Professional Documents
Culture Documents
ETX-5300A: Ethernet Service Aggregation Platform
ETX-5300A: Ethernet Service Aggregation Platform
OPERATION MANUAL
ETX-5300A
Ethernet Service Aggregation Platform
Version 1.0
ETX-5300A
Ethernet Service Aggregation Platform
Version 1.0
International Headquarters
RAD Data Communications Ltd.
Front Matter
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-5300A to be delivered hereunder
shall be free of defects in material and workmanship under normal use and service for a period
of twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-5300A, and in no event shall
RAD's liability exceed the purchase price of the ETX-5300A.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-5300A and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the ETX-5300A are provided "as is" and without warranty of any kind.
RAD disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-5300A shall
not exceed the sum paid to RAD for the purchase of the ETX-5300A. In no event shall RAD be
liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits,
even if RAD has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal waste at
the end of its life cycle. Upon termination of the units use, customers should
provide for its collection for reuse, recycling or other form of environmentally
conscientious disposal.
ii
Front Matter
Safety Symbols
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Warning
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near
the optical transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:
Before turning on the equipment, make sure that the fiber optic cable is
intact and is connected to the transmitter.
The use of optical devices with the equipment will increase eye hazard.
iii
Front Matter
Warning
In Finland, Norway and Sweden, the unit is restricted to installation by service personnel in
Restricted Access Locations only.
FI
NO
SE
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
iv
Front Matter
Connecting DC Power
The DC input to the equipment is floating in reference to the ground. Any single pole can be
externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
A 25A circuit breaker must be installed for each DC input. The circuit breaker must have a high
breaking capacity and must operate at short-circuit current exceeding 60A.
Before connecting the DC supply wires, ensure that power is removed from the DC circuit.
Switch off both circuit breakers. When connecting the DC supply wires, first connect the ground
wire to the corresponding terminal, then the positive pole and last the negative pole. Switch the
circuit breakers back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports
Safety Status
SELV
Front Matter
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Attention
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
vi
Front Matter
The equipment is designed to provide adequate protection against electro-static discharge (ESD).
However, it is good working practice to use caution when connecting cables terminated with
plastic connectors (without a grounded metal hood, such as flat cables) to sensitive data lines.
Before connecting such cables, discharge yourself by touching ground or wear an ESD preventive
wrist strap.
Avertissement
Achtung
vii
Front Matter
Franais
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des
risques potentiels de scurit pour l'oprateur ou le personnel de service,
quant l'opration du produit ou sa maintenance.
Avertissement
viii
Avertissement
Front Matter
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas,
une tiquette indiquant la classe laser ainsi que d'autres avertissements, le
cas chant, sera jointe prs du transmetteur optique. Le symbole
d'avertissement laser peut aussi tre joint.
Veuillez observer les prcautions suivantes :
ix
Franais
Front Matter
Franais
Connexion d'alimentation CC
L'entre CC de l'quipement est flottante par rapport la mise la terre. Tout ple doit tre mis
la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
Un coupe-circuit de 25A devrait tre install pour chaque entre CC de lquipement. Le coupecircuit devrait disposer dune capacit leve de coupure, et devrait fonctionner sur courant de
CC dpassant 60A.
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez les coupe-circuits dans le tableau desservant l'quipement et fixezles en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez les coupe-circuits en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.
Front Matter
Declaration of Conformity
Manufacturer's Name:
Manufacturer's Address:
ETX-5300A
Product Options:
All
Safety
EN 55022:2010
EN 55024:2010
EN 61000-3-2:2006
Electromagnetic compatibility (EMC) - Part 3-2: Limits Limits for harmonic current emissions (equipment input
current 16A per phase)
EN 61000-3-3:2008
Electromagnetic compatibility (EMC) - Part 3-3: Limits Limitation of voltage changes, voltage fluctuations and flicker
in public low-voltage supply systems, for equipment with rated
current 16A per phase and not subject to conditional
connection.
EN 60950-1:2006 +
A11:2009,
A1:2010
+ A12:2011
Information technology
General requirements.
equipment
Safety
Part 1:
Supplementary Information:
The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the
Low Voltage Directive 2006/95/EC, the R&TTE Directive 99/5/EC for wired equipment and the
ROHS Directive 2011/65/EU. The product was tested in a typical configuration.
Tel Aviv, 1 January 2013
xi
Front Matter
Glossary
Address
Agent
ANSI
APS (Automatic
protection switching)
AWG
Backhaul
Balanced
Bandwidth
Baud
Best Effort
Bipolar
Bit
Bridge
A device interconnecting local area networks at the OSI data link layer,
filtering and forwarding frames according to media access control
(MAC) addresses.
Buffer
Bus
Byte
Carrier
xii
Front Matter
CESoPSN
Channel
CIR (Committed
Information Rate)
Circuit Emulation
Service
New technology for offering circuit emulation services over packetswitched networks. The service offers traditional TDM trunking (at n x
64 kbps, fractional E1/T1, E1/T1 or E3/T3) over a range of transport
protocols, including Internet Protocol (IP), MPLS and Ethernet.
CLI
Clock
Congestion
Congestion Control
Data
Diagnostics
Digital
E1 Line
E3
Encapsulation
EIR
Ethernet
A local area network (LAN) technology which has extended into the
wide area networks. Ethernet operates at many speeds, including data
rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps
(Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
xiii
Front Matter
Ethernet OAM
Ethertype
Flow
Flow Control
Frame
Framing
At the physical and data link layers of the OSI model, bits are fit into
units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame, plus
information about the integrity of the frame. All other information,
such as network protocols and the actual payload of data, is
encapsulated in a packet, which is encapsulated in the frame.
Full Duplex
G.703
Gateway
Impedance
Interface
IP Address
J1
Jitter
L2CP
xiv
Front Matter
Laser
Latency
The time between initiating a request for data and the beginning of
the actual data transfer. Network latency is the delay introduced
when a packet is momentarily stored, analyzed and then forwarded.
Load Balancing
Loading
Loopback
Manager
Mark
Master Clock
The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
Modular
Multiplexer
Network
Node
NodeB
NTP
xv
Front Matter
Packet
Parameters
Parameters are often called arguments, and the two words are used
interchangeably. However, some computer languages such as C define
argument to mean actual parameter (i.e., the value), and parameter
to mean formal parameter. In RAD CLI, parameter means formal
parameter, not value.
Physical Layer
Policing
A method for verifying that the incoming traffic complies with the
users service contract.
Polling
See Multidrop.
Port
Prioritization
Also called CoS (class of service), classifies traffic into categories such
as high, medium, and low. The lower the priority, the more drop
eligible is a packet. When the network gets busy, prioritization
ensures critical or high-rated traffic is passed first, and packets from
the lowest categories may be dropped.
Prompt
Protocol
Pseudowire
Queuing
Q-in-Q
See MAC-in-MAC.
RADIUS (Remote
Authentication Dial-In
User Service)
xvi
Front Matter
Router
Routing
The process of selecting the most efficient circuit path for a message.
Scalable
Single Mode
SAToP
SONET (Synchronous
Optical Network)
Space
SVI
A logical port used for binding flows to bridge ports, router interfaces
or Layer-2 TDM pseudowires
Sync
Syslog
T1
T3
Telnet
xvii
Front Matter
Throughput
Timeslot
Traffic Management
Traffic Policing
Traffic Shaping
A method for smoothing the bursty traffic rate that might arrive on an
access virtual circuit so as to present a more uniform traffic rate on
the network.
Trunk
VLAN-Aware
A device that is doing the Layer 2 bridging according to the VLAN tag
in addition to the standard bridging parameters. A VLAN-aware device
will not strip or add any VLAN header.
VLAN Stacking
A technique that lets carriers offer multiple virtual LANs over a single
circuit. In essence, the carrier creates an Ethernet virtual private
network to tunnel customer VLANs across its WAN; this helps avoid
name conflicts among customers of service providers who connect to
the carrier. Stacking works by assigning two VLAN IDs to each frame
header. One is a "backbone" VLAN ID used by the service provider; the
other one has up to 4,096 unique 802.1Q VLAN tags.
Zero suppression
xviii
1.
Notes
purchased.
Lock the wire latch of each XFP or SFP module by lifting it up until it clicks into
Connecting to a Terminal
To connect to AC power:
Connect each power cable first to the connector on the E5-PIM/AC module,
and then to the power outlet.
The unit turns on automatically upon connection to the mains, and the
PWR indicator lights up.
To connect to DC power:
1. Strip 7 mm (1/4 inch) of insulation from the leads.
Caution
Pay attention to polarity. For each source, connect the positive lead first, and the
negative lead second.
Refer to the Connection of DC Mains section at the beginning of this manual.
2. Use a narrow blade screwdriver to release the terminal screw.
3. Push the lead into the terminal up to its insulating sleeve.
4. When the lead is in position, fasten the screw to secure the lead.
5. Verify that the lead is securely held by pulling on it lightly.
6. Insert the plug into the socket of the E5-PIM/DC module.
7. Secure the plug by tightening the two screws.
8. Connect the cable to the DC power source.
2.
8. To log in, enter your user name (su for full configuration and monitoring
access) and your password.
9. The device prompt appears:
ETX-5300A#
You can now type the necessary CLI commands.
Note
RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud
rate (9.6 kbps) to 115.2 kbps.
11. Configure the PC communication port parameters to a baud rate of
115.2 kbps to match the new ETX-5300A setting.
12. Continue with product configuration.
Access group
#*******************************Adding_SVI***********************************
config port svi 99 router
exit all
#**********************************End***************************************
#***************************Adding Classifier_Profiles***********************
config flows classifier-profile classall match-any
match all
exit all
config flows classifier-profile classutg match-any
match untagged
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
config flows flow mng_in
classifier classutg
ingress-port mng-ethernet main-a/0
egress-port svi 99
no shutdown
exit all
config flows flow mng_out
classifier classall
ingress-port svi 99
egress-port mng-ethernet main-a/0
no shutdown
exit all
#**********************************End***************************************
#*********************Configuring_Router_Interface***************************
configure router 1 interface 1
address 172.18.219.116/24
bind svi 99
no shutdown
exit
static-route 0.0.0.0/0 address 172.18.219.1
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_View/Mask/Type************************
configure management snmp
view internet 1
mask 1
type included
no shut
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_Access_Group************************
configure management snmp
access-group initial usm no-auth-no-priv
context-match prefix
exit all
#**********************************End***************************************
#**************************Configring_SNMP_Traps*****************************
configure management snmp
target-params p
message-processing-model snmpv3
version usm
security name initial level no-auth-no-priv
no shutdown
exit
target a
target-params p
tag-list unmasked
address udp-domain 172.17.176.35
no shutdown
exit
notify unmasked
tag unmasked
no shutdown
exit all
#**********************************End************************************
3.
Saving Configuration
Type save in any level to save your configuration in startup-config.
exit all
file copy startup-config user-default-config
4.
Verifying Connectivity
Verifying Connectivity
5.
Configuring Services
Configuring Services
Contents
Chapter 1. Introduction
1.1
1.2
1.3
1.4
2.1
Table of Contents
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13
2.14
2.15
2.16
2.17
2.18
2.19
2.20
2.21
Chapter 3. Operation
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
ii
Table of Contents
iii
Table of Contents
5.2
5.3
5.4
5.5
Chapter 6. Ports
6.1
iv
6.2
6.3
Table of Contents
Table of Contents
6.4
6.5
6.6
Chapter 7. Resiliency
7.1
7.2
vi
7.3
7.4
Table of Contents
Chapter 8. Networking
8.1
vii
Table of Contents
8.2
8.3
8.4
8.5
8.6
viii
8.7
8.8
8.9
Table of Contents
ix
Table of Contents
9.2
Table of Contents
xi
Table of Contents
xii
Table of Contents
Installing the New Software Release File from the Flash Disk........................................... 12-5
Confirmation of Software Application File ........................................................................ 12-6
Displaying Software Upgrade Status ................................................................................ 12-7
12.5 Upgrading Software via the Boot Menu .............................................................................. 12-8
Starting Boot Manager ..................................................................................................... 12-9
Using the FTP Protocol ................................................................................................... 12-11
12.6 Verifying the Upgrade Results .......................................................................................... 12-13
12.7 Restoring the Previous Software Version.......................................................................... 12-18
xiii
Table of Contents
xiv
Chapter 1
Introduction
1.1
Overview
Product Options
ETX-5300A is available with the following interface cards:
Applications
In a typical service aggregation application, ETX-5300A concentrates SLA-based
traffic coming from RADs or third-party Ethernet NTUs. It performs class of
service differentiation through traffic editing, uses advanced rate policing and
shaping techniques to ensure service reliability and exact service level agreement
(SLA) management.
Overview
1-1
Chapter 1 Introduction
GbE
GbE
GbE
4/8 x E1/T1
Media
Converter
PSN
ETX-203AX,
ETX-36
FO
PE
ETX-205A
GbE
GbE
10GbE
ETX-2xxA
GbE/10GbE G.8032
Ring
GbE
ETX-5300A
TDM
STM-1/OC-3
ETX-2xxA
Core
Aggregation
First Mile
ETX-5300A
PCRF
GbE
MME
DSLAM
ETX-5300A
GbE,
10GbE
P-GW
DSL
G.8023v2
10GbE Ring
BTS/Node B
TDM
G.8023v2
10GbE Ring
S-GW
RNC
ETX-203AM
ETX-5300A
BSC
GbE, 10GbE
ETX
TDM
BTS/Node B
Features
ETX-5300A aggregates SLA-based business Ethernet, mobile backhaul and legacy
TDM services. It combines high-capacity aggregation and carrier-grade
performance, enabling cost optimization and freeing up expensive capacity at the
PE (provider edge). With efficient traffic management techniques, hardwarebased OAM and performance monitoring, carrier-grade service resiliency and
strong Timing over Packet capabilities, ETX-5300A represents a robust
multifunctional Ethernet service delivery platform.
1-2
Overview
Chapter 1 Introduction
E-Line (EPL and EVPL) for LAN-to-LAN, VoIP and IP-VPN connectivity, as well
as for storage and dedicated Internet access
E-LAN (EP-LAN and EVP-LAN) for multipoint Layer 2 VPN, transparent LAN
services and multicast networks
The 3U modular system features high port density for space-restricted facilities,
delivering up to 120 Gbps of user throughput via the following interfaces:
Two redundant main cards, each housing four 10GbE network ports
Forwarding Schemes
Traffic forwarding is performed using point-to-point (E-Line), bridge (E-LAN) or
static router mechanisms.
Overview
1-3
Chapter 1 Introduction
Synchronous Ethernet (Sync-E) master and slave clock support per ITU-T
G.8261-G.8266, with primary/secondary clock redundancy
1588v2 Precision Time Protocol master, transparent and slave clock with
hardware-based time-stamping as well as ToD (time of day) synchronization
1.2
Physical Description
Figure 1-3 shows a general front view of an ETX-5300A chassis. The ETX-5300A
chassis is modular, and has a height of 3U.
The chassis is intended for installation in 19-inch (ANSI) and ETSI racks using rack
mounting kits available from RAD (not shown in Figure 1-3), however it can also
be installed on shelves. Air intake and discharge vents are located on the side
walls.
1-4
Physical Description
Chapter 1 Introduction
Front Panel
The front side of the chassis has physical slots in which plug-in modules are
installed to obtain the desired equipment configuration:
The main and power inlet modules, and the fan tray, are always installed in
dedicated chassis slots, called system slots
GbE, 10GbE and SDH/SONET service modules are installed in the other chassis
slots (called I/O slots).
All the external connections are made to connectors located on the plug-in
modules.
Figure 1-4 shows typical ETX-5300A rear views, and identify the functions of the
various slots.
Main Cards
1
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
OUT
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
GPS
OUT
TOD
10MHz
ACT
E5-MC-4
20
FLT
11
LINK
ACT
1
E5-GBE-20
RMV
100/1000BASE-X
LINK
ACT
1
E5-GBE-20
LINK ACT
10/100/1000BASE-T
PWR
FLT
E5-PIM
FLT
CLK
PWR
RMV
FLT
ALARM
FAN
10/100/1000BASE-T
FLT
LINK 1
FLT
OC-3/STM-1
FLT
LINK 2
LOS
LOS
LINK 3
FLT
LOS
LOS
OK
20
FLT
LINK 4
RMV
E5-cTDM-4
TEST
LED
RMV
1
E5-GBE-20
CRITICAL
MAJOR
MINOR
ACT
FLT
RMV
100/1000BASE-X
ETX-5300A
PRI
DCE
RAD
E5-PIM
FLT
CLK
RMV
LINK
11
20
FLT
11
PRI
CONTROL
DCE
LINK ACT
10/100/1000BASE-T
MNG
MNG ETH
1PPS
CONTROL
10MHz
ACT
E5-MC-4
1
MNG
MNG ETH
1PPS
FLT
F
I
L
T
E
R
PS-B
MAIN-B
MAIN-A
PS-A F
A
I/O 2
I/O 4 N
I/O 1
I/O 3
E5-FAN
Fan Tray
Physical Description
1-5
Chapter 1 Introduction
Rear Panel
The ETX-5300A rear panel may have mechanical extension for housing two AC
power supplies.
Available Modules
Table 1-1 lists the modules currently available for the ETX-5300A, their functions,
and ETX-5300A system capacity.
Function
E5-PIM/AC
E5-PIM/DC
E5-MC-4
E5-FAN
E5-GBE-20
E5-10GBE-2
E5-cTDM-4
1.3
Functional Description
System Structure
The ETX-5300A is a fully redundant 3U chassis for Ethernet aggregation
applications. The chassis accommodates four I/O cards and two main cards.
1-6
Four I/O cards are interconnected with the main card via the chassis
backplane in a star topology. Ethernet I/O cards include 20 GbE or two 10GbE
ports. The cards perform ingress traffic processing and management
(pre-forwarding scheduling and shaping).
TDM I/O cards include four channelized STM-1/OC-3 ports. The TDM cards
handle TDM pseudowire traffic.
Functional Description
Chapter 1 Introduction
System modules (power inlets and AC power supplies, fan module) provide
DC or AC power to the system and cool the chassis.
4 x 10GbE
4 x 10GbE
Main Card
Main Card
Timing
Packet
Processor
Power
Timing
Common
Logic
Packet
Processor
Common
Logic
GbE, 10GbE or
SDH/SONET
I/O Card
Fans
ETX-5300A
Main Card
The main card (E5-MC-4) performs three main functions:
Control functions:
Functional Description
1-7
Chapter 1 Introduction
Clock and timing generation functions: generates nodal clock signals for the
ETX-5300A system, locked to user-selected internal or external sources.
Only one main card is required per ETX-5300A chassis; however, the chassis has
two slots dedicated to this type of module. The second slot is used to install a
redundant main card, thereby providing a hot-standby capability for the ETX5300A 10GbE, system control and timing functions.
When a second card is installed, the two cards operate as an active/standby pair;
one module is the active card, and the other serves as a hot standby.
The four 10GB ports of the standby card can be used without any limitation,
exactly as the active main card ports.
Only the active card communicates with the management station/terminal and
actively manages the ETX-5300A system. The standby card is automatically
updated by the active card with all the configuration and status data, and
therefore the standby can take over at any time without disrupting system
operation. The standby card communicates only with the master module.
Moreover, the transmit line in the standby serial port connectors is disabled, to
enable physical connection in parallel (e.g., by means of a Y cable) to a
management facility.
4 x 10GbE
XFPs
Quad 10GbE
Physical
Interface
Packet
Processor
ToD/1 PPS
Timing
BITS/10 MHz
RS-232
CPU
10/100/1000BT
E5-MC-4 Card
Functional Description
Chapter 1 Introduction
10GbE Interface
ETX-5300A main cards provide four interfaces (10GBase-SR, 10GBase-LR,
10GBase-ER) for full duplex connection to 10GbE packet-switched networks. The
card supports IP and Ethernet networks, and is capable of processing data at wire
speed.
Each 10GbE port of the module has its own MAC address, and can be assigned its
own IP address for Layer-3 forwarding.
In addition to forwarding user data, the 10GbE interfaces of the E5-MC-4 cards
distribute synchronous Ethernet timing (master and slave mode).
Packet Processor
With 100 Gbps full duplex performance, the packet processor (PP) located on the
E5-MC-4 cards, serves as:
Main engine for point-to-point (E-Line), bridging (E-LAN) and routing (Layer3) forwarding schemes
Post-forwarding scheduler and shaper (see Figure 1-7, Figure 1-8 and
Figure 1-9)
Note
CIR/EIR
Shapers
SP 3
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2
WFQ 4
CIR
Shaper
WFQ 3
Up to 8
CIR
Shapers
Up to 8
WFQ 4
WFQ 5
WFQ 6
SP 1
SP 2
WFQ 7
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Functional Description
1-9
Chapter 1 Introduction
Level-1 SEs
SP 1
CIR/EIR
Shapers
SP 2
WFQ 1
WFQ 2
CIR/EIR
Shapers
SP 3
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 383
WFQ 4
WFQ 384
Up to 384
Up to 384
Up to 64
WFQ 2
CIR
Shaper
Up to 64
WFQ 1
CIR
Shapers
WFQ 2
WFQ 63
SP 1
WFQ 64
SP 2
SP 3
SP4
WFQ 1
WFQ 383
WFQ 2
WFQ 384
WFQ 3
WFQ 4
WFQ 2
CIR/EIR
Shapers
CIR/EIR
Shapers
SP 2
Level-2 SE
SP 3
WFQ 1
SP4
WFQ 2
WFQ 383
CIR
Shaper
WFQ 384
Up to 768
Up to 768
Up to 64
Up to 64
WFQ 1
WFQ 2
SP 1
WFQ 63
WFQ 64
SP 2
SP 3
SP4
WFQ 383
WFQ 384
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes
supported by ETX-5300A.
1-10
Functional Description
Chapter 1 Introduction
Management Subsystem
The main functions of the management subsystem located on the main card
module are as follows:
Telnet: by means of any host capable of IP communication with ETX5300A. The functions available under the Telnet protocol are similar to
those available from a supervisory terminal.
SSH: secure access using the SSH (Secure Shell) protocol, using any
standard SSH client utility running on a PC or laptop capable of IP
communication with ETX-5300A.
SNMP: ETX-5300A includes an internal SNMP agent that enables full SNMP
management by SNMP-based network management, for example, the
RADview family of management stations for element and network
management available from RAD.
Storage of configuration databases (factory-default, running, startup or userdefault). See Chapter 3 for explanation of startup procedure and different
types of configuration databases.
1-11
Chapter 1 Introduction
A real-time clock provides time stamps for all the collected information. The
real-time clock can be set either manually or automatically, using the NTP
(Network Time Protocol). A network operator can use NTP to periodically
synchronize the local equipment time within the managed network to the
accurate time provided by the worldwide network of NTP time servers, and
thus is able to reliably correlate alarm reports from different sources. To use
NTP, it is necessary to configure the IP address of the desired NTP server, and
select a time zone.
The performance statistics collected for the modules installed in the chassis
are also synchronized to the real-time clock.
Serial Port
The supervisory port of the ETX-5300A has a serial RS-232 asynchronous DCE
interface terminated in a 9-pin D-type female connector, designated CONTROL
DCE.
This port is connected directly to terminals using the CBL-DB9F-DB9M-STR cable
available from RAD.
1-12
Functional Description
Chapter 1 Introduction
Backplane
Bus
Power
20 x GbE
SFPs/RJ-45s
or
2 x 10GbE XFPs
Physical
Interface
Packet
Processor
Timing
CPU
Packet Processor
Packet processor (PP) located on the E5-GbE-20 and E5-10GbE-2 cards serves for
classification, CoS/color mapping, policing and pre-forwarding traffic management
(Figure 1-11).
Functional Description
1-13
Chapter 1 Introduction
CIR
Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2
WFQ 4
Up to 50
Up to 50
SP 1
SP 2
WFQ 49
SP 3
WFQ 50
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes
supported by ETX-5300A.
SDH/SONET Card
The E5-cTDM-4 card operates as a quad-port SDH/SONET terminal multiplexer for
the ETX-5300A chassis that terminates STM-1/OC-3 links and their overhead. The
module has four independent channelized STM-1/OC-3 ports, where each port is
capable of multiplexing up to 63 E1 or 84 T1 internal streams into one STM-1 or
OC-3 data stream. The card uses pseudowire emulation to deliver E1/T1 streams
over packet-switched networks (UDP/IP or Ethernet). Figure 1-12 illustrates the
E5-cTDM-4 card block diagram.
1-14
Functional Description
Chapter 1 Introduction
Backplane
Bus
Power
4 x STM-1/OC-3
SFPs
SDH/SONET
Mapper/
Framer
TDM
Pseudowire
Processor
Timing
CPU
E5-cTDM-4
STM-1/OC-3 Interfaces
The TDM interfacing subsystem provides interfaces to the TDM users equipment
or network. The physical STM-1/OC-3 ports support a wide variety of SFP
transceivers with optical interfaces for meeting a wide range of operational
requirements.
SDH Interface
The SDH interface provides physical STM-1 interfaces for direct access to the
Synchronous Digital Hierarchy (SDH) transmission cores at the STM-1 level
(155.520 Mbps), and also handle the TDM traffic flow between ETX-5300A
internal E1 ports, and the SDH network. Total module capacity is 252 E1 data
streams.
E1/T1 mapping to STM-1 is performed using the G.707 mapping scheme:
E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 > STM-1
T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1.
Functional Description
1-15
Chapter 1 Introduction
SONET Interface
SONET interface provides physical OC-3 interfaces for direct access to the
Synchronous Digital Hierarchy (SONET) transmission cores at the OC-3 level
(155.520 Mbps), and also handles the TDM traffic flow between ETX-5300A
internal T1 ports, and the SONET network. Total module capacity of 336 T1 data
streams.
T1 mapping to OC-3 is performed using the G.707 mapping scheme: T1 > VT1.5 >
VT group > STS-1 > OC-3.
Pseudowire Services
The pseudowire processing subsystem performs the conversion between the
circuit-switched (TDM) and packet-switched networks, using pseudowire
emulation technology. The main steps of the circuit emulation procedure are the
following:
The resulting packets are encapsulated in Ethernet frames and sent to the
main card for analyses and forwarding to the UDP/IP or Ethernet (MEF-8)
network.
Note
CESoPSN transports raw TDM data, that is, packets are formed by inserting a
user-specified number of complete TDM frames in the packet payload area.
Therefore, CESoPSN pseudowires can only be configured on framed ports.
The SAToP packet overhead is large, and therefore, for efficient bandwidth
utilization, the number of raw TDM bytes per packet should be as large as
possible.
Packetizing Considerations
The number of TDM bytes per frame affects several performance aspects:
1-16
Functional Description
Chapter 1 Introduction
The overhead depends on the packet structure: for example, for UDP/IP
networks the overhead is 50 bytes when using VLANs, and 46 bytes
without VLANs
For example, when using the payload size of 48 bytes, bandwidth utilization
efficiency is around 50%.
Mode
Delay
CESoPSN
N 0.125
PCT (ms) =
TS
Functional Description
1-17
Chapter 1 Introduction
Note
The deviations from the nominal transmission delay experienced by packets are
referred to as jitter, and the PDV is equal to the expected peak value of the jitter.
However, nothing prevents the actual delay from exceeding the selected PDV
value.
To compensate for deviations from the expected packet arrival time, each
pseudowire emulation module uses jitter buffers that temporarily store the
packets arriving from the PSN (that is, from the far end equipment) before being
transmitted to the local TDM equipment, to ensure that the TDM traffic is sent to
the TDM side at a constant rate.
For each pseudowire, the jitter buffer must be configured to compensate for the
jitter level expected to be introduced by the PSN; that is, the jitter buffer size
determines the Packet Delay Variation Tolerance (PDVT).
Two conflicting requirements apply:
Since packets arriving from the PSN are first stored in the jitter buffer before
being transmitted to the TDM side, TDM traffic suffers an additional delay.
The added delay time is equal to the jitter buffer size configured by the user.
The jitter buffer is filled by the incoming packets and emptied out to fill the
TDM stream. If the PSN jitter exceeds the configured jitter buffer size,
underflow/overflow conditions occur, resulting in errors at the TDM side:
A jitter buffer underrun occurs when no packets are received for more
than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is
automatically filled with a conditioning pattern up to the PDVT level in order to
compensate for the underrun. Then, the pseudowire packet processing
subsystem starts processing the packets and empty out the jitter buffer toward
the TDM side.
To minimize the possibility of buffer overflow/underflow events, two conditions
must be fulfilled:
1-18
The buffer must have sufficient capacity. For this purpose, the buffer size can
be selected by the user in accordance with the expected jitter characteristics,
separately for each pseudowire, in the range of 0 to 200 msec.
The read-out rate must be equal to the average rate at which frames are
received from the network. For this purpose, the read-out rate must be
continuously adapted to the packet rate, a function performed by the
adaptive clock recovery mechanism of each packet processor.
Functional Description
Chapter 1 Introduction
After the jitter buffer mechanism reaches a stable state, there may still be
temporary changes in network delay, which occur before the mechanism can
readjust. To provide the best possible user experience the user can specify how
to handle packets under such transient conditions:
By specifying that the handling will be sensitive to delay, the user instructs
the receiving end to automatically reset the jitter buffer when the buffer
remains at its high value for a long time (this introduces a long delay). As a
result, some packets are discarded, but for voice applications and under
normal conditions, this results in negligible voice degradation.
By specifying that the handling will be sensitive to data, the user instructs the
receiving end to do nothing until eventually an under- or overrun occurs, or
conditions return to normal. This achieves the best possible data integrity
(error correction, or higher protocols, may sometimes compensate for the
resulting problems).
Adaptive Timing
Each PDH port can use the adaptive timing mode to lock its transmit timing to the
clock signal associated with the payload carried by a user-specified pseudowire.
The adaptive clock recovery mechanism estimates the average rate of the
payload data received in the frames arriving from the packet-switched network.
Assuming that the packet-switched network does not lose data, the average rate
at which payload arrives will be equal to the rate at which payload is transmitted
by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order,
are replaced by special dummy packets. However, for CESoPSN and SAToPSN,
packets can be reordered.
The method used to recover the payload clock of a pseudowire is based on
monitoring the fill level of the selected pseudowire jitter buffer: the clock
recovery mechanism monitors the buffer fill level, and generates a read-out clock
signal with adjustable frequency. The frequency of this clock signal is adjusted so
as to read frames out of the buffer at a rate that keeps the jitter buffer as near
as possible to the half-full mark. This condition can be maintained only when the
rate at which frames are loaded into the buffer is equal to the rate at which
frames are removed. Therefore, the adaptive clock recovery mechanism actually
recovers the original payload transmit clock.
The performance of the clock recovery mechanism can be optimized for the
operating environment, by specifying the following parameters:
The accuracy of the original timing source, in accordance with the standard
SDH/SONET terminology (Stratum 1, 2, 3, 3E, or 4/unknown)
The type of PSN that transports the traffic: router-based network (for
example, UDP/IP) versus switch-based network (for example, Ethernet).
Timing Subsystem
See Timing Mechanism section below for detailed descriptions of clocking
schemes supported by ETX-5300A.
Functional Description
1-19
Chapter 1 Introduction
Timing Mechanism
ETX-5300A timing subsystem includes a central timing subsystem, located on the
main card, and local timing subsystems located on the individual I/O modules.
Since ETX-5300A is normally equipped with two main cards, redundancy is also
available for the central timing subsystem.
The figure below shows the functional block diagram of the ETX-5300A timing
mechanism.
Main Card
10GbE
Ports
System
Clock
I/O
Clock 1
I/O
Clock 2
1588v2
(master)
T0
SEC
Mux
1588v2
(slave)
Station Clock
(BITS/GPS)
Station Clock
Output (T4)
Station Clock
Output (T4)
Secondary Clock via
Standby Main Card
I/O Card 1
I/O Card 2
I/O Card 3
I/O Card 4
GPS clock.
The SEC outputs a clock with Stratum-3 accuracy, jitter and holdover, complying
with the following requirements:
1-20
Functional Description
Chapter 1 Introduction
GR-1244-CORE Stratum 3
Ethernet Ports
Ethernet ports located on E5-MC-4, E5-10GbE-2 or E5-GbE-20 support
Synchronous Ethernet (Sync-E) master and slave modes according to ITU-T
G.8261G.826 requirements. This allows each port to:
Extract the port clock to be used a source clock to the clock selection
mechanism
Set the port Tx clock according the domain clock available from the main card.
Sync-E mode can be used for clock frequency distribution. If the ToD (time) is not
required, the 2-way 1588v2 slave entities can be used. The main advantage of
Sync-E over 1588v2 clock is that it is distributed over physical layer; it is a
Stratum-3 clock with near SDH/SONET holdover properties; it is not packetoriented and is considered to be more stable.
STM-1/OC-3 Ports
An Rx clock of any STM-1/OC-3 port on the E5-cTDM-4 card can be extracted and
supplied to the main card clock selection mechanism (via backplane clock bus).
Note
When APS is enabled, the clock is used from a selected interface and not from an
APS group.
A Tx clock of an STM-1/OC-3 port can be locked to:
E1/T1 Ports
An Rx clock of any internal E1 or T1 port on the E5-cTDM-4 card can be extracted
and supplied to the main card clock selection mechanism (via backplane clock
bus). Moreover, ETX-5300A can use an adaptive clock, recovered from a TDM
pseudowire stream as an Rx clock source.
A Tx clock of an internal E1/T1 port can be locked to:
Adaptive clock.
Functional Description
1-21
Chapter 1 Introduction
Output for the ETX-5300A nodal clock. This output provides a convenient
means for distributing the ETX-5300A nodal clock signal to other equipment.
ETX-5300A recovers Building-Integrated Timing Supply (BITS) clock via the station
clock interface ports on E5-MC-4 card. See Appendix A for the external clock
connector pinout.
The following clock signals are supported:
When only one external clock source is available, you can improve hardware
protection by connecting the external clock inputs in parallel, by means of a
Y-cable.
Master Mode
Using 1588v2 master mode eliminates the need for an external timing device
installed in the core of the network to support 1588v2 timing distribution. The
ETX-5300A device can be located near the core of the network to supply up to
512 clock reference streams to remote Ethernet CPEs. Currently, only UDP/IP
encapsulation is supported.
Slave Mode
In the 1588v2 slave mode, ETX-5300A provides clock recovery mechanism with
frequency and phase alignment. Currently, only UDP/IP encapsulation is
supported.
Transparency Mode
If there is a 1588v2 grandmaster in the network, ETX-5300A can operate in
transparent clock mode, transferring 1588 packets to remote Ethernet CPEs with
updated correction field. In this case remote a CPE can operate in a slave mode, if
a NodeB has no slave clock capabilities, or in transparent mode if a NodeB
supports 1588v2.
1-22
Functional Description
Chapter 1 Introduction
GPS Clock
ETX-5300A accepts GPS-based frequency and phase reference signal from GPS
units, using the following interfaces on the E5-MC-4 card:
Input and output of ToD timestamp signal via RJ-45 connector with RS-422
interface
Input or output of 1 pps TTL synchronization signal via mini-BNC (DIN 1.0/2.3)
connector.
When only one GPS clock source is available, you can improve hardware
protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
1.4
System
Capacity
10GbE
Interface
Technical Specifications
Up to 4
Line Rate
120 Gbps
Max Throughput
100 Gbps, full duplex (100 Gbps ingress and 100 Gbps
egress)
Number of Ports
Transceiver Type
GbE Interface
Maximum Frame
Size
Connector
LC
Number of Ports
Transceiver Type
Technical Specifications
1-23
Chapter 1 Introduction
Electrical Interface
Maximum Frame
Size
12 kbytes
Connector
LC (fiber optic)
RJ-45 (electrical)
SDH/SONET
Interface
Number of Ports
4 per card
Physical Layer
155.520 Mbps
Framing
Transceiver Type
Channelization
63 E1 or 84 T1 per G.707/Y.1322
Mapping
SDH:
E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 >
STM-1
T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1
SONET: T1 > VT1.5 > VT group > STS-1 > OC-3
Ethernet
Forwarding
1-24
Jitter
G.958, G.825
Tributaries
E1 Framing
T1 Framing
SDH/SONET
Transmit Clock
E1/T1 Transmit
Clock
Connector
LC
Forwarding
Number of EVCs
4K
Technical Specifications
Traffic
Management
Chapter 1 Introduction
Number of Shaped
EVCs
Services
Compliance
QoS Mechanism
SP + WFQ
Policer
Color Mode
Standard
MEF 10.1
CIR/EIR Range
(1 kbps Granularity)
CIR/EIR Resolution
(Actual Rate)
CIR/EIR Resolution
(Actual Value)
1 byte
Policer
Compensation
063 byte
Hierarchical
Scheduler
3-level
Queue Profiles
Up to 16K
Shaper Profiles
Up to 256
Technical Specifications
1-25
Chapter 1 Introduction
Bridge
Router
Pseudowire
Protection
Timing
1-26
Congestion Control
WRED
Mode
VLAN-aware, IVL
Number of Instances
Up to 32
Number of Ports
Number of Broadcast
Domains
Up to 4K per system
Number of MAC
Table Entries
256K (max)
64 (default), 256, 512, 1024, 4094, 16384, userconfigurable per broadcast domain
3003600 sec
Number of Router
Instances
Number of Interfaces
(RIFs)
Up to 128
Number of Routing
Table Entries
Up to 1K, static
Up to 1000, dynamic
Number of TDM
Pseudowires
Payload
Encapsulation
CESoPSN, SAToP
Network
Encapsulation
UDP/IP, MEF-8
Chassis
E5-cTMD-4 Card
E5-MC-4, E5-GBE-20
Cards
Number of Clock
Domains
Technical Specifications
Nodal Clock
Chapter 1 Introduction
Clock Sources
1588v2
Master/slave/transparent (TC)
Sync-E
GPS
OAM
CFM
8021.1ag, Y.1731
Number of MDs
Up to 4K
Number of MAs
Number of
MEPs/MIPs
Up to 4K (512 MIPs)
Number of PM
Services per MEP
Number of RMEPs
Technical Specifications
1-27
Chapter 1 Introduction
Diagnostics
Management
SDH/SONET, E1/T1
IP Connectivity
Management
Capabilities
Supervision terminal
Telnet
SSH
SNMP (RADview-EMS and other SNMP-based network
management stations)
Management Utility
CLI
SNMP Management
Capabilities
Management
Interfaces
User Authentication
Out-Of-Band
Ethernet
Management Port
Interface 10/100/1000BaseT
Duplex mode Full duplex only.
Default maximum capability 100 Mbps full duplex.
Autonegotiation, MDI-X, no flow control
Maximum frame size 1518 bytes
Connector RJ-45
Alarm
Collection and
Monitoring
Alarm Relay
Alarms
RMON
RFC 2819
Syslog
RFC 3164
Alarm Outputs
1-28
Technical Specifications
Output Contact
Ratings
Chapter 1 Introduction
Indicators
E5-PIM
E5-FAN
E5-MC-4
E5-10GBE-2
E5-GBE-20
E5-cTDM-4
Power
AC Power
DC Power
Technical Specifications
1-29
Chapter 1 Introduction
Physical
Environment
Power Consumption
500W max
Width
Height
Depth
Weight
Temperature
1-30
Humidity
0 to 93%, non-condensing
Cooling
Technical Specifications
Chapter 2
Installation and Setup
This chapter provides installation instructions for the ETX-5300A systems,
including the installation of the modules that are part of the basic system
configuration.
This chapter presents the following information:
Mechanical and electrical installation instructions for the enclosure itself and
the fan tray, power inlets, AC extension shelf and AC power supplies, main
and I/O cards.
Safety
Before starting, read the following safety precautions, which are applicable
throughout the installation procedures. Where necessary, specific precautions
also appear before certain procedures.
Warning
2-1
Caution Delicate electronic components are installed on both sides of the printed circuit
boards (PCBs) of the ETX-5300A cards. To prevent physical damage:
Always keep cards in their protective packaging until installed in the
ETX-5300A chassis, and return them to the packaging as soon as they are
removed from the enclosure.
Do not stack cards one above the other, and do not lay any objects on PCBs.
After removing a card from a slot, wait at least four seconds before
reinserting it.
When inserting a card into its chassis slot, align it carefully with the chassis
slot guides, and then push it in gently. Make sure the card PCB does not touch
the adjacent cards, or any part of the chassis. If resistance is felt before the
card fully engages the mating backplane connector, retract the card, realign it
with the slot guides and then re-insert.
Grounding
Grounding
For your protection and to prevent possible damage to equipment when a fault
condition, e.g., a lightning stroke or contact with high-voltage power lines, occurs
on the lines connected to the equipment, the ETX-5300A case must be properly
grounded (earthed) at any time. Any interruption of the protective (grounding)
connection inside or outside the equipment, or the disconnection of the
protective ground terminal can make this equipment dangerous. Intentional
interruption is prohibited.
Warning
2-2
Laser Safety
Warning
ETX-5300A modules may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near the
optical transmitter. The laser warning symbol may be also attached.
For your safety:
Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the optical transmitter.
Do not use broken or unterminated fiber-optic cables/connectors.
Do not look straight at the laser beam, and do not directly into the optical
connectors while the unit is operating.
Do not attempt to adjust the laser drive current.
The use of optical instruments with this product will increase eye hazard.
Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an
optical instrument.
Use of controls or adjustment or performing procedures other than those
specified herein may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
ETX-5300A modules equipped with laser devices provided by RAD comply with laser
product performance standards set by governmental agencies for Class 1 laser
products. The modules do not emit hazardous light, and the beam is totally enclosed
during all operating modes of customer operation and maintenance.
In some cases, the users may insert their own SFP or XFP laser transceivers into
ETX-5300A modules. Users are alerted that RAD cannot be held responsible for
any damage that may result if non-compliant transceivers are used. In particular,
users are warned to use only agency approved products that comply with the
local laser safety regulations for Class 1 laser products.
Wherever applicable, ETX-5300A modules are shipped with protective covers
installed on all the optical connectors. Do not remove these covers until you are
ready to connect optical cables to the connectors. Keep the covers for reuse, to
reinstall the cover over the optical connector as soon as the optical cable is
disconnected.
2-3
(ESD). To prevent ESD damage, always hold a module by its sides, and do not
touch the module components or connectors. If you are not using a wrist strap,
before touching a module, it is recommended to discharge the electrostatic
charge of your body by touching the frame of a grounded equipment unit.
Whenever feasible, during installation works use standard ESD protection wrist
straps to discharge electrostatic charges. It is also recommended to use garments
and packaging made of antistatic materials or materials that have high resistance,
yet are not insulators.
2.1
Before connecting this product to a power source, make sure to read the
Handling Energized Products section at the beginning of this manual.
Warning
Caution ETX-5300A does not have a power switch, and therefore will start operating as
soon as power is applied to one of the power supply inlets.
The external circuit breaker used to protect the input power line can be used as
an ON/OFF power switch, or an external ON/OFF switch may be installed.
Power
ETX-5300A can be equipped with either AC or DC power inlet (PI) modules, which
conduct power from external sources to the ETX-5300A backplane. There are two
PI module types:
2-4
AC Power
AC-powered ETX-5300A units should be powered via easily-accessible grounded AC
outlets capable of furnishing 100, 115 or 230 VAC, 50/60 Hz.
The connection of AC power is made through the front panel AC power inlet
module. This module has a separate input connector for each AC power supply
module installed in the mechanical extension at the back of the chassis.
It is necessary to arrange a single ON/OFF power switch to simultaneously apply
power to all the ETX-5300A power inlets. Powering AC power supply modules one
at a time may cause undesirable effects.
DC Power
DC-powered ETX-5300A units require a 48 or 60 VDC (nominal voltage) power
source supplied over 14 AWG (1. 5 mm2) wires. The connection of DC power is
made through DC power inlet modules, which deliver the DC input voltage to
power supplies installed on main and I/O cards via two redundant backplane
buses.
The second DC input enables connecting a separate DC input voltage, and thus
when power is connected to both DC input connectors, availability is increased by
having a redundant power source. The two DC inputs are isolated, and therefore
it is not possible for current to flow from one DC input to the other.
Caution The same nominal DC voltage must be supplied to both DC input connectors.
Each DC input must be protected by its own circuit breaker rated at 25A
maximum.
Warning
Within the ETX-5300A, the DC input supply lines are not referenced to the chassis
(frame) ground.
Panel Clearance
ETX-5300A can be installed on shelves and in telecommunication racks. RAD
offers rack mount kits for installation in 19 inch (ANSI) racks or in ETSI racks.
Allow at least 70 mm (2.7 inches) of clearance at front, top, bottom and side for
cables and module replacement.
Note
2-5
Ambient Requirements
The ambient operating temperature range of the ETX-5300A is 32 to 122F
(0 to +50C), at a relative humidity of up to 93%, non-condensing.
Caution Do not operate ETX-5300A without the fan tray installed. Irreversible damage to
hardware will occur if the chassis is operated without the fan tray installed, even
for a few minutes (maximum allowed at room temperature is 5 minutes).
Install blank panels to cover all empty slots. Appropriate blank panels can be
ordered from RAD.
Covering all empty slots is also required for reasons of personal safety and for
efficient cooling of the chassis.
Warning
2.2
Package Contents
ETX-5300A chassis
Power cords
Cable manager.
2.3
Required Equipment
2-6
Required Equipment
2-7
2-8
Figure 2-5. Attaching Brackets for Front Edge Installation and Rear Fastening in 19 Racks
2-9
3. While the other person holds ETX-5300A in place, fasten the chassis to the
rack side rails with four screws, washers and nuts.
4. After installing the enclosure, check and install the required modules, in
accordance with the installation plan.
2.6
This section provides instructions for installing a fan tray in an empty chassis. The
same procedure is used to replace the fan tray.
2-10
The fan tray includes a total of eight fans that provide cooling air. The fans are
divided into two groups (four fans each), which are independently controlled by
main cards A and B.
The rotation speed of the fans, and thus the airflow, can be varied to adapt to
the cooling requirements; for example, when the temperature inside the
enclosure is sufficiently low, the speed is decreased to reduce wear and noise.
Figure 2-7 shows a view of the fan tray panel. The fan tray has two indicators,
pertaining to fan operation. The panel also has a 15-pin D-type female connector
serving as an alarm relay with LED indicators for alarm monitoring. The fan and
alarm relay indicators are described in Chapter 3.
RAD
ETX-5300A
ALARM
CRITICAL
MAJOR
MINOR
TEST
LED
FAN
OK
FLT
F
I
L
T
E
R
PS-B
MAIN-B
MAIN-A
PS-A F
A
I/O 2
I/O 4 N
I/O 1
I/O 3
E5-FAN
The I/O slots labels are located on the fan tray panel.
To install the fan tray:
1. Carefully check the fan tray for foreign objects and dirt that may be trapped
inside, and remove them.
2. Insert the fan tray in the chassis slot, and slide it in until its rear connector
engages the mating connector on the backplane.
3. Secure the fan tray by tightening its two spring screws.
Caution The cooling fan tray exhausts air from the chassis. The chassis cooling vents are
located in the side panel. Do not obstruct these vents. Leave at least 80 mm
(3.1 inch) clearance for sufficient airflow.
When replacing the ETX-5300A fan tray in an operating chassis, do it quickly;
irreversible damage to hardware will occur if the chassis is operated without the
fan tray installed, even for a few minutes (maximum allowed at room
temperature is 5 minutes).
2.7
2-11
E5-PIM
PWR
FLT
E5-PIM/AC Module
The E5-PIM/AC module is used for connecting to 100240 VAC power sources. The
E5-PIM/AC can be used only in ETX-5300A units, that have AC power supplies
installed in the mechanical extension at the back of the chassis.
E5-PIM/DC Modules
The E5-PIM/DC modules are used for connecting to 4072 VDC (48 VDC nominal)
power sources.
Installing PI Modules
Caution ETX-5300A units with AC power supplies can be powered via any combination of
PI cards: 2 AC, AC and DC, 2 DC. ETX-5300A without AC power supplies can be
powered only via 2 DC PI cards.
To install a PI module:
1. Check that the two fastening screws of the PI module move freely.
2. Insert the PI module in its chassis slot, and slide it in until its rear connector
engages the mating connector on the backplane.
3. Secure the PI module by tightening its two screws.
2.8
The ETX-5300A chassis can be equipped with two main cards. At any time, only
one card is active, and the other serves as hot standby.
Figure 2-10 shows the front panel of the main card. Chapter 3 explains the
functions of the indicators located on the panel.
1
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
E5-MC-4
LINK
ACT
OUT
GPS
TOD
MNG
1PPS
10MHz
MNG ETH
LINK ACT
10/100/1000BASE-T
CONTROL
DCE
PRI
FLT
CLK
RMV
2-12
1P
P
10
M
Hz
10
NG
ET
H
MN
G
CO
LI N
K
/1 0
0 /1
AC
T
00
NT
RO
L
PR
I
0B
AS
E
-T
DC
E
FL
T
CL
K
RM
2
3
1
2-13
Caution
To prevent service disruption, check that the PRI indicator of the main card you
want to remove is blinking. If not, use the supervisory terminal (or any other
management facility) to instruct the ETX-5300A to flip to the other main card,
and wait for execution of the command before continuing.
To flip to the other main card using the supervision terminal:
1. Identify the on-line main card: this is the card with the steadily lit ACT
indicator.
2. Connect the supervision terminal directly to the CONTROL DCE connector of
the on-line main card, and log in as administrator.
3. Use the manual-switch command in the config>protection>main-card#
prompt to flip to the standby main card (the card with the blinking PRI
indicator).
4. Wait for the flipping to be executed. After it is executed, the PRI indicator of
the main card to which the supervision terminal is connected starts blinking;
the indicator of the other module stops blinking and lights steadily.
Note
2-14
Warning
Before connecting any cables and before switching on this instrument, the
protective ground terminal of this instrument must be connected to the
protective ground conductor of the (mains) power cord. The mains plug shall only
be inserted in a socket outlet provided with a protective ground contact. Any
interruption of the protective (grounding) conductor (inside or outside the
instrument) or disconnecting the protective ground terminal can make this
instrument dangerous. Intentional interruption is prohibited.
Caution ETX-5300A does not have a power switch, and therefore it will start operating as
soon as power is applied to one of the power supply inlets.
The external circuit breaker used to protect the input power line can be used as
an ON/OFF power switch, or an external ON/OF switch may be installed.
Before connecting power to an AC-powered device, verify that every power inlet
card has a corresponding AC power supply installed in the chassis. The top E5-PIM
card is connected to AC power supply B, and the bottom E5-PIM card is
connected to AC power supply A.
Grounding
A grounding terminal is located on the front panel of the ETX-5300A chassis.
Connecting to AC Power
To connect to AC power:
Note
Connect each power cable first to the connector on the E5-PIM/AC module,
and then to the power outlet.
Connecting to DC Power
To connect to DC power:
1. Strip 7 mm (1/4 inch) of insulation from the leads.
Connecting to Power
2-15
Caution Pay attention to polarity. For each source, connect the positive lead first, and the
negative lead second.
Refer to the Connection of DC Mains section at the beginning of this manual.
2. Use a narrow blade screwdriver to release the terminal screw.
3. Push the lead into the terminal up to its insulating sleeve.
4. When the lead is in position, fasten the screw to secure the lead.
5. Verify that the lead is securely held by pulling on it lightly.
6. Insert the plug into the socket.
7. Secure the plug by tightening the two screws.
PW
R
F LT
4 8/
6 0V
E5
eL
ti v
a
g
Ne
-PI
M
d
ea
s
Po
e
iti v
ad
Le
Figure 2-10 shows the front panel of the main card. Chapter 3 explains the
functions of the indicators located on the panel.
2-16
11
LINK
ACT
1
E5-GBE-20
RMV
100/1000BASE-X
10GbE
FLT
RMV
LINK
ACT
LINK
ACT
E5-10GBE-2
LINK 1
FLT
OC-3/STM-1
FLT
LINK 2
LINK 3
FLT
20
FLT
LINK 4
RMV
E5-cTDM-4
LOS
LOS
LOS
LOS
Follow the procedure for main cad installation to install each I/O module in
the prescribed I/O slot, in accordance with the installation plan.
Warning
Note
Some SFP or XFP models have a plastic door instead of a wire latch.
2-17
Caution Insert the transceiver gently. Using force can cause damage to the connecting
pins.
4. Remove the protective rubber caps from the SFP or XFP modules.
Caution Do not remove the SFP or XFP while the fiber optic cables are still connected. This
may result in physical damage (e.g., a chipped SFP or XFP module clip or socket)
or cause malfunction (e.g., the network port redundancy switching may be
interrupted).
2-18
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
OUT
GPS
TOD
MNG
1PPS
10MHz
ACT
E5-MC-4
MNG ETH
CONTROL
DCE
LINK ACT
10/100/1000BASE-T
PRI
FLT
CLK
RMV
10GbE
FLT
RMV
LINK
ACT
LINK
ACT
E5-10GBE-2
11
LINK
ACT
1
E5-GBE-20
RMV
100/1000BASE-X
ACT
FLT
RMV
10/100/1000BASE-T
2-19
FLT
LINK 1
FLT
OC-3/STM-1
FLT
LINK 2
LINK 3
FLT
20
FLT
LINK 4
RMV
LOS
E5-cTDM-4
LOS
LOS
LOS
ACT
LINK
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
OUT
GPS
TOD
ACT
MNG
1PPS
MNG ETH
CONTROL
10MHz
LINK ACT
10/100/1000BASE-T
DCE
E5-MC-4
PRI
FLT
CLK
RMV
LINK
Use two 75 coaxial cables to connect the external clock source and/or slave
clock device to the two BNC connectors on the E5-MC-4 card designated IN
(input) and OUT (output).
2
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
ACT
E5-MC-4
OUT
GPS
TOD
MNG
1PPS
MNG ETH
CONTROL
10MHz
LINK ACT
10/100/1000BASE-T
DCE
PRI
FLT
CLK
RMV
2-20
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
OUT
GPS
TOD
MNG
1PPS
10MHz
ACT
E5-MC-4
MNG ETH
CONTROL
LINK ACT
10/100/1000BASE-T
DCE
PRI
FLT
CLK
RMV
ACT
LINK
Use coaxial cables with mini BNC (DIN 1.0/2.3) connectors to connect the GPS
1 PPS or 10 MHz clock source or slave clock device to the mini BNC
connectors on the E5-MC-4 card designated IN (input) and OUT (output).
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
OUT
GPS
TOD
MNG
1PPS
10MHz
ACT
E5-MC-4
MNG ETH
CONTROL
LINK ACT
10/100/1000BASE-T
DCE
PRI
FLT
CLK
RMV
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
ACT
E5-MC-4
OUT
GPS
TOD
MNG
1PPS
10MHz
MNG ETH
LINK ACT
10/100/1000BASE-T
CONTROL
DCE
PRI
FLT
CLK
RMV
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to supervisory
terminal port.
Connecting to a Terminal
2-21
LINK
ACT
LINK
10GbE
ACT
LINK
EXT CLK
EXT CLK
IN
ACT
LINK
GPS
TOD
OUT
MNG
1PPS
10MHz
ACT
E5-MC-4
MNG ETH
LINK ACT
10/100/1000BASE-T
CONTROL
DCE
PRI
FLT
CLK
RMV
ALARM
CRITICAL
MAJOR
MINOR
TEST
LED
FAN
OK
FLT
F
I
L
T
E
R
PS-B
MAIN-B
MAIN-A
PS-A F
A
I/O 2
I/O 4 N
I/O 1
I/O 3
E5-FAN
2-22
Labeling Cable
Chapter 3
Operation
This chapter provides general operating instructions and preliminary configuration
instructions for ETX-5300A units.
This chapter covers the following topics:
Indicators
Startup
3.1
Caution
To turn on ETX-5300A:
ETX-5300A does not have a power on/off switch, and will start operating as soon
as power is applied.
For an ETX-5300A equipped with AC-powered power supply modules, be sure to
simultaneously connect the power to all the installed PS modules, for example, by
means of a common circuit breaker or an ON/OFF switch.
1. Connect the ETX-5300A to power (see detailed instructions in Chapter 2). The
PWR indicators on all the E5-PIM PS modules that are powered light up, and
remain lit as long as the ETX-5300A is powered.
You may also hear the fans in the ETX-5300A fan tray start operating.
2. Wait for the completion of the power-up initialization process (this takes
about one minute). During this interval, monitor the power-up indications:
After power is applied, all the ETX-5300A indicators turn on for a few
seconds. This allows you to check that the equipment indicators are
functioning properly.
After a few seconds, all the indicators turn off (except for the E5-PIM
PWR indicators as ETX-5300A performs its power-up initialization.
3-1
Chapter 3 Operation
3. After the power-up initialization ends, all the PWR indicators and the PRI
indicator of the active main card are lit steadily; the PRI indicator for the
standby main card starts blinking.
ETX-5300A performs the startup procedure. See the Startup section
below.
4. After startup ends, you may log in, using the supervision terminal.
3.2
Indicators
The unit's LEDs are located on the system and I/O modules. Table 3-1 lists the
functions of the ETX-5300A LED indicators.
Color
Function
Location
PWR
Green
E5-PIM
Red
E5-PIM, E5-FAN,
E5-MC-4,
E5-10GBE-2,
E5-GBE-20,
E5-cTDM-4
OK
Green
E5-FAN
CRITICAL
Red
E5-FAN
MAJOR
Orange
E5-FAN
MINOR
Yellow
E5-FAN
TEST
Yellow
E5-FAN
RMV
Blue
E5-MC-4,
E5-10GBE-2,
E5-GBE-20,
E5-cTDM-4
Green
E5-MC-4
Red
E5-MC-4
Green
E5-MC-4,
E5-10GBE-2,
E5-GBE-20
ACT
Yellow
E5-MC-4,
E5-10GBE-2,
E5-GBE-20
3-2
Indicators
Chapter 3 Operation
Name
Color
Function
Location
ON LINE
Green
E5-cTDM-4
LOS
Red
E5-cTDM-4
Blinking Other signal failure (LOF, AIS, RFI etc) has been
detected
3.3
Startup
startup-config Contains the saved user configuration. You must save the
file startup-config; it is not automatically created.
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
Note
The save command is used to save the user configuration. Some commands that
reset the device also erase the saved user configuration by copying another file
to it before the reset.
Startup
3-3
Chapter 3 Operation
Loading Sequence
At startup, the device boots from the startup-config file, the user-default file, or
the factory-default file, in the sequence shown in Figure 3-2 . If none of these
files exist, the device boots using hard-coded defaults.
Start
Pass
Boot from
Startup-config
Sanity
Check
Yes
Startup-config exist?
Fail
Boot from
User-default-config
Pass
Sanity
Check
No
Yes
User-default-config
exist?
Fail
No
Boot from
Factory-default-config
End
3-4
Startup
3.4
Chapter 3 Operation
3.5
3.6
3-5
Chapter 3 Operation
Task
Command
Comments
Enabling or disabling
confirmation of configuration
file after reboot
Default time-to-confirm
5 min.
no startup-confirm-required
3.7
3.8
3-6
Chapter 4
Management and Security
This chapter provides general operating instructions and preliminary configuration
instructions for ETX-5300A units.
This chapter presents the following information:
User Access
SNMP Management
Management Access
Access Policy
Syslog
Programming Cards.
Manager
Location
Transport Method
Management
Protocol
Application
Control
Local
Out-of-band
RS-232
Ethernet
Local, remote
Inband, out-of-band
Telnet, SSH
Note
By default, terminal, Telnet (SSH) and SNMP management access methods are
enabled.
CLI-Based Configuration
4-1
4.1
CLI-Based Configuration
Note
RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud
rate (9.6 kbps) to 115.2 kbps.
11. Configure the PC communication port parameters to a baud rate of
115.2 kbps to match the new ETX-5300A settings.
12. Continue with product configuration.
4-2
CLI-Based Configuration
ETX-5300A#
ETX-5300A# configure
ETX-5300A>config# router 1
ETX-5300A>config>router(1)# interface 1
ETX-5300A>config>router(1)interface(1)# address 1.1.1.1/1
ETX-5300A>config>router(1)interface(1)# management-access allow-all
ETX-5300A>config>router(1)interface(1)# no shutdown
By default, ETX-5300A has Telnet and SSH access enabled.
Login
To prevent unauthorized modification of the operating parameters, ETX-5300A
supports three access levels.
The su, user and tech are permanent users, they cannot be removed from the
authorization database. The su level users can define new dynamic users and
assign access levels (su, user or tech) to them.
To enter as a superuser:
1. Enter su for user name.
2. Enter 1234 for password.
To enter as a user:
1. Enter user for user name.
2. Enter 1234 for password.
To enter as a technician:
1. Enter tech for user name.
2. Enter 1234 for password.
CLI-Based Configuration
4-3
Commands that are not global are available only at their specific tree location. To
find out what commands are available at the current location, type ?. For a list of
the commands and their levels, refer to Command Tree.
To navigate down the tree, type the name of the next level. The prompt then
reflects the new location, followed by #. To navigate up, use the global command
exit. To navigate all the way up to the root, type exit all.
At the prompt, one or more level names separated by a space can be typed,
followed (or not) by a command. If only level names are typed, navigation is
performed and the prompt changes to reflect the current location in the tree. If
the level names are followed by a command, the command is executed, but no
navigation is performed and the prompt remains unchanged.
Note
To use show commands without navigating, type show followed by the level
name(s) followed by the rest of the show command.
In the following example, the levels and command were typed together and
therefore no navigation was performed, so the prompt has not changed.
ETX-5300A#
ETX-5300A# configure port e1 1/1/1 loopback local 1
ETX-5300A#
4-4
CLI-Based Configuration
ETX-5300A#
ETX-5300A# configure flows flow flow1
ETX-5300A>config>flows>flow(flow1)$ ingress-port ethernet 1/3
ETX-5300A>config>flows>flow(flow1)$ egress-port ethernet 1/1 queue 1 block 0/1
ETX-5300A>config>flows>flow(flow1)$ classifier Classifier1
ETX-5300A>config>flows>flow(flow1)$ no shutdown
ETX-5300A>config>flows>flow(flow1)$exit
ETX-5300A>config>flows#
[]
<>
<Tab>
Command autocomplete
<Backspace>
Deletes character
<Ctrl-C>
<Ctrl-Z>
Logs out
CLI commands can be gathered into text files called scripts. They can be created
using a text editor, by recording the user commands or by saving the current
configuration. The scripts can be imported from and exported to RAD devices via
file transfer protocols.
Command Tree
At the CLI root, the following categories are available:
admin
configure
debug
file
logon
on-configuration-error
CLI-Based Configuration
4-5
rados-versions
Description
copy
echo
exit
exit-remote
help
history
info
level-info
logout
ping
save
software-confirm
startup-config-confirm
trace-route
tree
Description
admin
Administrative commands
factory-default
factory-default-all
reboot
software
Software installation
install
software-confirm-required
show status
4-6
CLI-Based Configuration
Command
Description
startup-confirm-required
user-default
undo-install
Description
configure
bridge
aging-time
clear-mac-table
show mac-address-table
port
bind
name
shutdown
show status
vlan
maximum-mac-addresses
name
tagged-egress
show vlans
show cards-summary
chassis
inventory
alias
asset-id
serial-number
show status
show summary-inventory
show manufacture-info
cross-connect
Pseudowire cross-connect
fault
pw-tdm
CLI-Based Configuration
4-7
Command
Description
cfm
service
frames-report
shutdown
flows
Flow parameters
classifier-profile
flow
classifier
clear-statistics
cos-mapping
drop
egress-port
ingress-color
ingress-port
l2cp profile
mark
inner-marking-profile
inner-tag-ether-type
inner-vlan
marking-profile
tag-ether-type
vlan
p-bit
inner-p-bit
pm-collection
policer
policer aggregate
rate-sampling-window
shutdown
show statistics
show status
4-8
match
CLI-Based Configuration
Command
Description
p-bit fixed
p-bit profile
p-bit copy
inner-vlan
tag-ether-type
Pushes TPID
inner-tag-ether-type
no vlan-tag
show summary
management
Management parameters
access
auth-policy
sftp
snmp
ssh
telnet
tftp
radius
clear-statistics
server
address
auth-port
key
retry
shutdown
timeout
show statistics
show status
snmp
SNMP parameters
access-group
context-match
notify-view
read-view
shutdown
CLI-Based Configuration
4-9
community
name
sec-name
shutdown
tag
notify
Configures notification
bind
shutdown
tag
notify-filter
mask
shutdown
type
notify-filter-profile
profile-name
shutdown
security-to-group
group-name
shutdown
snmp-engine-id
target
address
shutdown
tag-list
target-params
trap-sync-group
target-params
message-processing-model
security
shutdown
version
show trap-sync
4-10
write-view
CLI-Based Configuration
Command
Description
trap-sync-group
tag-list
target-params
user
authentication
privacy
shutdown
view
mask
shutdown
type
tacacsplus
TACACS+ parameters
group
server
accounting-port
authentication-port
clear-statistics
group
key
retry
shutdown
show statistics
timeout
oam
cfm
maintenance-domain
Specifies MD level
maintenance-association
ma-name
Specifies MA name
ccm-interval
mep
MEP parameters
accounting
md-level
CLI-Based Configuration
4-11
ais
bind
ccm-initiate
ccm-priority
classification profile
client-md-level
cos-mapping
direction
flow
lbm
show lbm-results
linktrace
show linktrace-results
queue queue-mapping
show status
show service
shutdown
remote-mep
service
delay-threshold
delay-var-threshold
dest-ne
clear-statistics
delay
loss
remote mac-address
show statistics
dmm-interval
lmm-interval
shutdown
name
4-12
show status
CLI-Based Configuration
mip
MIP parameters
bind
flow
mhf
MHF parameters
classification
cos-mapping
queue
shutdown
show status
measurement-bin-profile
show summary
peer
Peer parameters
show peer-summary
port
Port parameters
e1
E1 parameters
bert
show bert
clear-bert-counters
clear-statistics
idle-code
line-type
loopback
name
out-of-service
path-interval-threshold
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
trail-mode
tx-clock-source
thresholds
CLI-Based Configuration
4-13
Command
Description
ethernet
Ethernet parameters
auto-negotiation
classification-key
clear-sfp-counters
clear-statistics
flow-control
l2cp
mau-type
name
pm-collection
Enables/disables PM collection
queue-group
restart-auto-negotiation
show sfp-status
shutdown
show statistics
show status
tag-ethernet-type
tx-ssm
l2cp-profile
default
mac
lag
admin-key
bind
show bind
classification-key
l2cp
lacp
show lacp-statistics
show lacp-status
name
queue-group
shutdown
4-14
LAG parameters
CLI-Based Configuration
Command
Description
mng-ethernet
auto-negotiation
clear-statistics
mau-type
name
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
path-profile
ber-threshold
fe-interval-threshold
Sets CV, ES, SES and/or UAS counter value during a 15-min
interval starting with a trap sent
interval-threshold
Sets CV, ES, SES and/or UAS counter value during a 15-min
interval starting with a trap sent
padding
payload-label
tim-monitoring
sag
name
queue-group
show saps
show status
sdh-sonet
aug
au3
clear-statistics
j1-pathtrace
name
path
pm-collection
Enables/disables PM collection
shutdown
tag-ethernet-type
CLI-Based Configuration
4-15
show statistics
show status
vc11
clear-statistics
j2-pathtrace
name
path
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
clear-statistics
j1-pathtrace
name
path
path-width
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
tug3
clear-statistics
j2-pathtrace
name
path
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
vc12
clear-statistics
j2-pathtrace
name
path
4-16
CLI-Based Configuration
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
clear-sfp-counters
clear-statistics
eed-action
frame-type
j0-pathtrace
j0-pathtrace
loopback
name
oc3
clear-statistics
j1-pathtrace
name
path
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
sts1
clear-statistics
j1-pathtrace
name
path
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
vt1-5
clear-statistics
j2-pathtrace
name
CLI-Based Configuration
4-17
path
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
overhead-mode
show sfp-status
shutdown
soh
show statistics
show status
tim-action
tx-clock-source
tx-ssm
soh-profile
ber-threshold
fe-line-interval-threshold
Sets CV, ES, SES and/or UAS counter value during a 15-min
interval starting with a trap sent
line-interval-threshold
Setting CV, ES, SES and/or UAS counter value during a 15-min
interval starting with a trap sent
padding
section-interval-threshold
Sets CV, ES, SES and/or UAS counter value during a 15-min
interval starting with a trap sent
tim-monitoring
show summary
svi
name
show status
t1
bert
show bert
clear-bert-counters
clear-statistics
4-18
Specifies T1 parameters
CLI-Based Configuration
Command
Description
idle-code
inband-loopback
line-type
loopback
name
out-of-service
path-interval-threshold
pm-collection
Enables/disables PM collection
shutdown
show statistics
show status
trail-mode
tx-clock-source
protection
Protection parameters
aps
APS parameters
bind
clear
force-switch-to-protection
force-switch-to-working
lockout-of-protection
manual-switch-to-protection
manual-switch-to-working
oper-mode
shutdown
show status
erp
bridge
clear-statistics
data-vlan
east-port
r-aps
sf-trigger
CLI-Based Configuration
4-19
Command
Description
shutdown
show statistics
show status
timers
west-port
backward-compatibility
manual-switch
force-switch
clear switch-command
port-type
sub-ring
Sub-ring parameters
io-group
bind
shutdown
show status
main-card
manual-switch
show status
pwe
Pseudowire parameters
pw
Creates/deletes pseudowires
clear-statistics
Clears PW statistics
egress-port
jitter-buffer
label
name
oam
peer
pm-collection
Enables/disables PM collection
psn-oos
shutdown
show statistics
4-20
virtual-channel
CLI-Based Configuration
Command
Description
show status
Displays PW status
tdm-payload
tos
Specifies the value for the TOS byte used on outbound traffic
show pw-summary
qos
color-map-profile
cos-map-profile
marking-profile
Marking profile
policer-aggregate
show flows
policer
policer-profile
bandwidth
color-aware
compensation
coupling-flag
queue-block-profile
queue
queue-group-profile
inherited-from
queue-block
bind
name
profile
shaper
queue-internal-profile
map
map
mark
internal-profile
4-21
Command
Description
congestion-avoidance
scheduling
shaper
queue-map-profile
shaper-profile
bandwidth
Defines CIR, EIR data rate and CBS, EBS burst rate
compensation
wred-profile
reporting
acknowledge
active-alarm-rebuild
show active-alarms
show active-alarms-details
show alarm-information
alarm-input
show alarm-input
show alarm-list
show alarm-log
alarm-source-attribute
alarm-source-type-attribute
show brief-alarm-log
show brief-log
clear-alarm-log
show event-information
show event-list
show log
mask-minimum-severity
router
Router parameters
show arp-table
clear-arp-table
interface
4-22
map
color
CLI-Based Configuration
Command
Description
address
bind
management-access
name
shutdown
show status
show interface-table
name
show routing-table
static-arp
static-route
slot
bind
card-type
reset
shutdown
show status
system
System parameters
clock
Clock parameters
domain
clear
clear-statistics
force
force-t4-as-t0
manual
max-frequency-deviation
mode
quality
source
clear-wait-to-restore
hold-off
priority
CLI-Based Configuration
4-23
quality-level
show statistics
show status
wait-to-restore
show status
sync-network-type
master
clear-statistics
distributed-mode
domain-number
ip-address
maximum-slaves
pm-collection
Enables/disables PM collection
shutdown
slave
clear-statistics
show statistics
show status
show statistics
show status
sync-rate
tx-clock
recovered
clear-statistics
ip-address
ptp-domain
recovery-mode
revertive
shutdown
source-port-identity
show status
wait-to-restore
4-24
CLI-Based Configuration
master
announce
clear-statistics
Clears statistics
delay-respond
peer
quality-level
shutdown
show statistics
Displays statistics
show status
Displays status
sync
station
impedance
interface-type
line-type
name
rx-sensitivity
shutdown
ssm-channel
show status
tx-clock-source
tx-ssm
station-y-cable
tod
ToD parameters
baudrate
interface-type
name
shutdown
show status
CLI-Based Configuration
4-25
Command
Description
contact
date-and-time
date
date-format
sntp
broadcast
poll-interval
server
address
prefer
query-server
shutdown
udp
show status
time
zone
show date-and-time
show device-information
location
name
syslog
Syslog parameters
address
clear-statistics
facility
port
severity-level
shutdown
show statistics
terminal
baud-rate
length
timeout
4-26
tod-y-cable
CLI-Based Configuration
Description
file
show configuration-files
show copy
delete
dir
show factory-default-config
show rollback-config
show running-config
show startup-config
show sw-pack
show user-default-config
Description
logon
Description
on-configuration-error
Description
show rados-versions
4.2
GUI-Based Configuration
GUI-Based Configuration
4-27
Access group
Script below provides all necessary configuration steps. Replace IP addresses and
entity names with values relevant for your network environment.
#*******************************Adding_SVI***********************************
config port svi 99 router
exit all
#**********************************End***************************************
#***************************Adding Classifier_Profiles***********************
config flows classifier-profile classall match-any
match all
exit all
config flows classifier-profile classutg match-any
match untagged
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
config flows flow mng_in
classifier classutg
ingress-port mng-ethernet main-a/0
egress-port svi 99
no shutdown
exit all
4-28
GUI-Based Configuration
GUI-Based Configuration
4-29
4-30
Viewing device inventory and receiving traps (see Chapter 5 for trap list)
IANAifType-MIB
IEEE8023-LAG-MIB
MEF-R MIB
GUI-Based Configuration
4.3
This section describes two methods used to access the ETX-5300A management
host via Layer 2 or Layer 3 networks.
NMS
SVI
BP
SVI
Management
Network
VLAN X
SVI
VLAN X
Management
Network
VLAN X
User
BP
OOB
BP
VLAN X
VLAN X
VLAN X
Out-of-Band
Access
Bridge
PSN
VLAN X
VLAN X
VLAN X
BP
User
NET
BP
VLAN X
VLAN X
SVI
PSN
VLAN X
Inband
Access
SVI
ETX-2xxA
NMS
4-31
ETX-5300A
ETX-2xxA
NMS
SVI
SVI
Layer-3 PSN
User
RIF 4
RIF 1
OOB
Layer-3 PSN
Out-of-Band
Access
Router
SVI
SVI
Layer-3 PSN
Layer-3 PSN
User
RIF 3
NET
RIF 2
Inband
Access
LB IP
ETX-2xxA
NMS
RIF 1
OOB
4-32
Management is disabled for loopback RIFs, which are used for TDM pseudowire or
Precision Time Protocol (IEEE 1588v2) traffic.
4.4
4.5
You can configure the serial port parameters, which include specifying the data rate,
security timeout, and screen size from which you are accessing the device.
Factory Defaults
Parameter defaults are listed in the table below.
Parameter
Default Value
baud-rate
9600bps
timeout
10
Task
Command
Comments
baud-rate {300bps |
1200bps | 2400bps|
9600bps | 19200bps |
38400bps | 57800bps |
115200bps}
timeout forever
length <020>
4-33
4.6
User Access
Notes
User passwords are stored in a database so that the system can perform
arbitrary block of data and returns a fixed-size bit string, the (cryptographic)
hash value, such that any change to the data changes the hash value.
Factory Defaults
By default, the following users exist, with default password 1234:
su
tech
user.
4-34
User Access
User password = hash of 4222 (user staff2 can log in with password 4222).
user>staff2
password>****
User Access
4-35
4.7
SNMP Management
Standards
This section lists the standards on which the supported SNMP versions are
based.
4-36
SNMP Management
RFC 1908, Coexistence between Version 1 and Version 2 of the Internetstandard Network Management Framework. SNMPv2 Working Group.
RFC 2272, message processing and dispatching for the Simple Network
Management Protocol (SNMP).
RFC 2274, User-Based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3).
RFC 2275, View-Based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP).
Benefits
The SNMP protocol allows you to remotely manage multiple units from a central
work station using RADview EMS. RADview EMS offers a graphical user interface
that resembles the front panel of your unit with its interfaces and LEDs.
ETX-5300A supports SNMPv3, which allows data to be collected securely from
SNMP devices. Confidential information such as SNMP commands can thus be
encrypted to prevent unauthorized parties from being able to access them.
Functional Description
SNMPv1 and SNMPv2 can neither authenticate the source of a management
message, nor provide privacy (encryption).
To overcome these limitations, SNMPv3 provides a security framework for
SNMPv1 and SNMPv2 that adds the following main capabilities:
Security features:
Administrative features:
Naming of entities
SNMP Management
4-37
Notification destinations
Proxy relationships
SNMP Engine ID
An important parameter related to SNMPv3 is the SNMP engine ID, a unique and
unambiguous identifier of the function that processes SNMP messages. It also
identifies the SNMP entity that corresponds to the engine.
The SNMP engine ID is a string that has three segments:
In the transmit direction: accepts SNMP protocol data units (PDUs) from the
SNMP agent central processor, encapsulates them in messages, and then
subjects the message to the security model, to insert security-related
parameters in the message header
In the receive direction: accepts incoming messages, uses the security model
to process the security-related parameters in the message header, and
delivers the encapsulated PDU to the SNMP agent central processor
SNMPv3
4-38
SNMP Management
You can also enable using any of the above-mentioned models, to match
different management station capabilities: the appropriate model is automatically
selected, in accordance with the model used in the incoming SNMP message.
Encryption mechanism. USM uses the cipher block chaining (CBC) mode of the
Data Encryption Standard (DES) for encryption, with a key length of 56 bits.
SNMP Management
4-39
The access control policy used by the agent for each manager must be
preconfigured (the policy essentially consists of a table that details the access
privileges of each authorized manager). For ETX-5300A, the VACM parameters
can be configured only by means of a MIB browser, and/or by SNMP commands
Factory Defaults
The default configuration of the SNMP parameters is as follows:
View named internet providing access to IETF MIBs and IEEE MIBs
4-40
User: initial
Write view =
SNMP Management
Read view =
Write view =
SNMPv3 Configuration
ETX-5300A supports SNMP version 3, providing secure SNMP access to the device
by authenticating and encrypting packets transmitted over the network.
The SNMPv3 manager application in RADview-EMS provides a user-friendly
graphical interface to configure SNMPv3 parameters. If you intend to use it, you
must first use the device CLI to create users with the required encryption method
and security level, as the application can create users based only on existing
users; the new user has the same encryption method, and the same security level
or lower. The ETX-5300A default configuration provides only one standard user
named initial with no encryption and the lowest security level.
Use the following procedure to configure SNMPv3:
1. Set SNMP engine ID if necessary
2. Add users, specifying authentication protocol and privacy protocol
3. Add groups, specifying security level and protocol
4. Connect users to groups
5. Add notification entries with assigned traps and tags
6. Configure target parameter sets to be used for targets
7. Configure targets (SNMPv3 network management stations to which
ETX-5300A should send trap notifications), specifying target parameter sets
and notification tags
Note
When you enter password parameters, they should contain at least eight
characters.
SNMP Management
4-41
Task
Command
Level
Comments
Configuring group
access-group <group-name>
{ snmpv2c | usm }
{ no-auth-no-priv | auth-no-priv | auth-priv }
snmp
Defining context
matching
snmp>access-group
notify-view <name>
snmp> access-group
read-view <name>
snmp> access-group
write-view <name>
snmp> access-group
Administratively
enabling group
no shutdown
snmp> access-group
Configuring
community
community <community-index>
snmp
Configuring name
name <community-string>
snmp> community
Configuring security
name
sec-name <security-name>
snmp> community
Configuring
transport tag
tag <transport-tag>
snmp> community
Administratively
enabling community
no shutdown
snmp> community
shutdown disables
community
Configuring
notification
notify <notify-name>
snmp>
4-42
SNMP Management
Task
Command
Assigning trap to
notification
Assigning tag to
notification, to be
used to identify the
notification entry
when configuring
target
tag <tag-value>
Level
Comments
You can assign more than
one trap to a notification, in
separate commands
snmp>notify
SNMP Management
4-43
Task
Command
Level
Administratively
enabling
notification
no shutdown
snmp>notify
Configuring
notification filter to
define access to a
particular part of
the MIB hierarchy
for trap variables
snmp
mask [<mask>]
snmp>notify-filter
Defining whether
traps with trap
variables belonging
to the MIB subtree
are sent
snmp>notify-filter
Administratively
enabling
notification filter
no shutdown
snmp>notify-filter
Configuring
notification filter
profile
notify-filter-profile <params-name>
snmp>filter-profile
Configuring
notification filter
profile name
profile-name <argument>
snmp>filter-profile
Administratively
enabling
notification filter
profile
no shutdown
snmp>filter-profile
Connecting security
name to group (e.g.
connecting user or
community to
group)
snmp
Specifying group to
which to connect
security name
group-name <group-name>
snmp>security-to-group
Administratively
enabling
security-to-group
entity
no shutdown
snmp>security-to-group
4-44
SNMP Management
Comments
no security-to-group
removes security-to-group
entity
Task
Command
Level
Comments
Setting SNMP
engine ID, as MAC
address or IP
address or string
snmp
target <target-name>
snmp
Specifying target
address as IP
address or OAM
port
snmp>target
Assigning tag(s) to
target (the tag(s)
must be defined in
notification entries)
tag-list <tag>
snmp>target
Specifying set of
target parameters
for target
target-params <params-name>
Specifying trap
synchronization
group
trap-sync-group <group-id>
[import-trap-masking]
tag-list [ <tag> ]
tag-list [ <tag1>,<tag2>,<tagn> ]
snmp>target
Enter no trap-sync-group
<group-id> to remove
the manager from the
group. If the manager
was the last in the
group, the group is
deleted.
Administratively
enabling target
no shutdown
snmp>target
Configuring set of
target parameters,
to be assigned to
target
target-params <target-param-name>
snmp
no target-params removes
target parameters
SNMP Management
4-45
Task
Command
Level
Specifying message
processing model
(SNMP version) to
be used when
generating SNMP
messages for the
set of target
parameters
message-processing-model
{ snmpv2c | snmpv3 }
snmp>target
Specifying user on
whose behalf SNMP
messages are to be
generated for the
set of target
parameters
snmp>target
Specifying SNMP
version to be used
when generating
SNMP messages for
the set of target
parameters
snmp>target
Administratively
enabling target
parameters
no shutdown
snmp>target
Configuring target
parameters and
tags for trap
synchronization
group
trap-sync-group <group-id>
snmp
Specifying tags
tag-list <list>
snmp>trap-sync-group
Specifying set of
target parameters
target-params <params-name>
snmp>trap-sync-group
Configuring user
user <security-name>
[md5-auth [ {des | none} ] ]
snmp
user <security-name>
[sha-auth [ {des | none} ] ]
user <security-name> [none-auth]
Comments
no user <security-name>
deletes the user
4-46
SNMP Management
Task
Command
Level
Comments
Setting user
authentication
password and
optional key for
changes
snmp>user
no authentication disables
authentication protocol
snmp>user
Administratively
enabling user
no shutdown
snmp>user
Defining access to a
particular part of
the MIB hierarchy
snmp
mask <mask>
snmp>view
Defining whether
access to the MIB
subtree is allowed
snmp>view
Administratively
enabling view
no shutdown
snmp>view
SNMP Management
4-47
Task
Command
Level
Displaying trap
synchronization
groups and
members for
SNMPv3 manager
groups
show trap-sync
snmp
Displaying SNMPv3
information, such
as the number of
times the SNMPv3
engine has booted,
and how long since
the last boot
snmp
Comments
Example
4-48
SNMP Management
To create notifications:
Tag = Data
Tag = Power
SNMP Management
4-49
version USM
User MD5_priv
IP address 192.5.4.3.
priv
ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ no shutdown
ETX-5300A>config>mngmnt>snmp>target(TargParam1)$ exit
ETX-5300A>config>mngmnt>snmp# target TargNMS1
ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ target-params TargParam1
ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ tag-list [Port,Power]
ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ address udp-domain 192.5.4.3
ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ no shutdown
ETX-5300A>config>mngmnt>snmp>target(TargNMS1)$ exit
ETX-5300A>config>mngmnt>snmp#
SNMPv3
: enable
Boots
: 2
Boots Time (sec) : 102
EngineID
: 800000a4030020d2202416
ETX-5300A>config>mngmnt>snmp#
4-50
SNMP Management
4.8
Management Access
You can enable or disable access to the ETX-5300A management system via Telnet,
SSH, or SNMP applications. By disabling Telnet, SSH, or SNMP, you prevent
unauthorized access to the system when security of the ETX-5300A IP address has
been compromised. When Telnet, SSH, and SNMP are disabled, ETX-5300A can be
managed via an ASCII terminal only. In addition, you can limit SFTP and TFTP
operation.
Factory Defaults
By default, access is enabled via Telnet, SSH, and SNMP.
Task
Command
Comments
telnet
no telnet
Allowing SSH (Secure Shell) access
ssh
no ssh
Allowing SNMP access
snmp
no snmp
Allowing SFTP operation
sftp
no sftp
Allowing TFTP operation
4.9
tftp
no tftp
Access Policy
Factory Defaults
By default, authentication is via the locally stored database (1st-level local).
Access Policy
4-51
Task
Command
Comments
4-52
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS)
RFC 2618, RADIUS Authentication Client MIB
Benefits
The RADIUS protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network.
Functional Description
When a login attempt occurs at ETX-5300A, it submits an authentication request
to the RADIUS server. The RADIUS server checks the database and replies with
either Access Rejected or Access Accepted.
Factory Defaults
By default, no RADIUS servers are defined. When the RADIUS server is first
defined, it is configured as shown below.
Parameter
Default Value
address
0.0.0.0
retry
timeout
auth-port
1812
Task
Command
Comments
address <ip-address>
4-53
Task
Command
Comments
retry <number-of-retries>
Range 010
timeout <seconds>
Range 15
auth-port <udp-port-number>
Range 165535
no shutdown
shutdown administratively
disables the server
4-54
Description
Access Requests
Access Retransmits
Access Accepts
Access Rejects
Access Challenges
Malformed Response
Bad Authenticators
Pending Requests
Timeouts
Number of times a server did not respond, and the RADIUS server resent the packet
Unknown Types
Packets Dropped
4-55
Standards
RFC 1492, An Access Control Protocol, sometimes called TACACS.
Benefits
The TACACS+ protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network. The TACACS+ server encrypts the entire body of the packet but leaves a
standard TACACS+ header.
Factory Defaults
By default, no TACACS+ servers are defined. When the TACACS+ server is first
defined, it is configured as shown below.
Parameter
Default Value
retry
timeout
5 seconds
authentication-port
49
accounting-port
49
Functional Description
TACACS+ is a protocol that provides access control for routers, network access
servers and other networked computing devices via one or more centralized
servers. TACACS+ is based on AAA model:
Accounting The action of recording what a user is doing, and/or has done.
Components
The TACACS+ remote access environment has three major components: access
client, TACACS+ client, and TACACS+ server.
4-56
The access client is an entity which seeks the services offered by the
network.
The TACACS+ server authenticates the request, and authorizes services over
the connection. The TACACS+ server does this by matching data from the
TACACS+ client`s request with entries in a trusted database.
Accounting
ETX-5300A supports up to five accounting groups, with up to five TACACS+
servers per group. However, each TACACS+ server can be bound to a single
accounting group only.
A group can be defined with its own accounting level:
Successful logon
Logon failure
Successful logoff
4-57
Task
Command
Comments
server <ip-address>
accounting-port
<tcp-port-number>
Range 165535
authentication-port
<tcp-port-number>
Range 165535
group <string>
retry <number-of-retries>
Permanently set to 1
timeout <seconds>
Range 110
no shutdown
shutdown administratively
disables the server
Displaying statistics
show statistics
Clearing statistics
clear-statistics
Note
You can enter any combination of shell, system, and commands, but you must
enter at least one of them.
3. Type exit to return to the TACACS+ level.
The config>mngmnt>tacacsplus# prompt is displayed.
4. Type server <ip-address> to select the TACACS+ server to which to bind the
group.
The config>mngmnt>tacacsplus>server(<ip-address>)# prompt is
displayed.
4-58
Key: TAC_server1.
4-59
Displaying Statistics
Description
Requests
Request Timeouts
Unexpected Responses
Incorrect Responses
Transaction Failures
Pending Requests
4-60
Task
Command
Comments
group
4.12 Syslog
ETX-5300A uses the Syslog protocol to generate event notification messages and
transport them over IP networks to Syslog servers.
Benefits
Syslog protocol collects heterogeneous data into a single data repository. It
provides system administrators with a single point of management for collecting,
distributing and processing audit data. Syslog standardizes log file formats,
making it easier to examine log data with various standard tools. Data logging can
be used for:
Long-term auditing
Intrusion detection
4-61
Factory Defaults
By default, Syslog operation is disabled. When enabled, the default parameters
are as follows:
Parameter
Default Value
facility
local1
port
514
severity-level
informational
Functional Description
The Syslog protocol provides an instrument for generating and transporting event
notification messages from ETX-5300A to servers across IP networks.
Mess
ages
PSN
ETX-5300A
ages
Mess
Syslog
Server
ETX-5300A
Elements
Typical Syslog topology includes message senders (devices) and message
receivers (servers). ETX-5300A supports up to five Syslog servers. The receiver
displays, stores or forwards logged information. The standard designates two
types of receivers:
Transport Protocol
Syslog uses User Datagram Protocol (UDP) for its transport. The UDP port
assigned to Syslog is 514, but devices and servers can be defined to use any port
for communication.
Message Format
The length of a Syslog message is 1024 bytes or less. It contains the following
information:
4-62
Syslog
Timestamp
Message content.
Syslog Type
Description
Emergency
Emergency message
Alert
Critical alarm
Critical
Major alarm
Error
Minor alarm
Warning
Event
Notice
Cleared alarm
Informational
Debug
Syslog Configuration
When configuring Syslog parameters, it is necessary to define Syslog device and
servers.
Task
Command
port <udp-port-number>
Comments
Range is 165535
Port configuration is allowed
only if a Syslog device is
administratively disabled
Syslog
4-63
Task
Command
Comments
no shutdown
shutdown administratively
disables Syslog device
Displaying statistics
show statistics
Clearing statistics
clear statistics
Facility: local2
Parameter
Description
Total Tx Messages
Non-queued Dropped
Messages
4-64
Syslog
Command
Comments
address
<0.0.0.0255.255.255.255>
port <udp-port-number>
no shutdown
Range 165535
Port configuration is allowed
only if a Syslog server is
administratively disabled
shutdown administratively
disables Syslog server
Example
1
address 178.16.173.152
port 155
no shutdown
Configuration Errors
Table 4-13 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
Illegal Severity
Illegal Facility
Syslog
4-65
ETX-5300A# configure
ETX-5300A>config>show card-summary
Slot
Actual
Provisioned
Admin
Oper
Mode
----------------------------------------------------------------------------PS-A
PSU
PSU
Up
Up
Standalone
PS-B
PSU
PSU
Up
Up
Standalone
Main-A Main 10GbEx4
Main 10GbEx4
Up
Up
Standalone
Main-B Main 10GbEx4
Main 10GbEx4
Up
Up
Standalone
1
STM-1 Ch-4
STM-1 Ch-4
Up
Up
Standalone
2
STM-1 Ch-4
STM-1 Ch-4
Up
Up
Standalone
3
STM-1 Ch-4
Empty
Down
Down
Standalone
4
STM-1 Ch-4
Empty
Down
Down
Standalone
Fan
Fan
Fan
Up
Up
Standalone
Description
Possible Values
Slot
Chassis slot
Actual
Provisioned
Admin
4-66
Programming Cards
Parameter
Description
Possible Values
Oper
Mode
Task
Command
Comments
no card-type
Programming Cards
4-67
Two E5-cTDM-4 cards with E1 interfaces in slots 23. The card in slot 2 is
bound to loopback router interface with IP address 10.10.10.10
Empty slot 4.
ETX-5300A>config>slot(1)#
ETX-5300A>config>slot(1)#
ETX-5300A>config>slot(2)#
ETX-5300A>config>slot(2)#
ETX-5300A>config>slot(2)#
ETX-5300A>config>slot(3)#
ETX-5300A>config>slot(3)#
ETX-5300A>config>slot(4)#
ETX-5300A# configure
ETX-5300A>config>show card-summary
Slot
Actual
Provisioned
Admin
Oper
Mode
----------------------------------------------------------------------------PS-A
PSU
PSU
Up
Up
Standalone
PS-B
PSU
PSU
Up
Up
Standalone
Main-A Main 10GbEx4
Main 10GbEx4
Up
Up
Standalone
Main-B Main 10GbEx4
Main 10GbEx4
Up
Up
Standalone
1
ETH
GBE-20-SFP
Up
Up
Standalone
2
STM-1 Ch-4
STM-1 Ch-4
Up
Up
Standalone
3
STM-1 Ch-4
STM-1 Ch-4
Up
Up
Standalone
4
Empty
Empty
Down
Not Present Standalone
Fan
Fan
Fan
Up
Up
Standalone
4-68
Programming Cards
Actual Type
Provisioned Type
Administrative Status
Operational Status
Status
Protection Mode
Software Version
:
:
:
:
:
:
:
STM-1 Ch-4
STM-1 Ch-4
Up
Up
OK
Standalone
0.92D001
Configuration Errors
Table 4-15 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
Programming Cards
4-69
4-70
Programming Cards
Chapter 5
Services
This chapter presents information on the service elements and services
supported by ETX-5300A.
5.1
Service Elements
This section describes the managed elements that need to be configured during
service provisioning.
Service provisioning elements are as follows:
Profiles
Profiles
Most packet processing features are defined by creating and applying various
profiles. Profiles comprise sets of attributes related to a specific service entity.
Profiles must be defined before other managed objects.
Applied to
Description
Classifier
Flow
24K
Shaper
256
WRED
Queue
Queue
Queue block
16K
Queue block
384
Service Elements
5-1
Chapter 5 Services
Profile Type
Applied to
Description
Queue group
Port
128
L2CP
Port, flow
16
Policer, policer
aggregate
Flow
128
Flow
36
CoS mapping
Flow
36
Marking
Flow
16
Physical Ports
GbE and 10GbE ports located in I/O and main cards serve as ingress (UNI) and
egress (NNI) ports for Ethernet flows. The following packet processing attributes
are assigned to them:
5-2
L2CP profile for defining L2CP frame handling (discard, peer or tunnel)
Service Elements
Chapter 5 Services
Classification key for mapping traffic into flows according to classification profiles.
Logical Ports
Logical ports maintained by ETX-5300A serve as internal aggregation or
forwarding points for Ethernet flows. The following logical ports exist:
Service Virtual Interface (SVI) used for binding flows to bridge ports, router
interfaces or Layer-2 TDM pseudowires. SVIs serve as intermediaries for
bridges and routers, which must comply with standards of their own (VLAN
domains for bridge ports or IP address for router interfaces) and do not have
physical port attributes. They also serve as aggregation points for TDM PWs.
ETX-5300A
LB IP
Router
RIF
SVI
SVI
BP
SVI
User
BP
SVI
BP
OOB
BP
NET
Bridge
BP
User
SVI
SVI
Service Elements
5-3
MEF-8
Pseudowires
BP
SVI
SVI
Flow
BP
SVI
Main Card Ethernet Ports
Chapter 5 Services
BP
Bridge
SVI
Flow
BP
BP
SVI
SVI
SVI
Flow
SAPs serve as ingress/egress ports for flows. They help avoid traffic
re-classification and aggregate several ingress flows. ETX-5300A supports up
to 512 SAPs per SAG.
Egress
SAG
Main Card Ethernet Ports
I/O Card
Ethernet Port
I/O Card
Ethernet Port
Ingress
SAP
SAP
Link Aggregation Groups (LAGs) used for link protection. They have the
same attributes as the physical ports that serve as their members.
Forwarding Entities
Several internal entities carry traffic and make forwarding and switching
decisions. These are:
5-4
Service Elements
Chapter 5 Services
Flows
Flows are unidirectional entities that interconnect two physical or logical ports.
Flow processing is performed as follows:
L2CP frames are handled per flow according to L2CP profile settings.
Bridge
The bridge is a forwarding entity used by ETX-5300A for delivering E-LAN services
in multipoint-to-multipoint topology and G.8032 ring protection. With up to 32
bridge instances, ETX-5300A provides up to 128 bridge ports per bridge entity.
The bridge uses SVIs for connecting to logical and physical ports.
The bridge is defined by a bridge number, bridge ports and a VLAN membership
table that specifies which bridge ports are members in a certain broadcast
domain (VLAN). The bridge supports one level of VLAN editing on ingress and one
level on egress. The editing is performed at the flow level.
Router
The ETX-5300A router is an internal Layer-3 interworking device that forwards
traffic between its interfaces. Each router interface is assigned an IP address and
can be bound to one of the following:
Bridge port
The router uses service virtual interfaces (SVIs) for connecting to logical and
physical ports. The connection is always made by directing flows from a port to
an SVI, and then binding the SVI to a router interface.
Service Elements
5-5
Chapter 5 Services
5.2
E-Line Service
I/O-to-Main Path
Figure 5-4 illustrates a typical Ethernet service created in I/O-to-main card
direction. Table 5-2 details the configuration steps needed for service
provisioning.
5-6
E-Line Service
Chapter 5 Services
WRED
Shaper
Queue
Queue block
1. Define profiles
Shaper
L2CP
Classifier
CoS mapping
Queue group
Queue mapping
Color mapping
Policer
Marking
SAG
Flow N x 1
I/O Card
Ethernet Port
2. Configure ports
SAP
Flow 2
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure
physical layer
Configure
physical layer
Define
classifier key
Define
classifier key
Bind L2CP
profile
Bind L2CP
profile
Bind queue
group profile
Bind queue
group profile
3. Configure flows
Legend:
Mandatory
Optional
Configure flow 1
Configure flow 2
Bind L2CP
profile
Bind classifier
profile
Bind classifier
profile
Define VLAN
editing actions
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Bind marking
profile
Define TPID
editing policy
Bind policer
profile
Bind queue
mapping profile
Bind queue
mapping profile
Bind queue
block instance
Bind queue
block instance
E-Line Service
5-7
Chapter 5 Services
Step
Commands
Comments
Layer 2 Control
Protocol (L2CP)
l2cp-profile
Classifier Profiles
classifier-profile
CoS Mapping
cos-map-profile
Color Mapping
color-map-profile
1. Define profiles
5-8
Policing
policer-profile
Priority Queue
Mapping
queue-map-profile
Congestion
Avoidance (WRED)
wred-profile
Shaper
shaper-profile
Internal Queue
internal-queueprofile
Queue Block
queue-block-profile
Queue Group
queue-group-profile
Marking
marking-profile
E-Line Service
Commands
Comments
Ethernet Ports
port
2. Configure ports
Sequence
Chapter 5 Services
flow
3. Configure flows
Main-to-I/O Path
Figure 5-5 illustrates a typical service created in main-to-I/O card directions. See
Table 5-3 details the configuration steps needed for service provisioning.
E-Line Service
5-9
Chapter 5 Services
1. Define profiles
Flow
I/O Card
Ethernet Port
2. Configure ports
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure flow
3. Configure flows
Legend:
Mandatory
Bind queue
block instance
Optional
1. Define profiles
Sequence
5-10
Step
Commands
Comments
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
E-Line Service
2. Configure ports
Sequence
Step
Chapter 5 Services
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Comments
3. Configure flows
I/O-to-I/O Path
Figure 5-6 illustrates a typical service created in I/O-to-I/O direction. Table 5-4
details the configuration steps needed for service provisioning.
E-Line Service
5-11
Chapter 5 Services
1. Define profiles
Flow 2
I/O Card
Ethernet Port
2. Configure ports
SAG
SAG
Flow N x 1
I/O Card
Ethernet Port
SAP
SAP
3. Configure flows
Legend:
Configure flow 1
Configure flow 2
Bind L2CP
profile
Bind classifier
profile
Bind classifier
profile
Define VLAN
editing actions
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Bind marking
profile
Define TPID
editing policy
Bind policer
profile
Bind queue
mapping profile
Bind queue
mapping profile
Bind queue
block instance
Mandatory
Optional
Bind queue
block instance
2. Configure ports
1. Define profiles
Sequence
5-12
Step
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
E-Line Service
Comments
Step
Chapter 5 Services
Commands
Comments
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
3. Configure flows
Main-to-Main Path
Figure 5-6 illustrates a typical service created in main-to-main direction. Table 5-4
details the configuration steps needed for service provisioning.
E-Line Service
5-13
Chapter 5 Services
1. Define profiles
Flow
Main Card
Ethernet Port
2. Configure ports
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure main
card Ethernet port
Configure flow
3. Configure flows
Legend:
Mandatory
Bind queue
block instance
Optional
1. Define profiles
Sequence
5-14
Step
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
E-Line Service
Comments
2. Configure ports
Sequence
Step
Chapter 5 Services
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Comments
3. Configure flows
5.3
E-LAN Service
Figure 5-8 illustrates a typical E-LAN service. Table 5-6 details the configuration
steps needed for service provisioning.
E-LAN Service
5-15
Chapter 5 Services
1. Define profiles
SAG
Flow 1
I/O Card
Ethernet Port
2. Configure ports
SAP
Bridge
Flow 3a
Flow 3b
Flow 2a
Flow 2b
SVI BP
BP SVI
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure SAG
3. Define bridge
Define bridge
Define
bridge-type SVI
Define bridge
port
Bind bridge port
to SVI
Configure VLAN
membership
5. Configure VLAN
membership
Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
table size
6. Configure
flows
Legend:
Mandatory
Optional
Configure flow 1
Configure flow 2a
Configure flow 2b
Configure flow 3a
Configure flow 3b
Bind L2CP
profile
Define VLAN
editing actions
Bind classifier
profile
Define VLAN
editing actions
Bind classifier
profile
Bind classifier
profile
Bind marking
profile
Bind queue
mapping profile
Bind marking
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define TPID
editing policy
Bind queue
block instance
Bind queue
mapping profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Bind classifier
profile
Define VLAN
editing actions
Bind queue
block instance
Define VLAN
editing actions
Bind policer
profile
Bind marking
profile
Bind queue
mapping profile
Define TPID
editing policy
Bind queue
block instance
Bind queue
mapping profile
Bind queue
block instance
5-16
E-LAN Service
Chapter 5 Services
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Comments
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Bridge
bridge
Service Virtual
Interface (SVI)
svi
bridge
Bridge
Bridge
bridge
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
6. Configure flows
5. Configure VLAN
membership
3. Define bridge
2. Configure ports
1. Define profiles
Sequence
E-LAN Service
5-17
Chapter 5 Services
Sequence
Step
Commands
Comments
Bind CoS mapping profile to flow 1 and 3b or use
a fixed value
Bind color mapping profile to flow 1 and 3b or
use a fixed value
Bind policer profile to flow 1
Bind queue mapping profile to flow 1, 2b and 3a
Bind queue block instance to flow 1, 2b and 3a
Define required VLAN editing actions for flow 2a,
2b, 3a and 3b
Bind marking profile to flow 3a and 3b
Define TPID editing policy for flow 2a and 3b
5.4
Routing Services
Bridge port
5-18
Push-push and map CoS to P-bit, using the same CoS profile for both push
actions (double VLAN).
Routing Services
Note
Chapter 5 Services
1. Define profiles
Router
SAG
Flow 1
I/O Card
Ethernet Port
2. Configure ports
SAP
Flow 2a
Flow 2b
SVI RIF
RIF SVI
Flow 3a
Flow 3b
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure SAG
3. Define SVIs
4. Configure flows
Configure flow 1
Configure flow 2a
Configure flow 2b
Configure flow 3a
Configure flow 3b
Bind L2CP
profile
Define VLAN
editing actions
Bind classifier
profile
Define VLAN
editing actions
Bind classifier
profile
Bind classifier
profile
Bind classifier
profile
Bind queue
mapping profile
Bind marking
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define TPID
editing policy
Bind queue
block instance
Bind queue
mapping profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define VLAN
editing actions
Bind queue
block instance
Define VLAN
editing actions
Bind policer
profile
Bind marking
profile
Bind queue
mapping profile
Bind queue
mapping profile
Bind queue
block instance
Bind queue
block instance
Define RIFs
Define router
interfaces
Legend:
Mandatory
Optional
Bind router
interfaces to SVIs
Routing Services
5-19
Chapter 5 Services
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Comments
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Service Virtual
Interface (SVI)
svi
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
5. Configure flows
4. Define SVIs
2. Configure ports
1. Define profiles
Sequence
5-20
Routing Services
Sequence
Chapter 5 Services
Step
Commands
Comments
Router
router
Router-to-Bridge Path
When adding Layer-3 services to Layer-2 topology, such as G.8032 Ethernet ring,
a router interface must be connected to a bridge port.
Routing Services
5-21
Chapter 5 Services
1. Define
profiles
Router
SAG
Flow 1
I/O Card
Ethernet Port
2. Configure
ports
SAP
Flow 2b
Bridge
Flow 2a
Flow 3a
SVI RIF
RIF SVI
Flow 3b
SVI BP
BP
SVI
Flow 4a
Flow 4b
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure SAG
Define bridge
3. Define bridge
Define SVIs (B and R)
and bridge ports
5. Configure VLAN
membership
Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
address ranges
6. Configure
flows 1-3
Configure flow 1
Configure flow 2a
Configure flow 2b
Configure flow 3a
Configure flow 3b
Bind L2CP
profile
Define VLAN
editing actions
Bind classifier
profile
Define VLAN
editing actions
Bind classifier
profile
Bind classifier
profile
Bind classifier
profile
Bind queue
mapping profile
Bind marking
profile
Define VLAN
editing actions
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define TPID
editing policy
Bind queue
block instance
Define TPID
editing policy
Define VLAN
editing actions
Bind queue
mapping profile
Bind marking
profile
Bind queue
block instance
Bind policer
profile
Bind queue
mapping profile
Bind queue
block instance
Define RIFs
Define router
interfaces
Bind router
interfaces to SVIs
8. Configure flows
4a and 4b
Legend:
Mandatory
Optional
Configure flow 4a
Configure flow 4b
Bind classifier
profile
Bind classifier
profile
Define VLAN
editing actions
Bind marking
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Bind queue
mapping profile
Define VLAN
editing actions
Bind queue
block instance
Bind marking
profile
Define TPID
editing policy
Routing Services
Chapter 5 Services
6. Configure flows 13
5. Configure VLAN
membership
3. Define bridge
2. Configure ports
1. Define profiles
Sequence
Step
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Comments
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Bridge
bridge
Service Virtual
Interface (SVI)
svi
bridge
Bridge
Bridge
bridge
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Routing Services
5-23
Chapter 5 Services
Sequence
Step
Commands
Comments
Bind CoS mapping profile to flow 1 and 4b or use
a fixed value
Bind color mapping profile to flow 1 and 4b or
use a fixed value
Bind policer profile to flow 1
Bind queue mapping profile to flow 1, 2b and 4a
Bind queue block instance to flow 1, 2b and 4a
Define required VLAN editing actions for flow 2a,
2b, 3a and 3b
Bind marking profile to flow 3a
Router
router
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
5.5
Pseudowire Services
5-24
Pseudowire Services
Chapter 5 Services
2. Configure ports
Flow 1a
PW
SVI
Flow 1b
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure SDH/
SONET ports
Configure E1/T1
ports
3. Define SVI
4. Define PW peer
5. Add a pseudowire
6. Configure timeslot
cross-connections
Define PW peer
7. Configure flows
Configure flow 1a
Configure flow 1b
Define VLAN
editing actions
Bind classifier
profile
Bind marking
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define TPID
editing policy
Legend:
Mandatory
Optional
Bind queue
mapping profile
Define VLAN
editing actions
Bind queue
block instance
Bind queue
mapping profile
Bind queue
block instance
Pseudowire Services
5-25
Chapter 5 Services
Commands
Same as detailed in
Comments
Table 5-2
SDH/SONET Ports
port
Service Virtual
Interface (SVI)
svi
Pseudowire Peer
peer
Pseudowires
pwe
Cross-Connections
cross-connection
E1 Ports
T1 Ports
7. Configure
flows
6. Configure
timeslot crossconnections
5. Define
pseudowire
4. Define PW peer
3. Define SVIs
2. Configure ports
1. Define profiles
Sequence
5-26
Pseudowire Services
Step
Chapter 5 Services
Commands
Comments
Bind classifier profile to flow 1b
Bind CoS mapping profile to 1b or use a fixed
value
Bind color mapping profile to flow 1b or use a
fixed value
Bind queue mapping profile
Bind queue block instance
Define required VLAN editing actions
Bind marking profile to flow 1a
Define TPID editing policy for flow 1a
Pseudowire Services
5-27
Chapter 5 Services
1. Define profiles
2. Configure ports
Flow
1a
PW
SVI
Bridge
SVI BP
BP SVI
Flow 2a
Flow 2b
Flow
1b
Main Card
Ethernet Port
Configure main
card Ethernet port
Configure SDH/
SONET ports
Configure E1/T1
ports
3. Define bridge
Define bridge
Define
SVI (P)
Define
PW-type
SVI
Define
bridge-type SVIs
Define bridge
ports
Bind bridge ports
to SVIs
Configure VLAN
membership
5. Configure VLAN
membership
Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
table size
6. Define PW peer
7. Add a pseudowire
Define PW peer
Add and configure a
pseudowire
8. Configure timeslot
cross-connections
Configure crossconnections
Configure timeslot
cross-connection
for CESoPSN PW
9. Configure flows
Legend:
Mandatory
Optional
Configure flow 1a
Configure flow 1b
Configure flow 2a
Configure flow 2b
Bind classifier
profile
Bind classifier
profile
Bind classifier
profile
Bind classifier
profile
Define VLAN
editing actions
Define VLAN
editing actions
Define VLAN
editing actions
Bind marking
profile
Bind marking
profile
Bind marking
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define TPID
editing policy
Define TPID
editing policy
Bind queue
mapping profile
Define VLAN
editing actions
Bind queue
block instance
Bind marking
profile
Define TPID
editing policy
Bind queue
mapping profile
Bind queue
block instance
Pseudowire Services
Chapter 5 Services
6. Define PW peer
5. Configure VLAN
membership
3. Define bridge
2. Configure ports
1. Define profiles
Sequence
Step
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
SDH/SONET Ports
port
Bridge
bridge
Service Virtual
Interface (SVI)
svi
E1 Ports
Comments
T1 Ports
bridge
Bridge
Bridge
bridge
Pseudowire Peer
peer
Pseudowire Services
5-29
Chapter 5 Services
Step
Commands
Comments
Pseudowires
pwe
Cross-Connections
cross-connection
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
9. Configure flows
8. Configure
timeslot crossconnections
7. Define
pseudowire
Sequence
L3 Pseudowire Service
Figure 5-13 illustrates a L3 pseudowire-over-router service. Table 5-11 details the
configuration steps needed for service provisioning.
5-30
Pseudowire Services
Chapter 5 Services
Router
PW
LB
RIF
RIF SVI
Flow 1a
Flow 1b
Main Card
Ethernet Port
Define loopback
RIF
2. Define LB RIF
Define loopback
router interface
3. Configure ports
Configure main
card Ethernet port
Configure SDH/
SONET ports
Configure E1/T1
ports
4. Define SVI
5. Define PW peer
Define PW peer
Define
pseudowire peer
6. Add a pseudowire
Add a pseudowire
Add and
configure a
pseudowire
7. Configure timeslot
cross-connections
Configure crossconnections
Configure timeslot
cross-connection
for CESoPSN PW
Define RIFs
Define router
interfaces
Bind router
interfaces to SVIs
9. Configure flows
Configure flow 1a
Configure flow 1b
Define VLAN
editing actions
Bind classifier
profile
Bind marking
profile
Bind queue
mapping profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Bind queue
block instance
Define VLAN
editing actions
Bind queue
mapping profile
Legend:
Bind queue
block instance
Mandatory
Optional
Pseudowire Services
5-31
Chapter 5 Services
Commands
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
Router
router
SDH/SONET Ports
port
E1 Ports
T1 Ports
Comments
Service Virtual
Interface (SVI)
svi
Peer
peer
Pseudowires
pwe
6. Define
pseudowire
5. Define PW peer
4. Define SVIs
3. Configure TDM
I/O card and card
ports
2. Define loopback
router interface
1. Define profiles
Sequence
5-32
Pseudowire Services
Commands
Comments
Cross-Connections
cross-connection
Same as detailed in
Same as detailed in
Table 5-2
Table 5-2
8. Configure flows
7. Configure
timeslot crossconnections
Sequence
Chapter 5 Services
Pseudowire Services
5-33
Chapter 5 Services
5-34
Pseudowire Services
Chapter 6
Ports
This chapter presents information on the following physical and logical ports
present in ETX-5300A:
Ethernet Ports
SDH/SONET Ports
E1 Ports
T1 Ports
6.1
Ethernet Ports
This section details the configuration procedure for Ethernet ports located on the
main and I/O cards, including out-of-band management port.
Benefits
Ethernet interfaces located on the E5-MC-4, E5-GBE-20 and E5-10GBE-2 cards
provide high-speed connection to GbE and 10GbE networks using fiber optic
(SFP/XFP) or copper RJ-45 ports.
Factory Defaults
By default, Ethernet ports are not enabled.
Functional Description
Autonegotiation
The speed and duplex mode of an Ethernet interface is set either manually by the
operator or negotiated with the peer interface. The autonegotiation procedure
enables automatic selection of the operating mode on a LAN. It allows equipment
connecting to an operating LAN to automatically adopt the LAN operating mode
Ethernet Ports
6-1
Chapter 6 Ports
(if it is capable of supporting that mode). In ETX-5300A all Ethernet ports operate
in full duplex mode only.
When autonegotiation is disabled, the user must manually define MAU (Medium
Attachment Unit) type.
Flow Control
A flow control is a mechanism that allows an Ethernet receiving end that is
unable to process all the traffic sent to it, to hold the transmitted traffic until it is
able to process packets again.
The mechanism uses a PAUSE frame, which is a packet that instructs the far-end
device to stop transmission of packets until the receiver is able to handle traffic
again. The PAUSE frame includes a timer value (set by the originating receiver),
which tells the far-end device how long to suspend transmission. If that timer
expires or is cleared by getting a PAUSE frame whose timer value is set to 0, the
far-end device can then send packets again. Flow control is an optional port-level
parameter.
Flow control is supported on both directly- and indirectly-attached ports:
Jumbo Frames
All Ethernet ports, except out-of-band management port, support jumbo frames
(12 kbytes). The OOB management port accepts frames of up to 1518-byte size.
Ethertype
Ethertype configured per-port is used for identification of VLAN-tagged frames at
ingress and Ethertype stacking at egress. This refers to outer VLAN only. The
outer VLAN of an incoming packet must match the configured Ethertype of the
port in order to be considered a VLAN-tagged frame (otherwise frame is
considered untagged or dropped). See the Ethertype section in Appendix B for
details.
L2CP Handling
ETX-5300A handles Layer-2 control protocol traffic on a per-port and/or per-flow
basis. If no per-flow L2CP profile is configured, per-port-level profile is used. It
affects both tagged and untagged L2CP frames.
6-2
Ethernet Ports
Chapter 6 Ports
Note
If an L2CP profile has been attached to a port or a flow, the profile cannot be
deleted or modified.
See the L2CP Handling section in Appendix B for details.
Classification Key
The ingress traffic is first classified into flows according to classification profiles.
A per-port classifier key configuration defines which types of classification
profiles are supported for this type of port. The classifier key also defines the
CoS mapping and color mapping methods.
See the Classification section in Appendix B for details.
Task
Command
Comments
name <string>
no name
Enabling autonegotiation
auto-negotiation
no auto-negotiation
no auto-negotiation disables
autonegotiation.
Autonegotiation is not supported for 10GbE
ports.
Ethernet Ports
6-3
Chapter 6 Ports
Task
Command
Comments
mau-type { 10-t | 100-t | 1000-t | 10-1001000-t | 100-any | 1000-any | 10gany | 100-fx | 1000-sx | 1000-lx | 10gsr | 10g-lr | 10g-er }
flow-control
no flow-control
tx-ssm
queue-group <queue-group-profile-name>
tag-ethernet-type <0x0000-0xFFFF>
l2cp <l2cp-profile-name>
no queue-group
no l2cp
restart-auto-negotiation
no shutdown
Enabling/disabling performance
monitoring data collection
pm-enable
show status
show statistics
show sfp-status
clear-statistics
clear-sfp-counters
no pm-enable
6-4
Ethernet Ports
Chapter 6 Ports
: Up
Connector Type
: XFP In
: 10G Based SR
: 10g-any
Auto Negotiation
: Disabled
Flow Control
: Disabled
MAC Address
: 00-20-D2-AA-18-00
Displaying Statistics
Ethernet ports of ETX-5300A collect performance monitoring data.
Ethernet Ports
6-5
Chapter 6 Ports
0
0
0
0
0
0
0
0
--
0
0
0
0
0
0
0
0
0
64 Octets
65-127 Octets
128-255 Octets
256-511 Octets
512-1023 Octets
1024-1518 Octets
1519-2047 Octets
2048-Max Octets
Too Long Frames
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Description
Note
Rx
Tx
Total Frames
Total Octets
Unicast Frames
Multicast
Frames
6-6
Ethernet Ports
Parameter
Chapter 6 Ports
Description
Note
Rx
Tx
Broadcast
Frames
Jabber Frames
Discarded
Frames
Error Frames
L2CP Discarded
OAM Discarded
ACL Discarded
FCS Error
Frames
MAC Error
Frames
MAC Overflow
Too Short
Frames
Not available
for OOB
management
port
64 Octets
Not available
for OOB
management
port
Not available
for main card
ports
Ethernet Ports
6-7
Chapter 6 Ports
Parameter
Note
Rx
Tx
65127 Octets
Not available
for OOB
management
port
128255 Octets
Not available
for OOB
management
port
256511 Octets
Not available
for OOB
management
port
5121023
Octets
Not available
for OOB
management
port
10241518
Octets
Not available
for OOB
management
port
1519-2047
Octets
Not available
for OOB
management
port
2048-Max
Octets
Not available
for OOB
management
port
Too Long
Frames
Not available
for OOB
management
port
6-8
Ethernet Ports
Chapter 6 Ports
: LC
Transceiver Code
: 10GBASE-SR
Vendor Name
: SOURCEPHOTONICS
: XPXESRCDFA
Vendor Revision
: 1a
: B9A2005955
Enhanced Monitoring
: Yes
: 850
Fiber Type
: MM
SFP
--------------------------------------------------------------Current
Minimum
Maximum
RX Power (dBm)
: -8.2
-8.2
-7.9
TX Power (dBm)
: -2.4
-2.4
-2.1
Laser Bias (mA)
: 1.3
1.2
1.3
Laser Temperature (Celsius) : 32.4
18.0
32.5
Power Supply (V)
: 3.2
3.2
3.2
Table 6-2 explains the parameters of the SFP installed for selected link port.
Table 6-2. Link SFP/XFP Parameters
Parameter
Description
Detailed Status
SFP/XFP status
Connector Type
Transceiver Code
Vendor Name
Ethernet Ports
6-9
Chapter 6 Ports
Parameter
Description
Vendor Revision
Typical Maximum
Range (Meter)
The maximum range expected to be achieved over typical optical fibers, in meters
Fiber Type
The type of optical fiber for which the SFP/XFP is optimized: SM (single mode) or MM
(multimode)
RX Power (dBm)
TX Power (dBm)
Laser Temperature
(Celsius)
Example
Autonegotiation enabled
Administratively enabled.
6-10
Ethernet Ports
Chapter 6 Ports
Configuration Errors
Table 6-3 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
6.2
SDH/SONET Ports
Four SDH/SONET ports located on the E5-cTDM-4 cards serve for terminating
STM-1/OC-3 links and their overheads.
Benefits
TDM ports provide access to SDN/SONET networks at STM-1 and OC-3 levels
(155.520 Mbps), using fiber optic SFP ports.
SDH/SONET Ports
6-11
Chapter 6 Ports
Factory Defaults
ETX-5300A is supplied with all SDH/SONET ports enabled. Other parameter
defaults are listed in the table below.
Parameter
Default Value
j0-pathtrace string
0x00
j1-pathtrace string
0x01
j2-pathtrace string
0x00
overhead-mode
itu-ansi
loopback
disabled
tx-ssm
disabled
tx-clock-source
domain 1
ber-threshold eed
e-3
ber-threshold sd
e-6
Functional Description
The TDM interfacing subsystem provides interfaces to the TDM user equipment or
network. The physical STM-1/OC-3 ports support many types of SFP transceivers
with optical interfaces to meet a wide range of operational requirements.
SDH transport system. An SDH transport system provides the technical means
to transfer SDH signals between two network nodes.
6-12
SDH/SONET Ports
Chapter 6 Ports
Efficient signal transport, because the same SDH transport system can carry
various types of payloads (tributary signals).
Flexible routing, because any tributary can be inserted into the SDH signal
and removed as a single unit, without any effect on the other tributary
signals carried by the same SDH signal. This permits the building of
cost-effective add/drop multiplexers, the key component of flexible networks,
instead of implementing digital cross-connect systems as entities separated
from multiplexing equipment.
In addition, the SDH signal structure includes sufficient overhead for management
and maintenance purposes, and therefore gives the network operator full control
over all the operational aspects of SDH networks and equipment units. This
overhead permits the integration of the network management and maintenance
functions within the transport network itself.
SDH/SONET Ports
6-13
Chapter 6 Ports
F B
B B
B
B
N x M Bytes
N Rows
2
Order of
Transmission
B B
B
M Columns
Legend
B Signal Byte
F Framing Byte
N Rows
Section
Overhead
Virtual Container
(VC)
M Columns
6-14
SDH/SONET Ports
Chapter 6 Ports
Section Overhead
In SDH networks, the term section refers to the link between two consecutive
SDH equipment units of the same type.
Some signal carrying capacity is allocated in each SDH frame for the section
overhead. This provides the facilities (alarm monitoring, bit error monitoring, data
communications channels, etc.) required to support and maintain the
transportation of a VC between nodes in an SDH network.
The section overhead pertains only to an individual SDH transport system. This
means that the section overhead is generated by the transmit side of a network
node, and is terminated at the receive side of the next network node.
Therefore, when several SDH transport systems are connected in tandem, the
section overhead is not transferred together with the payload (VC) between the
interconnected transport systems.
VC Assembly/Disassembly Process
The concept of inserting a tributary signal into a virtual container for end-to-end
transport across a SDH network, is fundamental to the operation of SDH
networks. This process of inserting the tributary signal into the proper locations
of a VC is referred to as mapping.
In all SDH signal structures, the carrying capacity provided for each individual
tributary signal is always slightly greater than that required by the tributary rate.
Thus, the mapping process must compensate for this difference. This is achieved
by adding stuffing bytes, e.g., path overhead bytes, to the signal stream as part
of the mapping process. This increases the bit rate of the composite signal to the
rate provided for tributary transport in the SDH structure.
At the point of exit from the SDH network, the tributary signal must be recovered
from the virtual container, by removing the path overhead and stuffing bits. This
process is referred to as demapping. After demapping, it is necessary to
restore the original data rate of the recovered tributary data stream.
SDH/SONET Ports
6-15
Chapter 6 Ports
155.52 Mbps
9 Rows
Section
Overhead
Serial Signal
Stream
9 Columns
260 Columns
1 Column
2430 Bytes/Frame x 8 Bits/Byte x 8000 Frames/sec = 155.52 Mbps
Note
At a transmission rate of 8000 frames per second, each byte supports a data rate
of 64 kbps.
The STM-1 signal frame comprises 9 rows by 270 columns, resulting in a total
signal capacity of 2430 bytes (19440 bits per frame). Considering the STM-1
frame repetition rate, 8000 frames per second, this yields a bit rate of
155.520 Mbps.
The STM-1 frame comprises the following parts:
Section Overhead. The STM-1 section overhead occupies the first nine
columns of the STM-1 frame, for total of 81 bytes.
Virtual Container. The remaining 261 columns of the STM-1 frame, which
contain a total of 2349 bytes, are allocated to the virtual container. The
virtual container itself comprises a container for the payload signal (260
columns), preceded by one column of path overhead. The virtual container
carried in an STM-1 frame is referred to as a Virtual Container Level 4, or
VC-4. VC-4, which is transported unchanged across the SDH network,
provides a channel capacity of 150.34 Mbps.
The VC-4 structure includes one column (9 bytes) for the VC-4 path overhead,
leaving 260 columns of signal carrying capacity (149.76 Mbps). This carrying
capacity is sufficient for transporting a 139.264 Mbps tributary signal (the
fourth level in the PDH signal hierarchy). The VC-4 signal carrying capacity can
also be subdivided, to permit the transport of multiple lower-level PDH
signals.
6-16
SDH/SONET Ports
Chapter 6 Ports
Pointers
In Figure 6-3, the VC-4 appears to start immediately after the section overhead
part of the STM-1 frame.
Actually, to facilitate efficient multiplexing and cross-connection of signals in the
SDH network, VC-4 structures are allowed to float within the payload part of
STM-1 frames. This means that the VC-4 may begin anywhere within the STM-1
payload part. The result is that a given VC-4 typically begins in one STM-1 frame
and ends in the next.
Were the VC-4 not allowed to float, buffers would be required to store the VC-4
data up to the instant it can be inserted in the STM-1 frame. These buffers
(called slip buffers), which are often used in PDH multiplex equipment, introduce
long delays. Moreover, they also cause disruptions in case a slip occurs.
SDH/SONET Ports
6-17
Chapter 6 Ports
Multiplexer Section
Regenerator
Section
Regenerator
Section
Regenerator
Section
Tributary
Signals
.
..
SDH
Terminal
Multiplexer
SDH
Terminal
Multiplexer
Tributary
Signals
.
..
SDH Cross-Connect
VC
Assembly
Path
VC
Disassembly
Path the logical connection between the point at which a tributary signal is
assembled into its virtual container, and the point at which it is disassembled
from the virtual container.
Section overhead, carried in the first nine columns of the STM-1 frame:
Path overhead, carried in the first column of a VC-4. The path overhead
carried in the VC-4 is called high-order path overhead; see the SDH Tributary
Units section for a description of the low-order path overhead.
Figure 6-5 shows the detailed structure of the overhead data in STM-1 frames.
6-18
SDH/SONET Ports
Chapter 6 Ports
Path
Overhead
Section Overhead
Framing
A1
Regenerator
Section
Overhead
(Rows 1 - 3)
AU Pointers
(Row 4)
Framing
A1
Framing
A2
Framing
A1
Framing
A2
ID
C1
Path Trace
J1
BIP-8
B1
Orderwire
E1
User
F1
BIP-8
B3
DCC
D1
DCC
D2
DCC
D3
Signal Label
C2
Pointer
H1
Pointer
H2
Pointer
H3
APS
APS
K1
K2
User Channel
F2
DCC
D4
DCC
D5
DCC
D6
Multiframe
H4
DCC
D7
DCC
D8
DCC
D9
Z3
DCC
D10
DCC
D11
DCC
D12
Z4
Orderwire
E2
Z5
BIP-24
B2
B2
Multiplex
Section
Overhead
(Rows 5 - 9)
Framing
A2
Z1
Z1
B2
Z1
Z2
Z2
Z2
Pointer
H3
Pointer
H3
Path Status
G1
SDH/SONET Ports
6-19
Chapter 6 Ports
6-20
SDH/SONET Ports
Chapter 6 Ports
The all 0s code represents the VC-4 unequipped state (i.e., the VC-4 does
not carry any tributary signals)
SDH/SONET Ports
6-21
Chapter 6 Ports
The TU frame is then multiplexed into a fixed location within the VC-4.
Because of the byte interleaving method, a TU frame structure is distributed over
four consecutive VC-4 frames. It is therefore more accurate to refer to the
structure as a TU multiframe. The phase of the multiframe structure is indicated
by the H4 byte contained in the VC-4 path overhead.
6-22
SDH/SONET Ports
Chapter 6 Ports
of 1.728 Mbps and will accommodate the mapping of a North American DS1
signal (1.544 Mbps). 84 TU-11s may be multiplexed into the STM-1 VC-4.
Figure 6-6 illustrates the assembly (multiplexing) of TUs in the VC-4 structure, for
the specific case of the TU-12. For other multiplexing options, see Figure 6-7.
2430 Bytes/Frame
155.52 Mbps
9 Rows
Section
Overhead
Serial Signal
Stream
9 Columns
TU-12
No. 1
TU-12 No.2
to
TU-12 No.62
TU-12
No. 63
260 Columns
1 Column
Figure 6-7 also shows the utilization of additional SDH signal structures:
SDH/SONET Ports
6-23
Chapter 6 Ports
Note
STM-1
(155.520 Mbps)
For simplicity, reference is made only to VCs (the actual structure needed to
transport a VC can be found in the SDH or SONET multiplexing hierarchy).
1
1
AU-4
VC-4
AU-3
VC-3
AUG
C-4
139.264 Mbps
(E4)
1
3
44.736 Mbps
(DS3)
3
VC-3
TU-3
C-3
34.368 Mbps
(E3)
TUG3
TU-2
1
7
2
TUG2
Legend
VC-2
C-2
3.152 Mbps
(DS1C)
VT3
TU-11
VC-11
C-11
1.544 Mbps
(DS1)
TU-12
VC-12
C-12
2.048 Mbps
(E1)
Pointer Processing
3
Mapping
6.312 Mbps
(DS2)
6-24
Seven TUG-2 are combined to obtain one TUG-3 (21 E1 signals per TUG-3).
TUG-3 is carried in a VC-3.
Three VC-3 are combined to generate one VC-4 (63 E1 signals per VC-4). The
STM-1 signal carries one VC-4.
SDH/SONET Ports
Chapter 6 Ports
Description
LOS state entered when received signal level drops below the value at which an
error ratio of 10 is predicted.
-3
LOS state exited when 2 consecutive valid framing patterns are received,
provided that during this time no new LOS condition has been detected.
Out of Frame (OOF)
OOF state entered when 4 or 5 consecutive SDH frames are received with invalid
(errored) framing patterns. Maximum OOF detection time is therefore 625 s.
OOF state exited when 2 consecutive SDH frames are received with valid framing
patterns.
LOF state entered when OOF state exists for up to 3 ms. If OOFs are
intermittent, the timer is not reset to zero until an in-frame state persists
continuously for 0.25 ms.
LOF state exited when an in-frame state exists continuously for 1 to 3 ms.
LOP state entered when N consecutive invalid pointers are received where N = 8,
9 or 10.
LOP state exited when 3 equal valid pointers or 3 consecutive AIS indications are
received.
Note
Multiplexer Section AIS
Detected by MSTE when bits 6 to 8 of received K2 byte are set to 110 for 3
consecutive frames. Removal is detected by MSTE when 3 consecutive frames are
received with a pattern other than 110 in bits 6 to 8 of K2.
Transmission of MS-AIS overrides MS-FERF
SDH/SONET Ports
6-25
Chapter 6 Ports
Signal
Description
AU Path AIS
Sent by MSTE to alert downstream high order path terminating equipment (HO
PTE) of detected LOP state or received AU Path AIS. Indicated by transmitting all
1s pattern in the H1, H2, H3 pointer bytes plus all bytes of associated VC-3 and
VC-4).
Detected by HO PTE when all 1s pattern is received in bytes H1 and H2 for 3
consecutive frames. Removal is detected when 3 consecutive valid AU pointers
are received
TU Path AIS
Sent downstream to alert low order path terminating equipment (LO PTE) of
detected TU LOP state or received TU path AIS. Indicated by transmitting all 1s
pattern in entire TU-1, TU-2 and TU-3 (i.e., pointer bytes V1-V3, V4 byte, plus all
bytes of associated VC-1, VC-2 and VC-3 loaded by all 1s pattern).
Note
Note
This section describes the response to the various conditions that can be
detected by the maintenance functions built into the SDH frames, and the flow
of alarm and indication signals.
Figure 6-8 provides a graphical representation of the flow of alarm and indication
signals through an SDH transmission path.
6-26
SDH/SONET Ports
Chapter 6 Ports
Low Order Path
Regenerator
Section
LO PTE
HO PTE
MS TE
RS TE
MS TE
LOP
HO PTE
LO PTE
LOP
LOP
AIS
(H1H2)
AIS
(V1V2)
LOS
LOF
LOS
LOF
AIS (X2)
Tributary
AIS
FERF
(X2)
RAI
(G1)
RAI (G1)
RAI
(VS)
RAI (VS)
B1(BIP-8)
B1(BIP-8)
B2(BIP-24)
B3(BIP-8)
FEBE
(G1)
FEBE
(G1)
BIP-2
(VS)
FEBE
(VS)
FEBE
(VS)
Legend
Collection
Transmission
Generation
LO
HO
Low Order
High Low Order
PTE
RS TE
MS TE
Figure 6-8. Flow of Alarm and Indication Signals through an SDH Transmission Path
Far End Receive Failure (FERF) is sent upstream in the multiplexer overhead
after multiplexer section AIS, or LOS, or LOF has been detected by equipment
terminating in a multiplexer section span;
A Remote Alarm Indication (RAI) for a high order path is sent upstream after
a path AIS or LOP condition has been detected by equipment terminating a
path
SDH/SONET Ports
6-27
Chapter 6 Ports
A Remote Alarm Indication (RAI) for a low order path is sent upstream after a
low order path AIS or LOP condition has been detected by equipment
terminating a low order path.
Performance Monitoring
Performance monitoring at each level in the maintenance hierarchy is based on
the use of the byte interleaved parity (BIP) checksums calculated on a frame by
frame basis. These BIP checksums are sent downstream in the overhead
associated with the regenerator section, multiplexer section and path
maintenance spans.
In response to the detection of errors using the BIP checksums, the equipment
terminating the corresponding path sends upstream Far End Block Error (FEBE)
signals.
SONET Environment
SONET (Synchronous Optical Network) is an alternative standard to SDH, widely
used in North America and other parts of the world. SONET uses implementation
principles and even frame structures that are very similar to those used by SDH.
Therefore, the following description is based on the information already
presented for SDH.
1
STS-3
STS-3c
139.264 Mbps
(E4)
1 STS-3c
SPE
44.736 Mbps
(DS3)
1
2
STS-1
Legend
STS-1
SPE
VT
Group
VT6
VT6
SPE
6.312 Mbps
(DS2)
VT3
VT3
SPE
3.152 Mbps
(DS1C)
VT1.5
VT1.5
SPE
1.544 Mbps
(DS1)
VT2
VT2
SPE
2.048 Mbps
(E1)
Pointer Processing
3
Mapping
6-28
Virtual containers (VCs) are replaced by virtual tributaries (VTs); however the
rates are similar to those used in the SDH hierarchy
SDH/SONET Ports
Chapter 6 Ports
Remote Loopback
The recovered STM-1/OC-3 receive signal provided by the STM-1/OC-3 transceiver
of the tested port is returned by the remote loopback toward the equipment
connected to the local STM-1/OC-3 port. The loopback is activated at the line side
of the STM-1/OC-3 framer serving the tested port.
Figure 6-10 shows the signal paths when a remote loopback is activated.
E5-cTDM-4 Card
RX
Transceiver
Framer
TX
RX
Transceiver
Framer
TX
Local Loopback
The local loopback connects the STM-1/OC-3 transmit signal generated by the
STM-1/OC-3 framer of the tested port, to the receive input of the framer. This
returns the STM-1/OC-3 signal toward the equipment at the remote end of the
link.
Figure 6-11 shows the signal paths when a local loopback is activated.
SDH/SONET Ports
6-29
Chapter 6 Ports
Framer
TX
RX
Transceiver
Framer
TX
Task
Command
Comments
name <string>
no shutdown
eed-action [ { soh } ] [ {
path } ] [ { vt } ]
6-30
SDH/SONET Ports
no name
no eed-action
Chapter 6 Ports
Task
Command
Comments
no loopback
overhead-mode { itu-ansi |
ttc }
tx-clock-source {loopback |
domain <domain-number>}
no tim-action
oc3<oc3 number>
soh <profile_name>
pm-enable
show status
show statistics
show sfp-status
clear-statistics
clear-sfp-counters
tx-ssm
no pm-enable
no tx-ssm
SDH/SONET Ports
6-31
Chapter 6 Ports
To configure AUG/OC-3:
1. At the config>port>sdh-sonet(slot/port)# prompt, enter aug 1 or oc3 1.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)# prompt is
displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
path <profile_name>
Enabling/disabling performance
monitoring data collection at
AUG level
pm-enable
tug3 { 1 | 2 | 3}
au3 { 1 | 2 | 3}
sts1 { 1 | 2 | 3}
no pm-enable
To configure TUG3/AU3/STS-1:
1. At the config>port>sdh-sonet(slot/port)>aug(number) or oc3(number)#
prompt, enter tug3 13, au3 13 or sts1 13.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
6-32
SDH/SONET Ports
Chapter 6 Ports
Task
Command
Comments
path <profile_name>
Enabling/disabling performance
monitoring data collection at
AU3 and STS-1 levels
pm-enable
name <string>
no shutdown
no pm-enable
no name removes the name
no name
To configure VC-12/VC-11/VT-1.5:
1. At the config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)# prompt, enter vc12 number number, vc11
number number or vt1-5 number number.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)> vc12 (TUG2 number/VC-12 number), vc11
(TUG2 number/VC-11 number) or vt1-5 (TUG2 number/VT-1.5 number)#
prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
SDH/SONET Ports
6-33
Chapter 6 Ports
Task
Command
Comments
path <profile_name>
Enabling/disabling performance
monitoring data collection at VC12, VC-11 or VT-1.5 levels
pm-enable
name <string>
no shutdown
no pm-enable
no name removes the name
no name
shutdown disables the port
Note
Task
Command
Comments
6-34
SDH/SONET Ports
fe-line-interval-threshold [cv
<cv-value 016383>] [es
<es-value 0900>] [ses
<ses-value 0900>] [uas
<uas-value 0900>]
Chapter 6 Ports
Task
Command
line-interval-threshold [cv
<cv-value 016383>] [es
<es-value 0-900>] [ses
<ses-value 0900>] [uas
<uas-value 0900>]
section-interval-threshold
[cv <cv-value 016383>] [es
<es-value 0900>] [ses
<ses-value 0900>] [sefs
<sefs-value 0900>]
padding<value>
tim-monitoring
no tim-monitoring
Comments
Note
Task
Command
Comments
fe-line-interval-threshold [cv
<cv-value 016383>] [es
<es-value 0900>] [ses
<ses-value 0900>] [uas
<uas-value 0900>]
SDH/SONET Ports
6-35
Chapter 6 Ports
Task
Command
interval-threshold [cv
<cv-value 016383>] [es
<es-value 0900>] [ses
<ses-value 0900>] [uas
<uas-value 0900>]
padding<value>
payload-label<value>
tim-monitoring
no tim-monitoring
Comments
Example
The script below shows the configuration of SDH/SONET port 1 on the E5-cTDM-4
card installed in slot 1.
#***************************Defining_SDH_SONET_Card**************************
configure slot 1
card-type sdh-sonet stm-1-ch-4
no shutdown
exit all
#*********************************End****************************************
#**************************Configuring_SOH_Profile***************************
configure port soh-profile SOH-PROFILE-1
ber-threshold eed e-3 sd e-5
tim-monitoring
exit all
#*********************************End****************************************
#**************************Configuring_HVC_Profile***************************
configure port path-profile PATH-PROFILE-1
payload-label hvc 0x02
tim-monitoring
exit all
#*********************************End****************************************
#**************************Configuring_LVC_Profile***************************
configure port path-profile VC-PROFILE-1
payload-label lvc asynchronous
tim-monitoring
exit all
#*********************************End****************************************
#**************************Configuring_SDH_Port******************************
configure port sdh-sonet 1/1
6-36
SDH/SONET Ports
Chapter 6 Ports
Displaying Status
You can display current status of TDM port on E5-cTDM-4 card at any level. For
viewing the status of the SDH/SONET hierarchical entities, follow the instructions
below.
SDH/SONET Ports
6-37
Chapter 6 Ports
:
:
:
:
00-07-45-00-0F-08
OK
SFP In
None
: 0x01
: 0x01
The TDM interface status screens provide information on the port name,
administrative/operational status, trace message strings, signal labels, RDI
code and connector type (SDH/SONET level only).
Name
Administrative Status
Operational Status
: HVC-1/1/1
: Down
: Down
: 0x01
: 0x01
Signal Label
Expected
Received
: 0x00
: 0x00
RDI Code
: No Defect
6-38
SDH/SONET Ports
Chapter 6 Ports
ETX-5300A>config>port>sdh-sonet(4/1)>oc3(1)>sts1(1)# show
status
Name
Administrative Status
Operational Status
: HVC-4/1/1
: Down
: Down
: 0x01
: 0x01
Signal Label
Expected
Received
: 0x00
: 0x00
RDI Code
: No Defect
: LVC-4/1/1
: Down
: Down
: 0x01
: 0x01
Signal Label
Expected
Received
: 0x00
: 0x00
RDI Code
: No Defect
Displaying Statistics
SDH/SONET ports of ETX-5300A feature the collection of performance monitoring
data at different hierarchical levels, per ANSI T1.403. The PM data is collected for
15-minute and 24-hour intervals.
SDH/SONET Ports
6-39
Chapter 6 Ports
Task
Command
Comments
Displaying statistics
show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all}
ETX-5300A>config>port>sdh-sonet(l/1)# pm-enable
ETX-5300A>config>port>sdh-sonet(l/1)# show statistics current
Current
Time Elapsed (Sec) : 0
Valid Intervals
: 0
Invalid Intervals : 0
Section
ES
: 0
SEFS
: 0
ES
UAS
FC
Line
: 0
: 0
: 0
SES
CV
: 0
: 0
SES
CV
: 0
: 0
SES
CV
: 0
: 0
Far End
ES
UAS
FC
: 0
: 0
: 0
6-40
SDH/SONET Ports
Chapter 6 Ports
ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)# vt1-5 1 1
ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)>vt1.5(1/1)# pm-enable
ETX-5300A>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)>vt1.5(1/1)# show
statistics current
Current
----------------------------------------------------------------------------Time Elapsed (Sec) : 0
Valid Intervals
: 0
Invalid Intervals : 0
ES
UAS
FC
: 0
: 0
: 0
ES
UAS
FC
Far End
: 0
: 0
: 0
SES
CV
: 0
: 0
SES
CV
: 0
: 0
Description
ES
SONET: Number of seconds during which at least one Section BIP error was detected
or an SEF or LOS defect was present
SDH: Number of seconds during which at least one RS errored block was detected or
an SEF or LOS defect was present
SES
SONET: Number of seconds during which K or more Section BIP errors were detected
or an SEF or LOS defect was present
SDH: Number of seconds during which 2400 or more RS errored blocks were detected
or an SEF or LOS defect was present
SEFS
CV
SONET: Number of BIP errors detected at the Section layer (B1 byte)
SDH: Number of errored blocks at the RS layer (B1 byte)
Description
ES
SONET: Number of seconds during which at least one Line BIP error was detected or a
compound AIS-LINE defect was present
SDH: Number of seconds during which at least one MS errored block was detected or
a compound AIS-LINE defect was present
SES
SONET: Number of seconds during which K or more Line BIP errors were detected or a
compound AIS-LINE defect was present
SDH: Number of seconds during which 2400 or more MS errored blocks were detected
or a compound AIS-LINE defect was present
SDH/SONET Ports
6-41
Chapter 6 Ports
Parameter
Description
UAS
Number of seconds for which the Line is unavailable. The line becomes unavailable at
the onset of 10 contiguous SES-Ls. The 10 SES-Ls are included in unavailable time.
Once unavailable, the line becomes available at the onset of 10 contiguous seconds
with no SES-Ls. The 10 seconds with no SES-Ls are excluded from unavailable time.
CV
SONET: Number of BIP errors detected at the Line layer (B2 byte)
SDH: Number of errored blocks at the MS layer (B2 byte)
FC
Number of Line failure events. A failure event begins when a compound AIS-LINE
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
Description
ES
SONET: Number of seconds during which at least one Line BIP error was reported by
the far-end (using the REI-L) or an RDI-LINE defect was present
SDH: Number of seconds during which at least one MS errored block was reported by
the far-end (using the REI-L) or an RDI-LINE defect was present
SES
SONET: Number of seconds during which K or more Line BIP errors were reported by
the far-end or an RDI-LINE defect was present
SDH: Number of seconds during which 2400 or more MS errored blocks were reported
by the far-end or an RDI-LINE defect was present
UAS
Number of seconds for which the Line is unavailable at the far-end. The far-end line
becomes unavailable at the onset of 10 contiguous FE-SES-Ls. The 10 FE-SES-Ls are
included in unavailable time. Once unavailable, the line becomes available at the onset
of 10 contiguous seconds with no FE-SES-Ls. The 10 seconds with no FE-SES-Ls are
excluded from unavailable time.
CV
SONET: Number of Line BIP errors detected by the far-end and reported back to the
near-end using the REI-L indication in the LOH (M1 byte)
SDH: Number of MS errored blocks detected by the far-end and reported back to the
near-end using the REI-L indication in the MSOH (M1 byte)
FC
Number of far-end Line failure events. A far-end failure event begins when an RFI-LINE
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
To clear statistics:
6-42
SDH/SONET Ports
Chapter 6 Ports
To activate a loopback:
1. Navigate to configure port sdh-sonet <slot>/<port> to select the SDH/SONET
port to test.
The config>port>sdh-sonet>(slot/port)# prompt is displayed.
2. At the config>port>sdh-sonet>(slot/port)# prompt, enter loopback , followed
by loopback type (local or remote) and its duration 160 min.
To deactivate a loopback:
Configuration Errors
Table 6-8 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
SDH/SONET Ports
6-43
Chapter 6 Ports
Message
Description
Invalid expected higher order path signal label (byte C2) has
been selected
6-44
SDH/SONET Ports
Chapter 6 Ports
Message
Description
6.3
E1 Ports
Factory Defaults
ETX-5300A is supplied with all E1 ports disabled. Other parameter defaults are
listed in the table below.
Parameter
Default Value
line-type
g732n
path-interval-threshold cv
path-interval-threshold es
80
path-interval-threshold ses
10
path-interval-threshold sefs
path-interval-threshold css
path-interval-threshold uas
10
idle-code
7F
out-of-service
00
tx-clock-source
domain 1
loopback
no loopback
trail-mode
terminated
Functional Description
E1 Line Signal Characteristics
E1 signal characteristics are specified in ITU-T Rec. G.703. The nominal data rate
of the E1 signal is 2.048 Mbps. The E1 line signal is encoded in the High-Density
Bipolar 3 (HDB3) code.
ETX-5300A Ver. 1.0
E1 Ports
6-45
Chapter 6 Ports
HDB3 is based on the alternate mark inversion (AMI) code. In the AMI code, 1s
are alternately transmitted as positive and negative pulses, whereas 0s are
transmitted as a zero voltage level. To prevent the transmission of long strings of
0s, which do not carry timing information, the HDB3 coding rules restrict the
length of a 0 string that can be transmitted through the line to a maximum of
three pulse intervals. Longer strings of 0s are encoded at the transmit end to
introduce non-zero pulses.
To allow the receiving end to detect the artificially-introduced pulses and enable
their removal, in order to restore the original data string, the encoding introduces
intentional coding violations in the sequence transmitted to the line. The
receiving end detects these violations; when they appear to be part of an
encoded 0 string, they are removed.
Coding violations may also be caused by transmission errors. Therefore, coding
violations that cannot be interpreted as intentional coding violations can be
counted, and thus provide information on the quality of the transmission link.
E1 Signal Structure
The E1 line operates at a nominal rate of 2.048 Mbps. The data transferred over
the E1 line is organized in frames. Each E1 frame includes 256 bits.
The E1 frame format, as defined in ITU-T Rec. G.704, is shown in Figure 6-14.
8 Bits per
Time Slot
Time Slot 0
Time Slot 16
a. Frame 0
0 0 0 0 X Y X X
FAS
MAS
Channel Data
32 Time Slots/Frame
16 Frames/Multiframe
TS
0
TS
1
FR
0
TS
2
TS
3
FR
1
TS
4
b. Frames 1-15
A B C D A B C D
TS
5
FR
2
TS
6
TS
7
FR
3
TS
8
FR
4
TS
9
TS
10
TS
11
FR
5
TS
12
FR
6
TS
13
TS
14
TS
15
FR
7
TS
16
TS
17
FR
8
TS
18
FR
9
TS
19
1 2 3 4 5 6 7 8
TS
20
TS
21
FR
10
TS
22
FR
11
TS
23
TS
24
TS
25
TS
26
FR
12
TS
27
FR
13
TS
28
FR
14
TS
29
TS
30
TS
31
FR
15
Notes
I
N
A
FAS
International Bit
National Bits (Sa4 through Sa8)
Alarm Indication Signal (Loss of Frame Alignment - Red Alarm)
Frame Alignment Signal, occupies alternate
(but not necessarily even) frames
ABCD
X
Y
MAS
Timeslot 0
Timeslot 0 of E1 frames is used for two main purposes:
6-46
E1 Ports
Chapter 6 Ports
The receiving equipment searches for the fixed FAS pattern in the data
stream using a special algorithm, a process called frame synchronization.
Once this process is successfully completed, the equipment can identify each
bit in the received frames.
Bit 1 this bit is called the international (I) bit. Its main use is for error
detection using the optional CRC-4 function (CRC-4 stands for Cyclic
Redundancy Check, using a fourth-degree polynomial). This function is
described below.
The other bits, identified as Sa4 through Sa8, are designated national
bits, and are actually available to the users, if there is an agreement
regarding their use. The total data rate that can be carried by each
national bit is 4 kbps.
Multiframes
To increase the information carrying capacity without wasting bandwidth, the
frames are organized in larger patterns, called multiframes. ITU-T Rec. G.704
recommendations define the following types of multiframes:
The even frame of the pair includes the frame alignment signal (FAS).
The odd frame has a 1 in bit position 2, and housekeeping information in the
other bits.
The number of timeslots available for user data is 31, and therefore the
maximum payload rate is 1984 kbps.
To enable the transmission of network management information, a separate
timeslot may have to be assigned within the frame. This procedure is called
common channel signaling (CCS). The CCS information is often transmitted in
timeslot 16.
E1 Ports
6-47
Chapter 6 Ports
The first four bits of timeslot 16 in multiframe 16 always carry the multiframe
alignment sequence, 0000.
6-48
E1 Ports
A CRC-4 multiframe always starts with an even frame (a frame that carries
the frame alignment signal). The CRC-4 multiframe structure is identified by a
six-bit CRC-4 multiframe alignment signal, which is multiplexed into bit 1 of
timeslot 0 of each odd-numbered (1, 3, 5, etc.) frame of the CRC-4
multiframe (i.e., in frames 1 through 11 of the CRC-4 multiframe).
Chapter 6 Ports
end in the next submultiframe). The results are reported by two bits
multiplexed in bit 1 of timeslot 0 in frames 13, 15 of the CRC-4 multiframe,
respectively. Errors are counted and used to prepare statistic data on
transmission performance.
E1 Alarm Conditions
Excessive bit error rate. The bit error rate is measured on the frame
-3
alignment signal. The alarm threshold is an error rate higher than 10 that
persists for 4 to 5 seconds. The alarm condition is canceled when the error
-4
rate decreases below 10 for 4 to 5 consecutive seconds.
Alarm indication signal (AIS). The AIS signal is an unframed all-ones signal,
and is used to maintain line signal synchronization in case of loss of input
signal; for example, because an alarm condition occurred in the equipment
that supplies the line signal. The equipment receiving an AIS signal loses
frame synchronization.
E1 Port Diagnostics
Diagnostic tools at the E1 level include:
Bit Error Rate Test for measuring the quality of the E1 line.
Local Loopback
Figure 6-15 shows the signal paths during a local loopback on an internal E1 port.
Internal E1
TDM
PSN
Framer
Mapper
E1 Ports
6-49
Chapter 6 Ports
side through the port packet processor, the remaining sections of the local
transmit path, and the link through the packet-switched network.
While the loopback is activated, the transmit signal arriving from the local end
user equipment is ignored, but the local E1 port continues to send the received
signal to the local end user equipment.
To ensure that the remote equipment is capable of providing a good signal, the
local loopback should be activated on the local E1 port only after checking that
the remote end users equipment connected to the tested E1 port operates
normally while its own local loopback is activated.
While the local loopback is activated on the local port, the remote end user
equipment must receive its own signal, and thus it must be frame-synchronized.
This test fully checks the operation of the local E1 path serving the tested port; it
also checks the signal paths that end at the corresponding E1 port, including the
transmission through the packet network connecting the remote equipment to
ETX-5300A.
Remote Loopback
Figure 6-16 shows the signal paths during a remote loopback on an internal E1
port.
As shown in Figure 6-16, when a remote loopback is activated on an internal E1
port, the E1 framer of that port returns the transmit signal via the receive path of
the same port. The transmit signal is received from the local end user equipment
served by the tested port, through the corresponding E5-cTDM-4 card.
While the loopback is activated, the signal received from the remote E1 port is
ignored. The signal received from the local end user equipment remains
connected to the packet processor and it is transmitted to the remote E1 port.
To ensure that the user equipment is capable of providing a good signal, the
remote loopback should be activated on E1 port only after checking that the local
end user equipment operates normally while its own local loopback is activated.
Internal E1
TDM
PSN
Framer
Mapper
6-50
E1 Ports
Chapter 6 Ports
BER Testing
A BERT typically consists of a test pattern generator and a receiver that is set to
the same pattern. BER testers can be used together at two ends of transmission
link to check data integrity in both directions. Alternatively, a single bit tester can
be used at one end of the link with a loopback activated at the remote end to
return the transmitted data.
BER testing can be activated on the entire internal port or on the selected
timeslots with or without the injection of errors randomly or at a constant rate.
Multiple BERTs can be run simultaneously on separate E1 ports.
Note
An internal E1 port becomes active only if at least one enabled pseudowire with a
valid cross-connection is assigned to the port.
Task
Command
Comments
Assigning short
description to port
name <string>
Masking/unmasking
alarms generated by the
internal E1
no shutdown
Specifying E1 framing
mode
Enabling/disabling
performance monitoring
data collection
pm-enable
no pm-enable
E1 Ports
6-51
Chapter 6 Ports
Task
Command
Comments
bert [pattern {2e-10 | 2e-15 | 2e-20 | 2e23 | 511 | 2047| qrss | 2e-11}] [inject-error
{none | single | 10e-1 | 10e-2 | 10e-3 |
10e-4 | 10e-5 | 10e-6 | 10e-7}]
no bert
Specifying the code
transmitted to fill unused
timeslots in E1 frames
idle-code { 00 to FF (hexa) }
out-of-service <00FF>
Activating diagnostic
loopback
no loopback
show status
show statistics
Displaying Status
You can display current status of any internal E1 port on an E5-cTDM-4 card.
6-52
E1 Ports
Chapter 6 Ports
Displaying Statistics
Internal E1 ports of ETX-5300A collect performance monitoring data at the path
level.
Task
Command
Comments
Displaying statistics
show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all}
Note
Parameter
Description
CV
E1 Ports
6-53
Chapter 6 Ports
Parameter
Description
Rx Frames Slip
ES
Number of seconds during which at least one FE or CS was detected or a SEF defect or
an AIS defect was present
UAS
Number of seconds for which the E1 path is unavailable. The E1 path becomes
unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in
unavailable time. Once unavailable, the E1 path becomes available at the onset of 10
contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from
unavailable time.
BES
Number of seconds during which at least 2 and no more than 804 CRC-4 errors were
detected while neither OOF nor AIS defects were present.
FC
Number of E1 path failure events. A failure event begins when a LOF failure or an AIS
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
SES
Number of seconds during which 805 or more CRC-4 errors were detected or an OOF
defect was present
SEFS
Number of seconds during which at least one OOF defect or an AIS defect was present
To clear statistics:
Bit Error Rate Test for measuring the quality of the E1 line.
Running Loopbacks
ETX-5300A supports activation of local and remote loopbacks at the E1 level. You
can initiate a local loopback on a single E1 port and remote loopbacks on any
number of E1 ports on an E5-cTDM-4 card at a time. E1 Port Diagnostics section
above details signal paths when local and remote loopbacks are activated.
To activate a loopback:
1. Navigate to configure port e1 <slot/port/tributary> to select the E1 port to
test.
The config>port>e1>(slot/port/tributary)# prompt is displayed.
2. At the config>port>e1>(slot/port/tributary)# prompt, enter loopback,
followed by loopback type (local or remote) and its duration 160 min.
To deactivate a loopback:
6-54
E1 Ports
Chapter 6 Ports
BER Testing
Bit Error Rate test is used for measuring the quality of the E1 line.
Example
E1 name e1_1_1_1
Administratively enabled.
E1 Ports
6-55
Chapter 6 Ports
Configuration Errors
Table 6-10 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
6.4
T1 Ports
6-56
T1 Ports
Chapter 6 Ports
Factory Defaults
ETX-5300A is supplied with all E1 ports disabled. Other parameter defaults are
listed in the table below.
Parameter
Default Value
line-type
unframed
path-interval-threshold cv
path-interval-threshold es
80
path-interval-threshold ses
10
path-interval-threshold sefs
path-interval-threshold css
path-interval-threshold uas
10
idle-code
7F
out-of-service
00
tx-clock-source
loopback
loopback
no loopback
trail-mode
terminated
Functional Description
T1 Line Signal
The basic T1 line signal is coded using the alternate mark inversion (AMI) rules.
The AMI format cannot transmit long strings of 0s because such strings do not
carry timing information. Therefore, the AMI signal source must generate a signal
with a guaranteed minimum of 1 density. The minimum average 1 density
required by the applicable standards is 1:8. Therefore, when a T1 signal is
transmitted over an AMI line, each frame timeslot must include at least one 1
bit. This effectively reduces user data rate to 56 kbps per timeslot, and precludes
the provisioning of clear channel capability (CCC).
This problem is circumvented by using modified line codes that perform zero
suppression by substituting special codes for long 0 strings. The generally
accepted zero suppression methods are B7 and B8ZS.
With B7, the maximum length of 0 strings in the user data must not exceed
seven zeros. (When a longer string is detected, the seventh bit is changed to
one, to meet the minimum 1 density requirement and thus ensure that
the remote end can properly recover the clock signal.). Although this
requirement can be fulfilled in many applications, it does not provide 64 kbps
clear channel capability. Therefore, when the B7 line code is used, inband
management is not supported.
Only the B8ZS zero suppression method provides clear channel capability, and
the 1 density requirement no longer restricts user data characteristics. This
means that each T1 frame timeslot can support the full 64 kbps.
T1 Ports
6-57
Chapter 6 Ports
Since the AMI coding does not affect the signal transmitted to the line, it is also
called transparent coding. This emphasizes the fact that although the other methods
are also transparent to users data, perfect transparency is achieved only when the
zero-string substitution sequences are correctly recognized. Thus, the other methods
are more sensitive to transmission errors (transmission errors may affect the
decoding of zero-string substitution sequences).
T1 Signal Structure
The T1 line operates at a nominal rate of 1.544 Mbps. The data transferred over
the T1 line is organized in frames.
The T1 frame format is shown in Figure 6-17.
8 Bits/Channel
Byte Organization
(D4 Frame - See NOTE)
Frame
Organization
Ft C H C H
24 Channels/Frame
or
1 2
Frame = 193 Bits
Fs
CH
13
FR FR
1 2
FR
7
Multiframe
Organization
NOTE:
In addition, ESF has a C-bit in frame 18 and a D-bit in frame 24
8
A
B
Other Frames
Frame 6
Frame 12
Bit B Conveys
Signaling
Information
CH
24
FR FR
11 12
Multiframe
SF (D4) 12 Frames
ESF: 24 Frames
T1 Ports
Chapter 6 Ports
Facility Data Link (FDL) allows transfer of supervisory data, e.g. alarms,
error performance, test loop commands, etc. to be passed through the T1
link.
Cyclic Redundancy Check (CRC) allows the measurement of the bit error
rate and enhances the reliability of the framing algorithm.
The F-bit pattern defines the structure of frames and multiframes. In the D4 (SF)
frame format, the F-bit of consecutive frames is alternately interpreted as an
Ft bit (terminal framing bit) or Fs bit (frame signaling bit).
Fs pattern: fixed 001110 pattern, defines the multiframe boundaries, so that one
frame may be distinguished from another. In particular, the Fs pattern is needed
so that frames 6 and 12 may be identified for the recovery of signaling bits.
In the ESF frame format, the multiframe structure is extended to 24 frames, but
the frame and channel structure are the same as in the D4 (SF) format.
T1 Alarm Conditions
The basic alarm conditions are the red alarm and the yellow alarm. Note that with
the ESF format, the FDL link can be used for more sophisticated status
transmissions, in accordance with the ANSI Standard T1.403-1989 and AT&T Pub.
54016.
Red Alarm. A red alarm is generated when the local unit has lost frame
synchronization for more than 2.5 consecutive seconds, or the bit error rate
-2
exceeds 10 for 2.5 consecutive seconds. Loss of frame synchronization may
be caused either by Fs or Ft errors, by the reception of an AIS signal, or by
the loss of the input signal (receive data remains zero for 31 consecutive
bits). In accordance with AT&T TR-62411, a system automatically recovers
synchronization when there has been a period of 10 to 20 consecutive
seconds free of the loss of sync condition.
Yellow Alarm. A yellow alarm is sent from the remote unit to inform the local
unit that a red alarm exists at the remote end.
Alarm Indication Signal (AIS). The AIS signal is an unframed all-ones signal,
and is used to maintain line signal synchronization when an alarm condition
occurs in the equipment that supplies the line signal.
T1 Port Diagnostics
Diagnostic tools at the T1 level include:
Code-activated local and remote loopbacks. These loopbacks are activated and
deactivated by the detection of user-specified patterns in the TDM data, a
function enabled and configured as part of the physical parameters of the port.
Bit Error Rate Test for measuring the quality of the T1 line.
T1 Ports
6-59
Chapter 6 Ports
Note
You can run only one regular or inband-activated local loopback per the
E5-cTDM-4 card.
Local Loopback
Figure 6-15 shows the signal paths during a local loopback on an internal T1 port.
Internal T1
TDM
PSN
Framer
Mapper
Remote Loopback
Figure 6-16 shows the signal paths during a remote loopback on an internal E1
port.
As shown in Figure 6-16, when a remote loopback is activated on an internal E1
port, the T1 framer of that port returns the transmit signal via the receive path of
the same port. The transmit signal is received from the local end user equipment
served by the tested port, through the corresponding E5-cTDM-4 card.
While the loopback is activated, the signal received from the remote T1 port is
ignored. The signal received from the local end user equipment remains
connected to the packet processor and it is transmitted to the remote T1 port.
To ensure that the user equipment is capable of providing a good signal, the
remote loopback should be activated on T1 port only after checking that the local
end user equipment operates normally while its own local loopback is activated.
6-60
T1 Ports
Chapter 6 Ports
Internal T1
TDM
PSN
Framer
Mapper
BER Testing
A BERT typically consists of a test pattern generator and a receiver that is set to
the same pattern. BER testers can be used together at two ends of transmission
link to check data integrity in both directions. Alternatively, a single bit tester can
be used at one end of the link with a loopback activated at the remote end to
return the transmitted data.
BER testing can be activated on the entire internal port or on the selected
timeslots with or without the injection of errors randomly or at a constant rate.
Multiple BERTs can be run simultaneously on separate T1 ports.
Inband Loopbacks
ETX-5300A supports code-activated local and remote loopbacks. These loopback
functions are activated and deactivated by the detection of user-specified
patterns in the TDM data.
When a T1 port is configured to activate a local loopback in response to the
configured pattern sent using PW OAM messaging, it monitors the incoming TDM
data stream:
To activate the loopback, the user equipment sends the configured activation
pattern several times in sequence.
When the configured activation pattern is detected, the port activates its
local loopback.
The user equipment detects the activation of the loopback because it starts
receiving the loopback activation pattern. After detecting the loopback, the
equipment can stop transmitting the activation pattern, and send any other
desired test signals.
To deactivate the loopback and return the port to normal operation, the user
equipment sends the configured deactivation pattern several times in
sequence, until it detects the deactivation of the local loopback.
CSU, according to ANSI T1.403 and AT&T TR 54016. This method is relevant
for framed modes only.
T1 Ports
6-61
Chapter 6 Ports
NIU (FAC1 and FAC2), according to Telecordia GR-312. This method is relevant
for framed and unframed modes.
Note
An internal T1 port becomes active only if at least one enabled pseudowire with a
valid cross-connection is assigned to the port.
Task
Command
Comments
Assigning short
description to port
name <string>
Masking/unmasking
alarms generated by the
internal T1
no shutdown
Specifying T1 framing
mode
Enabling/disabling
performance monitoring
data collection
pm-enable
Controlling inband
loopback activation
no pm-enable
6-62
T1 Ports
Chapter 6 Ports
Task
Command
Comments
bert [pattern {2e-10 | 2e-15 | 2e-20 | 2e23 | 511 | 2047| qrss | 2e-11}] [inject-error
{none | single | 10e-1 | 10e-2 | 10e-3 |
10e-4 | 10e-5 | 10e-6 | 10e-7}]
no bert
Specifying the code
transmitted to fill unused
timeslots in T1 frames
idle-code { 00 to FF (hexa) }
out-of-service <00FF>
Activating diagnostic
loopback
no loopback
show status
show statistics
Displaying Status
You can display current status of any internal T1 port on an E5-cTDM-4 card.
T1 Ports
6-63
Chapter 6 Ports
Displaying Statistics
Internal T1 ports of ETX-5300A collect performance monitoring data at path level.
Task
Command
Comments
Displaying statistics
show statistics {current | interval <intervalnum 1..96> | current-day | previous-day | allintervals | all}
Note
Parameter
Description
CV
Rx Frames Slip
6-64
T1 Ports
Chapter 6 Ports
Parameter
Description
ES
Number of seconds during which at least one FE or CS was detected or a SEF defect or
an AIS defect was present
UAS
Number of seconds for which the T1 path is unavailable. The T1 path becomes
unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in
unavailable time. Once unavailable, the T1 path becomes available at the onset of 10
contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from
unavailable time.
BES
Number of seconds during which at least 2 and no more than 804 CRC-4 errors were
detected while neither OOF nor AIS defects were present.
FC
Number of T1 path failure events. A failure event begins when a LOF failure or an AIS
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
SES
Number of seconds during which 805 or more CRC-4 errors were detected or an OOF
defect was present
SEFS
Number of seconds during which at least one OOF defect or an AIS defect was present
To clear statistics:
Example
T1 name t1_1_1_1
Administratively enabled.
Configuration Errors
Table 6-12 lists messages generated by ETX-5300A when a configuration error is
detected.
T1 Ports
6-65
Chapter 6 Ports
Description
6.5
Benefits
SAGs represent blocks of I/O card ports with ability to aggregate their flows into
Service Attachment Points (SAPs), supporting pre-forwarding scheduling and
shaping.
Factory Defaults
By default, two SAGs exist per I/O Ethernet card.
Functional Description
GbE and 10GbE cards introduce logical ports that serve as management entities
(SAG) and flow aggregation points (SAP). Figure 6-20 illustrates Ethernet I/O card
schematics. The SAPs aggregate several I/O ingress flows to a single forwarding
path (E-Line or E-LAN) towards the main card and help avoid re-classification to
different forwarding paths from the same SAG.
6-66
Chapter 6 Ports
Flow
SAP
SAG
Flow
SAP
Flow
SAP
SAG
Flow
SAP
Configuring SAGs
To configure a SAG:
1. Navigate to config>port.
2. Enter sag <slot/port>.
The config>port>sag(slot/port)# prompt is displayed.
3. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
name <string>
Example
To configure a SAG:
Slot 1
6-67
Chapter 6 Ports
Port 1
Name SAG_1_1
ETX-5300A>config>port>sag 1/1
ETX-5300A>config>port>sag(1/1)# name SAG_1_1
ETX-5300A>config>port>sag(1/1)# queue-group profile q_group_SAG_2_level_default
Configuration Errors
Table 6-13 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
6.6
Service Virtual Interface (SVI) is a logical port that is used for binding flows to
bridge ports, router interfaces or Layer-2 TDM pseudowires.
Factory Defaults
By default, ETX-5300A does not have SVIs.
Functional Description
SVIs are used as ingress and egress ports for flows, serving as intermediaries for
bridges and routers, which must comply with standards of their own (VLAN
domains for bridge ports or IP address for router interfaces). They do not have
physical port attributes. They also serve as aggregation points for TDM PWs (see
Figure 6-22). ETX-5300A supports up to 4000 SVIs.
6-68
Chapter 6 Ports
ETX-5300A
LB IP
Router
RIF
SVI
SVI
BP
SVI
User
SVI
BP
BP
OOB
BP
NET
Bridge
BP
User
SVI
SVI
BP
SVI
SVI
MEF-8
Pseudowires
Flow
BP
SVI
BP
Bridge
SVI
MEF-8
Pseudowire
Flow
BP
BP
SVI
SVI
SVI
MEF-8
Pseudowire
Flow
TDM Pseudowire
Processing
Configuring SVIs
To configure an SVI:
1. Navigate to config>port.
2. Enter svi <svi_number>, followed by the SVI type (bridge | pw | router),
depending on whether you intend to attach a flow to bridge, pseudowire or
router.
The config>port>svi(number)# prompt is displayed.
6-69
Chapter 6 Ports
Note
Task
Command
Comments
name <string>
Example
To configure SVI:
Number 1
Type bridge
Name svi_1_bridge.
ETX-5300A>config>port>svi 1 bridge
ETX-5300A>config>port>svi(1)# name svi_1_bridge
Configuration Errors
Table 6-14 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
Binding to the SVI failed because the SVI does not exist
6-70
Chapter 7
Resiliency
The modular, distributed architecture of ETX-5300A enables redundancy at
different levels of the network and provides a resilient system with no single
point of failure.
LAG
This chapter describes port and service protection mechanisms (LAG, ERP and
APS), as well as main card redundancy. Timing system redundancy is detailed in
Chapter 9.
7.1
Redundancy for the ETX-5300A control subsystem is supported only when the
ETX-5300A chassis includes two operational main cards. If only one is installed, it
is automatically selected and redundancy cannot be activated.
ETX-5300A provides 1:1 main card protection, when one of the cards is defined
as primary, and the other one as secondary. The primary card manages the
chassis with its I/Os and peripherals, performs data plane forwarding, and
controls the timing subsystem. The secondary main card stores a copy of the
configuration database, serving as a hot standby.
Benefits
Main card redundancy with automatic switchover ensures continuous service
provisioning. It provides a hot-standby capability for the ETX-5300A management
and timing subsystems.
Functional Description
Only one main card per chassis is necessary; however, the chassis has two slots
dedicated to this type of module. The second slot can be used by a redundant
main card, thereby providing a hot-standby capability for the ETX-5300A system
control functions.
7-1
Chapter 7 Resiliency
When a second main card is installed, the two modules operate as a master/slave
pair; one module is the active (online) module, and the other is off-line and
serves as a hot standby.
Only the online main card communicates with the management station/terminal
and actively manages the ETX-5300A system. The off-line main card is
automatically updated by the online card with all the configuration and status
data. The off-line card can take over at any time without disrupting system
operation. The switch-over to the off-line card occurs automatically when one of
the following occurs:
Chapter 7 Resiliency
Configuration Errors
Table 7-1 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
Manual switch has failed because the secondary main card is not
operational
Manual switch has failed because only one main card is installed
in the chassis
7.2
Benefits
Ethernet link aggregation ensures increased service availability. If a link within a
LAG fails or is replaced, the traffic is not disrupted and communication is
maintained.
Factory Defaults
By default, no LAG groups exist.
Functional Description
The two Ethernet ports can be operated as a single logical interface, using link
aggregation in accordance with IEEE 802.3-2005. The two ports must be
connected to the same switch/router. LAG uses 1:1 distribution mechanism.
ETX-5300A supports up to 44 LAGs per chassis.
Using link aggregation inherently provides redundancy; if one of the GbE ports
fails, the other can continue transferring traffic. Link failure is detected by
sensing the loss of valid signals, or receiving a failure report via Link Aggregation
Control Protocol (LACP) if applicable, in which case all traffic is sent through the
other link.
7-3
Chapter 7 Resiliency
Intra-Card LAG
With intra-card LAG, the two aggregation group members reside on the same
E5-MC-4, E5-10GBE-2 or E5-GBE-20 card.
For E5-GBE-20 card, when the LAG ports belong to the same 10-port group
(ports 110 or ports 1120), LACP can be enabled or disabled by the user. In this
mode, both ports receive traffic at the same time, but only one of them
transmits data.
Rx
LAG
Tx
Tx
Rx
Inter-Card LAG
With inter-card LAG, the two aggregation group members reside on different
E5-MC-4, E5-GBE-20 or E5-10GBE-2 card. However, the ports must belong to:
The same card type (LAG between ports residing on I/O and main cards is not
allowed)
Permitted port 2/1 (port 1 on E5-GBE-20 card in slot 2) and port 3/3
(port 3 on E5-GBE-20 card in slot 3)
Permitted port 1/1 (port 1 on E5-10GBE-2 card in slot 1) and port 3/1
(port 1 on E5-10GBE-2 card in slot 3)
In this LAG scheme, data flow redundancy can be provided at a card and port
levels.
7-4
Chapter 7 Resiliency
Rx
LAG
Tx
Tx
Main or I/O Card
Rx
Configuring LAG
This section explains how to define a link aggregation group (LAG) and enable link
aggregation control protocol (LACP). ETX-5300A supports up to 44 LAGs.
LAG is defined with two Ethernet ports bound to the group. LAG serves as a
logical port with all relevant port attributes (queue block profile, classification
key, L2CP profile, etc). Service flows to and from the LAG, use the LAG as their
ingress/egress port.
LACP Traffic
To ensure correct distribution of LACP traffic, you must configure flow with an
L2CP profile with peer action for the LACP address (01-80-c2-00-00-02). The
flow must have the following attributes:
Untagged classification
If you use the flow only to peer the LACP frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow.
Figure 7-3 illustrates flows in inter-card LAG between two main cards. LACP flow
can be optionally dropped.
7-5
Chapter 7 Resiliency
Flow 1*
(LACP)
Port
A/X
LAG
Flow 2
(Data)
Any
Port
Flow 3
(Data)
Port
B/X
LAG/SAP Connection
When configuring LAG between ports on the E5-GBE-20 or E5-10GBE-2 cards,
follow these guidelines for establishing flows between the LAG and the SAP:
Intra-card LAG: Connect LAG to a SAP, belonging to the first 10-port group
(SAP slot/1/x)
LACP
Flow
Port
1/2
LAG
SAP
1/1/X
Data
Flow
LACP
Flow
Any
Port
Data
Flow
SAP
1/1/X
Port
1/3
Any
Port
Data
Flow
7-6
Chapter 7 Resiliency
LAG between ports belonging to the first ten-port group (110): Connect
LAG to a SAP, belonging to the first 10-port group (SAP slot/1/x)
LACP
Flow
Port
1/2
LAG
SAP
1/1/X
Data
Flow
LACP
Flow
Data
Flow
SAP
1/1/X
Port
2/3
Any
Port
Any
Port
Data
Flow
Figure 7-5. LAG-SAP Connection in Inter-Card LAG over Ports 110 in E5-GBE-20 Cards
Port
1/11
LAG
SAP
1/2/X
Data
Flow
LACP
Flow
Data
Flow
SAP
1/2/X
Port
2/12
Any
Port
Any
Port
Data
Flow
Figure 7-6. LAG-SAP Connection in Inter-Card LAG over Ports 1120 in E5-GBE-20 Cards
LAG between ports 1 and 1: Connect LAG to a SAP, belonging to the first
10-port group (SAP slot/1/x)
LACP
Flow
Port
1/1
LAG
Port
2/1
SAP
1/1/X
Data
Flow
LACP
Flow
Any
Port
Data
Flow
SAP
1/1/X
Any
Port
Data
Flow
Figure 7-7. LAG-SAP Connection in Inter-Card LAG over Ports 1 and 1 in E5-10GBE-2 Cards
7-7
Chapter 7 Resiliency
Port
1/2
LAG
SAP
1/2/X
Data
Flow
LACP
Flow
Data
Flow
SAP
1/2/X
Port
2/2
Any
Port
Any
Port
Data
Flow
Figure 7-8. LAG-SAP Connection in Inter-Card LAG over Ports 2 and 2 in E5-10GBE-2 Cards
Note
The same rules apply to flows carrying LACP traffic from LAG to SAP.
Always leave the mirror SAPs located on the second I/O card unused (i.e. have
no flows attached to them). These SAPs serve as internal peers for SAPs which
are used by the LACP and data flows.
Point-to-Point Flows
ETX-5300A does not support point-to-point flows between ports that belong to
the same 10-port group. In the same manner, point-to-point flows from a LAG to
a port which is in the same 10-port group as one of the LAG members is not
allowed. For example:
Permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/15.
Flow 1
(LACP)
Port
1/2
LAG
Port
3/2
SAP
1/1/1
Flow 2
(LACP)
Any
Port
Flow 4
(Data)
Flow 3
(Data)
SAP
1/1/2
Port
1/15
Flow 5
(Data)
7-8
Chapter 7 Resiliency
Not permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/3.
SAP
1/1/1
Flow 1
(LACP)
Port
1/2
LAG
Flow 3
(Data)
Flow 2
(LACP)
Any
Port
Flow 4
(Data)
SAP
1/1/2
Port
3/2
Port
1/3
Flow 5
(Data)
Task
Command
Comments
admin-key { fast-ethernet |
giga-ethernet | ten-giga-ethernet }
7-9
Chapter 7 Resiliency
Task
Command
Comments
tx-activity:
active LAG interface periodically
transmits LACP frames (LACPDUs) to
all links with LACP enabled
passive LAG interface does not
initiate the LACP exchange, but
replies to received LACPDUs.
tx-speed:
slow Three seconds
fast_ 90 seconds.
no lacp disables LACP protocol.
The sys-priority parameter
no shutdown
tag-ethernet-type <value>
Assigning a name
name <string>
show bind
show status
7-10
All ingress and egress flows attached to the LAG are either disabled or
deleted.
Chapter 7 Resiliency
Admin
up
up
Oper
up
up
LACP
sync
out-of-sync
Protection
active
active
The LAG status screen provides information on the current state of the
aggregation group and individual group members.
7-11
Chapter 7 Resiliency
Description
Actor
Partner
Activity
Timeout
Synchronized
Collecting
Distributing
LACP Frames
Marker Frames
Unknown Frames
Illegal Frames
LACP Frames
Marker Response Frames
:
:
:
:
:
:
5,000
8,000
11,000
12,000
5,000
10,000
Description
Rx LACP Frames
Rx Marker Frames
Rx Unknown Frame
7-12
Chapter 7 Resiliency
Counter
Description
Rx Illegal Frames
Tx LACP Frames
Example
Examples below illustrate how to configure different types of link aggregation
groups.
4. Configure L2CP profile with peer action for the LACP address (01-80-c2-0000-02).
5. Configure three flows:
Flow 1 from LAG 1 to any ETX-5300A port for LACP data with untagged
classification. In this example, port 3 on main card A is used for virtual
termination of LACP traffic.
Discard the flow data.
Flow 2 from port 3 on main card A to LAG 1 with VLAN 100 classification
Flow 3 from LAG 1 to port 3 on main card A with VLAN 100 classification.
7-13
Chapter 7 Resiliency
Flow 1
(LACP)
Port
A/2
LAG
Port
B/4
Flow 2
(Data)
Port
A/3
Flow 3
(Data)
Chapter 7 Resiliency
Note
The I/O card ports combined in LAG must belong to the same 10-port group. See
Inter-Card LAG above.
To peer LACP frames, configure a dedicated flow with untagged classifier from
the LAG. This flow must have an L2CP profile attached to it. The L2CP profile must
have a peer action for the LACP address. As the only purpose of this flow is to
peer LACP traffic, you can discard its traffic by using a drop action on the flow.
Follow the LAG/SAP Connection guidelines described above when directing flows
from the LAG to the relevant SAPs. Keep in mind that the mirror SAP 3/1/1 and
SAP 3/1/2 located on I/O card in slot 3 must be left unused (i.e. have no flows
attached to them). These SAPs serve as internal peers for SAP 1/1/1 and SAP
1/1/2, which are used by the LACP and data flows.
Data-carrying flows use the LAG as their ingress or egress ports.
7-15
Chapter 7 Resiliency
5. Configure L2CP profile with peer action for the LACP address (01-80-c2-0000-02).
6. Configure six flows:
Flow 1 from LAG 1 to SAP 1/1/1 with untagged classification for incoming
LACP data
Flow 2 from SAP 1/1/1 to port 3 on main card A with Match All
classification for outgoing LACP data.
Flow 4 from SAP 1/1/2 to port 13 on I/O card 1 with Match All
classification
Flow 5 from port 13 on I/O card 1 to LAG 1 with VLAN 100 classification.
Flow 1
(LACP)
Port
1/2
SAP
1/1/1
Flow 3
(Data)
LAG
Port
A/3
Flow 4
(Data)
SAP
1/1/2
Port
3/2
Flow 2
(LACP)
Port
1/13
Flow 5
(Data)
SAP
3/1/1
Leave
Unused
SAP
3/1/2
Chapter 7 Resiliency
7-17
Chapter 7 Resiliency
Configuration Errors
Table 7-4 lists messages generated by ETX-5300A when a configuration error is
detected.
7-18
Chapter 7 Resiliency
Description
In order to enable LACP for the LAG, the ports bound to the LAG
must have an untagged flow with an L2CP profile that specifies
peer action for MAC 0x02
7.3
A G.8032 Layer-2 Ethernet ring is used by ETX-5300A for traffic protection. This
technology builds a logical ring, defined as a set of IEEE 802.1-compliant bridges,
and protects against link and node failures. ETX-5300A supports 16 rings (major
and sub-rings) per shelf.
7-19
Chapter 7 Resiliency
Standards
ITU-T G.8032v2, Y.1731.
Benefits
G.8032 revertive rings provide sub-50 ms protection for Ethernet traffic and
prevent loops at the Ethernet layer.
Factory Defaults
No Ethernet protection rings are configured in the system by default.
Functional Description
Ethernet Ring Protection technology provides a scalable solution for low-cost
traffic protection and rapid service restoration, with SDH/SONET-type resilience.
It is built on traditional Ethernet MAC (IEEE 802.3) and bridging (IEEE 802.1)
functions. It is independent of any physical-layer technologies and can be utilized
in any carrier network.
In ERP every ring node uses heartbeat messaging to determine availability of its
neighbor. When a link failure occurs, it is detected via LOS or heartbeat
messaging. Upon failure, node forwarding information is recalculated to ensure
that data traffic reaches its destination, using an alternative path.
Ring ports can reside on Ethernet ports belonging to the same main or I/O card,
providing port redundancy. In addition, they can reside on ports belonging to
different cards, providing port and card redundancy. In total, ETX-5300A supports
up to 16 major rings and sub-rings.
Note
Ring Topology
ETX-5300A supports different ring topologies, including single and interconnected
(ladder) ring topologies.
7-20
Chapter 7 Resiliency
Major Ring
Sub-Ring
R-APS Messaging
Ethernet ring protection is achieved by means of a dedicated protocol,
Automated Protection Switching (APS). Every ring link is bound by two adjacent
nodes. At any time, traffic flows on all, but one of the ring links. This link is called
the ring protection link (RPL). Under normal conditions this link is blocked. RPL is
controlled by a single node called an RPL owner, which prevents traffic from using
the RPL. When a failure is detected, the RPL owner unblocks the RPL port,
allowing the RPL to be used for traffic.
R-APS messages require a designated transmission channel (R-APS channel),
which is separated from the service traffic channel. An R-APS channel is
configured using a separate dedicated VLAN to enable handling of the R-APS
messages differently from the service traffic. An R-APS channel and service traffic
blocking is performed via VID filtering by the bridge.
Mechanism of Operation
Every failure along the ring triggers an R-APS Signal Fail (SF) message in both
directions from the nodes adjacent to the failed link. Before sending the R-APS,
these nodes block the ports facing the failed link. On receiving these messages,
the RPL owner unblocks the RPL port. An SF message is triggered even if only one
node adjacent to the failed link recognizes the failure. Moreover, to overcome
scenarios in which link failures are not recognized via LOS (Loss of signal), ERPS
can also use the standard Ethernet OAM 802.1ag Continuity Check Messages
(CCMs) to expose the failure to the two adjacent nodes.
During a recovery phase, when a failed link is restored and a node continually
detects a Clear SF, it sends an R-APS No Request (NR) message and keeps the
failed port blocked. When receiving the R-APS (NR), the RPL owner starts its
Wait-To-Restore (WTR) timer. When that timer expires, it blocks the RPL port and
sends RAPS (NR, RB) (R-APS no request, root blocked) messages in both
directions of the ring. Nodes receiving the R-APS (NR, RB) message flush their
learning table, unblock their blocked ports, and return to idle state.
Figure 7-15 illustrates a stable-state Ethernet ring with blocked RPL to prevent a
loop. Each node is monitored, using Ethernet CCM OAM messages, and the ring
protection is triggered by loss of continuity or server layer failure, as defined in
Y.1731.
7-21
Chapter 7 Resiliency
CCM
RPL Owner
CCM
CCM
CCM
CCM
Timers
The following timers are used to facilitate ERP operation:
Wait-to-Restore (WTR) Period of time used by RPL owner to verify that the
ring has stabilized before blocking the RPL after signal recovery.
Guard Period of time during which all received A-RPS messages are ignored
by the ERP mechanism. This prevents the ring nodes from receiving outdated
A-RPS messages circulating the network.
Hold-off Period of time during which the underlying Ethernet layer attempts
to filter out intermittent link faults before reporting them to the ERP
mechanism.
Administrative Commands
If there is a need to intervene into ERP operation for maintenance or any other
reason, the operator can issue a forced or manual switch command.
Note
Manual switch command manually blocks a particular ring port with only one
manual switch command per ring instance. It can be overridden by SF
condition or a force switch command.
Clear switch command clears all existing force and manual switch command
on the ERP.
The manual and forced switch commands are temporary commands and do not
permanently change the location of the RPL.
Multiple Rings
Multiple rings with a common link are usually referred to as ladder network (see
Figure 7-16). In such networks a common VLAN is shared on more than one
physical ring. For example, a user connected to node E is communicating with a
user connected to node A over the same VLAN.
Ring topology includes a physical link between nodes G and C. It belongs to the
major ring and is used by the sub-ring as its R-APS channel.
7-22
Chapter 7 Resiliency
Virtual Channel
Major Ring
Sub-Ring
Major Ring
Sub-Ring
Major ring An Ethernet ring that controls a full physical ring and is
connected to the interconnection nodes on two ports (ring A-H-G-C-B in
Figure 7-16)
R-APS virtual channel The R-APS virtual channel is the R-APS channel
connection between two interconnection nodes of a sub-ring over a network
or other ring.
In a stable state the rings in Figure 7-16 have two RPL owners that prevent the
traffic from looping in the network (nodes E, A). When a non-shared link fails in
the network, the RPL owner that controls the ERPS instance containing that link
unblocks the RPL port while the distant RPL port, which is not a part of this
instance, remains blocked. For example, if link G-F fails, only node E unblocks its
RPL port, while node A does not change the state of its RPL port.
7-23
Chapter 7 Resiliency
If a shared link fails (link G-C), the RPL owner of the main ring (node A) unblocks
its port; however, the RPL port of the sub-ring (node E) remains blocked since
that link is declared as virtual channel for this ring.
Configuring ERP
To configure ERP:
1. In the configure>protection# prompt, enter erp followed by ring number (1
16) and ring type (major or sub).
An ERP instance with is created and the config>protection>erp(1)#
prompt is displayed.
2. Configure the ERP as illustrated and explained below.
Note
Task
Command
backward-compatibility
bridge <132>
data-vlan <14094>
Comments
no backward-compatibility
no data-vlan
east-port <bridge_port_number>
west-port <bridge_port_number>
interconnection-node
7-24
no interconnection-node
Chapter 7 Resiliency
Task
Command
Comments
port-type ring-node
revertive
no revertive
no shutdown
sub-ring <ring_number>
no sub-ring
7-25
Chapter 7 Resiliency
Task
Command
Comments
clear
show status
show statistics
clear statistics
The following marking actions can be performed in the sub-ring level, at the
config>protection>erp(erp_number)>sub-ring(sub-ring_number)# prompt.
Task
Command
Comments
virtual-channel
no virtual-channel
7-26
Chapter 7 Resiliency
East Port
: 0
Local SF Source
Local SF Source
West Port
: 0
: Not Applicable
: Not Applicable
Bridge number
RPL owner This node owns the RPL and blocks or unblocks the RPL
as conditions require. This node initiates the R-APS message.
Ring state:
Not owner All other nodes on the ring (that is, those that are not
the RPL owner node) operate as normal nodes and have no special
role on the ring
Server Layer
OAM CFM
Admin
7-27
Chapter 7 Resiliency
Description
Example
Figure 7-18 and script below illustrate configuration a G.8032v2 ring over main
card ports.
7-28
Chapter 7 Resiliency
Ethernet
Ring
Flow 1
Flow 2
SAP
Fl. 35
Port 1
Flow 16
Main Ethernet
Card A
Fl. 34
VLAN
1500
VLAN
1500
Flow 15
East
SVI 1
Flow 30
BP 1
Port 1
VLAN
1500
SVI 3
I/O Ethernet
Card 1
BP 3
Flow 31
Fl. 36
Bridge
BP 2
Fl. 3
Fl. 4
Fl. 17
Fl. 18
BP 4
West
(RPL Owner)
SVI 4
SVI 2
Fl. 10 SAP
Fl. 9
VLAN
500
VLAN
900
VLAN
500
Port 1
Fl. 32
Fl. 33
Port 1
Fl. 11
I/O Ethernet
Card 2
Main Ethernet
Card B
BP 1 East port
BP 2 West port
7-29
Chapter 7 Resiliency
Note
VLAN 900 is swapped to VLAN 500 on flow 9. VLAN 500 is swapped to VLAN 900
on flow 11.
9. Enable the main and I/O card ports.
#*********************Assigning_Queue_Group_Profiles*************************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
config port ethernet 2/1 queue-group profile q_group_2_level_default
config port sag 2/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End****************************************
#*********************Selecting_Classification_Keys**************************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
config port ethernet 2/1 classification-key vlan p-bit
exit all
#*********************************End****************************************
#***************************Configuring_SVIs*********************************
config port svi 1 bridge
exit all
config port svi 2 bridge
exit all
config port svi 3 bridge
exit all
config port svi 4 bridge
exit all
#*********************************End****************************************
#*************************Binding_Bridge_Ports_to_SVIs***********************
config bridge 1 port 1
bind svi 1
no shutdown
exit all
config bridge 1 port 2
bind svi 2
no shutdown
exit all
config bridge 1 port 3
bind svi 3
no shutdown
exit all
7-30
Chapter 7 Resiliency
7-31
Chapter 7 Resiliency
7-32
Chapter 7 Resiliency
7-33
Chapter 7 Resiliency
classifier class1500
ingress-port svi 1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
pm-enable
no shutdown
exit all
config flows flow 32
classifier class1500
ingress-port ethernet main-b/1
egress-port svi 2
pm-enable
no shutdown
exit all
config flows flow 33
classifier class1500
ingress-port svi 2
egress-port ethernet main-b/1 queue-map-profile QueueMapDefaultProfile block
0/1
pm-enable
no shutdown
exit all
config flows flow 34
classifier class1500
ingress-port ethernet 1/1
egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
config flows flow 35
classifier class1500
ingress-port sap 1/1/2
egress-port svi 3
pm-enable
no shutdown
exit all
config flows flow 36
classifier class1500
ingress-port svi 3
egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
#*********************************End****************************************
7-34
Chapter 7 Resiliency
#****************************Enabling_Ports**********************************
config port ethernet main-a/1 no shutdown
config port ethernet main-b/1 no shutdown
config port ethernet 1/1 no shutdown
config port ethernet 2/1 no shutdown
exit all
#*********************************End****************************************
Configuration Errors
Table 7-6 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
7-35
Chapter 7 Resiliency
Message
Description
7-36
Chapter 7 Resiliency
Message
Description
7-37
Chapter 7 Resiliency
7.4
ETX-5300A provides 1+1 APS line redundancy for rapid restoration of service in
case of line failure. When two TDM cards operate in APS mode for hardware
redundancy, they ensure 50 ms restoration of service in case of line faults.
Benefits
APS switches over traffic with minimal loss of data, thus avoiding time-consuming
reroutes. With APS, there is no indication beyond the affected network element
that a failure has occurred; other nodes stay intact. SDH/SONET APS performs
switchovers at Layer 1 significantly faster than at Layer 2 or Layer 3. The effect
of a failure is greatly minimized, and a fast switchover guarantees minimal effect
on the network.
Factory Defaults
By default, APS is disabled.
Functional Description
In 1+1 APS, ETX-5300A provides a protection facility (backup line) for each
working facility. At the near end of the line, the optical signal is bridged
permanently (split into two signals) and sent over both the working and the
protection facilities simultaneously, producing identical working and protection
signals.
At the far end of the line, both signals are monitored independently for failures.
The receiving equipment selects either working or the protection signal. This
selection is based on switch initiation criteria, which can be a signal fail (hard
failure such as loss of frame), a signal degrade (soft failure caused by the error
rate exceeding some pre-defined value), or a response to user-initiated
commands.
Working and the protection ports can reside on the same or different E5-cTDM-4
cards. When the working and the protection ports reside on different cards, each
card is protected against failures.
The working and protection ports can reside on the same E5-cTDM-4 card
(intra-card APS), provided that the card is not a member of an I/O card protection
group (standalone card).
The working and protection ports can reside on two different E5-cTDM-4 cards
(inter-card APS) that are already assigned to an I/O card protection group,
provided that:
7-38
Chapter 7 Resiliency
The working and protection ports have the same port number.
1 and 2
3 and 4.
This means that working and protection ports cannot reside on cards in slots
1 and 3, 1 and 4, 2 and 3, or 2 and 4.
Note
PW services cannot be assigned to SDH/SONET ports which are not APS members,
when an inter-card APS has been defined on at least two ports of different I/O
TDM cards. For example, if two ports 1 on I/O TDM cards in slot 1 and slot 2 are
inter-card APS members, no pseudowire services are available on ports 2, 3 and 4
of both cards.
Each APS group includes up to two members. ETX-5300A can have up to eight
APS instances per chassis.
APS Architecture
ETX-5300A APS is a 1+1 unidirectional protection switching. In this mode, all
communication from the near end to the far end is carried out over the APS
channel, using the K1 and K2 bytes of the SONET/SDH overhead on the
protection line.
The line selection is based only on the local conditions and requests. Therefore,
each end operates independently of the other end, and the K1 and K2 bytes are
not needed to coordinate switch actions. However, the K1 byte is still used to
inform the other end of the local action.
The K2 byte is set to indicate that the K1 byte is being received (by indicating the
same channel number as the received K1) and to inform the other end of the
provisioned architecture and mode of operation.
Working Line
Tx
Rx
Tx
Rx
Protection Line
7-39
Chapter 7 Resiliency
(bits 1-4) and the mode type (bit 5) as well bits 6 to 8 contain various condition
such as AIS-L, RDI-L.
I/O card maintains a protection status for every port in a protection group. The
status values arranged in the following ascending priority order:
active(1)
standby(2)
waitToRestore(3)
manualSwitched(4)
sd(5)
sf(6)
forcedSwitched(7)
notPresent(9)
The switch occurs whenever the protection status of the active port changed to a
higher priority than the standby as a result of a user command (shutdown, reset,
switch) or protection event.
Signal Fail (SF): LOS, LOF, AIS-L, Line BER above configurable EED threshold
(10-3 to 10-5)
A higher priority command overrides the lower priority command. Signal failures
and signal degradations override manual switch, but are overridden by force and
lockout commands.
None
Lockout-of-protection
Lockout-of-protection
Force-switch-to-working (causes a switchover)
7-40
Chapter 7 Resiliency
Interface Conditions
Lockout-of-protection
Lockout-of-protection
Force-switch-to-working (causes a switchover)
Lockout-of-protection
Working port of the inter-card APS must reside on the working card of the I/O
card protection group
Protection port of the inter-card APS must reside on the protection card of
the I/O card protection group.
Note
Using no before io-group (group name), deletes the I/O card protection group.
I/O protection group can be deleted when it is disabled and has no cards
assigned to it.
To configure I/O card protection group:
Task
Command
Comments
no shutdown
show status
7-41
Chapter 7 Resiliency
Configuring APS
Use the following procedure to configure redundancy for the ETX-5300A
SDH/SONET links.
Note
Task
Command
Comments
no shutdown
force-switch-to-working
force-switch-to-protection
manual-switch-to-working
manual-switch-to-protection
lockout-of-protection
clear
show status
7-42
Chapter 7 Resiliency
Working
Protection
Admin
up
down
Status
up
sf
Active
yes
--
Example
Intra-Card APS
Inter-Card APS
7-43
Chapter 7 Resiliency
Configuration Errors
Table 7-8 lists messages generated by ETX-5300A when a configuration error is
detected.
Description
For intra-card APS, the working and protection port must reside
on the same card
A port can be removed from the APS group only after the group
is shut down
For inter-card APS, the working and protection port must have
the same number
For intra-card APS, the working and protection port must reside
on the same card
7-44
Chapter 7 Resiliency
Message
Description
7-45
Chapter 7 Resiliency
7-46
Chapter 8
Networking
This chapter explains how to configure networking entities in ETX-5300A. It
presents the following information:
Flows
Ethertype
Peer
TDM Pseudowires
Cross-Connection
Bridge
Router
Ethernet OAM.
8.1
Flows
Flows are unidirectional entities that connect two physical or logical ports.
Benefits
The user traffic can be classified into different Ethernet flows (EVC, EVC.CoS) to
provide services in a flexible manner.
Factory Defaults
By default, there are no flows in the ETX-5300A system.
Functional Description
The ingress traffic is first classified into flows according to classification profiles.
A per-port classification key configuration defines what types of classification
profiles are supported for this type of port. The classification key also defines the
CoS mapping and color mapping methods. The Classification section in Appendix B
specifies the supported classification keys and the associated CoS and color
mapping methods. It also details the different classifier profile types supported
per classifier key.
Flows
8-1
Chapter 8 Networking
Flows connect physical and/or logical ports. They are used for E-Line and E-LAN
services, or to provide L3 connectivity over router interfaces. In total, ETX-5300A
supports up to 24K of Ethernet flows.
Flows include information about traffic forwarding (flow destination); traffic
mapped into flows is further processed according to user-defined profiles and
VLAN editing actions. See the Flow Processing section below.
Note
Data flow and traffic management are detailed in Appendix B of this manual.
Figure 8-1 illustrates point-to-point and multipoint flows originating in I/O and
SAG
SAP
SVI
SVI
BP
BP
SVI
I/O Card
Ethernet Port
Bridge
BP
Main Card
Ethernet Port
I/O Ingress
Flows
SVI
I/O Ingress
Flows
BP
SAP
Main Card
Ethernet Port
I/O Card
Ethernet Port
A flow between two ports that belong to the same 10-port group (110 or 11
20) on the same E5-GBE-20, cannot be defined. If an E-Line service is required
between two GbE ports, define the flows between ports belonging to the
different 10-port groups on the same E5-GBE-20 card or between ports on the
different E5-GBE-20 cards.
Flow Processing
Flow processing includes the following:
8-2
Flows
Chapter 8 Networking
L2CP frames are handled per flow according to L2CP profile settings.
Classifier
Profile
Drop
Action
L2CP
Profile
CoS Mapping
Profile
Color Mapping
Profile
Policing
Profile
VLAN
Editing
Main card
I/O card
SAP
SVI PW
SVI bridge
SVI router
Note
All flows can be mapped to a queue block, if the flow egress port is on an I/O or
main Ethernet card.
Drop Action
Traffic carried by I/O ingress flows or by flows originating from directly-attached
(main card) ports can be dropped and thereby prevented from reaching its egress
port.
For example, if you plan to accept traffic marked by a certain VLAN, but to drop
this traffic if it comes from a specific MAC address, you can define two flows:
Flows
8-3
Chapter 8 Networking
This action can also be used to direct LACP traffic to the CPU, and preventing it
from reaching an egress port. This is done by creating an untagged flow with an
L2CP profile defining a drop action for it.
Flow Counters
Statistic counters can be enabled on the following flows:
Note
Up to 2K minus two main card flows per chassis. These flows include:
Each pair of the multipoint flows (at bridge port ingress and egress) is counted as
a single flow. PM counters must be either enabled or disabled for both multipoint
flows.
ETX-5300A maintains counters for current statistics per flow.
I/O ingress flows, point-to-point flows (E-Line) and multipoint (E-LAN) flows
at bridge port ingress support the following counters:
8-4
Flows
Received:
Transmitted:
Dropped:
Chapter 8 Networking
Peak:
Multipoint (E-LAN) flows at bridge port egress support the following counters:
Transmit:
Peak:
Ports
The RFC-2544 testing is supported only on the flows whose ingress port is one of
the following:
Functionality
Before running the flow test, you must configure and enable a Down MEP, bound
to an indirectly-attached port (see Ethernet OAM) with live ingress and egress
flows.
Flows
8-5
Chapter 8 Networking
When the flow testing is enabled, ETX-5300A loops back all LBM packets received
on the flow by swapping the MAC address and changing the LBM code to the LBR
code.
Tx Flow
SAP
Main or I/O Card
Port A
Rx Flow
I/O Card
Port B
Down MEP
Bound to Port B
A. Normal Operation
Tx Flow
LBR
Code
SAP
Main or I/O Card
Port A
Rx Flow
Down MEP
Bound to Port B
LBM Code
Loop
I/O Card
Port B
Notes
All packets carrying the LBM code are looped back without any filtering according
to the destination MAC address, MD level etc.
The RFC-2544 testing functions only if the ingress and egress flows use the same
port and have the same VLAN settings.
Classifier Profiles
You can define up to 24K classifier profiles to apply to flows to ensure the
desired flow classification.
8-6
Flows
Chapter 8 Networking
Examples
To create classifier profile with criteria VLAN 20 and inner VLAN 30:
Error Messages
Table 8-5 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
Illegal value
Flows
8-7
Chapter 8 Networking
Message
Description
Configuring Flows
To configure flows:
1. Navigate to config>flows.
2. Enter flow <flow-name>.
If the flow already exists, the config>flows>flow(<flow-name>)# prompt
is displayed; otherwise the flow is created and the
config>flows>flow(<flow-name>)$ prompt is displayed.
3. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
classifier <classifier-profile-name>
8-8
Flows
Chapter 8 Networking
Task
Command
Comments
mark
rate-sampling-window
no shutdown
drop
test [lbm-responder]
no test
Flows
8-9
Chapter 8 Networking
Table 8-3 lists all VLAN pushing and popping actions supported by ETX-5300A. For
allowed combinations of VLAN editing for E-Line, E-LAN and router and PW SVIs,
see VLAN Editing in Appendix B.
Table 8-3. VLAN Pushing and Popping Actions
Task
Command
Comments
inner-vlan <inner-sp-vlan>
p-bit copy
Setting TPID
tag-ether-type <tag-ether-type>
inner-tag-ether-type <inner-tag-ether-type>
The following VLAN swapping (marking) actions can be performed at the mark
level in the config>flows>flow(flow-name)>mark# prompt.
Command
Comments
vlan <vlan-value>
inner-vlan <inner-vlan-value>
p-bit <p-bit-value>
tag-ether-type <tag-ether-type>
inner-tag-ether-type <inner-tag-ether-type>
marking-profile <marking-profile-name>
8-10
Flows
Chapter 8 Networking
Task
Command
Comments
inner-marking-profile <inner-marking-profile-name>
exit
Examples
The following examples show the configuration of point-to-point (E-Line) and
multipoint (E-LAN) flows.
Flows
8-11
Chapter 8 Networking
Note
8-12
Flows
Four flows from I/O card port to SAP with per-flow policing, CoS and color
mapping
One flow SAP to main card port, push S-VLAN to this flow with S-VID P-bit
and DEI values set by a marking profile
One returning flow from main card port to I/O card port, pop S-VLAN.
ETX-5300A Ver. 1.0
Chapter 8 Networking
#***************************Defining_Policer_Profiles************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
config qos policer-profile "3" bandwidth cir 10000 cbs 10000 eir 100000 ebs
64000
config qos policer-profile "4" bandwidth cir 55000 cbs 10000 eir 100000 ebs
64000
exit all
#*********************************End****************************************
#***************************Assigning_Queue_Groups***************************
config port ethernet main-a/1 queue-group profile 3level_1
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End****************************************
#***************************Selecting_Classification_Key*********************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
exit all
#*********************************End****************************************
#***************************Enabling_Ports***********************************
config port ethernet main-a/1 no shutdown
config port ethernet 1/1 no shutdown
exit all
#*********************************End****************************************
#***************************Configuring_Classifier_Profiles******************
config flows classifier-profile class100pbit6 match-any
match vlan 100 p-bit 6
exit all
config flows classifier-profile class100pbit5 match-any
match vlan 100 p-bit 5
exit all
config flows classifier-profile class100pbit3 match-any
match vlan 100 p-bit 3
exit all
config flows classifier-profile class100pbit0 match-any
match vlan 100 p-bit 0
exit all
Flows
8-13
Chapter 8 Networking
exit all
#*********************************End****************************************
#************************Configuring_CoS_Mapping_Profile*********************
config qos cos-map-profile cosvzb classification p-bit
map 0 to-cos 6
map 1 to-cos 5
map 2 to-cos 5
map 3 to-cos 5
map 4 to-cos 5
map 5 to-cos 4
map 6 to-cos 0
map 7 to-cos 0
exit all
#*********************************End****************************************
#**************************Configuring_Color_Mapping_Profile*****************
config qos color-map-profile color_all_green classification p-bit
map 0 to green
map 1 to green
map 2 to green
map 3 to green
map 4 to green
map 5 to green
map 6 to green
map 7 to green
exit all
#*********************************End****************************************
#*****************Configuring_Marking_Profile *******************************
configure qos marking-profile mark1 classification cos color-aware greenyellow dei mapping
mark 0 green to 7 dei green
mark 0 yellow to 7 dei green
mark 1 green to 7 dei green
mark 1 yellow to 7 dei green
mark 2 green to 7 dei green
mark 2 yellow to 7 dei green
mark 3 green to 7 dei green
mark 3 yellow to 7 dei green
mark 4 green to 5 dei green
mark 4 yellow to 5 dei green
mark 5 green to 2 dei green
mark 5 yellow to 2 dei green
mark 6 green to 0 dei green
mark 6 yellow to 0 dei yellow
mark 7 green to 7 dei green
mark 7 yellow to 7 dei green
exit all
#*********************************End****************************************
#****************************************************************************
#***************************Configuring_Flows********************************
#****************************************************************************
8-14
Flows
Chapter 8 Networking
#********************Configuring_EVC.CoS_Flows_from_I/O_to_SAP***************
configure flows flow 11
classifier class100pbit6
cos-mapping profile cosvzb
ingress-color profile color_all_green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
no shutdown
exit all
configure flows flow 12
classifier class100pbit5
cos-mapping profile cosvzb
ingress-color profile color_all_green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 2
no shutdown
exit all
configure flows flow 13
classifier class100pbit3
cos-mapping profile cosvzb
ingress-color profile color_all_green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 3
no shutdown
exit all
configure flows flow 14
classifier class100pbit0
cos-mapping profile cosvzb
ingress-color profile color_all_green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 4
no shutdown
exit all
#********************Configuring_EVC_Flow_from_SAP_to_Main_Card**************
configure flows flow 15
classifier match-all
ingress-port sap 1/1/1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
vlan-tag push vlan 300 p-bit profile mark1
no shutdown
exit all
#********************Configuring_Flow_from_Main_to_I/O_Card******************
Flows
8-15
Chapter 8 Networking
Multipoint Service
This section provides an example of configuring an E-LAN application built on a
four-port bridge with all bridge ports sharing the same VLAN domain (VLAN 10).
Figure 8-4 shows the flows to be configured for this application.
8-16
Flows
Chapter 8 Networking
#***********************Assigning_Queue_Group_Profiles***********************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port ethernet 1/2 queue-group profile q_group_2_level_default
config port ethernet 1/3 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End****************************************
#****************************Selecting_Classification_Key********************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
config port ethernet 1/2 classification-key vlan p-bit
config port ethernet 1/3 classification-key vlan p-bit
exit all
#*********************************End****************************************
#****************************Enabling_Ports**********************************
config port ethernet main-a/1 no shutdown
config port ethernet 1/1 no shutdown
config port ethernet 1/2 no shutdown
config port ethernet 1/3 no shutdown
exit all
#*********************************End****************************************
#****************************Configuring_Classifier_Profile******************
config flows classifier-profile class10 match-any
match vlan 10
exit all
#*********************************End****************************************
#***************************Configuring_COS_Mapping_Profile******************
config qos color-map-profile color1 classification p-bit
exit
cos-map-profile cos1 classification p-bit
map 0 to-cos 7
map 1 to-cos 6
map 2 to-cos 5
map 3 to-cos 4
map 4 to-cos 3
map 5 to-cos 2
map 6 to-cos 1
map 7 to-cos 0
exit all
#*********************************End****************************************
#************************** Configuring_Color_Mapping_Profile ***************
config qos color-map-profile color_all_green classification p-bit
map 0 to green
map 1 to green
map 2 to green
map 3 to green
Flows
8-17
Chapter 8 Networking
map 4 to green
map 5 to green
map 6 to green
map 7 to green
exit all
#*********************************End****************************************
#*************************Defining_Bridge_SVIs*******************************
config port svi 11 bridge
exit all
config port svi 12 bridge
exit all
config port svi 13 bridge
exit all
config port svi 14 bridge
exit all
#*********************************End****************************************
#*************************Binding_Bridge_Ports_to_SVIs***********************
config bridge 1 port 1
bind svi 11
exit all
config bridge 1 port 2
bind svi 12
exit all
config bridge 1 port 3
bind svi 13
exit all
config bridge 1 port 4
bind svi 14
exit all
#*********************************End****************************************
#************** Configuring_VLAN_Membership_and_MAC_Table_Size **************
config bridge 1 vlan 10
tagged-egress 1..4
maximum-mac-addresses 256
exit all
#*********************************End****************************************
#************************Configuring_Flows_to/from_Bridge_Port_1*************
config flows flow 100
classifier class10
ingress-port ethernet main-a/1
egress-port svi 11
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
config flows flow 101
classifier class10
8-18
Flows
Chapter 8 Networking
ingress-port svi 11
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_Flows_to/from_Bridge_Port_2*************
config flows flow 102
classifier class10
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
config flows flow 103
classifier class10
ingress-port sap 1/1/1
egress-port svi 12
no shutdown
exit all
config flows flow 104
classifier class10
ingress-port svi 12
egress-port ethernet 1/1 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit all
#*********************************end****************************************
#************************Configuring_Flows_to/from_Bridge_Port_3*************
config flows flow 105
classifier class10
ingress-port ethernet 1/2
egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
config flows flow 106
classifier class10
ingress-port sap 1/1/2
egress-port svi 13
no shutdown
exit all
config flows flow 107
classifier class10
ingress-port svi 13
egress-port ethernet 1/2 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit all
Flows
8-19
Chapter 8 Networking
#*********************************End****************************************
#************************Configuring_Flows_to/from_Bridge_Port_4*************
config flows flow 108
classifier class10
ingress-port ethernet 1/3
egress-port sap 1/1/3 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
config flows flow 109
classifier class10
ingress-port sap 1/1/3
egress-port svi 14
no shutdown
exit all
config flows flow 110
classifier class10
ingress-port svi 14
egress-port ethernet 1/3 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit all
#*********************************End****************************************
Statistics
ETX-5300A collects the current performance monitoring data for the following
flow types:
Point-to-point flows (E-Line) and multipoint (E-LAN) flows at the bridge port
ingress
Drop
8-20
Flows
Chapter 8 Networking
----------------------------------------------------------------------------Packets
Bytes
Total
: 26657156
3358801656
Green
: 26657156
3358801656
Yellow/Red : 0
0
Packets/Sec
Total
: 838377
Green
: 838377
Yellow/Red : 0
Bits/Sec
845084016
845084016
0
Tx
----------------------------------------------------------------------------Packets
Bytes
Total : 282067
35540442
Green : 282067
35540442
Yellow : 0
0
Packets/Sec
Total : 6209
Green : 6209
Yellow : 0
Bits/Sec
6258672
6258672
0
Peak Measurement
----------------------------------------------------------------------------Minimum
Maximum
Tx Bit Rate [bps]
: 6143760
9326016
Drop Bit Rate [bps] : 658197792
859194000
To clear statistics:
Configuration Errors
Table 8-5 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
The L2CP profile cannot be assigned to the flow because the profile
has not been defined
Illegal value
Flows
8-21
Chapter 8 Networking
Message
Description
Flow is in use
The policer profile cannot be used because not all of its flows are
bound to the same SAG
The maximum number of flows per policer aggregate (16) has been
reached and no flows can be added to the profile
The required classifier profile has not been attached to the flow
Invalid CoS mapping method for the current flow type or ingress
color mapping method
Invalid color mapping method for the current flow type or ingress
CoS mapping method
The maximum number of CoS or color profiles per I/O card (36) has
been reached and no profiles can be added to flows originating
from the I/O card
The maximum number of color profiles per I/O card (36) has been
reached and no profiles can be added to flows originating from the
I/O card
8-22
Flows
Chapter 8 Networking
Message
Description
Invalid editing action for inner and outer VLANs on a flow in Layer-3
service
The maximum number of L2CP profiles per flow (1) has been
reached and no profiles can be added
The ingress port selected for a flow has not yet been defined
The egress port selected for a flow has not yet been defined
Cannot define a SAP as an ingress port for a flow if the SAP number
is higher than 512
Cannot define a SAP as an egress port for a flow if the SAP number
is higher than 512
Flows
8-23
Chapter 8 Networking
Message
Description
The maximum number (128) of port-based flows per SAG has been
exceeded
The maximum number (128) of VLAN-based flows per SAG has been
exceeded
Another classification type has already been defined for the VLAN.
Source MAC, destination MAC, source IP, destination IP and
Ethertype classifications must be unique per VLAN.
Another type of classification entry already exists for the port. The
classification type must be unique for the port.
VLAN ranges are not allowed for the selected classification type
VLAN ranges are not allowed for flows originating from router- or
bridge-type SVIs
MAC ranges are not allowed for the selected classification type
P-bit ranges are not allowed for the selected classification type
8-24
Flows
8.2
Chapter 8 Networking
Ethertype
Ethertype (tag protocol ID, or TPID) configured per chassis and per port is used
for:
Benefits
Per-port tag Ethertype configuration allows identification of incoming and
outgoing VLAN-tagged frames.
Factory Defaults
By default, Ethertype is set to 8100.
Functional Description
See Ethertype in Appendix B for a detailed description of Ethertype.
Configuring Ethertype
Any Ethertype tag, in addition to the default 8100 value, must first be defined at
the chassis level. Afterwards, the additional tag value is used in the port
configuration. If the second value is not defined for a port, the port uses default
setting (8100).
Note
Example
ETX-5300A>config>port>tag-ethertype 0x88a8
Configuration Errors
Table 8-6 lists the messages generated by ETX-5300A when a configuration error
is detected.
ETX-5300A Ver. 1.0
Ethertype
8-25
Chapter 8 Networking
Description
The Ethertype tag value for a port or a flow is different from the
one configured at system level
8.3
ETX-5300A tunnels, discards or peers (trap to host for protocol processing) L2CP
packets. These actions are defined by L2CP profiles, which also provide different
L2CP addresses. The L2CP profiles are attached to ports and flows.
Standards
IEEE 802.3
Benefits
ETX-5300A offers high flexibility in handling customers L2CP packets. According
to application requirements, these packets can be tunneled, discarded or trapped
to the host.
Factory Defaults
By default, a tunnel all profile is attached to every port. However, no default
L2CP profile is attached to a newly created flow, meaning the flow traffic
behaves, by default, according to the port profile.
Functional Description
See L2CP in Appendix B for a detailed description of how ETX-5300A handles
Layer 2 Control Protocol packets.
8-26
Chapter 8 Networking
Task
Command
Comments
8-27
Chapter 8 Networking
Task
Command
Comments
Example
Configuration Errors
Table 8-7 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
8-28
Chapter 8 Networking
Message
Description
The MAC address selected for the peer processing action is not
valid. The address must be 01-80-C2-00-00-02.
Cannot bind an L2CP profile that has not yet been created
8.4
Peer
Factory Defaults
By default, there are no peers in the ETX-5300A system.
Benefits
Peers serve as destinations for pseudowire connections for transporting a TDM
payload over packet-switched networks. In addition, they are configured to be
sources for the master clock used by 1588v2 slave entities.
Functional Description
Peers are remote devices operating opposite router interfaces. You can define up
to 1334 peers for pseudowire or 1588v2 traffic, with each assigned a unique
index number. The index number is used to specify the pseudowire destination,
instead of directly providing the necessary destination information. To configure
a UDP/IP peer, you must provide its IP address. For MEF-8 peers, you must specify
the MAC address of the destination device.
Peer
8-29
Chapter 8 Networking
Task
Command
ip <valid IP address>
router <1>
Note
Comments
At the config# prompt, type info and scroll to the corresponding section.
ETX-5300A>config# info
peer 1 ip 6.6.6.7
peer 2 ip 172.17.153.191 name
peer 3 ip 172.17.154.192 name
"peer_2"
"peer_3"
Example
IP address: 9.9.9.9
Name: peer1.
ETX-5300A>configure peer 1 ip 9.9.9.9 name peer1
Name: peer2.
ETX-5300A>configure peer 1 mac 00-20-d6-54-bf-05 name peer2
ETX-5300A>config# no peer 1
Note
8-30
Peer
Chapter 8 Networking
Configuration Errors
Table 8-8 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
8.5
TDM Pseudowires
TDM pseudowires (PWs) are an emulation of Layer-2 point-to-point connectionoriented services over packet-switching networks (PSN).
Standards
TDM Pseudowires
8-31
Chapter 8 Networking
Managed Objects for TDM over Packet Switched Network (PSN), draft ietf
pwe3 tdm mib 11
Factory Defaults
By default, there are no pseudowire connections in the ETX-5300A system.
Benefits
Pseudowire circuit emulation technology enables packet-based infrastructure to
provide TDM services with the service quality of an SDH/SONET network.
Functional Description
The pseudowire services convert TDM payload to packets and transfer these
packets through Layer-2 (E-Line, E-LAN) or Layer-3 (router) services.
The pseudowire subsystem is located on the E5-cTDM-4 cards. Each TDM card has
four channelized STM-1/OC-3 ports with DS1 capacity at 63 E1 or 84 T1 channels
per interface. The traffic to the internal DS1 ports is directed by means of a
pseudowire cross-connect matrix (a timeslot cross-connect matrix similar to the
TDM cross-connect matrix), which routes traffic from the internal ports to the
pseudowire packet processors with total capacity of up to 336 pseudowires per
card and 1344 per chassis.
Note
For additional information on the ETX-5300A pseudowire system, see also Peer
and Cross-Connection.
Each pseudowire terminated on the E5-cTDM-4 can be independently configured
to handle the particular type of traffic:
8-32
TDM Pseudowires
Chapter 8 Networking
example, traffic using the E1 standards can be directed at destinations using the
T1 standards, and vice versa.
Ethernet Header
The Ethernet header contains the DA, SA and Ethernet type information. It may
also contain an optional VLAN tag.
UDP over IP
For UDP/IP-type PSN, the Ethernet header is as follows:
SA MAC MAC address of the router interface used for packet forwarding
DA MAC MAC address of the resolved next hop, default gateway or host
VLAN VLAN assigned to the router interface used for packet forwarding
MEF-8
For the MEF-type PSN, the Ethernet header is as follows:
P-bit CoS of PW is set to 1. P-bit is a flow attribute (marking profile, CoS >
P-bit)
UDP over IP
MEF-8 (CESoETH).
TDM Pseudowires
8-33
Chapter 8 Networking
UDP over IP
For UDP/IP-type PSN, the TDM-PW packet structure is as follows:
6
20
DA
SA
Type
8100
VLAN
Tag
Type
800
IP Header
UDP
Header
CW
TDM Payload
Where:
DA MAC address of the next hop (taken from the forwarding table)
For UDP/IP-type PSN IP, the TOS byte in the IP header can be configured per PW.
The UDP header is used to multiplex between the different PWs. UDP port values
are as follows:
Note
Classification (Rx side) - configured destination port together with both the
source and destination IP addresses uniquely identifies the PW for the
receiver (a match is checked between the destination port within the Rx
packet and the pre-configured source PW label)
DA
SA
Type
8100
VLAN
Tag
Type
88D8
ECID
CW
TDM Payload
Where:
8-34
TDM Pseudowires
Chapter 8 Networking
Control Word
The control word structure for different encapsulation methods is illustrated
below.
CESoPSN:
0
10
FRG
15
16
LEN (6)
31
Sequence Number (16)
SAToP:
0
RSV
10
FRG
15
16
LEN (6)
31
Sequence Number (16)
00
01
Reserved
10
11
00
01
Reserved
10
Reserved
11
Reserved
TDM Pseudowires
8-35
Chapter 8 Networking
It is incremented with each TDM-PW data packet sent in the specific PW.
TDM Payload
This section details the two payload encapsulation methods supported by
ETX-5300A.
CESoPSN
CESoPSN transports raw TDM data; that is, packets are formed by inserting a
user-specified number of complete TDM frames (4 to 360 frames) in the packet
payload area. Therefore, CESoPSN pseudowires can only be configured on framed
ports.
The TDM frames are considered serial data, even if they carry voice and CAS.
Since a CESoPSN pseudowire transports raw TDM frames, a CESoPSN pseudowire
can only be directed to another framed port.
The amount of TDM data in the CESoPSN packet is an integer multiple of the
basic structure size (the basic structure consists of N octets filled with the data
of the corresponding NxDS0 channels belonging to same PW):
N number of timeslots in the PW
L packet payload size in bytes
L = mxN
8-36
TDM Pseudowires
Chapter 8 Networking
Timeslot 1
Frame 1
Timeslot 2
Timeslot N
Timeslot 1
Frame 2
Timeslot 2
Timeslot N
Timeslot 1
Frame 3
Timeslot 2
Timeslot N
Timeslot 1
Frame m
Timeslot 2
Timeslot N
The first structure in the packet starts immediately at the beginning of the packet
payload.
The timeslots to be placed into the payload do not need to be contiguous, and
the payload can contain any combination of timeslots from the TDM circuit. The
timeslots are placed into the payload in the same order that they occur in the
TDM circuit.
Maximum payload size for a CESopSN PW is up to 512 bytes. It is calculated as
N number of timeslots in the PW,
Where N = 8, 16, 24, 32, 40, 48, 56, 64.
SAToP
SAToP is used to transfer a bit stream transparently at the nominal port rate
(2.048 Mbps or 1.544 Mbps). Therefore, SAToP can be used only when the port
uses the unframed mode, and thus only one pseudowire can be configured per
port.
The SAToP packet payload consists of a user-specified number of raw TDM bytes
(4 to 1440 bytes), and is treated as data payload.
Note
The SAToPSN packet overhead is large, and therefore, for efficient bandwidth
utilization, the number of raw TDM bytes per packet should be as large as
possible.
TDM Pseudowires
8-37
Chapter 8 Networking
The receiving end restores the original bit stream. Therefore, a SAToP pseudowire
can only be directed to another unframed TDM port.
Maximum payload size for a SAToP PW is as follows:
E1 N 32
Where N = 18, 16, 24, 32 (payload size is an multiple integer of 32 bytes)
T1 N 24
Where N = 18, 16, 24, 32 (payload size is an multiple integer of 24 bytes)
All SAToP implementations support the following payload sizes (other sizes are
optional):
E1 - 256 bytes
T1 - 192 bytes.
Bandwidth utilization efficiency. The smaller the number of TDM bytes per
packet, the lower the efficiency. The overhead can be a significant fraction of
the total packet when the TDM payload parameter is small.
Packetizing delay and the associated delay variance. Considering that any
given TDM byte is received only once per TDM frame, the rate at which TDM
bytes are received for filling packets is 8000 bytes per timeslot per second.
Since a packet will be sent only after its payload field has been filled, the
maximum possible filling rate occurs for PWs carrying 32 timeslots (unframed
mode) and a payload of 32 bytes per frame. In this case, the filling of the
32 bytes takes 1 internal TDM frame (125 ps).
However, the filling time increases significantly for PWs with few timeslots;
for example, a voice channel can be carried by a single-timeslot PW.
Considering the nominal filling rate (approximately one byte every
0.125 msec), the filling time can easily become very significant. As a
worst-case example, consider the time needed to fill a single-timeslot PW:
The round-trip (or echo) delay for voice channels is at least twice the
packetizing delay; any other delays encountered along the end-to-end
transmission path only add to this minimum. Another problem introduced by
packetizing is intrinsic jitter. Because the instant when a packet is filled up is
usually not synchronized with its transmission to network, and occurs after
an essentially random delay, some jitter is inherently introduced.
8-38
TDM Pseudowires
Chapter 8 Networking
Jitter Buffer
The packets of each pseudowire are transmitted by E5-cTDM-4 at essentially
fixed intervals towards the PSN. The packets are transported by the PSN and
arrive to the far end after some delay. Ideally, the PSN transport delay should be
constant, meaning the packets arrive at regular intervals (equivalent to the
intervals at which they were transmitted). However, in reality packets arrive at
irregular intervals, because of variations in the network transmission delay. The
term Packet Delay Variation (PDV) is used to designate the maximum expected
deviation from the nominal arrival time of the packets at the far end device.
Note
The deviations from the nominal transmission delay experienced by packets are
referred to as jitter, and the PDV is equal to the expected peak value of the jitter.
However, nothing prevents the actual delay from exceeding the selected PDV
value.
To compensate for deviations from the expected packet arrival time, E5-cTDM-4
uses jitter buffers that temporarily store the packets arriving from the PSN (that
is, from the far end equipment) before being transmitted to the local TDM
equipment, to ensure that the TDM traffic is sent to the TDM side at a constant
rate.
For each pseudowire, the jitter buffer must be configured to compensate for the
jitter level expected to be introduced by the PSN; that is, the jitter buffer size
determines the Packet Delay Variation Tolerance (PDVT).
Two conflicting requirements apply:
Since packets arriving from the PSN are first stored in the jitter buffer before
being transmitted to the TDM side, TDM traffic suffers an additional delay.
The added delay time is equal to the jitter buffer size configured by the user.
The jitter buffer is filled by the incoming packets and emptied to fill the TDM
stream. If the PSN jitter exceeds the configured jitter buffer size,
underflow/overflow conditions occur, resulting in errors at the TDM side:
A jitter buffer underrun occurs when no packets are received for more
than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is
automatically filled with a conditioning pattern up to the PDVT level in order to
compensate for the underrun. Then, E5-cTDM-4 starts processing the packets
and emptying the jitter buffer toward the TDM side.
To minimize the possibility of buffer overflow/underflow events, two conditions
must be fulfilled:
The buffer must have sufficient capacity. For this purpose, the buffer size can
be selected by the user in accordance with the expected jitter characteristics,
separately for each pseudowire, in the range of 1 to 16 ms.
TDM Pseudowires
8-39
Chapter 8 Networking
The read-out rate must be equal to the average rate at which frames are
received from the network. For this purpose, the read-out rate must be
continuously adapted to the packet rate, a function performed by the
adaptive clock recovery mechanism of each packet processor.
Packet Loss
In order to handle packet loss and misordering, E5-cTDM-4 has a packet
sequence integrity mechanism. It uses a sequence number in the control word (or
in the RTP header, if used) to detect lost and misordered packets. This
mechanism tracks the serial numbers of arriving packets and takes appropriate
action when anomalies are detected. When lost packets are detected, the
mechanism outputs filler data in order to retain TDM timing.
Packets arriving in incorrect order are reordered. Misordered packets that cannot
be reordered are discarded and treated as lost.
ToS
The ToS specifies the Layer 3 priority assigned to the traffic generated by this
pseudowire.
For IP networks, this priority is indicated by the IP type-of-service parameter for
this pseudowire. The specified value is inserted in the IP TOS field of the
pseudowire IP packets.
When supported by an IP network, the type-of-service parameter is interpreted,
in accordance with RFC 791 or RFC 2474, as a set of qualitative parameters for
the precedence, delay, throughput and delivery reliability to be provided to the IP
traffic generated by this pseudowire.
Each network that transfers the pseudowire IP traffic can use these qualitative
parameters to select specific values for the actual service parameters of the
network, to achieve the desired quality of service.
OAM Protocol
The OAM protocol, supported only by packet payload version V2, is used by
pseudowire emulation modules to check for a valid bundle connection: this
includes checks for compatible configuration parameters at the packet processors
at the two endpoints of a bundle, and detection of inactive bundle status.
The bundle state information is collected by the continuous, periodic handshake
between the two endpoints of a bundle, which generates little traffic, but ensures
that each endpoint recognizes the connection, and that it is enabled. If no response
is received by OAM packets within a predefined interval (a few tens of seconds), the
bundle is declared inactive.
When the use of the OAM protocol is enabled, little traffic flows until the connection
between the two bundle endpoints is established: only after the connection is
confirmed by the OAM exchange is transmission at the normal (full) rate started,
and the bundle starts carrying traffic. In case the connection is lost, the transmitted
traffic is again significantly decreased (several packets per second per connection).
The OAM connectivity check also prevents network flooding if the connection is
lost.
8-40
TDM Pseudowires
Chapter 8 Networking
UDP/IP In accordance with source port: in this case the OAM packets run
over a UDP port number that is assigned only for OAM traffic, but use the
same VLAN ID and ToS of the originating connection.
PSN failure
TDM RDI
ETX-5300A uses set of flags in TDM PW control word (CW) to indicate defect
conditions:
L-bit TDM forward defect indication used by the local PW device to signal
TDM link defects to the remove PW device
R-bit PW reverse defect indication used by the local PW device to signal PSN
failures to the remote PW device.
Structure-Agnostic Mode
In the structure-agnostic mode TDM defect indications are carried within the
TDM frame and passed transparently via the pseudowire connection. PSN defects
are mapped to TDM defects (TDM AIS).
TDM
Device
AIS
ETX-5300
AIS
PSN
ETX-5300
TDM
Device
TDM Pseudowires
8-41
Chapter 8 Networking
TDM
Device
ETX-5300
AIS
TDM
Device
ETX-5300
PSN
RDI
TDM
Device
ETX-5300
TDM
Device
ETX-5300
OOS Code
PSN
RDI
TDM
Device
ETX-5300
ETX-5300
TDM
Device
8-42
TDM Pseudowires
Chapter 8 Networking
PSN
TDM
Device
TDM
Device
ETX-5300A
ETX-5300
PSN
RDI
TDM
Device
ETX-5300
TDM
Device
ETX-5300
AIS
PSN
RDI
TDM
Device
ETX-5300
ETX-5300
TDM
Device
TDM Pseudowires
8-43
Chapter 8 Networking
ETX-5300A detects the CW bit settings, it generates the RDI towards the local
TDM device.
R-bit = 1
Packet
Loss
AIS
PSN
RDI
TDM
Device
ETX-5300
TDM
Device
ETX-5300
PSN
RDI
TDM
Device
ETX-5300
RDI
ETX-5300
TDM
Device
Adaptive Timing
For each pseudowire, the E5-cTDM-4 cards have independent adaptive clock
recovery mechanisms, which recover the original timing (clock rate) of the farend source of each pseudowire. The clock recovery mechanisms can provide
recovered clock signals to serve as timing references for the ETX-5300A nodal
timing subsystem.
The receive path of each pseudowire must use a clock recovery mechanism to
recover a clock signal at the original payload transmit rate used at the far end.
This mechanism is referred to as adaptive clock recovery mechanism.
Each pseudowire has its own adaptive timing recovery mechanism, in accordance
with the options listed in RFC 4197. The recovered pseudowire clocks can be
used as timing reference signals for the nodal ETX-5300A timing subsystem;
therefore, E5-cTDM-4 allows flexible timing distribution.
The adaptive clock recovery mechanism estimates the average rate of the
payload data received in the frames arriving from the packet-switched network.
Assuming that the packet-switched network does not lose data, the average rate
at which payload arrives will be equal to the rate at which payload is transmitted
by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order,
are replaced by special dummy packets. However, for CESoPSN and SAToPSN,
packets can be reordered.
The method used to recover the payload clock of a pseudowire is based on
monitoring the fill level of the selected pseudowire jitter buffer. The clock
recovery mechanism monitors the buffer fill level, and generates a read-out clock
8-44
TDM Pseudowires
Chapter 8 Networking
signal with adjustable frequency. The frequency of this clock signal is adjusted to
read frames out of the buffer at a rate that keeps the jitter buffer as near as
possible to the half-full mark. This condition can be maintained only when the
rate at which frames are loaded into the buffer is equal to the rate at which
frames are removed. Therefore, the adaptive clock recovery mechanism actually
recovers the original payload transmit clock.
The performance of the clock recovery mechanism can be optimized for the
operating environment, by specifying the following parameters:
The accuracy of the original timing source, in accordance with the standard
SDH/SONET terminology.
The type of PSN that transports the traffic: router-based network (for
example, UDP/IP) versus switch-based network (for example, Ethernet).
Configuring Pseudowires
A new pseudowire bundle is added by defining its number (11344), its type
(connection mode) and a type of the PSN.
Loopback router interface with valid IP address has been configured (see
Router).
The TDM I/O card has been bound to the loopback router interface, using
card-type > bind loopback-address commands in the slot(14)# prompt.
2. At the config>pwe# prompt, enter the syntax illustrated in the table below.
The config>pwe>pw(<pw-number>)# prompt appears.
Note
TDM Pseudowires
8-45
Chapter 8 Networking
Task
Command
Comments
Assigning the
pseudowire number,
selecting the
encapsulation protocol
for the selected
pseudowire and
specifying the PSN
type (selecting the
type of PSN header)
PW number: 1..1344
PW type (must be configured for the first time):
Command
Comments
name <up to 32
characters>
Out PW label:
In PW label:
jitter-buffer <value in
sec>
8-46
TDM Pseudowires
Chapter 8 Networking
Task
Command
Comments
oam
tdm-payload <value>
egress-port svi
<svi_number>
no shutdown
Displaying PW Statistics
ETX-5300A PWs feature the collection of statistical diagnostics, thereby allowing
the carrier to monitor the transmission performance of the links.
The pseudowire transmission statistics enable analysis of pseudowire traffic
volume, and evaluation of the end-to-end transmission quality (as indicated by
sequence errors) and jitter buffer performance. By resetting the status data at
ETX-5300A Ver. 1.0
TDM Pseudowires
8-47
Chapter 8 Networking
the desired instant, it is possible to ensure that only current, valid data is taken
into consideration.
Task
Command
Comments
Displaying
statistics
Description
Rx Packets
Tx Packet
Missing Packets
Misordered Dropped
Packets
Reordered Packets
Malformed Packets
Number of packets with mismatch between the expected packet and the actual
packet sizes
8-48
TDM Pseudowires
Chapter 8 Networking
Clearing Statistics
To clear the PW statistics:
:
:
:
:
:
CESoPSN
Ethernet
Up
33
22
Table 8-11 explains the connectivity status values of the selected pseudowire.
Table 8-11. Pseudowire Connectivity Status Values
Parameter
Displayed
Description
Disable
Up
The pseudowire carries traffic, and both the remote and the local
pseudowire endpoints receive Ethernet frames. However, there
may be problems such as sequence errors, underflows, overflows,
etc., which can be displayed using the Statistics function.
Unavailable
Down
Local Fail
Remote Fail
TDM Pseudowires
8-49
Chapter 8 Networking
Parameter
Displayed
Description
Validation Fail
:
:
:
:
1
UDP Over IP
1
1
Jitter Buffer
: 1000
PW Type
Status
In Label
: SAToP
: Not present
: 1
Payload Size
: 24
Example
8-50
To configure a pseudowire:
PW number 1
PW type T1 SAToP
In (source) label 1
OAM disabled
Peer 1
TDM Pseudowires
Chapter 8 Networking
ETX-5300A>config>pwe# pw 1
ETX-5300A>config>pwe>pw(1)
ETX-5300A>config>pwe>pw(1)
ETX-5300A>config>pwe>pw(1)
ETX-5300A>config>pwe>pw(1)
ETX-5300A>config>pwe>pw(1)
ETX-5300A>config>pwe>pw(1)
Note
Configuration Errors
Table 8-12 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-12. Configuration Error Messages
Message
Description
TDM Pseudowires
8-51
Chapter 8 Networking
Message
Description
8.6
Cross-Connection
Note
Factory Defaults
By default, there are no cross-connections in the ETX-5300A system.
Benefits
Cross-connects allow flexible mapping of individual DS0 channels or full DS1
streams into pseudowires.
8-52
Cross-Connection
Chapter 8 Networking
Functional Description
The ETX-5300A cross-connect matrix supports two types of cross-connect,
selectable at the level of the individual E1 and T1 port:
Configuring Cross-Connection
Task
Command
Comments
Establishing crossconnection
between this
pseudowire and
timeslots on the
ds1 port
Examples
Cross-Connection
PW number 1
Cross-Connection
8-53
Chapter 8 Networking
To remove PW1:
ETX-5300A>config>cross-connect# no pw-tdm pw 1
Pseudowire Service
The following script illustrates the configuration of point-to-point L2 pseudowire
service for unframed T1.
#****************************Provisioning_I/O_TDM_Card***********************
configure slot 1
card-type sdh-sonet oc-3-ch-4
no shutdown
exit all
#*********************************End****************************************
#*********************Activating_Ethernet_Port_1_on_Main_Card_A**************
configure port ethernet main-a/1
no shutdown
exit all
#*********************************End****************************************
#**************Activating_SDH_SONET_Port_1_on_TDM_Card_in_Slot_1 ************
configure port sdh-sonet 1/1
tx-clock-source domain 1
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_Clock_Domain****************************
configure system clock domain 1
source 1 rx-port sdh-sonet 1/1
quality-level prs
wait-to-restore 0
exit all
#*********************************End****************************************
#*********************Configuring_Pseudowire_Peer****************************
configure peer 1 mac 00-20-d2-31-bf-01 name IPmux216
exit all
#*********************************End****************************************
#*********************Configuring_Classifier_Profile*************************
config flows classifier-profile classAll match-any
match all
exit all
config flows classifier-profile class1000 match-any
8-54
Cross-Connection
Chapter 8 Networking
Cross-Connection
8-55
Chapter 8 Networking
exit all
#*********************************End****************************************
#************************Configuring_T1_to_Ethernet_Flow*********************
configure flows flow 1
classifier classAll
ingress-port svi 1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
vlan-tag push vlan 1000 p-bit profile mark1
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_Ethernet_to_T1_Flow*********************
configure flows flow 2
classifier class1000
ingress-port ethernet main-a/1
egress-port svi 1
vlan-tag pop vlan
no shutdown
exit all
#*********************************End****************************************
Configuration Errors
Table 8-13 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-13. Configuration Error Messages
Message
Description
8-56
Cross-Connection
Chapter 8 Networking
Message
Description
8.7
Bridge
Standards
IEEE 802.1D, 802.1Q
Benefits
Bridge is used to deliver EPLAN and EVPLAN (any-to-any) services.
Factory Defaults
By default, no bridge instances exist in the ETX-5300A system.
Functional Description
A bridge is a forwarding entity used by ETX-5300A for delivering E-LAN services in
multipoint-to-multipoint topology and G.8032 ring protection. With up to 32
bridge instances, ETX-5300A provides up to 128 bridge ports.
ETX-5300A Ver. 1.0
Bridge
8-57
Chapter 8 Networking
The bridge operates in VLAN-aware mode (IVL) with ingress filtering. It accepts
tagged frames only. To be admitted to the bridge, a frames VID must be
configured as a part of the bridge port VLAN member set. Untagged frames must
receive a relevant VID at port ingress (tag push) or they will be dropped.
The ETX-5300A bridge supports up to 4K broadcast domains (bridge/VLAN) and a
MAC table with up to 256K entries. MAC table size is configurable per broadcast
domain with up to 4K entries per broadcast domain. The MAC table flush is
supported per bridge instance and the MAC table list is available in a file. MAC
address aging time is configured per chassis in the range of 300 (default) to
3600 seconds.
Note
Bridge Model
A bridge is defined by a bridge number, bridge ports and a VLAN membership
table that specifies which bridge ports are members in a certain broadcast
domain (VLAN).
Traffic in and out of a bridge port is configured using flows. This allows editing
action at ingress and egress bridge ports. Valid and invalid bridge configurations
are described below.
Different flows from one physical port can be mapped to bridge ports on
different bridge instances, as shown in the figure below:
Bridge
Port
Bridge
Figure 8-14. Mapping Flows from the Same Physical Port to Different Bridges
However, different flows from the same physical port cannot be mapped to the
same bridge port and broadcast domain (VLAN):
VID A
VID B
Port
Push C
Bridge
VID C
Figure 8-15. Mapping Flows with the Same VID to One Bridge Port
Likewise, flows from the same bridge port cannot be mapped to different
physical ports:
8-58
Bridge
Chapter 8 Networking
Port
Bridge
Port
Figure 8-16. Mapping Flows with the Same Bridge Port to Different Physical Ports
Directly-attached ports:
Tag stripping (pop) at bridge port ingress can be configured only if the
flow classification method is configured to Outer + Inner VLAN. (If pop
action exists, the flow must be classified with two VLANs.)
Untagged
Push X
VLAN X
None
VLAN X
Push Y
VLAN Y
Swap (mark) Y
VLAN Y
None
VLAN X
Pop
VLAN Y
Push Z
VLAN Z
Swap (mark) Z
VLAN Z
VLAN X
Outer VLAN X +
Inner VLAN Y
Indirectly-attached ports:
Up to 255 different bridge ports with ingress pop action can be defined
Bridge
8-59
Chapter 8 Networking
Swap (mark) X
VLAN X
Push X
VLAN X
Outer VLAN X
None
VLAN X
Outer VLAN X +
Inner VLAN Y
Pop
VLAN Y
Match All
Note
All flows from the same SAP must have the same classification mode.
All flows on the VLAN must be deleted before a VLAN member can be deleted
from a bridge port.
All VLAN members of a bridge port must be deleted before the bridge port
can be deleted.
All bridge ports must be deleted before the bridge can be deleted.
Configuring Bridge
Bridge configuration includes the following steps:
1. Adding and configuring a bridge instance (132)
2. Binding bridge ports to SVIs
3. Adding VLANs and defining bridge ports as egress tagged VLAN members.
To configure a bridge:
1. At the configure prompt, enter bridge followed by bridge number (132).
A bridge instance with the specified number is created and the
config>bridge(1)# prompt is displayed.
2. Configure the bridge as illustrated and explained below.
Note
Task
Command
aging-time <300600>
clear-mac-table
8-60
Bridge
Comments
Chapter 8 Networking
Task
Command
Comments
port <1128>
vlan <14094>
no vlan (VLAN_number),
deletes a VLAN
show vlans
no port <1128>
The following marking actions can be performed at the port level, at the
config>bridge(bridge_number)>port(port_number)# prompt.
Task
Command
Comments
name <value>
no name
Enabling the bridge port
no shutdown
show status
The following marking actions can be performed at the vlan membership level, at
the config>bridge(bridge_number)>vlan(vlan_number)# prompt.
Task
Command
name <value>
Comments
no name
Defining bridge ports as egress
tagged VLAN members
tagged-egress<bridge_port_number>
no tagged-egress
<bridge_port_number>
Bridge
8-61
Chapter 8 Networking
Note
ETX-5300A displays only first 100 entries. To view the whole MAC table,
download it to your PC, using SFTP. See File Operations in Chapter 10.
ETX-5300A>config>bridge(1)# show mac-address-table all
VLAN
MAC Address
Port
Status
--------------------------------------------------------------100
00:00:11:00:00:01
1
dynamic
100
00:00:11:00:00:02
1
dynamic
200
00:00:11:00:00:01
1
dynamic
200
00:00:11:00:00:02
1
dynamic
300
00:00:11:00:00:01
1
dynamic
300
00:00:11:00:00:02
1
dynamic
400
00:00:11:00:00:01
1
dynamic
400
00:00:11:00:00:02
1
dynamic
East
: 1
West
: 2
Data
8-62
Bridge
Chapter 8 Networking
Example
Flow configuration example (see Multipoint Service) includes bridge configuration
procedure.
Configuration Errors
Table 8-16 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-16. Configuration Error Messages
Message
Description
Bridge
8-63
Chapter 8 Networking
Message
Description
8.8
Router
The ETX-5300A static router is a Layer-3 interworking device that forwards traffic
between its interfaces. The router is also used as a forwarding plane for UDP/IP
TDM pseudowires and 1580v2 entities.
Standards
RFC 4292
Benefits
The router is used for segmenting a LAN, increasing network performance, and
making packet forwarding more efficient.
Factory Defaults
By default, there is one router instance in the ETX-5300A system.
Functional Description
The ETX-5300A static router is an internal interworking device that forwards
traffic between its interfaces. ETX-5300A supports a single router instance with
up to 128 router interfaces (RIFs), up to 1K of routing table and up to 1000 ARP
table entries.
Each router interface is assigned an IP address and can be bound to one of the
following:
Bridge port
A router interface can be activated only if it has active ingress and egress flows
connected to it. Likewise, to delete or deactivate flows connected to a router SVI,
the RIF must be deactivated first.
8-64
Router
Chapter 8 Networking
ETX-5300A
SVI
LB IP
RIF Router
User
NET
RIF
SVI
SVI
SVI
BP
SVI
User
BP
SVI
BP
OOB
BP
NET
Bridge
BP
User
SVI
SVI
Management
ETX-5300A can be managed via any router interface, if it is configured to accept
management traffic. RIF management modes are as follows:
Disabled
Enable
IEEE 1588v2 master and slave entities on main cards for Precision Timing
Protocol traffic (one or two loopback addresses, one per main card).
Router
8-65
Chapter 8 Networking
Notes
Configuring Router
Router configuration includes the following steps:
1. Adding a router instance
2. Add and configure router interfaces (1128).
To configure a router:
1. At the configure prompt, enter router followed by router number (1).
A router instance with number 1 is created and the config>router(1)#
prompt is displayed.
2. Configure the router as illustrated and explained below.
Task
Command
Comments
name <value>
no name
Clearing dynamic entries from
ARP table
clear-arp-table
interface <1128>
static-route
<IP-address/IP-mask-of-static-route>
address <IP-address-of-next-hop>
[metric <metric>]
show arp-table
show interface-table
8-66
Router
no interface <1128>
no interface (port_number),
deletes router interface
The next hop must be a subnet
of one of the router interfaces
Chapter 8 Networking
Task
Command
show routing-table
Comments
The following marking actions can be performed at the interface level, at the
config>router(1)>interface(interface_number)# prompt.
Task
Command
loopback
address <IP-address/IP-mask>
Configuring interface
management access
management-access {allow-all |
allow-ping}
Comments
no bind
no management-access
disables management via RIF
no management-access
Assigning a name to the router
interface
name <interface-name>
no shutdown
show status
8-67
Chapter 8 Networking
IP Address/Mask
Admin
Bound to
Port
Status
Port
Status
--------------------------------------------------------------1
15.15.15.124/24
Up
svi 1
Up
Example
Figure 8-18 and script below illustrate configuration of router with one router
interface connected to a bridge port.
8-68
Router
Chapter 8 Networking
SVI
6
Fl. 9
Port 1
SVI
7
BP 2
Fl. 10
Bridge
SVI
5
Port 2
BP 3
Fl. 11
Port 1
Fl. 12
Port 2
BP 1
Fl. 1
Fl. 7
SVI
1
Port 3
Fl. 2
SVI
4
RIF 1
Fl. 8
Port 3
Fl. 5
RIF 4
Fl. 3
SVI
2
Port 4
Fl. 4
SVI
3
Router
RIF 2
Fl. 6
Port 4
RIF 3
Main Ethernet
Card B
Main Ethernet
Card A
Note
One profile (VLAN 600) for traffic from main card B to router
6. Use default CoS mapping and color mapping profiles (color green, CoS CoS
0).
Router
8-69
Chapter 8 Networking
Flow 5 from main card B port 2 to SVI 3, VLAN 600 classifier, pop VLAN
Flow 6 from SVI 3 to main card B port 2, match all classifier, push VLAN
600 with VID P-bit and DEI values set by marking profile
Flow 7 from SVI 4 to SVI 5, match all classifier, push VLAN 20 with VID
P-bit and DEI values set by marking profile
#**********************Enabling_Ports_on_Main_Cards*************************
config port
ethernet main-a/1
no shutdown
exit
ethernet main-a/2
no shutdown
exit
ethernet main-a/3
no shutdown
exit
ethernet main-b/1
no shutdown
exit
ethernet main-b/2
no shutdown
exit
exit all
#*********************************End****************************************
#*********************Assigning_Queue_Group_Profiles*************************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet main-a/2 queue-group profile q_group_2_level_default
config port ethernet main-a/3 queue-group profile q_group_2_level_default
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet main-b/2 queue-group profile q_group_2_level_default
exit all
#*********************************End****************************************
8-70
Router
Chapter 8 Networking
#***************************Configuring_SVIs*********************************
config port svi 1 router
exit all
config port svi 2 router
exit all
config port svi 3 router
exit all
config port svi 4 router
exit all
config port svi 5 bridge
exit all
config port svi 6 bridge
exit all
config port svi 7 bridge
exit all
#*********************************End****************************************
#************************Configuring_Bridge_Ports****************************
config bridge 1 port 1
bind svi 5
no shutdown
exit all
config bridge 1 port 2
bind svi 6
no shutdown
exit all
config bridge 1 port 3
bind svi 7
no shutdown
exit all
config bridge 1
vlan 20
tagged-egress 1..3
exit all
#*********************************End****************************************
#***********************Configuring_Classifier_Profiles**********************
config flows classifier-profile classall match-any
match all
exit all
config flows classifier-profile classutg match-any
match untagged
exit all
Router
8-71
Chapter 8 Networking
Configuration Errors
Table 8-17 lists the messages generated by ETX-5300A when a configuration
error is detected.
8-72
Router
Chapter 8 Networking
Description
Cannot add a new RIF if the maximum number of RIFs has been
reached or the RIF IP address/mask overlaps the subnet of an
existing RIF
Cannot activate a RIF which has not yet been bound to a port
Router
8-73
Chapter 8 Networking
Message
Description
8.9
Standards
IEEE 802.1p, IEEE 802.1Q.
Benefits
Flexible Ethernet QoS and extensive TM capabilities allow ETX-5300A to offer,
monitor and enforce different levels of Service Level Agreements (SLAs) for
various service types.
Factory Defaults
Refer to the following sections for the specific default for each type of QoS.
Functional Description
Appendix B details QoS capabilities of ETX-5300A, discussing the following:
CoS mapping
Policing
Marking.
This QoS section describes profile creation, gives default profiles (where
applicable), and provides a configuration example.
Traffic Management
ETX-5300A devices employ various traffic engineering techniques to optimize
service delivery and ensure end-to-end QoS. They enable multi-criteria traffic
classification as well as metering, policing and shaping to rate-limit user traffic
according to CIR and EIR profiles.
8-74
Chapter 8 Networking
Shaper
Traffic coming from level-0 internal queues and from level-0, -1 and -2 queue
blocks, is shaped to smooth out bursts and avoid buffer overruns in subsequent
network elements. At this stage, output packets from each buffer block undergo
a shaping function so that the overall traffic volume from each block does not
exceed a preset bandwidth value. Shaping is performed according to a single or
dual token bucket algorithm (see Traffic Management in Appendix B for details).
Traffic shaping is performed by creating shaper profiles with the following
bandwidth parameters:
Committed Information Rate (CIR): The bandwidth that the service provider
guarantees the enterprise, regardless of network conditions.
Excess Information Rate (EIR): The bandwidth allowance for best effort
delivery, for which service performance is not guaranteed and traffic may be
dropped if the network is congested.
Committed Burst Size (CBS): The maximum size, expressed in bytes, of a burst
of back-to-back Ethernet frames for guaranteed delivery.
Defined shaper profiles (up to 256 per chassis) are assigned to relevant
scheduling elements (SE). Traffic Management in Appendix B details the
ETX-5300A SEs and shapers supported by them. Single-rate shapers are defined
with CIR/CBS values only; dual-rate shapers have both CIR/CBS and EIR/EBS values.
Shaper bandwidth values are different for pre-forwarding (ingress) and postforwarding (egress) traffic management.
Pre-Forwarding (Ingress) TM
Post-Forwarding (Egress) TM
CIR
CBS
CIR/EIR
CBS/EBS
01 Gbps
064 kbyte
0, 10512 kbyte
Factory Defaults
By default, there are no shaper profiles in the system.
Configuring Shaper
8-75
Chapter 8 Networking
Note
Task
Command
Comments
compensation <063>
Compensation configuration is
available for pre-forwarding
(ingress) traffic management
only.
Example
See the Example at the end of the Traffic Management section
Configuration Errors
Table 8-18 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-18. Configuration Error Messages
Message
Description
Illegal value
The values entered for the bandwidth profile are not valid
8-76
Chapter 8 Networking
Drop
Probability
100%
Max Drop
Probability
Min
Threshold
Max
Threshold
100%
Queue
Depth
Factory Defaults
By default, ETX-5300A provides one WRED profile (DefaultWREDProfile) with the
following settings:
Green packets
Yellow packets:
8-77
Chapter 8 Networking
Configuring WRED
Note
Task
Command
Comments
Example
See Example at the end of the Traffic Management section
Configuration Errors
Table 8-19 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-19. Configuration Error Messages
Message
Description
Illegal value
Internal Queue
Internal queues are tier-1 scheduling elements of ETX-5300A, that use strict or
WFQ scheduling techniques. They have shaper and WRED profiles assigned to
them, and, at a later stage, they are combined into queue blocks. ETX-5300A
supports up to 16K of internal queue profiles per chassis.
8-78
Chapter 8 Networking
Factory Defaults
By default, ETX-5300A provides the following internal queue profiles:
DefaultStrictInternalQ
Strict scheduling
DefaultWfqInternalQWithWred
DefaultWfqInternalQWithoutWred
No WRED profile
Note
Task
Command
Comments
no congestion-avoidance wred
no congestion-avoidance wred
removes a WRED profile
association.
Setting scheduling method
no shaper-profile removes a
shaper profile association
no shaper profile
Example
See Example at the end of the Traffic Management section
8-79
Chapter 8 Networking
Queue Block
The queue block is a tier-2 scheduling element in the ETX-5300A traffic
management system. It consists of internal queues, and, in turn, serves as part of
a tier-3 element a queue group.
The Traffic Management section in Appendix B describes level-0, level-1 and
level-3 queue blocks, and details their relationships to different types of queue
groups.
Factory Defaults
ETX-5300A provides several queue block profiles, depending on the queue group
types that use them. The Traffic Management section in Appendix B describes
default the queue block profiles. The default queue block profiles are as follows:
q_block_4_WFQ_4_SP_default
q_block_8_queue_WFQ_default
q_block_64_queue_WFQ_default
q_block_16_queue_WFQ_default
q_block_50_queue_WFQ_default
q_block_4_SP_default.
Note
The number of internal queues per queue block is different for different types of
queue block.
The config>qos>queue-block-profile(profile_name)>queue(queue_number)$
prompt is displayed.
4. Assign an internal queue profile to each internal queue within the queue
block (see internal-profile in table below).
5. Assign the queue block to a queue group and bind it to a queue within a
higher queue block (see Queue Group below).
Note
profile.
Using no before queue (queue_number) deletes the queue from the queue
block.
8-80
Chapter 8 Networking
Task
Command
Comments
internal-profile profile
<internal_profile_name>
no internal-profile removes an
internal queue profile
association from the queue
within the queue block
no internal-profile
Example
See Example at the end of the Traffic Management section.
Queue Group
Queue group is a tier-3 scheduling element in the ETX-5300A traffic management
system. Queue groups perform pre- and post-forwarding (ingress and egress)
traffic management and are subdivided into the different types, as explained in
the Traffic Management section of Appendix B.
Factory Defaults
ETX-5300A provides several queue group profiles, depending group type. Traffic
Management section in Appendix B describes default queue group profiles. The
default queue group profiles are as follows:
q_group_2_level_default
q_group_3_level_default
q_group_3_level_768_default
q_group_SAG_2_level_default.
Note
queue-block 0/<1N>
queue-block 1/<1N>
queue-block 2/<1N>
The queue block number depends on the queue group type that the queue
block belongs to. Traffic Management in Appendix B details the exact numbers
of queue blocks supported by different queue group types.
The queue blocks must be added sequentially (queue-block 0/1, queue-block
0/2 etc).
8-81
Chapter 8 Networking
The config>qos>queue-group-profile(profile_name)>queue-block(level/ID)#
prompt is displayed.
4. Enter all necessary commands according to the tasks listed below.
5. If you wish to configure another queue block, type exit to return to the queue
group profile context, and start again.
Note
Task
Command
name <block_name>
profile <queue_block_profile>
Comments
Level-2 (highest)
queue block cannot
be bound to anything
Example
See Example at the end of the Traffic Management section.
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-20. Queue Configuration Error Messages
Message
Description
Illegal value
The first four internal queues in a queue block must use a strict
priority mechanism
8-82
Chapter 8 Networking
Message
Description
A queue block with the same name already exist in the same
level
Level-1 and level-2 queue blocks can have only WFQ queues
8-83
Chapter 8 Networking
Message
Description
The weight values entered are not valid for internal queues with
WFQ priority in a level-0 queue block
The weight values entered are not valid for internal queues with
WFQ priority in a level-1 queue block
CoS Mapping
User priorities must be mapped to internal Class of Service (CoS) values,
according to P-bit, DSCP, IP Precedence or per flow criteria, as detailed in
Appendix B. The newly defined CoS can then be used for:
Queue mapping.
In other words, each packet is first normalized to a CoS value (07), this CoS is
then used for VLAN editing (P-bit) or priority queue mapping.
Ingress Traffic
CoS Mapping
Profiles to map:
Flow to CoS
CoS to P-bit
Queue Mapping
Profiles to map:
The CoS Mapping section in Appendix B gives detailed description of CoS mapping
methods supported by directly- and indirectly-attached ports, according to a
classification key used for traffic classification.
8-84
Chapter 8 Networking
Factory Defaults
ETX-5300A has three default profiles for P-bit to CoS, IP Precedence to CoS, and
DSCP to CoS mapping. These profiles are part of 36 CoS mapping profiles
supported per system. CoS Mapping section in Appendix B describes the default
CoS mapping profiles.
Note
Example
See Example at the end of the Traffic Management section.
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration
error is detected.
Description
Illegal value
The maximum number of profiles (12 or 16) using the same CoS
mapping method (P-bit to CoS, DSCP to CoS, etc.) has been
reached
8-85
Chapter 8 Networking
Color Mapping
ETX-5300A supports an ingress color mapping mechanism as part of its traffic
policing features. The mechanism inspects incoming packets and assigns a green
or yellow color value according to the configured color mapping profiles. The
following mapping profiles are supported:
P-bit to color
DSCP to color
IP Precedence to color
Flow to color
Note
For directly-attached ports, color and CoS mapping methods, applied to the same
flow, must belong to the same color-CoS-mapping combination, as detailed in the
CoS Mapping section of Appendix B.
Factory Defaults
By default, ETX-5300A marks all incoming packets as green.
Note
Note
Example
See Example at the end of the Traffic Management section.
8-86
Chapter 8 Networking
Configuration Errors
Table 8-22 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-22. Configuration Error Messages
Message
Description
Illegal value
Policing
When the flows are established, a metering and policing function can be applied
for each ingress flow on indirectly-attached ports to regulate traffic according to
the contracted CIR, EIR, CBS and EBS bandwidth profiles. Rate limitation is
performed according to the Dual Token Bucket mechanism (two rates, three
colors) in color-aware or color-blind modes.
The final color of a packet is determined by a policer (color-aware or color-blind).
If a policer is not applied on a specific flow, the ingress color mapping determines
packet color.
Policing is implemented by defining policer bandwidth profiles and assigning them
to one or more (up to 16) flows (aggregate policer profile) .
ETX-5300A supports up to 128 policer bandwidth profiles (regular and aggregate)
with up to:
Note
Flows from different I/O port groups (110, 1120) of the E5-GBE-20 card and
flows from different ports of the E5-10GBE-2 card cannot share the same
aggregate policer.
Factory Defaults
By default, ETX-5300A does not have policer profiles.
8-87
Chapter 8 Networking
Task
Command
color-aware
compensation <063>
coupling-flag
no color-aware
no coupling-flag
Comments
no color-aware enables
the color blind mode of
the policer
no coupling-flag
disables coupling flag
usage
Task
Command
rate-sampling-window <130>
show flows
clear-statistics
8-88
Comments
Chapter 8 Networking
Example
See the Multiple CoS Point-to-Point Service example in the section Flows above.
This example shows how to create four policer profiles to allocate bandwidth to
four flows (1114).
Configuration Errors
Table 8-23 lists the messages generated by ETX-5300A when a policer
configuration error is detected. Table 8-24 lists the messages generated by
ETX-5300A when a policer aggregate configuration error is detected.
Table 8-23. Policer Configuration Error Messages
Message
Description
Illegal value
The values entered for the bandwidth profile are not valid
Description
Illegal value
Marking
Marking profiles map CoS and packet color values into egress priority tags. The
marking is done per color (green and/or yellow) to support color re-marking, and
8-89
Chapter 8 Networking
optionally the Drop Eligible Indicator (DEI) bit is specified in the frame header.
ETX-5300A supports up to 16 color-aware and color-blind marking profiles.
Note
A color-aware profile translates CoS (07) and packet color (all, green,
yellow) into P-bit (07) and DEI (yellow, green) values
A color-blind profile translates CoS (07) into P-bit (07) and DEI (yellow,
green) values.
Factory Defaults
By default, ETX-5300A does not have any marking profiles.
Example
See Multiple CoS Point-to-Point Service example in the Flows section above. This
example shows how to create color-aware marking profile.
8-90
Chapter 8 Networking
Configuration Errors
Table 8-25 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-25. Configuration Error Messages
Message
Description
Illegal value
Queue
1
Example
This example shows how to create multiple CoS point-to-point service with traffic
management. Traffic management is performed using a 3-level queue group,
illustrated in Figure 8-20.
ETX-5300A Ver. 1.0
8-91
Chapter 8 Networking
8-92
Chapter 8 Networking
Level-0 SEs
q_block_4_WFQ_4_SP_10_40
CIR
Shapers
Flow 1
Flow 2
Flow 3
Flow 4
Flow 5
Flow 6
Flow 7
WR.1
SP 1
Sh. 7
WR.1
SP 2
Sh. 7
WR.1
SP 3
Sh. 7
WR.1
SP4
Sh. 7
Def. WR.
WFQ 10
Def. WR.
WFQ 20
Def. WR.
WFQ 30
Def. WR.
WFQ 40
0/1
CIR/EIR
Shapers
Sh. 7
Sh. 1
q_block_4_WFQ_4_SP_10_40
CIR
Shapers
Flow 10
Level-1 SEs
0/2
q_block_11_queue_WFQ_10_20_30
1/1
WR.1
SP 1
Sh. 7
WR.1
SP 2
Sh. 7
WR.1
SP 3
Sh. 7
WFQ 20
WR.1
SP4
Sh. 7
WFQ 30
Def. WR.
WFQ 10
Def. WR.
WFQ 20
Def. WR.
WFQ 30
Def. WR.
WFQ 40
CIR/EIR
Shapers
WFQ 10
Sh. 7
CIR/EIR
Shapers
Sh. 2
Sh. 4
q_block_4_WFQ_4_SP_40_10
CIR
Shapers
Flow 20
WR.1
SP 1
Sh. 7
WR.1
SP 2
Sh. 7
WR.1
SP 3
Sh. 7
WR.1
SP4
Sh. 7
0/3
CIR/EIR
Shapers
Level-2 SE
q_block_21_queue_WFQ_10_20
2/1
Def. WR.
WFQ 40
WFQ 10
Def. WR.
WFQ 30
WFQ 20
Def. WR.
WFQ 20
Def. WR.
WFQ 10
Sh. 3
Sh. 6
Sh. 7
q_block_4_WFQ_4_SP_10_40
CIR
Shapers
Flow 30
WR.1
SP 1
Sh. 7
WR.1
SP 2
Sh. 7
WR.1
SP 3
Sh. 7
WR.1
SP4
Sh. 7
Def. WR.
WFQ 10
Def. WR.
WFQ 20
Def. WR.
WFQ 30
Def. WR.
WFQ 40
0/4
CIR/EIR
Shapers
Sh. 7
Sh. 3
q_block_11_queue_WFQ_10_20
1/2
CIR/EIR
Shapers
WFQ 10
q_block_4_WFQ_4_SP_10_40
CIR
Shapers
WR.1
Flow 40
WFQ 20
0/5
Sh. 5
SP 1
Sh. 7
WR.1
SP 2
Sh. 7
WR.1
SP 3
Sh. 7
WR.1
SP4
Sh. 7
Def. WR.
WFQ 10
Def. WR.
WFQ 20
Def. WR.
WFQ 30
Def. WR.
WFQ 40
CIR/EIR
Shapers
Sh. 7
Sh. 1
CIR
Shaper
8-93
Chapter 8 Networking
************************Configuring_Shaper_Profiles**************************
config qos shaper-profile sh1 bandwidth cir 10000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh2 bandwidth cir 20000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh3 bandwidth cir 30000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh4 bandwidth cir 60000 cbs 100000 eir 20000 ebs
200000
config qos shaper-profile sh5 bandwidth cir 40000 cbs 100000 eir 30000 ebs
200000
config qos shaper-profile sh6 bandwidth cir 130000 cbs 100000
config qos shaper-profile sh7 bandwidth cir 1000 cbs 100000 eir 5000 ebs
200000
exit all
#*********************************End****************************************
**************************Configuring_WRED_Profiles**************************
config qos wred-profile 1 color green min 30 max 30 probability 100
config qos wred-profile 1 color yellow min 20 max 30 probability 100
#*********************************End****************************************
**********************Configuring_Internal_Queue_Profiles********************
config qos queue-internal-profile qstrict
congestion-avoidance wred profile 1
scheduling strict
shaper profile sh7
exit all
config qos queue-internal-profile q10
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 10
shaper profile sh7
exit all
config qos queue-internal-profile q20
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 20
exit all
config qos queue-internal-profile q30
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 30
exit all
config qos queue-internal-profile q40
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 40
exit all
config qos queue-internal-profile q10_no_wred
scheduling wfq 10
exit all
config qos queue-internal-profile q20_no_wred
8-94
Chapter 8 Networking
scheduling wfq 20
exit all
config qos queue-internal-profile q30_no_wred
scheduling wfq 30
exit all
config qos queue-internal-profile q40_no_wred
scheduling wfq 40
exit all
#*********************************End****************************************
#****************************************************************************
*********************Configuring_Queue_Block_Profiles************************
#****************************************************************************
#*******************Configuring_Queue_Block_Profile_L2-1*********************
config qos queue-block-profile "q_block_21_queue_WFQ_10_20"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
exit all
#*********************************End****************************************
#********************Configuring_Queue_Block_Profile_L1-1********************
config qos queue-block-profile "q_block_11_queue_WFQ_10_20_30"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
queue 3 internal-profile profile q30_no_wred
exit all
#*********************************End****************************************
#*********************Configuring_Queue_Block_Profile_L1-2*******************
config qos queue-block-profile "q_block_12_queue_WFQ_10_20"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
exit all
#*********************************End****************************************
#**********************Configuring_Queue_Block_Profile_L0-1******************
config qos queue-block-profile "q_block_4_WFQ_4_SP_10_40"
queue 1 internal-profile profile qstrict
queue 2 internal-profile profile qstrict
queue 3 internal-profile profile qstrict
queue 4 internal-profile profile qstrict
queue 5 internal-profile profile q10
queue 6 internal-profile profile q20
queue 7 internal-profile profile q30
queue 8 internal-profile profile q40
exit all
#*********************************End****************************************
#**********************Configuring_Queue_Block_Profile_L0-2******************
config qos queue-block-profile "q_block_4_WFQ_4_SP_40_10"
queue 1 internal-profile profile qstrict
queue 2 internal-profile profile qstrict
queue 3 internal-profile profile qstrict
queue 4 internal-profile profile qstrict
queue 5 internal-profile profile q40
8-95
Chapter 8 Networking
8-96
Chapter 8 Networking
queue-block 0/5
name "3Level_0_5"
profile "q_block_4_WFQ_4_SP_10_40"
bind queue 2 queue-block 1/2
shaper profile sh1
exit all
#*********************************End****************************************
#**********************Assigning_Queue_Group_to Main_Card_Ports**************
config port ethernet main-b/1 queue-group profile 3level_1
config port ethernet main-b/2 queue-group profile 3level_1
exit all
#*********************************End****************************************
#***********************Defining_Classification_Keys*************************
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet main-b/2 classification-key vlan p-bit
exit all
#*********************************End****************************************
#*************************Enabling_Main_Card_Ports***************************
config port ethernet main-b/1 no shutdown
config port ethernet main-b/2 no shutdown
exit all
#*********************************End****************************************
#***********************Defining_Classifier_Profiles*************************
config flows classifier-profile class100 match-any
match vlan 100
exit all
config flows classifier-profile class101 match-any
match vlan 101
exit all
config flows classifier-profile class102 match-any
match vlan 102
exit all
config flows classifier-profile class103 match-any
match vlan 103
exit all
config flows classifier-profile class104 match-any
match vlan 104
exit all
config flows classifier-profile class105 match-any
match vlan 105
exit all
config flows classifier-profile class106 match-any
match vlan 106
exit all
config flows classifier-profile class107 match-any
match vlan 107
exit all
config flows classifier-profile class200 match-any
match vlan 200
exit all
8-97
Chapter 8 Networking
8-98
Chapter 8 Networking
no shutdown
exit all
configure flows flow 3
classifier class102
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
configure flows flow 4
classifier class103
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
configure flows flow 5
classifier class104
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
configure flows flow 6
classifier class105
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
configure flows flow 7
classifier class106
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
configure flows flow 8
classifier class107
cos-mapping profile cos7_0
ETX-5300A Ver. 1.0
8-99
Chapter 8 Networking
8-100
Chapter 8 Networking
Standards
IEEE 802.1ag-D8, ITU-T Y.1731
Factory Defaults
By default, OAM functionality is disabled.
Functional Description
OAM (Operation, Administration, and Maintenance) describes the monitoring of
network operation by network operators. OAM is a set of functions used by the
user that enables detection of network faults and measurement of network
performance, as well as distribution of fault-related information. OAM may trigger
control plane or management plane mechanisms, by activating rerouting or by
raising alarms, for example, but such functions are not part of the OAM itself.
OAM functionality ensures that network operators comply with QoS guarantees,
detect anomalies before they escalate, and isolate and bypass network defects.
As a result, the operators can offer binding service-level agreements.
OAM Elements
The Ethernet OAM mechanism monitors connectivity in Maintenance Association
(MA) groups, identified by a Maintenance Association Identifier (MAID). Each
maintenance association consists of two or more maintenance end points (MEP).
Every MA belongs to a maintenance domain (MD), and inherits its level from the
MD to which it belongs. The MD levels are used to specify the scope of the MA
(provider, operator, customer, etc).
Maintenance Domain (MD) The network or the part of the network for
which faults in connectivity can be managed. Each maintenance domain has
an MD level attribute which designates the scope of its monitoring.
8-101
Chapter 8 Networking
trace route and loopback messages. A MIP consists of two MIP Half Functions
(MHFs).
OAM Functions
RADs carrier Ethernet aggregation and demarcation devices feature a
comprehensive hardware-based Ethernet OAM and performance monitoring for
SLA assurance:
Note
Non-intrusive loopback
OAM Connectivity
Figure 8-21 shows how the various levels of OAM sessions supported by RAD
equipment allow each entity to monitor the layers under its responsibility and
easily isolate problems. The Maintenance Entities (MEs) are created at different
levels:
8-102
End-to-end OAM session (EVC ME) between two ETX-2xxAs, which serve as
MEPs. ETX-5300A devices act as MIPs.
Segment OAM session (operator service ME) between ETX-2xxA and the
network side of ETX-5300A.
Ethernet OAM
Chapter 8 Networking
Operator A NEs
Service Provider
Subscriber
Equipment
Operator B NEs
5
Subscriber ME
EVC ME
Ethernet
Operator A Service ME
Operator B Service ME
UNI ME
UNI ME
Transport
Tunnel ME
ETX-2xxA
ETX-2xxA
ETX-5300A
Router
Router
ETX-5300A
Legend:
Triangle MEP (Maintenance End Point)
Circle MIP (Maintenance Intermediary Point)
SAP
GbE
10 GbE
MEP
10 GbE
MEP
BP
Bridge BP
10 GbE
MEP
10 GbE
MEP
10 GbE
Ethernet OAM
8-103
Chapter 8 Networking
A MEP is transparent to OAM frames whose MD level is higher than the MEP level,
and drops OAM packets whose MD level is lower than the MEP level. It fully
supports connectivity check (CC), loopback, link trace and PM counters,
Down MEP
Down MEPs reside at port egress and are bound to physical ports. These MEPs
receive and send CFM PDU from and to the network. Down MEPs are supported
for either point-to-point or multipoint services. Different MEP locations are
illustrated below.
Figure 8-23 illustrates a point-to-point service between two main card ports with
the MEP bound to port A. Tx flow in the service is directed to a queue block.
Tx Flow
MEP
Rx Flow
Main Card
Port A
Main Card
Port B
Figure 8-23. PtP Service with Down MEP Bound to Main Card Port A
Figure 8-24 illustrates a point-to-point service between main and I/O card ports
with the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
MEP
SAP
Rx Flow
I/O Card
Port B
Figure 8-24. PtP Service with Down MEP Bound to I/O Card Port B
Figure 8-25 illustrates a point-to-point service between main and I/O card ports
with MEP bound to port A. Tx flow in the service is directed to a queue block.
Rx Flow
MEP
SAP
Tx Flow
I/O Card
Port B
Main Card
Port A
Figure 8-25. PtP Service with Down MEP Bound to Main Card Port A
Figure 8-26 illustrates a point-to-point service between two I/O card ports with
the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
SAP
MEP
SAP
I/O Card
Port A
8-104
Ethernet OAM
Rx Flow
I/O Card
Port B
Chapter 8 Networking
Figure 8-26. PtP Service between Two I/O Card Ports with Down MEP Bound to Port B
Figure 8-27 illustrates a multipoint service between main card and bridge ports
with the MEP bound to port A. Tx flow in the service is directed to a queue block.
Tx Flow
BP
Bridge BP
SVI
MEP
Rx Flow
Main Card
Port A
Figure 8-27. Multipoint Service with Down MEP Bound to Main Card Port A
The Down MEP is defined over the physical port, inheriting its MAC address. The
Down MEP EVC/location is characterized by:
Untagged
Single VLAN
Single VLAN+P-bit
Match all. If configured over an IO port, the flow from the corresponding
SAP must be used. It also needs a classification profile to specify the
packet tag structure (as it cannot be taken from the flow classification
profile).
Up MEP
Up MEPs reside at bridge ingress and are bound to bridge ports. These MEPs
receive and send CFM PDU from and to the bridge entity. Up MEPs are supported
for multipoint services only. The Up MEPs inherit their MAC addresses from the
corresponding physical ports (egress ports of Tx flows). Different MEP locations
are illustrated below.
Figure 8-28 illustrates a multipoint service between I/O card and bridge ports with
the Up MEP bound to the bridge port. Tx flow in this service is directed to the BP
SVI.
Rx Flow
BP
Bridge BP
SVI
MEP
SAP
Tx Flow
I/O Card
Port A
Figure 8-28. Multipoint Service with Up MEP Bound to I/O Card Port A
Figure 8-29 illustrates a multipoint service between main card and bridge ports
with the Up MEP bound to the bridge port. Tx flow in this service is directed to
the BP SVI.
ETX-5300A Ver. 1.0
Ethernet OAM
8-105
Chapter 8 Networking
Rx Flow
BP
Bridge BP
SVI
MEP
Tx Flow
Main Card
Port A
Figure 8-29. Multipoint Service with Up MEP Bound to Main Card Port A
Up MEP is defined over the bridge port. The Up MEP is characterized by:
Tx flow.
MIPs
Unlike MEP, which is a directional entity acting as a service termination point, MIP
is defined as a bidirectional intermediate entity, consisting of half functions
(MHFs). MIP responds to link trace messages (LTMs) and loopback messages
(LBMs), whose MD level is equal to the MIP MD level. ETX-5300A supports up to
512 MIPs.
MIP
LBM/LTM
LBM/LTM
Flow X
Flow X
LBR/LTR
MHF MHF
LBR/LTR
8-106
The physical port to which they are bound, inheriting the ports MAC source
address
Rx flow, originating from the MIP-bound port, which faces MHF 1, and whose
classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Ethernet OAM
Chapter 8 Networking
Figure 8-31 and Figure 8-32 illustrate MIPs in point-to-point and multipoint
services.
Rx Flow
Tx Flow
Main Card
Port A
Rx Flow
Tx Flow
Main Card
Port A
MIP
(bound to port B)
MHF 1
MHF 1
Main Card
Port B
MIP
(bound to port B)
SAP
MHF 1
MIP
(bound to port A)
Main Card
Port A
MHF 2
MHF 2
MHF 2
Tx Flow
I/O Card
Port B
SAP
Rx Flow
I/O Card
Port B
Rx Flow
BP
Bridge BP
MIP
(bound to port B)
SVI
Tx Flow
MHF 1
MHF 2
Main Card
Port B
Messaging System
The Ethernet service OAM mechanism uses cyclic messages for availability
verification, fault detection, and performance data collection. The main message
types are detailed below.
Note
OAM cyclic messages (CCMs, LBMs and LTMs) packet priority (P-bit value) is
user-configurable at MEP level.
CC Messages
Continuity Check Messages (CCMs) are sent from the service source to the
destination node at regular periodic intervals. They are used to detect loss of
ETX-5300A Ver. 1.0
Ethernet OAM
8-107
Chapter 8 Networking
LOC
LCK
Rx AIS.
The signal is carried in dedicated AIS frames. The transmit interval is configured
per MEP, and can be set to one frame per second (default) or one frame per
minute. The AIS message priority is set per MEP via P-bit (07) configuration.
AIS, LCK, LOC
Rx Flow
Tx Flow
Port A
MEP
AIS
(with client MD level)
Port B
8-108
Ethernet OAM
Chapter 8 Networking
Loopback Messages
MEPs send loopback messages (LBMs) to verify connectivity with another MEP or
MIP for a specific MA. Loopback is a ping-like request/reply function. A MEP sends
a loopback request message to another MEP or MIP, which generates a
subsequent LBR (loopback response). LBMs/LBRs are used to verify bidirectional
connectivity.
The LBMs are always marked green. LBM priority uses the CCM priority that is
configurable as a P-bit value at the MEP level. LBM CoS is set according to a P-bitto-CoS profile, with up to four such profiles per chassis.
LBMs are generated on demand and sent up to 500 times at a rate of 10 pps.
Ethernet OAM
8-109
Chapter 8 Networking
Main Card
Port A
Main Card
Port B
Figure 8-34. MEP with LTM Sent from the Card Port in Point-to-Point Service
In Figure 8-35, the MEP responds with LTR if the target MAC address of the
received LTM is the same as the MEP MAC address (inherited from the port to
which the MEP is bound). LTM is not relayed.
LTM
BP
Bridge BP
SVI
MEP
Main Card
Port A
LTR
Figure 8-35. MEP with LTM Sent from the Bridge Port in Multipoint Service
In Figure 8-36, the MIP always responds with LTR and relays the LTM.
LTM
LTM
LTR
MIP
Main Card
Port A
Main Card
Port B
Figure 8-36. MIP with LTM Sent from the Card Port in Point-to-Point Service
In Figure 8-37, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on the bridge port. The MIP relays the LTM if the
target MAC address of the received LTM has been learned on the bridge port or
has not been learnt at all. If the target MAC address has been learned on another
bridge port, the LTM is discarded.
LTM
LTM
BP
Bridge BP
SVI
LTR
MIP
Main Card
Port A
Figure 8-37. MIP with LTM Sent from the Bridge Port in Multipoint Service
In Figure 8-38, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on another bridge port. The MIP relays the LTM to
the bridge port with the target MAC address. If the target MAC is unknown, the
MIP floods the LTM.
8-110
Ethernet OAM
Chapter 8 Networking
LTM
BP
Bridge BP
LTM
SVI
LTR
MIP
Main Card
Port A
Figure 8-38. MIP with LTM Sent from the Card Port in Multipoint Service
Performance Monitoring
ETX-5300A Ethernet service OAM PM functionality complies with the Y.1731
requirements. ETX-5300A provides per-service loss and delay measurement and
event reporting.
Note
Frame Loss Ratio (FLR) FLR, expressed as a percentage, is the ratio of the
number of service frames not delivered, divided by the total number of
service frames during a time interval, where the number of service frames not
delivered is the difference between the number of service frames sent to an
ingress UNI and the number of service frames received at an egress UNI.
ETX-5300A supports single-ended loss measurement (LM) with on-demand
LMM transmission and automatic LM response (up to 128 simultaneous LM
sessions per chassis). OAM MEPs measure frame loss only if statistic counters
have been enabled on the incoming and outgoing flows. LM is not supported
over tunnels.
Frame Delay (FD) FD is specified as round trip delay for a frame, where FD
is defined as the time elapsed since the start of transmission of the first bit
of the frame by a source node, until the reception of the last bit of the loop
backed frame by the same source node, when the loopback is performed at
the frames destination node.
ETX-5300A supports dual-ended delay measurement (DM) with on-demand
DMM transmission and automatic DM response (up to 128 simultaneous DM
sessions per chassis). Measurement is performed for delays of up to 1
second with full DM over tunnels.
Configuring OAM
Ethernet OAM configuration procedure includes the following steps, detailed in
this section:
Note
Before deleting any of the OAM CFM components, verify that it is not used by
other ETX-5300A elements, such as ERP.
1. Configure maintenance domains (MDs)
2. Define maintenance associations (MAs)
3. Add maintenance endpoints (MEPs)
Ethernet OAM
8-111
Chapter 8 Networking
Note
MD name is no name.
To add a maintenance domain:
Note
A maintenance domain can be deleted only if it has all its MEPs/MIPs deleted or
disabled.
To configure a maintenance domain:
1. Navigate to configure oam cfm maintenance-domain <mdid> to select the
maintenance domain to configure.
The config>oam>cfm>md(<mdid>)# prompt is displayed
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring maintenance
association for the MD
md-level <md-level>
Defining MIPs
8-112
Ethernet OAM
Chapter 8 Networking
Task
Command
Comments
Displaying information on
configured MAs
Displaying information on
configured MIPs
Note
A maintenance association can be deleted only if it has all its MEPs/MIPs deleted
or disabled.
To configure a maintenance association:
1. Navigate to configure oam cfm maintenance-domain <mdid>
maintenance-association <maid> to select the maintenance association to
configure.
The config>oam>cfm>md(<mdid>)>ma(<maid>)# prompt is displayed
2. Enter all necessary commands according to the tasks listed below.
Task
Command
ma-name <065535>
mep <mepid>
Comments
Ethernet OAM
8-113
Chapter 8 Networking
Note
Task
Command
Comments
Enabling initiation of
continuity check messages
(CCM)
ccm-initiate
ccm-priority <priority>
no classification profile
Ethernet OAM
Chapter 8 Networking
Task
Command
Comments
client-md-level <md_level>
no cos-mapping profile
Assigning unidirectional Rx
and Tx flows to the MEP
no flow uni-direction
Activating OAM loopback
lbm
linktrace
queue queue-mapping
<queue_mapping_profile_name>
[block <level_id>/<queue_id>]
no queue queue-mapping
Defining remote MEP with
which the MEP
communicates
remote-mep <remote_mep_id>
no remote-mep <remote_mep_id>
service <service_id>
show status
Administratively enabling
MEP
no shutdown
Endpoint Services
Ethernet OAM
8-115
Chapter 8 Networking
Task
Command
Comments
Assigning unidirectional Rx
and Tx flows to the MIP
no flow uni-direction
Configuring MIP half
functions (MHF)
mhf 1
Administratively enabling
MIP
no shutdown
show status
mhf 2
To deactivate the MIP, enter shutdown
The following marking actions can be performed at the mhf level, at the
config>oam>cfm> md(<mdid>)>mip(<mipid>)>mhf(1 or 2)# prompt.
Task
Command
Comments
no classification profile
8-116
Ethernet OAM
Chapter 8 Networking
Task
Command
Comments
queue queue-mapping
<queue_mapping_profile_name>
[block <level_id>/<queue_id>]
no queue queue-mapping
Task
Command
Comments
delay-threshold <delay-thresh>
delay-var-threshold <delay-var-thresh>
Ethernet OAM
8-117
Chapter 8 Networking
Task
Command
dest-ne <dest-ne-index>
Comments
no shutdown
At the prompt
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)>service
(<serviceid>)#, enter: dest-ne <dest-ne-index>
where <dest-ne-index> is 1255.
The prompt
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)>service(<serviceid>)>
dest-ne(<dest-ne-index>)$ is displayed.
Task
Command
8-118
Ethernet OAM
Comments
Chapter 8 Networking
Task
Command
delay two-way
loss { single-ended }
show statistics
Clearing statistics
clear-statistics
Comments
no delay
no loss
Day OAM statistics for the last 24 hours, or the amount of time since the
service was activated, if less than 24 hours
Interval OAM statistics for the current interval or a selected interval. You
can select an interval only if it has already ended.
When a service is first activated, you can view statistics for the current
interval only. The statistics data is shown for the time elapsed since the
beginning of the interval. When the current interval ends, it becomes interval
1 and you can select it for viewing interval statistics. After each interval ends,
you can select it for viewing interval statistics.
You can view the following types of statistics for destination NEs:
Task
Command
Comments
Ethernet OAM
8-119
Chapter 8 Networking
Task
Command
Comments
Table 8-28
If you specified an interval
that has not yet ended, a
message indicates that the
interval does not exist.
Viewing statistics for current day
Table 8-28
Viewing running statistics,
statistics for the current interval,
statistics for all intervals, and day
statistics
Performance measurement
counters for all available
Intervals, as listed in
Table 8-28
Clearing the statistics for the
destination NE
clear-statistics
Description
Total number of OAM frames transmitted from the local MEP to the
remote MEP since the service was activated
Total number of OAM frames received by the remote MEP since the
service was activated
Total number of OAM frames lost from the local MEP to the remote MEP
since the service was activated
Total number of OAM frames lost from the local MEP to the remote MEP,
divided by the total number of OAM frames transmitted since the service
was activated
8-120
Ethernet OAM
Chapter 8 Networking
Parameter
Description
Total number of unavailable seconds in the remote MEP since the service
was activated
Total number of OAM frames transmitted from the remote MEP to the
local MEP since the service was activated
Total number of OAM frames received by the local MEP since the service
was activated
Total number of OAM frames lost from the remote MEP to the local MEP
since the service was activated
Total number of near end lost OAM frames divided by the total number
of near end transmitted OAM frames
Total number of unavailable seconds in the local MEP since the service
was activated
Average delay
Task
Command
show lbm-results
Comments
Ethernet OAM
8-121
Chapter 8 Networking
Task
Command
Comments
show linktrace-results
Examples
This section illustrates OAM configuration for three MEP instances (two Down
MEPs and one Up MEP).
Loss ratio
Unavailability ratio.
CCMs
EVC1_ing
EVC1_eg
Main Card B
Port 2
MEP
PSN
LMMs
LMRs
Main Card B
Port 1
MEP
DMMs
DMRs
Remote NE
8-122
Ethernet OAM
Chapter 8 Networking
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet main-b/2 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet main-b/2 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_Card_Ports*********************************
config port ethernet main-b/1 no shutdown
config port ethernet main-b/2 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profile******************************
config flows classifier-profile class20 match-any
match vlan 20
exit all
#*********************************End****************************************
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow EVC1_eg
classifier class20
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
configure flows flow EVC1_ing
classifier class20
Ethernet OAM
8-123
Chapter 8 Networking
8-124
Ethernet OAM
Chapter 8 Networking
2. Select classification keys for the main and I/O card ports.
3. Enable the main and I/O card ports.
4. Configure classifier profiles:
8. Define a Down MEP bound to port 1 with CCM sent over P-bit 0.
9. Configure MEP service with LMMs and DMMs sent over P-bit 1.
10. Configure OAM event reporting thresholds for:
Loss ratio
Unavailability ratio.
SAG
SAP
CCMs
ECV2COS1
Port 1
ECV2COS2
SAP 1
EVC2_eg
Port 1
MEP
PSN
LMMs
LMRs
EVC2_ing
MEP
DMMs
DMRs
Remote NE
SAP
Figure 8-40. Down MEP between Main and I/O Card Ports
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
ETX-5300A Ver. 1.0
Ethernet OAM
8-125
Chapter 8 Networking
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan inner-vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_and_I/O_Card_Ports*************************
config port ethernet main-b/1 no shutdown
config port ethernet 1/1 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profiles*****************************
config flows classifier-profile class100pbit6 match-any
match vlan 100 p-bit 6
exit all
config flows classifier-profile class100pbit5 match-any
match vlan 100 p-bit 5
config flows classifier-profile class300100 match-any
match vlan 300 inner-vlan 100
exit all
#*********************************End****************************************
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow ECV2COS1
classifier class100pbit6
cos-mapping fixed 0
ingress-color green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
8-126
Ethernet OAM
Chapter 8 Networking
no shutdown
exit all
Ethernet OAM
8-127
Chapter 8 Networking
8-128
Loss ratio
Unavailability ratio.
Ethernet OAM
Chapter 8 Networking
SVI
1
Flow 1
BP 1
MEP
Port 1
Flow 2
Flow 3
SVI
2
BP 2
Port 2
Flow 4
Flow 5
SVI
3
BP 3
Port 3
Flow 6
Bridge
Main Ethernet Card
Ethernet OAM
8-129
Chapter 8 Networking
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
***********************Configuring_Bridge_and_Bridge_Ports***********************
config port svi 1 bridge
exit all
config port svi 2 bridge
exit all
config port svi 3 bridge
exit all
config bridge 1 port 1
bind svi 1
no shutdown
exit all
config bridge 1 port 2
bind svi 2
no shutdown
exit all
config bridge 1 port 3
bind svi 3
no shutdown
exit all
config bridge 1 vlan 20 tagged-egress 1..3
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
config flows flow 1
classifier class20
ingress-port ethernet main-a/1
egress-port svi 1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
config flows flow 2
classifier class20
ingress-port svi 1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit all
8-130
Ethernet OAM
Chapter 8 Networking
Ethernet OAM
8-131
Chapter 8 Networking
Configuration Errors
Table 8-29 lists the messages generated by ETX-5300A when a configuration
error is detected.
Table 8-29. Configuration Error Messages
Message
Description
The bridge port of the SVI to which the MIP is bound is not a
member of the VLAN defined in the VLAN-based classification
profile used by the MIPs MHF
8-132
Ethernet OAM
Chapter 8 Networking
Message
Description
The port to which you are trying to bind a MEP/MIP does not
exist
The SVI to which you are trying to bind a MEP/MIP is not a bridge
type
Ethernet OAM
8-133
Chapter 8 Networking
Message
Description
The Rx flow for the MEP has not yet been configured
The Tx flow for the MEP has not yet been configured
Illegal MD level
8-134
Ethernet OAM
Chapter 9
Timing and
Synchronization
ETX-5300A timing subsystem includes a central timing subsystem, located on the
main card, and local timing subsystems located on the individual I/O modules.
This chapter presents the following information on the ETX-5300A clock
capabilities:
Clock Selection
1588v2 Timing.
9.1
Clock Selection
Benefits
Flexible timing mechanism utilizes standard technologies to ensure highly
accurate clock recovery and distribution over both the physical and packet layers
with powerful frequency, phase and ToD alignment capabilities.
Factory Defaults
Parameter defaults are listed in the tables below.
Domain Parameter
Default Value
sync-network-type
quality min-level-station
max-frequency-deviation
Clock Selection
9-1
Domain Parameter
Default Value
mode
auto
force-t4-as-t0
Enabled
Source Parameter
Default Value
priority
wait-to-restore
300
hold-off
300
Default Value
interface-type
t1
line-type
ESF for T1
G732N-CRC for E1
8 kHz for 64 kHz
rx-sensitivity
short-haul
tx-clock-source
domain 1
ssm-channel
sa4
tx-ssm
no tx-ssm
Functional Description
The figure below is a diagram of the ETX-5300A timing mechanism.
9-2
Clock Selection
Main Card
System
Clock
10GbE
Ports
I/O
Clock 1
I/O
Clock 2
1588v2
(master)
T0
Mux
SEC
1588v2
(slave)
Station Clock
(BITS/GPS)
Station Clock
Output (T4)
Station Clock
Output (T4)
Secondary Clock via
Standby Main Card
I/O Card 1
I/O Card 2
I/O Card 3
I/O Card 4
Clock Domain
The timing system in ETX-5300A provides a single clock domain. The clock domain
distributes a system clock derived from up to four configured sources after
selection process implemented via Synchronous Equipment Clock (SEC). Clock
sources (SEC inputs) are as follows:
Option I (Europe)
Clock Selection
9-3
Description
Rank
PRC
Highest
SSU-A
SSU-B
SEC
DNU
Lowest
Description
Rank
PRS
Highest
STU
ST2
TNC
ST3E
ST3
SMC
ST4
PROV
DUS
Don't Use for Sync This signal should not be used for synchronization
9-4
Clock Selection
Lowest
SSM/ESSM Support
ETX-5300A supports automatic learning/distributing clock QL using Sync Status
Message (SSMs) or Ethernet Synchronization Message Channel (ESMC) systems.
In the receive direction, an ESMC-FAILED state is declared if no ESMC messages
are received for a period of 5 seconds or more (with issuing SSF).
In the transmit direction, an ESMC message is transmitted every 1 second or
immediately if a change in QL is detected.
For synchronization source signals/interfaces that do not support SSM, it is
possible to force the quality level to a fixed value. This allows use of these
signals/interfaces as synchronization sources in the automatic reference clock
selection process in QL-enabled mode. You must configure a specific QL for all
the ingress synchronization interfaces that do not support SSM.
Clock Mode
The domain clock mode can be one of the following:
Note
Free-run mode the domain clock is based on the main card local oscillator
(TCXO)
Force T0 holdover the domain clock uses data stored by the T0 timing
generator during normal operation for timing output.
Note
Holdover Input lock is lost, the clock mechanism uses data stored during
normal operation for timing output.
By default, the ETX-5300A system clock is in free-run state, until a valid clock
source is selected.
Clock Selection
9-5
Note
By default, ETX-5300A station clock output is in free-run state, until a valid clock
source is selected.
SEC Module
The clock domain provides the system clock according to one of the four timing
inputs, as selected by the SEC unit. The SEC module performs physical clock
selection, hitless switching, clock filtering and holdover. It consists of two timing
generators:
Internal
Oscillator
(TXCO)
System
Clock
SEC
T0
Source Clock 1
Source Clock 2
Source Clock 3
T4
Source Clock 4
Station
Clock
Output
Quality Level
The SEC unit supports input prioritization and source quality level configuration,
according to network type:
9-6
Clock Selection
Quality Level
Option I
Option II
PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, SSM-based
Clock Selection
The clock selection algorithm is based on ITU-T Recommendation G.781. During
the selection process, the best synchronization source from the SEC inputs is
selected as the system clock. The selection process operates in two modes:
Quality level
Signal failure
Priority
Signal failure
Priority
If no overriding external commands are active, the algorithm selects the reference
clock that has the highest priority without signal fail condition. If all inputs have
the same highest priority, an arbitrary reference clock is chosen. If no input clock
is available, the SEC uses internal oscillator timing.
Timers
For additional flexibility in clock restoration, the SEC module has two timers:
Wait-To-Restore. The timer defines the time (in seconds) that a previously failed
synchronization source must be fault-free in order to be considered available.
Hold-Off. The timer defines the time (in milliseconds) that a signal failure
must be active before it is relayed to the clock selection unit.
Switchover
Clock switchover (changing current reference clock) occurs if:
Clock Selection
9-7
Note
Physical failure Clock failure has been detected at the physical layer
Monitoring failure Clock failure has been detected by the clock monitoring
entity of the domain
ESMC failure Ethernet port only with SSM-based clock has not received valid
ESMC-packet stream for 5 seconds.
Switch over is always revertive. For non-revertive mode, you can configure several
sources with the same priority.
SEC Output
The SEC unit outputs a clock with Stratum-3 accuracy, jitter and holdover, in
compliance with the following requirements:
GR-1244-CORE Stratum 3
The T0 timing generator of the SEC unit delivers a system (domain) clock to I/O
cards and to the second main card. In addition, the T4 timing generator outputs
an external clock for distribution to other network devices.
Note
By default, the T4 generator is forced to use the same clock source as the T0
generator.
System
Clock
Bus
Main Card
Source Clock 1
SEC
Source Clock 2
T0
System
Clock
I/O Card 1
I/O Card 2
I/O Card 3
Source Clock 3
T4
Source Clock 4
I/O Card4
Main card Ethernet ports
Station
Clock
Output
Input Sources
The four clock sources (SEC inputs) are based on:
9-8
Clock Selection
Note
Extract the port clock. The derived clock will be used by the clock selection
mechanism as a source clock
Set the port Tx clock according the domain clock available from the main card
Sync-E mode can be used when phase synchronization or Time of Day (ToD) is
not required. The main advantages of Sync-E over 1588v2 clock are:
STM-1/OC-3 Ports
The Rx clock of any STM-1/OC-3 port on the E5-cTDM-4 card can be extracted
and supplied to the main card clock selection mechanism (via backplane clock
bus).
Note
When APS is enabled, clock is used from a selected interface and not from an APS
group.
The Tx clock of an STM-1/OC-3 port can be locked to:
E/T1 Ports
The internal E1/T1 ports cannot be used as clock sources for the system clock.
The Tx clock of internal E1/T1 ports can be locked to:
System clock
Clock Selection
9-9
Station Clock
The station clock interface has two functions:
Output for the ETX-5300A nodal clock. This output provides a convenient
means for distributing the ETX-5300A nodal clock signal to other equipment
(BITS clock only).
BITS Clock
ETX-5300A recovers Building-Integrated Timing Supply (BITS) clock via the station
clock interface ports on E5-MC-4 card. See Appendix A for the external clock
connector pinout.
The following clock signals are supported:
When only one external clock source is available, you can improve hardware
protection by connecting the external clock inputs in parallel, by means of a
Y-cable.
GPS Clock
ETX-5300A receives/transmits (1588v2 master/slave) GPS-based frequency and
phase reference signal from GPS units, using the following interfaces on the E5MC-4 card:
Input and output of ToD timestamp signal via Rj-45 connector with RS-422
interface
When only one GPS clock source is available, you can improve hardware
protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
Redundancy
When ETX-5300A is equipped with two main cards, clock selection and
distribution mechanisms are mirrored in the active and backup cards. This ensures
full timing system redundancy.
9-10
Clock Selection
SEC Redundancy
When a clock source is configured for the active main card, the action is
duplicated in the backup card. This results in the same clock source feeding both
SECs. The SECs are connected internally to improve switchover time and reduce
phase difference when a flip occurs.
The two SEC outputs (active and backup) are master to the I/O cards, which use
only the active one.
Station Clock
Any station clock can be used as a clock input on an active or backup main card.
Each SEC can use input from both station clock sources.
System
Clock
Primary
SEC
Station Clock
Mux
Secondary
To backup card
Secondary
System
Clock
Station Clock
SEC
Mux
Primary
From active card
Domain configuration
Clock Selection
9-11
Task
Command
Comments
sync-network-type { 1 | 2 }
Type 1 Europe
Type 2 USA
When you change the synchronization network
type, you must redefine the clock sources.
Synchronization network type defines the Rx input
clock type that can be used as a domain source.
For example, only an E1 Rx clock can be selected as
an input clock for type 1 (European)
synchronization network.
This parameter cannot be modified if a clock
source has been configured. Remove the clock
source before changing network type.
Setting maximum
frequency deviation
9-12
max-frequency-deviation <value>
Clock Selection
Task
Command
Comments
Forcing T4 timing
generator to use the same
clock source as the T0
generator
force-t4-as-t0
Forcing a selection of a
particular clock source
when the sources have
different quality levels
force <source-id>
Manually selecting a
particular clock source in
the following conditions:
manual <source-id>
No quality is defined
for the clock domain
Canceling a previously
issued force or manual
command
clear
show status
Holdover Input lock is lost, the clock mechanism uses data stored
during normal operation for timing output
Clock Selection
9-13
:
:
:
:
0
0
InActive
InActive
State
State
: Freerun
: Unlocked
Quality
: ST3
Note
Station clock
Note
You can choose an invalid clock source. However, this input will be rejected by
the domain during the clock selection process.
2. Verify that the card whose port will be used as a source clock is provisioned.
3. Verify that the port to be used as a source clock is enabled (no shutdown).
Note
If you choose an invalid clock source, this input will be rejected by the domain
during the clock selection process.
4. Navigate to configure system clock domain 1.
The config>system>clock>domain(1)# prompt is displayed.
5. Type one of the following, according to the required clock source:
Note
To ensure correct distribution of SSM traffic, you must configure flow with an
L2CP profile with peer action on the 01-80-c2-00-00-02 address. The flow must
have the following attributes:
Untagged classification
Ingress port Ethernet port/LAG, serving as the SSM source (Sync-E port
Egress port according to application requirements.
If you use the flow only to peer the SSM frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow
9-14
Clock Selection
6. Enter all necessary commands according to the tasks listed below the next
procedure.
To configure a clock source for which the port has been defined:
1. Navigate to configure system clock domain 1.
The config>system>clock>domain(1)# prompt is displayed.
2. Type source <14> to select the source to configure.
The config>system>clock>domain(1)>source(<14>)# prompt is
displayed.
3. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
priority <num>
14
wait-to-restore <seconds>
0720
hold-off <milliseconds>
3001800
clear-wait-to-restore
Displaying status
show status
Displaying statistics
show statistics
Clock Selection
9-15
ETX-5300A>config>system>clock>domain(1)>source(1)#
ETX-5300A>config>system>clock>domain(1)>source(1)# show status
Status
: OK
Tx Quality : DNU
Rx Quality : PRC
ESMC State : Unlocked
WTR State : Inactive
Clock status provides information about:
9-16
Clock Selection
Example
Domain 1:
#***************************Defining_Station_Clock_Source********************
configure system clock station main-a/1
interface-type e1
no shutdown
show status
exit all
#*********************************End****************************************
#***************************Configuring_Clock_Domain*************************
configure system clock domain 1
sync-network-type 1
source 1 station main-a/1
priority 1
wait-to-restore 0
exit
source 2 rx-port ethernet main-a/1
priority 2
wait-to-restore 0
exit all
#*********************************End****************************************
#***************************Configuring_Ethernet_Ports***********************
configure port ethernet main-a/1
queue-group profile q_group_2_level_default
tx-ssm
no shutdown
exit all
configure port ethernet main-a/2
queue-group profile q_group_2_level_default
no shutdown
ETX-5300A Ver. 1.0
Clock Selection
9-17
exit all
#*********************************End****************************************
#*******************Configuring_Classifiier_Profile_for_SSM_Flow*************
configure flows classifier-profile class1 match-any match untagged
#*********************************End****************************************
#*******************Configuring_L2CP_Profile_for_SSM_Flow********************
configure port l2cp-profile l1
mac 01-80-c2-00-00-02 peer
exit all
#********************************Adding_SSM_Flow*****************************
configure flows flow 1
classifier class1
egress-port ethernet main-a/2 queue-map-profile QueueMapDefaultProfile block
0/1
ingress-port ethernet main-a/1
l2cp profile l1
no shutdown
exit all
#*********************************End****************************************
oNote
Output for the ETX-5300A clock. This output provides a convenient means for
distributing the ETX-5300A clock signal to other equipment or loop it back.
The station clock input can be looped back directly via station clock output.
The station clock interface does not provide Tx clock, if it uses a GPS 10 MHz
signal.
The station clock ports are located on the main cards and provide the following
timing interfaces:
9-18
Clock Selection
Command
Comments
Assigning a name to a
station clock source
name <string>
Defining E1 G.732NCRC
bits to carry SSM
information
tx-ssm
Administratively enabling
station clock
no shutdown
show status
Clock Selection
9-19
Example
Main card A
Interface type: E1
Name: E1_Station_Clock_1
9-20
Clock Selection
Main Card A
Input 1
SEC
Station Clock
Input 2
Y-Cable
Main Card B
Clock Source
Station Clock
SEC
Although not shown in Figure 9-5, inputs 1 and 2 are doubled in main card B for
redundancy.
To control Y-cable redundancy:
1. Verify that both station clocks to be used in Y-cable redundancy have been
configured with the same parameters (interface type, line type etc).
2. Navigate to configure system clock
The config>system>clock# prompt is displayed.
3. Enter station-y-cable to enable Y-cable protection or no station-y-cable to
disable it.
Example
This example shows the configuration procedure for defining two clock sources:
#*************************Activating_SDH_SONET_Port**************************
ETX-5300A# configure port sdh-sonet 1/1
ETX-5300A>config>port>sdh-sonet(1/1)# no shutdown
ETX-5300A>config>port>sdh-sonet(1/1)# exit all
#*********************************END****************************************
#*************************Configuring_Station_Clock**************************
ETX-5300A# configure system clock station main-a/1
ETX-5300A>config>system>clock>station(main-a/1)# shutdown
ETX-5300A>config>system>clock>station(main-a/1)# interface-type e1
Clock Selection
9-21
ETX-5300A>config>system>clock>station(main-a/1)# no shutdown
ETX-5300A>config>system>clock>station(main-a/1)# show status
Name
: Station Clk-5-1
Administrative Status
: Up
Operational Status
: Up
Detailed Status
:
Received SSM
: PRC
#*********************************END****************************************
#*************************Configuring_Clock_Domain***************************
ETX-5300A# configure system clock domain 1
ETX-5300A>config>system>clock>domain(1)# sync-network-type 1
#*********************************END****************************************
#**********************Configuring_Station_Clock_as_Source_1*****************
ETX-5300A>config>system>clock>domain(1)# source 1 station main-a/1
ETX-5300A>config>system>clock>domain(1)>source(1)$ wait-to-restore 10
ETX-5300A>config>system>clock>domain(1)>source(1)$ show status
Status
: Monitoring Fail
Tx Quality : SEC
Rx Quality : SSM Based
ESMC State : Unlocked
WTR State : Running
<===== WTR Timer is running
ETX-5300A>config>system>clock>domain(1)>source(1)$ clear-wait-to-restore
ETX-5300A>config>system>clock>domain(1)>source(1)$ show status
Status
Tx Quality
Rx Quality
ESMC State
WTR State
:
:
:
:
:
OK
DNU
PRC
Unlocked
Inactive
ETX-5300A>config>system>clock>domain(1)>source(1)$ exit
ETX-5300A>config>system>clock>domain(1)# show status
System Clock Source
: 1
State
: Locked
Quality
: PRC
State
: Unlocked
Force Switch:
Manual Switch
: InActive
#*********************************END****************************************
#**********************Configuring_SDH_SONET_Port_as_Source_2****************
ETX-5300A>config>system>clock>domain(1)# source 2 rx-port sdh-sonet 1/1
ETX-5300A>config>system>clock>domain(1)>source(2)$ quality-level ssu-a
ETX-5300A>config>system>clock>domain(1)>source(2)$ wait-to-restore 10
ETX-5300A>config>system>clock>domain(1)>source(2)$ show status
Status
: OK
Tx Quality : PRC
9-22
Clock Selection
Rx Quality : SSU-A
ESMC State : Unlocked
WTR State : Inactive
ETX-5300A>config>system>clock>domain(1)# show status
System Clock Source
: 1
State
: Locked
Quality
: PRC
State
: Locked
Force Switch:
Manual Switch
: InActive
#*********************************END****************************************
Configuration Errors
Table 9-4 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
Duplicated Source
Invalid Priority
Invalid Source ID
Invalid Source
9.2
1588v2 Timing
ETX-5300A fully supports IEEE 1588v2 Precision Time Protocol for distribution of
synchronization signals over packet-switched networks. The device operates in
master, transparent and slave clock modes with hardware-based time-stamping
as well as ToD (time of day) synchronization.
1588v2 Timing
9-23
Benefits
The Precision Time Protocol (PTP), defined in the IEEE 1588 standard, is a
high-precision time protocol for synchronization of clocks over a PSN. The use of
PTP is beneficial for applications that cannot bear the cost of a GPS receiver at
each node, or for which GPS signals are inaccessible.
Factory Defaults
By default, each 1588v2 entity is disabled and configured as neither master nor
slave. When enabled, it has the following default settings:
Master Parameter
Default Value
ip-address
ptp-domain
maximum-slaves
256
mode
time-frequency
sync-rate
64pps
tx-clock
domain 1
Slave Parameter
Default Value
ip-address
ptp-domain
BMCA
revertive
wait-to-restore
300
recovery-mode
time-frequency
priority
network-type
Automatic
peer
sync
rate 128pps
grant-period 300
announce
rate 2sec
grant-period 300
delay-respond
rate 128pps
grant-period 300
9-24
1588v2 Timing
Slave Parameter
Default Value
quality-level
type2SsmBased
Functional Description
When implementing the 1588v2 PTP, ETX-5300A operates in the following roles:
1588v2 master, eliminating the need for an external timing device installed in
the core of the network to support 1588v2 timing distribution. The
ETX-5300A system is located near the core of the network and supplies clock
reference to remote Ethernet CPEs operating in 1588v2 mode.
1588v2 slave, regenerating frequency and time from 1588v2 packets received
from grandmaster
Note
Figure 9-6 illustrates the basic schematics of the 1588v2 master functionality.
Both 1588v2 master entities reside on loopback addresses of the router. The
1588v2 entities generate PTP packets, which are encapsulated with UDP/IP and
forwarded to 1588v2 slaves via PSN.
1588v2 Timing
9-25
Main Card A
Loopback RIF
1588v2
Slave
ETH
1588v2
Master
I/O Card
RIF
Router RIF
ETH
1588v2
Slave
RIF
ETH
1588v2
Slave
Loopback RIF
1588v2
Master
Main Card B
9-26
Phase (1 PPS, or Pulse Per Second) from the RS-422 or mini BNC interface.
1588v2 Timing
1588v2
Master
Frequency
RS-422
Mini
BNC
Clock
Inputs
SEC
ToD
and
1PPS
1PPS
10 MHz
Backup Main Card
1588v2
Master
Frequency
Clock
Inputs
SEC
GPS
Source
ToD
and
1PPS
1PPS
Time of Day
RS-422
Phase
Mini
BNC
1588v2 Timing
9-27
ETX-5300A
Main Card A
1588v2
Master
1588v2
Slave
Main Card B
1588v2
Master
Legend:
Active
Backup
Main Card A
1588v2
Master
1588v2
Slave
ETX-5300A
Main Card A
1588v2
Master
Legend:
Active
Backup
9-28
1588v2 Timing
The 1588v2 slave entity receives TOD information from the master clock source
and outputs NMEA messages via TOD RJ-45 connector.
Recovery Modes
The 1588v2 slave entities operate in two-way mode to recover synchronization
information, using sync, delay request and delay response messages. The
message exchange modes are as follows:
Frequency. In this mode, the 1588v2 slave entity reconstructs remote clock,
using sync and delay request/response messages, while ignoring TOD
information (time indication and time-related status/alarm messages).
Frequency and time. In this mode, the 1588v2 slave entity reconstructs
remote clock, using sync and delay request/response messages, while
providing TOD information via TOD interface.
Forwarding
The 1588v2 slave entity uses a dedicated router loopback interface for message
forwarding, similar to 1588v2 master (Figure 9-6). This LB RIF cannot be shared
with either a 1588v2 master entity or a PW.
Redundancy
The ETX-5300A 1588v2 slaves support non-revertive clock redundancy, using the
Best Master Clock (BMC) algorithm for selecting the clock source with the best
quality. If a failure is detected (no sync massages within 10 seconds), the 1588v2
slave entity switches to the secondary master clock source.
Note
no master disables PTP master mode, setting the 1588v2 entity to be neither
mode. Use no master command prior to switching between slave and master
modes.
ETX-5300A Ver. 1.0
1588v2 Timing
9-29
Command
Comments
no shutdown
Defining IP address of
1588v2 master entity
ip-address <value>
ptp-domain <423>
Defining a maximum
number of slaves
Defining the
synchronization message
rate
show status
pm-collection
Displaying statistics
Clearing statistics
clear statistics
Displaying Status
You can display the current status of the 1588v2 master and the slaves in its
domain.
9-30
1588v2 Timing
Delay Rs
Rate
(pps)
-16
Administrative status:
Operational status:
Detailed status:
1588v2 Timing
9-31
Displaying Statistics
If the collection of performance monitoring data is enabled, you can display the
current statistics for 1588v2 master or slave.
To display statistics:
ETX-5300A>config>system>clock>master(main-a/1)>slave(1.1.1.1)#show statistics
running
Running
-----------------------------------------------------------------------------Tx Sync Packets
: 1
TX Follow Up Packets
: 1
TX Delay Response Packets
: 1
TX Announce Packets
: 1
TX Signaling Packets
: 1
RX Signaling Packets
: 1
RX Delay Request
: 1
Discarded Signaling Packets : 1
Description
Tx Packets
Tx Sync Packets
9-32
1588v2 Timing
Counter
Description
TX Follow Up Packets
TX Announce Packets
TX Signaling Packets
Rx Packets
RX Signaling Packets
RX Delay Request
Configuration Errors
Table 9-6 lists the messages generated by ETX-5300A when a configuration error
is detected.
Description
Domain must be 1
Invalid IP Address
1588v2 Timing
9-33
Note
no recovered disables the PTP slave mode, setting the 1588v2 entity as
mode. Use no recovered prior to switching between slave and master modes.
4. At the config>system>clock>recovered(main-a/1 or main-b/1)# prompt, enter
all necessary commands according to the tasks listed below.
Task
Command
Comments
no shutdown
Defining IP address of
1588v2 slave entity
ip-address <value>
ptp-domain <423>
revertive
nonRevertive
9-34
wait-to-restore <0720>
1588v2 Timing
Task
Command
Comments
show status
Displaying statistics
Clearing statistics
clear statistics
Note
Task
Command
Comments
no shutdown
1588v2 Timing
9-35
Task
Command
Comments
priority { 1 | 2}
peer <peer-number>
Defining synchronization
message rate requested by
the slave and duration of
sync message transmission
Defining Announce
message rate requested by
the slave and duration of
Announce message
transmission
Displaying Status
You can display current status of the 1588v2 slave entity.
9-36
1588v2 Timing
:
:
:
:
:
:
:
:
:
:
:
1
30.30.30.30
ACT
Type-1 DNU
64
0
2
0
64
0
Current state of the slave clock (free run, locked, acquisition, holdover)
PTSF (Packet Timing Signal Fail) indication. Its Active state indicates that the
1588v2 slave has not received a sync, delay respond or announce message
for 10 seconds.
Displaying Statistics
You can display current statistics for 1588v2 slave entity.
To display statistics:
1588v2 Timing
9-37
:
:
:
:
0
9595
0
9467
Description
9-38
1588v2 Timing
Counter
Description
Total time in seconds during which sync messages were not received
Total time in seconds during which delay respond messages were not
received
Time in seconds elapsed after the last received delay respond message
Rx Sync Packets
Rx Sync Lost
Description
Note
Delay respond rate counters are not available in time-frequency recovery mode.
Configuration Errors
Table 9-9 lists messages generated by ETX-5300A when a configuration error is
detected.
1588v2 Timing
9-39
Description
Invalid IP Address
9-40
1588v2 Timing
Task
Command
Comments
no shutdown
show status
Description
Example
This example illustrates configuration of 1588v2 slave and master entities.
Slave clock
9-41
ETX-5300A
Port 1
Port 2
1588v2
Slave
Entity
Peer Master
Clock Source
LB
RIF 1
15.15.15.15/32
PSN
15.15.15.15
Port 3
Router
RIF 2
30.30.30.30
SVI
Port 4
Main Ethernet
Card A
Master clock
#***************************Adding_Loopback_RIF******************************
configure router 1 interface 1 loopback
address 15.15.15.15/32
no shutdown
exit all
#*********************************END****************************************
#***************************Configuring_Peer_Master**************************
configure peer 1 ip 30.30.30.30
exit all
#*********************************END****************************************
#**************************Configuring_1588v2_Slave**************************
configure system clock recovered main-a/3 ptp
ip-address 15.15.15.15
9-42
1588v2 Timing
master 1
peer 1
quality-level prc
no shutdown
#*********************************End****************************************
#***************************Displaying_Slave_Clock_Status********************
config>system>clock>recovered(1/ptp) show status
# Clock State: Frequency : Locked
Time
: Locked
Indicated QL
: Type-1 DNU
Clock Identity
: 0
Active Master
: 1
Ip Address : 15.15.15.15
Master Num
: 1
IP
: 30.30.30.30
PTSF
: NACT
Clock Identity
:
Received QL
: Type-1 DNU
Granted Sync Rate (pps)
: 128
Granted Sync Period (sec)
: 60
Granted Announce Rate (pps)
: 2
Granted Announce Period (sec)
: 300
Granted Delay Respond Rate (pps)
: 128
Granted Delay Respond Period (sec) : 300
#*********************************End****************************************
#***************************Adding_Loopback_RIF******************************
configure router 1 interface 2 loopback
address 16.16.16.16/32
no shutdown
exit all
#*********************************END****************************************
#**************************Configuring_1588v2_Master*************************
configure system clock master main-b/1 ptp
ip-address 16.16.16.16
sync-rate 128pps
no shutdown
#*********************************End****************************************
1588v2 Timing
9-43
9-44
1588v2 Timing
Chapter 10
Administration
This chapter covers administrative tasks such as entering contact info, file
management, etc. It also includes a section with instructions for resetting the
unit.
Task
Command
Comments
name <device-name>
Specifying location
location
<device-location>
contact <contact-person>
Displaying device
information, MAC
address, and amount of
time device has been
running
show device-information
Administrative Information
10-1
Chapter 10 Administration
Location floor-8
Contact Engineer-1.
:
:
:
:
:
:
ETX-5300A-HQ
location floor-8
contact Engineer-1
show device-information
ETH NTU: Boot; 1.10, Hw: 0.0, Main Sw: 3.0, Back-up Sw: 3.0
ETX-5300A-HQ
floor-8
Engineer-1
00-20-D2-30-CC-9D
000:00:04:10
RFC 4330.
Benefits
Simple Network Time Protocol (SNTP) synchronizes the internal clocks of network
devices to a single time reference source. SNTP provides comprehensive
mechanisms to access national time dissemination services, organize the NTP
subnet of servers and clients, and adjust the system clock in each participant. It
improves the timekeeping quality of the network by using redundant reference
sources and diverse paths for time distribution.
10-2
Chapter 10 Administration
Factory Defaults
The default configuration of the SNTP parameters is:
Not preferred.
Functional Description
SNTP is a time-maintenance protocol that helps synchronize networked
hardware. It is based on a server-client topology. A client (ETX-5300A) sets its
system date and time by retrieving this information from an SNTP server. The
information is used for time-stamping log file messages, SNMP traps, Syslog
entries and so on. SNTP uses Coordinated Universal Time (UTC) as a reference.
Requ
Reference
Time Source
est
ETX-5300A
Resp
PSN
onse
est
Requ
Request
Response
se
spon
Re
SNTP
Server
ETX-5300A
Transport Protocol
SNTP uses User Datagram Protocol (UDP) for its transport. The UDP port that has
been assigned to SNTP is 123, but devices and servers can be defined to use any
port for communication.
The client checks each message received from an SNTP server by performing
sanity checks to verify it validity (SNTP server IP match, source/destination port
match etc).
10-3
Chapter 10 Administration
Command
Comments
date <date>
time <hh:mm[:ss]>
Example
Format = mm-dd-yyyy
Time = 5:40pm
SNTP Configuration
Task
Command
Comments
broadcast
no broadcast disables
broadcast mode.
10-4
Chapter 10 Administration
Task
Command
Comments
server <server-id>
show status
Task
Command
address <IP-address>
prefer
no shutdown
query-server
Comments
udp default
shutdown disables the server
10-5
Chapter 10 Administration
Example
Server ID = 1
IP address = 192.1.1.1
Preferred
Administratively enabled.
Type
127.0.0.1
UDP Port Tstap Date Time
Strat Received
192.1.1.1
Prefer
123
00-00-0000 00:00:00 0
ETX-5300A>config>system>date-time>sntp#
--
10.3 Inventory
The ETX-5300A inventory table displays the units components, hardware,
software and firmware revisions. You can display an inventory table that shows
all installed components, and you can display more detailed information for each
component. In addition, you can display manufacture information on items
installed in specific chassis slots, their serial numbers, software and hardware
revisions and number of defined MAC addresses.
10-6
Inventory
Chapter 10 Administration
Description
Description
Contained In
Physical Class
Class of component
Possible values: Chassis, Backplane, Container, Module, Port
Relative Position
Name
Name of component
HW Rev
SW Rev
FW Rev
Serial No.
MFG Name
Module Name
Alias
Asset ID
FRU
Inventory
10-7
Chapter 10 Administration
Type
Main-A
Main 10GEx4
Shelf Type
Serial Number
HW Version
FW Version
Number of MACs
:
:
:
:
:
0.0
FW Ver
2.0
N/A
0.0
2.0
0
Task
Command
Comments
alias <string>
asset-id <id>
serial-number <string>
10-8
Inventory
Chapter 10 Administration
Example
Inventory table
Inventory
10-9
Chapter 10 Administration
:
:
:
:
:
:
:
:
:
:
:
:
:
:
ETX-5300A.AC-chassis
0
Chassis
0
AC-chassi
N/A
N/A
N/A
RAD
ETX-5300A-AC
True
startup-config
rollback-config
user-default-config
Username 1 60 characters
Password 1 60 characters
Port 165535.
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
The SFTP protocol is used to provide secure file transfers via the devices
Ethernet interface. SFTP is a version of FTP that encrypts commands and data
transfers, keeping your data secure and your session private. For SFTP file
transfers, an SFTP server application must be installed on the local or remote
10-10
Downloading/Uploading Files
Chapter 10 Administration
computer. SFTP file transfers use Port 22. You must check that the firewall you
are using on the server computer allows communication through this port.
A variety of third-party applications offer SFTP server software. For more
information, refer to the documentation of these applications.
Application file is
transferred to
ETX-5300A
Ethernet
PC with an Active
SFTP Server and
Application File
ETX-5300
ETX-5300A# file
ETX-5300A>file# copy sftp://<admin>:<1234>@192.20.20.20/ETX-5300A.img swpack-1
Note
ETX-5300A# file
ETX-5300A>file# copy startup-config
sftp://<admin>:<1234>@192.20.20.20/db1conf.cfg
Note
10-11
Chapter 10 Administration
startup-config Contains saved user configuration. You must save the file
startup-config; it is not automatically created. Refer to Saving the
Configuration for details on how to save the user configuration.
You can copy files via the copy command, or via the commands shown in
Table 10-2.
10-12
Chapter 10 Administration
Level
Copies
Manual Section
factory-default
admin
factory-default-config to startup-config
and resets device
admin
save
global
running-config to startup-config
software-confirmrequired
admin
Confirmation of Configuration
File in Chapter 3
For example:
ETX-5300A# file
ETX-5300A>file# copy running-config startup-config
For example:
ETX-5300A>file# show copy summary
Direction
Source
Destination
End Time
1
Local
running-config
user-default-conf 13-3-2011
14:6:51
2
Local
running-config
startup-config
13-3-2011
14:7:35
3
Dev to Net startup-config
DB
13-3-2011
14:7:40
Status
Ended OK
Ended OK
Ended OK
10-13
Chapter 10 Administration
For example:
ETX-5300A>file# dir
Codes
C - Configuration S - Software
Name
LO - Log
O - Other
mac-table
--
sw-pack-1
70250901
startup-config
508671
rollback-config
509453
factory-default-config C
34
running-config
--
log
LO
26598
2012-01-02
09:25:01
2011-12-10
05:58:01
2012-01-01
16:08:11
2012-01-01
19:58:30
2012-01-02
09:25:01
2012-01-02
11:19:24
2011-12-27
15:48:10
Read Only
valid
File In Use
valid
valid
valid
valid
valid
Read Only
valid
File In Use
valid
Read Only
valid
: 672849920
To display the list of configuration and application files and their contents:
At the file# prompt, enter the show command according to the table below.
Task
Command
show configuration-files
show factory-default-config
show rollback-config
show startup-config
show sw-pack
10-14
Comments
Chapter 10 Administration
Task
Command
show user-default-config
Comments
: 70250901
Version
H/W Ver
Size
(Bytes)
-----------------------------------------------------ETX-5300A Ver. 1.0
10-15
Chapter 10 Administration
main
eth1g
stm1ch
eth2X10g
main.bin
eth1g.bin
stm1ch.bin
eth2X10g.bin
1.00A9
1.00A9
1.00A9
1.00A9
1.1
1.1
1.1
1.1
29194087
9353713
15768873
15933988
Deleting Files
You can delete files. Before deleting the file, make sure the file is not in use. For
additional information on configuration files and the consequences of deleting,
refer to Configuration Files and Loading Sequence in Chapter 3.
To delete a file:
1. At the file# prompt, enter: delete <file-name>.
You are prompted to confirm the deletion.
For example:
ETX-5300A# file
ETX-5300A>file# delete sw-pack-1
File will be erased. Are you sure?? [yes/no] _yes
2. Confirm the deletion.
10-16
Chapter 10 Administration
Resetting ETX-5300A
10-17
Chapter 10 Administration
Note
10-18
Resetting ETX-5300A
Chapter 11
Monitoring and
Diagnostics
This chapter explains fault management procedures supported by ETX-5300A. It
presents the following information:
Handling Events
Technical Support.
Indicators
ETX-5300A cards and the ETX-5300A chassis itself have various status indicators
that can be used to identify problems.
Refer to Chapter 3 of this manual for details regarding the functions and
indications of each system indicator.
Statistic Counters
ETX-5300A collects statistics per physical and logical ports (see the list below)
and per connection in 15-minute intervals. This enables the network operator to
monitor the transmission performance, and thus the quality of service provided
Detecting Problems
11-1
Source An entity for which alarms and events can be generated. The source
consists of a source ID, source type (e.g., system, fan, Ethernet), and source
name.
Masking
Alarms and events can be masked per source type, source ID, or minimum
severity. When masking by source type (such as Ethernet) or source ID (such as
Ethernet port 1 on card in slot 1), choose a specific alarm or event, or apply the
change to all the alarms and events of the selected source type or ID.
11-2
Handling Events
Prevent the alarm/event from being written to the history log, sent to Syslog
servers, and displayed in the default view of the active alarms table
When an alarm/event is not masked, any corresponding traps are sent only to
management station for which the traps are not masked in the SNMP manager
configuration. In addition, you can:
You can also acknowledge alarm logs. The last acknowledgement time is recorded
by ETX-5300A. When displaying the log, only entries entered after the last
acknowledgment time are displayed (or calculated, as for the brief log). This
action does not delete any data from the log, and you can also display
acknowledged data by using a designated keyword.
Alarm Buffer
ETX-5300A continuously monitors critical signals and signal processing functions.
In addition, it can monitor an external alarm line, connected to the ALARM
connector.
If a problem is detected, ETX-5300A generates time-stamped alarm messages.
These messages are explained below.
Internally, the ETX-5300A stores alarms in an alarm buffer. The alarm buffer can
store up to 5000 alarm messages, together with their time-stamps. The alarm
history buffer is organized as a FIFO queue; after 5000 alarms have been written
into the buffer, new alarms overwrite the oldest alarms.
Alarm messages can also be sent automatically as traps to the user-specified
network management stations.
The alarms can be read on-line by the network administrator using the network
management station, a Telnet host, a Web browser, or a supervision terminal. The
network administrator can then use the various diagnostic tests to determine the
causes of the alarm messages and to restore the system to normal operation.
When ETX-5300A is powered down, the alarm messages are not erased. When
using the terminal, a Web browser or a Telnet host, you can also clear (delete) the
alarms stored in this buffer after reading them.
Alarm Relays
In addition to the alarm reporting facility, ETX-5300A has alarm relays with
floating change-over contacts for indicating the presence of critical, major and
minor alarms. Each relay changes state whenever the first alarm is detected, and
returns to its normal state when all the alarms of the corresponding severity
disappear.
ETX-5300A Ver. 1.0
Handling Events
11-3
The relay contacts can be used to report internal system alarms to outside
indicators, e.g., lights, buzzers, bells, located on an alarm bay or remote
monitoring panel.
Task
Command
Comments
alarm-source-attribute <source-type>
Use the no form to mask
[<source-id>] alarm <alarm-list> [severity
alarms/events. The following
{critical | major | minor}] [log] [snmp-trap] [led- apply:
relay]
If a trap is masked according
to alarm/event attribute, it is
alarm-source-attribute<source-type>
not sent to any management
[<source-id>] event <alarm-list> [log]
[snmp-trap]
station, regardless of whether
it is masked in the SNMP
manager configuration
11-4
Handling Events
If a trap is unmasked
according to alarm/event
attribute, it is sent only to
management station for
which it is not masked in the
SNMP manager configuration.
Task
Command
Comments
alarm-source-type-attribute <source-type>
alarm <alarm-list> [severity {critical | major |
minor}] [log] [snmp-trap] [led-relay]
alarm-source-type-attribute <source-type>
If a trap is unmasked
according to alarm/event
attribute, it is sent only to
management station for
which it is not masked in the
SNMP manager configuration.
Displaying alarms
show
Event Logs
Note
Examples
Alarm excessive-bpv
Handling Events
11-5
ETX-5300A>config# reporting
ETX-5300A>config>reporting# alarm-source-type-attribute e1
excessive-bpv log
Event css-path-tca
ETX-5300A>config# reporting
ETX-5300A>config>reporting# alarm-source-attribute e1 1/1/1
event css-path-tca snmp-trap
ETX-5300A>config# reporting
ETX-5300A>config>reporting# mask-minimum-severity led-relay
major
Display Option
Meaning
Example
Number
active-alarms
active-alarms-details
alarm-information
alarm-input
alarm-log
11-6
Handling Events
Display Option
Meaning
Example
Number
alarm-list
[<source ID> [severity
{critical|major|minor}]]
brief-alarm-log
brief-log
event-information
event-list
log
Domain Clock
Card
FAN
1
1
1
Minor
station_clock_unlock
card_provision_failure
fan_failure
: 0
Maj
Crt
Crt
Unmasked
Unmasked
Unmasked
: 0
Handling Events
11-7
2011-12-20
20:55:23.00
2
Domain Clock
1
station_clock_unlock
Major
Unmasked
Provisioning failure
2011-12-22
01:52:05.00
3
Fan
2011-12-20
20:56:11.00
Card
1
card_provision_failure
Critical
Unmasked
failure
FAN
1
fan_failure
Critical
Unmasked
11-8
Handling Events
2011-12-18
Ethernet
02:17:00.00
main-a/0
los
Cleared
Suppression
2011-12-18
Ethernet
02:16:58.00
main-a/0
los
Major
ID
Severity
Logged
System
SYSTEM_TEMPERATURE_ORA
20002
Major
Yes
(Default)
---------------------------------------------------------------------------System
hardware_failure_fe
20012
Yes
(Default)
----------------------------------------------------------------------------System
configuration_mismatch_fe
20013
Yes
(Default)
----------------------------------------------------------------------------System
INTERFACE_MISMATCH_FE
20014
Major
Yes
(Default)
----------------------------------------------------------------------------System
NO_INTERFACE_FE
20015
Yes
(Default)
----------------------------------------------------------------------------Power Supply
POWER_DELIVERY_FAILURE
20201
Major
Yes
(Default)
----------------------------------------------------------------------------Alarm Input
Alarm_Relay_Input
20401
Major
Yes
(Default)
----------------------------------------------------------------------------Card
HARDWARE_FAILURE
40001
Major
Yes
(Default)
----------------------------------------------------------------------------Card
CARD_MISMATCH
40002
Major
Yes
(Default)
----------------------------------------------------------------------------To scroll up and down in the list, use the arrow keys.
Handling Events
11-9
Name
Severity
Last Raised
System
sw_install_end
Event
alternate_configuration_loaded
Event
2011-12-22
02:50:14.00
2011-12-22
02:51:05.00
System
Last Cleared
-----
Total Times
Since Ack
1
1
1
1
Clearing Alarms
To clear a log:
At the config>reporting# prompt, enter clear followed by log, brief-log or alllogs to clear the full log, brief log or all alarm/event logs in ETX-5300A.
The log is cleared.
Alarm List
Table 11-1 lists and explains the alarm messages generated by the ETX-5300A.
The alarm messages are listed alphabetically in order of the following:
For each alarm, Table 11-1 also specifies the alarm description, the
corresponding trap, and the alarm ID (unique number that identifies the alarm).
Alarm Name
Alarm Description
Trap Name
Alarm ID
alarm-input
alarm_relay_input
Alarm input
alarmInput
20401
card
hardware_failure
cardHwFailure
40001
card
card_mismatch
cardMismatch
40002
card
card_provision
failure
Provisioning failure
cardProvisionFailure
40003
card
card_improper
removal
cardImproperRemoval
40006
11-10
Handling Events
Source Type
Alarm Name
Alarm Description
Trap Name
Alarm ID
card
card_temperature
ora
cardTemperatureOra
40007
card
card_no_response
cardNoResponse
40008
card
card_initialization_
failure
cardInitFailure
40009
clock-domain
system_clock_
unlock
clockDomainStation
ClockUnlock
30301
clock-domain
domain_clock_ql_
low
clockDomainQlLow
30302
clock-domain
station_clock_
unlock
clockDomainStation
ClockUnlock
30303
e1t1
ais
e1t1Ais
110105
e1t1
lof
e1t1Lof
110106
e1t1
rai
e1t1Rai
110107
erp
erp_state_protected
erpStateProtected
290301
eth
sfp_no_response
sfpNoResponse
50001
eth
sfp_mismatch
SFP mismatch
sfpMismatch
50002
eth
los
ethLos
50003
eth
sfp_removed
sfpRemoved
50004
eth
sfp_temperature_
ora
sfpTemperatureOra
50005
eth
sfp_opr_ora
sfpOprOra
50006
eth
auto_negotiation_
failure
ethAutoNegotiation
Failure
50008
fan
fan_failure
Fan failure
fanFailure
20101
lag
lacp_down
lagLacpDown
250001
lag
lacp_loop_detection
lagLacpLoopDetection
250002
lag
lacp_churn
lagLacpChurn
250003
oam-cfmmep
ais
oamCfmMepAis
270201
oam-cfmmep
lck
oamCfmMepLck
270202
Handling Events
11-11
Source Type
Alarm Name
Alarm Description
Trap Name
Alarm ID
oam-cfmmep
mismatch
oamCfmMepMismatch
270203
oam-cfmmep
loc
oamCfmRmepLoc
270601
oam-cfmmep
rdi
oamCfmRmepRdi
270602
path
ais-path
pathAis
100201
path
lomf-path
pathLomf
100202
path
uneq-path
Unequipped payload
pathUneq
100203
path
tim-path
pathTim
100204
path
plm-path
pathPlm
100205
path
lop-path
pathLop
100206
path
sd-path
pathSd
100207
path
eed-path
pathEed
100208
path
rfi-path
pathRfi
100209
power-supply
power_delivery_
failure
powerDeliveryFailure
20201
power-supply
power_in_ora
powerInOra
20202
power-supply
power_in_low
powerInLow
20203
ptp-master
unavailable_tod
ptpMasterUnavailable
Tod
30601
ptp-master
unavailable_1pps
Unavailable 1PPS
ptpMasterUnavailable
1pps
30602
ptp-master
slaves_limit_reached
ptpMasterSlavesLimit
Reached
30603
ptprecovered
no_ptp_master
ptpRecoveredNoPtpM
aster
30201
ptprecovered
invalid_frequency_
accuracy
Unacceptable frequency
accuracy
ptpRecoveredInvalid
FreqAccuracy
30202
ptprecovered
invalid_time_
accuracy
ptpRecoveredInvalid
TimeAccuracy
30203
ptprecovered
disqualified_master
Master disqualification
ptpRecoveredDisquali
fiedMaster
30204
ptprecoveredmaster
sync_failure
ptpRecoveredMaster
SyncFail
30401
11-12
Handling Events
Source Type
Alarm Name
Alarm Description
Trap Name
Alarm ID
ptprecoveredmaster
announce_failure
ptpRecoveredMaster
AnnounceFail
30402
ptprecoveredmaster
delay_response_
failure
ptpRecoveredMaster
DelayRespFail
30403
pw
configuration
mismatch
Configuration mismatch
pwConfigMismatch
310001
pw
pw_oam_failure
PW OAM disconnected
pwOamFailure
310002
pw
rdi
pwRdi
310003
pw
rx_failure
pwRxFailure
310004
pw
rx_failure_fe
pwFeRxFailure
310008
pw
rdi_fe
pwFeRdi
310009
routerinterface
dhcp_client_no_
lease
routerIfDhcpClientNo
Lease
300101
sdh-sonet
sfp_no_response
sfpNoResponse
100001
sdh-sonet
sfp_mismatch
SFP mismatch
sfpMismatch
100002
sdh-sonet
lof
sdhSonetLof
100003
sdh-sonet
rfi-line
sdhSonetRfi
100004
sdh-sonet
los
sdhSonetLos
100005
sdh-sonet
sfp_removed
sfpRemoved
100006
sdh-sonet
sfp_temperature_
ora
sfpTemperatureOra
100007
sdh-sonet
sfp_opr_ora
sfpOprOra
100008
sdh-sonet
ais-line
sdhSonetAis
100009
sdh-sonet
tim
sdhSonetTim
100010
sdh-sonet
sd-line
sdhSonetSd
100011
sdh-sonet
eed-line
sdhSonetEed
100012
station-clock
ais
stationClockAis
30102
station-clock
lof
stationClockLof
30103
station-clock
los
stationClockLos
30104
Handling Events
11-13
Source Type
Alarm Name
Alarm Description
Trap Name
Alarm ID
system
device_temperature
_ora
systemDevice
TemperatureOra
20002
system
hardware_failure
Hardware failure
systemHardware
Failure
20005
system
sw_pack_corrupted
systemSwPack
Corrupted
20008
vc-vt
ais-vcvt
vcVtAis
100101
vc-vt
uneq-vcvt
Unequipped payload
vcVtUneq
100103
vc-vt
tim-vcvt
vcVtTim
100104
vc-vt
plm-vcvt
vcVtPlm
100105
vc-vt
lop-vcvt
vcVtLop
100106
vc-vt
sd-vcvt
vcVtSd
100107
vc-vt
eed-vcvt
vcVtEed
100108
vc-vt
rfi-vcvt
vcVtRfi
100109
Event List
Table 11-2 lists the event messages generated by the ETX-5300A and explains
their interpretation. The event messages are listed alphabetically in order of the
following:
For each alarm, Table 11-2 also specifies the alarm description, the
corresponding trap and the event ID (unique number that identifies the event
type). Event names are not case-sensitive.
For an alphabetical list of traps, see Table 11-3.
Event Name
Event Description
Trap Name
Event ID
card
card_reset
Card reset
cardReset
1040001
card
card_switchover
Card switchover
cardSwitchover
1040002
card
card_plugged_in
Card plugged in
cardPluggedIn
1040004
card
card_plugged_out
cardPluggedOut
1040005
clockdomain
system_source_
clock_change
clockDomainSystem
SrcClockChange
1030301
11-14
Handling Events
Source
Type
Event Name
Event Description
Trap Name
Event ID
clockdomain
station_source_
clock_change
clockDomainStation
SrcClockChange
1030302
e1t1
loopback
Loopback started
e1t1Loopback
1110104
e1t1
loopback_off
Loopback ended
e1t1LoopbackOff
1110105
e1t1
es_line_tca
e1t1EsLineTca
1110106
e1t1
cv_path_tca
e1t1CvPathTca
1110107
e1t1
es_path_tca
e1t1EsPathTca
1110108
e1t1
ses_path_tca
e1t1SesPathTca
1110109
e1t1
sefs_path_tca
e1t1SefsPathTca
1110110
e1t1
css_path_tca
e1t1CssPathTca
1110111
e1t1
uas_path_tca
e1t1UasPathTca
1110112
erp-port
erp_port_state_
change
erpPortState
Change
1291101
eth
sfp_opt_ora
sfpOptOra
1050001
eth
sfp_opt_ora_off
sfpOptOraOff
1050002
eth
sfp_lbc_ora
sfpLbcOra
1050003
eth
sfp_lbc_ora_off
sfpLbcOraOff
1050004
lag
sub_group_
switchover
lagSubGroup
Switchover
1250001
lag
lag_failure
lagFailure
1250002
oam-cfmdest-ne
delay_tca
oamCfmDestNe
DelayTca
1270401
oam-cfmdest-ne
delay_tca_off
oamCfmDestNe
DelayTcaOff
1270402
oam-cfmdest-ne
delay_var_tca
oamCfmDestNe
DelayVarTca
1270403
oam-cfmdest-ne
delay_var_tca_off
oamCfmDestNe
DelayVarTcaOff
1270404
Handling Events
11-15
Source
Type
Event Name
Event Description
Trap Name
Event ID
oam-cfmdest-ne
loss_ratio_tca
oamCfmDestNe
LossRatioTca
1270405
oam-cfmdest-ne
loss_ratio_tca_off
oamCfmDestNe
LossRatioTcaOff
1270406
oam-cfmdest-ne
loss_ratio_tca_fe
oamCfmDestNe
LossRatioTcaFe
1270407
oam-cfmdest-ne
loss_ratio_tca_fe_
off
oamCfmDestNe
LossRatioTcaFeOff
1270408
oam-cfmdest-ne
unavailable_ratio_
tca
oamCfmDestNe
UnavailRatioTca
1270409
oam-cfmdest-ne
unavailable_ratio_
tca_off
oamCfmDestNe
UnavailRatioTcaOff
1270410
oam-cfmdest-ne
unavailable_ratio_
tca_fe
oamCfmDestNeUna
vailRatioTcaFe
1270411
oam-cfmdest-ne
unavailable_ratio_
tca_fe_off
oamCfmDestNeUna
vailRatioTcaFeOff
1270412
path
es_path_tca
pathEsTca
1100201
path
ses_path_tca
pathSesTca
1100202
path
cv_path_tca
pathCvTca
1100203
path
uas_path_tca
pathUasTca
1100204
path
es_path_tca_fe
pathFeEsTca
1100205
path
ses_path_tca_fe
pathFeSesTca
1100206
path
cv_path_tca_fe
pathFeCvTca
1100207
path
uas_path_tca_fe
pathFeUasTca
1100208
ptpmaster
granted_service_
aborted
ptpMasterGranted
ServiceAborted
1030601
ptpmaster
slave_request_
denied
ptpMasterSlave
RequestDenied
1030602
ptprecovered
ptp_state_change
ptpRecoveredPtp
StateChange
1030201
11-16
Handling Events
Source
Type
Event Name
Event Description
Trap Name
Event ID
ptprecovered
severe_frequency_
condition
ptpRecovered
SevereFreq
Condition
1030202
ptprecovered
severe_time_
condition
ptpRecovered
SevereTime
Condition
1030203
ptprecovered
master_switchover
ptpRecovered
MasterSwitchover
1030204
ptprecovered
-master
unicast_
negotiation_failure
ptpRecovered
MasterUnicastNeg
Fail
1030401
pw
pw_switchover
PW switchover
pwSwitchover
1310001
pw
jitter_buffer_
overflow
pwJitterBuffer
Overflow
1310002
pw
jitter_buffer_
underflow
pwJitterBuffer
Underflow
1310003
sdh-sonet
sfp_opt_ora
sfpOptOra
1100001
sdh-sonet
sfp_opt_ora_off
sfpOptOraOff
1100017
sdh-sonet
sfp_lbc_ora
sfpLbcOra
1100002
sdh-sonet
sfp_lbc_ora_off
sfpLbcOraOff
1100018
sdh-sonet
es_section_tca
sdhSonetEsSecTca
1100003
sdh-sonet
ses_section_tca
sdhSonetSesSecTca
1100004
sdh-sonet
sefs_section_tca
sdhSonetSefsSecTc
a
1100005
sdh-sonet
cv_section_tca
sdhSonetCvSecTca
1100006
sdh-sonet
es_line_tca
sdhSonetEsLineTca
1100007
sdh-sonet
ses_line_tca
sdhSonetSesLineTc
a
1100008
sdh-sonet
cv_line_tca
sdhSonetCvLineTca
1100009
sdh-sonet
uas_line_tca
sdhSonetUasLineTc
a
1100010
Handling Events
11-17
Source
Type
Event Name
Event Description
Trap Name
Event ID
sdh-sonet
es_line_tca_fe
sdhSonetFeEsLineT
ca
1100011
sdh-sonet
ses_line_tca_fe
sdhSonetFeSesLine
Tca
1100012
sdh-sonet
cv_line_tca_fe
sdhSonetFeCvLine
Tca
1100013
sdh-sonet
uas_line_tca_fe
sdhSonetFeUasLine
Tca
1100014
sdh-sonet
port_switchover
Port switchover
sdhSonetPort
Switchover
1100015
sdh-sonet
loopback
Loopback started
sdhSonetLoopback
1100019
sdh-sonet
loopback_off
Loopback ended
sdhSonetLoopback
Off
1100020
system
sw_install_start
systemSoftware
InstallStart
1020001
system
sw_install_end
systemSoftware
InstallEnd
1020002
system
download_end
file_name download
systemDownload
End
1020003
system
user_reset
systemUserReset
1020004
system
alternate_
configuration_
loaded
systemAlternate
ConfigLoaded
1020005
system
configuration_
migration
System
Configuration
Migration
1020006
system
configuration_
sanity
System
ConfigurationSanity
1020007
system
trap_hard_sync_
start
systemTrapHard
SyncStart
1020008
system
trap_hard_sync_
end
systemTrapHard
SyncEnd
1020009
system
configuration_
change_mask
System
Configuration
ChangeMask
system
configuration_
change_unmask
System
Configuration
ChangeUnmask
11-18
Handling Events
Source
Type
Event Name
Event Description
Trap Name
Event ID
system
backup_
configuration_
loaded
systemBackup
Configuration
Loaded
1020017
system
device_startup
Device startup
systemDevice
Startup
1020018
system
active_software_
changed
systemActive
SoftwareChanged
1020029
system
running_config_
saved
systemRunning
ConfigSaved
1020030
system
successful_login
systemSuccessful
Login
1020022
system
failed_login
systemFailedLogin
1020023
system
logout
systemLogout
1020024
system
sw_unconfirmed
systemSw
Unconfirmed
system
startup_config_
unconfirmed
systemStartup
ConfigUnconfirmed
1020028
vc-vt
es_vcvt_tca
vcVtEsTca
1100101
vc-vt
ses_vcvt_tca
vcVtSesTca
1100102
vc-vt
cv_vcvt_tca
vcVtCvTca
1100103
vc-vt
uas_vcvt_tca
vcVtUasTca
1100104
vc-vt
es_vcvt_tca_fe
vcVtFeEsTca
1100105
vc-vt
ses_vcvt_tca_fe
vcVtFeSesTca
1100106
vc-vt
cv_vcvt_tca_fe
vcVtFeCvTca
1100107
vc-vt
uas_vcvt_tca_fe
vcVtFeUasTca
1100108
Trap List
The traps are listed in the table below.
Handling Events
11-19
Source Type
Trap
Description
Notification OID
Alarm
alarm-input
alarmInput
alarm_input
1.3.6.1.4.1.164.6.5.0.1
Alarm
card
cardHwFailure
card_hardware_failure
1.3.6.1.4.1.164.3.3.2.1.0.1
Alarm
card
cardMismatch
card_mismatch
1.3.6.1.4.1.164.3.3.2.1.0.2
Alarm
card
cardProvisionFailure
card_provision_failure
1.3.6.1.4.1.164.3.3.2.1.0.3
Alarm
card
cardImproperRemoval
card_improper_removal
1.3.6.1.4.1.164.3.3.2.1.0.6
Alarm
card
cardTemperatureOra
card_temperature_ora
1.3.6.1.4.1.164.3.3.2.1.0.7
Alarm
card
cardNoResponse
card_no_response
1.3.6.1.4.1.164.3.3.2.1.0.8
Alarm
card
cardInitFailure
card_initialization_failure
1.3.6.1.4.1.164.3.3.2.1.0.9
Alarm
clock-domain
clockDomainStationClock
Unlock
station_clock_unlock
1.3.6.1.4.1.164.6.2.52.0.8
Alarm
clock-domain
clockDomainSystemClock
Unlock
system_clock_unlock
1.3.6.1.4.1.164.6.2.52.0.1
Alarm
clock-domain
clockDomainStationClock
Unlock
station_clock_unlock
1.3.6.1.4.1.164.6.2.52.0.8
Alarm
clock-domain
clockDomainQlLow
domain_clock_ql_low
1.3.6.1.4.1.164.6.2.52.0.2
Alarm
e1t1
e1t1Ais
ais
1.3.6.1.4.1.164.3.1.6.4.0.25
Alarm
e1t1
e1t1Lof
lof
1.3.6.1.4.1.164.3.1.6.4.0.26
Alarm
e1t1
e1t1Rai
rai
1.3.6.1.4.1.164.3.1.6.4.0.27
Alarm
erp
erpStateProtected
erp_state_protected
1.3.6.1.4.1.164.3.1.6.1.0.4
Alarm
eth
sdh-sonet
sfpNoResponse
sfp_no_response
1.3.6.1.4.1.164.40.3.4.0.1
Alarm
eth
sdh-sonet
sfpMismatch
sfp_mismatch
1.3.6.1.4.1.164.40.3.4.0.2
Alarm
eth
ethLos
los
1.3.6.1.4.1.164.3.1.6.1.0.1
Alarm
eth
sdh-sonet
sfpRemoved
sfp_removed
1.3.6.1.4.1.164.40.3.4.0.3
Alarm
eth
sdh-sonet
sfpTemperatureOra
sfp_temperature_ora
1.3.6.1.4.1.164.40.3.4.0.4
Alarm
eth
sdh-sonet
sfpOprOra
sfp_opr_ora
1.3.6.1.4.1.164.40.3.4.0.5
Alarm
eth
ethAutoNegotiationFailure
auto_negotiation_failure
1.3.6.1.4.1.164.3.1.6.1.0.6
Alarm
fan
fanFailure
fan_failure
1.3.6.1.4.1.164.6.1.0.64
Alarm
lag
lagLacpDown
lacp_down
1.3.6.1.4.1.164.6.2.54.0.1
Alarm
lag
lagLacpLoopDetection
lacp_loop_detection
1.3.6.1.4.1.164.6.2.54.0.2
11-20
Handling Events
Associated to
Source Type
Trap
Description
Notification OID
Alarm
lag
lagLacpChurn
lacp_churn
1.3.6.1.4.1.164.6.2.54.0.3
Alarm
oam-cfm-mep
oamCfmMepAis
ais
1.3.6.1.4.1.164.3.1.6.1.3.0.4
Alarm
oam-cfm-mep
oamCfmMepLck
lck
1.3.6.1.4.1.164.3.1.6.1.3.0.5
Alarm
oam-cfm-mep
oamCfmMepMismatch
mismatch
1.3.6.1.4.1.164.3.1.6.1.3.0.6
Alarm
oam-cfm-mep
oamCfmRmepLoc
loc
1.3.6.1.4.1.164.3.1.6.1.3.0.7
Alarm
oam-cfm-mep
oamCfmRmepRdi
rdi
1.3.6.1.4.1.164.3.1.6.1.3.0.8
Alarm
path
pathAis
ais-path
1.3.6.1.4.1.164.3.1.6.2.0.50
Alarm
path
pathLomf
lomf-path
1.3.6.1.4.1.164.3.1.6.2.0.51
Alarm
path
pathUneq
uneq-path
1.3.6.1.4.1.164.3.1.6.2.0.52
Alarm
path
pathTim
tim-path
1.3.6.1.4.1.164.3.1.6.2.0.53
Alarm
path
pathPlm
plm-path
1.3.6.1.4.1.164.3.1.6.2.0.54
Alarm
path
pathLop
lop-path
1.3.6.1.4.1.164.3.1.6.2.0.55
Alarm
path
pathSd
sd-path
1.3.6.1.4.1.164.3.1.6.2.0.56
Alarm
path
pathEed
eed-path
1.3.6.1.4.1.164.3.1.6.2.0.57
Alarm
path
pathRfi
rfi-path
1.3.6.1.4.1.164.3.1.6.2.0.58
Alarm
power-supply
powerDeliveryFailure
power_delivery_failure
1.3.6.1.4.1.164.6.1.0.73
Alarm
power-supply
powerInOra
power_in_ora
1.3.6.1.4.1.164.6.1.0.74
Alarm
power-supply
powerInLow
power_in_low
1.3.6.1.4.1.164.6.1.0.75
Alarm
ptp-master
ptpMasterUnavailableTod
unavailable_tod
1.3.6.1.4.1.164.6.2.52.0.24
Alarm
ptp-master
ptpMasterUnavailable1pps
unavailable_1pps
1.3.6.1.4.1.164.6.2.52.0.25
Alarm
ptp-master
ptpMasterSlavesLimitReached
slaves_limit_reached
1.3.6.1.4.1.164.6.2.52.0.26
Alarm
ptp-recovered
ptpRecoveredNoPtpMaster
no_ptp_master
1.3.6.1.4.1.164.6.2.52.0.10
Alarm
ptp-recovered
ptpRecoveredInvalidFreq
Accuracy
invalid_frequency_accuracy
1.3.6.1.4.1.164.6.2.52.0.11
Alarm
ptp-recovered
ptpRecoveredInvalidTime
Accuracy
invalid_time_accuracy
1.3.6.1.4.1.164.6.2.52.0.12
Alarm
ptp-recovered
ptpRecoveredDisqualified
Master
disqualified_master
1.3.6.1.4.1.164.6.2.52.0.13
Alarm
ptprecoveredmaster
ptpRecoveredMasterSyncFail
sync_failure
1.3.6.1.4.1.164.6.2.52.0.14
Alarm
ptprecoveredmaster
ptpRecoveredMasterAnnounce
Fail
announce_failure
1.3.6.1.4.1.164.6.2.52.0.15
Handling Events
11-21
Associated to
Source Type
Trap
Description
Notification OID
Alarm
ptprecoveredmaster
ptpRecoveredMasterDelay
RespFail
delay_response_failure
1.3.6.1.4.1.164.6.2.52.0.16
Alarm
pw
pwConfigMismatch
configuration_mismatch
1.3.6.1.4.1.164.14.0.1
Alarm
pw
pwOamFailure
pw_oam_failure
1.3.6.1.4.1.164.14.0.2
Alarm
pw
pwRdi
rdi
1.3.6.1.4.1.164.14.0.3
Alarm
pw
pwRxFailure
rx_failure
1.3.6.1.4.1.164.14.0.4
Alarm
pw
pwFeRxFailure
rx_failure_fe
1.3.6.1.4.1.164.14.0.6
Alarm
pw
pwFeRdi
rdi_fe
1.3.6.1.4.1.164.14.0.7
Alarm
routerinterface
routerIfDhcpClientNoLease
dhcp_client_no_lease
1.3.6.1.4.1.164.11.7.2.2.1.0.1
Alarm
sdh-sonet
sdhSonetLof
lof
1.3.6.1.4.1.164.3.1.6.2.0.22
Alarm
sdh-sonet
sdhSonetRfi
rfi-line
1.3.6.1.4.1.164.3.1.6.2.0.23
Alarm
sdh-sonet
sdhSonetLos
los
1.3.6.1.4.1.164.3.1.6.2.0.24
Alarm
sdh-sonet
sdhSonetAis
ais-line
1.3.6.1.4.1.164.3.1.6.2.0.25
Alarm
sdh-sonet
sdhSonetTim
tim
1.3.6.1.4.1.164.3.1.6.2.0.26
Alarm
sdh-sonet
sdhSonetSd
sd-line
1.3.6.1.4.1.164.3.1.6.2.0.27
Alarm
sdh-sonet
sdhSonetEed
eed-line
1.3.6.1.4.1.164.3.1.6.2.0.28
Alarm
station-clock
stationClockAis
ais
1.3.6.1.4.1.164.6.2.52.0.5
Alarm
station-clock
stationClockLof
lof
1.3.6.1.4.1.164.6.2.52.0.6
Alarm
station-clock
stationClockLos
los
1.3.6.1.4.1.164.6.2.52.0.7
Alarm
system
systemDeviceTemperatureOra
device_temperature_ora
1.3.6.1.4.1.164.6.1.0.41
Alarm
system
systemSwPackCorrupted
sw_pack_corrupted
1.3.6.1.4.1.164.6.1.0.61
Alarm
system
systemFeHardwareFailure
hardware_failure_fe
1.3.6.1.4.1.164.6.1.0.66
Alarm
vc-vt
vcVtAis
ais-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.67
Alarm
vc-vt
vcVtUneq
uneq-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.69
Alarm
vc-vt
vcVtTim
tim-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.70
Alarm
vc-vt
vcVtPlm
plm-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.71
Alarm
vc-vt
vcVtLop
lop-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.72
Alarm
vc-vt
vcVtSd
sd-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.73
Alarm
vc-vt
vcVtEed
eed-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.74
Alarm
vc-vt
vcVtRfi
rfi-vcvt
1.3.6.1.4.1.164.3.1.6.2.0.75
Event
card
cardReset
card_reset
1.3.6.1.4.1.164.3.3.2.1.0.10
Event
card
cardSwitchover
card_switchover
1.3.6.1.4.1.164.3.3.2.1.0.13
11-22
Handling Events
Associated to
Source Type
Trap
Description
Notification OID
Event
card
cardPluggedIn
card_plugged_in
1.3.6.1.4.1.164.3.3.2.1.0.11
Event
card
cardPluggedOut
card_plugged_out
1.3.6.1.4.1.164.3.3.2.1.0.12
Event
clock-domain
clockDomainSystemSrcClock
Change
system_source_clock_change
1.3.6.1.4.1.164.6.2.52.0.3
Event
clock-domain
clockDomainStationSrcClock
Change
station_source_clock_change
1.3.6.1.4.1.164.6.2.52.0.9
Event
e1t1
e1t1Loopback
loopback
1.3.6.1.4.1.164.3.1.6.4.0.36
Event
e1t1
e1t1LoopbackOff
loopback_off
1.3.6.1.4.1.164.3.1.6.4.0.37
Event
e1t1
e1t1EsLineTca
es_line_tca
1.3.6.1.4.1.164.3.1.6.4.0.38
Event
e1t1
e1t1CvPathTca
cv_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.39
Event
e1t1
e1t1EsPathTca
es_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.40
Event
e1t1
e1t1SesPathTca
ses_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.41
Event
e1t1
e1t1SefsPathTca
sefs_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.42
Event
e1t1
e1t1CssPathTca
css_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.43
Event
e1t1
e1t1UasPathTca
uas_path_tca
1.3.6.1.4.1.164.3.1.6.4.0.44
Event
erp-port
erpPortStateChange
erp_port_state_change
1.3.6.1.4.1.164.3.1.6.1.0.5
Event
eth
sdh-sonet
sfpOptOra
sfp_opt_ora
1.3.6.1.4.1.164.40.3.4.0.6
Event
eth
sdh-sonet
sfpOptOraOff
sfp_opt_ora_off
1.3.6.1.4.1.164.40.3.4.0.7
Event
eth
sdh-sonet
sfpLbcOra
sfp_lbc_ora
1.3.6.1.4.1.164.40.3.4.0.8
Event
eth
sdh-sonet
sfpLbcOraOff
sfp_lbc_ora_off
1.3.6.1.4.1.164.40.3.4.0.9
Event
lag
lagSubGroupSwitchover
sub_group_switchover
1.3.6.1.4.1.164.6.2.54.0.4
Event
lag
lagFailure
lag_failure
1.3.6.1.4.1.164.6.2.54.0.5
Event
oam-cfmdest-ne
oamCfmDestNeDelayTca
delay_tca
1.3.6.1.4.1.164.3.1.6.1.3.0.9
Event
oam-cfmdest-ne
oamCfmDestNeDelayTcaOff
delay_tca_off
1.3.6.1.4.1.164.3.1.6.1.3.0.10
Event
oam-cfmdest-ne
oamCfmDestNeDelayVarTca
delay_var_tca
1.3.6.1.4.1.164.3.1.6.1.3.0.11
Event
oam-cfmdest-ne
oamCfmDestNeDelayVarTca
Off
delay_var_tca_off
1.3.6.1.4.1.164.3.1.6.1.3.0.12
Event
oam-cfmdest-ne
oamCfmDestNeLossRatioTca
loss_ratio_tca
1.3.6.1.4.1.164.3.1.6.1.3.0.13
Handling Events
11-23
Associated to
Source Type
Trap
Description
Notification OID
Event
oam-cfmdest-ne
oamCfmDestNeLossRatioTca
Off
loss_ratio_tca_off
1.3.6.1.4.1.164.3.1.6.1.3.0.14
Event
oam-cfmdest-ne
oamCfmDestNeLossRatioTca
Fe
loss_ratio_tca_fe
1.3.6.1.4.1.164.3.1.6.1.3.0.15
Event
oam-cfmdest-ne
oamCfmDestNeLossRatioTca
FeOff
loss_ratio_tca_fe_off
1.3.6.1.4.1.164.3.1.6.1.3.0.16
Event
oam-cfmdest-ne
oamCfmDestNeUnavailRatio
Tca
unavailable_ratio_tca
1.3.6.1.4.1.164.3.1.6.1.3.0.17
Event
oam-cfmdest-ne
oamCfmDestNeUnavailRatio
TcaOff
unavailable_ratio_tca_off
1.3.6.1.4.1.164.3.1.6.1.3.0.18
Event
oam-cfmdest-ne
oamCfmDestNeUnavailRatio
TcaFe
unavailable_ratio_tca_fe
1.3.6.1.4.1.164.3.1.6.1.3.0.19
Event
oam-cfmdest-ne
oamCfmDestNeUnavailRatio
TcaFeOff
unavailable_ratio_tca_fe_off
1.3.6.1.4.1.164.3.1.6.1.3.0.20
Event
path
pathEsTca
es_path_tca
1.3.6.1.4.1.164.3.1.6.2.0.59
Event
path
pathSesTca
ses_path_tca
1.3.6.1.4.1.164.3.1.6.2.0.60
Event
path
pathCvTca
cv_path_tca
1.3.6.1.4.1.164.3.1.6.2.0.61
Event
path
pathUasTca
uas_path_tca
1.3.6.1.4.1.164.3.1.6.2.0.62
Event
path
pathFeEsTca
es_path_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.63
Event
path
pathFeSesTca
ses_path_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.64
Event
path
pathFeCvTca
cv_path_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.65
Event
path
pathFeUasTca
uas_path_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.66
Event
ptp-master
ptpMasterGrantedService
Aborted
granted_service_aborted
1.3.6.1.4.1.164.6.2.52.0.27
Event
ptp-master
ptpMasterSlaveRequestDenied
slave_request_denied
1.3.6.1.4.1.164.6.2.52.0.28
Event
ptp-recovered
ptpRecoveredPtpStateChange
ptp_state_change
1.3.6.1.4.1.164.6.2.52.0.17
Event
ptp-recovered
ptpRecoveredSevereFreq
Condition
severe_frequency_condition
1.3.6.1.4.1.164.6.2.52.0.18
Event
ptp-recovered
ptpRecoveredSevereTime
Condition
severe_time_condition
1.3.6.1.4.1.164.6.2.52.0.19
Event
ptp-recovered
ptpRecoveredMaster
Switchover
master_switchover
1.3.6.1.4.1.164.6.2.52.0.20
Event
ptprecoveredmaster
ptpRecoveredMasterUnicast
NegFail
unicast_negotiation_failure
1.3.6.1.4.1.164.6.2.52.0.21
Event
pw
pwSwitchover
pw_switchover
1.3.6.1.4.1.164.14.0.6
Event
pw
pwJitterBufferOverflow
jitter_buffer_overflow
1.3.6.1.4.1.164.14.0.9
11-24
Handling Events
Associated to
Source Type
Trap
Description
Notification OID
Event
pw
pwJitterBufferUnderflow
jitter_buffer_underflow
1.3.6.1.4.1.164.14.0.10
Event
sdh-sonet
sdhSonetEsSecTca
es_section_tca
1.3.6.1.4.1.164.3.1.6.2.0.30
Event
sdh-sonet
sdhSonetSesSecTca
ses_section_tca
1.3.6.1.4.1.164.3.1.6.2.0.31
Event
sdh-sonet
sdhSonetSefsSecTca
sefs_section_tca
1.3.6.1.4.1.164.3.1.6.2.0.32
Event
sdh-sonet
sdhSonetCvSecTca
cv_section_tca
1.3.6.1.4.1.164.3.1.6.2.0.33
Event
sdh-sonet
sdhSonetEsLineTca
es_line_tca
1.3.6.1.4.1.164.3.1.6.2.0.34
Event
sdh-sonet
sdhSonetSesLineTca
ses_line_tca
1.3.6.1.4.1.164.3.1.6.2.0.35
Event
sdh-sonet
sdhSonetCvLineTca
cv_line_tca
1.3.6.1.4.1.164.3.1.6.2.0.36
Event
sdh-sonet
sdhSonetUasLineTca
uas_line_tca
1.3.6.1.4.1.164.3.1.6.2.0.37
Event
sdh-sonet
sdhSonetFeEsLineTca
es_line_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.38
Event
sdh-sonet
sdhSonetFeSesLineTca
ses_line_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.39
Event
sdh-sonet
sdhSonetFeCvLineTca
cv_line_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.40
Event
sdh-sonet
sdhSonetFeUasLineTca
uas_line_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.41
Event
sdh-sonet
sdhSonetPortSwitchover
port_switchover
1.3.6.1.4.1.164.3.1.6.2.0.88
Event
sdh-sonet
sdhSonetLoopback
loopback
1.3.6.1.4.1.164.3.1.6.2.0.89
Event
sdh-sonet
sdhSonetLoopbackOff
loopback_off
1.3.6.1.4.1.164.3.1.6.2.0.90
Event
system
systemSoftwareInstallStart
sw_install_start
1.3.6.1.4.1.164.6.1.0.42
Event
system
systemSoftwareInstallEnd
sw_install_end
1.3.6.1.4.1.164.6.1.0.43
Event
system
systemDownloadEnd
download_end
1.3.6.1.4.1.164.6.2.12.18.0.2
Event
system
systemUserReset
user_reset
1.3.6.1.4.1.164.6.1.0.82
Event
system
systemAlternateConfigLoaded
alternate_configuration_
loaded
1.3.6.1.4.1.164.6.1.0.45
Event
system
systemConfigurationMigration
configuration_migration
1.3.6.1.4.1.164.6.1.0.46
Event
system
systemConfigurationSanity
configuration_sanity
1.3.6.1.4.1.164.6.1.0.47
Event
system
systemTrapHardSyncStart
trap_hard_sync_start
1.3.6.1.4.1.164.6.1.0.77
Event
system
systemTrapHardSyncEnd
trap_hard_sync_end
1.3.6.1.4.1.164.6.1.0.78
Event
system
systemConfigurationChange
Mask
configuration_change_mask
Event
system
systemConfigurationChange
Unmask
configuration_change_
unmask
Event
system
systemBackupConfiguration
Loaded
backup_configuration_loaded
1.3.6.1.4.1.164.6.1.0.54
Event
system
systemDeviceStartup
device_startup
1.3.6.1.4.1.164.6.1.0.55
Event
system
systemActiveSoftware
Changed
active_software_changed
1.3.6.1.4.1.164.6.1.0.83
Handling Events
11-25
Associated to
Source Type
Trap
Description
Notification OID
Event
system
systemRunningConfigSaved
running_config_saved
1.3.6.1.4.1.164.6.1.0.84
Event
system
systemSuccessfulLogin
successful_login
1.3.6.1.4.1.164.6.1.0.70
Event
system
systemFailedLogin
failed_login
1.3.6.1.4.1.164.6.1.0.71
Event
system
systemLogout
logout
1.3.6.1.4.1.164.6.1.0.72
Event
system
systemSwUnconfirmed
sw_unconfirmed
Event
system
systemStartupConfig
Unconfirmed
startup_config_unconfirmed
1.3.6.1.4.1.164.6.1.0.63
Event
vc-vt
vcVtEsTca
es_vcvt_tca
1.3.6.1.4.1.164.3.1.6.2.0.76
Event
vc-vt
vcVtSesTca
ses_vcvt_tca
1.3.6.1.4.1.164.3.1.6.2.0.77
Event
vc-vt
vcVtCvTca
cv_vcvt_tca
1.3.6.1.4.1.164.3.1.6.2.0.78
Event
vc-vt
vcVtUasTca
uas_vcvt_tca
1.3.6.1.4.1.164.3.1.6.2.0.79
Event
vc-vt
vcVtFeEsTca
es_vcvt_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.80
Event
vc-vt
vcVtFeSesTca
ses_vcvt_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.81
Event
vc-vt
vcVtFeCvTca
cv_vcvt_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.82
Event
vc-vt
vcVtFeUasTca
uas_vcvt_tca_fe
1.3.6.1.4.1.164.3.1.6.2.0.83
To ping an IP host:
1. At any level, start pinging the desired host specifying its IP address and,
optionally, the number of packets to send, and payload size:
ping <1.1.1.1255.255.255.255> [number-of-packets <110000>] [payloadsize <321450 bytes>]
2. To stop the ping test, enter no ping.
11-26
To trace a route:
At any level, start the trace route and specify the IP address of the host to
which you intend to trace route:
trace-route <1.1.1.1255.255.255.255>
Technical Support
11-27
11-28
Technical Support
Chapter 12
Software Upgrade
This chapter explains how to upgrade the ETX-5300A software.
Software upgrades may be required to fix product limitations, to enable new
features, or to make the unit compatible with other devices that are already
running the new software version. New software releases are distributed as *.bin
files, to be downloaded to ETX-5300A.
ETX-5300A can store four software versions, one in each of the four partitions of
its flash memory, which also contains a boot program. The software is stored in
compressed format.
12.1
Impact
Note
If your system has two main cards, you must upgrade only the active card. The
active card transfers new application software to the standby card to ensure
seamless redundancy after the upgrade. Verify that both main cards are
administratively enabled (no shutdown).
12.3 Prerequisites
This section details the software file names and outlines system requirements
needed for the upgrade procedure.
Prerequisites
12-1
Software Files
New version releases are distributed as software files named *.bin, for example
sw-pack.bin. The files can be obtained from the local RAD business partner from
whom the device was purchased.
The software upgrade utility includes four partitions called sw-pack-1, sw-pack-2,
sw-pack-3, sw-pack-4 for downloading and storing the software versions. To
activate the specified software version, one of these partitions is set to active.
Each software pack consists of a set of image files for each module with
appropriate headers. The software pack can be ordered for the entire chassis
only.
The version 1.0 software pack consists of three internal image files for the
E5-MC-4, E5-GBE-20/E5-1-GBE-2 and E5-cTDM-4 cards. The software pack is
installed as a whole entity; internal software files cannot be changed or installed
separately.
The software package version, as well as version of internal image files can be
viewed using the show sw-pack command entered at the file# prompt.
System Requirements
Before starting the upgrade using SFTP or FTP, verify that you have the following:
12.4
The recommended method for downloading software to the flash disk is to use
the file copy command of the CLI environment. This can be done remotely and
does not require booting. Only CL modules need to be reset after this procedure.
The upgrade consists of two stages:
The software pack is downloaded from the flash disk to the CL. This is done,
using the admin>software>install command.
Using SFTP
Network administrators use the SFTP protocol to securely distribute new
software releases to all the managed ETX-5300A units in the network from a
central location. A central SFTP server application is installed on a PC on the
network.
12-2
ETX-5300
Note
Pinging the PC
Check the integrity of the communication link between ETX-5300A and the PC by
pinging the ETX-5300A from the PC.
12-3
ETX-5300A>file# sftp://<admin>:<1234>@10.10.10.10/sw-pack.bin
sw-pack-4
You are prompted to confirm the request:
Are you sure? [yes/no] _ y
The application file begins downloading.
Note
Issuing the dir command (file# prompt) while installing a new software release
causes the CLI to stop responding during the installation process. The CLI
connection is restored after the SW installation is complete.
To check the flash memory contents:
ETX-5300A>file# dir
Codes
C - Configuration S - Software
LO Log
Name
Type Size(Bytes) Creation Date Status
sw-pack-1
S
6306207
21-12-2010
valid
13:44:58
sw-pack-2
S
6305847
21-2-2011
valid
7:48:0
sw-pack-3
S
6278526
21-2-2011
valid
9:57:47
sw-pack-4
S
6289552
6-1-2011
valid
10:23:13
startup-config
C
95872
13-3-2011
valid
14:7:35
user-default-config C
95872
13-3-2011
valid
14:6:51
factory-default-conf C
796
1-1-1970
Read Only
0:0:9
running-config
C
0
1-1-1970
Read Only
0:0:9
Total Bytes : 101367808
Free Bytes : 63442944
At the file# prompt, enter the show copy command, for example:
At the file# prompt, enter the show sw-pack command, for example:
Name
: 77140261
Version
H/W Ver
Size
(Bytes)
--------------------------------------------------------------main
main.bin
1.0.0(1.91) 1.1
31728762
eth1g
eth1g.bin
1.0.0(1.65) 1.1
10698214
stm1ch
stm1ch.bin
1.0.0(1.53) 1.1
18829047
eth2X10g eth2X10g.bin
1.0.0(1.65) 1.1
15883998
Installing the New Software Release File from the Flash Disk
Once a file is saved on the ETX-5300A flash disk, it must be copied to the main
card to replace the current software. The sw-pack file includes the new software
version for all the main and I/O cards, according to your purchase order.
Simultaneously download the new software release file to all the main and I/O
cards installed in the chassis.
During the installation process, ETX-5300A stores active software and
startup-config in the restore-point-config file. As long as the restore point
remains valid, you can return the device to the restore point (the application
software and startup-config the device ran before the last software installation).
When ETX-5300A includes redundant main cards, the software installation
process is slightly different, resulting in the main card flip.
Note
12-5
deleting
deleting
deleting
deleting
file
file
file
file
/tffs0/Sw-Pack/Active/main.bin
/tffs0/Sw-Pack/Active/eth1g.bin
/tffs0/Sw-Pack/Active/eth2X10g.bin
/tffs0/Sw-Pack/Active/stm1ch.bin
When the secondary main card is online, the primary card resets
itself.
The secondary main card becomes primary.
The former primary card starts up with the new software and
becomes secondary.
Note
For ETX-5300A with redundant main cards, you can confirm the software
application files only after the main card flip.
To enable software application confirmation:
Task
Command
Comments
Enabling or disabling
confiramation of application
software file after reboot
Default time-to-confirm
5 min.
12-6
no software-confirm-required
to disable application software
confirmation
In Progress New software is being installed, reboot has not been performed
yet
Main Card Reset Failed Installation failed due to failure of the secondary
main card to reset correctly
Ended with Error Unknown error has occurred during software installation
Software Unconfirmed:
12-7
Ready The card is installed and ready to accept the software package
In Progress The card has been reset and software installation is in progress
Manual Wait Software installation has started, but the card has not been
reset yet
The software pack is downloaded from the flash disk to the CL. This is done,
using the set-active command.
Caution The Boot menu procedures are recommended for use only by authorized
personnel, because this menu provides many additional options that are intended
for use only by technical support personnel.
You can upgrade via the Boot menu using the FTP. This is usually performed by
downloading from a remote location that provides an IP communication path to
an Ethernet port of ETX-5300A.
Note
All the screens shown in this section are for illustration purposes only. Your
ETX-5300A may display different software versions and port profiles.
The preparations for using the FTP protocol via the Boot menu are similar to the
preparations for downloading software using the SFTP protocol via the CLI. The
main difference is that you need to define the IP communication parameters
associated with the corresponding Ethernet port -- IP addresses and the
associated subnet mask, and a default gateway IP address.
12-8
12-9
[boot]: p
file name
(fn) : vxworks
device IP
(ip) : 10.10.10.88
device mask
(dm) : 255.255.255.0
server IP
(sip) : 10.10.10.10
gateway IP
(g) : 10.10.10.10
user
(u) : vxworks
ftp password
(pw) : *******
device name
(dn) : ETX-5300A
quick autoboot
(q) : yes
protocol
(p) : ftp
baud rate
(b) : 9600
Command
Description
file name
fn
device ip
ip
device mask
dm
server IP
sip
gateway ip
vx
Note
device name
dn
ETX-5300A
quick autoboot
protocol
baud rate
12-10
^D = quit
file name
(fn) : vxworks sw-pack.bin
device IP
(ip) : 10.10.10.88
device mask
(dm) : 255.255.255.0
server IP
(sip) : 10.10.10.10
gateway IP
(g) : 10.10.10.10
user
(u) : vxworks
ftp password
(pw) (blank = use rsh): *******
device name
(dn) : ETX-5300A
quick autoboot [y/n] : y
protocol [tftp/ftp] : ftp
baud rate [9600/19200/115200]: 9600
10. To complete the upgrade and log on again, follow the onscreen instructions.
To download software file(s) from the Boot menu to ETX-5300A via FTP:
1. Verify that the *.bin file is stored on the PC with the FTP server application.
2. Activate the FTP server application.
Note
When working with FTP server, the user name and password in Boot parameters
must be the same as defined in FTP server.
3. Turn on ETX-5300A and enter the Boot menu. Set FTP protocol.
4. From the Boot menu, type download <index 1..4> [<FileName>] command to
start downloading the software pack file from the PC to the corresponding
partition of the ETX-5300A flash disk.
Note
[<FileName>] is used if you did not specify the filename in the Boot menu
earlier.
For example: Download the file to sw-pack-2
[boot]: download 2
The file is being copied to sw-pack-2 partition:
File transferring - 7580KB
226 Transfer finished successfully.
Please wait, old file is being erased and written with new one.
File writing to flash: - 7580KB
File downloaded successfully to :2
[boot]:
5. Using dir command, check which partition is currently active. In this example it
is sw-pack-1.
12-11
[boot]: dir
SIZE
FILE-NAME
796
factory-default-config
6296759
sw-pack-1
6305902
sw-pack-2
6278526
sw-pack-3
6289552
sw-pack-4
Active SW-pack is: 2
Total Bytes : 101367808
Free Bytes
: 69701632
6. Use set-active command to activate the partition to which the file has been
downloaded (in this example: sw-pack-2).
[boot]: set-active 2
set-active may take few minutes...
deleting file /tffs0/Sw-Pack/Active/main.bin
deleting file /tffs0/Sw-Pack/Active/mainHdr.bin
SW set active 2 completed successfully.
The new software release is now stored in partition 2 and will be
activated after reset.
7. Perform one of the following:
Type @ or run.
The following message is displayed and the new software release is
activated:
[boot]: run
External file header passed validation!
Loading/un-compressing main.bin...
Starting the APPLICATION off address 0x10000...
Press <Ctrl + X> to perform a cold (hard) reboot with turning power off
and then on.
Type reset to perform a warm (soft) reboot without turning off power.
The following message is displayed:
12-12
Note
The new parameters take effect only after the reset is completed.
12.6
To verify that the upgrade was successful, log on to ETX-5300A to view the
Inventory summary.
At the config# prompt, enter show inventory-summary and verify the active
software version in the SW Ver column.
12-13
SW Ver
FW Ver
----------------------------------------------------------------------------1001 Chassis
AC-chassi
N/A
1.0.0(1.39)
N/A
2001
Backplane
Backplane
0.0/A
N/A
N/A
3001
Container
N/A
N/A
N/A
3002
Container
N/A
N/A
N/A
3003
Container
N/A
N/A
N/A
3004
Container
N/A
N/A
N/A
3005
Container
main-a
N/A
N/A
N/A
3006
Container
main-b
N/A
N/A
N/A
3007
Container
Slot 5 Port 1
N/A
N/A
N/A
3008
Container
Slot 5 Port 2
N/A
N/A
N/A
3009
Container
Slot 5 Port 3
N/A
N/A
N/A
3010
Container
Slot 5 Port 4
N/A
N/A
N/A
3011
Container
Slot 6 Port 1
N/A
N/A
N/A
3012
Container
Slot 6 Port 2
N/A
N/A
N/A
3013
Container
Slot 6 Port 3
N/A
N/A
N/A
3014
Container
Slot 6 Port 4
N/A
N/A
N/A
3015
Container
Slot 1 Port 1
N/A
N/A
N/A
3016
Container
Slot 1 Port 2
N/A
N/A
N/A
3017
Container
Slot 1 Port 3
N/A
N/A
N/A
3018
Container
Slot 1 Port 4
N/A
N/A
N/A
3019
Container
Slot 1 Port 5
N/A
N/A
N/A
3020
Container
Slot 1 Port 6
N/A
N/A
N/A
3021
Container
Slot 1 Port 7
N/A
N/A
N/A
3022
Container
Slot 1 Port 8
N/A
N/A
N/A
3023
Container
Slot 1 Port 9
N/A
N/A
N/A
12-14
3024
Container
Slot 1 Port 10
N/A
N/A
N/A
3025
Container
Slot 1 Port 11
N/A
N/A
N/A
3026
Container
Slot 1 Port 12
N/A
N/A
N/A
3027
Container
Slot 1 Port 13
N/A
N/A
N/A
3028
Container
Slot 1 Port 14
N/A
N/A
N/A
3029
Container
Slot 1 Port 15
N/A
N/A
N/A
3030
Container
Slot 1 Port 16
N/A
N/A
N/A
3031
Container
Slot 1 Port 17
N/A
N/A
N/A
3032
Container
Slot 1 Port 18
N/A
N/A
N/A
3033
Container
Slot 1 Port 19
N/A
N/A
N/A
3034
Container
Slot 1 Port 20
N/A
N/A
N/A
3075
Container
Slot 4 Port 1
N/A
N/A
N/A
3076
Container
Slot 4 Port 2
N/A
N/A
N/A
3077
Container
Slot 4 Port 3
N/A
N/A
N/A
3078
Container
Slot 4 Port 4
N/A
N/A
N/A
3079
Container
Slot 4 Port 5
N/A
N/A
N/A
3080
Container
Slot 4 Port 6
N/A
N/A
N/A
3081
Container
Slot 4 Port 7
N/A
N/A
N/A
3082
Container
Slot 4 Port 8
N/A
N/A
N/A
3083
Container
Slot 4 Port 9
N/A
N/A
N/A
3084
Container
Slot 4 Port 10
N/A
N/A
N/A
3085
Container
Slot 4 Port 11
N/A
N/A
N/A
3086
Container
Slot 4 Port 12
N/A
N/A
N/A
3087
Container
Slot 4 Port 13
N/A
N/A
N/A
3088
Container
Slot 4 Port 14
N/A
N/A
N/A
3089
Container
Slot 4 Port 15
N/A
N/A
N/A
3090
Container
Slot 4 Port 16
N/A
N/A
N/A
3091
Container
Slot 4 Port 17
N/A
N/A
N/A
12-15
3092
Container
Slot 4 Port 18
N/A
N/A
N/A
3093
Container
Slot 4 Port 19
N/A
N/A
N/A
3094
Container
Slot 4 Port 20
N/A
N/A
N/A
3095
Container
AC Slot
N/A
N/A
N/A
3096
Container
AC Slot
N/A
N/A
N/A
3097
Container
FAN
N/A
N/A
N/A
4001
Power Supply
PS_AC 1
0.0/-
N/A
N/A
4002
Power Supply
PS_AC 2
0.0/-
N/A
N/A
4003
Fan
FAN
0.0/A
N/A
N/A
5001
Module
IO Card 1
0.1/-
1.0.0(1.65)
2.0
5004
Module
IO Card 4
0.1/-
1.0.0(1.65)
2.0
5005
Module
Main Card A
0.0/G
1.0.0(1.91)
2.0
5006
Module
Main Card B
N/A
N/A
N/A
7001
Port
N/A
N/A
N/A
7002
Port
N/A
N/A
N/A
7003
Port
N/A
N/A
N/A
7004
Port
N/A
N/A
N/A
7009
Port
MNG Port
N/A
N/A
N/A
7010
Port
N/A
N/A
N/A
7011
Port
N/A
N/A
N/A
7012
Port
N/A
N/A
N/A
7013
Port
N/A
N/A
N/A
7014
Port
N/A
N/A
N/A
7016
Port
N/A
N/A
N/A
7017
Port
N/A
N/A
N/A
7018
Port
N/A
N/A
N/A
7019
Port
N/A
N/A
N/A
12-16
7020
Port
N/A
N/A
N/A
7021
Port
N/A
N/A
N/A
7022
Port
N/A
N/A
N/A
7023
Port
N/A
N/A
N/A
7024
Port
N/A
N/A
N/A
7025
Port
N/A
N/A
N/A
7026
Port
N/A
N/A
N/A
7027
Port
N/A
N/A
N/A
7028
Port
N/A
N/A
N/A
7029
Port
N/A
N/A
N/A
7030
Port
N/A
N/A
N/A
7031
Port
N/A
N/A
N/A
7032
Port
N/A
N/A
N/A
7033
Port
N/A
N/A
N/A
7034
Port
N/A
N/A
N/A
7035
Port
N/A
N/A
N/A
7036
Port
N/A
N/A
N/A
7037
Port
N/A
N/A
N/A
7038
Port
N/A
N/A
N/A
7039
Port
N/A
N/A
N/A
7040
Port
N/A
N/A
N/A
7082
Port
N/A
N/A
N/A
7083
Port
N/A
N/A
N/A
7084
Port
N/A
N/A
N/A
7085
Port
N/A
N/A
N/A
7086
Port
N/A
N/A
N/A
7087
Port
N/A
N/A
N/A
7088
Port
N/A
N/A
N/A
12-17
7089
Port
N/A
N/A
N/A
7090
Port
N/A
N/A
N/A
7091
Port
N/A
N/A
N/A
7092
Port
N/A
N/A
N/A
7093
Port
N/A
N/A
N/A
7094
Port
N/A
N/A
N/A
7095
Port
N/A
N/A
N/A
7096
Port
N/A
N/A
N/A
7097
Port
N/A
N/A
N/A
7098
Port
N/A
N/A
N/A
7099
Port
N/A
N/A
N/A
7100
Port
N/A
N/A
N/A
Note
12-18
Appendix A
Connection Data
A.1
The CONTROL DCE connector is a 9-pin D-type female connector with RS-232
asynchronous DCE interface, intended for direct connection to a supervision
terminal. The connector is wired in accordance with Table A-1.
A.2
Pin
Designation
Function
1, 4, 6, 7, 8, 9
Not connected
Tx +
Transmit
Rx
Receive
Each ETX-5300A MNG ETH port has a 10/100BASE-TX Ethernet station interface
terminated in an RJ-45 connector. The port supports the MDI/MDIX crossover
function, and therefore can be connected by any type of cable (straight or
crossed) to any type of 10/100BASE-TX Ethernet port. The port also corrects for
polarity reversal in the 10BASE-T mode.
Connector pin functions for the MDI state are listed in Table A-2. In the MDIX
state, the receive and transmit pairs are interchanged.
Pin
Designation
Function
TxD+
TxD
RxD+
4, 5
Not connected
RxD
7, 8
Not connected
A-1
A.3
A.4
Pin
Signal
Function
BI_DA+
Bi-directional pair +A
BI_DA-
Bi-directional pair -A
BI_DB+
Bi-directional pair +B
BI_DC+
Bi-directional pair +C
BI_DC-
Bi-directional pair -C
BI_DB-
Bi-directional pair -B
BI_DD+
Bi-directional pair +D
BI_DD-
Bi-directional pair -D
The balanced external clock interface on the E5-MC-4 card terminates in an RJ-45
connector, wired in accordance with Table A-4.
A.5
Pin
Designation
Function
RRING
RTIP
TRING
TTIP
3, 6
Not connected
7, 8
Not connected
TOD Connector
The RS-422 GPS-based ToD clock interface on the E5-MC-4 card terminates in an
RJ-45 connector, wired in accordance with Table A-5.
A-2
TOD Connector
A.6
Pin
Designation
Function
TOD Rx
TOD Rx +
1 pps Tx/Rx
1 pps Tx/RX+
4, 5
GND
GND
TOD Tx/Rx
TOD Tx/Rx +
ALARM Connector
Caution To prevent damage to alarm relay contacts, the maximum current that can flow
through the contacts must be limited by external means. (The maximum current
through closed contacts is 1A; load switching capacity is 60 W). The maximum
voltage across the open contacts is 60 VDC/30 VAC.
Pin
Function
GND
12V output
10
Input Alarm 0
ALARM Connector
A-3
A-4
ALARM Connector
Function
11
Input Alarm 1
12
13
Input Alarm 2
14
Input Alarm 3
15
Appendix B
Data Flow and Traffic
Management
This appendix describes service creation and traffic management performed by
ETX-5300A. It discusses the following topics:
Ingress Processing
Classification
CoS Mapping
Policing
VLAN Editing
Traffic Management.
B.1
Four I/O cards are interconnected with the main card via the chassis
backplane in a star topology. Ethernet I/O cards include 20 GbE or two 10GbE
ports. The cards perform ingress traffic processing and traffic management
(pre-forwarding scheduling and shaping).
TDM I/O cards include four channelized STM-1/OC-3 ports. The TDM cards
handle TDM pseudowire traffic.
System modules (power inlets and AC power supplies, fan module) provide
DC or AC power to the system and cool the chassis.
B-1
4 x 10GbE
4 x 10GbE
Main Card
Main Card
Timing
Timing
Packet
Processor
Power
Packet
Processor
Common
Logic
Common
Logic
GbE, 10GbE or
SDH/SONET
I/O Card
Fans
ETX-5300A
B-2
Classify
20 x GbE
or
2 x 10GbE
Map CoS
and Color
Police
Pre-Forwarding
Scheduling
and Shaping
2 x 10GbE
Forward
Post-Forwarding
Scheduling and
Shaping
Edit
Post-Forwarding
Scheduling and
Shaping
Edit
Forward
4 x 10GbE
Map CoS
and Color
Classify
Port Types
ETX-5300A ports can be either of two types:
These ports differ in the way they admit traffic, classify flows, and perform traffic
management.
B-3
Data Path
Figure B-3 illustrates the general traffic path within the ETX-5300A system in the
ingress-to-egress direction.
Ingress
Egress
Ethernet I/O or
Main Card Ingress
Bridge
Pseudowire
Aggregation
TDM Pseudowire
Processing
Shaping
Queuing
Shaping
Queuing
Flow
Aggregation
Policing
Classification
Ingress Processing
(L2CP)
I/O Card
Ethernet Port
Main Card
Ethernet Port
Tunnel
VLAN
Editing
SAG
Router
UDP/IP or
MEF-8
Pseudowires
Ingress Processing
Forwarding
B-4
Pre-forwarding
Processing
(VLAN/Ethertype
recognition and
admission)
Ingress Scheduling
and Shaping (using
traffic classes and
drop precedence)
Policing
Classification
to Flows
First-Level VLAN
Editing (using traffic
classes and drop
precedence)
Traffic Class
(CoS) Mapping
Forwarding (bridge,
router or VLAN
cross-connect)
Ethernet I/O
Cards only
Drop Precedence
(Color) Ingress
Mapping
Second-Level VLAN
Editing (using traffic
classes and drop
precedence)
Post-forwarding
Scheduling and
Shaping (using
traffic classes and
drop precedence)
Flow
SAP
SAG
Flow
Flow
SAP
SAP
SAG
Flow
SAP
B-5
B.2
Ingress Processing
Frame Format
ETX-5300A supports Ethernet II frames. It does not support IEEE 802.3 LLC
packets.
Flow Control
A flow control is a mechanism that allows an Ethernet receiving end that is
unable to process all the traffic sent to it, to hold the transmitted traffic until it is
able to process packets again.
The mechanism uses a PAUSE frame, which is a packet instructing the far-end
device to stop transmission of packets until the receiver is able to handle traffic
again. The PAUSE frame includes a timer value (set by the originating receiver),
which tells the far-end device how long to suspend its transmission. If that timer
expires or is cleared by getting a PAUSE frame with the timer value set to 0, the
far-end device can then send packets again. Flow control is an optional port-level
parameter.
Flow control is supported on both directly- and indirectly-attached ports:
Ethertype
Ethertype configured per port is used for the identification of VLAN-tagged
frames at ingress and VLAN editing at egress. This refers to outer VLAN only. The
outer VLAN of the incoming packet must match the configured Ethertype of the
port in order to be considered as a VLAN-tagged frame (otherwise the frame is
considered untagged or dropped).
ETX-5300A supports two Ethertype tag values:
Default 8100
B-6
Ingress Processing
Note
Directly-attached ports inner VID is either the same as outer VID Ethertype
or 8100.
Ethertype tag cannot be changed if a port (Ethernet or LAG) has flows attached
to it.
The following tables describe the admission rules for different port and TPID
types.
Inner TPID
Admit/Drop
8100
None
Admit
8100
8100
Admit
8100
Admit
Dont care
Admit
Untagged
None
Admit
Untagged
Table B-2. Indirectly-Attached Ports with Port TPID Y (other than 8100)
Outer TPID
Inner TPID
Admit/Drop
None
Admit
8100
Admit
Admit
Z (other than Y)
Dont care
Admit
Untagged
None
Admit
Untagged
Outer TPID
Inner TPID
Admit/Drop
8100
None
Admit
8100
8100 or Y
Admit
8100
Admit
Dont care
Admit
Untagged
None
Admit
Untagged
Ingress Processing
B-7
Table B-4. Directly-Attached Ports with Port TPID Y (other than 8100)
Outer TPID
Inner TPID
Admit/Drop
None
Admit
8100 or Y
Admit
Admit
8100
Dont care
Drop
Dont care
Admit
Untagged
None
Admit
Untagged
Note
TPID is also used to indicate the Ethertype tag used in VLAN stacking.
L2CP Handling
ETX-5300A handles Layer-2 control protocol traffic on a per-port and/or a perflow basis. If no per-flow L2CP profile is configured, a per-port-level profile is
used. It affects both tagged and untagged L2CP frames.
L2CP traffic is processed using a two-stage mechanism comprising per-port or
per-flow profiles (set of rules for traffic handling). In total, ETX-5300A supports
up to 16 L2CP profiles:
Note
If an L2CP profile has been attached to a port or a flow, the profile cannot be
deleted or modified.
Note
PAUSE frames (01-80-C2-00-00-01) are not part of L2CP profiles. They are
B-8
Ingress Processing
Note
Note
L2CP traffic can be peered only at the flow level. Therefore, for full LACP support,
the user must define an untagged flow with per-flow L2CP profile to peer the
LACP traffic.
VLAN + P-bit
VLAN (outer)
Outer VLAN + P-bit + Inner VLAN
Untagged (used for per-port L2CP profiles as well)
Unclassified (indirectly-attached ports only)
VLAN + Src MAC
VLAN + IP-P or
VLAN + DSCP
LAN + Non IP
P-bit
P-bit
Ingress Processing
B-9
Classification Key
IP-P,
DSCP
B.3
Unclassified
Classification
The ingress traffic is first classified to flows according to classifier profiles. A per
port classification key defines the types of classifier profiles supported for this
type of port. The classification key also defines the CoS mapping and color
mapping methods. Table B-6 and Table B-7 specify the supported classification
keys and the associated CoS and color mapping methods. The different types of
classifier profiles supported per classification key are detailed in Table B-8,
Table B-9, Table B-10, Table B-11, Table B-12, Table B-13, Table B-14,
Table B-15, Table B-16.
Table B-6. Classification Keys for Indirectly-Attached Ports
Classification Key (Port + )
Flow, P-bit
VLAN+IP Precedence
Flow, IP Precedence
Flow, IP Precedence
VLAN+DSCP
Flow, DSCP
Flow, DSCP
P-bit
Flow, P-bit
IP Precedence
Flow, IP Precedence
Flow, IP Precedence
DSCP
Flow, DSCP
Flow, DSCP
Flow, P-bit
Note
IA port classification key cannot be changed when the port has flows attached to
it. Flows must be deleted first.
B-10
Classification
Priority
VLAN + P-bit
Single MAC
Single IP
Single Ethertype
Note
Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit P-bit indication, but they
actually imply a full P-bit range (07).
ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not
detected.
A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
Priority
Flow priority, as shown in Table B-8, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a
flow with VID 5 and P-bit 0 (classifier profile type VLAN+P-bit, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0
and VID 5 and P-bit 17.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN
5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
Group 1 VLAN + Src MAC, VLAN + Dst MAC, VLAN + Src IP, VLAN + Dst IP
Group 2 Src MAC, Dst MAC, Src IP, Dst IP, Ethertype.
Classification
B-11
Group 1 and Group 2 classification types cannot be used on the same port.
Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the
VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can
add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x
(Group 2) profile.
In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1
10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
Priority
VLAN + IP Precedence
Single MAC
Single IP
Single Ethertype
Non-IP
VLAN + Non-IP
Note
Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit IP precedence indication, but
they actually imply a full IP Precedence range (07). Packets with VLANs, but
without IP Precedence (non-IP) will not match these classifier profiles.
ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not
detected.
A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
B-12
Classification
Priority
Flow priority, shown in Table B-9, is a hard-coded attribute of a flow that cannot
be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a
flow with VID 5 and IP-P 0 (classifier profile type VLAN + IP-P, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and IP-P 0
and VID 5 and IP-P 17.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN
5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
Group 1 VLAN + Src MAC, VLAN + Dst MAC, VLAN + Src IP, VLAN + Dst IP
Group 2 Src MAC, Dst MAC, Src IP, Dst IP, Ethertype
Group 1 and Group 2 classification types cannot be used on the same port.
Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the
VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can
add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x
(Group 2) profile.
In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1
10 or 1120 of E5-GbE-20 card, or on ports 1 or 2 of E5-10GbE-2 card.
Priority
VLAN + DSCP
Single MAC
Single IP
Single Ethertype
2
Classification
B-13
Non-IP
VLAN + Non-IP
Note
(1) Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst
MAC, VLAN + Src/Dst IP) are supported without explicit DSCP indication, but
they actually imply a full DSCP range (063). Packets with VLANs, but without
DSCP (non-IP) will not match these classifier profiles.
(2) ETX-5300A recognizes only one level of VLAN tagging on the flows created
with this classifier key. This means that for a double-tag packet, IP level is not
detected.
Priority
Flow priority, shown in Table B-10, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a
flow with VID 5 and DSCP 0 (classification type VLAN + DSCP, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and DSCP 0
and VID 5 and DSCP 163.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5
and Src MAC x (classification type VLAN + Src MAC, priority 1).
Group 1 VLAN + Src MAC, VLAN + Dst MAC, VLAN + Src IP, VLAN + Dst IP,
VLAN + Ethertype
Group 2 Src MAC, Dst MAC, Src IP, Dst IP, Ethertype
Group 1 and Group 2 classification types cannot be used on the same port.
Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the
VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can
add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x
(Group 2) profile.
In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1
10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
B-14
Classification
Priority
P-bit
Src MAC
Single MAC
Single IP
Single Ethertype
Dst MAC
Src IP
Dst IP
Ethertype
Untagged
Note
ETX-5300A recognizes only one level of VLAN tagging on the flows created with
this classifier key. This means that for a double-tag packet, IP level is not
detected.
Priority
Flow priority, shown in Table B-11, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with P-bit 07 exists (classification type P-bit, priority 2), a
flow with P-bit 3 (classification type P-bit, priority 2) is not allowed and vice
versa. In this case, three flows must be created: P-bit 02, P-bit 3 and P-bit 47.
Priority
IP Precedence
Classification
B-15
Priority
Src MAC
Single MAC
Single IP
Single Ethertype
Dst MAC
Src IP
Dst IP
Ethertype
Match All (Unclassified), default
Non-IP
Priority
Flow priority, shown in Table B-12, is a hard-coded attribute of a flow that
cannot be changed. Two flows with the same priority cannot overlap.
For example, if a flow with IP-P 07 exists (classification type IP Precedence,
priority 2), a flow with IP-P 3 (classification type IP Precedence, priority 2) is not
allowed and vice versa. In this case, three flows must be created: IP-P 02, IP-P 3
and IP-P 47.
Priority
DSCP
Src MAC
Single MAC
Single IP
Single Ethertype
Dst MAC
Src IP
Dst IP
Ethertype
Untagged
B-16
Classification
Priority
Flow priority, shown in Table B-13, is a hard-coded attribute of a flow that
cannot be changed. Two flows with the same priority cannot overlap.
For example, if a flow with DSCP 063 exists (classification type DSCP, priority 2),
a flow with DSCP 3 (classification type DSCP, priority 2) is not allowed and vice
versa. In this case, three flows must be created: DSCP 02, DSCP 3 and DSCP 4
63.
Note
tag.
TPID of inner VLAN must be 8100, otherwise the inner VLAN and IP level are
not recognized.
Table B-14. Indirectly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Classifier Profile Type
Priority
Single IP
Single Ethertype
Classification
B-17
Untagged
Note
(1) Some of the VLAN-based classifier profile types (VLAN, Outer VLAN + Inner
VLAN, VLAN + Src/Dst MAC, VLAN + Src/Dst IP) are supported without explicit
P-bit indication, but they actually imply a full P-bit range (07).
(2) VLAN and VLAN + P-bit classifier profile types relate to packets with single
Priority
Flow priority, as it appears in Table B-14, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a
flow with VID 5 and P-bit 0 (classification type VLAN+P-bit, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0
and VID 5 and P-bit 17.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5
and Src MAC x (classification type VLAN + Src MAC, priority 1).
Group 1 VLAN + Src MAC, VLAN + Dst MAC, VLAN + Src IP, VLAN + Dst IP
Group 2 Src MAC, Dst MAC, Src IP, Dst IP, Ethertype
Group 1 and Group 2 classification types cannot be used on the same port.
Moreover, only one Group 1 classification type is allowed per VLAN. Thus, if the
VID 5 and Dest MAC 1 (Group 1) classifier profile is configured on a port, you can
add a flow based on VID 5 Dest MAC 2 (Group 1), but cannot use VID 5 Src IP x
(Group 2) profile.
In total, up to 128 Group 1 or Group 2 flows can be defined on Ethernet ports 1
10 or 1120 of the E5-GbE-20 card, or on ports 1 or 2 of the E5-10GbE-2 card.
Priority
VLAN + P-bit
Untagged
B-18
Classification
Note
(1) VLAN classifier profile type is supported without explicit P-bit indication,
outer VLAN.
Flow priority, shown in Table B-15, is a hard-coded attribute of a flow that
cannot be changed. Two flows with the same priority cannot overlap.
For example, if a flow with VID 5 exists (classification type VLAN, priority 1), a
flow with VID 5 and P-bit 0 (classification type VLAN+P-bit, priority 1) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0
and VID 5 and P-bit 17.
Note
A packet with an outer Ethertype tag that does not match the port Ethertype tag
is considered untagged.
Table B-16. Directly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Classifier Profile Type
Priority
Untagged
Note
(1) VLAN classifier profile type is supported without explicit P-bit indication,
Classification
B-19
B.4
CoS Mapping
Queue mapping.
In other words, each packet is first normalized to a CoS value (07), then this
CoS is used for VLAN editing (P-bit) or priority queue mapping.
Ingress Traffic
CoS Mapping
Profiles to map:
Flow to CoS
CoS to P-bit
Queue Mapping
Profiles to map:
Table B-6 and Table B-7 give detailed description of CoS mapping methods
supported by directly- and indirectly-connected ports, depending on a
classification key used for traffic classification.
Note
Capacity
ETX-5300A supports up to 36 user-defined CoS mapping profiles per I/O card.
There are three default profiles for P-bit to CoS, IP Precedence to CoS, DSCP to
CoS mapping. These profiles are considered part of the 36 CoS mapping profiles
supported per system
B-20
CoS Mapping
CoS
7
CoS
7
CoS
7
763
The flow to CoS mapping method is supported only with flow to ingress color
mapping
The P-bit to CoS mapping method is supported only with either DEI or P-bit to
ingress color mapping methods
The DSCP to CoS mapping method is supported only with DSCP to ingress
color mapping method.
CoS Mapping
B-21
Table B-20. Possible Combinations of CoS and Ingress Color Mapping Methods for
Directly-Attached Ports
Note
See Ingress Color Mapping for details on the color mapping methods.
B-22
CoS Mapping
Queue
1
B.5
P-bit to color
DSCP to color
IP Precedence to color
Flow to color
Note
Ingress color mapping method for both directly- and indirectly-attached ports
depends on a classification key used for the port. See Table B-6 and Table B-7 for
details.
Color-blind policer that configures packet color without taking into account
any preexisting markings that may be set for a packet by another traffic
policer at a previous network node
Color-aware policer that adds color information packet color taking into
account previously configured packet color
Note
B-23
B.6
Policing
When the flows are established, a metering and policing function can be applied
for each ingress flow on indirectly-attached ports to regulate traffic according to
the contracted CIR, EIR, CBS and EBS bandwidth profiles.Rate limitation is
performed according to the Dual Token Bucket mechanism (two rates, three
colors) in color-aware or color-blind modes.
The final color of a packet is determined by a policer (color-aware or color-blind).
If a policer is not applied on a specific flow, the ingress color mapping determines
packet color.
Policer Parameters
Policer uses the following for bandwidth control:
Committed Information Rate (CIR) for the current profile. The CIR specifies a
bandwidth with committed service guarantee (green bucket rate).
Committed Burst Size (CBS) for the current profile. The CBS specifies the
maximum guaranteed burst size (green bucket size).
Excess Information Rate (EIR). The EIR specifies an extra bandwidth with no
service guarantee (yellow bucket rate).
Excess Burst Size (EBS). The EBS specifies the extra burst with no service
guarantee (yellow bucket size).
Coupling Flag. This parameter is relevant for color-aware mode only. See
Overhead Compensation
, you can also specify the amount of bytes that the shaper or policer can use to
compensate for the overhead of Layer-1 (preamble and IFG) and the overhead
for the added VLAN header in case of stacking.
Color-Aware Policer
When determining whether or not a packet conforms to a bandwidth profile, the
color-aware policer takes into account any preexisting color markings that may
have been set for a packet by another traffic policer.
The packet ingress color is resolved by a color mapping profile (see Ingress Color
Mapping section above).
B-24
Policing
Yes
Packet is green
No
Yes
Packet is yellow
No
When the Coupling Flag is enabled, a sum of CIR and EIR volumes is taken into
account. Coupling flags are described below.
The coupling flag allows a choice between two modes of operations for the rate
enforcement algorithm. The chosen value for CF has the effect of controlling the
volume of the yellow packets.
When CF is disabled, the long term average bit rate of yellow packets is set
by EIR.
When CF is enabled, the long term average bit rate of yellow packets is set by
CIR + EIR, depending on volume of the green packets.
In both cases the burst size of the yellow packets is limited by EBS.
In other words, when the CF is enabled, a yellow packet arrives with an empty EIR
bucket, and the policer forwards the packet, using tokens form the CIR bucket.
This allows the EIR to be extended to the value of configured CIR + extended
EIR.
Color-Blind Policer
In the color-blind mode, the policer ignores the packet color (if any) when
determining whether or not a packet conforms to a bandwidth profile.
B.7
VLAN Editing
The VLAN tag editing mechanism allows service providers to carry customertagged traffic on its network using its own VLANs. You can configure tag editing
VLAN Editing
B-25
Note
E-Line
E-LAN
Router
When a VLAN is pushed or swapped, the inner bits (P-bit, CFI/DFI) are either
copied from the original VLAN or set according to CoS marking profile.
Action 2
CLI Command
None
None
Pop (outer)
None
Pop (outer)
Pop (inner)
None
None
None
mark all
vlan <vid>
None
mark all
vlan <vid>
marking-profile <profile name>
mark all
vlan <vid>
exit
vlan-tag push vlan <vid> p-bit profile <profile name>
B-26
VLAN Editing
Action 1
Action 2
CLI Command
mark all
vlan <vid>
exit
vlan-tag push vlan <vid> p-bit copy
vlan-tag push vlan <vid> p-bit copy inner-vlan <vid> pbit copy
Pop
mark all
inner-vlan <vid>
exit
vlan-tag pop vlan
Pop
mark all
vlan <vid>
marking-profile <profile name>
exit
vlan-tag pop vlan
Note
Both VLAN editing actions must use the same CoS marking profile.
The TPID (Ethertype) editing policy for specific actions in E-Line topology is
detailed below:
Swap-push:
Push-push:
Pop-swap:
B-27
CLI Command
None
Pop (outer)
vlan-tag-pop vlan
Note
Action
CLI Command
None
Pop (outer)
vlan-tag-pop vlan
The VLAN editing options allowed at bridge port ingress also depend on the
B-28
VLAN Editing
Untagged
Push X
VLAN X
None
VLAN X
Push Y
VLAN Y
Swap (mark) Y
VLAN Y
None
VLAN X
Pop
VLAN Y
Push Z
VLAN Z
Swap (mark) Z
VLAN Z
VLAN X
Outer VLAN X +
Inner VLAN Y
Swap (mark) X
VLAN X
Push X
VLAN X
Outer VLAN X
None
VLAN X
Outer VLAN X +
Inner VLAN Y
Pop
VLAN Y
Match All
Action 1
Action 2
CLI Command
Remarks
None
None
Pop (outer)
None
VLAN Editing
B-29
Type
Action 1
Action 2
CLI Command
Remarks
Pop (outer)
Pop (inner)
Action 1
Action 2
CLI Command
None
None
None
Note
Remarks
All bridge ports with flows originating from indirectly-attached ports and sharing
the same RIF broadcast domain (RIF over bridge/VLAN) must use the same VLAN
editing options.
Push:
If a router interface is connected to a bridge port, TPID is userconfigured. If TPID is not configured, default setting is used (8100).
Push-push:
SVI PW Editing
PW-type SVIs are considered to be untagged entities, inheriting their VLAN
properties from attached flows. Table B-29 and Table B-30 detail VLAN editing
B-30
VLAN Editing
options available for PW-type SVIs. VLAN editing option type at ingress must be
used with the similar option at egress, as detailed below:
Action 1
Action 2
CLI Command
Remarks
None
None
Pop (outer)
None
Pop (outer)
Pop (inner)
Action 1
Action 2
CLI Command
Remarks
None
None
None
PtP flows
PtP flows
None
Multipoint flows
PtP flows
Marking Profile
P-bit/DEI translation is further enhanced by using marking profiles that convert
CoS and packet color values into P-bit and DEI. ETX-5300A supports up to 16
color-aware and color-blind marking profiles:
Note
The color-aware profile translates CoS (07) and packet color (all, green,
yellow) into P-bit (07) and DEI (yellow, green) values
The color-blind profile translates CoS (07) into P-bit (07) and DEI (yellow,
green 1) values.
VLAN Editing
B-31
B.8
Traffic Management
Overview
ETX-5300A traffic management entities are called queue groups. They are
configured over SAGs or physical ports. The queue groups consist of 2- or 3-level
scheduling elements (queue blocks) per port type (see the description of Type-1,
Type-2 and Type-3 queue groups below). The queue blocks consist of separate
internal strict-priority or WFQ queues.
Scheduling Elements
Each scheduling element consists of strict or weight fair queues. In addition,
single- and dual-rate shapers operate at per-queue and per-scheduling-element
level to shape traffic into a required traffic profile (CIR, CBS or CIR/EIR, CBS/EBS).
The TM entities allow hierarchical scheduling and shaping at several levels. For
example, a 3-level TM entity schedules and shapes traffic at EVC, tunnel and port
levels. This means that several shaped EVCs can be bundled into one shaped
tunnel. A dual shaper at the EVC level ensures committed EVC CIR on the
aggregated tunnel while sharing the remaining traffic between the EIR part of the
other EVCs (see Dual Shaper and EIR Sharing below).
Similar bandwidth allocation can be made among the different tunnels at the port
level by committing on tunnels CIR and sharing the remaining port bandwidth
between tunnels EIR.
Figure B-7 illustrates the hierarchical TM concept and the dual shaper
functionality. The magnified portion of the diagram details functionality of a
level-1 SE.
B-32
Traffic Management
WFQ 1
WFQ 2
CIR/EIR
Shaper
WFQ 383
SP 1
WFQ 384
WFQ 1
SP 2
WFQ 2
CIR/EIR
Shaper
WFQ 383
WFQ 384
Level-0 SEs
CIR
Shapers
SP 1
SP 2
Level-1 SEs
CIR/EIR
Shaper
WFQ 1
WFQ 2
SP 3
CIR/EIR
Shaper
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 383
WFQ 4
WFQ 384
WFQ 2
CIR
Shaper
CIR
Shapers
WFQ 1
SP 1
SP 2
CIR/EIR
Shaper
WFQ 2
SP 3
CIR/EIR
Shaper
WFQ 63
WFQ 64
SP4
WFQ 1
WFQ 2
WFQ 383
WFQ 3
WFQ 384
WFQ 4
CIR
Shapers
SP 1
SP 2
CIR/EIR
Shaper
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
EVC Level
Tunnel Level
Port Level
Traffic Management
B-33
For WFQs belonging to the queue groups defined for physical ports (not for
SAGs)
Queuing
Each flow is assigned to a queue block as its destination. Each queue block
includes scheduling queues in accordance with CoS delivery priorities. A flow
packet is mapped to a specific queue according to the packets CoS (set by CoS
mapping profile at the ingress), whereby CoS 7 is mapped to the lower priority
queue, and CoS 0 to the highest.
Level-0 SEs
CIR
Shapers
Packets mapped to queue
according to their CoS
WFQ 1
CIR/EIR
Shapers
SP 2
SP 3
Level-1 SEs
SP 1
WFQ 2
CIR/EIR
Shapers
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 383
WFQ 4
WFQ 384
Up to 384
CIR
Shapers
Up to 384
Up to 64
WFQ 2
CIR
Shaper
Up to 64
WFQ 1
WFQ 2
WFQ 63
SP 1
WFQ 64
SP 2
SP 3
SP4
WFQ 1
WFQ 383
WFQ 2
WFQ 384
WFQ 3
WFQ 4
The Strict Priority queues ensure minimal latency and jitter for the RT traffic,
even when a large amount of bursty data traffic is sent over the same uplink.
Strict Priority traffic will always be processed first, while flows mapped to the
WFQ slots are buffered until the Strict Priority queues are empty.
The WFQ technique avoids scheduling starvation of lower priority queues and
ensures relatively fair allocation of bandwidth by sharing it among all flows. In
this manner, packets belonging to lower classes of service are not penalized
when higher priority queues are not empty and may still receive transmission
time. QoS-conformant scheduling is handled by assigning different weights
to the various queues instead of equally dividing overall bandwidth among all
active flows.
A queue block consists of several internal queues and each queue is defined by
its profile. The user defines an internal queue profile and then assigns it to a
queue block.
B-34
Traffic Management
Congestion Avoidance
As the queues fill up, new packets face a growing risk of being discarded due to
lack of buffer space. The packets can be dropped as the queue becomes totally
full (tail-drop) or dropped selectively before all buffers are filled, using a
statistical probability. Selective dropping of packets when the queues are filling
up is referred to as congestion avoidance. Congestion avoidance mechanisms are
complementary to queuing algorithms; queuing algorithms manage the front of a
queue, congestion avoidance mechanisms manage the end of the queue.
The ETX-5300A traffic management engine solves such issues by employing a
weighted random early discard (WRED) mechanism for intelligent queue
management and congestion avoidance. The WRED algorithm monitors the fill
level of each queue and determines whether an incoming packet should be
queued or dropped, based on statistical probabilities.
Near-empty queues accept all incoming packets, but as the queues begin to fill,
the drop probability for new packets increases. The different queues are
allocated different occupancy thresholds, above which incoming packets are
discarded at random at a growing rate as the queue fills, until the queue has
reached a maximum threshold and all incoming packets are dropped.
WRED Profile
A congestion control policy is defined by a WRED profile attached to an internal
queue (level-0 SE only). Each WRED profile includes two curves one for green
and one for yellow packets. A packet is mapped into a curve according to its
color, with green packets having priority over the yellow ones. ETX-5300A
supports up to eight WRED profiles.
Each WRED profile includes the following parameters:
Traffic Management
B-35
Drop
Probability
100%
Max Drop
Probability
Min
Threshold
Max
Threshold
100%
Queue
Depth
Green packets
Yellow packets:
When configuring and using queue groups, you may not exceed maximum allowed
number of its elements. For example, you can activate less than 384 level-0 SEs,
supported by 3-level queue groups (see Type 2 Queue Group).
To facilitate the configuration process, ETX-5300A provides default queue groups
for every available type. These default entities can be used as a basis for creating
customized queue groups according to user requirements.
B-36
Traffic Management
The post- and pre-forwarding traffic management entities are described below.
CIR/EIR
Shapers
SP 3
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
CIR
Shaper
WFQ 2
WFQ 4
WFQ 3
Up to 8
CIR
Shapers
Up to 8
WFQ 4
WFQ 5
WFQ 6
SP 1
SP 2
WFQ 7
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
One level-1 scheduling element (SE) consisting of eight WFQs, one per each
level-1 queue block. Each queue in the block can be configured to a different
weight (163).
Shaping elements:
Traffic Management
B-37
No shaper profiles.
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
A queue group that is bound to a port cannot be replaced; you must verify that
no flows are attached to it, delete it, and then bind a new one.
Four strict priority and four weight fair queues with default priority queue
profiles (see Default Queue Profiles below).
No shaper profile.
The default queue block profile can be used as is, or as the basis for a new queue
block (copy, rename, edit), and bound to a queue group.
A queue block that is bound to a queue group cannot be edited (you can replace
it with a different queue block).
ETX-5300A supports up to 128 different weight combinations for level-0 queue
block.
The default level-1 queue block profile uses queues with the default WFQ queue
profile (weight fair queues, weight = 10, no shaper).
B-38
Traffic Management
Level-1 SEs
CIR/EIR
Shapers
WFQ 1
WFQ 2
CIR/EIR
Shapers
SP 3
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 383
WFQ 4
WFQ 384
Up to 384
CIR
Shapers
Up to 64
Up to 384
WFQ 2
CIR
Shaper
Up to 64
WFQ 1
WFQ 2
WFQ 63
SP 1
WFQ 64
SP 2
SP 3
SP4
WFQ 1
WFQ 383
WFQ 2
WFQ 384
WFQ 3
WFQ 4
Up to 384 level-0 scheduling elements (queue blocks) with four strict priority
queues and four weight fair queues in each block. Each queue in the block
can be configured to a different weight (163) with a fixed queue depth of
200 kBytes).
One level-2 scheduling element consisting of 64 WFQs with each queue userconfigurable to a different weight (14096).
Weight granularity: each of the 64 WFQs belonging to the level-2 SE (queue
block) can have one of 127 predetermined weights, according to the table
below. When a weight is selected in the range of two consecutive values, the
highest value is automatically selected. For example, if you set a WFQ weight
to 3000, which falls between the two allowed values of 2048 and 4096,
ETX-5300A rounds it to 4096.
Traffic Management
B-39
11
21
31
41
51
61
71
87
110
151
240
585
12
22
32
42
52
62
73
89
113
157
256
682
13
23
33
43
53
63
74
91
117
163
273
819
14
24
34
44
54
64
75
93
120
170
292
1024
15
25
35
45
55
65
77
95
124
178
315
1365
16
26
36
46
56
66
78
97
128
186
341
2048
17
27
37
47
57
67
80
99
132
195
372
4096
18
28
38
48
58
68
81
102
136
204
409
19
29
39
49
59
69
83
105
141
215
455
10
20
30
40
50
60
71
85
107
146
227
512
Shaping elements:
Dual leaky bucket shaper per level-0 SE queue block (see Egress Shaping
below)
Dual leaky bucket shaper per level-1 SE queue block(see Egress Shaping
below)
No shaper profiles.
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
Editing connections between level-0 and level-1 queue blocks. You can
connect up to 384 level-0 SE to a single level-1 SE.
A queue group that is bound to a port cannot be replaced, you must verify that
no flows are attached to it, delete it, and then bind a new one.
B-40
Traffic Management
Four strict priority and four weight fair queues with default priority queue
profiles (see Default Queue Profiles below).
No shaper profile.
The default queue block profile can be used as is, or as a basis for a new queue
block (copy, rename, edit), and bound to a queue group.
A queue block that is bound to a queue group cannot be edited (you can replace
it with a different queue block).
ETX-5300A supports up to 128 different weight combinations for level-0 queue
block.
Default level-1 and level-2 queue block profiles use queues with default WFQ
queue profile (weight fair queues, weight = 10, no shaper).
WFQ 2
CIR/EIR
Shapers
CIR/EIR
Shapers
SP 2
Level-2 SE
SP 3
WFQ 1
SP4
WFQ 2
WFQ 383
CIR
Shaper
WFQ 384
Up to 768
Up to 768
Up to 64
Up to 64
WFQ 1
WFQ 63
WFQ 2
SP 1
WFQ 64
SP 2
SP 3
SP4
WFQ 383
WFQ 384
Up to 768 level-0 scheduling elements (queue blocks) with four strict priority
queues in each block. Each queue has a fixed depth of 200 kBytes.
B-41
11
21
31
41
51
61
71
87
110
151
240
585
12
22
32
42
52
62
73
89
113
157
256
682
13
23
33
43
53
63
74
91
117
163
273
819
14
24
34
44
54
64
75
93
120
170
292
1024
15
25
35
45
55
65
77
95
124
178
315
1365
16
26
36
46
56
66
78
97
128
186
341
2048
17
27
37
47
57
67
80
99
132
195
372
4096
18
28
38
48
58
68
81
102
136
204
409
19
29
39
49
59
69
83
105
141
215
455
10
20
30
40
50
60
71
85
107
146
227
512
Shaping elements:
Dual leaky bucket shaper per level-0 SE queue block (see Egress Shaping
below)
Dual leaky bucket shaper per level-1 SE queue block(see Egress Shaping
below)
No shaper profiles.
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
B-42
Traffic Management
Editing connections between level-0 and level-2 queue blocks. You can
connect up to 384 level-0 SE to a single level-2 SE.
A queue group that is bound to a port cannot be replaced, you must verify that
no flows are attached to it, delete it, and then bind a new one.
Four strict priority queues with default priority queue profiles (see Default
No shaper profile.
The default queue block profile can be used as is or used as the basis for a new
queue block (copy, rename, edit), and bound to a queue group
A queue block that is bound to a queue group cannot be edited (you can replace
it with a different queue block).
The default level-2 and level-3 queue block profiles use queues with default WFQ
queue profile (weight fair queues, weight = 10, no shaper).
Egress Shaping
As described above, ETX-5300A provides the following post-forwarding shaping
elements:
Note
Traffic Management
B-43
CIR
Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2
WFQ 4
Up to 50
Up to 50
SP 1
SP 2
WFQ 49
SP 3
WFQ 50
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
One level-1 scheduling element (queue block) has 50 WFQs. Each WFQ in the
level-1 queue block has the same weight of 10.
The pre-forwarding queue group includes one single leaky bucket shaper per
each level-0 queue block.
50 level-0 SEs with all of them connected to one fixed and non-configurable
SE with the same weight.
No shaper profiles.
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
B-44
Traffic Management
A queue group that is bound to a port cannot be replaced, you must verify that
no flows are attached to it, delete it and bind a new one.
Four strict priority and four weight fair queues with default priority queue
profiles (see Default Queue Profiles below).
No shaper profile.
The default queue block profile can be used as is, or as the basis for a new queue
block (copy, rename, edit), and bind to a queue group.
A queue block that is bound to a queue group cannot be edited (you can replace
it with a different queue block).
The default level-1 queue block profile uses queues with default WFQ queue
profile (weight fair queues, weight = 10, no shaper).
Strict priority profile without shaper profile and with WRED profile
WFQ profile with weight set at 10, without shaper profile and with default
WRED profile.
Traffic Management
B-45
B-46
Traffic Management
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com
www.rad.com