiting • per CoS/priority Flexible scheduling scheme per port W3 • Strict priority (SP) • Weighted Round Robin (WRR) • Hybrid – any combination of SP & WRR • Shaping per port W4 – lowest priority Support differentiated Ethernet services with SLA assurance 13 Proprietary and Confidential IEEE 802.

6/13/2010 FibeAir IP-10G IDU: A Nodal Solution Cellular traffic  (TDM) STM  Rings 15 Proprietary and Confidential FibeAir IP-10G IDU: A Nodal Solution 16 Proprietary and Confidential Page 36 8 .

50M) 4 E1s 25M Eth 4 E1s 25M Eth (22 E1. 100M) (22 E1. 50M) 4 E1s 25M Eth (22 E1. 100M) 4 E1s 25M Eth F G G 1+0 (22 E1 E1. 50M) 4 E1s 25M Eth (44 E1. 50M) 1+0 4 E1s 25M Eth 4 E1s 25M Eth F G GX IP-10 F-Series IP-10 G-Series IP-10 G-Series with XPIC 4 E1s 25M Eth F F Native2 1+0 Ring (Up to 75 E1 or 500Mbps Eth) 1+0 G F F G G G G 1+0 1+0 4 E1s 25M Eth 1+0 Native2 1+0 Ring (Up to 44 E1 or 100M Eth) 1+0 F 1+0 G GX 2+0 GX GX GX Terminal configuration 2+0 0 F Native2 GX Nodal configuration 1+1 1+0 F F F F 4 E1s 25M Eth GX 2+0 Ring (Up to 150 E1 or 1Gbps Eth) 2+0 2 0 (22 E1. 50M) 1+1 1+0 F F F 1+0 F G G F 1+1 F F 1 1 1+1 (44 E1. 50M) 4 E1s 25M Eth 2+0 4 E1s 25M Eth 18 Proprietary and Confidential Page 37 9 .6/13/2010 IP-10F IDU Fans drawer Craft Terminal (DB9) External Alarms (DB9) 16 x E1s (optional) Protection Interface (RJ45) 5 x FE Electrical (RJ45) RFU interface (N-Type) GND Power -48V DC 17 Proprietary and Confidential Typical Native2 network with IP-10 G & F-Series 4 E1s 25M Eth F 1+0 F F F 4 E1s 25M Eth 4 E1s 25M Eth (22 E1.

Supported radio configurations 1+0. One-man installation and shorter cabling reduce installation costs. at solar-powered sites. Ideal for Greenfield areas. IP-10F Feature F-Series G-Series 1+0. 1+1 SD 2+0 with XPIC 2+2 HSB with XPIC XPIC option Max radio capacity Multi-radio support # of Ethernet interfaces Full Carrier Ethernet switching feature-set including ring protection # of E1/T1 integrated IDU interfaces option # of E1/T1s per radio carrier T-Card slot (additional 16 E1/T1 interfaces or STM1/OC3 Mux) Nodal/XC/SNCP support Sync unit option V. and at repeater sites adjacent to highways. 20 Proprietary and Confidential Page 38 10 . saving on power and air-conditioning costs. 1+1 HSB. 16T1.11/RS232 or 1 x Sync V.11/RS232 User Channel option 100 Mbps 5 x FE RJ-45 Yes 500Mbps 1Gbps using 2+0/XPIC Yes 5 x FE RJ-45+ 2 x GE combo (RJ-45/SFP) Yes Yes 16 E1. Environment-friendly: Greener deployments.11 19 Proprietary and Confidential Outdoor Enclosures – Solution Benefits Full Outdoor solution: • • • • • Dust and weather proof Compact size reduces the cost of leasing or purchasing rack space.6/13/2010 IP-10G VS. 1+1 HSB. None 75 E1s / 84 T1s Yes Yes Yes 2 x Async V. None 44 E1s Yes Yes - 16 E1. 1+1 SD.

80 m Length 30 Km 21 Km 30 Km 30 km Modulation 16QAM 128QAM 128QAM 128QAM Capacity 32 x E1s STM‐1/OC‐3 STM‐1/OC‐3 STM‐1/OC‐3 Spectral Efficiency should always be coupled with  System Gain 22 Proprietary and Confidential Page 39 11 .6/13/2010 Higher Spectral-Efficiency What’s in it for The Operator? Typical Microwave Radio Required Capacity 155‐200Mbps Required Capacity 70‐100Mbps TWO radio links or 56MHz channel bandwidth 28MHz Channel Bandwidth IP10 Microwave Radio ONE radio link  using 28MHz channel bandwidth 14MHz Channel Bandwidth The operator saves CAPEX  and free‐up valuable frequency resources 21 Proprietary and Confidential Higher Spectral-Efficiency is not enough… Radio Type Typical System Gain Typical System Gain Typical System Gain High System Gain High System Gain Ant.80 m 3. Diameter 1.80 m 1.00 m 1.

6/13/2010 Ceragon’s Management Overview IP-10 23 Proprietary and Confidential FibeAir “Tree Topology” 24 Proprietary and Confidential Page 40 12 .

6/13/2010 Thank You! training@ceragon.com Page 41 13 .

left to right… 2 Proprietary and Confidential 1 Advanced Operation & Maintenance Course Page 42 .FibeAir ® IP-10 G-Series Front Panel Description Proprietary and Confidential Front Panel Overview GUI Example) Let’s go over the front panel connections of the IP-10 G-Series We shall explain them one by one.

simply connect here your headset 4 Proprietary and Confidential 2 Advanced Operation & Maintenance Course Page 43 .CLI – Serial Connection DB9 Craft Line Interface (CLI) Baud: 115200 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None 3 Proprietary and Confidential EOW – Easy Comm. Via Radio Engineering Order Wire – To communicate with your colleague on the other side of the radio link.

4) Minor and 5) Warning The output alarm is configured according to predefined categories 5 Proprietary and Confidential LED Indications LINK: GREEN – radio link is operational ORANGE . major BER alarm on radio IDU: GREEN – IDU functions ok ORANGE . 3) Major. 2) Critical.fan failure RED – Alarm on IDU (all severities) RFU: GREEN – RFU functions ok ORANGE – Loss of communication (IDU-RFU) RED – ODU Failure 6 Proprietary and Confidential 3 Advanced Operation & Maintenance Course Page 44 .External Alarms DB9 Dry Contact External Alarms – The IP-10 supports 5 input alarms and a single output alarm The input alarms are configurable according to: 1) Intermediate.minor BER alarm on radio RED – Loss of signal.

cable failure) OFF – Protection is disabled.LED Indications PROT: Main unit – GREEN (when there no alarms) STBY unit: YELLOW (when there no alarms) ORANGE – Forced switch. Protection lock RED – physical errors (no cable. or not supported on device RMT: GREEN – remote unit OK (no alarms) ORANGE – minor alarm on remote unit RED – major alarm on remote unit 7 Proprietary and Confidential User Channels (1) Two software-selectable user channels (RJ-45): A single synchronous channel OR two asynchronous channels Each asynchronous channel will make use of its own RJ-45 external interface The synchronous channel mode will make use of both interfaces (acting as a single interface) 8 Proprietary and Confidential 4 Advanced Operation & Maintenance Course Page 45 .

and one V.11 Synchronous Contra Directional UC > All settings are copied to Mate when working in Protected mode 10 Proprietary and Confidential 5 Advanced Operation & Maintenance Course Page 46 .User Channels (2) Modes of operation: • V.11 Synchronous Co-Directional (64Kbps) • V.11 Synchronous Co-Directional • One V.11 Synchronous Contra Directional (64Kbps) 9 Proprietary and Confidential User Channels (3) Allowed configurations: • Two RS-232 Asynchronous UCs (default) • Two V.11 Asynchronous (9600bps) • RS-232 Asynchronous (9600bps) • V.11 Asynchronous UC • One V.11 Asynchronous UCs • One RS-232 Asynchronous UC.

If the unit is connected to a backplane. the connection is through the backplane. If the unit is a stand-alone. 11 Proprietary and Confidential T-Cards (Add-on Mezzanines) Field upgradeable modules (T-Cards): • 16 x E1 T-Card (32 total per unit) • DS1 T-Card • STM1/OC3 MUX T-Card 12 Proprietary and Confidential 6 Advanced Operation & Maintenance Course Page 47 . Its switching is performed electrically. not traffic). while the front panel port is unused.Protection Port Protection Port (only for standalone units) – Protect your Main unit with a STBY unit Protection ports on both units deliver the proprietary protocol to support automatic or manual switchover The FE protection port is static (only used for protection. an external connection is made through the front panel.

classifiers) Port #2 14 Proprietary and Confidential Port #1 7 Advanced Operation & Maintenance Course Page 48 . each port with 2 physical interfaces: Port #1: optical (SFP transceiver) or electrical Port #2: optical (SFP transceiver) or electrical GbE ports support QoS as in IP-10 (scheduler. shaper.T-Cards (Add-on Mezzanines) An optional STM-1 interface card can be inserted in a dedicated slot in the system. The supported mapping is VC4 only: VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG The STM-1 T-card is only supported in unprotected main units or in unprotected stand-alone IDUs 13 Proprietary and Confidential GbE Ports Two GbE ports. policers. the card can transmit and receive up to 63 E1s in a channelized STM-1 signal.

classifiers) 15 Proprietary and Confidential Radio and misc. The Radio port is the switch’s 8th port (same as in IP-10) In addition – • Grounding • -48vdc Power Connector • Fan Drawer 16 Proprietary and Confidential 8 Advanced Operation & Maintenance Course Page 49 . policers.FE Ports 5 FE ports: Port 3: Port 4: Port 5. shaper.6 &7: Data Data or WSC (2 Mbps Wayside Channel) Data or local management All ports support QoS as in IP-10 (scheduler.

XC using a Shelf Configuration XC operation is implemented using two-unit backplanes. The 2 lower units can be configured as Main units. and act as stand-alone units. consisting of six IDUs. Up to three backplanes. The role an IDU plays is determined during installation by its position in the traffic interconnection topology 18 Proprietary and Confidential 9 Advanced Operation & Maintenance Course Page 50 . which provide the interconnectivity. can be stacked to provide an expandable system 17 Proprietary and Confidential XC using a Shelf Configuration All IDUs that operate within the XC system have identical hardware.

Thank You ! training@ceragon.com Proprietary and Confidential 10 Advanced Operation & Maintenance Course Page 51 .

® FibeAir    IP‐10 G‐Series Installation Proprietary and Confidential General If installation requires CFG file upload & download and / or SW file upload & down - 1. Make sure FTP Server is installed on your PC FTP is configured (RD/WR permissions) Latest SW version is available (FTP root directory) FTP installation guide  is available at  Training.Com:  see Modules /  Installation 2 Proprietary and Confidential Advanced Operation & Maintenance Course 1 Page 52 . 3. 2.Ceragon.

• IDU-ODU connection (IF cable): no more than 300m 4 Proprietary and Confidential Advanced Operation & Maintenance Course 2 Page 53 . • Available power source of -48 VDC. but only by authorized personnel.Agenda • Site Requirements • Packing & Transportation • Unpacking • Required Tools q • IDU Dimensions • Installing standalone IDU in a 19” Rack • Installing Nodal Enclosures in a 19” Rack • Preparing the IDU for a Shelf installation • Installing the IDU in a Shelf • Installing a Blank Panel IDU in a Shelf • Installing a T-Card into an IDU • Grounding the IDU • Lightning Protection • Power General Requirements • Installing the IDU-ODU IF cable 3 Proprietary and Confidential Site Requirements • IDU must be located indoors • The environment temperature must be between -5 C and +45 C. •Easily accessible. • Available management connection (Ethernet or dial-up). and the site must comply with National Electric Code (NEC) standards.

and sealed moisture-absorbing bags are inserted. The equipment is prepared for public transportation. and ensure that the correct part numbers and quantities of components arrived. The cargo must be kept dry during transportation. If intermediate storage is required. 5 Proprietary and Confidential Packing & Transportation The equipment is packed at the factory. It is the owner’s responsibility to obtain any and all permits. a local permit may be required before installing an antenna.Site Requirements Heat Dissipation: The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h). Keep items in their original boxes till they reach their final destination. p Antenna Location: As with any type of construction. The ODU heat dissipation is 100W max. the packed equipment must be stored in dry and cool conditions and out of direct sunlight When unpacking – Wh ki Check the packing lists. 6 Proprietary and Confidential Advanced Operation & Maintenance Course 3 Page 54 .

verify that there is a high RFU and low RFU. • One CD with a management user guide. If any part is damaged or missing. make sure that the following items are included: • Two indoor units and accessories • Two outdoor units • For 13-38 GHz systems. Unpack the contents and check for damaged or missing parts. 7 Proprietary and Confidential Required Tools The following tools are required to install the IDU: • Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw) • Flathead small screwdriver (for PSU connector) • Sharp cutting knife (for wire stripping) • Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used) Setting up Management will require • ETH cable (for setting management) • Serial Cable (for setting management) 8 Proprietary and Confidential Advanced Operation & Maintenance Course 4 Page 55 . Upon delivery.Unpacking A single FibeAir system (1+0) is shipped in 5 crates. contact your local distributor.

Com: see M d l / Installation Modules I t ll ti 9 Proprietary and Confidential IDU Dimensions 42.Ceragon.60mm 10 Proprietary and Confidential Advanced Operation & Maintenance Course 5 Page 56 . cable spec & interface pin layout can be found in our complete PDF installation guide installation guides available at Training.Specifications Connector spec.

supplied with the installation kit.Installing standalone IDU in a 19” Rack As shown in the illustration. 11 Proprietary and Confidential Installing Nodal Enclosures in a 19” Rack 12 Proprietary and Confidential Advanced Operation & Maintenance Course 6 Page 57 . are used to secure the IDU to the rack kit rack. four screws.

– Main enclosure should be installed first at the bottom of your rack space 13 Proprietary and Confidential Installing Nodal Enclosures in a 19” Rack Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. 14 Proprietary and Confidential Advanced Operation & Maintenance Course 7 Page 58 .g.Installing Nodal Enclosures in a 19” Rack Before you install the enclosures – Plan carefully the required space within the rack ! Should you need to install 3 enclosures – prepare at least 10Us (6Us for enclosures + 2Us free Main Enclosure space for maneuvering above and below shelves) Start the installation process from bottom to top. e.

Male connector should plug in smoothly into the Main enclosure. Step #3: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure. 15 Proprietary and Confidential Installing Nodal Enclosures in a 19” Rack Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Male connector should be plugged in smoothly into the Main enclosure.Installing Nodal Enclosures in a 19” Rack Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. 16 Proprietary and Confidential Advanced Operation & Maintenance Course 8 Page 59 . Step #2: Slide down the 2nd extension enclosure. Step #2: Slide down the 2nd extension enclosure.

Mount the 2nd extension into the rack using the 4 screws 17 Proprietary and Confidential Installing Nodal Enclosures in a 19” Rack Step #4: Secure the 2nd extension into the Main enclosure.Installing Nodal Enclosures in a 19” Rack Step #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws Step #5: Add the 3rd extension when needed 18 Proprietary and Confidential Advanced Operation & Maintenance Course 9 Page 60 .

19 Proprietary and Confidential Installing the IDU in a Shelf Slide the IP-10 IDU into the enclosure and tighten it using 2 screws.Preparing the IDU for a Shelf installation Remove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3 screws at each side. IDU insertion & extraction should NOT be under power 20 Proprietary and Confidential Advanced Operation & Maintenance Course 10 Page 61 . Repeat this step in accordance with the configuration.

by releasing the 2 side screws. 22 Proprietary and Confidential Advanced Operation & Maintenance Course 11 Page 62 . and tighten it using 2 screws.Installing a Blank Panel IDU in a Shelf Slide the IP-10 blank panel into the enclosure. 21 Proprietary and Confidential Installing a T-Card into an IDU Remove the IP-10 T-Card blank panel from the IDU.

23 Proprietary and Confidential Grounding the IDU Single Point Stud Grounding Wire 24 Proprietary and Confidential Advanced Operation & Maintenance Course 12 Page 63 .Installing a T-Card into an IDU Insert the IP-10 T-Card panel and tighten it using the 2 side screws.

the ampacity of the associated DC return conductor. 26 Proprietary and Confidential Advanced Operation & Maintenance Course 13 Page 64 .Grounding the IDU • The IDU is suitable for installation in a Common Bonding Network (CBN). 25 Proprietary and Confidential Lightning Protection For antenna ports. lightning protection is used that does not permit transients of a greater magnitude than the following: • Open Circuit: 1. • Connector and connection surfaces must be plated. • Only copper wire should be used. and t washers for anti-rotation.2-50us 600V • Short Circuit: 8-20us 300A The ampacity of the conductor connecting the IDU frame to the DC return conductor is equal to or greater than. • The wire must be at least 14 AWG. • FibeAir provides a ground for each IDU. Bare conductors must be coated with antioxidant before crimp connections are made to the screws. t be installed i i l d two star t • Th stud must b i t ll d using a UL li t d ring t The t d UL-listed i tongue t terminal. via a one-hole mounted lug onto a single-point stud.

A readily accessible Listed branch circuit over-current protective device. • Th user power supply GND must be connected to the positive pole i th IDU The l tb t d t th iti l in the power supply. the following must be considered: • DC power can be from -40.e. • Whether or not the power source provides constant power (i. within the same premises as the equipment 5. and emergency power generator. This equipment is designed to permit connection between the earthed conductor of the DC supply circuit and the earthing conductor at the equipment. i. A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection. • The power supply must have grounding points on the AC and DC sides. 2.. • Any other connection may cause damage to the system! 28 Proprietary and Confidential Advanced Operation & Maintenance Course 14 Page 65 . 3. power is secured on weekends or is shut off frequently and consistently). The DC supply system is to be local. • Recommended: Availability of a UPS (Uninterrupted Power Source).e. 27 Proprietary and Confidential Power Requirements When selecting a power source.Power General Requirements 1. must be incorporated in the building wiring. rated 15 A. The equipment shall be connected to a properly grounded supply system 4. battery backup.5 VDC to -60 VDC.

30 Proprietary and Confidential Advanced Operation & Maintenance Course 15 Page 66 .Power Requirements Important – Make sure to use a circuit breaker to protect the circuit from damage by short or overload. Note: Make sure you fasten the cable along the ladder! Make sure that the inner pin of the connector does not exceed the edge of the connector. The cable should have a maximum attenuation of 30 dB at 350 MHz. 29 Proprietary and Confidential Installing the IDU-ODU IF cable Route the IF Coax Cable from the IDU to the ODU/RFU and terminate it with N-type male connectors.

com Proprietary and Confidential Advanced Operation & Maintenance Course 16 Page 67 .Thank You ! training@ceragon.

3/14/2010 RFU‐C & Mediation Devices Proprietary and Confidential The Most Comprehensive Portfolio FibeAir® Family RFUs 6-38 GHz RFU-C Carrier Ethernet IP-10 IP-MAX2 3200T EMS & NMS PolyView (NMS) Multi-Service RFU-HP IP-10 IP-MAX2 640P CeraView (EMS) RFU-P. RFU-SP 1500R/1500P TDM 3200T 2 Proprietary and Confidential Page 68 1 .

3/14/2010 IDU – RFU Compatibility RFU-C IP-10 RFU-P. RFU-SP 1500R RFU-HP IP-IP-MAX2 RFU-SP 640P 1500P 3 Proprietary and Confidential IDU – IDU Compatibility Across Link 1500R 1500R IP-10 IP 10 IP-10 1500P 1500R IP-MAX/IP-MAX2 IP-10 1500P chassis Cannot House 1500R IDC and IDMs 1500R chassis Cannot House 1500P IDC and IDMs Must Match IDU Type Across a Link 4 Proprietary and Confidential Page 69 2 .

3/14/2010 RFU-C direct mount configurations 1+0 direct 5 Proprietary and Confidential RFU-C direct mount configurations 1+1 direct 6 Proprietary and Confidential Page 70 3 .

3/14/2010 RFU-C remote mount configurations 1+0 remote 7 Proprietary and Confidential RFU-C remote mount configurations 1+1 remote 8 Proprietary and Confidential Page 71 4 .

3/14/2010 RFU-C antenna adaptors • Adaptors for RFU-P direct antenna mount • Adaptors for NSN Flexi Hopper direct antenna mount • Adaptors for Ericsson R1A 23GHz direct antenna mount • Remote adaptors and configurations 9 Proprietary and Confidential RFU-C to NSN antenna 10 Proprietary and Confidential Page 72 5 .

7Vdc) • Repeat antenna alignment at each end until the minimum dc voltage is achieved • 1.30vdc = -30dBm • 1.60vdc = -60dBm • etc 12 Proprietary and Confidential Page 73 6 .2 to 1.45vdc = -45dBm • 1.3/14/2010 RFU-C to Ericsson antenna (R1A 23GHz) 11 Proprietary and Confidential Antenna Alignment (1) • Connect the headset to AGC monitor BNC/TNC connector on ODU • Connect Digital Volt Meter (DVM) to the AGC BNC connector • Align the antenna until voltage reading is achieved (1.

com  g@ g Thank You ! Thank You ! 14 Proprietary and Confidential Page 74 7 . re-align antenna to remote site 13 Proprietary and Confidential training@ceragon.3/14/2010 Antenna Alignment (2) • Compare achieved RX level to calculated RX level • Keep aligning until the achieved level is up to 4 dB away from the calculated received signal level • If voltage reading is more than 4 dB away or higher than 1.7vdc.

® FibeAir    IP‐10 G‐Series Setting Management Proprietary and Confidential Agenda • Getting started • General notes • General commands • Command history y • Reading current IP • Setting new IP • Connecting PC to IDU • Troubleshooting • Factory Defaults 2 Proprietary and Confidential 1 Advanced Operation & Maintenance Course Page 75 .

 PuTTY. Now.Getting started Verify that physical installation is successfully completed: • IDU is properly mounted in a shelf / rack • Power + GND • IF Cable between IDU and ODU Connect a PC to the Terminal connector and launch a serial application • Baud: 115200 • Data bits: 8 • Parity: None • St bit 1 Stop bits: • Flow Control: None You may use any Serial  Application such as Hyper  Terminal PuTTY TeraTerm Terminal. you should be able to see the IP-10 CLI Prompt 3 Proprietary and Confidential General notes on CLI IP-10:/> Note that the > sign indicates your current directory in the CLI tree Most of the CLI commands are based on GET/SET concept Some commands may require a different syntax Ceragon strongly recommends to use CLI only for setting management IP address when current IP is unknown All functions & features can be configured faster and easier using the WEB based EMS 4 Proprietary and Confidential 2 Advanced Operation & Maintenance Course Page 76 . TeraTerm etc… Log on using (admin/admin) for user name and password.

General Commands
IP-10:/ >? IP-10:/ls IP-10:/lsp IP-10:/ > exit / IP-10:/ > cd IP-10:/ > cd ..

Type ? (question mark) to list helpful commands Type ls to list your current directory Type lsp to available commands of current directory Type exit to terminate the session Type cd to change directory Type cd .. to return to root directory
5
Proprietary and Confidential

Command History

Use the arrow keys to navigate through recent commands

Use the TAB key to auto-complete a syntax

6
Proprietary and Confidential

3

Advanced Operation & Maintenance Course
Page 77

Reading current IP
To read current IP type the following:

IP-10:/>cd management/networking/ip-address/ IP-10:/ management/networking/ip-address>
Note that the prompt has changed. Now, type get ip-address:

IP-10:/ management/networking/ip-address>get ip-address
Upon completion, the current IP will be displayed followed by the new completion displayed, prompt:

IP-10:/ management/networking/ip-address>get ip-address 192.168.1.1 IP-10:/ management/networking/ip-address>
7
Proprietary and Confidential

Setting new IP
Now, let us set a new IP for the MNG: We assume the required IP is 192.168.1.144 Type set ip-address 192.168.1.144
IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144

Upon completion, you will be prompt:

You may lose remote management connection to the unit if this value is changed incorrectly. Are you sure? (yes/no):
Type yes and connect the IDU to your network / PC
8
Proprietary and Confidential

4

Advanced Operation & Maintenance Course
Page 78

Connecting IDU to EMS
1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT.5 cable 2. Verify that your PC’s IP is in the same subnet 3. 3 Make sure Link is up 4. PING the IDU 5. Launch a WEB browser with the URL set as the IDU’s IP

9
Proprietary and Confidential

Management Troubleshooting
In case PC cannot PING IDU – 1. Check your ETH cable – it might not be inserted properly (broken PIN) 2. Verify the management port is enabled in the EMS General/Management configuration 3. Make sure you connect to a management-enabled port (7, 6 or 5) 4. Verify right LED is ON (see below) 5. Verify your PC is in the same subnet as the IDU 6. In case your IDU is connected to a router: set the IDU’s Default GW = Router IP 7. In case your PC is connected to several IDUs (through switch/hub) – make sure every IDU has a unique IP When ON (Green) = Port is set to Management When OFF = Port is set to Data

10
Proprietary and Confidential

5

Advanced Operation & Maintenance Course
Page 79

Back to factory defaults
Going back to factory defaults can be done with EMS or CLI In case you need to set factory defaults with CLI type the following -

IP-10:/> cd management/mng-services/cfg-service

In the new directory type the following:

IP-10:/management/mng-services/cfg-service>set-to-default

11
Proprietary and Confidential

Thank You !
training@ceragon.com

Proprietary and Confidential

6

Advanced Operation & Maintenance Course
Page 80

4/16/2010

FibeAir ® IP-10 G-Series
EMS Performance Monitoring

Proprietary and Confidential

Agenda
EMS – General Information Faults: • Current Alarms
• Event Log

PM & Counters: • Remote Monitoring
• TDM Trails • TDM interfaces • Radio (RSL, TSL, MRMC and MSE) • Radio TDM • Radio ETH

2

Proprietary and Confidential

Page 81

1

user friendly GUI  No need to install an application – WEB Based software  No need to upgrade your EMS application – embedded in the IDU SW  No need for strong working station – simple PC is sufficient (For maintenance issues FTP Server is required)  Easy access – simply type the IP address of the IDU on your web page  Supports all IDU versions and configurations 3 Proprietary and Confidential EMS Main View Access application via IP address User friendly navigation menu Proprietary and Confidential Page 82 2 .4/16/2010 EMS .General  Easy.

4/16/2010 EMS Main View Graphical “MENU”: Click to configure Proprietary and Confidential EMS Main View Protection Status Display & Quick Access Icons Proprietary and Confidential Page 83 3 .

Black Rectangular to indicate selected slot for configuration Proprietary and Confidential EMS Main View When the user selects Slot 2 the GUI updates automatically 8 Proprietary and Confidential Page 84 4 .4/16/2010 EMS Main View In this example slot #1 and slot #2 are configured to support 1+1 Protection Slot #1 is selected and in Active mode.

CAS The CAS window shows collapsed list of alarms By expanding a line we can see additional information: • Probable cause • Corrective Actions 9 Proprietary and Confidential Faults – Event Log The Event Log shows max. Event #1 is erased and #201 is logged as #200. Proprietary and Confidential Page 85 5 . 200 lines of events When Event #201 occurs.4/16/2010 Faults .

MSE 3. MRMC (ACM) 4. RSL 2. Aggregated Errors 2.Radio TDM PM in Radio (allocated E1s) TDM (16 E1s) ETH PM (Data + In-Band): 1. Aggregate 11 Proprietary and Confidential Available PM Statistics – Line Interfaces • STM-1 interface facing customer equipment g q p • TDM interfaces facing customer equipment • End-to-End Trails 12 Proprietary and Confidential Page 86 6 . Throughput 3. RMON standard is implemented as well to p provide detailed data Radio PM: 1. Radio Link Utilization 5.4/16/2010 Available PM Statistics . Capacity 4.

4/16/2010 Clearing previous data To erase all IDU PM data. • RFC 2665 – Ethernet-like MIB. The counters are designed to support: • RFC 2819 – RMON MIB. • RFC 1493 – Bridge MIB. click the CLEAR button - 13 Proprietary and Confidential ETH PM – RMON The system supports Ethernet statistics counters (RMON) display (depends on port availability). • RFC 2233 – MIB II. Proprietary and Confidential Page 87 7 .

  but with an invalid FCS Total frames received with a length of less than 64 bytes.4/16/2010 PM – TDM Trails – In Detail Report Interval: The number of trails in the list is derived from radio link capacity (default license = 10Mbps) Display 15 minutes intervals or single Daily interval (24 hours) Information can be displayed as a graph Proprietary and Confidential PM – RMON – Special Registers RMON register / Counter Undersize frames received Oversize frames received Oversize frames received Jabber frames received Fragments frames received Rx error frames received FCS frames received In Discard Frames In Filtered Frames Pause frames received 16 Description Frames shorter than 64 bytes Frames longer than 1632 bytes Frames longer than 1632 bytes Total frames received with a length of more than  1632 bytes. not countered in "Fragments". "Jabber" or "Rx error" counters Fragments . and an invalid FCS Total frames received with Phy‐error Total frames received with CRC error.  Jabber or  Rx error counters Counts good frames that cannot be forwarded due to lack of buffer memory Counts good frames that were filtered due to egress switch VLAN policy rules Number of flow‐control pause frames received Proprietary and Confidential Page 88 8 .

RMON counter “Oversized frames received” is updated accordingly 18 Proprietary and Confidential Page 89 9 .4/16/2010 Troubleshooting with RMON: Filtering Example Site A A Tagging Radio port is a member of VID 100 Radio port is a member of VID 100 Site B A T T No membership Untagged Frames Tagged with default VID 100 Access port with default VID = 300 Site B Ingress port (Radio) receives the frame and checks the Egress port VID membership Egress port default VID is 300. therefore frame is filtered by the remote Radio port 17 Proprietary and Confidential Troubleshooting with RMON: Oversized frames Site A T T T Site B A Tagged Frames with frame size > 1632 bytes When ingress frames exceed the maximum frame size.

assign a Policer with a UDP & MC CIR rules 20 Proprietary and Confidential Page 90 10 .4/16/2010 Troubleshooting with RMON: Discarding Example Site A T T T Site B A Ingress traffic does not comply to Policer rules Discarding Examples: Ingress rate > Rate Limiter Ingress frames do not qualify to Policer rules 19 Proprietary and Confidential Troubleshooting with RMON: Monitoring specific traffic types Site A Rate Limiter Site B T T Monitor Video streams are generally transmitted over UDP with multicast addresses To monitor traffic. check out the Multicast Frames Received register To limit MC traffic.

defect SES is a subset of ES. which contains 30% errored blocks or at least one defect.4/16/2010 PM – TDM Trails – In Detail Errored Second (ES): A one-second period with one or more errored blocks or at least one defect Proprietary and Confidential PM – TDM Trails – In Detail Severely Errored Second (SES): A one-second period. Proprietary and Confidential Page 91 11 .

4/16/2010 PM – TDM Trails – In Detail A period of unavailable time begins at the onset of 10 consecutive Severely Errored Second (SES) events. Proprietary and Confidential Page 92 12 . These 10 seconds are considered to be part of available time. Proprietary and Confidential PM – TDM Trails – In Detail Background Block Error (BBE): An errored block not occurring as part of a SES. A new period of available time begins at the onset of 10 consecutive non-SES events. These 10 seconds are considered to be part of unavailable time.

4/16/2010 PM – TDM Trails – In Detail Number of Switches (only relevant for Protected SNCP Trails): The number of times the IP-10 switched from Primary Path to Secondary Path and vice versa (per 15min or 24hrs interval) Proprietary and Confidential PM – TDM Trails – In Detail Active Path Seconds (only relevant for Protected SNCP Trails): The number of times seconds the Active Path was available Proprietary and Confidential Page 93 13 .

28 Proprietary and Confidential Page 94 14 .4/16/2010 PM – TDM Trails – In Detail Integrity: Indicates whether information is reliable for analysis (ticked) or not For example – if clock was changed or system was restarted during this interval then information is not reliable Proprietary and Confidential PM – E1 / DS-1 (Radio PM) This PM data relates to the TDM Line Interfaces.

4/16/2010 PM – E1 / DS-1 (Radio PM) Here we can analyze TDM PM through the radio link 29 Proprietary and Confidential PM – STM-1 Interface This PM data relates to the STM-1 Line Interface. 30 Proprietary and Confidential Page 95 15 .

Example .40dBm = Nominal RSL for an operational Link Level 1: 25 sec Level 2: 15 sec 900 sec = 15min Interval Proprietary and Confidential Page 96 16 .4/16/2010 PM – Radio Signal Level – RSL & TSL analysis Allows setting RSL & TSL thresholds EMS will notify when signal exceeds THSLD >> Easier maintenance Aggregated radio traffic analysis MRMC – PM related to ACM: • Associated Script • Available Bit rate • Available Radio VCs MSE analysis 31 Proprietary and Confidential PM – Radio – Signal Level .

Example Using graphical display of the THSLD analysis allows us easier examination of the RSL & TSL state throughout certain period of time RSL -40 -50 -68 -99 10 5 10 T [sec] 33 Proprietary and Confidential PM – Radio .4/16/2010 PM – Radio – Signal Level .Aggregate Aggregated radio traffic analysis 34 Proprietary and Confidential Page 97 17 .

When link quality degrades or improves. the MSE reading is updated accordingly. information is updated accordingly.MRMC The information displayed in this page is derived from the license and script assigned to the radio. Differences of 3dB trigger ACM modulation changing. 35 Proprietary and Confidential PM – Radio .MSE The information displayed in this page is derived from the license and script assigned to the radio. as link quality degrades or improves the active improves. When ACM is enabled and active.4/16/2010 PM – Radio . Threshold can be configured as well for easier maintenance. 36 Proprietary and Confidential Page 98 18 .

Pre. we shall examine the Ethernet tagged frame full structure: A frame viewed on the actual physical wire would show Preamble and Start Frame Delimiter. data & overhead. 20-40%. relative to the potential Ethernet throughput of the radio. ( q y physical hardware). 64 octets – max.4/16/2010 PM – Ethernet ETH Traffic + Threshold settings: Frame Error Rate – Frame error rate (%) measured on radio-Ethernet radio Ethernet interface Throughput – data bits measured on radioEthernet interface Capacity . 60-80%. excluding TDM channels). 1522 octets Physical wire rate: min. measured on radio-Ethernet interface Utilization . these bits are stripped away at OSI Layer 1 by the Ethernet adapter before being passed on to the OSI Layer 2 which is where data is detected. SFD DA SA VLAN ETH Type  / Length Payload +  Padding CRC Interframe Gap 7 octets 1 octet 6 octets 6 octets 4 octets 2 octets 46‐1500  4 octets octets 12 octets Data Rate: min. Utilization (%) is displayed as one of five bins: 0-20%.overall Ethernet bits rate. 40-60%. 80-100% 37 Proprietary and Confidential Throughput / Capacity / Utilization To better understand these terms. 84 octets – max.(Actual Ethernet throughput. 1542 octets 38 Proprietary and Confidential Page 99 19 . ) However. in addition to the other data (required by the p y .

 1542 octets In case we use a 64 bytes frame: Throughput (Data rate) = ~ 77% of physical transmitted rate Stripped bits = ~ 23% of physical transmitted rate (64/84=0. 1522 octets Physical wire rate: min. SFD DA SA VLAN ETH Type  / Length Payload +  Padding CRC Interframe Gap 7 octets 1 octet 6 octets 6 octets 4 octets 2 octets 46‐1500  4 octets octets 12 octets Data Rate: min. 64 octets – max. when we transmit 100Mbps.4/16/2010 Throughput / Capacity / Utilization Pre. 84 octets – max.77) (20/84=0.23) Hence. the actual throughput would be 77 Mbps 39 Proprietary and Confidential Throughput / Capacity / Utilization Throughput = 77 Mbps Radio Capacity = (license) = 400Mbps Transmitted rate = 100 Mbps Capacity = Received frame rate = 100 Mbps Utilization = Throughput = 77 = 20 % Radio Capacity 400 40 Proprietary and Confidential Page 100 20 .

com training@ceragon com 42 Page 101 21 .4/16/2010 PM – Ethernet Ethernet throughput & Capacity PMs are measured by accumulating the number of Ethernet octets every second Accurate analysis requires accumulating a full interval (15min/24hrs) 41 Proprietary and Confidential Thank You ! training@ceragon.

6/1/2010 FibeAir ® IP-10 G-Series EMS General Configuration Agenda In this module we shall explain the following features as they appear on the EMS navigation Menu 2 Proprietary and Confidential Page 102 1 .

6/1/2010 Unit Parameters – Step # 1 Configure specific information that may assist you later Such info will help you locate your site easier and faster 3 Proprietary and Confidential Unit Parameters – Step # 1 VDC reading 4 Proprietary and Confidential Page 103 2 .

6/1/2010 Unit Parameters – Step # 1 Celsius (metric) or Fahrenheit (Imperial) 5 Proprietary and Confidential Unit Parameters – Step # 2 By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained) 6 Proprietary and Confidential Page 104 3 .

7 Proprietary and Confidential Versions This page shows the complete package of IDU and ODU software components 8 Proprietary and Confidential Page 105 4 . click Apply.6/1/2010 Unit Parameters – Step # 3 IDU Serial number is important when you submit your request for a License upgrade When you complete configuring all settings.

6/1/2010 Versions Let’s explore this example: • The IDU running SW is displayed in the aidu line and currently it is 3 0 92 3.97) • The IDU was not upgraded yet 9 Proprietary and Confidential Versions – RFU files Th IDU holds all th SW files for all the h ld ll the fil f ll th The components (IDU + ODU) You can see here the different files per ODU type 10 Proprietary and Confidential Page 106 5 .0.0.92 • A new SW was downloaded sometime in the past (3.

Dry Contact Alarms (DB-9): 5 Inputs 1 Output 11 Proprietary and Confidential External Alarms – Expended Input Alarm Config. 12 Proprietary and Confidential Page 107 6 .6/1/2010 External Alarms – Collapsed Input Alarm Config.

13 Proprietary and Confidential Management – Network Properties Here you can set the Network Properties of the IDU This is the switch MAC address If your link is up – you should be able to see the other end’s IP 14 Proprietary and Confidential Page 108 7 . Test mode – manual switch.6/1/2010 External Alarms – Configuring the Output Alarm ‘Group’ of alarms will trigger the external alarm Output. Communication – Alarms related to traffic: Radio / Ethernet line / TDM line Quality f S i Q lit of Service – W do not h We d t have specific alarms of Q S ifi l f QoS Processing – Alarms related to SW: Configuration / Resets / corrupted files Equipment – Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory. All Groups. Environmental – Alarms of ‘extreme temperature’.

16 Proprietary and Confidential Page 109 8 .6/1/2010 Management – Local Properties (Out of band) The IDU has 3 ports for local management: Port 7. You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =0 15 Port 7. Port 6 and Port 5. Port 5 Port 7. Port 6. management is down as well. Port 6 Port 7 NO LOCAL MANAGEMENT !!! Proprietary and Confidential Management – In Band Properties In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down.

6/1/2010

Management – Port Properties

These parameters allow you setting the management capacity t it and port properties

17

Proprietary and Confidential

Trap Configuration (OSS / NMS / Northbound)

To manage the IDU with OSS / NMS, you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations)

18

Proprietary and Confidential

Page 110

9

6/1/2010

Licensing – Default License
“Demo” license can be enabled on-site, it expires after 60 days (operational time) Licenses are generated per IDU S/N upon request (capacity / ACM / switch mode)

License upgrade requires system reset.

19

Proprietary and Confidential

Licensing – Demo License Enabled

Demo License allows you full evaluation of the IDU functionality, features and capacities

20

Proprietary and Confidential

Page 111

10

6/1/2010

NTP Client Properties
• Enable / Disable • Type NTP Server IP address • Expect IDU to lock on NTP Server’s clock • Expected Status: 1. If locked, it returns the IP address of the server it is locked on. 2. “Local” – if the NTP client is locked to the local element’s real-time clock 3. “NA” - if not synchronized with any clock (valid only when Admin is set to Disable).
The feature supports “Time Offset” and “Daylight Saving Time”. “Time Offset” and “Daylight Saving Time” can be configured via WEB (“Unit Information” page) or via CLI: /management/mng-services/time-service>
21

Proprietary and Confidential

NTP Properties

22

Proprietary and Confidential

Page 112

11

6/1/2010

NTP Properties
When using NTP with external protection 1+1, both “Active” and “Standby” units sho ld be locked independentl on the “NTP ser er” and report nits should independently server”, independently their “Sync” status.

Time & Date are not copied from the “Active” unit to the “Standby” unit When using NTP in a shelf configuration all units in the shelf (including configuration, standby main units) are automatically synchronized to the active main unit’s clock.

23

Proprietary and Confidential

IP Table

Here you can manually set your neighbor’s network properties

24

Proprietary and Confidential

Page 113

12

6/1/2010

SNMP
• V1 • V3

• No security • Authentication • Authentication privacy • SHA • MD5 • No Authentication

25

Proprietary and Confidential

All ODU
This feature is used to feed the integrated fans of the Outdoor Enclosure When enabled, the Ext. Alarms connector is modified to provide the required power feed.

All ODU Disabled

All ODU Enabled

26

Proprietary and Confidential

Page 114

13

com training@ceragon com 27 Page 115 14 .6/1/2010 Thank You ! training@ceragon.

6/13/2010 FibeAir ® IP-10 G-Series EMS General Configuration Agenda In this module we shall explain the following features as they appear on the EMS navigation Menu 2 Proprietary and Confidential Page 116 1 .

6/13/2010

Unit Parameters – Step # 1

Configure specific information that may assist you later Such info will help you locate your site easier and faster

3

Proprietary and Confidential

Unit Parameters – Step # 1

VDC reading

4

Proprietary and Confidential

Page 117

2

6/13/2010

Unit Parameters – Step # 1

Celsius (metric) or Fahrenheit (Imperial)
5
Proprietary and Confidential

Unit Parameters – Step # 2

By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained)

6

Proprietary and Confidential

Page 118

3

6/13/2010

Unit Parameters – Step # 3
IDU Serial number is important when you submit your request for a License upgrade When you complete configuring all settings, click Apply.

7

Proprietary and Confidential

Versions

This page shows the complete package of IDU and ODU software components
8
Proprietary and Confidential

Page 119

4

6/13/2010

Versions

Let’s explore this example: • The IDU running SW is displayed in the aidu line and currently it is 3 0 92 3.0.92 • A new SW was downloaded sometime in the past (3.0.97) • The IDU was not upgraded yet

9

Proprietary and Confidential

Versions – RFU files

Th IDU holds all th SW files for all the h ld ll the fil f ll th The components (IDU + ODU) You can see here the different files per ODU type

10

Proprietary and Confidential

Page 120

5

6/13/2010

External Alarms – Collapsed Input Alarm Config.

Dry Contact Alarms (DB-9): 5 Inputs 1 Output
11
Proprietary and Confidential

External Alarms – Expended Input Alarm Config.

12

Proprietary and Confidential

Page 121

6

6/13/2010 External Alarms – Configuring the Output Alarm ‘Group’ of alarms will trigger the external alarm Output. Communication – Alarms related to traffic: Radio / Ethernet line / TDM line Quality f S i Q lit of Service – W do not h We d t have specific alarms of Q S ifi l f QoS Processing – Alarms related to SW: Configuration / Resets / corrupted files Equipment – Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory. Test mode – manual switch. Environmental – Alarms of ‘extreme temperature’. All Groups. 13 Proprietary and Confidential Management – Network Properties Here you can set the Network Properties of the IDU This is the switch MAC address If your link is up – you should be able to see the other end’s IP 14 Proprietary and Confidential Page 122 7 .

You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =0 15 Port 7. Port 6. Port 6 Port 7 NO LOCAL MANAGEMENT !!! Proprietary and Confidential Management – In Band Properties In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down. management is down as well. 16 Proprietary and Confidential Page 123 8 .6/13/2010 Management – Local Properties (Out of band) The IDU has 3 ports for local management: Port 7. Port 5 Port 7. Port 6 and Port 5.

you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations) 18 Proprietary and Confidential Page 124 9 .6/13/2010 Management – Port Properties These parameters allow you setting the management capacity t it and port properties 17 Proprietary and Confidential Trap Configuration (OSS / NMS / Northbound) To manage the IDU with OSS / NMS.

19 Proprietary and Confidential Licensing – Demo License Enabled Demo License allows you full evaluation of the IDU functionality. it expires after 60 days (operational time) Licenses are generated per IDU S/N upon request (capacity / ACM / switch mode) License upgrade requires system reset. features and capacities 20 Proprietary and Confidential Page 125 10 .6/13/2010 Licensing – Default License “Demo” license can be enabled on-site.

If locked. it returns the IP address of the server it is locked on. “NA” . 2.if not synchronized with any clock (valid only when Admin is set to Disable). The feature supports “Time Offset” and “Daylight Saving Time”.6/13/2010 NTP Client Properties • Enable / Disable • Type NTP Server IP address • Expect IDU to lock on NTP Server’s clock • Expected Status: 1. “Time Offset” and “Daylight Saving Time” can be configured via WEB (“Unit Information” page) or via CLI: /management/mng-services/time-service> 21 Proprietary and Confidential NTP Properties 22 Proprietary and Confidential Page 126 11 . “Local” – if the NTP client is locked to the local element’s real-time clock 3.

independently their “Sync” status. both “Active” and “Standby” units sho ld be locked independentl on the “NTP ser er” and report nits should independently server”. standby main units) are automatically synchronized to the active main unit’s clock. 23 Proprietary and Confidential IP Table Here you can manually set your neighbor’s network properties 24 Proprietary and Confidential Page 127 12 . Time & Date are not copied from the “Active” unit to the “Standby” unit When using NTP in a shelf configuration all units in the shelf (including configuration.6/13/2010 NTP Properties When using NTP with external protection 1+1.

Alarms connector is modified to provide the required enabled Ext power feed. the Ext. All ODU Disabled All ODU Enabled 26 Proprietary and Confidential Page 128 13 .6/13/2010 SNMP • V1 • V3 • No security • Authentication • Authentication privacy • SHA • MD5 • No Authentication 25 Proprietary and Confidential All ODU This feature is used to feed the integrated fans of a 3rd party Outdoor Enclosure (standalone outdoor rack) When enabled.

com training@ceragon com 27 Page 129 14 .6/13/2010 Thank You ! training@ceragon.

3/7/2010 FibeAir ® IP-10 G-Series EMS Switch Configuration Agenda 1. Managed Mode Configuration 5. Single Pipe Configuration 4. Managed Mode Common Applications 2 Proprietary and Confidential Page 130 1 . Guidelines 3. Switch mode review 2.

Each traffic port can be configured to be "access" port or "trunk" port: Type VLANs Specific VLAN should be assigned to access the port A range of VLANs should be assigned to access the Port Allowed Ingress Frames Only Untagged frames (or Tagged with VID=0 – "Priority Tagged“ ) Only Tagged frames Allowed Egress Frames Untagged frames Access Trunk Tagged frames 4 Proprietary and Confidential Page 131 2 . Any traffic coming from any GbE interface will be sent directly to the radio and vice versa. Protection. This application allows QoS configuration. does not require license) – This application allows only single GbE interface as traffic interface (Optical GbE-SFP or Electrical GbE .3/7/2010 Switch Modes 1. 3 Proprietary and Confidential Switch Modes 2. Other FE (10/100) interfaces can be configured to be "functional" interfaces (WSC. Note: (CQ20473): Single pipe discards “PAUSE” PDU (01-80-C2-00-00-01) and “Slow protocols” PDU (01-80-C2-00-00-02). otherwise they are shut down. Single (Smart) Pipe (default mode. All Ethernet ports are allowed for traffic. allowing L2 switching based on VLANs.1Q” VLAN aware bridge.10/100/1000). Managed Mode (license depended) – This application is “802. Management). This application also allows QoS configuration.

3/7/2010 Switch Modes 3.A.1Q” VLAN aware bridge. allowing Q-in-Q (A. Configurable S-tag. Metro Mode (license depended) – This application is “802. Configurable S-tag. VLAN Stacking). (ether-type) 0x88a8 0x8100 0x9100 0x9200 Proprietary and Confidential ProviderNetwork A range of S-VLANs.) • VLANs need to be created in the switch DB before assigned to a port 6 Proprietary and Confidential Page 132 3 . or "all" S-VLANs should be assigned to "ProviderNetwork" port 5 Guidelines • Changing switch modes requires a reset • Resets do not change the IP-10G settings (radio. or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100).K. etc. This mode allows the configuration of a PE port and CE port. Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. (ether-type) 0x88a8 0x8100 0x9100 0x9200 Type CustomerNetwork VLANs Specific S-VLAN should be Untagged frames. configuration.

3/7/2010 Single Pipe Configuration 7 Proprietary and Confidential Single Pipe Configuration Untagged VID 4 VID 100 45 VID 51 IP-10 Switch Port 1: GbE (Optical or Electrical) Port 3: FE (RJ45) Port 8 (Radio) 8 Proprietary and Confidential Page 133 4 .

) Port 3 (RJ45) When one is enabled the other is disabled No need to configure VID membership 10 Proprietary and Confidential Page 134 5 .3/7/2010 Configuration – Single Pipe This is the default setting 9 Proprietary and Confidential Configuration – Single Pipe Only one ingress port can be used: Port 1 (Opt. or Elec.

VID 300) 12 Proprietary and Confidential Page 135 6 .3/7/2010 Managed Mode Configuration 11 Proprietary and Confidential Configuration – Managed Mode Let’s use this diagram as an example Port #2 as Trunk (VID 200) IDU-B IDU-A Port #3 as Trunk (VID 300) Radios as Trunk by default Port #2 as Trunk (VID 200.

Configure the port type as Trunk or Access 4.3/7/2010 Configuration – Managed Mode Make sure both IDUs are aware of the required VIDs You need to create the VIDs before you assign them to a certain port (Set # & Apply) 13 Proprietary and Confidential Configuration – Managed Mode Next steps: 1. all VLANs are allowed by default 14 Proprietary and Confidential Page 136 7 . Assign allowed VLAN IDs (port membership) 5. Enable the required port (Ingress ports) 3. Go to Interfaces page 2. Radio port is automatically configured as Trunk.

168.1.200 PC 192.168.3/7/2010 Configuration – Managed Mode 1 2 3 4 15 Proprietary and Confidential Configuration – Managed Mode – Common Applications Tagging / untangling IP-10 Access Port Radio = Trunk Port Transmits and receives Untagged frames Transmits and receives Untagged frames PC 192.100 16 Proprietary and Confidential Page 137 8 .1.

3/7/2010 Configuration – Managed Mode – Common Applications Radio = Trunk Port IP-10 Trunk Port Multiple L2 streams.com 18 Page 138 9 . each identified with unique VID Traffic Generator Trunk Port 17 Proprietary and Confidential Thank You ! training@ceragon.

Trunk Port 4. Extracting frames out of a trunk 5.4/17/2010 FibeAir ® IP-10 Trunk VS. Access Proprietary and Confidential Agenda 1. Access Port 3. General Guidelines 6. EMS Trunk Configuration 2 Proprietary and Confidential Page 139 1 . VLAN TAG Attributes 2.

3. In L2 ETH switching. 5.4/17/2010 VLAN TAG Attributes 1. • • 3 Access Port • • Access Port is a port which is aware of a single VLAN only Ingress traffic is expected to be Untagged. port membership + L2 traffic engineering convert connectionless to connection-oriented network In such networks.g. services are better deployed and maintained VLAN TAG attributes include: VLAN ID (12 bits) Priority Bits (3 bits) Additional attributes may be used to engineer traffic: MAC DA Port number Proprietary and Confidential 2. – no VLAN g gg g information exists within the received Ethernet frame All frames that are received through this port are tagged with default VLAN (VID + P bits) All frames that exit through this port towards customer devices are untagged (VLAN is removed) Users can configure the L2 switch to assign different tagging scenarios to different ports • • • 4 Proprietary and Confidential Page 140 2 . e. • • 5. 4. L2 traffic can be engineered using the VLAN TAG attributes L2 traffic is controlled by defining port membership: Access or Trunk Together.

4/17/2010 Access Port • Let us examine the Tagging / Untagging process of a L2 switch L2 ETH SW DA SA Type Payload FCS 5 Proprietary and Confidential Access Port – Tagging ingress frames • Let us examine the Tagging / Untagging process of Port #1 Tagging Port #1 DA SA VLAN TAG Port #8 Type Payload FCS Tagged frame DA SA Type Payload FCS Access Port:Untagged frame 6 Proprietary and Confidential Page 141 3 .

4/17/2010 Access Port – Utagging frames towards customer interfacing ports • When Tagged frame from Network is forwarded to Access port. the VLAN Tag is removed Untagging Port #1 DA SA VLAN TAG Port #8 Type Payload FCS Tagged frame DA SA Type Payload FCS Access Port: Untagged frame 7 Proprietary and Confidential Access Port – Tagging multiple ports • The switch can individually tag multiple Access ports with same VID or unique VID Tagging Port #8 Port #1 Port #2 DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS DA Access Ports: Untagged frames 8 Proprietary and Confidential Page 142 4 .

port #2 is facing customer device to forward all the network VLANs (TX&RX) Trunk Port Port #8 Port #2 DA DA DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS Proprietary and Confidential SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS SA VLAN TAG DA Untagged frames = 33 10 Page 143 5 . the common port has to be configured as a Trunk Port Trunk Port Port #8 Port #1 Port #2 DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS DA Access ports: Untagged frames 9 Proprietary and Confidential Trunk Port – multiple VIDs awareness • • Any port can be configured as Trunk In this example.4/17/2010 Trunk Port – multiple VIDs awareness • To be able to transmit & receive multiple VLANs.

membership needs to be defined next (which VLANs are supported…) 12 Proprietary and Confidential Page 144 6 .4/17/2010 Trunk & Access – Extracting frames out of a Trunk • A certain VLAN can be extracted out of a Trunk via Access port assigned with specific VLAN membership (Default VID) Type Payload FCS DA SA VLAN TAG = 33 Type Payload FCS DA SA Port #5: Access Port #8: Trunk Port #2: Trunk DA DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS Proprietary and Confidential SA VLAN DA Untagged frames TAG = 33 11 General guidelines • • • • • • • • Access port can only receive untagged frames from customer device Access port can only transmit untagged frames towards customer device Access port supports single VLAN Access port can be connected to an Access port only Trunk port can only receive / transmit tagged frames Trunk port supports multiple VLANs Trunk port can be connected to a Trunk port only When configuring Access or Trunk port.

com training@ceragon com 14 Page 145 7 .4/17/2010 EMS Trunk Configuration 1 2 3 4 13 Proprietary and Confidential Thank You ! training@ceragon.

4/21/2010 FibeAir ® IP-10 G-Series EMS Metro Switch Configuration Proprietary and Confidential Agenda Metro mode review Configuration Guidelines Simplified Flow Common Applications: CN – PN – PN – CN Common Applications: CN – PN – PN – PN Switch Mode Configuration CN Port Configuration PN Port Configuration 2 Proprietary and Confidential Page 146 1 .

or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). allowing Q-in-Q (A.1Q” VLAN aware bridge. or "all" S-VLANs should be assigned to "ProviderNetwork" port 3 Proprietary and Confidential Configuration guidelines • Customer Network frames are encapsulated with a 2nd VLAN (S-VLAN) and forwarded to a PN port PN ports transport multiple encapsulated networks. Type CustomerNetwork VLANs Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames.4/21/2010 Metro Mode (license depended) This application is “802.A. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200 ProviderNetwork A range of S-VLANs. VLAN Stacking). (ether-type) 0x88a8 0x8100 0x9100 0x9200 Specific S-VLAN should be Untagged frames. This mode allows the configuration of a PE port and CE port. each associated with a unique S-VLAN CN ports remove the S-VLAN towards a Customer interface • • Network #1 Radio Ports (PN) Network #2 S-VLAN 9 Network 1 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 S-VLAN 8 Network 2 4 Proprietary and Confidential Page 147 2 .K. Configurable S-tag.

4/21/2010 Simplified Flow IP-10 S-VLAN 1000 S-VLAN 222 S-VLAN 1000 S-VLAN 222 PN Radio Port CN CN ISP / BTS #1 C-VLAN 100 C-VLAN 101 C-VLAN 102 5 Proprietary and Confidential ISP / BTS #2 C-VLANs unknown CN-PN-PN-CN BTS #2: C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 Radio Ports (PN) S-VLAN 9 BTS 2 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 S-VLAN 8 BTS 1 CN CN CN BTS #1: C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 6 Proprietary and Confidential CN Page 148 3 .

4/21/2010 CN-PN-PN-PN BTS #2: C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 Radio Ports (PN) S-VLAN 9 BTS 2 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 S-VLAN 8 BTS 1 CN CN PN BTS #1: C-VLAN 100 C-VLAN 101 C-VLAN 102 C-VLAN 103 7 Customer Network Provider Network Proprietary and Confidential Switch Mode Configuration 1 2 1. Set mode to Metro (requires reset) 2. Add the S-VLAN ID (set & apply) 8 Proprietary and Confidential Page 149 4 .

Go to Interfaces / Ethernet Ports page 2. Set the type to Customer Network 4.4/21/2010 CN Port Configuration 1. Enable the port 3. Type the S-VLAN ID 6. See screen capture next slide 9 Proprietary and Confidential CN Port Configuration 2 1 4 5 3 6 10 Proprietary and Confidential Page 150 5 . Type the port ID (EVC name. Enable Port Learning 7. Apply & Refresh 8. free string) 5.

Edit (if needed) the allowed S-VLANs 6.4/21/2010 PN Port Configuration 1. Set the required S-Tag (Ether-Type) 8. Go to Interfaces / Ethernet Ports page 2. See screen capture next slide 11 Proprietary and Confidential PN Port Configuration 2 1 1 3 4 6 5 12 Proprietary and Confidential Page 151 6 . Enable Port Learning 5. Enable the port 3. Apply & Refresh 7. Set the type to Provider Network 4.

14 Proprietary and Confidential Page 152 7 .4/21/2010 PN Port Configuration – Setting the S-Tag 7 • 0x88A8 • 0x8100 • 0x9100 • 0x9200 13 Proprietary and Confidential QoS with Metro Switch CN ports only audits the P-Bit of C-VLANs: Ingress frames through CN ports can be classified by applying a VLAN P-Bit Classifier.

4/21/2010 Thank You ! training@ceragon.com 15 Page 153 8 .

Link ID: must be the same on both ends 2 Proprietary and Confidential Page 154 1 .4/30/2010 ® FibeAir    IP‐10 Series Commissioning the Radio Link Proprietary and Confidential Radio Link Common Attributes # Link ID IP‐10 IP‐10 RSL – MSE– Received Signal [dBm] Mean Square Error [dB]: • Modulation status • Signal to Noise Ratio (SNR) Max. TSL – Max. allowed Transmission Signal [dBm] Monitored TSL – Actual Transmission level [dBm] # .

4/30/2010 LINK ID LINK ID – Antenna Alignment Process To avoid pointing the antenna to a wrong direction (when both links share the same frequency). # 101 # 101 # 102 # 101 “Link ID Mismatch” “Link ID Mismatch” 4 Proprietary and Confidential Page 155 2 . LINK ID can be used to alert when such action is take.

4/30/2010 LINK ID – Antenna Alignment Process Both IDUs of the same link must use the same Link ID Otherwise. “Link ID Mismatch” alarm will appear in Current Alarms Window # 101 # 101 # 102 # 101 “Link ID Mismatch” “Link ID Mismatch” 5 Proprietary and Confidential ATPC Page 156 3 .

and link quality. we employ a feedback-based transmission power control algorithm to dynamically maintain individual link quality over time.4/30/2010 ATPC – Adaptive Transmission Power Control The quality of radio communication between low Power devices varies significantly with time and environment. In ATPC. online transmission power control that adapts to external changes is necessary. • Static transmission set to max. range. describing the correlation between transmission power and link quality. may reduce lifetime of Transmitter • Side-lobes may affect nearby Receivers (image) Main Lobe Side Lobe 7 Proprietary and Confidential ATPC – Adaptive Transmission Power Control To address this issue. 8 Proprietary and Confidential Page 157 4 . This phenomenon indicates that static transmission power transmission range power. each node builds a model for each of its neighbors. With this model. might not be effective in the physical world.

possible level 5. Enable ATPC on both sites 2. Set reference RSL (min.4/30/2010 ATPC – Adaptive Transmission Power Control 1. level TSL Adjustments Monitored RSL Radio ATPC  module Radio  Transceiver  Radio  Receiver Radio  Receiver Signal  Quality  Check ‐ Ref. RSL Feedback Site A RSL required change Site B 10 Proprietary and Confidential Page 158 5 . ATPC on both ends establish a Feedback Channel through the radio link (1byte) 4. Power reduction stops when RSL in remote receiver reaches Ref. TSL: Monitored TSL: Monitored RSL: Disabled 10 dBm 10 dBm -53 dBm ATPC: Max. possible RSL to maintain the radio link) 3. TSL: Monitored TSL: Monitored RSL: Disabled 10 dBm 8 dBm -56 dBm ATPC  module Radio  Transceiver  Radio  Receiver Radio Radio  Receiver Signal  Quality  Check ‐ Ref. RSL Feedback Site A RSL required change Site B 9 Proprietary and Confidential ATPC OFF = High Power Transmission ATPC: Max. Transmitters will reduce power to the min.

cost & long-term maintenance ATPC: Ref. RSL: Max.65 dBm 10 dBm 2 dBm (before 8) -63 dBm (before 56) ATPC  module Radio  Transceiver  Radio  Receiver Radio Radio  Receiver Signal  Quality  Check ‐ Ref. TSL: Monitored TSL: Monitored RSL: Enabled .4/30/2010 ATPC ON = Reduced Power. TSL: Monitored TSL: Monitored RSL: Enabled -65 dBm 65 10 dBm 2 dBm (before 10) -60 dBm (before 53) ATPC: Ref. Ref RSL: Max. RSL Feedback Site A RSL required change Site B 11 Proprietary and Confidential MRMC Adaptive TX Power Page 159 6 .

modulation may change from 256QAM to QPSK. TX in 256QAM. modulation may change from 256QAM to QPSK. 13 Proprietary and Confidential MRMC Adaptive Power = OFF 256QAM @ Monitored TSL = 18 dBm (Max. power will be limited to the value corresponding as Max. Max. when link suffers signal degradation. Max. However. power will increase to compensate for the signal degradation. TSL = 18 dBm 14 Proprietary and Confidential Page 160 7 . When Adaptive TX is disabled: Maximum TX power is limited by the highest modulation configured in the MRMC ACM script. When Adaptive TX is Enable: When link suffers signal degradation.4/30/2010 MRMC Adaptive TX Power Designed to work with ACM in certain scenarios to allow higher Tx power available at lower order modulation schemes for a given modulation scheme. In other words.) Signal Degradation = Lower bit/symbol 16QAM @ MAX. However.

The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the signal power is radiated equally in all directions 16 Proprietary and Confidential Page 161 8 . Spectrum): • Class 2 • Class 4 • Class 5B • Class 6A • FCC RFU C should h i 2.) Signal Degradation = Lower bit/symbol 16QAM @ Monitored TSL = 24 dBm 15 Proprietary and Confidential MRMC Adaptive Power It is essential that Operators ensure they do not breach any regulator-imposed EIRP limitations by enabling Adaptive TX.01 (or higher) for ti lit f RFU-C h ld have version 2 01 ( hi h ) f proper f functionality of “Adaptive TX Power” feature. users can select the required class ( q (Power VS.4/30/2010 MRMC Adaptive Power = ON 256QAM @ Monitored TSL = 18 dBm(Max. To better control the EIRP.

4/30/2010 Configuration Radio Settings – Local Radio Spectrum Mask FQ spacing (gap) between channels Monitored transmission power Monitored recei ed signal received Monitored Mean Square Error Required value = zero Radio frequencies can be set locally or on remote unit as well (assuming links is up) Enable / Disable Min. target RSL (local) Enable = no transmission Value depends on MRMC settings Must be identical on both IDUs 18 Proprietary and Confidential Page 162 9 .

you can configure certain parameters on the remote unit: • Make sure Remote IP is available • Remote RSL can be read • Remote TSL can be set (depends on remote MRMC script) • Remote TX MUTE can be disabled (see next slide) • Remote target RSL for ATPC can be set 20 Proprietary and Confidential Page 163 10 .4/30/2010 Radio Settings – Local Radio Enable on both IDUs to get maximum throughput (500Mbps @ 56MHz) 19 Proprietary and Confidential Radio Settings – Remote Radio When the radio link is up.

4/30/2010 Remote Un-Mute Simplified scheme Site i Sit B is NOT transmitting t itti but receiver is still ON Site A is transmitting Site B Site A 21 Proprietary and Confidential Radio Thresholds These settings determine the sensitivity / tolerance for triggering: • 1+1 HSB switchover • Ethernet Shutdown • PM generated alarms 22 Proprietary and Confidential Page 164 11 .

When MSE is improved above predefined threshold. ACM TX profile is determined by remote RX MSE performance.4/30/2010 MRMC – Multi Rate Multi Coding Users may set the radio to a fixed capacity or automatic adaptive capacity using ACM. while these parameters dictate profile’s capacity (bps). RX generates a request to the remote TX to “downgrade’ its profile. ACM radio script is constructed of a set of profiles. RX end is the one that initiates ACM profile upgrade or downgrade. RX generates a request to the remote TX to ‘upgrade’ its profile. If MSE degrades below a predefined threshold. system “chooses” automatically which profile to use according to the channel fading conditions. Each profile is defined by modulation order (QAM) and coding rate. When ACM script is activated. ACM TX profile can be different than ACM RX profile. 23 Proprietary and Confidential MRMC Configuration We shall review this page using the following slides: 24 Proprietary and Confidential Page 165 12 .

4/30/2010 MRMC – reading current script MAX. BW Modulation Spectrum Mask ACM is on Spectrum Class Type 25 Proprietary and Confidential MRMC – Reading current capacity 26 Proprietary and Confidential Page 166 13 . Capacity (w/out compression) ACM Script CH.

com training@ceragon com 27 Page 167 14 .4/30/2010 Thank You ! training@ceragon.

3/7/2010 FibeAir® IP-10 G-Series Configuring Interfaces Proprietary and Confidential Agenda • Ethernet Interfaces • TDM Interfaces • AIS Detection • AIS Signaling (STM-1) • STM-1 Interface • Auxiliary Channels • Wayside Channel (Various Configurations) 2 Proprietary and Confidential Page 168 1 .

Access • Metro Switch Configuration • QoS Configuration Interface Rate Single Pipe ETH 1 (SFP) ETH 2 (RJ 45) ETH 3 (RJ 45) ETH 4 (RJ 45) ETH 5 (RJ 45) ETH 6 (RJ 45) ETH 7 (RJ 45) ETH 8 Radio (N Type) GbE GbE FE 10 / 100 FE 10 / 100 FE 10 / 100 FE 10 / 100 FE 10 / 100 According to Licensed fq.3/7/2010 Ethernet Ports Configuration Configuring ETH ports is discussed in previous modules: • Switch Configuration • Trunk VS. Disabled / Traffic Disabled / Traffic Disabled / Protection Disabled / Wayside Disabled / MNG Disabled / MNG Disabled / MNG Disabled / Traffic Functionality Managed SW / Metro Disabled / Traffic Disabled / Traffic Disabled / Traffic / Protection Disabled / Traffic / Wayside Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic 3 Proprietary and Confidential Ethernet Ports Configuration 4 Proprietary and Confidential Page 169 2 .

When Trail is configured and set to Operational . High-priority TDM trails 2. if no trails are configured (all are deleted) system will revert to the default setting. default mapping (above) is overwritten by Trail Mapping.TDM port is activated. QoS should be considered) TDM trails in both sides of a link should have identical priorities. Low-priority TDM trails 3. Ethernet traffic (Data + Management. When Trail is configured but set to Reserved .TDM port is disabled.3/7/2010 TDM Ports Configuration IP-10G has 16 TDM ports + 16 additional ports when a 2nd T-Card is installed. Supported PHYs: • E1 • DS1 Dynamic allocation: Radio bandwidth (which may vary in ACM) is automatically allocated in the following order: 1. When Trails are configured. 5 Proprietary and Confidential TDM Ports Configuration – Standalone IDU E1/DS1 port #n will be mapped to radio VC#n (n=1-16). However. 6 Proprietary and Confidential Page 170 3 .

• An indication is given to user at the proper interface. STM-1): In case of detection. Notice that this is not a system alarm. The maximum number of radio Trails is 75 (E1) or 84 (DS1). 7 Proprietary and Confidential AIS Line Detection This feature allows detection of AIS signals in TDM traffic incoming from line interfaces (E1/DS1. since the problem originates elsewhere in the Network 8 Proprietary and Confidential Page 171 4 .3/7/2010 TDM Ports Configuration – Node Site Up to 180 trails can be configured in a Shelf / node The number of Trails mapped to a radio depends on radio capacity (MRMC). the following takes place: • Signal failure is generated at the corresponding trail – this will cause the far end not to receive a signal (including trail ID indications) and the trail status to show “signal failure” and “trail ID mismatch”.

but received signal will be used for traffic Excessive BER threshold: specific for STM-1 interface Signal degrade threshold: specific for STM-1 interface 10 Proprietary and Confidential Page 172 5 .3/7/2010 AIS Signaling in STM interface (VC 12) In case of signal failure at the trail outgoing from the STM-1 interface. AIS will be transmitted at the payload of the VC-12. 9 Proprietary and Confidential STM interface Configuration The following configurations are available: Admin: Enable / Disable When interface is disabled: • There is no signal transmission • Received signal is ignored • Trails previously configured to STM-1 interface will get “Signal Failure” • No alarms will be shown Clock source: Internal Clock / Loop / TDM Trail Mute TX: mutes the outgoing STM-1 signal.

For example: signaling in outgoing V5 byte upon AIS detection at payload-level (E1) “111111111” “111111111” AIS @ E1 TS 11 Proprietary and Confidential AIS @ STM V5 STM interface Configuration J0 trace identifier is fully supported in both 15-byte and 1-byte modes: • An alarm will be raised when the expected string differs from the received string (but traffic will not be affected). the first byte will be analyzed and other bytes ignored. • If a string is defined and user changes the length from 15 bytes to 1 byte.3/7/2010 AIS Signaling in STM interface (V5) The system can be configured to signal AIS at the VC level (AIS-V) in the V5 byte of the overhead. This is meant to provide indications to SDH multiplexing equipment which may not have the ability to detect AIS at the payload level. 12 Proprietary and Confidential Page 173 6 . The string transmitted as J2 trace identifier is the Trail ID defined for the TDM trail mapped to the corresponding VC-12 interface. Expected and Received strings are provided. • Transmit.

11. 13 Proprietary and Confidential WSC Interface • WSC interface is limited to 1628 bytes. • 2. Asynchronous V.048Mbps (Wide) or 64Kbps (Narrow) • Consumes BW from the total link BW Out of band Management using WSC: In this case. It is recommended to use “wide” WSC in order to get better management performance. remote system is managed using Wayside channel. 14 Proprietary and Confidential Page 174 7 . Up to 19200 baud. Asynchronous RS-232. Wayside channel will be connected to management port (using cross Ethernet cable). since “narrow” WSC might be too slow.3/7/2010 Auxiliary Interfaces • • Up to 19200 baud. WSC can be configured to "narrow“ capacity (~64kbps) or "wide" capacity (~2Mbps). EOW may be used as a simple solution for on-site communication between two technicians / installers / etc. On both local & remote units.

and 2nd port that will be connected to Wayside port. each unit's Wayside port should be connected to management port. Wayside port will be connected to management port. Using Protection "Patch Panel". On remote unit. 15 Proprietary and Confidential OOB MNG in a 1+1 standalone IDUs (Y-Splitter) WSC port will be connected in each unit to other available management port. 16 Proprietary and Confidential Active & Standby MNG ports have 2 options to be connected to the Host: Using Ethernet splitter cable connected to external switch.3/7/2010 OOB MNG in a 1+0 standalone link At least 2 management ports are needed in a local unit: One port for local management. Page 175 8 . In remote site.

3/7/2010 OOB MNG in a 1+1 standalone IDUs (P.com 18 Page 176 9 . Panel) 17 Proprietary and Confidential Thank You ! training@ceragon.

3/7/2010 FibeAir® IP-10 G-Series XC / SNCP / Nodal Solution Proprietary and Confidential Introduction Page 177 1 .

G.805) • With Wireless SNCP.3/7/2010 SNCP (ITU. with the same end-points. which are routed through two different paths in the network The end-points may be line interfaces or radio VCs. a backup VC trail can be optionally defined for each individual VC trail Main Path Protective Path 4 Proprietary and Confidential Page 178 2 . so partial path protection can be provided for a trail in a network where full path redundancy topology is not available The end-points are also referred to as branching-points • • • 3 Proprietary and Confidential SNCP (ITU.805) • • • Ring topologies provide path protection for Ethernet or TDM signals In some scenarios additional protection is required The IP-10G Path-Protection is based on SNCP (Sub-network Connection Protection) Individual E1/T1 trails will be protected by defining two separate trails.G.

3/7/2010 FibeAir IP-10 – Integrated Nodal Solution IP-10 IDU can be used as a Standalone unit (1U) or in as a Nodal Solution Connecting 2 IDUs requires a nodal enclosure: • Best economical future upgrade • Best flexibility for network designer • Easier to Install / Maintain / expand The solution is modular and forms a single unified nodal device: • Common Ethernet Switch • Common E1s Cross Connect • Single IP address • Single element to manage Proprietary and Confidential FibeAir IP-10 – Integrated Nodal Solution • Up to 6 units can be stacked to form single nodal device • • • • Additional units can be added in the field as required Multiple nodes can be cascades to support large aggregation sites Stacking is done using 2RU “Nodal enclosures” • Each enclosure has 2 slots for hot-swappable 1RU units Additional “Nodal enclosures” and units can be added in the field as required without affecting traffic Front Nodal enclosure Rear Proprietary and Confidential Page 179 3 .

3/7/2010 FibeAir IP-10 – Nodal Enclosures “Extension” nodal enclosure “Main” nodal enclosure 7 Proprietary and Confidential FibeAir IP-10 – Scalable Nodal Enclosures Pay as you grow ! 8 Proprietary and Confidential Page 180 4 .

TDM and Ethernet) are connected to the main units • Expansion unit is fully managed through the main units • Radios in each pair of main/expansion units can be configured as either: • • • Dual independent 1+0 links Single 1+1 HSB link Single 2+0/XPIC link Native2 1+0 Native2 1+0 Integrated Ethernet Switching Integrated TDM cross-connect M E E E E E Native2 2+0/XPIC Main unit Expansion unit M M Native2 1+1 HSB Proprietary and Confidential Page 181 5 . switching and management functions for all the units in the node • Mandatory “active” main unit can be located in any of the 2 slots • Optional “standby” main unit can be installed in other slot • Switchover time <50msecs for all traffic affecting functions Integrated Ethernet Switching Integrated TDM cross-connect M E Main unit Expansion unit M M Native2 1+1 HSB Proprietary and Confidential Integrated nodal solution – “Expansion” units • Units located in non-bottom “Nodal enclosures” are acting as “expansion” units • All interfaces of the expansion units (radio.3/7/2010 Integrated nodal solution – “Main” units Units located in the bottom “Nodal enclosure” are acting as the main units • The main unit performs the cross-connect.

T-Cards (TDM / SDH) are not hot-swappable. All Trails are transported through main unit(s) 3. Radio VCs must be identical on both sides of the radio link 12 Proprietary and Confidential Page 182 6 . do not extract / insert card when IDU is powered up 5. configure trails to go via the Active unit (XC Trails are automatically created on the STBY unit) 4. XC Trails can be configured only via Main unit 2.3/7/2010 Trail Configuration Guidelines XC Trails Guidelines (1) 1. When Protection is enabled.

XC Trails can be configured between: • • • Radio to Line Line to Radio Radio to Radio 8. Maximum number of Trails per Node = 180 9. Maximum number of Trails per Radio = 75 (E1) or 84 (T1) or 168 (SNCP) 13 Proprietary and Confidential XC Trails Guidelines (3) Identify Trail interfaces prior to configuration Note that Trail configuration is Bi-Directional ! Trail starts here: For SNCP we shall need to define 3 interfaces Trail traverses through here: We shall need to define 2 interfaces IP-10 IP-10 Bypass site Protected Trail (Automatic) IP-10 Radio Link 14 Proprietary and Confidential Trail starts here: For SNCP we shall need to define 3 interfaces Page 183 7 . therefore an alarm will display next to the relevant T-Card accommodating the activated port(s) 7. Creating a TDM trail automatically activates the corresponding TDM port.3/7/2010 XC Trails Guidelines (2) 5.

3/7/2010 XC Trails Guidelines (4) Pay attention to the order of configuration: 2 The Trail Start/End points should be configured first (interface #1) 1 IP-10 3 Bypass site IP-10 Interfaces #2 and #3 can be configured in a random order Protected Trail (Automatic) 2 IP-10 1 3 15 Proprietary and Confidential Standalone non-protected Trail Configuration Page 184 8 .

Your next step is selecting the PDH port number. 18 Proprietary and Confidential Page 185 9 .3/7/2010 Step #1: Access Trail Page Click on the Add button 17 Proprietary and Confidential Step #2: Configure 1st Interface Click on the 1st interface connector In this example we selected the PDH connector. Your next step would be selecting the VC number. In this example we selected the SDH connector.

3/7/2010 Step #3: Configure 2nd Interface Click on the 2nd interface connector In this example we selected the Radio as the next interface connector. Your next step would be selecting the radio channel number. Alternatively you could choose other combinations as well: • PDH to PDH • PDH to Radio (above) • PDH to SDH • SDH to Radio • SDH to Radio • Radio to SDH • Radio to PDH 19 Proprietary and Confidential Step #4: Configure Trail Attributes Make sure Trail ID is unique and identical on all sites/trails 20 Proprietary and Confidential Page 186 10 .

3/7/2010 Step #5: Trail Verification If your settings are correct. trail path is ready to be tested 21 Proprietary and Confidential SNCP Trail Configuration in a Node Page 187 11 . trail alarms should disappear.

3/7/2010 Selecting Main IDU for Trail Configuration • In the following example we assume every node has 2 IDUs installed in a Main Enclosure • Make sure your Main unit is selected on every Node-EMS • Enable Protection when you configure the Trails (excluding Bypass Nodes) • Trail ID should unique and identical on all nodes 23 Proprietary and Confidential SNCP Trail in Nodal Architecture PDH interface Bypass Node IP-10 IP-10 IP-10 SDH interface 24 Proprietary and Confidential Page 188 12 .

3/7/2010 1st Node PDH interface IP-10 IP-10 Bypass site Radio CH #1 Radio CH #26 IP-10 SDH interface #1 25 Proprietary and Confidential Bypass Node Radio CH #48 PDH interface IP-10 Bypass Node IP-10 Radio CH #1 IP-10 SDH interface 26 Proprietary and Confidential Page 189 13 .

com 28 Page 190 14 .3/7/2010 3rd Node Radio CH #48 PDH interface IP-10 Bypass site IP-10 Radio CH #26 IP-10 SDH interface 27 Proprietary and Confidential Thank You ! training@ceragon.

• Configuration VS Functionality • Dead Lock Example • ASP in Managed / Metro Mode 2 Proprietary and Confidential Page 191 1 .4/30/2010 FibeAir ® IP-10 Series Automatic State Propagation Proprietary and Confidential Agenda • Introduction • Interfacing IP-10 with external devices VS.

The feature allows the user to configure which criteria will force GbE port (or ports in case of “remote fault”) to be muted / shut down. Radio LOF Need to find  alternative path 3 Proprietary and Confidential Interfacing IP-10 with external devices When external devices do not support Fault Propagation – Configure the following: 1. Enable Local Excessive BER – recommended but not necessary 4 Proprietary and Confidential Page 192 2 .to mute local GbE when LOC is raised 2. to improve the recovery performance of resiliency protocols (such as xSTP). Enable Local LOC . Enable Remote Fault – to mute local transmitter in case of remote LOF / Link ID mismatch & LOC 3. in order to allow the network find alternative paths. The feature is not operational in "External Protection".4/30/2010 Introduction “Automatic State Propagation” ("GigE Tx mute override") enables propagation of radio failures back to the line.

GbE FO breaks down or disconnects at the ingress port of Site A 6 Proprietary and Confidential Page 193 3 .to avoid a dead lock scenario 5 Proprietary and Confidential Example: Avoiding Dead Lock in Single Pipe Site B Site A TX RX RX TX 1.4/30/2010 Interfacing IP-10 with external devices When external devices support Fault Propagation (another IP-10) – Configure the following: 1. Disable Local Excessive BER . Enable Remote Fault – to mute local transmitter in case of remote LOF / Link ID mismatch & LOC 3. Disable Local LOC 2.

GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 7 Proprietary and Confidential Example: Avoiding Dead Lock in Single Pipe Site B Site A TX RX LOC RX X TX 1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3.4/30/2010 Example: Avoiding Dead Lock in Single Pipe Site B Site A TX RX LOC RX TX 1. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 8 Proprietary and Confidential Page 194 4 .

Site B detects silence on ingress port and declares LOC 9 Proprietary and Confidential Example: Avoiding Dead Lock in Single Pipe Site B Site A TX X X RX LOC LOC RX TX 1. GbE FO breaks down or disconnects at the ingress port of Site A 2. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. Site B shuts down its transmitter – both sites are in a state of a dead lock 10 Proprietary and Confidential Page 195 5 .4/30/2010 Example: Avoiding Dead Lock in Single Pipe Site B Site A TX RX LOC LOC RX X TX 1. Site B detects silence on ingress port and declares LOC 5. LOC alarm is raised 3.

4/30/2010 Automatic State Propagation in Single Pipe 11 Single Pipe .Propagation Criteria Using Optical GbE (SFP) Local and remote IDUs must have identical settings: 1. 2. 3. ASP Enabled ACM profile threshold Excessive BER enabled Local Criteria: Local Criteria: • LOC (GbE) • Radio LOF • LINK ID Mismatch • Excessive BER • ACM profile is below threshold 1 8 8 1 Actions: Mute port 1 (GbE ‐SFP)  Actions: Mute port 1 (GbE ‐SFP)  12 Proprietary and Confidential Page 196 6 .

  port  Actions: Shut down Elec.Propagation Criteria Using Electrical GbE (RJ45) Local and remote IDUs must have identical settings: 1. 2. 3. ASP Enabled ACM profile threshold Excessive BER enabled Local GbE Criteria: • LOC 8 8 Port i l i ll l P t is logically closed b t not d but t shut down LOC will not trigger port shut down (it will not be possible to enable the port when LOC is cleared) Remote LOC will not trigger port shut down (it will not be possible to enable the port when LOC is cleared) 14 Proprietary and Confidential Page 197 7 .Propagation Criteria Using Electrical GbE (RJ45) Local and remote IDUs must have identical settings: 1. ASP Enabled ACM profile threshold Excessive BER enabled Local Criteria: L l C it i • Radio LOF • LINK ID Mismatch • Excessive BER • ACM profile is below threshold 8 8 Actions: Shut down Elec. 3.4/30/2010 Single Pipe .  port  13 Proprietary and Confidential Single Pipe . 2.

16 Proprietary and Confidential Page 198 8 . ASP is disabled.4/30/2010 Automatic State Propagation in Managed / Metro Mode 15 ASP in Managed / Metro Mode • Alarms are never propagated to a GbE port • GbE will never shut down • Alarms will be propagated to the Radio port • In 1+1 external protection.

2. ASP Enabled ACM profile threshold Excessive BER enabled Local criteria: • GbE LOC 8 Actions: No action taken Shut down Radio 8 18 Proprietary and Confidential Page 199 9 .4/30/2010 Managed / Metro .Propagation Criteria Local and remote IDUs must have identical settings: 1. Local Criteria: • Radio LOF • LINK ID Mismatch • Excessive BER • ACM profile is below threshold ASP Enabled ACM profile threshold Excessive BER enabled 8 Actions: Shut down Radio 8 17 Proprietary and Confidential Managed / Metro . 3. 3.Propagation Criteria Local and remote IDUs must have identical settings: 1. 2.

com training@ceragon com 19 Page 200 10 .4/30/2010 Thank You ! training@ceragon.

6/14/2010 FibeAir ® IP‐10 1+1 Protection Proprietary and Confidential Agenda Introduction to External Protection Introduction to Shelf Protection Introduction to Shelf Protection Guidelines External Protection Process: 1+1 from scratch External Protection Process: Upgrading 1+0 to 1+1 Troubleshooting 2 Proprietary and Confidential Page 201 1 .

2nd IDU is STBY (system awaits a switchover command) 6 In this example Protection is configured in every pair of IDUs (slots) 5 4 3 2 1 IDU IDU IDU 4 Proprietary and Confidential Page 202 2 .6/14/2010 External Protection • Achieved by using two standalone IDUs • The IDUs must be connected by an Ethernet Cross cable (via the protection ports) • Each IDU has its unique IP address address. the following rules should be applied: • Shelf backplane replaces the external Protection Cable • Th There i only one IP address f each of th pair units is l dd for h f the i it • Protection can enabled in each pair (1+2.high In this example 1+1 Protection is only deployed at one site f1 . 5+6) • Each IDU must have a unique IP address • 1st IDU is Active (TX & RX).low 3 Proprietary and Confidential Shelf Protection When enabling a Shelf Protection.high IDU f1 . 3+4. supports TDM only) • 1st IDU is Active (TX & RX). • Protection Panel may be in use (shown in orange. 2nd IDU is STBY (awaits a switchover command) f1 .

6/14/2010 Guidelines • A Standby IDU is referred to as the Mate • When a switchover occurs. the Active IDU becomes Standby and the “Standby” IDU becomes “Active” Standby Active • Accessing a Mate IDU can only be done via the Active IDU • Accessing the new "Active" will be done using its IP address • Y-Split cables must be used for Ethernet signals (fiber optics) 5 Proprietary and Confidential Setup Example (Standalone IDUs) 6 Proprietary and Confidential Page 203 3 .

6/14/2010 Configuring external 1+1 from scratch Configuring external 1+1 from scratch (1) 1. which is connected to the ODU fed by the lower attenuation channel of the RF coupler. Set all IDUs to factory defaults 2. 8 Proprietary and Confidential Page 204 4 . all IDUs have the same In-Band VID Note: The IDU. When IDUs 2 Wh IDU complete th b ti sequence. is the IDU that should be selected as "Active“. verify: l t the booting if • • • • • • All IDUs have the same HW version All IDUs have the same SW version Every IDU has unique IP address Active and STBY have the same SW mode All IDUs have the same Management mode (In band or OOB) In case of In-Band.

6/14/2010 Configuring external 1+1 from scratch (1) 3. Disconnect the MNG cables. Enable protection in 2nd IDU in each site 8. Enable Protection on both IDUs (management will be lost for 60 sec) 5. Lock Protection on both IDUs (to avoid unnecessary switchover when 2nd IDU is enabled) 6. Connect the PC to IDUs via ETH Y-Cable: ODU ODU PC ODU ODU 10 Proprietary and Confidential Page 205 5 . Connect ETH Cross Cable between both protection ports ODU ODU ODU ODU 9. Install the 1st link (make sure radio is up) ODU ODU 4. 10. Install d 6 I t ll 2nd IDU i each site (no need to configure it) in h it ODU ODU ODU 9 Proprietary and Confidential ODU Configuring external 1+1 from scratch (1) 7.

Verify there are no “Configuration Mismatch” alarms 13. Verify Active IDU shows Mate’s IP address 12. Verify there are no “Mate Communication failures” 14. In Active IDU: click “Copy to Mate” and verify Mate is restarting 16. Complete system setup by configuring Active IDU 15. Unlock protection on Active IDUs 18. Repeat steps 10 to13 17. 11 Proprietary and Confidential Upgrading (1+0) to (1+1) Page 206 6 . Initiate Manual Switchover / Forced Switchover: verify traffic is OK.6/14/2010 Configuring external 1+1 from scratch (1) 11.

Enable Protection on Active IDUs (management will be lost for 60 sec) 3. configure the 2nd IDUs to match Active IDUs: • • • • • • • • 2nd IDUs has the same HW version as Active IDU 2nd IDU has the same SW version as Active IDU 2nd IDU has unique IP address (different than Active’s IP) 2nd IDU has the same switch mode as Active IDU 2nd IDU has the same Management mode (In band or OOB) In case of In-Band. Install 2nd IDU in each site (verify TX is muted before physical installation) ODU ODU ODU ODU 14 Proprietary and Confidential Page 207 7 . Lock Protection 3 L k P t ti on b th A ti IDU (to avoid unnecessary switchover both Active IDUs when 2nd IDU is enabled) 4. Assuming 1st link operates well.6/14/2010 Upgrading (1+0) to (1+1) 1. 2nd IDU has the same In-Band VID as Active IDU 2nd IDU is configured with the same radio parameters as Active IDU Mute transmission on 2nd IDUs Active Link: ODU ODU Standby Link (not connected) ODU ODU 13 Proprietary and Confidential Upgrading (1+0) to (1+1) 2.

Complete system setup by configuring Active IDU 14.6/14/2010 Upgrading (1+0) to (1+1) 5. 16 Proprietary and Confidential Page 208 8 . Connect ETH Cross Cable between both protection ports ODU ODU ODU ODU 7. Verify Active IDU shows Mate’s IP address 11. Unlock protection on Active IDUs 17. In Active IDU: click “Copy to Mate” and verify Mate is restarting 15. Connect the PC to IDUs via ETH Y-Cable 9. Disconnect the MNG cables. Enable protection in 2nd IDU in each site 6. 8. Verify there are no “Configuration Mismatch” alarms 12. Initiate Manual Switchover / Forced Switchover: verify traffic is OK. Repeat steps 10 to13 16. Cancel TX mute on both Mate IDUs 15 Proprietary and Confidential Configuring external 1+1 from scratch (1) 10. Verify there are no “Mate Communication failures” 13.

 use CLI to recover IDU Check the current alarms of STBY IDU Current Alarms shows “Mate Comm. SW. One of the 2 IDUs is not configured in  Protection Protection LED is on (RED) LED is on (RED) Check CFG of both IDUs: HW.6/14/2010 Troubleshooting Protection Common issues followed by CLI commands Troubleshooting Alarm / Error Probable Cause / Workaround 1.” “Main IDU does not respond to  PING” This is normal behavior. In Band VID Mismatch” alarm Initiate “Copy to Mate” in Active IDUs “I cannot PING the STBY unit….  Current Alarms show “Configuration  management mode. Protection cable is not connected 2.  Report back to Ceragon Support Failure” alarm Replace STBY unit Replace Active unit 18 Proprietary and Confidential Page 209 9 . if so. ETH straight cable is connected instead of  cross cable cross‐cable 3. only via Active IDU Use CLI commands to verify this IDU is in STBY  mode. switch mode. Mate cannot be  accessed directly.

Standby 19 Proprietary and Confidential Troubleshooting – Useful CLI Commands To change Protection Admin mode. IP-10:/platform/mate-idu> get protection-mode The system return these values: 1.6/14/2010 Troubleshooting – Useful CLI Commands General commands: lsp ls cls prints executable commands in current directory prints available child directories child-directories clears screen To execute Protection commands. you will need to change directory: IP-10:/> cd platform/mate-idu Then. type the following: IP-10:/platform/mate-idu> set protection-admin <enable/disable> To lock the current protection mode. Active 2. Then to read current status of IDU type the following (in blue): IDU. type the following: IP-10:/platform/mate-idu> set protection-lockout <on/off> 20 Proprietary and Confidential Page 210 10 .

type the following: IP-10:/platform/mate-idu> set protection-force-switch <on/off> To request a manual switchover.com training@ceragon com 22 Page 211 11 .6/14/2010 Troubleshooting – Useful CLI Commands To force a switchover. type the following: IP-10:/platform/mate-idu> manual-switch-cmd To initiate a Copy-to-Mate process. type the following: IP-10:/platform/mate-idu> copy-to-mate-cmd 21 Proprietary and Confidential Thank You ! training@ceragon.

3/7/2010 FibeAir ® IP-10 G-Series Loopback Maintenance Proprietary and Confidential Agenda In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system 2 Proprietary and Confidential Page 212 1 .

3/7/2010 RFU RF Loopback RFU RF LB 3 Proprietary and Confidential RFU RF Loopback Use it to verify communication from Line to ODU is OK (including ODU) • Traffic affecting – TX is stopped • Configurable Timer to automatically restore traffic ( 0 = no time limits) • RFU LED is RED when Loopback is ON • LINK LED is GREEN when Loopback is ON • Alarm is displayed in Current Alarms: • and Event log: 4 Proprietary and Confidential Page 213 2 .

3/7/2010 IF Loopback IDU IF LB 5 Proprietary and Confidential IF Loopback Use it to verify communication from Line to IF cable is OK • Traffic affecting – TX is stopped • Configurable Timer to automatically restore traffic (0 = no time limits) • LINK LED is GREEN when Loopback is ON • Alarm is displayed in Current Alarms: • and Event log (next slide): 6 Proprietary and Confidential Page 214 3 .

3/7/2010 IF Loopback – Analysis using Event Log Let’s assume radio link is down – LINK LED is RED 16:29:01 16:29:05 16:30:01 16:30:05 We enable IF LB. therefore Link alarms clear Loopback replaces remote unit – therefore alarm disappears Loopback automatically stops. link recovers to original state Radio link is down (original state) 7 Proprietary and Confidential PDH Line LB towards Line (NE) LB towards the line 8 Proprietary and Confidential Page 215 4 .

3/7/2010 PDH Line LB towards Line (Near End) Use this feature to evaluate connection to customer’s patch-panel Alarm is displayed in CAS: and in Event Log: 9 Proprietary and Confidential PDH Line LB towards Radio (FE) LB towards the radio Tester 10 Proprietary and Confidential Page 216 5 .

11 Proprietary and Confidential SDH Line LB towards System Towards System – signal (trail) is looped back to IP-10 12 Proprietary and Confidential Page 217 6 .3/7/2010 PDH Line LB towards Radio – Event Log Analysis Let’s assume PDH port #1 is enable but not connected Therefore.. Major alarm is on (RED) 16:59:44 16:59:46 17:06:37 17:06:38 We enable Line LB towards the radio Loopback replaces end-device – therefore alarm disappears Loopback is OFF PDH port alarm is ON again….

3/7/2010 SDH Line LB towards Line Towards Line – signal (trail) is looped back to customer interface 13 Proprietary and Confidential IDU-RFU Interface Monitoring Before you leave the site. perform the Loopbacks we have just covered to narrow down the probable causes for the errors 14 Proprietary and Confidential Page 218 7 . make sure that these registers are elapsed (zero)\ When one of these registers is different than 0 – you need to report to your support representative In such case.

3/7/2010 Thank You ! training@ceragon.com 15 Page 219 8 .

3.3/7/2010 FibeAir ® IP-10 G-Series EMS Backup Maintenance Agenda In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system using: 1. 2 Configuration File Unit Information File FTP Server Proprietary and Confidential Page 220 1 . 2.

etc. etc. ATPC. VLAN membership. TDM. • Interface Configuration: PDH. 3 Proprietary and Confidential Unit Information File The Unit Information file stores the following parameters: • Date & Time •Daylight Saving Time properties • System name and other ID parameters • Measuring properties (voltage. RSL. • Switch Mode and database: Port types. TSL. Ethernet Switch •Trail Configurations • Service OAM • Security: user accounts. login properties. temperature) • Accumulated Performance Monitoring logs • Serial numbers 4 Proprietary and Confidential Page 221 2 . etc.3/7/2010 Configuration File The Configuration file stores the following parameters: • License • External Alarms • SNMP Trap Destination • NTP Server Properties • Radio properties: Frequency.

3/7/2010 Local FTP Server Uploading or Downloading the CFG & Unit files requires an FTP Server As long as your IP-10G communicates with the server. its location is irrelevant EMS PC with local FTP Server installed 5 Proprietary and Confidential Remote FTP Server You may assign a remote server to host the configuration and unit files EMS PC Remote FTP Server 6 Proprietary and Confidential Page 222 3 .

Make sure you are familiar with your FTP Root Directory: this is where the files are stored (software versions. Examples for SW packages Examples for CFG & Unit Files 7 Proprietary and Confidential Configure your FTP Server Properties 1 2 8 Proprietary and Confidential Page 223 4 .3/7/2010 FTP Root Directory Every Server has its own properties. CFG & Unit).

3/7/2010 Upload / Download using standalone IP-10G 9 Proprietary and Confidential Uploading the CFG File (IP-10G to Server) Click “Create Archive” to allow the IP-10G zipping all parameters into one file 10 Proprietary and Confidential Page 224 5 .

3/7/2010 Uploading the CFG File (IP-10G to Server) Wait till task is successfully completed 11 Proprietary and Confidential Uploading the CFG File (IP-10G to Server) Next step: Click “Upload Archive” to allow the IP-10G transferring the zipped file to your server 12 Proprietary and Confidential Page 225 6 .

3/7/2010 Uploading the CFG File (IP-10G to Server) Wait till task is successfully completed 13 Proprietary and Confidential Check your FTP Root Directory This is your copy of the configuration file You may place it now in the dedicated folder (Configuration Files) 14 Proprietary and Confidential Page 226 7 .

3/7/2010 Uploading the CFG File (IP-10G to Server) Follow the same steps to upload the Unit Information file: 1 15 2 Proprietary and Confidential Check your FTP Root Directory This is a copy of your Unit Information file 16 Proprietary and Confidential Page 227 8 .

you will need to restart the system for changes to take place Please note – if the file does not exist in the root directory action will fail ! 1 17 2 Proprietary and Confidential Upload / Download in a shelf 18 Proprietary and Confidential Page 228 9 .3/7/2010 Downloading the CFG File (Server IP-10G) Follow the same steps to download the CFG file When download completes successfully.

you need to upload them to your FTP directory 19 Proprietary and Confidential Shelf Backup: Creating the Nodal Shelf Backup First you need to create the CFG files. First you need to create the CFG files of all slots 2. To do so. After creating the CFG files. select the unit(s) and click the relevant “Backup” button 20 Proprietary and Confidential Page 229 10 .3/7/2010 Shelf Backup: Creating the Nodal Shelf Backup Uploading CFG files from a shelf is similar to a standalone process 1.

select the unit number and click this button 22 Proprietary and Confidential Page 230 11 .3/7/2010 Shelf Backup: Upload from IP-10G to Server Next. click “Upload Archive(s)” and the file(s) will be uploaded to your FTP root directory 21 Proprietary and Confidential Shelf Backup: Download from Server to IP-10G To download a file to a certain slot.

3/7/2010 Unified Unit Information File A unified file is created for all stacked units Upload & Download action are identical to a standalone unit 23 Proprietary and Confidential Checking Backup History & Status Click here to see the backup history 24 Proprietary and Confidential Page 231 12 .

1.3/7/2010 Checking Backup History & Status 25 Proprietary and Confidential Setting the unit back to Factory Defaults You can restore your system to factory defaults You may also set the IP address to factory default address (192.168.1) 26 Proprietary and Confidential Page 232 13 .

3/7/2010 Thank You ! training@ceragon.com 27 Page 233 14 .

Downgrade 2 Proprietary and Confidential Page 234 1 .4/21/2010 FibeAir ® IP-10 G-Series EMS Software Upgrade Agenda FTP Properties Standalone SW Download Standalone SW Upgrade Nodal IDU SW Download Nodal IDU SW Upgrade Rollback VS.

4/21/2010 Local FTP Server SW files are located on an FTP Server (local or remote) Configure the FTP properties to point to your local server root directory (Make sure RD/WR permissions are enabled) EMS PC with local FTP Server installed 3 Proprietary and Confidential Remote FTP Server If you do not have an FTP Server installed locally on your PC. EMS PC Remote FTP Server Proprietary and Confidential 4 Page 235 2 . you may configure an IP address of a remote server.

4/21/2010

FTP Root Directory
Make sure you are familiar with your FTP Root Directory: this is where the files are stored (software versions, CFG & Unit).

Examples for SW packages

5

Proprietary and Confidential

Configuring FTP Server Properties

1

2

6

Proprietary and Confidential

Page 236

3

4/21/2010

Configuring FTP Server Properties

Type the location of the software package: • FTP IP address • SW folder (when relevant, in this example “66253”) Type the username & Password
(You may log in using CMD window to verify settings are correct)

7

Proprietary and Confidential

SW Upgrade on a standalone IP-10G

8

Proprietary and Confidential

Page 237

4

4/21/2010

Standalone SW Download
Click on the “Download” button and wait till “Succeeded” message is displayed (next slide)

You may view at any time the download process by clicking on the Log Icon

9

Proprietary and Confidential

Standalone SW Download
Download was successfully completed, you may proceed to upgrade the IDU

10

Proprietary and Confidential

Page 238

5

4/21/2010

Download completed – Upgrade delayed
In case Upgrade is scheduled for later moments, the Version table will display the following status:

11

Proprietary and Confidential

Standalone Upgrade
Click on the “Upgrade” button. When upgrades completes successfully, the IDU will restart automatically.

You may view at any time the upgrade process by clicking on the Log Icon

12

Proprietary and Confidential

Page 239

6

4/21/2010

SW Upgrade in a shelf (Node)

13

Proprietary and Confidential

Shelf Configuration
1. Make sure your main unit (Slot 1) is upgraded with the latest version 2. If not, it is recommended to upgrade the main unit as a standalone IDU 3. Verify you are familiar with the slot number(s)

Slot 6 Slot 5

Slot 4 Slot 3 Slot 2 Slot 1

14

Proprietary and Confidential

Page 240

7

4/21/2010 Shelf SW Download Configure the FTP properties if needed Click on the “Download” button and wait till “Succeeded” message is displayed You may view at any time the download process by clicking on the Log Icon 15 Proprietary and Confidential Shelf SW Upgrade Select the target slot and then click the “Upgrade” button Or – click “Upgrade All” Please note – 1. The slot numbers are not according to physical allocation in the shelf 3. Failures may occur due to wrong FTP configurations. The number of slots depend on actual configuration 2. IDU(s) will reset automatically upon successful upgrade 16 Proprietary and Confidential Page 241 8 . unstable network connection or missing files 4.

Downgrade 18 Proprietary and Confidential Page 242 9 .4/21/2010 Shelf SW Upgrade Select the target slot and then click the “Upgrade” button Or – click “Upgrade All” Please note – 1. unstable network connection or missing files 4. IDU(s) will reset automatically upon successful upgrade 17 Proprietary and Confidential Rollback VS. The slot numbers are not according to physical allocation in the shelf 3. Failures may occur due to wrong FTP configurations. The number of slots depend on actual configuration 2.

25 2.8.35 4 3 Downgrade Rollback does not revert previous “Downgrade” operation ! It rolls back IDU version 1 step back (prior to last Upgrade) 19 Proprietary and Confidential Thank You ! training@ceragon.8.com 20 Page 243 10 .8.32 Rollback 2.31 2.4/21/2010 Rollback 1 Upgrade #1 2 Upgrade #2 2.8.

3/7/2010 FibeAir ® IP-10 G-Series EMS Security Configuration Proprietary and Confidential Agenda • SSH • HTTPS • SFTP • Users & Groups • Password 2 Proprietary and Confidential Page 244 1 .

• Key exchange algorithm is RSA. • Supported Encryptions: aes128-cbc.3/7/2010 Security Configuration Update first FTP connection Proprietary and Confidential SSH – Secured Shell • SHHv1 and SSHv2 are supported. • • • arcfour128. hmacmd5-96' The server will authenticate the user based on “user name” and “password”. MAC (Message Authentication Code): SHA-1-96 (MAC length = 96 bits. Server authentication will be based on IP-10’s "public key". • SSH protocol is always be operational. • SSH protocol can be used as a secured alternative to "Telnet". key length = 160 bit). aes256-cbc. Supported MAC: hmac-md5. hmac-sha1-96. aes128-ctr. Admin user can choose whether to disable • "Telnet" protocol. blowfish-cbc. Server timeout for authentication: 10 min. hmac-sha1. aes192-cbc. arcfour256. aes192-ctr. 3des-cbc. Proprietary and Confidential Page 245 2 . which will be "enabled" by default. This value cannot be configured. arcfour. hmacripemd160. cast128-cbc. aes256-ctr. Number of failed authentication attempts is not limited.

In any case of failure. Proprietary and Confidential Page 246 3 . “failed”. • 3. Using CA certificate (Optional steps) i. Enable WEB CA certificate. an appropriate error message will appear. • 2. Download the IDU CA's certificate. Download the IDU certificate.3/7/2010 HTTPS In order to manage the system using HTTPS protocol. Create the IDU certificate based on IDU's public key. ii. Click “Upload Public Key” The status of the “upload” operation can be monitored. “success”. “in-progress”. • 4. The returned status values are: “ready” (default). user should follow the following steps: • 1. Set WEB Protocol parameter to HTTPS Proprietary and Confidential HTTPS – Public Key Upload The public key should be uploaded by the user for generating the IDU’s digital certificate: • • • • The upload will be done by using FTP/SFTP (s The public key file will be in PEM format.

Proprietary and Confidential HTTPS – Certificate Download (2) After setting the above configurations. Determine certificate file format (“Admin” privilege): Format could be PEM (for PEM formatted file). the following steps must be fulfilled for each file type: Determine certificate file name (“Admin” privilege). PEM and DER certificate formats are supported. the WEB server should be restarted (“Admin” privilege). Determine whether to include the CA certificate into the WEB configuration definitions. This is an optional configuration and is recommended for adapting the WEB interface to all the WEB browsers applications (“Admin” privilege). To apply the new certificate. a “Download Certificate” command should be issued. or DER (for DER formatted file). The returned status values are: “ready”. “failed”. Determine the certificate file type (“Admin” privilege): “Target Certificate” (for WEB server digital certificate) or “Target CA certificate” (for WEB CA digital certificate).3/7/2010 HTTPS – Certificate Download (1) Download IDU server certificate and/or IDU CA certificate (optional) : • • • Download is done by using FTP/SFTP. WEB server will be automatically restarted when it is configured to HTTPS. “in-progress”. The status of the download operation can be monitored. “success”. It is recommended to “refresh” the WEB page when certificate download operation is terminated. Proprietary and Confidential Page 247 4 . For downloading the IDU server certificate and/or IDU's CA certificate to the system.

Upload the unit info. • Certificate public key is compatible to IDU’s private key. for security reasons (unsecured unit should not be able to override security parameters of secured unit).3/7/2010 HTTPS . Upload public key. While switching to HTTPS mode. the following must be fulfilled: • WEB server certificate file exist. Download certificate files. the operation will return an appropriate error indication. SW download Proprietary and Confidential Page 248 5 . • If one of the above tests fails. Proprietary and Confidential SFTP (Secure FTP) SFTP can be used for the following operations: • • • • • Configuration upload/download. Note: This parameter is NOT copied when “copy to mate” operation is initiated.Activation WEB interface protocol can be configured to be HTTP (default) or HTTPS (cannot be both at the same time). • Open WEB Browser and type the URL ”https:\\<IP of target IDU>”.

GROUPS & PASSWORD Proprietary and Confidential Adding Users To add / edit users & groups click on the item as shown in the captured imaged (left) Click Add User to add new users… Proprietary and Confidential Page 249 6 .3/7/2010 USERS.

3/7/2010 Adding Users Proprietary and Confidential Adding Users New users will be required to change their password when they log in for the first time Proprietary and Confidential Page 250 7 .

Proprietary and Confidential Changing Password Good example: L00pBack – using capital letters. digits.3/7/2010 Changing Password A valid password should be a mix of upper and lower case letters. small letters and digits (zeros instead of “O”) Bad example: Loopback – missing digits or other characters Loopbacks – using more than 8 characters Proprietary and Confidential Page 251 8 . and other characters. An upper case letter that begins the password and a digit that ends it do not count towards the number of character classes used. You can use an 8 character long password with characters from at least 3 of these 4 classes.

3/7/2010 Thank You ! training@ceragon.com 17 Page 252 9 .

or pole Support for the same FibeAir product line used for indoor deployment • • • • • • Installation anywhere • Passive heat exchange . wall.no need for air conditioning systems External battery backup solution with enclosure (Optional) Heating unit for frigid environments © CERAGON NETWORKS LTD.6/13/2010 FibeAir Outdoor Enclosure Same Advanced Features in a Compact. Proprietary and Confidential information of Ceragon Networks Ltd Page 253 1 . Zero Footprint Casing FibeAir Outdoor Enclosure Key Features • • Full wireless solution at zero footprint Outdoor Enclosure for IDUs • • • 5RU/19’’ rack space outdoor enclosure 4RU for Traffic IDUs. 1RU for Panels and cables IP-10/IP-10G Series 1500R Roof top.

interfaces. and customer needs • IP-10 & 1500R with full networking functionality • General configurations – • 1+0 & 1+1 HSB 2+0 4+0 HSB.Versatile installation options saves site lease costs Power .6/13/2010 Outdoor Enclosure – Reduced OPEX & CAPEX • Compact size and modular • • • • • • • • Zero footprint . wall or roof-top installation Site l Sit lease or acquisition savings i iti i Installation . Proprietary and Confidential information of Ceragon Networks Ltd Outdoor Enclosure – Units configurations • All configurations. space and air conditioning Easier maintenance • Lower overall costs • IP-55 certification for water and dust proofing Elegant. 2+0. Proprietary and Confidential information of Ceragon Networks Ltd Page 254 2 . 4+0… • TDM XC / grooming • Packet switch solution • All interfaces • N*E1/T1 • N*Ethernet interfaces (FE.Saves power.saves ground space at central offices / communication rooms All outdoor nodal or ring configurations Pole-mount.Instant wireless site set-up. Easier to Install & Maintain Solution © CERAGON NETWORKS LTD. One man installation Rent . GbE) • STM-1 © CERAGON NETWORKS LTD.

Class 4.1 (Non-weather protected locations) • IEC 529 IP. part 15.55 protected cabinet ( p (dust & water) ) • Operating Air Temperature -40 to +55degC • Safety and Electromagnetic Standards (EMC) Compliance • UL60950-1 (Safety) • FCC 47 CFR. Proprietary and Confidential information of Ceragon Networks Ltd Environmental Recommendation support • Environmental Standards Compliance • GR-487-CORE • ETSI EN 300 019-1-4.6/13/2010 Outdoor Enclosure – Practical experience • • • • • • • • • External alarm inputs for external fans and door opening Sunshade for solar radiation protection Door stopper Installation h k I t ll ti hooks Documentation pocket Door Lock Pole mount option or wall mount option Light weight Battery Backup option © CERAGON NETWORKS LTD. class B (EMC) • GR-1089-CORE (Safety & EMC part of NEBS) • CSA CS22.2 60950-1 (Safety) • ETSI EN 301 489-1 • ETSI EN 301 489 4 (EMC) 489-4 • CB IEC 60950-1 (Safety) © CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd Page 255 3 .

under pressure Temporary immersion. 15 cm to 1m Protection against water No N special protection i l t ti Water dripping/falling vertically Water sprayed at an angle (up to 15º degrees from the vertical) Spray water (any direction up to 60º degrees from the vertical) Spray water from all directions. >12 Small foreign bodies. >1mm g . 5 Complete protection. commercial.Foreign Bodies Protection. dust deposits are permitted. Complete protection Dust-proof 6 7 © CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd Protection from condition Page 256 4 . (limited ingress permitted) 7 8 Permanent Immersion. Proprietary and Confidential information of Ceragon Networks Ltd IP protection classes that mean ? IP 55 – What does Second Characteristics Numeral IP XY . (limited ingress permitted) Condensation/Light rain Light rain with wind Heavy rainstorm Splashing Hose down. Solids Index Protection against Human/Tool Contact No special protection Back of hand.6/13/2010 IP protection classes that mean ? IP 55 – What does First Characteristics Numeral IP XY . residential Hose d H down. eg.Water Protection. Ship decks Immersion in tank For use on Titanic recovery vehicle 8 © CERAGON NETWORKS LTD.5mm Tools and wires etc with a thickness >1mm Large foreign bodies. >2. diam. diam. but their (limited ingress permitted) volume must not affect the function of the unit. >50mm Medium-sized foreign bodies. Fist Finger Tools and wires etc with a thickness >2.5mm Protection against solid objects (foreign bodies) 0 1 2 3 4 Granular foreign bodies. diam. (limited ingress permitted) Low pressure water jets from all directions. Liquids Index 0 1 2 3 4 5 6 High pressure jets from all directions. diam. Dust protected.

straight IP-10 E1 Outdoor RJ45 cable 15m.45M IP10-OE-CBL-ETH-RJ45-15m CBL-OE-E1-RJ45-RJ45-15m CBL-OE-T1-RJ45-RJ45-15m IP10-OE-CBL-ETH-RJ45-XED-15m CBL-OE-E1-RJ45-RJ45. Cross IP-10 E1 Outdoor RJ45 cable 15m.D-9F.XED-15m CBL-OE-T1-RJ45-RJ45.6/13/2010 Outdoor Enclosure Design . Cross IP-10 T1 Outdoor RJ45 cable 15m.external D W H • • General Dimensions • H: 18.XED-15m OE-Sealing-Compound-1.45M IP-10 ETH Outdoor RJ45 cable 15m. Proprietary and Confidential information of Ceragon Networks Ltd Accessories list Marketing Model OE-Enclosure OE-Pole-Installation OE-Heater OE H t OE-Ext-Fans OE-Fan-Drawer-Kit OE-Ext-Power-CBL-15M ODE-NTYPE-JUMPER-CBL-3M OE-Ext-Alarms-CBL-0. Proprietary and Confidential information of Ceragon Networks Ltd Page 257 5 . 0.5 in / 47 cm • W: 24 in / 61 cm • D: 17 in / 43 cm Weight • 55 Pounds / 25Kg © CERAGON NETWORKS LTD. Ferrule-Ferrule 15m Outdoor Enclosure IF Jumper Cable 3m Outdoor Enclosure External alarms cable. straight IP-10 ETH Outdoor RJ45 cable 15m.5M FA Outdoor Enclosure FA Outdoor Enclosure Pole installation FA Outdoor Enclosure heater O td E l h t FA Outdoor Enclosure external fans Outdoor Enclosure Fan Drawer Kit Outdoor environment power cable (-48V). D-9M . Enclosure space should be taken into consideration © CERAGON NETWORKS LTD. straight IP-10 T1 Outdoor RJ45 cable 15m. Cross Outdoor Enclosure sealing compound Marketing Description (*) all IP-10 standard accessories can be used.

6/13/2010 Thank You Page 258 6 .

FibeAir® IP-10 License Management Guide Part ID: BM-0139-0 Doc ID: DOC-00019183 Rev a.00 November 2008 Page 259 .

4 Oak Tree Park. or distributed without prior written authorization of Ceragon Networks Ltd. UK Tel: 44-(0)-1527-591900 Fax: 44-(0)-1527-591903 Email: infoeuro@ceragon. EtherAirTM. USA Tel: 1-201-845-6955 Toll Free: 1-877-FIBEAIR Fax: 1-201-845-5665 Email: infous@ceragon. Registered TradeMarks Ceragon Networks® is a registered trademark of Ceragon Networks Ltd.com North American Headquarters: Ceragon Networks Inc. TradeMarks CeraMapTM. Israel Tel: 972-3-645-5733 Fax: 972-3-645-5499 Email: info@ceragon. NJ 07652. 24 Raoul Wallenberg St. modified. No part of this publication may be reproduced.com www.ceragon. EncryptAirTM. or use of this document or equipment supplied with it. Tel Aviv 69719. Burnt Meadow Road North Moons Moat. Paramus. Statement of Conditions The information contained in this document is subject to change without notice. CeraMonTM. ConfigAirTM. Ceragon Networks Ltd. and MicroWave FiberTM. CeraView® is a registered trademark of Ceragon Networks Ltd.com APAC Headquarters Ceragon Networks (HK) Ltd. Singapore RO Level 34 Centennial Tower 3 Temasek Avenue Singapore 039190 Tel . Corporate Headquarters: Ceragon Networks Ltd. 10 Forest Avenue. Other names mentioned in this publication are owned by their respective holders.Notice This document contains information that is proprietary to Ceragon Networks Ltd. Redditch. performance. Copyright © 2008 by Ceragon Networks Ltd. All rights reserved.+ 65 6549 7886 Fax: +65 6549 7011 Page 260 . Worcestershire B98 9NZ. This document is provided as is. PolyViewTM. without warranty of any kind. shall not be liable for errors contained herein or for incidental or consequential damage in connection with the furnishing. FibeAir® is a registered trademark of Ceragon Networks Ltd. are trademarks of Ceragon Networks Ltd. Other names mentioned in this publication are owned by their respective holders. Information to User Any changes or modifications of equipment not expressly approved by the manufacturer could void the user’s authority to operate the equipment and the warranty for such equipment.com European Headquarters: Ceragon Networks (UK) Ltd.

...................................................................................................... 25 Page 261 ......................................................... 1 How to use the System..................................................................................................................................................................................................................................................... 1 Getting Started .......... 5 Managing the License ............. 23 Generating Reports ............................................................. 16 Settings .......................................................................................................................................................................................................... 6 Working with Devices .................. 6 Working with Licenses..........................Contents General ..........

and then click Login.General This guide explains how to work with the FibeAir® IP-10 web based License Management System.aspx 2. Note the following user name rules: FibeAir® IP-10 License Management System Page 262 1 .83/LMManage/login.99. Getting Started To start the management application: 1. To log in to the system. go to the address http://80.74. The system enables authorised users to obtain license-related information and perform license-related operations. enter your user name and password. In your web browser.

The next four digits after the first five should be numbered starting with 0001 for end users. the first five digits must be 00001. End User (Customer option) . For OEM Users 3a. the number 000010001 would mean that Demo OEM end user 0001 is entering the system. who can be either another OEM customer or Demo OEM. the number 000000001 would mean that non-Demo OEM user 0001 is entering the system.The OEM end user.The administrator can assign licenses and devices to customers. The user can only view his/her own devices (that were assigned to that user) and licenses. the user can only generate licenses based on the available device database. For users other than Demo OEM. If you enter as an OEM user. the user name must start with 00000. In this mode of operation. For example. For example. the OEM admin can assign licenses/devices to end users (including themself) and can generate license keys for the devices. or the OEM itself can generate keys for self use. the following web page appears: One of two modes can be selected: Administrator (Demo OEM option) .For Demo OEM. FibeAir® IP-10 License Management System Page 263 2 . In this mode.

After you select the operating mode. the following web page appears: CeraView® User Guide Page 264 3 .End users that belong to that channel cannot see devices or licenses that belong to the OEM or other customers.

In this case. FibeAir® IP-10 License Management System Page 265 4 . This will be done to allow operations for devices that the user sent to his/her customers.For Non-OEM Users 3b. the system identifies the user as a channel/OEM user and will display a drop-down list to enable entry under the user's name. If you enter as a non-OEM user the following web page appears: Note that a channel or OEM user can also enter as one of their customers.

Simply click the item you want within a menu group (such as the Devices or Settings group). At the top of the web page for the item. use the tabs at the top (Devices. you can click Print to send the contents of the page to the printer.) to obtain a list of items for the particluar group.How to Use the System The menus that you can select from are grouped according to their functions. Note that in any web page. Instead. When you select an item within a group. you do not have to return to the main web page. From within an item web page. a line appears with buttons that you can click to perform a particular operation. Licenses. CeraView® User Guide Page 266 5 . the relevant web page will open with the details concerning that item. etc.

such as to obtain information about the devices included in your license. select All Devices. Working with Devices The Devices group includes items that can be selected to perform device-related operations.Managing the License The following sections describe the system menus and options that you can select to obtain information concerning your licenses and to perform license-related operations. or import a device list from another source. Device List To obtain a list of devices: In the Devices group. or click the Devices tab at the top of the web page (if it appears). The following web page appears: FibeAir® IP-10 License Management System Page 267 6 .

Click Device ID for a more deatiled description of the device. using the drop-down list in the Assign to Customer field. The list includes all the devices you purchased from Ceragon. the Generate Keys button is replaced with Assign to Customer . In this page. you can assign the current ID to an end user.Note that for OEM users. CeraView® User Guide Page 268 7 .

To clear the criteria you selected.Search for Devices In the main device list web page. click Clear. FibeAir® IP-10 License Management System Page 269 8 . you can click Search registered in the system. to locate a particular device that is Select the criteria (filters) you want for the search. and then click Search.

Import Devices In the toolbar. click Import. CeraView® User Guide Page 270 9 . The device list file must be a text file with the following columns: Device ID Customer Country Region / Network Link Side In the Device ID column. use only upper case letters. in the toolbar. Once you locate and select the file. Adding and Deleting Devices To add a new device. click New . You will be prompted to locate the file with the device list. click Import to import a list of devices from an external source.

Generating Keys To generate license keys for one or more devices. select the devices in the main list by marking the checkboxes beside them.Enter a valid device ID in the field and click Save. select the device in the list. The list will be saved in an Excel file with the extension csv (Comma Separated Values). In this web page. FibeAir® IP-10 License Management System Page 271 10 . only the devices you selected will appear. To delete a device. . and click Delete Exporting a Device List To export a device list to a file. click Export . and click Generate Keys The following web page appears: . The device will be added to your device list.

The All Relevant Licenses area shows only the licenses that are common to all devices you selected (meaning their lowest common denominator). Upgrade 50->100 Mbps Radio Cap. Upgrade 50->200 Mbps Radio Cap Upgrade 50->300 Mbps Radio Cap Upgrade 50->400 Mbps Radio Cap. Upgrade 50->150 Mbps Radio Cap. Upgrade 25->200 Mbps Radio Cap Upgrade 25->300 Mbps Radio Cap Upgrade 25->400 Mbps Radio Cap. Upgrade 10->25 Mbps Radio Cap. Upgrade 10->100 Mbps Radio Cap. Upgrade 10->150 Mbps Radio Cap Upgrade 10->200 Mbps Radio Cap Upgrade 10->300 Mbps Radio Cap Upgrade 10->400 Mbps Radio Cap. Upgrade 100->200 Mbps Radio Cap Upgrade 100->300 Mbps Radio Cap Upgrade 100->400 Mbps Radio Cap. Upgrade 10->50 Mbps Radio Cap. Upgrade 150->200 Mbps Radio Cap Upgrade 150->300 Mbps Radio Cap Upgrade 150->400 Mbps Radio Cap Upgrade 200->300 Mbps Radio Cap Upgrade 200->400 Mbps Radio Cap Upgrade 300->400 Mbps CeraView® User Guide Page 272 11 . The current license types include the following: 1 = ACM 2 = Networking 3 = Capacity Upgrade The following tables list the current license possibilities: Capacity Upgrade License Type 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Description IP10-CAP-010 IP10-CAP-025 IP10-CAP-050 IP10-CAP-100 IP10-CAP-150 IP10-CAP-200 IP10-CAP-300 IP10-CAP-400 IP10-UPG-025-050 IP10-UPG-025-100 IP10-UPG-025-150 IP10-UPG-025-200 IP10-UPG-025-300 IP10-UPG-025-400 IP10-UPG-050-100 IP10-UPG-050-150 IP10-UPG-050-200 IP10-UPG-050-300 IP10-UPG-050-400 IP10-UPG-100-150 IP10-UPG-100-200 IP10-UPG-100-300 IP10-UPG-100-400 IP10-UPG-150-200 IP10-UPG-150-300 IP10-UPG-150-400 IP10-UPG-200-300 IP10-UPG-200-400 IP10-UPG-300-400 Name in License Management Site Feature disabled Radio Cap. Upgrade 25->50 Mbps Radio Cap. Upgrade 25->150 Mbps Radio Cap. Upgrade 25->100 Mbps Radio Cap. Upgrade 100->150 Mbps Radio Cap.

Once you select the licenses you want. If you select a capacity upgrade license and want to add a different capacity upgrade license. Important! You can only select one license from each category (ACM. you must first remove the first capacity upgrade license and then add the other one.ACM License Type 1 1 Value 0 1 IP10-ACM Description Name in License Managament Site Feature disabled ACM Networking (Metro Switch Enabled) License Type 2 2 Value 0 1 IP10-Metro Description Name in License Management Site Feature disabled Metro Switch To add a license for which you want to generate a key. After you confirm your selection. Capacity Upgrade). click Generate Keys. select the license in the All Relevant Licenses area and click Add to add it to the Selected Licenses area. Networking. the following example web page appears. FibeAir® IP-10 License Management System Page 273 12 .

CeraView® User Guide Page 274 13 . In the available list of devices. click Filter & Sort to customize the device list. as shown in the following example page. In the Select Customer field. use the drop-down list to choose the customer you want to assign the devices to. Click Show Available Devices for a list of devices you can choose from.Assigning Devices to a Customer For OEM users. you can click Assign to Customer at the top of the page. you can assign devices to other users by selecting Assign Devices to a Customer in the main web page Devices group. Or.

and select the list sort order (ascending or descending). click Confirm. After you click Go to generate the list. select the devices you want to assign to the user. and click Add to add them to the Assigned Devices list. When you complete the operation. In the confirmation page.You can specify the ID of the device you want to include in the list. in the Available Devices list. click Save. The following example page appears: FibeAir® IP-10 License Management System Page 275 14 .

CeraView® User Guide Page 276 15 . The device list page will appear with the updated information.Click Continue to go back to the device list page.

Working with Licenses In the Licenses group. and click Search again. select All Licenses. The following web page appears: The web page displays all the licenses you currently own. click Search. specify the criteria you want. or click the Licenses tab at the top of the web page (if it appears). To search for a particular license. Click the number in the Qty Assigned column for a list of licenses assigned to customers. FibeAir® IP-10 License Management System Page 277 16 .

CeraView® User Guide Page 278 17 .Click the number in the Qty Generated column for a list of licenses used to generate keys.

FibeAir® IP-10 License Management System Page 279 18 .To generate license keys. To add a license for which you want to generate a key. Click Show Relevant Devices for a list of devices associated with the licenses you chose. select Generate Keys in the Licenses group in the main web page. or click Generate Keys in the web page that appears when you click the Licenses tab. select the license in the All Available Licenses area and click Add to add it to the Selected Licenses area.

To add a device for which you want to generate a key. and the database will be updated. The keys will be generated. click Generate Keys. as shown in the following example page. CeraView® User Guide Page 280 19 . Once you select the devices you want. select the device in the All Available Devices area and click Add to add it to the Selected Devices area.

FibeAir® IP-10 License Management System Page 281 20 .

CeraView® User Guide Page 282 21 .Assigning Licenses to a Customer For OEM users. use the drop-down list to choose the customer you want to assign the licenses to. In the Select Customer field. Click Show Available Licenses for a list of licenses you can choose from. you can click the Assign to Customer button at the top of the page. Or. you can assign licences to other users by selecting Assign Licenses to a Customer.

For Quantity to Assign. Click Save to save the license assigment information in the database. You can repeat this procedure more than once to add other license types. After you complete the filter options. For Quantity to Return. click the drop-down list and choose the license type (Capacity. click Add to add the licenses to the Assigned Licenses list. A page will appear informing you that the operation was successful. Networking). enter the amount of licenses you want to assign to that customer.In the Filter by Type field. For License Code. enter the amount of unused licenses you would like to return (if relevant). The maximum quantity is limited to the available quantity for the license you choose. In the page that appears. and the main license list will be updated with the information. FibeAir® IP-10 License Management System Page 283 22 . ACM. click Confirm to confirm the assignment. click the drop-down list and choose the license specifications.

to locate a particular user. Use the Search button at the top To define a new user. You can also access this item by clicking the Settings tab at the top of the page (if it appears). Managing Users Select the Manage Users item to define users and modify their properties. click New . the Settings group includes items you can select for system information and configuration.Settings In the main web page. The following page appears: CeraView® User Guide Page 284 23 .

To delete one or more users. Modifying your Profile In the main Settings page. enter the information in the fields. select the My Profile item to modify your personal information. FibeAir® IP-10 License Management System Page 285 24 . and click Delete . mark the checkboxes beside the users you want to delete. Modify the information as desired and click Save. Confirm your choice(s) in the page that appears and the users will be deleted. and then click Save.In this page. in the user list. The same page appears as that for a new user.

you can select All or Between. or click the Reports tab at the top of the page (if it appears).. or Open orders only. select Orders Report or Devices & Activations Report in the main web page. For Order Date. you can select a report to generate: an Orders report. you will need to specify the range of dates you want to include in the report. you can select All or Between. click Create Report. In the Include field. you can select All for all types of orders. Closed orders only. If you select Between. specify the range of order numbers you want to include in the report. or a Devices and Activations report. CeraView® User Guide Page 286 25 . For an Orders Report: For Order No. When you are done selecting the report criteria. If you select Between.Generating Reports In the main web page. To generate a report.

specify the range of activation dates you want to include in the report. click Create Report. you can select All or Between. For Activation Date. FibeAir® IP-10 License Management System Page 287 26 . When you are done selecting the report criteria. specify the range of device IDs you want to include in the report. you can select All or Between. If you select Between.For a Devices & Activations Report: For Devices. If you select Between.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->