Professional Documents
Culture Documents
o P e R A T I o N S A N D M A I N T e N A N C e U S I N G C L I PDF
o P e R A T I o N S A N D M A I N T e N A N C e U S I N G C L I PDF
Disclaimers
Alcatel products are intended for commercial uses. Without the appropriate network design
engineering, they must not be sold, licensed or otherwise distributed for use in any hazardous
environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft
navigation or communication systems, air traffic control, direct life-support machines, or weapons
systems, in which the failure of products could lead directly to death, personal injury, or severe physical
or environmental damage. The customer hereby agrees that the use, sale, licence or other distribution
of the products for any such application without the prior written consent of Alcatel, shall be at the
customer's sole risk. The customer hereby agrees to defend and hold Alcatel harmless from any claims
for loss, cost, damage, expense or liability that may arise out of or in connection with the use, sale,
licence or other distribution of the products in such applications.
This document may contain information regarding the use and installation of non-Alcatel products.
Please note that this information is provided as a courtesy to assist you. While Alcatel tries to ensure
that this information accurately reflects information provided by the supplier, please refer to the
materials provided with any non-Alcatel product and contact the supplier for confirmation. Alcatel
assumes no responsibility or liability for incorrect or incomplete information provided about
non-Alcatel products.
However, this does not constitute a representation or warranty. The warranties provided for Alcatel
products, if any, are set forth in contractual documentation entered into by Alcatel and its customers.
This document was originally written in English. If there is any conflict or inconsistency between the
English version and any other version of a document, the English version shall prevail.
PRINTED ON
RECYCLED PAPER
Preface
This preface provides general information about the documentation set for the
7302 Intelligent Services Access Manager (7302 ISAM) and the 7330 Intelligent
Services Access Manager Fiber to the Node (7330 ISAM FTTN).
Scope
This documentation set provides information about safety, features and
functionality, ordering, hardware installation and maintenance, CLI and TL1
commands, and software upgrade and migration procedures.
Audience
This documentation set is intended for planners, administrators, operators, and
maintenance personnel involved in installing, upgrading, or maintaining the
7302 ISAM or the 7330 ISAM FTTN.
Prerequisite knowledge
The reader must be familiar with general telecommunications principles.
Safety information
For safety information, see the 7302 ISAM Safety Manual. For ANSI safety
information, see the Mandatory Regulations chapter in the 7330 ISAM FTTN ANSI
documentation.
Documents
Table 1 lists the documents that make up the 7302 ISAM Release 3.2 documentation
set.
General documentation
Product Information Provides general system information for the 7302 ISAM 3HH-04069-AAAA-TCZZA
System Description Provides conceptual information for the 7302 ISAM and the 3HH-04064-AAAA-TQZZA
7330 ISAM FTTN
Safety Manual Provides general safety guidelines when handling, installing, 3HH-04071-AAAA-TCZZA
or operating the 7302 ISAM equipment
Operations and Maintenance Provides task-oriented procedures for operating and 3HH-04065-AAAA-TQZZA
Using CLI maintaining the 7302 ISAM and 7330 ISAM FTTN using the
CLI
Migration User Guide Provides information for installing or upgrading the 7302 ISAM 3HH-04072-AAAA-TQZZA
Hardware documentation
XD Modular Hardware Describes the hardware installation for the 7302 ISAM XD 3FE-21578-AAAA-RJZZA
Installation Guide Modular equipment
FD Hardware Installation Describes the hardware installation for the 7302 ISAM FD 3FE-03591-AAAA-RJZZA
Guide equipment
HD/UD Hardware Installation Describes the hardware installation for the 7302 ISAM UD 3FE-21575-AAAA-RJZZA
Guide equipment
CLI and TL1 documentation
CLI Commands Describes the CLI commands for the 7302 ISAM and the 3HH-04067-AAAA-TCZZA
7330 ISAM FTTN
TL1 Commands and Describes the TL1 commands and messages for the 3HH-04068-AAAA-TCZZA
Messages 7302 ISAM and the 7330 ISAM FTTN
Software documentation
Software Management User Describes the software management of the 7302 ISAM 3HH-03390-AAAA-RJZZA
Guide equipment
Special information
The following are examples of how special information is presented in this
document.
Danger — Danger indicates that the described activity or situation
may result in serious personal injury or death; for example, high
voltage or electric shock hazards.
At step 1, you can choose option a or b. At step 2, you must do what the step indicates.
1 This step offers two options. You must choose one of the following:
At step 1, you must perform a series of substeps within a step. At step 2, you must do
what the step indicates.
1 This step has a series of substeps that you must perform to complete the step. You
must perform the following substeps:
Measurement conventions
Measurements in this document are expressed in imperial units. If metric
measurements are included, they appear in brackets following the imperial
measurement. The metric measurements follow the Système international d’unités
(SI) standard for abbreviation of metric units.
Preface iii
Scope .............................................................................................................................. iii
Audience .............................................................................................................................. iii
Prerequisite knowledge ......................................................................................................... iii
Safety information.................................................................................................................. iii
Documents ............................................................................................................................ iv
Special information ................................................................................................................ iv
1— Introduction 1-1
1.1 Introduction ........................................................................................................ 1-2
1.2 How to Use this Document ................................................................................ 1-2
1.3 Configuration examples ..................................................................................... 1-5
NTP 100 —CLI session set-up and user configuration NTP 100-1
DLP 139 —Configure DHCP relay agent in iBridge mode DLP 139-1
DLP 140 —Configure DHCP relay agent in router mode DLP 140-1
DLP 153 —Shut down and restart individual equipment DLP 153-1
DLP 197 —View port configuration and operational data DLP 197-1
Training (TNG)
Glossary
Index
1.1 Introduction
This document provides instructions on CLI operation and maintenance tasks and
procedures for the Alcatel 7302 ISAM and the 7330 ISAM FTTN.
These tasks and procedures are identical for the 7302 ISAM and the
7330 ISAM FTTN, unless specified otherwise.
Throughout the document, the 7302 ISAM and the 7330 ISAM FTTN will be
referred to as the Network Element (NE).
See the CLI Commands document for more detailed information about the CLI
command syntax.
This document uses the task-oriented practice (TOP) method. The TOP method is a
documentation system that supports the installation, operation, and maintenance of
telecommunications equipment and software through different layers of
documentation. Most layers in the TOP system are programmed documents that
provide step-by-step instructions for the successful completion of a specific task or
procedure.
A task document is structured to provide information in such a way that both
experienced and inexperienced users can effectively use the material to perform
work assignments. Less-experienced users can refer to detailed step-by-step
procedure documents referred to by the task document to easily comprehend and
complete the task. Experienced users can bypass the procedure documents and use
only the level of information they need to do the task.
TOP layers
The TOP documentation method uses the following layers:
• IXL — Index List
• NTP — Non-Trouble Procedure
• DLP — Detailed Level Procedure
• RTL — Routine Task List
• RTP — Routine Task Procedure
• TAP — Trouble Analysis Procedure
• TAD — Trouble Analysis Data
• TNG — Training
Figure 1-1 shows the layers and logical path of the TOP documentation method.
Non-Trouble
Clearing Procedure Routine Task List
(NTP) (RTL)
Trouble Analysis
Procedure
(TAP)
Routine Task
Procedure
(RTP)
Trouble Analysis
Detailed Level Procedure Data
(DLP) or Chart (TAD)
All layers do not apply to all documents. This document contains only contains the
layers needed to complete operation and maintenance tasks and procedures specific
to the NE through the EMS.
Training (TNG)
A TNG contains supplementary information about a task or procedure.
TNGs are typically referenced from an IXL, but references are also made from other
TOP layers such as NTPs and DLPs.
(1 of 2)
(2 of 2)
(1 of 4)
(2 of 4)
(3 of 4)
(4 of 4)
Specifying 7330 ISAM FTTN remote expansion units using the CLI TNG 106
(1 of 2)
(2 of 2)
Purpose
This procedure provides the steps to set up a CLI session with the NE and create a user
using the Alcatel-developed CLI.
General
Figure NTP 100-1 shows the management topology of the NE system.
ISAM
TL1
agent
CLI IACM
agent
subsystem
SHub
SNMP SNMP
agent agent subsystem
See the CLI Commands and Messages document for detailed information about the CLI
command syntax.
Procedure
Proceed as follows to set up the CLI session and configure the CLI users:
Purpose
A script file is a file containing CLI commands, which can be used to restore a
configuration.
A script file must follow the same syntax rules as commands entered interactively. Only
the tab and the question mark lose their special meaning in a script, so command
expansion and single-line help are not available.
The script will be aborted if one of the commands in the script fails. A command may be
preceded by a minus '-' to prevent the script from being aborted in case of a semantic
error; for example, when you try to delete a node instance that does not exist.
By default, a command script does not interact with the user. The execution of the script
will be aborted if a command or filter requires interaction with the user. Interactivity can
be enabled by specifying the interactive option with the exec command.
Procedure
In order to use script files, you need to perform the following tasks:
Purpose
This document describes the procedure to be used to configure the system.
Prerequisite
A CLI session must have been set up; see DLP 100.
Security Considerations
Note — The following must be taken into account with regard to system
security:
Procedure
Proceed as follows to configure the system:
• see DLP 175 for configuring the system in “single IP address” mode
• see DLP 102 for configuring the system in “dual IP address” mode
Note — To convert the system IP address mode, that is from dual mode
to single mode or from single mode to dual mode; see DLP 184.
6 Configure the SHub database save location and the restore source file; see
DLP 157.
Purpose
This procedure provides the steps to plan, unplan, or replan the equipment and to lock or
unlock the equipment. Some equipment-related items, such as the shelf, are
auto-created at system startup and do not need to be created. However, they can be
midfield.
General
The NE consists of a single shelf with plug-in units. You can perform the actions
described in Table NTP 103-1 to configure the equipment.
Action Description
Planning equipment Planning a piece of equipment is possible before and after the equipment is
physically present and detected by the system (at startup). The system
verifies the configuration parameters and checks if the required equipment
is available.
Note: As long as equipment is not planned, it is impossible to offer service.
Units and other equipment are only available from an operation and
maintenance point of view.
Unplanning equipment If necessary, you can unplan any equipment. Unplanning, however, may be
rejected in case of hierarchical dependencies. For example, it is impossible
to unplan a shelf as long as one or more units in it are still planned.
(1 of 2)
Action Description
Locking and unlocking When necessary, you can lock any equipment, most often a unit, to put it out
equipment of service. Locking a unit renders it inactive. No traffic is generated or
received by the units. However, the unit is not removed from the
configuration, and as soon as you unlock the unit, it becomes active again.
It goes back to operational mode without restart or initialization, and traffic
can resume immediately.
Similarly, you can power down the unit and restart it at a later time. In this
case, however, the unit will go through a complete startup cycle before
traffic is possible.
(2 of 2)
Procedure
Proceed as follows to configure or modify the system equipment:
Purpose
The NE supports several VLAN cross-connect models:
NE
VLAN X
VLAN Y
VLAN A
VLAN B
NE
PC
Network
Procedure
The procedures for creating a cross-connect VLAN are described in the following DLPs:
Purpose
The concept of a VLAN in intelligent bridging (iBridge) mode is that multiple NSPs are
each connected to the NE with a VLAN. The user ports are connected to the VLAN of
their corresponding NSP.
Internet
Video
NE
PC
Network
Procedure
Proceed as follows to configure an iBridge VLAN:
3 Add the network interface to the iBridge VLAN; see DLP 121.
Purpose
In this mode, the NE can be seen as an IP-aware bridge without being seen as an IP
next-hop. Users connected to the NE are seen as being directly attached to the edge
router IP interfaces.
The end-users use the IP address of the edge router as their default gateway, while the
IP edge router sees the end-user subnets as directly attached networks. The NE sits in
between and perform packet forwarding at L3.
This procedure provides the steps to configure an IP-aware bridge on the NE.
Internet
Video
Video VLAN is
always in iBridge
PC
Network
Procedure
Proceed as follows to configure an IP-aware bridge:
3 Add the network interfaces to the L2 terminated forwarder VLANs; see DLP 121.
Purpose
In this mode, the NE is seen as an IP next-hop by the edge routers to route the IP packets
to the users connected to the NE. A single Virtual Router can be configured in this mode,
which can co-exist in the same system with a number of VRs that are configured in
IP-aware Bridge mode (see NTP 106).
At the user side of the system (xDSL line), unnumbered IP interfaces are used, while user
subnets are configured on a user gateway interface. In order to achieve maximum
efficiency in the allocation of IP addresses, several users (on different xDSL lines) can
share a same subnet.
Host routes towards the end-user devices are either dynamically created in the NE in
case of dynamic DHCP or PPPoE sessions, or statically provisioned in case of static IP
address assignment.
Towards the network, IP interfaces are numbered (meaning that the NE IP addresses
and subnets are configured).
Internet
Video
VLAN Y
PC
Network
Procedure
Proceed as follows to configure an IP router:
Purpose
This procedure provides the steps to configure the following services on the NE:
• xDSL profiles
• Quality of Service (QoS)
• Internet Group Management Protocol (IGMP) and multicast
• Dynamic Host Configuration Protocol (DHCP) relay agent and Option 82
• Authentication
• Point-to-Point Protocol (PPP) configuration
• NT redundancy
• Link aggregation
• Rapid Spanning Tree Protocol (RSTP)
• Routing protocols (optional)
• Voice Session Initiation Protocol (SIP)
• Network Access Control Protocol (NACP) session
Procedure
To configure a service, you need to perform the following tasks:
i For the configuration of the service profiles and the spectrum profiles; see DLP
129.
iii For the configuration of virtual noise values for VDSL2; see DLP 189.
3 Configure general bridge parameters for LT and SHub; see DLP 195.
4 Configure QoS:
iii For the configuration of IGMP proxy on the LT; see DLP 137.
iv For the configuration of IGMP snooping on the SHub; see DLP 138.
i For the configuration of the DHCP relay agent in iBridge mode; see DLP 139.
ii For the configuration of the DHCP relay agent in router mode; see DLP 140.
iii For the configuration of the DHCP relay agent in forwarder mode; see
DLP 141.
v For the configuration of operator authentication via RADIUS; see DLP 181.
vi For the configuration of the default security domain; see DLP 178.
12 If necessary, configure routing protocols such as OSPF and RIP. the configuration
is optional (depends if the network elements which are connected to the ISAM, are
using those protocols). The routing protocols are handled in the Shub.
i For the configuration of Open Shortest Path First (OSPF) management; see
DLP 107.
Purpose
This procedure provides the steps to configure Point-to-Point Protocol (PPP) on the NE.
Procedure
To configure PPPoE termination, you need to perform the following tasks:
Purpose
This procedure provides the steps to add an iBridge user on the NE.
Prerequisites
The following prerequisites must be fulfilled before an iBridge user can be created:
Procedure
Proceed as follows to add an iBridge user:
1 Add the LT to the VLAN, for the first user to be created on the LT for that VLAN; see
DLP 128.
Purpose
An IPoA user interface is a L2 interface created on a PVC which is configured in
RFC2684 LLCSNAP routed or RFC2684 VC-MUX routed encapsulation modes.
Multiple user sessions (or users) may exist on the same IPoA interface. A session
corresponds to all the traffic originating from or destined to a host whose IP address is
seen by the NE in the customer environment.
This procedure provides the steps to add an IPoA user on the NE.
Prerequisites
The following prerequisites must be fulfilled before an IPoA user can be created:
Procedure
Proceed as follows to add an IPoA user:
1 If the first IPoA user to be created on a VLAN needs DHCP, configure the VRF for
DHCP; see DLP 140.
3 Add the LT to the VLAN, for the first user to be created on the LT for that VLAN; see
DLP 128.
Purpose
An IPoE(oA) user interface is a L2 interface created on a PVC which is configured in
RFC2684 LLCSNAP bridged or RFC2684 VC-MUX bridged encapsulation modes.
Multiple user sessions (or users) may exist on the same IPoE(oA) interface. A session
corresponds to all traffic originated from or destined to a host whose IP address is seen
by the NE in the customer environment.
This procedure provides the steps to add an IPoE user on the NE.
Prerequisites
The following prerequisites must be fulfilled before an IPoE user can be created:
Procedure
Proceed as follows to add an IPoE user:
1 If the first IPoE user to be created on a VLAN needs DHCP, configure the VRF for
DHCP; see DLP 140.
3 Add the LT to the correct VLAN (service), for the first user to be created on the LT
for that VLAN; see DLP 128.
Purpose
A PPPoE(oA) user interface is a L2 interface created on a PVC which is configured in
RFC2684 LLCSNAP bridged or RFC2684 VC-MUX bridged encapsulation modes.
Multiple PPPoE sessions can be established on the same PPPoE(oA) interface. The
system can also limit the max number of PPPoE session per PPPoE(oA) via
configuration.
This procedure provides the steps to add a PPPoE user on the NE.
Prerequisites
The following prerequisites must be fulfilled before an PPPoE user can be created:
Procedure
Proceed as follows to add a PPPoE user:
2 Add the LT to the correct VLAN (service), for the first user to be created on the LT
for that VLAN; see DLP 128.
Purpose
This procedure provides the steps to perform equipment repair on the 7302 ISAM.
Procedure
Proceed as follows to perform equipment repair tasks:
1 Plan, unplan, and replan equipment (for example, plug-in units); see DLP 111.
2 Pull out and plug in equipment. For the procedures, refer to the XD Modular
Hardware Installation Manual for the 7302 ISAM or the Hardware Installation and
Maintenance Practices for the 7330 ISAM FTTN.
3 Lock and unlock equipment (mostly plug-in units); see DLP 112.
Purpose
This procedure provides the steps to monitor the alarms on the NE.
Procedure
Proceed as follows to monitor the alarms:
Purpose
This procedure provides the steps to perform software management on the NE.
Procedure
The following steps can be used to perform software management:
Purpose
This procedure lists the procedures for system parameter modification.
Procedure
The steps below show the procedures for modifying different system parameters:
Purpose
This procedure list the procedures that can be used for:
Procedure
The following tasks can be performed:
3 Viewing the configuration and operational data of a port: see DLP 197
Purpose
This procedure provides the steps to adapt the following services on the NE:
Procedure
To adapt a service, you can perform the following tasks:
Purpose
The following troubleshooting commands can be used:
• Ping:
The ping command lets you verify that a particular IP address exists and can accept
requests. Ping is used diagnostically to ensure that a host computer you are trying to
reach is actually operating. Ping can also be used with a host that is operating to see
how long it takes to get a response back.
• Traceroute:
Traceroute is a utility that traces the route in the network for an IP address. It also
calculates and displays the amount of time each hop took.
The utility initiates the sending of a packet (using the Internet Control Message
Protocol (ICMP)), including in the packet a Time To Live (TTL) value that is designed
to be exceeded by the first router that receives it, which will return a Time Exceeded
message. This enables traceroute to determine the time required for the hop to the
first router. Increasing the time limit value, it sends the packet again so that it will reach
the second router in the path to the destination, which returns another Time Exceeded
message, and so forth.
Traceroute determines when the packet has reached the destination by including a
port number that is outside the normal range. When it's received, a Port Unreachable
message is returned, enabling traceroute to measure the time length of the final hop.
As the tracerouting progresses, the records are displayed for you hop by hop.
Procedure
The following troubleshooting commands can be used:
Purpose
The Customer Premises Equipment (CPE) management functionality allows to
troubleshoot a CPE at all protocol layers when problems are experienced with either
misconfiguration of the CPE or with the end-user's terminals. It allows to have a clear
indication if a problem is situated before or after the demarcation point of a telecom
carrier’s responsibility.
Additionally, CPE management offers the possibility to control the SW upgrade of CPEs
by downloading from the network.
CPE-MM
LMI
NE xDSL CPE
The CPE-MM is responsible for the management of CPE. The following interfaces are
defined:
Note — This NTP is for CPE management using SNMP. For IPProxy
CPE management; see NTP 128.
Procedure
To configure SNMP proxy CPE management, you need to perform the following tasks:
Support
Cluster management is supported on the 7302 ISAM only.
Purpose
As a result of the massive deployment of xDSL, many more DSLAMs are provisioned in
the network. They are mostly managed separately, which makes the management
workload heavy and complicated.
Topology display will present the connectivity and status of DSLAMs in a connected
environment, possibly over more than one cluster. Moreover, separately managed
DSLAMs use more public IP addresses, which are limited.
Management
Cluster No. 2 Command
(A logical DSLAM) to Cluster 2
EMS (AWS) Management
Command
to Cluster 1
Single Logical
Management Path Cluster No.1
(A logical DSLAM)
DSLAM
No. 7 DSLAM
No. 8
DSLAM
DSLAM No. 2
No. 1
DSLAM
DSLAM
No. 9
No. 10
Procedure
To configure cluster management, you need to perform the following tasks:
Purpose
Secure Shell (SSH) is a protocol that provides authentication, encryption, and data
integrity to secure network communications. On top of this protocol, Secure Shell
implementations offer secure replacements for rsh, rlogin, rcp, ftp, and telnet, all of which
transmit data over the network as clear text.
Procedure
To configure the SSH functionality, you need to perform the following tasks:
Purpose
This NTP provides the steps for system maintenance of the NE.
Procedure
Perform this procedure to maintain the system:
Purpose
An Inter-Working Layer (IWL) is created on a PVC that is configured in RFC2684
LLC-SNAP routed or RFC 2684 VC-MUX routed encapsulation modes.
Only one C-VLAN or SC-VLAN is configured in cross-connect mode. This VLAN must
then be associated with a bridge port, which is created on the same PVC as the IWL.
This procedure provides the steps to add an IPoA Cross-Connect User on the NE.
Prerequisites
The following prerequisites must be fulfilled before an IPoA cross-connect user can be
created:
Procedure
Proceed as follows to add an IPoA cross-connect user:
Purpose
This NTP provides the steps to manage system logging (SYSLOG) for the NE.
General
System statistics logs are user configurable and you can create up to 64 system logs.
System logs can be saved locally, to a remote server, or to all active CLI or all active TL1
terminals.
You can perform the following three main tasks using CLI:
Using filters, you can determine which messages are sent to the system log file, as well
as set the severity level of the system log.
See the 7302 ISAM | 7330 ISAM FTTN System Description document for more
information about system and security statistics logging.
Procedure
Use this procedure to manage system logging for the NE. See the references for detailed
procedures and safety information.
1 Enable and disable logging for all system logs; see DLP 179.
Purpose
Single-pair High-speed Digital Subscriber Line (SHDSL) is a physical layer standard
based on the ITU-T Recommendation G.991.2. It describes a versatile transmission
method for data transport in the telecommunication access networks, capable of
supporting whichever network protocol deployed currently while enabling higher
bandwidth and reach (for example, TDM, ATM, Frame Relay and so on).
SHDSL transceivers are designed primarily for duplex operation over mixed gauges of
two wire twisted metallic pairs. Four-wire and m-pair operations are included as options
for extended reach. The use of signal regenerators for both the two-wire and multi-wire
operations is optional.
Inverse Multiplexing for ATM (IMA) permits a broadband cell stream to be transported on
a number of lower-rate physical links (for example, several SHDSL span lines) by
grouping these physical links into a single logical channel. The specification includes
means to maintain cell order and a method to allow in-service loss and restore of
individual physical links.
Procedure
Proceed as follows to configure SHDSL:
Purpose
IPProxy CPE Management allows configuration, monitoring, maintenance and upgrade
of ADSL Remote Terminals. These functions can be executed from a CPE Management
Module (CPE-MM).
EMS CPE-MM
IP@/UDP IP@/UDP
IP@/TCP IP@/TCP
Telnet/ TCP/ IP/VLAN
TFTP/UDP/ IP/ VLAN
RMI RMI
NE
LMI
Telnet/ IP/AAL5/ATM/DSL
TFTP/ IP/AAL5/ATM/DSL
For IPProxy CPE Management, the CPE must support both Telnet & TFTP server
functions. The CPE-MM must support Telnet & TFTP client functions. The NE relays the
Telnet and TFTP messages between the CPE-MM and the CPE.
The CPE-MM is responsible for the management of CPE. The following interfaces are
defined:
• Management channel
• Data channel
The protocol stack on the RMI is the same as for the NE management interface, that is,
Telnet and TFTP over TCP/UDP/IP is supported.
Prerequisites
The following prerequisites must be fulfilled:
• The CPE must have a Telnet and TFTP service on IPoA over ATM PVC 1,39
• The CPE IP must be configured to be 192.168.1.1 for IPoA on ATM PVC 1,39
Procedure
To configure IPProxy CPE management, you need to perform the following tasks:
1 If not already done, enable the dual tagging mode in the SHub; see DLP 191
2 Configure the S-VLAN to be used for IPProxy CPE Management; see DLP 192
4 Configure one or more IPProxy CPE Management sessions; see DLP 194
Purpose
This procedure provides the steps to set up a CLI session with the NE.
Procedure
Proceed as follows to set up a CLI session:
2 After the question “Would you like a CLI(C) or a TL1 login(T) or TL1 normal
session(N)? [N]:”, type C and press Enter.
3 Enter the default user name (isadmin) and password (i$@mad-) that were provided
to you with the system. If you do not have the default user name and password,
contact Alcatel technical support.
Note 1 — For security purposes, change the default user name and
password. The system will prompt you to do this when you log in for the
first time.
Note 2 — For remote CLI, after you set up the management channel,
you can set up a remote CLI session using Telnet.
4 STOP. This procedure is complete.
Purpose
Before an operator instance can be created, an operator profile must be created
An operator profile determines most of the properties of the operator. It is used to limit the
commands a group of operators can execute to those for which they have the necessary
skills and for which they are responsible.
This document describes the procedure to configure and create an operator profile and
to create an operator instance.
Password Rules
The following rules apply to a plain text password:
Never specify a new password in an encrypted format, because you can enter any
hexadecimal string that is not necessarily linked to a password. It is almost impossible to
calculate a password from an encrypted string. This method of specifying passwords is
only intended to restore an existing configuration.
An operator will be requested to enter a new password after logging in for the first time
after a password change.
Procedure
Proceed as follows to create an operator instance:
1 Create and configure the operator profile to which the operator will belong with the
following command:
Configuration example:
Purpose
This document describes the procedure to configure the system management IP
parameters.
Security Considerations
Note — The following must be taken into account with regard to system
security:
Procedure
Proceed as follows to configure the system management IP parameters:
1 By default, the system will start up in “single IP address” mode. You can set the
mode to “dual IP address” (refer also to DLP 103, step 1) with the following
command:
----------------------------------------------------------------
vlan parameters
----------------------------------------------------------------
configured-vlans : 16 management : inband
================================================================
port table
================================================================
port admin-status oper-status speed type duplex
----------------------------------------------------------------
1 down down one-gb unused full
----------------------------------------------------------------
4 Configure the SHub system IP group configuration with the following command:
6 Configure the default route of the system with the following command:
i Set the adminstrative status of the OAM VLAN to down with the following
command:
iii Set the adminstrative status of the OAM VLAN to up with the following
command:
iv Configure the default route in the SHub with the following command:
8 Specify the set of ports which are statically allocated as egress ports for the SHub
management VLAN with the following command:
9 Specify the egress ports which should transmit packets for the SHub management
VLAN as untagged with the following command:
Configuration example for dynamic configuration via BOOTP (for tagged network):
Configuration example for static configuration via manual configuration (for tagged
network):
Purpose
This document describes the procedure to configure system parameters on the system
and on the SHub, such as:
Procedure
Proceed as follows to configure the system parameters:
Note 2 — The system MAC address must only be configured when the
system has no System MAC Address Storage (SMAS) functionality (that
is, when no SMAS board or GFC board are present in the system).
2 Configure the SHub ID with the following command:
3 If necessary, configure the system loop ID syntax with the following command:
5 Configure the system clock source and the clock source priority scheme with the
following command:
configure error
(no) log-full-action <Error::errorLogFullAction>
7 View information about the SNTP and its related parameters with the following
command:
show sntp
Configuration example:
show sntp
Note
This procedure is redundant and has been incorporated in DLP 175 and DLP 102 from
Release 3.1 on.
Purpose
Link aggregation or trunking is a method of combining physical network links into a single
logical link for increased bandwidth.
• Network links:
The number of aggregation links depends on the NT board type
• For ECNT-A: an aggregation can exist of maximum 7 component links.
• For ECNT-C, NANT-A: an aggregation can exist of maximum 8 component links.
• Subtending links:
• For an FE type link or a GE type link, an aggregation can exist of maximum 7
component links
This document describes the procedure to configure the link aggregation usage.
General
This node allows specification of Link Aggregation Group parameters.
A Link Aggregation Group is identified by means of the primary link, also referred to as
aggregator-port. The primary link for an Aggregation Group is the link with the lowest port
number within the group, provided the operational state of the link is UP.
The configuration should be performed for the primary link. The settings configured for
the primary link of the Aggregation Group apply to each and every link that is a member
of the Link Aggregation Group.
The link which is denoted as primary link may change during the lifetime of the
aggregation group. To cope with this phenomenon, the operator is advised to repeat the
configurations described in this procedure for each link of the Aggregation Group. Care
must be taken to configure identical settings for all links within the Aggregation Group.
Prerequisite
The following prerequisites must be fullfilled before link aggregation can be configured:
Procedure
Proceed as follows to configure link aggregation usage:
1 Specify the Link Aggregation Group parameters with the following command:
2 Use the following command to configure Link Aggregation on the SHub. It merely
allows to enable or disable the Link Aggregation feature:
configure la no disable-lacp
configure la disable-lacp
4 View information for a Link Aggregation Group configured on the Service Hub with
the following command:
Configuration example:
configure la no disable-lacp
Purpose
The NE can be configured with several network interfaces. They can be used to connect
the NE to multiple Ethernet switches.
The Rapid Spanning Tree Protocol (RSTP) is a link management protocol that provides
path redundancy while preventing undesirable loops in the network.
This procedure provides the steps to configure RSTP management on the NE.
Prerequisite
The following prerequisite must be fullfilled before RSTP can be configured:
Procedure
Proceed as follows to configure RSTP management:
1 Specify RSTP settings applicable to the SHub with the following command:
configure rstp
(no) disable-rstp
(no) priority <Shub::RstpPriority>
(no) max-age <Shub::RstpMaxAge>
(no) hello-time <Shub::RstpHello>
(no) forward-delay <Shub::RstpFwdDelay>
(no) version <Shub::RstpVersion>
(no) tx-hold-count <Shub::RstpTxHold>
path-cost-type <Shub::RstpPathCost>
2 Specify RSTP settings applicable to a particular port of the SHub with the following
command:
4 View the bridge RSTP operational information (port states, port roles, and so on)
with the following command:
Configuration example:
Purpose
This procedure provides the steps to configure Open Shortest Path First (OSPF)
management on the NE.
General
An OSPF network is divided into areas. These are logical groupings of routers whose
information may be summarized towards the rest of the network. Several “special” area
types are defined:
• Backbone area:
The backbone area (also known as area zero) forms the core of an OSPF network.
All other areas are connected to it, and inter-area routing happens via a router
connected to the backbone area. It is the logical and physical structure for the
Autonomous System (AS) and is attached to multiple areas. The backbone area is
responsible for distributing routing information between non-backbone areas. The
backbone must be contiguous, but it does not need to be physically contiguous;
backbone connectivity can be established and maintained through the configuration
of virtual links.
Note: All OSPF areas must connect to the backbone area
• Stub area:
A stub area is an area which does not receive external routes. External routes are
defined as routes which were distributed in OSPF from another routing protocol.
Therefore, stub areas typically need to rely on a default route to send traffic to routes
outside the present domain. This implies that AS external routes are not fed into stub
areas
• Not-so-stubby area:
A not-so-stubby area (NSSA) is a type of stub area that can import AS external routes
and send them to the backbone, but cannot receive AS external routes from the
backbone or other areas.
Procedure
Proceed as follows to configure OSPF management:
1 Configure the OSPF parameters and attributes with the following command:
configure ospf enable
router-id <Ip::V4Address>
(no) as-border-router
(no) enable-opaque-lsa
(no) overflow-state-it <Ospf::OvrflowIntrvl>
(no) dis-rfc1583-comp
(no) abr-type <Ospf::AbrType>
(no) passive-interface
2 Configure the OSPF backbone area parameters:
i Configure the OSPF backbone area ID:
iv When MD5 is selected as authentication mode for an OSPF interface, use the
following command to configure the MD5 key:
configure ospf area (area-id) interface (ip-addr)
md5-key (index)
key prompt | plain: <Ospf::MD5key>
| encrypted: <Ospf::MD5encryptedKey>
(no) accept-starts <Ospf::MD5startDelay>
(no) generate-starts <Ospf::MD5startDelay>
v Confirm the MD5 authentication with the following command:
configure ospf area (area-id) interface (ip-addr)
authentication md5
vi Configure the metric for an OSPF interface with the following command:
vii Inter-area route summarization is done on ABRs and it applies to routes from
within the AS. It does not apply to external routes injected into OSPF via
redistribution. In order to take advantage of summarization, network numbers
in areas should be assigned in a contiguous way to be able to lump these
addresses into one range. Configure an OSPF aggregate with the following
command:
viii External route summarization is specific to external routes that are injected into
OSPF via redistribution. Also, make sure that external ranges that are being
summarized are contiguous. Summarization overlapping ranges from two
different routers could cause packets to be sent to the wrong destination.
Configure an OSPF aggregate from external autonomous system with the
following command:
ii Configure the OSPF stub area interface with the following command:
iii Configure the OSPF stub area interface timers with the following command:
4 Configure the OSPF NSSA area parameters with the following command:
ii Configure the OSPF NSSA area interface with the following command:
iii Configure the OSPF NSSA area interface timers with the following command:
viii Configure an OSPF NSSA aggregate from external autonomous systems with
the following command:
6 Configure the redistribution of the OSPF route parameters with the following
command:
Configuration example:
Purpose
This procedure provides the steps to configure Routing Information Protocol (RIP)
management on the NE.
Limitations
The following limitations apply:
Procedure
Proceed as follows to configure RIP management:
5 If the MD5 authentication method is selected for a RIP interface (see step 5), then
the MD5 key can be configured with the following command:
Configuration example:
Purpose
SNMP
SNMP uses community names as a kind of password without user name to verify if a
request may be executed or not.
Trap management
An SNMP manager will receive traps when an event occurs in the system.
The manager can be easily flooded by events in the case where something happens with
the system. It can be specified in which traps the manager is interested (trap filtering) and
how the traps must be spread in time (trap shaping).
• cold-start
• link-down
• link-up
• auth-failure
• change-occurred
• init-started
• license-key-change-occurred
You can also set the minimum priority to be reported when a trap occurs. The priority can
be urgent, high, medium, or low.
Security Considerations
Note — The following must be taken into account with regard to system
security:
Procedure
Proceed as follows to configure SNMP and trap management:
Configuration example:
Purpose
This procedure provides the steps to manage the alarms in the NE.
Note — The commands for viewing the different alarms are described in
DLP 155.
Prerequisite
The following prerequisite must be fullfilled:
Procedure
Proceed as follows to manage alarms:
i Configure the alarm log settings (alarm severity level, action to be taken when
the log buffer is full, minimum severity level for non-interface alarms) with the
following command:
configure alarm
log-sev-level <Alarm::alarmSeverity>
log-full-action <Alarm::alarmLogFullAction>
non-itf-rep-sev-level <Alarm::alarmSeverity>
ii Modify the alarm severity and actions on individual alarms with the following
command:
iii Configure the action to be taken when the alarm log buffer is completely full
with the following command:
If the action is set to Wrap, then older log records are overwritten by recent ones.
If the action is set to Halt, then logging is stopped until the log buffer is reset.
iv Tune the alarm reporting for individual ports (for example, xDSL lines) with the
following command:
v Configure the default severity for an alarm on a type of interface with the
following command:
2 Configure an alarm profile for remote LT boards with the following command:
Configuration example:
Purpose
This document describes the procedure to be used to plan, replan, and unplan
equipment.
Procedure
Proceed as follows to plan, replan, and unplan equipment:
3 Plan a plug-in unit other than an applique in any given slot position with the following
command:
Configuration example:
Purpose
This procedure provides the steps to lock and unlock plug-in units.
Procedure
Proceed as follows to lock and unlock a plug-in unit:
Configuration example:
sleep 60
Purpose
The system will auto-configure a number of equipment items and detect the presence of
the equipment at startup. It may therefore not be necessary to configure or reconfigure
all equipment. The procedure in this section is a guideline only.
Refer to the CLI Commands and Messages document for a complete description of the
commands used in this procedure.
Procedure
Proceed as follows to configure the NE equipment:
4 Use any of the following commands to view and verify the configuration of the
system:
This command shows the system configuration and status. This configuration is
fixed and hardcoded.
This command shows the profile-id associated with a profile name, the description
of the profile and the board type associated with a given profile.
Configuration example:
Purpose
The NE supports line protection and Equipment Protection Switching (EPS). EPS is a
mechanism that provides protection against internal failure of the active NT board, if a
second redundant NT board is equipped (NT redundancy).
A protection group is a group composed of protection and working elements, where the
protection element takes over the functionalities of a working element in case it is needed
(for example, failure of the working element).
For NT redundancy, the protection group consists of both protection elements. Each
element represents one NT board. In general, protection elements are defined on
slot-level. The protection group and elements are created implicitly by the system, as part
of the default configuration.
Procedure
The following commands can be used to configure NT redundancy or to view the NT
redundancy configuration:
1 Configure the administrative status of the protection group with the following
command:
ii Set the adminstrative status of the port(s) to up with the following command:
i Configure the NT 1+1 protection group on the SHub with the following
command:
iii By default, there is no APS-EPS coupling in the NE. That means that the
minimum number of links to be in state operational UP in the protection-group
is 0 by default. Or in other words, a link failure will not trigger a switchover from
the active NT to the standby NT.
If a coupling is required (that is NT switchover in case of link failure), the SHub
has to be configured with a threshold > 0 as follows:
5 You can view the protection group configuration parameters with the following
command:
6 You can view the protection element configuration parameters with the following
command:
Configuration example:
Purpose
In the forwarder mode, the LTs operate as IP forwarder and the SHub operates as a
bridge.
LT
SHub
PPPoE/A Session VRF VRF ISP
P-VLAN
DHCP
PPPoE/A ARP Relay P-VLAN
Interface Proxy
VB
P-VLAN
LT
P-VLAN
IPoE/A Session VRF ISP
Prerequisites
The following prerequisites must be fulfilled before a Layer2-terminated forwarder VLAN
can be configured:
Procedure
Proceed as follows to configure a Layer2-terminated forwarder VLAN:
3 Create an unnumbered network IP interface on the IPoX interface with the following
command:
i Configure the SHub network egress port on the network with the following
command:
ii Configure the SHub network egress port on the LT with the following
command:
7 Configure the DHCP relay agent per VRF (for handling broadcast frames) with the
following command:
Configuration example:
Purpose
In the router mode, the LTs operate as an IP forwarder and the SHub operates as a
router.
Between the LTs and the SHub, one VLAN per VRF must be created to indicate the VRF
to which the IP packets belong. This VLAN is called as V-VLAN (VRF VLAN).
• IP interfaces are created on the network VLANs towards the edge routers. IP interface
addresses are seen as the Next-Hop addresses in the downstream from edge routers
to ISAM.
• User-gateway interface is the interface towards the users and it is created on V-VLAN.
• IP address configured on the user-gateway interface represents the gateway IP
address for the users, and subnet configured on the user-gateway interface
represents the subnet of the users.
LT
VRF SHub
PPPoE/A Session V-VLAN Routing Protocols
(OSPF, RIPv2)
PPPoE/A ARP P-VLAN
Interface Proxy
VRF ISP
LT DHCP
ARP Relay
V-VLAN
IPoE/A Session VRF
Prerequisites
The following prerequisites must be fulfilled before a Layer2-terminated router VLAN can
be configured:
Procedure
Proceed as follows to configure a Layer2-terminated router VLAN:
3 Add the virtual VLAN to the LT port where the Layer2-terminated router is active with
the following command:
4 Create an IP interface on the virtual VLAN on the SHub with the following command:
6 Configure the IP address of the internal IP interface with the following command:
7 Set the administrative state of the VLAN interface to up with the following command:
8 Create a L2 network terminated VLAN on the Shub with the following command:
9 Create and configure an SHub network port with the following command:
10 Change the administrative status of the SHub network port with the following
command:
admin-status up
11 Configure an egress port for the L2 network terminated VLAN on the SHub with the
following command:
12 Configure the SHub network egress port for untagged packets with the following
command:
13 Configure the port VLAN ID for the untagged packets with the following command:
16 Configure the IP address of the external IP interface with the following command:
17 Set the administrative state of the VLAN interface to up with the following command:
21 Configure the DHCP relay agent per VRF (for handling broadcast frames) with the
following command:
Note: In the configuration example, it is assumed that the index of the router VRF of
the LT is 5 and the index of the router VRF on the SHub is 15.
Purpose
This is the most straightforward VLAN cross-connect model where a single VLAN ID at
the EMAN side is associated with a given PVC at the user side. Any kind of traffic issued
by the subscriber is passed transparently towards the network using the selected VLAN
ID.
Cross-connect VLANs can be enabled to be protocol aware for IGMP and 802.1x and
support the configuration of DHCP Option 82 and PPPoE relay.
Prerequisite
The following prerequisite must be fulfilled before a C-VLAN can be configured:
Procedure
Proceed as follows to configure a C-VLAN:
1 Create a C-VLAN:
i Create and configure an SHub network port with the following command:
ii Configure the SHub network egress port on the network with the following
command:
iii Configure the SHub network egress port on the LT with the following
command:
Configuration example:
Purpose
In this mode, the Service Provider VLAN (S-VLAN) ID at the EMAN side is associated
with a single subscriber interface at the user side. The C-VLANs carried within the
S-VLAN are passed transparently to the end user. This allows the end user to specify its
own end-to-end connectivity, while remaining transparent for the EMAN.
The NE acts as an S-VLAN aware bridge, with the restriction that only one subscriber
interface can be attached. Forwarding is only done based on the S-VLAN forwarding
context. The forwarding is transparent for the C-VLANs. Frames on the subscriber
interface may or may not have an S-VLAN tag. In case of an absent S-VLAN tag (that is
for C-VLAN tagged and untagged/priority tagged frames), the subscriber interface’s
pre-configured S-VLAN ID will be assigned.
Prerequisite
The following prerequisite must be fulfilled before an S-VLAN can be configured:
Procedure
Proceed as follows to configure an S-VLAN:
1 Create an S-VLAN:
configure vlan id
stacked:<Vlan::SVlanIndex>:<Vlan::CVlanIndex>
name <Vlan::AdminString>
mode cross-connect
configure vlan id
stacked:<Vlan::SVlanIndex>:<Vlan::CVlanIndex>
name <Vlan::AdminString>
(no) priority <Vlan::Priority>
(no) broadcast-frames
(no) protocol-filter <Vlan::ProtGroup>
(no) pppoe-relay
(no) pppoe-relay-tag <Vlan::PppoeRelayEnableR3.1>
(no) dhcp-opt-82
(no) circuit-id-dhcp <Vlan::CircuitIdDhcp>
(no) remote-id-dhcp <Vlan::RemoteIdDhcp>
(no) dhcp-linerate <Vlan::Dhcp-linerate>
(no) pppoe-linerate <Vlan::Pppoe-linerate>
(no) circuit-id-pppoe <Vlan::CircuitIdPppoe>
(no) remote-id-pppoe <Vlan::RemoteIdPppoe>
iii Create and configure an SHub network port with the following command:
i Create and configure an SHub network port with the following command:
ii Configure the SHub network egress port on the network with the following
command:
iii Configure the SHub network egress port on the LT with the following
command:
Configuration example:
Purpose
The basic VLAN cross-connect mode suffers from the fact the that number of VLAN
identifiers is limited to 4K. Since the VLAN is a EMAN wide identifier, one ends up with a
scalability issue: there cannot be more than 4K end users connected to the whole EMAN.
To solve this issue, two VLANs are stacked and the cross-connection is then performed
on the combination (S-VLAN, C-VLAN) allowing to theoretically reach up to 16M end
users.
The NE acts as a C-VLAN aware bridge, with the restriction that only one subscriber
interface can be attached. Frames on the subscriber interface may be C-VLAN tagged or
untagged/priority tagged. In case of C-VLAN tagged frames, a check will be performed
on the received C-VLAN ID, while the subscriber interface‘s preconfigured S-VLAN will
be assigned. In case of untagged/priority tagged frames, the subscriber interface’s
pre-configured C-VLAN and S-VLAN will be assigned.
Prerequisite
The following prerequisite must be fulfilled before an SC-VLAN can be configured:
Procedure
Proceed as follows to configure an SC-VLAN:
1 Create an SC-VLAN:
configure vlan id
stacked:<Vlan::SVlanIndex>:<Vlan::CVlanIndex>
name <Vlan::AdminString>
mode layer2-terminated
(no) priority <Vlan::Priority>
(no) broadcast-frames
(no) protocol-filter <Vlan::ProtGroup>
(no) pppoe-relay
(no) pppoe-relay-tag <Vlan::PppoeRelayEnableR3.1>
configure vlan id
stacked:<Vlan::SVlanIndex>:<Vlan::CVlanIndex>
name <Vlan::AdminString>
(no) priority <Vlan::Priority>
(no) broadcast-frames
(no) protocol-filter <Vlan::ProtGroup>
(no) pppoe-relay
(no) pppoe-relay-tag <Vlan::PppoeRelayEnableR3.1>
(no) dhcp-opt-82
(no) circuit-id-dhcp <Vlan::CircuitIdDhcp>
(no) remote-id-dhcp <Vlan::RemoteIdDhcp>
(no) dhcp-linerate <Vlan::Dhcp-linerate>
(no) pppoe-linerate <Vlan::Pppoe-linerate>
(no) circuit-id-pppoe <Vlan::CircuitIdPppoe>
(no) remote-id-pppoe <Vlan::RemoteIdPppoe>
configure vlan id
stacked:<Vlan::SVlanIndex>:<Vlan::CVlanIndex>
name <Vlan::AdminString>
mode cross-connect
(no) priority <Vlan::Priority>
(no) broadcast-frames
(no) protocol-filter <Vlan::ProtGroup>
i Create and configure an SHub network port with the following command:
ii Configure the SHub network egress port on the network with the following
command:
iii Configure the SHub network egress port on the LT with the following
command:
Configuration example:
Purpose
The concept of a VLAN in intelligent bridging (iBridge) mode is that multiple NSPs are
each connected to the NE with a VLAN. The user ports are connected to the VLAN of
their corresponding NSP.
Procedure
Proceed as follows to configure an iBridge VLAN:
Configuration examples:
Purpose
This procedure provides the steps to add network interface(s) (that is, network port(s)) to
a VLAN.
Prerequisite
The following prerequisite must be fulfilled before network interfaces can be added to a
VLAN:
• A VLAN must have been created; see DLP 117, DLP 118, DLP 119 or DLP 120.
Procedure
Proceed as follows to add a network interface to a VLAN:
1 Create and configure an SHub network port with the following command:
2 Change the administrative status of the SHub network port with the following
command:
3 Configure the SHub network egress port with the following command:
4 Configure the SHub network egress port for untagged packets with the following
command:
5 Configure the port VLAN ID for the untagged packets with the following command:
Configuration example:
Purpose
In the forwarder mode, the NE is not seen as a hop in the IP path by the edge routers.
NE users are seen as directly attached hosts on the IP interfaces of the edge routers.
This procedure provides the steps to configure a Virtual Routing Forwarding (VRF)
context in forwarding mode on the NT.
Procedure
Proceed as follows to configure the forwarding VRF:
Configuration example:
Purpose
In router mode, the NE is seen as an IP next-hop by the edge routers to route the IP
packets to the users connected to the NE.
Procedure
Proceed as follows to configure a VRF in routing mode:
2 Create a VRF in routing mode on the SHub with the following command:
Note — The VRF on the SHub must always be created with mode
“fast-path-mode”.
Configuration example:
Purpose
This procedure provides the steps to create an xDSL user.
Prerequisites
The following prerequisites must be fulfilled before an iBridge user can be created:
Procedure
Proceed as follows to create an xDSL user:
(no) g992-3-am
(no) g992-5-a
(no) g992-5-b
(no) ansi-t1.424
(no) etsi-ts
(no) itu-g993-1
(no) ieee-802.3ah
(no) g992-5-am
(no) carrier-data-mode <Xdsl::CarrierDataMode>
(no) admin-up
(no) bonding-mode <Xdsl::BondingMode>
(no) transfer-mode <Xdsl::TpsTcMode>
4 Create an ATM PVC (or the necessary ATM PVCs) with the following command:
5 For each of the created PVCs, create a bridge port with the following command:
6 For each created bridge port, assign a VLAN to the bridge port and set the priorities
applicable for that port with the following command:
Configuration examples:
Purpose
This procedure provides the steps to create an IPoA user.
Prerequisites
The following prerequisites must be fulfilled before an IPoA user can be created:
Procedure
Proceed as follows to create an IPoA user:
(no) g992-5-b
(no) ansi-t1.424
(no) etsi-ts
(no) itu-g993-1
(no) ieee-802.3ah
(no) g992-5-am
(no) carrier-data-mode <Xdsl::CarrierDataMode>
(no) admin-up
(no) bonding-mode <Xdsl::BondingMode>
(no) transfer-mode <Xdsl::TpsTcMode>
5 Create a route in the SHub towards the modem with the following command:
where:
route-dest is the subnet which is assigned to the user
next-hop is the IP address of the WAN side of the modem.
7 If the user is a static user, continue with the next step, else go to 9.
Configuration example:
Purpose
This procedure provides the steps to create an IPoE user.
Prerequisites
The following prerequisites must be fulfilled before an IPoE user can be created:
Procedure
Proceed as follows to create an IPoE user:
(no) g992-5-b
(no) ansi-t1.424
(no) etsi-ts
(no) itu-g993-1
(no) ieee-802.3ah
(no) g992-5-am
(no) carrier-data-mode <Xdsl::CarrierDataMode>
(no) admin-up
(no) bonding-mode <Xdsl::BondingMode>
(no) transfer-mode <Xdsl::TpsTcMode>
7 If the user is a static user, continue with the next step, else go to 9.
Configuration examples:
Purpose
This procedure provides the steps to create a PPPoE user.
Prerequisites
The following prerequisites must be fulfilled before an PPPoE user can be created:
Procedure
Proceed as follows to create a PPPoE user:
(no) g992-3-l2
(no) g992-3-am
(no) g992-5-a
(no) g992-5-b
(no) ansi-t1.424
(no) etsi-ts
(no) itu-g993-1
(no) ieee-802.3ah
(no) g992-5-am
(no) carrier-data-mode <Xdsl::CarrierDataMode>
(no) admin-up
(no) bonding-mode <Xdsl::BondingMode>
(no) transfer-mode <Xdsl::TpsTcMode>
Configuration examples:
Purpose
This procedure provides the steps to add an LT port to a VLAN.
Procedure
Proceed as follows to add an LT to the correct VLAN service:
Configuration example:
Purpose
This procedure provides the steps to create xDSL profiles.
General
Before you can create an xDSL line, you need to create the necessary profiles.
Table DLP 129-1 describes the two types of profiles.
Profile Description
The parameters of the xDSL spectrum depend largely on the xDSL flavour (ADSL,
READSL, ADSL2(+), VDSL, or VDSL2). That is why the configuration of an xDSL
spectrum is done in two steps:
Refer to the System Description for more information on power management mode,
SRA,...
See the CLI Commands and Messages document and TNG 107 for a full description of
all related parameters.
Procedure
Proceed as follows to create an xDSL profile:
3 Create an xDSL spectrum profile and configure the parameters common to all the
DSL flavors with the following command:
4 If the xDSL type is ADSL or ADSL2, then the ADSL and ADSL2 specific part of an
xDSL spectrum profile can be managed with the following command:
5 If the xDSL type is ADSL2+, then the ADSL2+ specific part of an xDSL spectrum
profile can be managed with the following command:
6 If the xDSL type is Reach Extended ADSL2 (READSL2), then the READSL2
specific part of an xDSL spectrum profile can be managed with the following
command:
7 If the xDSL type is VDSL, then the VDSL specific part of an xDSL spectrum profile
can be managed with the following command:
8 Configure the transmission power of the G.hs tones in VDSL environment. with the
following command:
9 If the xDSL type is VDSL2, then the VDSL2 specific part of an xDSL spectrum profile
can be managed with the following command:
Configuration example:
Purpose
xDSL bonding allows to carry the traffic to and from a single logical subscriber interface
over multiple physical multi-ADSL lines. It offers the following services:
Prerequisites
The following prerequisites must be fulfilled before xDSL bonding can be configured:
Procedure
Proceed as follows to create an xDSL bonding group profile:
1 Configure the xDSL lines to be bonded with bonding mode atm-bonding with the
following command:
Note 1 — The following applies for these xDSL lines in case of chipset
level bonding:
• The two lines used for xDSL bonding must be subsequent lines
• The first line must be an odd line
Note 2 — The following applies for the first line (also known as bonding
group index):
Note — A bonding group profile can be created in one step (that is, with
all the necessary parameters and activation of the bonding group profile).
It can also be created in several steps by specifying a few parameters in
each step and by activating the bonding group profile in the last step.
3 Configure an xDSL bonding group with the following command:
7 Configure the bonding group assembly timeout with the following command:
Configuration example:
Note
This procedure is no longer valid.
The correct procedure for configuring xDSL bonding is described in DLP 130.
Purpose
This procedure provides the steps to configure filtering on the SHub.
The IP filters for the different protocols take into account source and/or destination IP
addresses; either or both must be specified. Optionally the ICMP message type and/or
the ICMP message code can be specified.
The physical ports where the filters have to be applied are configured subsequently, by
means of dedicated configuration commands.
When the filter is to be applied to incoming traffic, the command to configure the in-port
is to be used. When the filter is to be applied to outgoing traffic, the command to configure
the out-port is to be used.
Procedure
Proceed as follows to configure filtering on the SHub:
2 Configure the SHub MAC filter to a port with the following command:
4 Configure the physical ports where the ICMP filter related to incoming traffic is to be
applied with the following command:
5 Configure the physical ports where the ICMP filter related to outgoing traffic is to be
applied:
7 Configure the physical ports where the TCP filter related to incoming traffic is to be
applied with the following command:
8 Configure the physical ports where the TCP filter related to outgoing traffic is to be
applied:
10 Configure the physical ports where the UDP filter related to incoming traffic is to be
applied with the following command:
11 Configure the physical ports where the UDP filter related to outgoing traffic is to be
applied:
12 Configure an IP filter, for protocols other than ICMP, TCP or UDP, on the SHub with
the following command:
13 Configure the physical ports where the IP filter related to incoming traffic is to be
applied with the following command:
14 Configure the physical ports where the IP filter related to outgoing traffic is to be
applied with the following command:
Configuration example:
Purpose
This procedure provides the steps to configure QoS on layer 2.
Note — For more information about QoS and the configuration of QoS,
refer to TNG 101.
Procedure
Proceed as follows to configure QoS on layer 2 level:
configure qos
(no) atm-overhead-fact <Qos::AtmFactor>
(no) eth-efm-fact <Qos::EthEfmFactor>
(no) enable-alignment
ii Configure the upstream QoS DSL Control Packet Policer for incoming packets
with the following command:
iii If required, configure the downstream traffic class mapping table with the
following command:
iii Configure a marker for a DSCP contract table with the following command:
iv Configure a codepoint for a DSCP contract table with the following command:
v Configure a marker for Dot1P and the DSCP contract table with the following
command:
vi Configure a codepoint for Dot1P and the DSCP contract table with the
following command:
vii Configure a marker for Dot1P and single DSCP with the following command:
viii Configure a marker for Dot1P alignment with the following command:
6 Configure a queue profile (that is, the used algorithm (tail-drop or Random Early
Detection (RED) and threshold(s)) with the following command:
8 Configure QoS policy actions, using the policer profiles created in step 2, with the
following command:
i Configure the session profile table (using policer profiles created in step 1 and
marker profiles used in step 3) with the following command:
iii Configure a list of downstream policy profiles (minimum 2, maximum 16), using
policies created in step 9, with the following command:
11 Attach the created session profile to a bridge port with the following command:
12 Attach the created scheduler profile (see step 4) and CAC profile (see step 5) to a
DSL port with the following command:
13 Attach the created queue profile (see step 6) to a DSL port with the following
command:
Configuration example:
Purpose
This procedure provides the steps to configure QoS on layer 3 level.
Note — For more information about QoS and the configuration of QoS,
refer to TNG 101.
Procedure
Proceed as follows to configure QoS on layer 3 level:
configure qos
(no) atm-overhead-fact <Qos::AtmFactor>
(no) eth-efm-fact <Qos::EthEfmFactor>
(no) enable-alignment
ii Configure the upstream QoS DSL Control Packet Policer for incoming packets
with the following command:
iii If required, configure the DSCP to Dot1P Alignment Table for layer 3 forwarded
traffic with the following command:
iii Configure a marker for a DSCP contract table with the following command:
iv Configure a codepoint for a DSCP contract table with the following command:
v Configure a marker for Dot1P and the DSCP contract table with the following
command:
vi Configure a codepoint for Dot1P and the DSCP contract table with the
following command:
vii Configure a marker for Dot1P and single DSCP with the following command:
viii Configure a marker for Dot1P alignment with the following command:
6 Configure a queue profile (that is, the used algorithm (tail-drop or Random Early
Detection (RED) and threshold(s)) with the following command:
8 Configure QoS policy actions, using the policer profiles created in step 2, with the
following command:
i Configure the session profile table (using policer profiles created in step 1 and
marker profiles used in step 3) with the following command:
iii Configure a list of downstream policy profiles (minimum 2, maximum 16), using
policies created in step 9, with the following command:
11 Attach the created session profile to a bridge port with the following command:
12 Attach the created scheduler profile (see step 4) and CAC profile (see step 5) to a
DSL port with the following command:
13 Attach the created queue profile (see step 6) to a DSL port with the following
command:
Configuration example:
Purpose
The QoS-aware VLAN cross-connect is not a new cross-connect mode on its own, but it
adds the possibility to support PVC-bundles as subscriber interfaces.
In the downstream direction, the egress bridge port is found by means of the combination
of VLAN tag and p-bit. The p-bits are hence only used for a routing decision. There are
no additional QoS requirements besides the generic QoS-handling available from the
'regular' cross-connect or residential bridging.
Prerequisites
The following prerequisites must be fulfilled before a QoS-aware VLAN can be
configured:
Procedure
Proceed as follows to configure a QoS-aware VLAN:
i Create and configure an SHub network port with the following command:
ii Change the administrative status of the SHub network port with the following
command:
iii Configure the SHub network egress port with the following command:
iv Configure the SHub network egress port on the LT with the following
command:
Configuration example:
Purpose
This procedure provides the steps to configure multicast on the LT (general parameters,
capacity and source table) on the NE.
Procedure
Proceed as follows to configure multicast on the LT:
Configuration example:
Purpose
This procedure provides the steps to configure IGMP proxy on the LT.
Procedure
Proceed as follows to configure proxy on the LT:
1 Configure the IGMP source channel parameters with the following command:
2 Configure the IGMP channel permission package members with the following
command:
3 Configure the IGMP channel preview package members with the following
command:
4 Configure the package bitmaps. The package is intended primarily for use by a
network element manager, such as AWS, to support multiple sets of packages in
different regions.
A package is a group of zero or more multicast sources that share a common access
permission. By grouping the source channels into one or more packages, it provides
flexibility for the service provider to deliver different levels of services to the
end-users, for example, “Basic Package”, “Middle-Tier Package”, and “Premium
Package”.
Use the following command:
Configuration example:
Purpose
This procedure provides the steps to configure IGMP snooping on the SHub.
Procedure
Proceed as follows to configure IGMP snooping on the SHub:
2 Configure the SHub response timer for a VLAN with the following command:
4 View the status of the IGMP VLAN router ports with the following command:
5 Configure the VLAN filter to enable or disable IGMP snooping on that specific VLAN
with the following command:
6 Configure the IGMP Connection Admission Control (CAC) bundle with the following
command:
Configuration example:
Purpose
In the iBridge mode, the user subnets need to be configured on the user gateway
interface of the SHub. This is needed to advertise the user subnet routes into the network
via routing protocols and also to forward user IP packets in downstream direction to LTs
(in the routing table of Shub, direct subnet routes need to be created on the V-VLAN).
This procedure provides the steps to configure the DHCP relay agent in iBridge mode.
Prerequisite
The following prerequisite must be fulfilled before DHCP relay agent can be configured
on an iBridge VLAN:
• The iBridge VLAN must have been created; see DLP 120.
Procedure
Proceed as follows to configure the DHCP relay agent:
2 Add DHCP Option-82 to the iBridge VLAN with the following command:
3 Add an IP address to the iBridge VLAN, and add the VLAN to the VRF with the
following commands:
i Change the administrative status of the iBridge VLAN to down with the
following command:
iii Add the VLAN to the VRF with the following command:
iv Change the administrative status of the iBridge VLAN to up with the following
command:
5 Configure the list of DHCP relay server to a particular VRF with the following
command:
6 Configure the DHCP relay agent parameters to a particular VRF with the following
command:
Configuration example:
Purpose
In the router mode, the user subnets need to be configured on the user-gateway interface
of SHub. This is needed to advertise user subnet routes into network via routing protocols
and also to forward user IP packets in downstream to LTs (in the routing table of SHub,
direct subnet routes need to be created on the V-VLAN).
This procedure provides the steps to configure the DHCP relay agent.
Prerequisite
The following prerequisite must be fulfilled before a DHCP Relay Agent in router mode
can be configured:
Procedure
Proceed as follows to configure the DHCP relay agent:
1 Configure the DHCP relay agent per VRF interface with the following command:
3 Configure the list of DHCP Relay Server to a particular VRF with the following
command:
4 Configure the DHCP relay agent parameters to a particular VRF with the following
command:
Configuration example:
Purpose
The DHCP relay port functionality provided by LTs is exactly the same as in the router
mode. One difference is that, in the forwarder mode, there is no need to have a dedicated
V-VLAN to be used as a broadcast VLAN for DHCP relay. Instead, one of the network
VLANs is used at the same time as a broadcast VLAN by LTs.
This procedure provides the steps to configure the DHCP relay agent.
Procedure
Proceed as follows to configure the DHCP relay agent:
2 Add DHCP Option-82 to the forwarder VLAN on the LT with the following command:
3 Add an IP address to the forwarder VLAN, and add the VLAN to the VRF with the
following commands:
i Change the administrative status of the VLAN to down with the following
command:
iii Add the VLAN to the VRF with the following command:
5 Configure the list of DHCP relay servers to the VRF with the following command:
6 Configure the DHCP relay agent parameters to the VRF with the following
command:
Configuration example:
Purpose
This procedure provides the steps to configure the security domain.
Procedure
Proceed as follows to configure the security domain:
Configuration example:
Purpose
This procedure provides the steps to configure local authentication.
Prerequisite
The following prerequisite must be fulfilled before local authentication can be configured:
Procedure
Proceed as follows to configure local authentication:
3 Change the password for a specific user with the following command:
4 Delete a user from the authentication table with the following command:
Configuration example:
Purpose
This procedure provides the steps to configure the Remote Authentication Dial-In User
Service (RADIUS).
Procedure
Proceed as follows to configure RADIUS:
5 Enable the RADIUS relay on the SHub with the following command:
7 Configure the RADIUS Dynamic Authorization Clients with the following command:
Configuration example:
Purpose
This procedure provides the steps to enable, disable, and configure parameters for
802.1x.
Procedure
Proceed as follows to configure 802.1x:
3 Configure the remote authenticator and enable authentication and handshake with
the following command:
Configuration example:
Purpose
PPPoE relay needs no configuration. It should only be enabled or disabled on a specific
VLAN.
• true:
if pppoe-relay-tag is set to true, then the values of circuit-id-pppoe and of
remote-id-pppoe are irrelevant.
The NE adds the vendor-specific tag and always puts the customer-id parameter into
the remote-id suboption, and will always generate a string (access node, rack,...) to
put in the circuit-id suboption.
• false (default):
if pppoe-relay-tag is false, then the values of circuit-id-pppoe and of remote-id-pppoe
are irrelevant.
The NE does not add the vendor-specific tag.
• configurable:
if pppoe-relay-tag is set to configurable, then the values of circuit-id-pppoe and of
remote-id-pppoe are relevant and subject to the same rules as for DHCP.
The NE adds the vendor specific tag according the settings of these suboptions. The
DHCP-like rules that apply are that the values of both suboptions cannot be identical
(2 x customer-id would result in adding the same configurable string in both
suboptions, 2 x notAdd would result in a vendor-specific tag with without suboptions).
In both cases where a string is to be generated (that is, the case where pppoerelaytag is
configurable and circuit-id-pppoe is set to physcial-id; and the case where pppoerelaytag
is set to true), the string format is identified by:
Prerequisite
The following prerequisite must be fulfilled before PPPoE can be enabled on a VLAN:
• A VLAN must have been created; see DLP 117, DLP 118, DLP 119 or DLP 120.
Procedure
Proceed as follows to enable or disable PPPoE relay:
1 Enable PPPoE relay and, if required, configure the vendor-specific tag with the
following command:
Configuration example:
Purpose
This procedure provides the steps to configure PPPoX relay.
Prerequisites
The following prerequisites must be fulfilled before PPPoX relay can be configured:
Procedure
Proceed as follows to configure PPPoX relay:
5 Enable monitoring of the PPPoX CC client port with the following command:
Configuration example:
Purpose
This procedure provides the steps to create the PPPoE server and the state of the PPPoE
server.
Procedure
Proceed as follows to configure the PPPoE server:
Configuration example:
Purpose
This procedure provides the steps to create and configure the PPPoE profiles.
Procedure
Proceed as follows to configure the PPPoE profiles:
Configuration example:
Purpose
This procedure provides the steps to configure an ARP table entry.
Prerequisite
The following prerequisite must be fulfilled before an ARP table entry can be configured:
• A VLAN must have been created; see DLP 117, DLP 118, DLP 119 or DLP 120.
Procedure
Use the following procedure to configure an ARP table entry:
2 Configure the IP Shub ARP parameters per VLAN with the following command:
Configuration example:
Purpose
This procedure provides the steps to restart the NT.
Procedure
Proceed as follows to restart the SHub:
Configuration example:
Purpose
You can reboot the whole system in the following modes:
Procedure
Proceed as follows to reboot the system:
Configuration example:
Purpose
This procedure provides the steps to shut down and restart slots containing plug-in units
on the NE shelf.
General
The only individual pieces of equipment that may be necessary to restart are plug-in units
such as LTs. These can be shut down and restarted by powering down the slot in which
the plug-in unit is inserted.
Procedure
Proceed as follows to shut down and restart individual equipment:
Configuration example:
sleep 60
Purpose
This procedure provides the steps to create a snapshot alarm table.
General
In the NE, a lot of different alarms may occur. This can sometimes make it difficult for an
operator to investigate, since alarms can appear, disappear, and so on.
Therefore, the snapshot principle exists. A snapshot is in fact a picture of all the alarms
that are present on the moment the snapshot is taken.
A table is created which contains a copy of the alarms which are present in the system at
the time the snapshot was taken.
The operator can filter this table by specifying a “minimum alarm level”. Only alarms with
a level equal or higher than the specified level, will be present in the table.
This table is only temporary and exist only for 4 minutes. After the 4 minutes, the table is
cleared automatically (the alarms are not displayed anymore), and a new snapshot can
be taken.
The operator can also clear the table manually if he wants to take a new snapshot
immediately (that is, not wait for the 4 minute timer to expire).
Procedure
Proceed as follows to create a snapshot alarm table:
1 Create an alarm snapshot table for a minimum severity level with the following
command:
Note — The command will fail if the snap-shot is already in use. The
snap-shot is only kept for a limited time and will be automatically cleared.
2 The alarm snapshot table can be viewed with the following command:
4 The SHub alarm snapshot table can be viewed with the following command:
Note — The alarms are not shown anymore and a new snapshot can
now be taken, if required.
6 The alarm snapshot table on the SHub can be cleared with the following command:
Note — The alarms are not shown anymore and a new snapshot can
now be taken, if required.
Configuration example:
The following command creates an alarm snapshot table for snap-shot owner “tom”
showing all the alarms with severity-level “major” and higher.
The following command displays more information for the alarm type “equipment”.
The following command creates an alarm snapshot table on the SHub for snap-shot
owner “tomtom” showing all the alarms with severity-level “indeterminate” and
higher.
The following command displays the complete alarm table for the SHub.
The following command displays more information for the alarm type “eth-shub” on
the SHub.
The following command clears the alarm snap shot on the SHub.
Purpose
This procedure provides the steps to monitor alarms. Monitoring alarms includes viewing
current alarms, a snapshot of the NE alarms, and the current configuration of the alarm
delta logs.
General
Refer to the CLI Commands and Messages document for a full description of all the
commands related to alarm monitoring. The most common commands are listed in the
procedure below.
Procedure
Proceed as follows to monitor alarms:
i View the general alarm log table with the following command:
2 Use the following command to view the common values related to the alarm delta
logs:
4 To view values related to the alarm delta log entries, use any of the following
commands:
a To display common values related to the delta log alarm, use the following
command:
b To display indeterminate values related to the delta log alarm, use the following
command:
c To display warning values related to the delta log alarm, use the following
command:
d To display minor values related to the delta log alarm, use the following
command:
e To display major values related to the delta log alarm, use the following
command:
f To display critical values related to the delta log alarm, use the following
command:
Configuration example:
Note
This procedure is no longer valid.
Purpose
This document provides the steps to save the SHub configuration database.
The SHub database can be saved manually with the following command:
Procedure
Proceed as follows to manage the SHub database:
2 The status of the save operation (successful, failed, or still in progress) can be
viewed with the following command:
Configuration example:
Note
This procedure is no longer valid.
Purpose
This procedure provides the steps to manage the Operational Software Package
(OSWP).
Prerequisite
The NE contains one OSWP, which is committed and active on all the boards.
Procedure
Proceed as follows to manage the OSWP in the NE:
Configuration example:
Purpose
This procedure provides the steps to view the software version number for the SHub.
Procedure
Proceed as follows to view the software version number for the SHub:
1 View the software version of the SHub system parameters with the following
command:
Configuration example:
Description
The NE supports licensing counters. By these counters, the NE management station is
able to license a set of features provided by the NE in its network. The licensing counters
are defined at the level of the DSL interfaces.
Features
The feature counters can be retrieved by a manager for monitoring. The following
features are monitored in the NE:
• ADSL2+
• READSL2
• ADSL2/ADSL2+ Annex M
• IGMP
• IP-Forwarding
• PPPoX Relay
• PPPoX Termination
• 802.1x
• IPoA-CC
Procedure
Proceed as follows to retrieve the feature counters:
1 View the number of software licenses for the feature with the following command:
Configuration example:
Purpose
This procedure gives the steps to change the external management VLAN.
Procedure
Proceed as follows to change the external management VLAN:
i View the external VLAN in the system with the following command:
ii View the external VLAN in the SHub with the following command:
iii View the PVID on the management port with the following command:
2 Change the external VLAN in the system with the following command:
3 Change the external VLAN in the SHub with the following command:
4 Configure the network port as egress port with the following command:
i Configure the untag port and the PVID with the following commands:
ii Change the PVID on the management port with the following command:
Configuration example:
Purpose
This procedure provides the steps to modify xDSL spectrum profiles.
Prerequisite
The following prerequisite must be fullfilled before an xDSL spectrum profile can be
modified:
• The xDSL spectrum profile must have been created; see DLP 129.
Procedure
Proceed as follows to modify an xDSL spectrum profile:
1 Start the modification of an xDSL spectrum profile with the following command:
2 Modify the parameters of an xDSL spectrum profile with the following command:
(no) dis-g992-1-a
(no) dis-g992-1-b
(no) dis-g992-2-a
(no) dis-g992-3-a
(no) dis-g992-3-b
(no) g992-3-l1
(no) g992-3-l2
(no) g992-3-am
(no) g992-5-a
(no) g992-5-b
(no) ansi-t1.424
(no) dis-etsi-ts
(no) itu-g993-1
(no) ieee-802.3ah
(no) g992-5-am
(no) g993-2-8a
(no) g993-2-8b
(no) g993-2-8c
(no) g993-2-8d
(no) g993-2-12a
(no) g993-2-12b
(no) g993-2-17a
(no) g993-2-30a
(no) min-noise-down <Xdsl::NoiseMargin>
(no) min-noise-up <Xdsl::NoiseMargin>
(no) trgt-noise-down <Xdsl::NoiseMargin>
(no) trgt-noise-up <Xdsl::NoiseMargin>
(no) max-noise-down <Xdsl::NoiseMarginPlus>
(no) max-noise-up <Xdsl::NoiseMarginPlus>
(no) carrier-mask-down <Xdsl::CarrierMaskDown>
(no) carrier-mask-up <Xdsl::CarrierMaskUp>
(no) rf-band-list <Xdsl::RFBand>
(no) power_mgnt_mode <Xdsl::LinePowerMgtMode>
(no) l0-time <Xdsl::LineL0Time>
(no) l2-time <Xdsl::LineL2Time>
(no) l2-agpow-red-tx<Xdsl::LineL2Atpr>
(no) rau-noise-down <Xdsl::NoiseMargin>
(no) rau-noise-up <Xdsl::NoiseMargin>
(no) rau-time-down <Xdsl::RaTime>
(no) rau-time-up <Xdsl::RaTime>
(no) rad-noise-down <Xdsl::NoiseMargin>
(no) rad-noise-up <Xdsl::NoiseMargin>
(no) rad-time-down <Xdsl::RaTime>
(no) rad-time-up <Xdsl::RaTime>
(no) l2-agpw-to-red-tx <Xdsl::LineL2Atpr>
3 Use one of the following commands to complete the modification of the xDSL
spectrum profile:
Configuration example:
Purpose
This procedure provides the steps to ping another host.
Procedure
Proceed as follows:
ping (ip-addr)
(no) timeout <Ip::PingTimeout>
(no) tries <Ip::PingTries>
(no) mtu-size <Ip::PingMtu>
Configuration example:
Purpose
This procedure provides the steps to perform a traceroute action, aiming at determining
the route to a destination address.
Procedure
Proceed as follows to perform a traceroute action:
traceroute (ip-addr)
first-hop <Ip::TracerouteTTL>
last-hop <Ip::TracerouteTTL>
(no) timeout <Ip::TracerouteTimeout>
(no) mtu-size <Ip::TracerouteMtu>
Configuration example:
Purpose
This procedure provides the steps to configure the CPE management functionality.
Procedure
Proceed as follows:
1 Configure the CPE remote management function with the following command:
configure cpe-management
(no) manager <CpeProxy::IPaddress>:<CpeProxy::PortNumber>
configure cpe-management
(no) session (dslport)
(no) connection <CpeProxy::cpeIpProxySessionProtocolPort>
4 Configure on the SHub the VLAN that will be used to transport IP packets for a CPE
management session inside the system with the following command:
5 View the global statistics and the statistics per CPE managerwith the following
command:
Configuration example:
Purpose
A script file is a file containing CLI commands, which can be used to restore a
configuration.
CLI scripts can be executed when they are stored on the flash-disk. Script files are
typically stored in the /var/cmd directory.
Warning: the /var/cmd is cleaned when the system resets, so the configuration file must
be transferred to another system with TFTP before resetting the system.
Note — Saving and restoring the configuration will not work for areas in
which resource identifiers are assigned dynamically by the system.
Procedure
Proceed as follows to create and execute a script file:
1 The complete configuration of the system can be stored in a script with the following
command:
Configuration example:
exec /var/cmd/alaflat.cli
Purpose
This document describes the procedure to modify the system management IP
parameters.
Procedure
Proceed as follows to modify the system management IP parameters:
1 If a default route was defined at the time of creation (see DLP 102 or DLP 175),
remove the default route with the following command:
3 Configure the new host IP address of the system with the following command:
4 Configure the new default route of the system with the following command:
6 Change the administrative status of the management vlan on the SHub to “down”
with the following command:
7 Optionally, remove the IP address connected to the management vlan on the SHub
via the following command:
8 Configure the new IP address to the management vlan on the SHub via the following
command:
9 Change the administrative status of the management vlan on the SHub to “up” with
the following command:
10 Configure the default route in the SHub with the following command:
12 To make the changes effective, the SHub must be restarted with the following
command:
Configuration example:
Purpose
Cluster management in the NE is implemented as follows:
also forwards the original topology request on its other links, and the second-level
neighbours will answer with topology response messages directly to the command
node using the command node’s MAC address.
• With the information received in the topology response messages, the command and
backup nodes are able to construct tables giving the complete topology of a cluster
(including the MAC and IP address of each node).
Procedure
Proceed as follows to configure cluster management:
1 Configure the role of the NE and cluster name with the following command:
Note — Use this command for each NE that must be part of the cluster.
2 Configure the neighbour discovery on system level with the following command:
3 Configure the topology collection on system level with the following command:
4 Configure the neighbour discovery and topology collection on port level with the
following command:
Configuration example:
Purpose
This procedure provides the steps to configure the SSH functionality.
General
When configuring SSH, the following must be taken into consideration:
Procedure
Proceed as follows to configure the SSH functionality:
1 Configure the SSH server profile (retries, timeout, authentication algorithm, and
encryption algorithm) with the following command:
3 Configure the SSH user and the public key, to be used while connecting, with the
following command:
Note 2 — Once the session is set up, it is advised to try the login first
before continuing with the next step.
Note 3 — When the operator notices that the private/public key pair of
the NE has been compromised, the server’s public key can be
regenerated with the following command:
5 Configure an SFTP user name and password for when the NE has to connect to an
external SFTP server with the following command:
Note — The SFTP user created with the command above, is unique in
the system. In case of a second attempt to create such an SFTP user, the
first one will be overwritten.
Configuration example:
Purpose
This procedure provides the steps to enable the management of EMS.
Procedure
Proceed as follows to enable the management of EMS:
2 Configure the SNMP community name “public” with the following command:
3 Configure the SNMP community name “NETMAN” with the following command:
4 Go to step 8.
5 Configure the SNMP community name “public” with the following command:
6 Configure the SHub management VLAN filter IP address with the following
command:
7 Configure the SHub security SNMP community with the following command:
Configuration example:
Purpose
This command allows the superuser to specify a default operator profile.
This default profile is used when an operator is authenticated via a RADIUS server, but
the RADIUS server does not support Vendor Specific Attributes.
Procedure
Proceed as follows to create a default operator profile:
Configuration example:
Purpose
This procedure provides the steps to change the configuration of a user from an ADSL
service to a VDSL (1 or 2) service.
Procedure
Proceed as follows to switch a user from ADSL service to VDSL (1 or 2) service:
1 At the creation of the service and spectrum profiles, fill in the correct values both for
the ADSL and VDSL profiles; see DLP 129.
2 Enable the modification by changing the value of the parameter transfer-mode from
atm to ptm with the following command:
Note — The existing interfaces on top of the xDSL line (such as pvc,
bridge port and so on) will be automatically removed.
3 Create the new forwarding model. Refer to DLP 115 to DLP 127 for the correct
procedure for the different modes.
Configuration example:
Purpose
This procedure provides the steps to create an IPoA cross-connect user.
Prerequisites
The following prerequisites must be fulfilled before an IPoA cross-connect user can be
created:
Procedure
Proceed as follows to create an IPoA cross-connect user:
Configuration example:
Purpose
This document describes the procedure to configure the system management IP
parameters.
Prerequisites
Communities must be configured on the SHub. The following commands give an
example:
Procedure
Proceed as follows to configure the system management IP parameters:
1 Configure the system to use a single IP address with the following command:
4 Configure the network port management (inband or outband) with the following
command:
----------------------------------------------------------------
vlan parameters
----------------------------------------------------------------
configured-vlans : 16 management : inband
================================================================
port table
================================================================
port admin-status oper-status speed type duplex
----------------------------------------------------------------
1 down down one-gb unused full
----------------------------------------------------------------
5 Specify the set of ports which are statically allocated as egress ports for the SHub
management VLAN with the following command:
6 Specify the egress ports which should transmit packets for the SHub management
VLAN as untagged with the following command:
Configuration example:
Configuration example for dynamic configuration via BOOTP (for tagged network):
Configuration example for static configuration via manual configuration (for tagged
network):
Purpose
This procedure provides the commands for performance monitoring on the NE.
Procedure
The following steps can be used for performance monitoring:
show la network-port-info
11 Use the following command to show the IP SHub ARP Statistics per VRF forwarding
statistics:
12 Use the following commands to show the DHCP relay port counters and the
statistics of DHCP relay agent per VRF:
16 Use the following command to show the statistics related to the SNMP protocol:
21 Use the following command to show the statistics related to CPE management:
Configuration example:
show la aggregator-info
show la aggregate-list
show la network-port-info
show ip vrf-statistics
Purpose
This DLP provides the steps to configure rack, shelf, and slot IDs for SFP downlink ports
on a GENC-E or GENC-F card installed in a 7330 ISAM FTTN ARAM-D host shelf in
expansion configurations.
General
Downlink SFP ports on a GENC-E or GENC-F card installed in a host shelf are
configurable using CLI. You can set the rack, shelf, and slot ID for each downlink port.
For the 7330 ISAM FTTN ES, the SFP port settings must match the shelf jumper settings
of the connected ES and the slot number must match the number of the LT slot in which
the connected remote LT unit is installed. The 7330 ISAM FTTN SEM derives its rack and
shelf IDs from the SFP port.
Figure DLP 177-1 shows the downlink port assignments on the faceplate of the GENC-E
card. The port assignments for the GENC-F card are identical.
11
13
15
17
ACU
11
13
15
17
5
7
9
10
12
14
16
4
Port
Rx
Tx
4
6
8
10
12
14
16
Each SFP port must have a unique rack, shelf, and slot ID. The host shelf is always
assigned to rack 1, shelf 1 in an expansion configuration. As such, the rack, shelf, and
slot combination used for SFP ports cannot be on the host shelf; for example, do not
assign rack 1, shelf 1, slot 1 to an SFP port.
• if you connect a SEM directly to downlink ports 8, 9, or 10, the SEM is automatically
assigned rack 3, shelf 1, 2, or 3 respectively without requiring configuration; however,
you are still required to configure the slot number for the SFP port
• to use any downlink port other than ports 8, 9, and 10, you must configure a rack,
shelf, and slot ID for those downlink ports
• use only rack 3
• the slot number is always slot 4
• up to three shelves are supported in a rack
• shelf jumper settings override the default rack and shelf assignments of downlink
ports 8, 9, and 10.
• you are required to configure the rack, shelf, and slot ID for each SFP port to which
an ES is connected
• if the SFP port is preplanned using CLI, you must set the shelf jumpers to match and
connect the corresponding remote LT unit
• use only racks 1 and 2
• the slot number is the LT slot on the ES that contains the remote LT unit connected
to the downlink port
• up to three shelves are supported in a rack
If the rack and shelf assignment for a downlink port is already configured using CLI and
you connect a remote LT unit from an ES that has a different rack and shelf jumper
setting, an alarm is raised and the remote LT unit does not come in to service. If you
connect a remote LT unit from an ES to downlink ports 8, 9, or 10 after a SEM unit was
previously connected and commissioned, an alarm is raised and the remote LT unit does
not come in to service.
Do not change shelf and rack ID assignments using CLI after remote expansion units are
connected and operational. Service disruptions will result and an alarm is raised. Service
and port configurations are mapped to the optical expansion link. All affected port and
service configurations will require reconfiguration.
See 7330 ISAM FTTN Product Information for more information about expansion
configurations and configurable SFP ports.
See TNG 106 for more information about rack and shelf assignments for remote
expansion units.
Procedure
Proceed as follows to configure the rack, shelf, and rack IDs for an SFP port on a
GENC-E or GENC-F card.
1 Configure the traffic direction of the two configurable external-links on the host
expansion card with the following command:
3 View actual rack, shelf, and slot settings of the connected remote LT unit:
Configuration example:
Purpose
This procedure provides the steps to configure a default security domain to be used in
case PPP clients do not provide a domain name.
Prerequisites
The following prerequisites must be fulfilled before a default security domain can be
created:
Procedure
Proceed as follows to configure the default security domain:
Configuration example:
Purpose
Use this DLP to configure system logging (SYSLOG).
General
There are three main tasks you can perform using CLI when configuring system logging:
The NE supports up to 64 system log files and up to 64 remote system log servers. You
can enable or disable logging for all system logs and view system-wide information for
system logs.
You can view system-wide information for local system logs, such as the maximum
message size allowed and statistics about how much combined disk space the local
system logs utilize. System-wide information for local system log files are displayed using
the show CLI command and can be displayed in four different formats.
You can create and configure up to 64 system logs. The combined maximum size of all
locally saved system log files is 2 Mbytes. For each system log file, you can set the
method of cycling messages when the system log file is full. Cycling of system log
messages is performed in one of two ways: wrap new entries to overwrite the oldest
entries, or discard all new entries.
You can configure the following parameters for each system log file:
• system log filename (local only), entered using up to eight alphanumeric characters
followed by a dot separator and a three-alphanumeric character extension; for
example, Alrmhigh.txt
• destination server type:
• all active TL1 and CLI terminals (all-users)
• all active CLI terminals (all-CLI)
• all active TL1 terminals (all-TL1)
• single active Tl1 terminal (tl1-user)
• local file (file:name:size)
• remote host (udp:port:serv-ip-addr)
• destination server address, entered as an alphanumeric host name or in standard dot
format (maximum value 255.255.255.255); where 0.0.0.0 is entered for local files
• action taken when the system log file is full (wrap or discard)
• activate and deactivate logging
• delete a system log file
• view the configuration of a system log file
By default, all message types are logged to the system log files. In addition, alarms
generated in the system and the errors encountered are logged to the system log files.
You can configure filters to define which messages get logged to which system log file
based on message type.
Table DLP 179-1 lists the possible message type and log severity parameters. You can
select which messages are sent to specific system log files using filters and can group
multiple message types.
(1 of 2)
Alert AL
Critical CR
Error ER
Warning WN
Notice NO
Information IN
Debug DBG
(2 of 2)
When activating or deactivating system logs, you must specify the following information:
The index number is an integer from 1 to 64. Use the information command to view the
settings of a system log file before entering the message type and log severity of the
system log file to activate or deactivate.
To monitor remote system logs dynamically, set the destination server type to all active
CLI or all active TL1 terminals for a particular system log. This sends all messages to the
active terminals that have a management session with the NE. When you are done
monitoring, deactivate system logging for that server. You can view the static contents of
a system log file that is saved to a remote server location using any text-based editor.
You can also configure system and security logging using TL1 or SNMP. See the
7302 ISAM | 7330 ISAM FTTN TL1 Commands and Messages or the latest MIB for more
information.
Procedure
Proceed as follows to configure system logs:
1 View system-wide information for local system logs with the following command:
Where:
Type is how to display the information, which can be either detail, hierarchical, flat, or xml.
2 Create the system log and set the system log filename and configure the destination
server type with the following command:
4 Configure which messages must be sent to a given system log destination and
assign the appropriate system log parameters to them with the following command:
6 Retrieve the configuration of a specific system log with the following command:
7 Retrieve the configuration for all configured system logs with the following
command:
Configuration example:
Purpose
The operator can specify entries in the layer 2 filtering database for a specific VLAN and
unicast MAC address. This information is used by the bridge to determine how to
propagate a received frame.
This document describes the commands to configure static MAC addresses in the NE.
Prerequisite
The following prerequisite must be fulfilled before static MAC addresses can be
configured:
• A VLAN must exist; see DLP 117, DLP 118, DLP 119 or DLP 120.
• The board must have been planned; see DLP 111.
• xDSL profiles must have been created; see DLP 129.
Procedure
Proceed as follows to configure static MAC addresses:
2 Configure a static MAC address on the SHub with the following command:
Configuration example:
Purpose
This procedure provides the steps to configure the authentication for an operator via
RADIUS.
Note — This procedure can be used for the default superuser isadmin.
Procedure
Proceed as follows to configure operator authentication via RADIUS:
5 Enable the RADIUS for the superuser with the following command:
Configuration example:
Purpose
This procedure provides the steps for configuring SHDSL links.
Procedure
Proceed as follows:
2 Manage the SHDSL unit profile in one SHDSL span with the following command:
3 Configure the SHDSL segment points on either side of an SHDSL unit with the
following command:
Configuration examples:
The first configuration example is for 4-wire Multi-pair bonding, the second
configuration example is for IMA and the third configuration example is for EFM
(4-wire EFM, no bonding).
Purpose
This procedure provides the steps for configuring Inverse Multiplexing for ATM (IMA).
Prerequisite
The following prerequisite must be fulfilled before IMA can be configured on SHDSL links:
• the SHDSL links must have been created (and have operational mode ima); see
DLP 182.
Procedure
Proceed as follows:
3 Activate the IMA line interface with one of the following commands:
Configuration example:
Purpose
This DLP provides the steps to convert the NE from single to dual IP address mode, or
from dual to single IP address mode.
General
The EMS (5526 AMS or 5523 AWS) supports the creation of an NE using a single IP
address for the NE only or dual IP addresses for the NE and SHub. After you have
created the NE and configured it to use a single or dual IP address, you can convert the
node from single to dual IP address mode, or from dual to single IP address mode, using
the CLI commands in this DLP. SNMPv3 is only supported in single IP address mode.
You cannot convert a system configured with SNMPv3 to dual IP mode.
Before you perform the steps in this DLP, you must have already set up the NE for EMS
(5526 AMS or 5523 AWS) management and have configured the system for single or
dual IP address mode.
Note — You can lose communication with the NE when you change the
IP address. To ensure that the connection is maintained, perform these
procedures from the craft port.
Prerequisites
The NE must be administered by the EMS (5526 AMS or 5523 AWS).
Procedure
Proceed as follows to convert the IP address mode on the NE:
4 Go to step 12.
5 Remove the single IP address mode configuration with the following command:
6 Change the administrative status of the management vlan on the SHub to “down”
with the following command:
7 Configure the new IP address to the management vlan on the SHub via the following
command:
8 Change the administrative status of the management vlan on the SHub to “up” with
the following command:
9 Configure the default route in the SHub with the following command:
10 Configure the SHub filter (access list) with the following command:
11 Configure the SNMP SHub community string with the following command:
Configuration example:
The following example shows the procedure to convert from dual to single IP
address:
The following example shows the procedure to convert from single to dual IP
address:
Purpose
Currently, Network Access Control Protocol (NACP) is only supported on top of TCP/IP.
The NE does not reply to requests for a TCP connection from an “unknown” BNG.
This means:
• If the TCP Retry Timer is zero, the NE will not start the TCP connection.
If the TCP Retry Timer is not zero, the NE will start the setup of a TCP connection to
the BNG whose IP address has been configured.
• If the GSMP Retry Timer is zero, the NE will not start the GSMP Adjacency Protocol,
but instead be prepared to handle GSMP Adjacency Protocol messages from that
BNG.
If the GSMP Retry Timer is not zero, the NE starts the GSMP Adjacency Protocol in
addition to being prepared to handle GSMP Adjacency Protocol messages from that
BNG.
Procedure
Proceed as follows to configure an NACP session:
1 Configure the NACP session parameters for a given session ID with the following
command:
Configuration example:
Purpose
The DHCP MAC concentration functionality is only provided in forwarder mode. When the
DHCP MAC concentration is enabled, Option 82 must be configured.
Activating the MAC address concentration feature of DHCP has the following impacts:
Procedure
Proceed as follows to configure the DHCP MAC concentration:
1 Add DHCP option to the forwarder VRF on the LT with the following command:
Configuration example:
Purpose
This procedure provides the steps to specify VLAN parameters which are globally
applicable to VLANs:
• broadcast-frames:
This parameter determines whether broadcast frames must be switched for each
VLAN.
This parameter applies to iBridge VLANs.
• priority-policy:
This parameter specifies how to deal with ethernet priority of the upstream frames.
This parameter applies to iBridge VLANs, cross-connect VLANs and QoS-aware
VLANs.
Procedure
Proceed as follows to configure the general VLAN parameters:
configure vlan
(no) broadcast-frames
priority-policy <Vlan::PriorityMap>
(no) pvid-usage <Vlan::PvidUsage>
Configuration example:
Purpose
Many operators tend to have locations where copper binders have pairs coming from a
CO and pairs coming from a remote cabinet. When the remote cabinet locations get
broadband enabled this often creates spectral compatibility issues in the network: the
strong ADSL signal coming from the remote cabinet creates strong cross talk to the weak
signal coming from the CO. This results in a very unstable line for the one connected to
the CO.
To resolve this, a custom Power Spectral Density (PSD) shape is configurable via the
xDSL spectrum profile. A custom defined PSD allows:
• ADSL2+
• VDSL
• VDSL2
Customized PSD points can be configured while creating a new spectrum profile (see
DLP 129) or by modifying an existing spectrum profile (see DLP 163).
The commands below help the operator to enter the custom PSD shape in a user-friendly
way. Instead of entering octets, the operator can enter numbers corresponding to
frequency and PSD.
See the CLI Commands and Messages document and also TNG 107 for a full description
of all related parameters.
Procedure
Proceed as follows to configure custom PSD points:
ii Configure the PSD for ADSL2+ as custom PSD with the following command:
iv Go to step 8
ii Configure the downstream PSD for VDSL as custom PSD with the following
command:
iii Configure the downstream PSD scale and type with the following command:
v Go to step 8
ii Configure the upstream PSD for VDSL as custom PSD with the following
command:
iii Configure the upstream PSD scale and type with the following command:
v Go to step 8
ii Configure the downstream PSD for VDSL2 as custom PSD with the following
command:
iii Configure the downstream PSD scale and type with the following command:
v Go to step 8
ii Configure the upstream Rx PSD for VDSL2 as custom PSD with the following
command:
iii Configure the upstream Rx PSD scale and type with the following command:
v Go to step 8
ii Configure the upstream PSD for VDSL2 as custom PSD with the following
command:
iii Configure the upstream PSD scale and type with the following command:
Configuration examples:
Purpose
This procedure provides the steps to configure virtual noise values for VDSL2, both in
downstream and upstream direction.
The commands below help the operator to enter the virtual noise values in a user-friendly
way. Instead of entering octets, the operator can enter numbers corresponding to
frequency and PSD.
Procedure
Proceed as follows to configure virtual noise values for VDSL2:
1 Configure the virtual noise values in downstream direction with the following
command:
2 Configure the virtual noise values in upstream direction with the following command:
Configuration example:
Purpose
This document provides the necessary steps to configure Threshold Crossing Alerts
(TCA).
Note — Ensure that the TCA alarm is set to reporting and has a severity
equal to or greater than the non-itf-rep-sev-level; see DLP 110.
Prerequisites
The following prerequisites must be fulfilled before a TCA can be configured:
Procedure
Proceed as follows to configure and enable a TCA:
Configuration example:
Purpose
This procedure provides the steps to specify the tagging mode globally applicable to
SHub VLANs.
When the dual tag mode is set, the SHub works as a stacked-VLAN bridge.
Procedure
Proceed as follows to configure dual tagging mode:
1 Set the dual tag mode in the SHub with the following command:
2 Disable the dual tag mode in the SHub with the following command:
Configuration example:
Purpose
This procedure provides the steps required to configure the S-VLAN to be used for
IPProxy CPE Management
Prerequisites
The following prerequisites must be fulfilled before IPProxy CPE management can be
configured:
Procedure
Proceed as follows to configure IPProxy CPE management:
1 Create the S-VLAN to be used for IPProxy CPE management in the system with the
following command:
2 Associate the S-VLAN created with the IPProxy CPE management function with the
following command:
4 Associate the S-VLAN created in the SHub with the IPProxy CPE management
function with the following command:
Configuration example:
Purpose
This procedure provides the steps required to enable IPProxy CPE Management
Prerequisites
The following prerequisites must be fulfilled before IPProxy CPE management can be
enabled:
Procedure
Proceed as follows to enable IPProxy CPE management:
Configuration example:
Purpose
In order to be able to use Telnet or TFTP to manage a CPE connected to an LT port, a
IPProxy CPE management session has to be configured first.
This procedure provides the steps to configure an IPProxy CPE Management session.
Prerequisites
The following prerequisites must be fulfilled before IPProxy CPE management session
can be configured:
• The IPProxy CPE Management S-VLAN must have be configured; see DLP 192
• The IPProxy CPE Management S-VLAN function must have be enabled; see
DLP 193
• The LT to which the CPE is connected must be planned and unlocked; see DLP 111
and DLP 112 respectively.
• xDSL profiles must have been created; see DLP 129.
Procedure
Proceed as follows to configure a IPProxy CPE management session:
1 Configure the xDSL line to which the CPE is connected with the following command:
3 Add the SHub LT port to which the CPE is connected to the IPProxy CPE
Management S-VLAN (if not already added) with the following command:
4 If the NT type is not of type ECNT-C, add the SHub NT port to the S-VLAN (if not
already added) with the following command:
5 Configure the SC-VLAN to be used for this session. In this step, the CVlanIndex
given must be calculated as follows based on the LT port on which the IPProxy
session must be configured:
where:
LT slot# has the range [1..16] (1 for left most LT slot on rack 1, shelf 1 and 16 for the last LT slot on
rack 1, shelf 1)
LT port# has the range [1..48] (1 for the first LT port and 48 for the last LT port).
6 Configure the PVC for this session with the following command:
7 Configure an IPoA cross-connect for this session with the following command:
8 Configure a bridge port for this session with the following command:
9 Configure the SC-VLAN on the bridge port with the following command:
10 Configure a PVID on the bridge port as the SC-VLAN with the following command:
where the connection parameter can be optionally specified as an unused (that is, unused by any
other session) port in the range [13410..13457] or omitted. If omitted, the system will automatically
assign a free connection port.
Configuration example:
Purpose
This procedure provides the steps to configure the system parameters for all bridge ports.
Procedure
Proceed as follows to configure the system parameters for all bridge ports:
1 Configure specify the aging time for dynamically learned MAC addresses in the
filtering database of the LT with the following command:
configure bridge
ageing-time <Vlan::AgingTime>
2 Configure specify the aging time for dynamically learned MAC addresses in the
filtering database of the SHub with the following command:
3 Configure specify the MAC learning states with the following command:
Configuration example:
Purpose
This document provides the steps to configure the Voice Session Initiation Protocol (SIP).
Prerequisite
The following prerequisite must be fullfilled before Voice SIP can be configured:
Procedure
Proceed as follows to configure Voice SIP:
1 Manage the Voice SIP server profile with the following command:
Note — The parameter server_type is not visible when a new Voice SIP
server profile is created, but only when an existing profile is modified.
2 Manage the Voice SIP dial plan profile with the following command:
a by DHCP: go to step 4
b manually: go to step 6
4 Configure the Voice SIP user agent profile management by DHCP with the following
command:
5 Go to step 7.
6 Configure the Voice SIP user agent profile mangement manually with the following
command:
7 Manage the Voice SIP dial plan digitmap with the following command:
8 Manage the Voice SIP termination profile with the following command:
9 Manage the Voice SIP port Local Loop Unbundling with the following command:
Note — This command can only be used when ALTS-U subracks are
being used.
Configuration example:
Purpose
This procedure provides the commands for viewing the configuration and operational
data of ports on the NE.
Procedure
The following commands can be used for viewing the configuration and operational data
of ports:
Configuration example:
Purpose
This procedure provides the steps to configure multicast on the SHub (general
parameters, capacity and source table) on the NE.
Prerequisites
The following prerequisites must be fulfilled before multicast on the SHub can be
configured:
Procedure
Proceed as follows to configure multicast on the SHub:
1 Configure the multicast related parameters applicable to the SHub with the following
command:
2 Configure entries in the IP multicast table for the SHub with the following command:
3 Configure the ports to which the traffic related to the specified multicast IP address
will be forwarded with the following command:
Configuration example:
Purpose
This procedure provides the steps to configure QoS on the SHub.
Note — For more information about QoS and the configuration of QoS,
refer to TNG 101.
Prerequisites
The following prerequisites must be fulfilled before QoS on the SHub can be configured:
• The egress port must have been added to the VLAN; see DLP 128.
Procedure
Proceed as follows to configure QoS on the SHub:
1 Configure the queues on the SHub ports with the following command:
2 Configure the traffic classes on the SHub with the following command:
3 Configure the mapping of the DSCP value to the 802.1p value with the following
command:
4 Configure the ingress policing parameters on SHub port with the following
command:
Configuration example:
Purpose
This procedure provides the steps to back up the NT database.
The SHub database can be saved manually with the following command:
General
The TFTP daemon on the AWS assumes a default home directory
/var/opt/aws/equipment.
This means that all the TFTPs initiated from the NE result in a file written relative to this
point.
• dm_complete.tar
• dm.tar: This is the dm_complete.tar without the management data
Prerequisite
An empty file dm_complete.tar must exist in the specified path on the TFTP server before
the upload is started. Otherwise, the upload will fail (error “upload-error:file-not-found”).
Create the dm_complete.tar file on the TFTP server with the following commands
($ prompt is regular user, # prompt is superuser):
$ su
# cd /var/opt/aws/equipment/temp (*)
# touch dm_complete.tar
# exit
Procedure
Proceed as follows to back up the NT database:
2 Back up the NT database (and SHub database) with the following command:
3 View the status of the database upload process and, in case of an upload failure,
the reason, with the following command:
Configuration example:
sleep 100
sleep 100
Purpose
This procedure provides the steps to restore the NT database (and SHub database).
Procedure
Proceed as follows to restore the NT database:
2 View the status of the database download process and, in case of an download
failure, the reason, with the following command:
Configuration example:
sleep 60
Purpose
This procedure provides the steps to retrieve and show the remote inventory information.
Table RTP 102-1 describes the RI information that is shown.
RI information Description
inventory-fpba The Alcatel Printed Board Assembly code of the board, which also identifies the
boot software
Procedure
Proceed as follows to retrieve and show remote inventory information:
Configuration example:
Purpose
This procedure provides the steps for Metallic Test Access (MTA) using TL1 commands.
NTIO
Power
TL1 gateway Test Head
-48v
installed NT LT
Computer/WS Lab
(Median Device Network
software installed) SHub
Computer
(test head
Software installed)
• ACT-USER command
• CONN-LPACC-MET command
• CONN-TACC-MET command
• CHG-SPLIT command
• CONN-MON command
• DISC-TACC command
• REPT-STAT command
• REPT-INITZN command
• REPT-OPSTAT-TACC command
• CANC-USER command
ACT-USER Command
Command Syntax
ACT-USER:[tid]:uid:[ctag]::pid;
Command Description
Configuration Example
ACT-USER::SUPERUSER:::PASWD;
CONN-LPACC-MET Command
Command Syntax
CONN-LPACC-MET:[tid]:aid_circuit:[ctag]::[tap]:[configrn];
Command Description
This command controls TAP selection, access point designation, and TAP loop around
for the remote test unit to calibrate for the next test.
Configuration Example
CONN-TACC-MET Command
Command Syntax
CONN-TACC-MET:[tid]:[tap]:[ctag];
Command Description
It also removes the TAP loop around and connects the appropriate TAP lead pair to the
access point.
Configuration Example
CONN-TACC-MET:LAB:1:;
CHG-SPLIT Command
Command Syntax
CHG-SPLIT:[tid]:[tap]:[ctag];
Command Description
This command instructs the NE to provide the necessary connection to the TAP and split,
at the access point, the pair or pairs specified by the access command of the circuit under
test.
Use this command to provide access to the lead pair in order to induce TDR testing.
Configuration Example
CHG-SPLIT:LAB:1:;
CONN-MON Command
Command Syntax
CONN-MON: [tid]:[tap]:[ctag];
Command Description
This command is used to establish a monitor state without having to re-access the circuit
under test. Use this command to get from the SPLIT mode to MONITOR mode.
Configuration Example
CONN-MON:LAB:1:;
DISC-TACC Command
Command Syntax
DISC-TACC:[tid]:[tap]:[ctag];
Command Description
This command causes the NE to restore the circuit under test to its through state and
release all TAP connections to that access point.
Configuration Example
DISC-TACC:LAB:1:;
REPT-STAT Command
Command Syntax
REPT-STAT:[tid]::[ctag];
Command Description
This command is sent from the OS to the RTU or the NE to check that the link between
them is in operation. Additionally, if the NE does not receive this command from the OS
or the RTU for a period of 75 seconds, it shall release any access at the TAP.
Configuration Example
REPT-STAT:LAB::;
REPT-INITZN Command
Command Syntax
REPT-INITZN:[tid]::[ctag];
Command Description
As input command, it is sent from the OS to the RTU or NE to indicate the OS has
initialized. The RTU and NE will disconnect any accesses that are up at the request of
the OS sending this command.
If the RTU initializes, this command is sent to all NE's providing test access causing the
accesses to release.
If the NE initializes, this input command will be send to the RTU providing test access
causing the RTU to release all resources.
Configuration Example
REPT-INITZN:LAB::;
REPT-OPSTAT-TACC Command
Command Syntax
REPT-OPSTAT-TACC:[tid]:[tap]:[ctag];
Command Description
This command reports the status of the test access port (TAP).
Configuration Example
REPT-OPSTAT-TACC:LAB:1:;
CANC-USER Command
Command Syntax
CANC-USER:[tid]:[uid]:[ctag];
Command Description
This command terminates the user session and releases all TAP resources on the NE.
Configuration Example
CANC-USER: LAB::;
Purpose
This procedure provides the steps to perform an F5 loopback end-to-end test on the NE.
Procedure
Proceed as follows to perform an F5 loopback test:
Configuration example:
Purpose
This procedure provides the steps to perform equipment repair on the NE.
Procedure
Proceed as follows to perform equipment repair tasks:
3 Pull out equipment; see the XD Modular Hardware Installation Manual for the 7302
ISAM or the Hardware Installation and Maintenance Practices for the 7330 FTTN.
Note — The NE does not keep time while the card is unplugged from the
shelf. In order for the time to be synchronized when the card boots up, it
must be set to use SNTP time synchronization with the management
station. See DLP 103.
4 Replan equipment (for example, plug-in units); see DLP 111.
5 Plug in equipment; see the XD Modular Hardware Installation Manual for the 7302
ISAM or the Hardware Installation and Maintenance Practices for the 7330 FTTN.
General Description
Single Ended Line Testing (SELT) is a modem based feature which allows to measure
loop characteristics between the U-C and U-R interface. No CPE modem is to be
connected. SELT will help in cooperation with a centralized Network Analyser (NA) for
loop pre-qualification and maintenance of the network.
Purpose
This TAP provides steps to use the EMS (5526 AMS or 5523 AWS) or CLI to isolate a
problem indicated by an alarm.
General
Resolve alarms that affect service before the alarms that do not affect service.
Use alarm information obtained from the EMS Event Viewer during analysis. Use the TL1
or CLI autonomous messages generated during trouble locating and additional data,
such as visual or audible alarms, when available. Service states should also be
considered.
See the CLI Commands document for information on CLI syntax. See the TL1
Commands and Messages document for information on TL1 syntax.
Several of the protocols in this TAP may require the assistance of someone familiar with
UNIX systems and commands. Many of the UNIX troubleshooting protocols and most of
the UNIX commands require root access. If this is the case, Alcatel recommends that a
UNIX system administrator perform the troubleshooting.
Alarms are grouped by alarm type in Table TAP 104-1 and each alarm has the following
parameters listed in the order they appear in the table:
Except where otherwise specified, the report and logging modes for each alarm are
enabled.
Procedure
Use this procedure to isolate a fault indicated by an alarm.
a To access the alarms using the 5526 AMS, see NTP 111 — Manage alarms
and events in the 7330 ISAM FTTN Operations and Maintenance Using the
5526 AMS guide.
b To access the alarms using 5523 AWS, see Chapter 3 — AWS Admin
overview in the 5523 AWS ADMIN User Guide.
c To access the alarms using CLI, see NTP 115 — Monitor alarms in the
7330 ISAM FTTN Operations and Maintenance Using CLI guide.
Note — If multiple alarms are present, resolve alarms in the order listed
below:
• Critical (red)
• Major (orange)
• Minor (yellow)
3 Use Tables TAP 104-1 and TAP 104-2 to help you determine the cause of the alarm
and the appropriate action for resolving the alarm. Alarms are grouped by type. You
can use the class column of the table to help locate an alarm in the table. Some
alarms are not currently supported.
Note — Tables TAP 104-1 and TAP 104-2 list in parentheses the alarm
names as they appear for the CLI configure command. Alarm names as
they appear in the CLI show alarm commands are slightly different.
Table TAP 104-1: Alarm definitions for the 7302 ISAM and the 7330 ISAM FTTN
Alarm type = Equip (1); Index1 = eqptHolderld (index in equipment holder Table), Index22 = not used
0 — — — — No defects ✓ ✓
1 Persistent data loss Equip Critical ✓ System has lost all persistent data after ✓ ✓
(persist-data-loss) RESTART. System is not configured.
2 SNTP server not Equip Major — The SNTP server does not respond to ✓ ✓
responding the requested messages.
(sntp-comm-lost)
4 NT disk 90% full Equip Major — The NT disk has reached a 90% full ✓ ✓
(nt-disk-90%full) level.
5 System clock not using Com Major ✓ The system is configured to work in ✓ ✓
preferred timing mode autonomous mode with both timing
(preferred-mode) modes allowed and is not using the
preferred timing mode because all timing
references corresponding to the
preferred timing mode are in failure.
8 Communication lost with Equip Critical ✓ The NT cannot communicate with the ✓ ✓
SHub (shub-loc) SHub.
25 Back panel type invalid Equip Major — The NEP back panel type read from ✓ —
(back-pnl-inv) SMAS case is an unknown type.
28 SHub configuration loss Equip Critical ✓ The SHub configuration saved on the NT ✓ —
(lost) unit differs from the current SHub
configuration. The last changes on the
SHub database (in between two
configuration save actions) were lost due
to a subsystem reset.
Alarm type = EquipHolder (2); Index1 = eqptHolderId (Index in equipment holder table), Index2 = not used
0 No defects — — — — ✓ ✓
(1 of 17)
2 Rack fan unit 1 alarm Equip Major — Fan unit 1 in rack is failing. ✓ —
(rack-fan-unit1)
3 Rack fan unit 2 alarm Equip Major — Fan unit 2 in rack is failing. ✓ —
(rack-fan-unit2)
7 Shelf-type mismatch Equip Minor — Shelf detected, but its actual shelf type is ✓ ✓
alarm unknown or it differs from the planned
(shelf-type-mismatch) shelf type.
9 Shelf missing alarm Equip Major ✓ Shelf is planned, but no shelf detected. A — ✓
(shelf-missing) shelf has been detected at least once
since it was planned.
Alarm type = EquipHolder (2); Index 1 = eqptHolderId (index in equipment holder table to identify a shelf), Index 2 =
not used
0 No defects — — — — ✓ ✓
18 Single fan failure Equip Major — One or more of the shelf’s fans has — ✓
(single-fan-fail) failed.
19 Double fan failure Equip Critical ✓ Two or more fans in the ARAM-D shelf — ✓
(double-fan-fail) have failed, or the fan tray was removed.
The shelf on which the failure occurred
automatically powers down after
approximately 2 min. (2)
The shelf can be a standalone, a host, or
an expansion shelf.
20 System ac power failure Envir Critical ✓ The shelf will shut down in 15 min. — ✓
(ac-power-fail) This alarm is externally provided.
Alarm type = PlugInUnit (3); Index1 = eqptSlotId (index in equipment Board Table), Index2 = not used
0 No defects — — — — ✓ ✓
3 Board-type mismatch Equip Minor — Unit detected, but its actual unit type is ✓ ✓
alarm (1) unknown or it differs from the planned
(board-mismatch) unit type. This alarm applies to all unit
types: NT, LSM, and ACU units.
(2 of 17)
4 Waiting for software Equip Major — This alarm is raised when the system ✓ ✓
(sw-download) cannot download all the applicable
software files (supported by the active
OSWP) towards the unit. The following
situations can be distinguished:
• The extender/LSM unit belongs to a
unit type that the active OSWP does
not support.
• The detected LSM unit belongs to a
unit type that the active OSWP
supports. However, one or more of
the applicable SW files are no longer
available on the file disk of the NT
unit.
8 Temperature exceeded Equip Major — The temperature threshold on the unit is ✓ ✓
(temperature) exceeded. This alarm applies to NT and
LSM units.
12 Temperature shutdown Equip Major ✓ The unit has powered off as a result of ✓ ✓
alarm temperatures that are too high. This
(temp-shutoff) alarm applies only to LSM units.
13 Defense alarm Equip Critical ✓ The plug-in unit is disconnected from the ✓ ✓
(defense) system as a means of defense. The
reason for disconnecting depends on the
plug-in unit type and the cause of the
failure:
LSM: disable or power down
14 Board missing alarm (1) Equip Major ✓ Unit is planned, no unit is detected, but a ✓ ✓
(board-present) unit has been detected at least once
since it was planned. This alarm applies
to all unit types: NT, EDSE-A, SATU-A,
LSM, and ACU units.
15 Board installation Equip Minor — Unit is planned, no unit is detected, and ✓ ✓
missing alarm (1) no unit has ever been detected since it
(board-inserted) was planned. This alarm applies to all
unit types: NT, LSM, and ACU units.
17 Board reset protection (1) Equip Major ✓ The number of unit resets within a ✓ ✓
(number-of-resets) certain timeframe exceeded the
threshold. This alarm applies only to
LSM units.
28 SEM external power Equip Critical ✓ Power to the external power supply — ✓
failure (sem-power-fail) failed. SEM is running on battery power.
29 SEM external power Equip Critical ✓ External SEM power supply or the — ✓
supply failure batteries failed. The external AC power
(sem-ups-fail) supply can still provide power, but needs
to be checked to ensure uninterruptible
power service.
30 Board reset or Equip Major ✓ The LT unit has reset (alarm ON followed — —
communication failure (1) by alarm OFF), or there is a
(board-reset-cf) communication failure (alarm ON).
(3 of 17)
31 SHub uplink breakdown Equip Critical ✓ The SHub uplink is broken. The alarm is — —
(shub-uplink) forwarded to the NT, then to the ACU.
Alarm type = ATM (8); Index1 = ifIndex (of ATM physical port), Index2 = see specific alarm number
0 No defects — — — — ✓ ✓
2 Cell discarded in the QoS Minor ✓ ATM cell discarded in the upstream ✓ ✓
upstream direction direction.
(cell-discard-up) Index2 = VPI/VCI
Report mode = disabled
Logging mode = disabled
3 Cell discarded in the QoS Minor ✓ ATM cell discarded in the downstream ✓ ✓
downstream direction direction.
(cell-discard-down) Index2 = VPI/VCI
Report mode = disabled
Logging mode = disabled
6 Duplicate MAC address Com Minor ✓ Duplicate MAC address from this PVC ✓ ✓
from this pvc (the port with the latter coming MAC
(mac-conflict) address caused the conflict).
Detailed information, such as the
conflicting MAC address and the port on
which the MAC address was first
learned, can be retrieved with the
diagnostics tool. (3)
Index2 = VPI/VCI
Report mode = disabled
Alarm type = CustomizableAlarm (10); Index1 = Rack_ID (position of the rack, range 0 to 5), Index2 = not used
0 No defects — — — — ✓ —
Alarm type = CustomizableAlarm (10); Index1 = eqptHolderID (shelf index in equipment holder table), Index2 = not
used
0 No defects — — — — ✓
(4 of 17)
Alarm type = IMA-group (13)l Index1 = IfIndex (of IMA-group), Index2 = not used
0 No defects — — — — ✓ ✓
Alarm type = IMA-link (14); Index1 = IfIndex (of IMA-link), Index2 = not used
0 No defects — — — — ✓ ✓
Alarm type = Redundancy (20); Index1 = not used, Index2 = not used
0 No defects — — — — ✓ ✓
1 Switchover capability Equip Major The switchover capability in a redundant ✓ ✓
lost (loss-swo-cap) system has been lost.
Alarm type = EthItf (24); Index1 = ifIndex (of Ethernet port), Index2 = see specific alarm number
0 — — — — No defects ✓ ✓
Alarm type = SwMgnt (29); Index1 = eqptSlotId (index in equipment board table for the NT), Index2 = not used
0 No defects — — — — ✓ ✓
1 Implicit software rollback Proc Major ✓ The system cannot make the NotActive ✓ ✓
(sw-rollback) OSWP and linked database operational
(although no error in the database is
detected). The system performs an
implicit rollback to the previous active
OSWP (and linked database).
2 Implicit database Proc Major ✓ The system cannot make the selected ✓ ✓
rollback OSWP and linked database operational
(db-rollback) (an error is detected in the linked
database). The system comes up with
the selected OSWP and the previous
linked database (if possible).
Alarm type = TmpFilter (34); Index1 = 0, Index2 = 0 Remark: These values are inherited from the related basic alarm
0 No defects — — — — ✓ ✓
1 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp1) Logging mode = disabled
2 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp2) Logging mode = disabled
(5 of 17)
3 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp3) Logging mode = disabled
4 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp4) Logging mode = disabled
5 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp5) Logging mode = disabled
6 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp6) Logging mode = disabled
7 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp7) Logging mode = disabled
8 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp8) Logging mode = disabled
9 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp9) Logging mode = disabled
10 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp10) Logging mode = disabled
11 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp11) Logging mode = disabled
12 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp12) Logging mode = disabled
13 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp13) Logging mode = disabled
14 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp14) Logging mode = disabled
15 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp15) Logging mode = disabled
16 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp16) Logging mode = disabled
17 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp17) Logging mode = disabled
18 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp18) Logging mode = disabled
(6 of 17)
19 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp19) Logging mode = disabled
20 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp20) Logging mode = disabled
21 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp21) Logging mode = disabled
22 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp22) Logging mode = disabled
23 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp23) Logging mode = disabled
24 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp24) Logging mode = disabled
25 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp25) Logging mode = disabled
26 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp26) Logging mode = disabled
27 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp27) Logging mode = disabled
28 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp28) Logging mode = disabled
29 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp29) Logging mode = disabled
30 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp30) Logging mode = disabled
31 Derived alarm for Com Indeter- — Derived alarm for temporal filter. ✓ ✓
temporal filter minate Report mode = disabled
(der-temp31) Logging mode = disabled
0 No defects — — — — ✓ ✓
1 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa1) minate Report mode = disabled
Logging mode = disabled
2 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa2) minate Report mode = disabled
Logging mode = disabled
3 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa3) minate Report mode = disabled
Logging mode = disabled
(7 of 17)
4 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa4) minate Report mode = disabled
Logging mode = disabled
5 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa5) minate Report mode = disabled
Logging mode = disabled
6 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa6) minate Report mode = disabled
Logging mode = disabled
7 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa7) minate Report mode = disabled
Logging mode = disabled
8 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa8) minate Report mode = disabled
Logging mode = disabled
9 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa9) minate Report mode = disabled
Logging mode = disabled
10 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa10) minate Report mode = disabled
Logging mode = disabled
11 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa11) minate Report mode = disabled
Logging mode = disabled
12 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa12) minate Report mode = disabled
Logging mode = disabled
13 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa13) minate Report mode = disabled
Logging mode = disabled
14 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa14) minate Report mode = disabled
Logging mode = disabled
15 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa15) minate Report mode = disabled
Logging mode = disabled
16 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa16) minate Report mode = disabled
Logging mode = disabled
17 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa17) minate Report mode = disabled
Logging mode = disabled
18 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa18) minate Report mode = disabled
Logging mode = disabled
19 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa19) minate Report mode = disabled
Logging mode = disabled
(8 of 17)
20 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa20) minate Report mode = disabled
Logging mode = disabled
21 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa21) minate Report mode = disabled
Logging mode = disabled
22 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa22) minate Report mode = disabled
Logging mode = disabled
23 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa23) minate Report mode = disabled
Logging mode = disabled
24 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa24) minate Report mode = disabled
Logging mode = disabled
25 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa25) minate Report mode = disabled
Logging mode = disabled
26 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa26) minate Report mode = disabled
Logging mode = disabled
27 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa27) minate Report mode = disabled
Logging mode = disabled
28 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa28) minate Report mode = disabled
Logging mode = disabled
29 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa29) minate Report mode = disabled
Logging mode = disabled
30 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa30) minate Report mode = disabled
Logging mode = disabled
31 Derived alarm for spatial Com Indeter- — Derived alarm for spatial filter. ✓ ✓
filter (der-spa31) minate Report mode = disabled
Logging mode = disabled
Alarm type = xDSL (38); Index1 = ifIndex (of xDSL physical port), Index2 = not used
0 No defects — — — — ✓ ✓
1 xdsl near end loss of Com Minor ✓ Specifies whether a near end loss of ✓ ✓
signal (xdsl-ne-los) signal has occurred
2 xdsl near end loss of Com Minor ✓ Specifies whether a near end loss of ✓ ✓
frame (xdsl-ne-lof) frame has occurred
3 xdsl near end loss of Com Minor ✓ Specifies whether a near end loss of ✓ ✓
margin (xdsl-ne-lom) margin has occurred
4 xdsl near end excessive Com Minor ✓ Specifies whether near end excessive ✓ ✓
server errors server errors occurred
(xdsl-ne-ese)
(9 of 17)
6 Activation failure — Com Major ✓ Line capacity not high enough to set up ✓ ✓
configuration not requested profile
feasible (line-capacity)
7 Near end — bit rate Com Minor ✓ Upstream planned bit rate not reached ✓ ✓
threshold after initialization
(near-end-bitrate)
8 xdsl near end - no cell Com Minor ✓ Specifies whether a near end cell ✓ ✓
delineation (xdsl-ne-ncd) delineation has occurred
9 xdsl near end - loss of Com Minor ✓ Specifies whether a loss of near end cell ✓ ✓
cell delineation delineation has occurred
(xdsl-ne-lcd)
10 xdsl far end - loss of Com Minor ✓ Specifies whether a far end loss of signal ✓ ✓
signal (xdsl-fe-los) has occurred
11 xdsl far end - loss of Com Minor ✓ Specifies whether a far end loss of frame ✓ ✓
frame (xdsl-fe-lof) has occurred
12 xdsl far end - loss of Com Minor ✓ Specifies whether a far end loss of power ✓ ✓
power (xdsl-fe-lpr) was detected
13 xdsl far end - loss of link Com Minor ✓ Specifies whether a far end loss of link ✓ ✓
(xdsl-fe-lol) was detected
14 xdsl far end - loss of Com Minor ✓ Specifies whether a far end loss of ✓ ✓
margin (xdsl-fe-lom) margin has occurred
15 xdsl far end - excessive Com Minor ✓ Specifies whether far end excessive ✓ ✓
severe errors server errors occurred
(xdsl-fe-ese)
18 Far end — bit rate Com Minor ✓ Downstream planned bit rate not ✓ ✓
threshold reached after initialization.
(far-end-bitrate)
19 xdsl far end - no cell Com Minor ✓ Specifies whether a far end cell ✓ ✓
delineation (xdsl-fe-ncd) delineation has occurred
20 xdsl far end - loss of cell Com Minor ✓ Specifies whether there is a far end loss ✓ ✓
delineation (xdsl-fe-lcd) of cell delineation
Alarm type = xDSLTca (39); Index1 = ifIndex (of xDSL physical port), Index2 = not used
0 No defects — — — — ✓ ✓
1 xdsl near end TCA alarm QoS Minor — The number of errored seconds ✓ ✓
- errored seconds in 15 encountered by the ADSL line in the
min (xtca-ne-es) current 15-minute interval has reached
its threshold value.
(10 of 17)
2 xdsl near end TCA alarm QoS Minor — The number of severely errored seconds ✓ ✓
- severely errored encountered by the ADSL line in the
seconds in 15 min current 15-minute interval has reached
(xtca-ne-ses) its threshold value.
3 xdsl near end TCA alarm QoS Minor — The number of unavailable seconds ✓ ✓
- unavailable seconds encountered by the ADSL line in the
(xtca-ne-uas) current 15-minute interval has reached
its threshold value.
4 xdsl near end TCA alarm QoS Minor — The number of errored seconds ✓ ✓
- errored seconds in 1 encountered by the ADSL line in the
day (xtca-ne-day-es) current one-day interval has reached its
threshold value.
5 xdsl near end TCA alarm QoS Minor — The number of severely errored seconds ✓ ✓
- severely errored encountered by the ADSL line in the
seconds in 1 day current one-day interval has reached its
(xtca-ne-day-ses) threshold value.
6 xdsl near end TCA alarm QoS Minor — The number of unavailable seconds ✓ ✓
- unavailable seconds in encountered by the ADSL line in the
1 day (xtca-ne-day-uas) current one-day interval has reached its
threshold value.
7 xdsl far end TCA alarm - QoS Minor — The number of errored seconds ✓ ✓
errored seconds in encountered by the ADSL far-end line in
15 min (xtca-fe-es) the current 15-minute interval has
reached its threshold value.
8 xdsl far end TCA alarm - QoS Minor — The number of severely errored seconds ✓ ✓
severely errored encountered by the ADSL far-end line in
seconds in 15 min the current 15-minute interval has
(xtca-fe-ses) reached its threshold value.
9 xdsl far end TCA alarm - QoS Minor — The number of unavailable seconds ✓ ✓
unavailable seconds encountered by the ADSL far-end line in
(xtca-fe-uas) the current 15-minute interval has
reached its threshold value.
10 xdsl far end TCA alarm - QoS Minor — The number of errored seconds ✓ ✓
errored seconds in 1 day encountered by the ADSL far-end line in
(xtca-fe-day-es) the current one-day interval has reached
its threshold value.
11 xdsl far end TCA alarm - QoS Minor — The number of severely errored seconds ✓ ✓
severely errored encountered by the ADSL far-end line in
seconds in 1 day the current one-day interval has reached
(xtca-fe-day-ses) its threshold value.
12 xdsl far end TCA alarm - QoS Minor — The number of unavailable seconds ✓ ✓
unavailable seconds in encountered by the ADSL far-end line in
1 day (xtca-fe-day-uas) the current one-day interval has reached
its threshold value.
Alarm type = eoConversion (50); Index1 = 100BASE-FX port identification (1 to 4 for ISAM), Index2 = not used
0 No defects — — — — ✓ ✓
1 E/O conversion LOS Equip Major ✓ E/O conversion module loss of signal. ✓ ✓
(loss-of-signal)
(11 of 17)
Alarm type = bonding (54); Index1 = IfIndex (of bonding group), Index2 = not used
0 No defects — — — — ✓ ✓
1 Bonding group upstream Com Minor ✓ Group upstream actual bit rate is above ✓ ✓
planned bit rate group upstream minimum bit rate but
threshold below group upstream planned bit rate.
(up-plan-bitrate)
2 Bonding group upstream Com Minor ✓ Group upstream actual bit rate dropped ✓ ✓
minimum bit rate below group upstream minimum bit rate.
threshold
(up-min-bitrate)
3 Bonding group upstream Com Major ✓ Group upstream actual bit rate is not ✓ ✓
configuration not high enough to set up the configured
feasible (up-config) group upstream minimum bit rate.
7 Bonding group no peer Com Minor ✓ CPE modem is not connected to the ✓ ✓
modem detected group lines.
(no-peer-cpe)
Alarm type = authentication (55); Index1 = ifIndex of interface on which authentication occurs (for example, the bridge
port interface for 802.1x, the PPPoE interface for PPPoE), Index2 = not used
0 No defects — — — — ✓ ✓
1 VRF assignment failure Proc Major ✓ Failure to assign a VRF for a user ✓ ✓
(vrf-assign-fail) session:
• unknown VRF: VRF returned by
RADIUS server is not locally
configured in the system; or
• no VRF: RADIUS server did not
return a VRF while no default VRF is
locally configured for the domain.
(12 of 17)
2 VLAN assignment failure Proc Major ✓ Failure to assign a VLAN for a user ✓ ✓
(vlan-assign-fail) session:
• unknown VLAN: VLAN returned by
RADIUS server is not locally
configured in the system; or
• no VLAN: RADIUS server did not
return a VLAN while no default VRF
is locally configured for the domain.
Alarm type = IpoX (68); Index1 = ifIndex of IpoX interface on which session takes place, Index2 = not used
0 No defects — — — — ✓ ✓
(13 of 17)
Alarm type = SFP (76); Index 1 = ifIndex of IPoX interface on which the session takes place, Index 2 = not used
0 No defects — — — — — ✓
1 Host SFP LOS Com Critical ✓ Host shelf downlink SFP loss of signal. — ✓
(host-sfp-los) This alarm applies only to a host
ARAM-D shelf.
2 Host SFP Tx fail Com Critical ✓ Host shelf downlink SFP transmission — ✓
(host-sfp-tx-fail) failure. This alarm applies only to a host
ARAM-D shelf.
3 Host SFP not present Com Critical ✓ Host SFP missing. Host shelf downlink — ✓
(host-sfp-not-prst) SFP detected but later removed. This
alarm applies only to a host ARAM-D
shelf.
4 Host SFP invalid Alcatel Com Critical ✓ Host shelf downlink SFP does not have a — ✓
ID (host-sfp-inv-id) valid Alcatel ID. This alarm applies only
to a host ARAM-D shelf.
5 Host SFP control fail Com Critical ✓ Host shelf downlink SFP control failure. — ✓
(host-sfp-ctrl-fail) This alarm applies only to a host
ARAM-D shelf.
Alarm type = SFP (76); Index 1 = eqptSlotId of corresponding LSM in ES, Index 2 = not used
0 No defects — — — — — ✓
11 Expansion Shelf SFP Com Critical ✓ Expansion Shelf SFP loss of signal. This — ✓
LOS alarm applies only to an ES shelf.
(exp-sfp-los)
13 Expansion shelf SFP not Com Critical ✓ ES SFP missing. Expansion Shelf SFP — ✓
present detected but later removed. This alarm
(exp-sfp-not-prst) applies only to an ES shelf.
14 Expansion shelf SFP Com Critical ✓ Expansion Shelf SFP does not have a — ✓
invalid Alcatel ID valid Alcatel ID. This alarm applies only
(exp-sfp-inv-id) to an ES shelf.
15 Expansion Shelf SFP Com Critical ✓ The SFP alarm for the expansion shelf — ✓
control fail downlink SFP control failure.
(exp-sfp-ctrl-fail) This alarm applies only to an ES shelf.
Alarm type = LLURelay (78); Index 1 = eqptSlotId (index in equipment board table), Index 2 = not used
0 No defects — — — — ✓ —
1 Wrong applique for LLU Com Major ✓ LLU relay set for some ports but applique ✓ —
(wrong-or-no-applq) inserted in slot is not compatible with
LLU relay.
(14 of 17)
Alarm type = SHDSL_ISAM (82); Index1 = IfIndex (of SHDSL physical port), Index2 = linkID (higher 16 bits) + device
ID (lower 16 bits)
0 No defects — — — — ✓ ✓
Alarm type = CustomExternalAlarms (83); Index1 = eqptSlodId (index in equipment board table), Index2 = not used
0 No defects — — — — — ✓
Alarm type = PlugInUnit2 (84); Index1 = eqptSlotId (index in equipment board table), Index2 = not used
0 No defects — — — — — ✓
4 Dying gasp Equip Critical ✓ REM dying gasp alarm. REM going out — ✓
(dg-alarm) of service due to power shutdown.
Possible causes: power failure, mains
switch off, excessive over temperature,
etc.
5 Applique power supply Equip Critical ✓ Applique power supply malfunction. The ✓ —
failure relays are no longer configurable and are
(apsf-alarm) switched to the hardware default
position.
Alarm type: LANX (51); Index1 = not used, Index2 = not used
0 No defects — — — — ✓ ✓
1 LANX fan failure (fan) Eqp Major — SHub fan failure. This alarm is not — —
currently supported on the system.
2 LANX power fan failure Eqp Major — SHub power fan failure. This alarm is not — —
(power-fan) currently supported on the system.
3 LANX database restore Eqp Major ✓ The SHub database restore has failed. ✓ ✓
(db-restore)
4 Emergency reboot Eqp Major — The SHub has rebooted from the ✓ ✓
(emergency-reboot) emergency boot package.
(15 of 17)
6 No ARP reply received Com Major ✓ An ARP request has been sent for a ✓ ✓
for next IP hop statistically configured next hop, but no
(arp-reply) ARP reply has been received in the
specified time interval.
Index1 = VRF ID
Index2 = IP address of next hop
Alarm type = ethLanx (52); Index1 = port identification of LANX Ethernet port, Index2 = see specific alarm number
0 No defects — — — — ✓ ✓
1 Ethernet link down Com Critical ✓ Specifies the Ethernet link status. ✓ ✓
(link-down) Index 2 not used.
3 SHub MAC conflict COM Minor ✓ Duplicate MAC address from Ethernet — —
(mac-conflict) port of LAN switch.
Index 1 = port with the later coming MAC
address that causes conflict.
Index 2 = VLAN ID of domain on which
the conflict happened.
Alarm type = OSPF (69); Index 1 = VRF-ID (VRF unique ID), Index 2 = see specific alarm number
0 No defects — — — — ✓ ✓
4 OSPF LSDB Com Major — The external LSA database has reached ✓ ✓
approaching overflow 90% of the external LSA limit.
(lsdb-90) Index2 = LSDB limit (percentage utilized)
5 OSPF LSDB overflow Com Major — The external LSA count has reached the ✓ ✓
(lsdb-ovfl) external LSA overflow limit.
Index2 = LSDB limit (percentage used)
(16 of 17)
7 OSPF interface state Com Minor ✓ The OSPF interface status has changed ✓ ✓
change (the DR or BDR may have been changed
(nhbr-itfchg) according to this OSPF interface).
Index2 = interface index (interface on
which the neighbor was learned)
Alarm type = RIP (70); Index1 = VRF ID (VRF unique ID), Index2 = interface index
0 No defects — — — — ✓ ✓
Alarm type = LANXuplinkgroup (75); Index1 = uplink group number, Index2 = not used
0 No defects — — — — ✓ ✓
7 LANX uplink group down Com Major ✓ The SHub uplink group is down. ✓ ✓
(uplink-down)
(17 of 17)
Notes
(1) The alarm names are listed exactly as they appear in the CLI configure command. Note that the term “board” as it appears
in the CLI alarms is referred to as either “unit” or “card” throughout the 7330 ISAM FTTN documentation; for example, the
ECNT-A card is a type of NT unit and the EVLT-A card is a type of LT unit.
(2) No rack shutdown occurs on an ARAM-D shelf that has the following PWIO-B cards installed: 3FE 24323 AC or
3FE 24323 AD.
(3) See the Duplicate Mac Alarm Status command in the CLI Commands document for more information.
(1 of 11)
5 preferred-mode System clock not using preferred timing Check all timing references that correspond to
mode the preferred timing mode for the peer
equipment and the link between the peer
equipment and the system.
6 timing-reference System clock in holdover or free-run Check all timing references for the peer
mode equipment and the link between the peer
equipment and the system.
25 BackPanel-type invalid NEP back panel type invalid System will start up with default back panel.
(back-pnl-inv) Check back panel type configuration when
system is running.
28 lost SHub configuration loss Check the SHub configuration with respect to
the database (last database changes may be
lost).
18 single-fan-fail Single fan Check fan tray (the LED of the faulty fan’s tray
is lit red).
19 double-fan-fail Double fan (2) Check fan tray of shelf that raised the alarm.
The shelf will power off within 3 min. of the
alarm.
(2 of 11)
16 board-init (1) Board initialization Force a cold reset of unit, and if this fails
again, repair unit.
17 number-of-resets Board reset protection Force a cold reset of unit, and if this fails
again, repair unit.
2 cell-discard-up Cell discard up (CDU) No local repair action. Sender must lower
shaping rate.
3 cell-discard-down Cell discard down (CDD) No local repair action. Sender must lower
shaping rate.
6 mac-conflict ASAM MAC conflict Use the diagnostic tool to find the detailed
information. (3)
(3 of 11)
1 der-temp1 Derived alarm for temporal filter 1 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
2 der-temp2 Derived alarm for temporal filter 2 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
3 der-temp3 Derived alarm for temporal filter 3 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
4 der-temp4 Derived alarm for temporal filter 4 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
5 der-temp5 Derived alarm for temporal filter 5 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
6 der-temp6 Derived alarm for temporal filter 6 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
7 der-temp7 Derived alarm for temporal filter 7 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
8 der-temp8 Derived alarm for temporal filter 8 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
9 der-temp9 Derived alarm for temporal filter 9 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
10 der-temp10 Derived alarm for temporal filter 10 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
11 der-temp11 Derived alarm for temporal filter 11 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
12 der-temp12 Derived alarm for temporal filter 12 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
13 der-temp13 Derived alarm for temporal filter 13 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
14 der-temp14 Derived alarm for temporal filter 14 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
(4 of 11)
15 der-temp15 Derived alarm for temporal filter 15 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
16 der-temp16 Derived alarm for temporal filter 16 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
17 der-temp17 Derived alarm for temporal filter 17 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
18 der-temp18 Derived alarm for temporal filter 18 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
19 der-temp19 Derived alarm for temporal filter1 9 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
20 der-temp20 Derived alarm for temporal filter 20 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
21 der-temp21 Derived alarm for temporal filter 21 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
22 der-temp22 Derived alarm for temporal filter 22 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
23 der-temp23 Derived alarm for temporal filter 23 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
24 der-temp24 Derived alarm for temporal filter 24 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
25 der-temp25 Derived alarm for temporal filter 25 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
26 der-temp26 Derived alarm for temporal filter 26 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
27 der-temp27 Derived alarm for temporal filter 27 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
28 der-temp28 Derived alarm for temporal filter 28 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
29 der-temp29 Derived alarm for temporal filter 29 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
30 der-temp30 Derived alarm for temporal filter 30 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
31 der-temp31 Derived alarm for temporal filter 31 Check the cause of the related basic alarm.
Check the setting of the related temporal filter.
1 der-spa1 Derived alarm for spatial filter 1 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
2 der-spa2 Derived alarm for spatial filter 2 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
3 der-spa3 Derived alarm for spatial filter 3 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
(5 of 11)
4 der-spa4 Derived alarm for spatial filter 4 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
5 der-spa5 Derived alarm for spatial filter 5 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
6 der-spa6 Derived alarm for spatial filter 6 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
7 der-spa7 Derived alarm for spatial filter 7 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
8 der-spa8 Derived alarm for spatial filter 8 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
9 der-spa9 Derived alarm for spatial filter 9 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
10 der-spa10 Derived alarm for spatial filter 10 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
11 der-spa11 Derived alarm for spatial filter 11 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
12 der-spa12 Derived alarm for spatial filter 12 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
13 der-spa13 Derived alarm for spatial filter 13 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
14 der-spa14 Derived alarm for spatial filter 14 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
15 der-spa15 Derived alarm for spatial filter 15 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
16 der-spa16 Derived alarm for spatial filter 16 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
17 der-spa17 Derived alarm for spatial filter 17 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
18 der-spa18 Derived alarm for spatial filter 18 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
19 der-spa19 Derived alarm for spatial filter 19 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
20 der-spa20 Derived alarm for spatial filter 20 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
21 der-spa21 Derived alarm for spatial filter 21 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
22 der-spa22 Derived alarm for spatial filter 22 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
23 der-spa23 Derived alarm for spatial filter 23 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
(6 of 11)
24 der-spa24 Derived alarm for spatial filter 24 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
25 der-spa25 Derived alarm for spatial filter 25 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
26 der-spa26 Derived alarm for spatial filter 26 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
27 der-spa27 Derived alarm for spatial filter 27 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
28 der-spa28 Derived alarm for spatial filter 28 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
29 der-spa29 Derived alarm for spatial filter 29 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
30 der-spa30 Derived alarm for spatial filter 30 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
31 der-spa31 Derived alarm for spatial filter 31 Check the cause of the related basic alarm.
Check the setting of the related spatial filter.
3 xdsl-ne-lom Near end LOM Check the physical line (new distributors).
7 near-end-bitrate Near end - bit rate threshold Lower planned upstream bit rate.
12 xdsl-fe-lpr Far end - LPR There is no repair required because this is the
normal power-down of CPE.
(7 of 11)
17 peer-modem Activation failure - no peer modem Wait until the modem is connected.
detected Check the physical line.
18 far-end-bitrate Far end - bit rate threshold Lower the planned downstream bit rate.
4 xtca-ne-day-es Near end - errored seconds in a day Check the physical line.
Check the modem equipment.
5 xtca-ne-day-ses Near end - severely errored seconds in Check the physical line.
a day Check the modem equipment.
8 xtca-fe-ses Far end - severely errored seconds Check the physical line.
Check the modem equipment.
9 xtca-fe-uas Far end - unavailable seconds Check the physical line.
Check the modem equipment.
10 xtca-fe-day-es Far end - errored seconds in a day Check the physical line.
Check the modem equipment.
11 xtca-fe-day-ses Far end - severely errored seconds in a Check the physical line.
day Check the modem equipment.
12 xtca-fe-day-uas Far end - unavailable seconds in a day Check the physical line.
Check the modem equipment.
1 up-plan-bitrate Bonding group upstream planned bit Lower group upstream planned bit rate.
rate threshold
2 up-min-bitrate Bonding group upstream minimum bit Check physical line.
rate threshold Check line state.
(8 of 11)
4 down-plan-bitrate Bonding group downstream planned bit Lower group downstream planned bit rate.
rate threshold
2 host-sfp-tx-fail Host SFP Tx fail Check the host shelf SFP module.
3 host-sfp-not-prst Host SFP missing Check the host shelf SFP presence.
4 host-sfp-inv-id Host SFP invalid Alcatel ID Check the host shelf SFP module ID.
5 host-sfp-ctrl-fail Host SFP control fail Check the host shelf SFP module or I2C bus.
If control of all host shelf SFPs fails, check the
GENC-E.
14 exp-sfp-inv-id ES SFP invalid Alcatel ID Check the Expansion Shelf SFP module ID.
(9 of 11)
15 exp-sfp-ctrl-fail ES SFP control fail Check the Expansion Shelf SFP module or
I2C bus.
4 dg-alarm REM dying gasp Check the following at the REM and the
cabinet: cabling, fuse, temperature, on and off
switch.
2 power-fan LANX power fan failure Check the fan module in SHUB (redundant)
power supply.
6 arp-reply No ARP reply received for next IP HOP Check existence of configured Nexthop.
Check connection with configured Nexthop.
Alarm type = ethLANX (52)
3 mac-conflict LANX MAC conflict No special repair action required. The conflict
MAC address can be manually prohibited or
permitted if needed.
(10 of 11)
1 config OSPF interface configuration error Check the configuration of the OSPF and
OSPF interface.
Check the configuration on the IP interface.
Check the OSPF hello packets received on
the OSPF interface.
2 authen OSPF interface authentication error Check the authentication type and password
configured on the OSPF area and the OSPF
interface.
Check the authentication time range.
3 rx-bad-pkt OSPF interface received bad packet Check the connection between the RIP
interface and the cable.
4 lsdb-90 OSPF LSDB approaching overflow Don’t input external routes anymore, except
for major external network routes.
Configure the OSPF area as a stub area if
possible.
5 lsdb-ovfl OSPF LSDB overflow Remove some external routes in the OSPF
domain.
Configure the OSPF area as a stub area if
possible.
Only input major external network routes.
6 nhbr-statchg OSPF neighbor state change Check the OSPF neighbor table.
• If the neighbor is established correctly,
the situation is normal.
• If the neighbor is down unexpectedly,
check the OSPF process status or the
interface-related parameters.
7 nhbr-itfchg OSPF interface state change No special repair action required. Check and
modify the OSPF interface parameters if
desired to change the OSPF interface status.
Alarm type = RIP (70)
1 config-err RIP interface configuration error Check the configuration of the RIP send and
receive version.
Check the configuration of the IP interface.
Check the RIP request and update packets
received on the interface.
2 auth-fail RIP interface authentication failure Check the authentication type and password
configuration of the RIP interface.
Check the authentication time range.
3 rcv-bad-pkt RIP interface received bad packet Check the connection between the RIP
interface and the cable.
(11 of 11)
Notes
(1) The alarm names are listed exactly as they appear in the CLI configure command. Note that the term “board” as it appears
in the CLI alarms is referred to as either “unit” or “card” throughout the 7330 ISAM FTTN documentation; for example, the
ECNT-A card is a type of NT unit and the EVLT-A card is a type of LT unit.
(2) No rack shutdown occurs on an ARAM-D shelf that has either of the following PWIO-B cards installed: 3FE 24323 AC or
3FE 24323 AD.
(3) See the Duplicate Mac Alarm Status command in the CLI Commands document for more information.
TNG 106 — Specifying 7330 ISAM FTTN remote expansion units using the
CLI
General Information
This TNG provides information on:
• Forwarding Modes
• Dynamic MAC Learning and Static Unicast MAC Addresses
• MAC Learning Rules
• MAC Learning on SHub and LT board (LIMs)
• MAC Learning and Unicast Configuration
• SHub MAC Filters
Forwarding Modes
I-Bridge
VRF Bridge
I-Bridge
IP subnet IP address
IP
Router
VRF Bridge
IP
Router
IP subnet IP address
IP
Fwder
VRF Bridge
IP
Fwder
IP subnet IP address
Deleting a VLAN on the LT board is impossible unless all egress ports have been
removed from the VLAN. There is no such restriction for the SHub.
This means that learning an address on a control port takes higher priority than any other
port. Similarly, NETWORK ports have a higher precedence than ASAM, USER, and
SUBTENDING ports. ASAM, USER, and SUBTENDING ports have the same priority.
Example:
1 MAC 'X' is learned on ASAM port. If packets with the same MAC address appear later
on the control port, then MAC 'X' is learned on the control port and the same entry is
removed from the ASAM port.
2 MAC 'X' is learned on ASAM port 1. If packets with same MAC address appear on
the USER port, then if MAC movement is enabled for the VLAN, the MAC address is
learned on the USER port. Otherwise, a duplicate alarm is raised and that particular
stream is discarded on the USER port.
A duplicate MAC alarm is raised whenever there is a MAC conflict between same-priority
ports, except when the two ports in question are network ports. This is because MAC
movement is by default enabled on network ports. Also, a duplicate MAC alarm is raised
when a lower-priority port tries to learn a MAC address in case a MAC address has
already been learned on any higher priority port. When the duplicate alarm is raised,
traffic with the same MAC address is blocked on the second port. The alarm is cleared
when the MAC address ages out on the first port.
Duplicate MAC alarms will not be raised when MAC movement is enabled. The MAC
address will always be learned on the port where the packet arrives. If a dynamic MAC
entry already exists on an other port, it is removed before learning the new MAC address
on that port.
Static MAC address can be configured. There is Static MAC address can be configured
a limit of 25 static MAC entries.
Static MAC addresses can be configured per VLAN on both the Shub and LIMs. The
egress port for a particular MAC address is specified by these static MAC entries. Unlike
dynamically learned MAC entries, static addresses can be configured to be permanent.
When configuring a static unicast MAC address for a port, the system removes the old
entry if the MAC address has been learned as a dynamic one in any port within the same
VLAN. The system then either accepts or rejects this configuration. It rejects the
configuration if the MAC address has been configured as a static one on another port
within the same VLAN or the port is not in a valid VLAN.
If the number of MAC addresses learned or configured has reached the limit, then one
dynamic entry is removed from the database when configuring a new static entry.
A duplicate MAC alarm is raised when a packet with the same MAC address as a
statically configured one on another port is encountered. The static entry is retained while
the dynamic entry is discarded.
The system supports global MAC filters. These filters are supported in the SHub. There
are no filters supported per user logical port. The system provides facilities to configure
MAC address filtering based on destination MAC address, source MAC address, or both
source MAC address and destination MAC address. The filter action is either Drop or
Allow on packet match.
Introduction
The Alcatel ISAM (7302 ISAM, 7330 ISAM FTTN) as an access concentrator provides
sophisticated means for enforcing subscriber SLAs, protect network resources, prevent
service theft and impose security policies.
This application note helps to understand the Alcatel ISAM QoS policies and to choose
the appropriate set of functionalities to support your deployment scenario.
This application note presents the concepts and functions behind the Alcatel 7302 ISAM
and 7330 ISAM FTTN QoS Session and related profiles. First the main concepts are
explained, followed by relatively simple step-by-step examples. This document explains
the following concepts:
In general, the entity that identifies a subscriber interface (a logical flow) is called a
Service Access Point (SAP).
• a DSL interface
• an ATM PVC on a DSL interface
• a PPPoE session
• a VLAN
• an IP interface
The basic paradigm of subscriber SLA enforcement revolves around applying the correct
policies to the subscriber SAP. Therefore, the solution is to attach QoS rules to such
SAPs.
The main building block of subscriber QoS policies is the QoS Session profile.
In principle one such Session profile is required per service. When configuring a new
subscriber, it is sufficient to name the appropriate QoS Session profile that applies to the
SAP of the customer, and all settings are automatically populated in hardware. This not
only provides for fast configuration, but also reduces the chances of erroneous
configuration.
Logical Flow QoS Policer QoS Policer QoS Marker Qos Policy Qos Policy
Type Profile Up Profile Down Profile Up List Up List Down
Other profiles that are not session-related (buffer acceptance, scheduler, connection
admission control) can be modified while in use, but not deleted.
The Logical Flow Type parameter is mandatory at profile creation time and cannot be
changed later. Therefore it is important to know in advance the logical flow type of the
forwarding mode for which the session profile is prepared.
Generic all L2, L3 May be used for all logical flow types,
mainly for test purposes. The system
will silently ignore unsupported
contents from this profile.
(1 of 2)
(2 of 2)
To create a QoS Session profile via CLI, use the following command:
• Committed Information Rate (CIR): designates the token accumulation rate in Kbit/s
• Committed Burst Size (CBS): designates the maximum token count in the bucket
A Policer profile cannot be changed while in use (i.e., while it is associated to at least one
Session Profile). However, in a Session profile the referenced Policer profile can be
replaced by another one, even while the Session profile is in use (i.e., is instantiated in
hardware on SAPs). This allows seamless service upgrades in the field.
If there is at least one policer profile on the SAP level, it is not possible to remove it while
the Session profile is in use. This is due to policer inheritance. Similarly, if previously there
was no policer profile at all, then while the Session profile is in use it cannot be added to
the Session profile. It is possible however, to add a second policer or to remove one when
previously there were two.
Note — The big tolerance for small rate is caused by unit conversion.
The CIR unit in NP is KBytes, so integers are accepted. Values are
rounded up. As such, any roundup value will have a tolerance of
0.00000...01 to 0.9999...9 KBytes, which is obvious for small rate.
The actual result is 8 x 2KB = 16Kbits. This matches the actual CIR value
in NP.
Basic concepts
In principle there is always a dominant entity that determines the code points to be
applied on a frame. Such entities are for example: a parent bridge port, port default VLAN,
ingress DSCP, ingress P-bits, or other header information (see marking based on
sub-flow policies 4.7). One notable exception is when the port is trusted. For trusted ports
received frames will keep their DSCP and P-bits, and un-tagged frames will get code
point P=0 in the 802.1q header.
Note that a port default P-bit marking can be configured on bridge ports even in the
absence of a QoS Session profile. The convention is that the QoS Session profile –
provided it contains a marker for P-bits – has precedence over a bridge port-based
default. Also note, that there is a system-wide switch that determines whether code points
are derived from bridge-port default settings or are VLAN-based.
Last, setting the DSCP is not supported for non-IP packets (including when IP packets
are bridged with PPP-encapsulation). For such packets, the set-DSCP rule is
automatically skipped.
Marker Type
Default P-bits
DSCP
DSCP Contract
Table
DSCP-to-P-bits
Alignment Table
In general, a code point can suffer multiple alterations, but this is not the purpose. P-bits
can be set port-based, then altered in the policy processor block. Also, P-bits specified
by the policy processor could be altered by the alignment. This is not the intention.
The intention is to set either both code points in one shot according to the determining
entity (like parent port) or mark the incoming DSCP with a contract table and align P-bits
to it. The complex things are there not to be used for simple cases, but to suit the needs
of special deployment scenarios.
Policies also have a precedence value, which allows ordering them in the service access
point, in case some of the filters define overlapping sets of the flows. 255 priority levels
are supported. A defined policy can be reused in many QoS Session profiles. The policy
will always use the same precedence within all Session profiles, since the precedence is
an attribute of the policy. Policies with unspecified precedence get precedence 10 (0
lowest, 255 highest). Policies with the same precedence will get instantiated in hardware
with random ordering, therefore it is good practice to use correct precedence levels for
policies that can be potentially conflicting.
The rule is that within a session, the first filtering match will carry out the associated
actions on the packet, and no other sub-flow policies are checked.
L2 and L3 Filters
L2 and L3 filters are stored as profiles, and are reusable in both upstream and
downstream direction. Filters are multi-field classifiers. In other words, they contain a set
of protocol headers, where each can be enabled or ignored or partially masked. However,
the total evaluation of the fields is an AND function. Therefore a full-match is required.
When an OR function is desired, several sub-flow policies can be used to achieve the
desired behavior (see “Policy Sharing”).
L2 Filter L3 Filter
MAC Destination Address Address Type
Ethertype IP SA Prefix
P-bits DSCP
MAC address prefixes in L2 filters can be used for ACL functionality, for instance to
specify a certain category of access boxes (like a residential gateway or STB of a certain
type from a specific vendor). To specify a L2 policy that applies for all ingress frames,
mask out the complete source or destination MAC address.
Ranges of TCP and UDP ports are supported, which is a more convenient way for
specifying L3+ policies than port masks.
Note that protocol extraction, IP and MAC anti-spoofing and blocking special Ether-types
happens before the policy processor block. Therefore, QoS filters cannot be used to
disable the reception of certain protocols. They can be used to block certain protocols
from being transmitted further to the network that are not extracted and treated by the
ISAM control-plane processors. Filters look to potentially modified fields (such as VLAN
ID, P-bits, DSCP) since the policy processor is located after the L2, L3 engines and the
port-based marker block.
The supported filter type (L2 or L3) depends on the SAP forwarding and encapsulation
mode (see Table 1). The ISAM policy processor will forbid non-supported configurations
already at the moment when a policy is attached to a session profile. For instance an
IPoA virtual router SAP will not support a L2 filter since there is no incoming Ethernet
header. Even if there was – like the case of IPoE VR – we still don’t support L2 filters due
to the fact that the L2 header is replaced by the L3 forwarding engine. Presently L2 filters
are supported for the VLAN cross-connect mode. L2 and L3 filters can be used in the
same Session profile if the flow type allows it.
Policy Action
Default Disposition
Set DSCP
Set P-bits
Police
Sharing
Setting P-bits on the policy-level is supported for all forwarding modes, since upstream
all packets will be tagged. However, setting P-bits in the downstream direction is still not
useless in case frames are forwarded to subscribers downstream. An altered P-bit for
internal purposes can be used to modify the scheduling priority of a downstream packet.
This feature is useful to pull out a selected sub-flow (like VoD control traffic) from a
best-effort aggregate into the controlled-load queue.
Setting the DSCP is only supported for IP frames (which includes terminated PPP
sessions, since the system does have an IP interface at hand). Setting DSCP is not
supported for bridged PPP traffic, as well as for SAPs at layer 2 that are not yet supported
by the policy framework.
Policing a certain sub-flow means that the selected traffic is not subject to the port-level
policer. Therefore is a SAP has a port policer of 1Mbps and two sub-flow policies of
100Kbps, then the total traffic that can pass is 1.2Mbps. However, if the sub-flow policy
does not contain policing, then the frame is subject to the port policer. This concept is
some times referred as policer inheritance, which applies also across service access
points that are on top of each other (like PPP sessions over a bridge port). Marking and
sub-flow policies are not inherited across SAPs.
Policy Sharing
There are cases when a certain policy should apply to a set of micro-flows within a SAP
that is difficult or impossible to capture with one filter. If this is the case when the policy
is to apply an upper bound on the bandwidth to be used in common by such micro-flows,
then policy sharing comes to help.
Basically, policy sharing if enabled will cause the policies within a QoS Session profile
that use the same Policy Action profile in the same direction more than once to share the
instantiated policer. This way a common upper bound is placed on the rate of a set of
ingress flows. It makes no sense to use policy sharing if no policer is named inside the
policy action profile.
Figure TNG 101-5: Sequence of Policy decision Points for Upstream Marking
May come from:
1. Bridge port default
Global Table QoS Marker profile QoS Marker profile 2. VLAN default
3. QoS Session Profile
Marker
As mentioned earlier, in a typical deployment scenario only a small fraction of all this is
needed. For instance, it is rather common to set only a port default P-bit value.
Downstream marking is typically not done in the DSLAM. The ISAM can do downstream
P-bit and DSCP modification via the policy processors, but there are no explicit means to
do session-based downstream marking. If for some reason this is required, a
downstream generic filter has to be defined with action to modify the desired code point
to the desired value.
1 untagged frames from user, where a port default P-bit is always applied
2 tagged or priority tagged frames, where subscriber marking is trusted
3 tagged or priority tagged frames where correct P-bit marking is enforced via a P-bit
contract table.
Port default P-bits can be configured also without a QoS profile, simply by configuring a
P-bit on the bridge port level or using VLAN-based defaults. In case a QoS Session profile
is attached that contains P-bit settings, this latter will overwrite port or VLA-based
defaults.
P-bit contract table is not yet possible to specify within a QoS marker profile, and only
possible to configure on top of bridge ports (so no IP interfaces).
Please note that the service hub has an independent DSCP to P-bits alignment table, that
can be enabled or disabled on a per network interface basis. In principle the service hub
alignment table can have a different set of mapping values than the subscriber-side
mapping table.
Configuration Example
This section explains the steps required to create and configure a QoS Session profile
and its components through an example.
Figure TNG 101-6: The QoS Session profile and component objects
Logical Flow QoS Policer QoS Policer QoS Marker Qos Policy Qos Policy
Type Profile Up Profile Down Profile Up List Up List Down
1..16 1..4
Example: Create a multi-QoS Session profile for an IP-aware bridge interface, with voice
traffic limited in both direction to 100Kbps, VoD control traffic with enhanced priority and
to limit the rest of traffic to 3Mbps downstream and 256Kbps upstream.
Before we create the session profile, it is required that the components are created first.
Create a Policer profile for upstream rate limitation for the service access point to
256Kbps, with burst tolerance of 32 Kbytes:
Create a Policer profile for downstream rate limitation for the service access point to
3Mbps, with burst tolerance of 96 Kbytes:
Create a Policer profile for voice rate limitation to 100Kbps, with burst tolerance of 3
Kbytes:
The default P-bits for upstream packets are to be set to zero, for voice to 6 and for VoD
to 3. In this example we identify voice packets as having a source IP address subnet of
192.170.xx.xx and VoD packets are using source IP addresses in the range of
192.172.xx.xx.
Since by default packets get code point 0 if nothing is specified, and the ingress code
points are not used for determining the outgoing code point, we can simply leave out the
marker profile. However, just for the sake of the example, let’s make a marker that sets
P-bits equal to 0.
Downstream we could use the same address for the IP destination addresses, or the
used DiffServ code point. We choose to use the IP subnet.
To identify VoD control packets upstream we can use the IP destination address of the
VoD portal (e.g.: 192.180.2.2):
The same IP address (this time as source) we can use for identifying VoD control traffic
in the downstream direction:
For voice, the action is setting the outgoing P-bits to 6 and policing the traffic to 100Kbps.
The same policy can be used upstream and downstream, since it does not harm in our
scenario to alter the downstream P-bits.
For VoD, the policy action is simply to raise it out of the BE traffic class, which can be
again used both upstream and downstream.
The voice policy upstream uses the upstream voice filter (f3pUsVoiceIp) to identify
upstream voice packets and do the voice actions (apVoice) both upstream and
downstream.
The VoD policy used the VoD filters to simply set the code point to 3. Upstream this will
cause packets being marked with P-bit = 3, downstream it will cause the packet being
redirected to the controlled load queue.
Create the session profile for an IP-aware bridge, and add basic building blocks (policies
come in a second command):
Remarks:
1 VoD control traffic - although treated via a sub-flow policy for marking - is still policed
with the entire session. This may cause that from time to time subscriber data traffic
consumes the allowed bandwidth for the session and VoD control traffic will be
impacted as well. This will not happen to voice traffic, since the voice policy contains
a dedicated policer. Therefore, it may be useful to add a policer to the VoD subflow
policy such that the session-based policer does not apply to VoD control frames.
2 Although some of the profiles can be reused for many building blocks, it may be wise
to reuse them only when they refer to the same entity. Example, the reuse of the
voice policy in many session profiles is probably wise to do. If it has to change (e.g.,
the rate or the filter IP address) it is likely that most of them will change. However,
reusing the upstream policer on the session profile for the downstream policing of the
VoD control traffic may cause some complications if later one or the other has to
change.
General Description
IP multicasting is the transmission of an IP datagram to a host group. A host group is a
set of one or more hosts identified by a single destination IP address.
IP hosts report their multicast group memberships to any neighboring multicast routers
using the Internet Group Management Protocol (IGMP). IGMP is an integral part of IP and
must be implemented for all hosts wanting to receive IP multicasts. IGMP messages are
encapsulated in IP datagrams, with an IP protocol of 2.
Figure TNG 102-1 shows a typical IGMP configuration of a subscriber connected to the
system watching a movie sent from the remote server connected on the network.
Joint Message
Mcast Downstream
Query Message
17705
• port index:
Ranges from 1/1/3/0 to 1/1/18/47
• VCI:
Ranges from 0 to 4095
• VPI:
Ranges from 32 to 65535
Refer to the 7302 ISAM CLI Command and Messages document for a description of all
parameters.
A package is a group of one or more multicast sources that share a common access
permission. By grouping the source channels in one or more packages, a service
provider is able to support and deliver services at various levels to the end users.
The IGMP package to multicast source table shows the following parameters for a
package:
It is highly recommended that all default values be left as is. However, should there be a
need to change the IGMP parameters, make sure to set all dependencies first. Failing to
do this may lead to rejection of a set, since some of the valid ranges are dependent on
other objects.
Command Description
show igmp channel counter (port) Show the IGMP channel counter details
show igmp channel miscellaneous (port) Show the IGMP channel source details
show igmp package-to-src (package-id) Show the IGMP package to multicast source
parameters.
show igmp module counter (slot-index) Show the IGMP Module counters
show igmp module time (slot-index) Show the time-related parameters of the IGMP
module.
show igmp module miscellaneous (slot-index) Show miscellaneous parameters of the IGMP
module
show igmp shub vlan-router-port (vlan-id) Show the status of the IGMP VLAN router ports.
network-port <Shub::NetworkPort>
show igmp shub system-stats Show the CAC system-related parameters and
statistics.
show igmp shub mcast-stats (src) Show the CAC multicast-related channel statistics.
vlan-id <Igmp::McastSrcVLANID>
ip-addr <Ip::V4Address>
show igmp shub bundle-stats (bundle-name) Show the CAC multicast-related bundle statistics.
show igmp shub bundle-to-src (bundle-name) Show the CAC bundle to multicast source
class-d-addr <Igmp::MulticastAddress> parameters.
vlan-id <Igmp::McastSrcVLANID>
When you are adding a multicast stream to the multicast source table, you need to
configure the VLAN ID on which this stream can be received.
You need to create and configure this VLAN ID prior to creating the multicast source table
entry. Failing to do this may cause difficulty in joining the multicast group.
General Description
The Virtual Broadband Access Server (VBAS) protocol is used between the Broadband
Access Server (BAS) and the system to get detailed information on the subscriber’s
physical address. The VBAS protocol has two phases. After completing these phases,
the BAS can get the physical address of any new subscriber. The two phases are:
• VBAS Query
VBAS sends a VBAS Query Packet to the system to gather physical-port information
corresponding to the MAC address of the new subscriber.
• VBAS Response
Upon receiving the request packet, the system sends a VBAS Response Packet to
the BAS. This packet includes the physical-port information of the new subscriber.
All VBAS packets carry a destination. If the packet is not destined for a specific system,
it will forward the packet to all subtending systems until it has reached its intended
destination.
In normal operation, the network port towards the BAS is tagged. This means that the
network port is able to process and respond to tagged VBAS frames.
If untagged packets are to be handled, then the network port is explicitly set as untagged.
Also a PVID is configured for the port. When the system receives a VBAS query, user
information is retrieved from the VLAN configured as PVID.
VBAS Configuration
No specific VBAS configuration as such is necessary on this system. However, as an
Operator, you need to make sure that the network port is configured in order to properly
communicate with the BAS.
There are two modes in which the network port can operate: tagged or untagged.
Example
A user with MAC address 00-B0-D0-BC-D5-D3 is connected to slot 7, port 23 on LIM1.
LIM1 is connected to ASAM port 1. The VLAN configured for the user is VLAN 100 on
both LIM and SHub.
When the VBAS request arrives from the server on the SHub, the MAC address of the
user is retrieved in VLAN 100. Since the user MAC address is learned in VLAN 100, the
request is forwarded to LIM1.
LIM1 replies with VBAS response containing user information such as the slot and port
number. The SHub forwards the VBAS response to the server.
ETHERNET
VBAS Resp:
VBAS VBAS DA: 02.00.40.00.00.80
Req Resp VL AN: 100
User: 00.b0.d0.bc. d5.d3
User:
MAC: 00.b0.d0.bc. d5.d3
Slot: 2
Port: 23
VLAN: 100
General Description
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing
configuration information to hosts on a TCP/IP network. DHCP is based on the Bootstrap
Protocol (BOOTP), adding the capability of automatic allocation of reusable network
addresses and additional configuration options. DHCP consists of two components: a
protocol for delivering host-specific configuration parameters from a DHCP server to a
host and a mechanism for allocation of network addresses to hosts. DHCP is built on a
client-server model, where designated DHCP server hosts allocate network addresses
and deliver configuration parameters to dynamically configured hosts.
Upstream packet
Downstream
17704
• automatic allocation
DHCP assigns a permanent IP address to a client.
• dynamic allocation
DHCP assigns an IP address to a client for a limited period of time (or until the client
explicitly relinquishes the address).
• manual allocation
A client's IP address is assigned by the network administrator, and DHCP is used
simply to convey the assigned address to the client.
A particular network will use one or more of these mechanisms, depending on the policies
of the network administrator.
DHCP Option 82
An option called Option 82 is inserted by the DHCP relay agent running on the system
when forwarding client-originated DHCP packets to a DHCP server. Servers recognizing
Option 82 may use the information to implement an IP address or other parameter
assignment policies. The DHCP server echoes the option back to the relay agent in
server-to-client replies. The system strips the option before forwarding the reply to the
client. Option 82 is organized as a single DHCP option that contains one or more
suboptions that convey information known by the relay agent.
Parameter Description
• Before you can enable the DHCP relay agent, you need to configure the DHCP
servers on a VRF IP interface.
• The DHCP relay agent can only be configured on one VRF IP interface.
• A maximum of four DHCP servers can be configured on a VRF.
• The DHCP servers configured on a VRF IP interface must be part of the set of DHCP
servers configured on the VRF.
Command Description
show dhcp-relay shub vrf-agent-stats Shows DHCP DHCP relay agent statistics for each VRF.
See the CLI Commands and Messages document for more information on these
commands.
Introduction
This TNG provides more information about:
The system downloads the overall descriptor files and stores it persistently.
The system downloads the software files that are specified in the downloaded overall
descriptor files on condition that sufficient resources are available for their persistent
storage.
The manager has the possibility to monitor the progress of the download process with
granularity.
In case there are no exceptions, finally the system will have two OSWPs:
Abort an OSWP
The manager can abort an OSWP when the system has 2 OSWPs. The status of the first
OSWP is Enabled/Active/Committed while the second one will be in one of the following
three states:
• Enabled/NotActive/UnCommitted
• Downloading/NotActive/UnCommitted
• Disabled/NotActive/UnCommitted.
The management channel between the system and the manager is established and the
system is not involved in any other SW download process.
The manager requests the system to remove the NotActive/UnCommitted OSWP. The
system removes all the persistent stored files and databases not related to the
Enabled/Active/Committed OSWP. The status of the OSWP to be removed will be
Aborting/NotActive/UnCommitted during the complete remove operation.
After the abort is successful the system will have only one OSWP. The status of this
OSWP will be Enabled/Active/Committed. Only files and databases related to this OSWP
are stored persistently in the system.
The first OSWP has the status Enabled/Active, while the second OSWP has the status
Enabled/NotActive.
The management channel between the system and the manager is established and the
system is not involved in another SW download process.
1 The system selects the database that is compatible with and linked to the
Enabled/NotActive OSWP among the available databases.
The previously NotActive OSWP is now active together with the selected compatible
database. The previously Active OSWP is still available but its status is now
Enabled/NotActive.
Commit an OSWP
To commit an OSWP, the system has two OSWPs. The first OSWP has the status
Enabled/Active/Uncommitted, while the status of the second OSWP is
Enabled/NotActive/Committed.
1 The system removes all the persistent stored files and databases that do not belong
to the Enabled/Active OSWP.
2 After commit is successful, the system will have only one OSWP. The status of this
OSWP is Enabled/Active/Committed. Only files related to this OSWP are stored
persistently in the system.
Purpose
This TNG provides information about how the system software of a 7330 ISAM FTTN
host shelf identifies connected remote expansion units and how you can access remote
components to configure them using a CLI management session from the host shelf.
18027
Rack 1 must always contain the host 7330 ISAM FTTN ARAM-D shelf in the topmost
position and the host shelf must be assigned rack 1, shelf 1. Up to five ES can be installed
in racks 1 and 2. Rack 3 is reserved for the SEM. Although the SEM is a remote
expansion module and not a shelf, the 7330 ISAM FTTN system and management
software identifies each SEM according to the rack and shelf designation shown in
Figure TNG 106-1.
The SEM will nearly always be installed in remote locations, away from the host shelf that
is installed in the CO. Expansion shelves can be co-located with the host shelf or be
installed in remote locations. As such, racks 2 and 3 are virtual racks. This means that
they do not necessarily need to be physical racks installed in the same CO location as
rack 1, which contains the host shelf. Shelves 2 and 3 in rack 1 can also be assigned to
remotely located ES.
Note — You can assign expansion shelves to rack 1 and rack 2 only.
Rack 3 is reserved for SEM remote expansion units.
For the ES, rack and shelf assignments are derived from the shelf jumper settings. For
the SEM, the rack and shelf assignment is derived from the downlink port on the GENC-E
or GENC-F card to which the SEM is connected. Rack and shelf assignments for
downlink ports are configurable using CLI.
When you connect a SEM to downlink ports 8, 9, or 10 on the GENC-E or GENC-F card,
the SEM is automatically assigned rack 3, shelf 1, 2, or 3 respectively. Only downlink
ports 8, 9, and 10 automatically assign a rack and shelf ID to the SEM. The jumper
settings of the ES override the default rack and shelf assignments of downlink ports 8, 9,
and 10 without requiring configuration using CLI.
Using the CLI, you can change the shelf and rack ID assignments for all downlink ports
on the GENC-E or GENC-F card. Configuration using the CLI overrides the default rack
and shelf assignments of downlink ports 8, 9, and 10. Do not change shelf and rack ID
assignments using CLI after remote expansion units are connected and operational.
Service disruptions will result and an alarm is raised. Service and port configurations are
mapped to the optical expansion link. All affected port and service configurations that
were affected will require reconfiguration.
You must enter the unique rack and shelf ID for the host shelf or remote expansion unit.
Depending on what you are configuring, you may also need to enter the slot number of a
particular card and a specific port number.
For shelves, you must enter the LT slot number that contains the card you want to
configure. For a horizontally mounted ARAM-D shelf, the bottommost LT slot is LT1. The
LT slot number increments for each successive LT slot in the shelf. The topmost LT slot
in a horizontally mounted shelf is LT4.
Table TNG 106-1 lists the ES shelf contents and indicates what you must enter using the
CLI to reference a specific slot. The orientation of the table rows is the same as the slots
of a horizontally mounted ARAM-D shelf, where the GFC slot has the topmost position in
the shelf and slot LP1 has the bottommost position.
Subscriber ports are uniquely identified by the rack, shelf, slot, and port number. The port
number is determined by the cable pinout when subscriber lines are connected to the
applique installed in the shelf, or to the SEM xDSL drop line break-out cable.
Introduction
This TNG provides more information about the parameters used by the VDSLx modem:
• Re-initialization triggers
• VDSLx configuration management
• Line operation configuration
• VDSLx common configuration parameters
• Flavor-dependent configuration parameters
• Flavor-specific configuration parameters
• Supported operational data parameters
Re-initialization triggers
During showtime (L0 line state), the VDSLx Modem Subsystem performs
persistency/severity checking and correlation on the defects/anomalies, in order to detect
re-initialization triggers. Table TNG 107-1 lists them for the VTU-O and includes the
required persistency time for each showtime error.
Near-End Far-End
The VDSLx modem subsystem triggers/initiates re-activation of the modem when any of
those triggers is fired. No other re-initialization triggers (annex timer values) are used by
the modem subsystem than the ones mentioned in Table TNG 107-1.
All the far-end countdown timers are frozen when any near-end defect occurs. When all
the near-end defects have disappeared, the ar-end count-down timers resume from the
frozen values (ignoring the in-between time).
All the near-end defects are correlated independent from each other. The same holds for
all the far-end defects in absence of near-end defects.
• In case a parameter is indicated as “optional”, the input value is do not care, and any
value is accepted without having impact on the modem subsystem behavior.
• In case a parameter is indicated to be required to a certain level (for example, only a
limited set of defined number of input values), only input values corresponding to the
required level are accepted. If the input parameter is not accepted, the modem
subsystem raises a failure indication to the xDSL manager indicating “Configuration
Error”
• In case extra consistency checks need to be performed on a parameter or between
parameters and the configuration should be rejected, “rejection” always means that
the modem subsystem raises a failure indication to the xDSL Manager indicating
“Configuration Error”, rather that a returned error of the considered xDSL API call.
• An xDSL API configuration request is replied with an error only when the call is done
in a wrong administrative state.
• Operating modes
• Rate adaptation mode
• Target noise margin
• Minimum noise margin
• Maximum noise margin
• Carrier mask
• RF band data
• Minimum bitrate
• Maximum bitrate
• Rate adaptation ratio
• Maximum interleaving delay
• Minimum impulse noise protection
• Band plan:
• Custom band plan
• Predefined band plan
• Maximum number of bands
• Maximum usable frequency
• ADSL band mode
• ADSL band mode end frequency
• Optional band mode
• Optional band mode end frequency
• US power backoff mode
• DS G.HS tones power:
• DS G.hs tones power mode
• DS G.hs tones power manual level
Description Specifies which xDSL standard shall be applicable: ANSI T1.424 (old trial use
standard), ETSI TS 101 270, ITU-T G993.1, IEEE 802.3ah, or ITU-T G.993.2
(VDSL2) different Profiles.
Instances Line
(1 of 2)
Values Bitmap:
OpModesITU_G993_2_8A_Bit
OpModesITU_G993_2_8B_Bit
OpModesITU_G993_2_8C_Bit
OpModesITU_G993_2_8D_Bit
OpModesITU_G993_2_12A_Bit
OpModesITU_G993_2_12B_Bit
OpModesITU_G993_2_17A_Bit
OpModesITU_G993_2_30A_Bit
OpModesANSI_T1_424Bit
OpModesETSI_TS_101_270Bit
OpModesITU_G993_1Bit
OpModesIEEE802.3ah_Bit
(2 of 2)
Values raModeManual
raModeAtInit
Instances DS, US
Values 0..31
Description Specifies the minimum noise margin, relative to a BER of 10-7 at 0 dB noise
margin, the modem tolerates in order to maintain showtime. This parameter is
only used in showtime.
The VDSLx modem subsystem raises failure indication “Configuration Error” for
configurations where Minimum Noise Margin > Target Noise Margin for one of
the directions.
Instances DS, US
Values 0..31
Description Specifies the maximum noise margin sustained by the modem. This parameter
is both used during initialization and in showtime.
• during initialization:
• When the noise margin for transport configuration is higher than the
Maximum Noise Margin, then the modem takes action to reduce the
power to get the actual noise margin below this value.
• When the noise margin is lower than the Maximum Noise Margin, then
the modem tries to optimize the Receive Power below the configured
masks to get the noise margin as high as possible (still below the
Maximum Noise Margin).
• in showtime:
• When the current noise margin gets above the Maximum Noise Margin,
the modem attempts to reduce the far-end output power to get the noise
margin below this limit (by means of bit-swap actions).
• When the current noise margin gets below the Maximum Noise Margin,
then the ATU attempts to increase the far-end output power (still below
the maximum allowed templates or masks) to get the noise margin as
high as possible (by means of bits-swap actions).
If the Maximum Noise Margin is configured lower than the Target Noise Margin,
the configuration is rejected, and the “configuration error” failure is raised.
The special value “NoMaximumNoiseMargin” is interpreted as meaning that no
Maximum Noise Margin limit must be applied.
Other values strictly bigger than 31.0 are converted to the special value
“NoMaximumNoiseMargin”.
Instances DS, US
For clarification, Figure TNG 107-1 gives an overview of the noise margin parameters,
and the required actions from the modem.
In VDSL the carrier masking is not defined using bitmap. Instead carrier masking is defined via RF
bands (see RF band data).
Instances Line
(1 of 2)
(2 of 2)
Values 0..262143
Description Defines the maximum allowed transport bitrate which is set up and which is
maintained during showtime by the VTU. This parameter is relevant only in
'atInit' RA Mode. When RA Mode is “manual”, the Maximum Bitrate parameter
is ignored.
The VDSLx modem subsystem raises failure indication “Configuration Error” for
configurations where Maximum Bitrate < Minimum Bitrate for one of the
directions in case of the “atInit” RA Mode.
Values 0..262143
Description The Rate Adaptation Ratio specifies the ratio that should be taken into account
for allocating available data rate (in excess of the minimum data rate summed
over all bearer channels) among the different bearer channels in a given
direction.
The ratio is defined as a percentage from 0 to 100. The sum of the raRatios for
all bearers must be 100.
The excessive bitrate (that is, the available bitrate minus the sum of the
minimum bitrates) must be distributed among the different bearers according to
their respective raRatio.
When the maximum bitrate is achieved for one of the bearers, the raRatio of that
bearer must be distributed to the other bearers according to their respective
raRatio share.
This parameter is only meaningful in case multiple bearers are used (for
example, 2 for dual latency) and is ignored in case of single latency.
Description Specifies the maximum allowed delay introduced by the interleaving and
deinterleaving function in the corresponding direction.
The VTU-O and VTU-R choose their interleaving and coding parameters within
the maxDelay and minInp constraints.
Description Specifies custom band plan in case Predefined Band Plan selection (see
Predefined band plan) is set to “bandPlanCustom”, ignored otherwise. It always
excludes the Upstream or Downstream optional Band control.
Instances Line
Instances Line
Values bandPlanCustom: custom defined band plan (see also VDSLx Custom Band
Plan parameter)
bandPlanA: 998 band plan
bandPlanB: 997 band plan
bandPlanC: Fx band plan (see also Fx Band Plan Parameter)
bandPlanAext: ITU-T G.993.2 VDSL2 Annex C band plan
bandPlanChina1: China band plan 1
bandPlanChina2: China band plan 2
bandPlanAnnexA: ITU-T G.993.2 VDSL2 Annex A (extended) band plan
bandPlanAnnexB998E: ITU-T G.993.2 VDSL2 Annex B band plan type “998E”
bandPlanAnnexB997E: ITU-T G.993.2 VDSL2 Annex B band plan type “997E”
bandPlanAnnexB998ADE: ITU-T G.993.2 VDSL2 Annex B band plan type
“998ADE”
bandPlanAnnexBHPE: ITU-T G.993.2 VDSL2 Annex B band plan type “HPE”
Description Specifies the maximum number of bands to be supported for the given band
plan. In case the selected band plan (see Custom band plan and Predefined
band plan) contains more bands, the modem disables bands located at higher
frequencies first.
Otherwise, this parameter has no effect.
The optional band is NOT counted as a band, and does not take part to the
number of bands (example: if the maximum number of bands is set to 3, the
modem is allowed to use the optional band + DS1 + US1 + DS2).
The special value “unlimited” disables the maximum number of band constraint.
Instances Line
Unit Bands
Description Specifies the maximum frequency usable both VTU-O and VTU-R VDSL
modems, in showtime.
The special value “unlimited” disables the maximum usable frequency
constraint.
In case the configuration of this parameter would conflict with other parameters,
the configuration is rejected.
Note: This parameter is not equivalent to the “MUF” parameter commonly used
when dealing with CO-RT mixed deployment and PSD shaping. This last “MUF”
parameter is equivalent to the ADSL band mode end frequency parameter.
Instances Line
Unit kHz
Description Specifies whether the VDSLx modem is allowed to use the ADSL spectrum or
not in DS. The end frequency of the ADSL band is specified by the ADSL band
mode end frequency.
It controls the use of the ADSL spectrum within the defined VDSLx band plan,
with the exception of the optional band, which is not impacted by this parameter.
Note: whatever the value of this parameter, the modem is never allowed to
exceed the configured PSD mask (see PSD ceiling).
Instances Line
Description This parameter specifies the ADSL band end frequency. The start frequency is
always 25 kHz. It is used together with parameter 0 (see ADSL band mode).
It controls the use of the ADSL spectrum within the defined VDSLx band plan,
with the exclusion of the optional band, which is only controlled through the
Optional band mode.
This parameter is ignored when the ADSL spectrum usage is allowed.This
parameter is assumed 1104 kHz if no value, or if the special 0 kHz value is
configured.
Instances Line
Description Indicates if the VDSLx modem is allowed to use the optional band
(25 kHz..x kHz) or not and defines its direction in case the use is allowed.
The ‘x’ value is a parameter specified by the ADSL band mode end frequency.
This parameter is ignored and the optional band usage prohibited if not
supported by the HW.
The optional band usage is independent of the ADSL band mode parameter (0):
in case the ADSL band mode is set to “not allowed”, and the optional band mode
is enabled, the modem is still allowed to use the optional band.
Note: on ISDN boards, the optional band start frequency is shifted from 25 kHz
to 138 kHz.
Instances Line
Description When the optional band usage is enabled (see Optional band mode), this
parameter specifies the optional band end frequency. The start frequency is
always 25 kHz on POTS cards, and 138 kHz on ISDN cards.
The beginning of the first DS band is shifted accordingly (no spectrum overlap).
When the optional band usage is disabled, this parameter still fixes the
beginning of the normal DS band. It is assumed 138 kHz if no value, or if the
special 0 kHz value is configured.
Instances Line
Instances Line US
Values psdPboOff
psdPboOn
Description This parameter determines the mode of DS tones used during G.hs
(handshake) sequence. It is defined as an array of 4 mode values: one per
possibly used DS tone set in VDSLx mode: A43, B43, A43c, and V43:
GhsPSDMode = [GhsPSDMode_A43; GhsPSDMode_B43;
GhsPSDMode_A43c; GhsPSDMode_V43]
The following possible modes are defined:
• The special value “default” is translated as “the maximum power allowed in
the ITU-T G.994.1 standard” for that tone set.
• The special value “manual” is fetched from the DS G.hs tones power
manual level requirements.
• The special value “automatic” is translated as “the maximum power derived
from the configured Tx DS PSD (see MGMT_R11.1.1for VDSL1 or
MGMT_R11.2.1for VDSL2), according to the following formula and table:
If ‘fi’ is the frequency of the middle tone of the tone set #i, if ‘xi’ is the
maximum DS template PSD allowed by the MIB at frequency ‘fi’, then the
power of each tone of the tone set #i is:
Pi = 36.35 + min(max(xi + 3, mi), Si), where:
Si is the maximum standard value for tone set #I, and
mi is the minimum PSD floor, defined in Table TNG 107-24.
An NSIF field is introduced for V43 back off communication from VTU-O to
VTU-R. If the final derived value falls below the minimum value handled by the
G.994.1 standard for the considered set, that minimum allowed value is used.
Instances Line
Notes
(1) Alcatel will determine if the conservative mode shall be used or not. This has to be hardcoded in the
chipset implementation.
Description This parameter determines the maximum power of DS tones used during G.hs
(handshake) sequence, in case the manual mode is selected. It is defined as an
array of 4 PSD values: one per possibly used DS tone set in VDSLx mode: A43,
B43, A43c, and V43:
GhsPSD = [manual_A43; manual_B43; manual_A43c; manual_V43]
Each value is given in dBm/Hz. The power of each tone of a considered set is
equivalent to the given PSD value integrated in a total bandwidth of 4.3125 kHz.
One special value is defined: the value -99 dBm/Hz indicates that the full set is
not used (that is, no power allowed).
Instances Line
• Modem features
• Maximum aggregate transmit power
• PSD ceiling
• Custom MIB PSD Mask
• US Power BackOff PSD:
• US power backOff PSD mask selection
• US power backOff PSD AB parameters
• US power backoff PSD full custom parameters
Description Specifies modem features which can be allowed or not by the operator.
Currently, only bit 0 (LSB) of this bitmap is interpreted by the VDSLx modem
subsystem.
BIT0 – Standard Compliancy: if active (1), the modem subsystem must turn off
all features not strictly compliant to the standard. If not active (0), the modem
subsystem is allowed to use non-standard features, via the NSIF G.hs bits.
Instances Line
Values Bitmap
Description Specifies the maximum total power level that is allowed to be transmitted in the
corresponding direction.
This parameter is used to reduce the maximum allowed PSD derived from
Custom MIB PSD Mask, VDSL 1 Limit Tx PSD mask or VDSL 2 Limit Tx PSD
mask.
Note that this parameter overrules maximum aggregate Tx power standard
restrictions, except if the special value “standard” is configured.
The special value “standard” is used as special value:
• For VDSL1:
• If the selected PSD is referring to a predefined PSD, then the maximum
aggregate transmit power defined in the corresponding DSL standard
must be used, in accordance with the deployment type PSD: FTTEx or
FTTCab.
• Otherwise (customized PSD): no power limitation has to be applied.
• For VDSL2:
• The applicable maximum power constraint is the one corresponding to
the selected VDSL2 profile.
Description The PSD ceiling parameter specifies the maximum power spectral density level
allowed on the line at the transmitter output (upstream and downstream) for
initialization and showtime signals.
This parameter shall be used to further restrict the maximum Tx PSD mask
derived from Custom MIB PSD Mask, VDSL 1 Limit Tx PSD mask or VDSL 2
Limit Tx PSD mask.
The value “no_constraint” is used as special value, which avoids restrictions to
the maximum Tx PSD mask.
Note that this parameter is defined on the PSD template, not on the PSD mask.
Instances Line DS, US
Notes
(1) The Maximum PSD parameter cannot be used to boost the PSD beyond the configured LimitTxPSD
and MIB Mask (See Custom MIB PSD Mask, VDSL 1 Limit Tx PSD mask or VDSL 2 Limit Tx PSD
mask), it can only be used to put additional constraints, i.e. to further lower the PSD. The modem
supports extended maximum PSD range under to -80 dBm/Hz.
(1 of 2)
(2 of 2)
Description Specifies the maximum receive PSD allowed for the US direction on a VDSLx
line in case of psdPboOn (see US power backoff mode), ignored otherwise.
The VDSLx modem subsystem checks consistency between the PSD Mask
settings and other configuration parameters. If not consistent, the configuration
is rejected by raising the “Configuration Error” failure (for example, the modem
subsystem rejects configurations with inconsistent DS and US PSD mask
settings).
(1 of 2)
Remarks:
• The ANSI noise profiles are not defined yet for types B, C, D and E. The
modem subsystem rejects the configuration of those ones.
• The ETSI UPBO masks for noise types A and B are the same.
• The modem subsystem rejects the configuration if an ANSI UPBO mask is
used together with the ETSI operating mode, and vice versa (VDSL1 only).
• The “_CustomEx/Cab” masks allow the modem subsystem to use
customized and pre-defined UPBO masks for specific deployment
scenarios.
(2 of 2)
Notes
(1) This psdMask is outphasing
PSDREF(f) = -(a + b f)
Description This parameter is only used when the mask selection is set to
“psdMaskFullCustom” (see US power backOff PSD mask selection).
US Power BackOff PSD Full Custom Mask is only supported for VDSL1.
Description For DS and US: specifies the maximum transmit PSD allowed for the
corresponding direction on a VDSL1 line.
A pre-defined set of standard PSD masks is defined. It is the responsibility of
the VDSL1 modem subsystem to translate the PSD Mask number into the
standard definition.
The VDSL1 modem subsystem checks consistency between the PSD Mask
settings and other configuration parameters. If not consistent, the configuration
is rejected by raising the “Configuration Error” failure (for example, the modem
subsystem rejects configurations with inconsistent DS and US PSD mask
settings).
(1 of 2)
Values psdMaskCustom: custom defined PSD Mask (see Custom MIB PSD Mask)
Line DS/US:
psdMaskANSI_FTTEx_M1
psdMaskANSI_FTTEx_M2
psdMaskANSI_FTTCab_M1
psdMaskANSI_FTTCab_M2
psdMaskANSI_FTTCab_M1_ADSL: FTTCab.M1 used for US
psdMaskANSI_FTTCab_M2_ADSL: FTTCab.M2 used for US
psdMaskANSI_FTTCab_M1_ADSL2+: FTTCab.M1 used for US
psdMaskANSI_FTTCab_M2_ADSL2+: FTTCab.M2 used for US
Remarks:
• The modem subsystem rejects the configuration if another band plan than
998 has been selected in combination with ANSI PSD masks.
• The modem subsystem rejects the configuration if the ETSI Operating
Mode has been selected in combination with those ANSI PSD masks.
(2 of 2)
Instances Line
Values 3750..12000
(1 of 2)
Values • psdMaskCustom: custom defined PSD Mask (see Custom MIB PSD Mask).
In this case, there is no limit mask (unlimited), and the maximum Tx PSD
mask envelope is determined by the Custom MIB PSD mask.
• PsdMaskRegionA: refers to North American standard Annex A
Remarks:
• Detailed PSD Mask for region A can be derived from the MGMT_R9.34
parameter, which fixes US0/DS1 transition frequency.
• PsdMaskRegionB_M1
PsdMaskRegionB_M2: refers to European standard Annex B
Remarks:
• Detailed PSD Mask for region B has to be used in combination with the
Predefined band plan parameter to check validity.
• Detailed PSD Mask for region B can be derived from other parameters.
• The modem subsystem shall reject the configuration if another band
plan than 998 or 997 has been selected in combination with ETSI PSD
masks.
• PsdMaskRegionC: refers to Japanese standard Annex C
PsdMaskRegionC corresponds to the G993.2 [5] AnnexC (Japan region)
and shouldn’t be misinterpreted as the G993.1 [4] AnnexC. It is also
associated to the BandPlanAext band plan (see Band plan).
(2 of 2)
Instances Line
Description TXREFVNL defines the Transmitter Referred Virtual Noise Level to be used in
determining the SNR margin. It is defined as an array of 32 breakpoints for
downstream bands and 16 breakpoints for upstream ones.
Breakpoints definition is identical to the VDSL2 MIB PSD defined in Custom MIB
PSD Mask. Points are given in frequency [kHz] and PSD [dBm/Hz] components,
and are translated to sets of arrays per US band: TXREFVNL[..] [] = [(t1, PSD1),
(t2, PSD2), …, (tN, PSDN)], where t1 and tN are, respectively, the lower and
higher band edge frequencies of the band. Arrays are then concatenated to
make one unique array.
When the VTU operates with 8.625 kHz sub-carrier spacing, all odd sub carriers
are converted by the VTU, to the closest even value, and values t1 and tN are
rounded (up and down, respectively) to even values.
Instances Line
Description Selects the reference noise PSD that shall be considered when evaluating the
noise margin.
Instances US, DS
Values • SNRM_MODE_1: the reference noise PSD is the external noise PSD
present at U interface.
• SNRM_MODE_2: the reference noise PSD is the maximum (tone per tone)
between the external noise PSD present at U interface and the received
virtual noise derived from parameter Virtual Noise PSD.
Note:
• If SNRM_MODE_2 for US is selected, and the virtual noise is not supported
by the VTU-O, the VTU-O raises a “configuration error” failure.
• If SNRM_MODE_2 for DS is selected, and the virtual noise is not supported
by the VTU-R, the VTU-O falls back to DS SNRM_MODE_1, and proceeds
normally.
Description This parameter allows the operator to forbid some US0 modes.
Contain the following data structure: MaskContent, Mode, and
NoMatchBehaviour
• MaskContent:
Three 32 bits words, one per VDSL2 annex:
W0 = a31 a30 a29 ... a2 a1 a0 for VDSL2 annex A
W1 = b31 b30 b29 ... b2 b1 b0 for VDSL2 annex B
W2 = c31 c30 c29 ... c2 c1 c0 for VDSL2 annex C
The MSB (that is, the bit #31) of each word is ignored (the applicable VDSL2
annex type is derived from the selected VDSL 2 Limit Tx PSD mask).
Other mode bits are mapped to G.994.1 US0 octets of the corresponding
annex, from LSB to MSB: G.994.1 octet #k shall be mapped to bits x(k-1)*6
-> xk*6-1.
Bits not explicitly mapped to G.994.1 mode are ignored.
• Mode:
Indicates how to restrict US0 modes:
• disabled: no restriction applies (MaskContent is ignored).
• mask: the MaskContent bitmap defines a mask to be applied on top of
the negotiated US0 mode capabilities (that is, a cleared bit indicates a
forbidden mode).
• NoMatchBehaviour:
Defined what to do when, after the restriction, there is no matching US0
mode:
• noUS0: no match: US0 is turned off (standard behavior).
• noInit: no match: the initialization sequence is aborted, and the modem
raises a “configuration not feasible” failure.
Instances Line
Description When VTUs select internal FEC and interleaving parameters according to
configured minimum INP and maximum interleaver delay, fixes whether the
Erasure detection mechanism has to be ignored or not.
Values When set to 1, it indicates that the VTU receiver shall select framing parameters
so that INP_no_erasurep > INP_minConfigured. This means that the minimum
configured INP (together with maximum interleaver delay) will already be
achieved with the erasure detection mechanism disabled.
When set to 0, it indicates that VTUs receivers are not required to select framing
parameters that ensures INP_no_erasurep > INP_minp. In all cases, the VTU-R
receiver meets the requirement, INPp > INP_minConfigured.
This applies to all latency paths.
The VDSLx Modem Subsystem assures that the Showtime values (if applicable for the
considered parameter) are available for retrieval over the xDSL API within 10 seconds
after entering the L0 state. During the first 10 seconds of the L0 state, the VDSL Modem
Subsystem returns the Initialization values (if applicable for the considered parameter) if
the Showtime value for the considered parameter is not available yet.
Description The operational mode used for the current operation of the VDSLx modem
subsystem (see Operating modes).
Instances Line
Description The total set of operational modes supported by the VTU-O and the VTU-R
respectively.
Instances Near-end/Far-end
Update frequency NA
Description Indicates the current showtime noise margin: the maximum increase (in dB) of
the reference noise PSD (at all relevant frequencies), such that the BER of each
TPSTC stream does not exceed the maximum BER specified, without any
change of PMD parameters (that is, bits and gains) and PMS-TC parameters
(for example, FEC parameters). The BER is referenced to the output of the
PMS-TC function (that is, the α/β interface). * the maximum increase (in dB) of
the reference noise power that can be tolerated such that the VTU can still meet
the target BER requirement.
The reference noise PSD, in VDSL2 mode, does not correspond with the total
(internal + external) noise.
The SNR Margin in a given band shall assume a PSD noise increase in the
relevant band only.
Instances Global DS/US for VDSLx, and per band for VDSL2 on top (including US0 band).
Values -64..+63 dB
Description The difference in dB between the power received at one end and that
transmitted at the opposite end over all subcarriers during initialization. It is not
updated during showtime.
Values 0..102.3 dB
Note: when the actual loop attenuation is exceeding an extremum value that can
be represented, clamping to this extremum representable value is done.
Accuracy 0.5 dB
Update frequency NA
Description The difference in dB between the power received at one end and that
transmitted at the opposite end over all subcarriers during showtime. It
corresponds to the Line Attenuation as defined in G.997.1, §7.4.4/5.
Note: difference with Loop Attenuation is that the transmit power has changed
for the subcarriers and that the total number of subcarriers during showtime
typically will be less than during initialization.
Values 0..102.3 dB
Note: when the actual loop attenuation is exceeding an extremum value that can
be represented, clamping to this extremum representable value is done.
Description Actual aggregate output power (that is, the total output power for the carriers of
the corresponding direction) when the modem is in showtime.
Instances DS/US
Description Actual Average (in dB) Transmit power spectrum density over the loaded
subcarriers.
Instances DS/US
Values -95..0 dBm/Hz.
A special value “Out of Range” indicates the parameter is out of range to be
represented.
Description This parameter represents the last successful transmitted (VTU-O instance)
and received (VTU-R instance) SOC message ID during initialization sequence
in the relevant direction, in the last full initialization performed on the line.
Thus, initialization states are defined as the SOC message code IDs.
Description Indicates the maximum bitrate the modem can sustain on the line (that is, the
transported payload plus all overhead from the PMD (If a Trellis encoder would
be used, the overhead shall be included in the Attainable Line Bitrate), PMS-TC
and TPS-TC layers) taking the current configuration into account (for example,
the Attainable Line Bitrate assumes that the current interleaver and coding
settings are not changed). If multiple bearer channels are active, the calculation
assumes that all capacity would be allocated to the bearer channel with the
highest coding gain.
The value only depends on the actual noise margin on the line.
Instances DS/US
Values 0..65535
Remark: in case of no EOC, the initialization value for Attainable DS Line Bitrate
is returned.
Instances DS/US
Values 0..262143
Update frequency NA
Description The ratio of the Actual Line Bitrate and the Attainable Line Bitrate when both are
available.
In case of an activation error “Configuration not feasible”, it is set to 100 % for
each direction where the minimum bitrate cannot be sustained.
Instances DS/US
Values 0..100%
(1 of 2)
Update frequency DS: derived from Actual and Attainable Line Bitrate
US: derived from Actual and Attainable Line Bitrate
(2 of 2)
Description Indicates the maximum net data bitrate (that is, transported payload plus
TPS-TC layer overhead) the VTU can sustain on the line taking the current
configuration into account, with margin not lower than Target Noise Margin. This
parameter is provided for each activated bearer channel. The calculation
estimates the attainable transport Bitrate assuming that all available capacity is
allocated to that bearer channel and that current interleaver and Reed-Solomon
settings are not changed.
The value depends on the actual noise margin on the line.
Values 0..262143
Description The actual transport rate (that is, the transported payload plus header bytes)
expressed in kbps.
Values 0..262143
Update frequency NA
Values 0..63
Update frequency NA
Table TNG 107-55: Actual impulse noise protection (per bearer channel)
Description Actual value of the impulse noise protection offered by the interleaving and
coding functionality.
Update frequency NA
Description The TPS-TC layer mode used for the current operation of the VDSLx modem
subsystem.
Values Same bitmap as TPS-TC mode capabilities. Only 1 bit can be set to 1 at a time.
Granularity & Unit -
Update frequency NA
Values Bitmap:
TPSTCModesATMBit
TPSTCModesPTM_64_65Bit
TPSTCModesPTM_HDLCBit
Update frequency NA
Instances DS/US
Values Bitmap:
SingleToneSpacingBit
DoubleToneSpacingBit
Update frequency NA
Instances VTU-R/VTU-O
Note: We consider here that electrical length is positive when the loop gain is
negative in dB (smaller than one in linear).
This is data is only available in VDSL2 operational mode.
Values 0..127.5
Granularity & Unit 0.1 dB @ 1 MHz
Description Defines the VTU-R timing advance. Positive values indicates that the
transmitted symbol will be advanced more with respect to the received symbol.
The VTU-R instance represents the initial TA as proposed by the VTU-R, and
the VTU-O instance represents the final VTU-R TA value, after VTU-O
correction (if any).
Values -250..+250
Accuracy +/- 25 ns
Description Defines the highest carrier for which the SNR is sufficient, such that the bit
loading allocates at least 1 bit.
Rounding rule: Value is rounded to the lowest frequency bigger or equal to the
highest used carrier.
Instances US/DS
Values 0..30000
Description Defines the sub-carrier spacing used in some carrier related test parameters.
In VDSL1 mode, the report value shall always be 1.
Instances US/DS
Values 1, 2, 4, or 8.
Description Actual Maximum Transmit power spectrum density over the loaded subcarriers.
Instances US/DS
Values -95..0
A special value “Out of Range” indicates the parameter is out of range to be
represented.
Instances VTU-O/VTU-R
Values Three times 32 bits word: [W2, W1, W0], according to parameter description
above.
Description Returns the actual applicable ITU-T.993.2 ([5]) standard limit PSD mask,
including the US0 mode/variant.
The returned data are three 32 bits words, and a limit PSD indicator: [W2, W1,
W0, M].
The first three words (Mx) identify the actual standard annex and US0
mode/variant, following the format defined in VDSL2 annex modes capabilities.
Up to one word has raised bits: the word associated with the actual standard
annex. In this word, the MSB (that is, the bit #31) is raised, together with up to
one other bit identifying the actual US0 mode.
The PSD indicator (M) identifies the actual limit PSD mask, taken from Table
TNG 107-66
The “unknown” answer type is used when the transceiver does not find any
match with standard PSDs, or when no direct match is found (that is, short name
if PSD is “NONE”).
The “other” answer type is used when a match is found with the current
standard, but the corresponding PSD or Annex is missing from the PSD list.
(see Table TNG 107-66).
Instances Line
Values Three times 32 bits word: [W2, W1, W0], according to parameter description
above.
Annex PSD
- Invalid
- Unknown
- Other Annex
A Unknown in Annex A
A Other in Annex A
B Unknown in Annex B
B Other in Annex B
B 997-M1c-A-7
B 997-M1x-M-8
B 997-M1x-M
B 997-M2x-M-8
B 997-M2x-A
B 997-M2x-M
B 998-M1x-A
B 998-M1x-B
B 998-M1x-NUS0
B 998-M2x-A
B 998-M2x-M
B 998-M2x-B
B 998-M2x-NUS0
C Unknown in Annex C
C Other in Annex C
Instances DS
Instances DS/US
Description Indicates the actual cyclic extension used on the line (in showtime).
Instances Line
Values 2, 3, 4, 5, …, 16.
Granularity & Unit Unit of N/32 samples, where 2*N is the IFFT size.
Description Indicates the following actual used framing parameters, per bearer. and linked
to the latency path that carries that bearer:
• Nfec: actual size of Reed Solomon codeword
• Rfec: actual number of Reed Solomon redundancy bytes
• Lsymb: actual number of bits per symbol assigned to the latency path
transporting the bearer (excluded Trellis overhead)
• Dintlv: actual interleaving depth
• Iintlv: actual interleaving block length
Values Nfec: bytes, ranging from 0 to 255. The value 0 indicates no Reed Solomon
coding.
Rfec: bytes, ranging from 0 to 16. The value 0 indicates no Reed Solomon
coding.
Lsymb: bits (per symbol), ranging from 0 to 65536.
Dintlv: ranges from 1 to 4096. The value 1 indicates no interleaving.
Iintlv: ranges from 4 to 255, plus the 1 value that indicates no interleaving.
Granularity & Unit See “Values”.
Introduction
This training document gives more information about the parameters used by the SHDSL
modem:
• Re-initialization triggers
• Supported span operation configuration parameters
• Supported unit operation configuration parameters
• Supported segment termination operation configuration parameters
• Supported span operational data parameters
• Supported unit operational data parameters
• Supported segment termination operational data parameters
Re-initialization triggers
During showtime (L0 line state), the SHDSL Modem Subsystem performs
persistency/severity checking and correlation on the defects/anomalies, in order to detect
re-initialization triggers. Table TNG 108-1 lists them for the SHDSL Transceiver Unit at
the Central office side (STU-C) and includes the required persistency time for each
showtime error.
Near-End Far-End
The SHDSL Modem Subsystem triggers/initiates re-activation of the modem when any of
those triggers is fired. No other re-initialization triggers (annex timer values) are used by
the Modem Subsystem than the ones mentioned in Table TNG 108-1.
All far-end count-down timers are frozen when any near-end defect occurs. When all
near-end defects have disappeared, far-end count-down timers resume from frozen
values (ignoring the in-between time).
All near-end defects are correlated independent from each other. The same holds for all
far-end defects in absence of near-end defects.
• In case a parameter is indicated as “optional”, the input value is don’t care, and any
value is accepted without having impact on the modem subsystem behavior.
• In case a parameter is indicated to be required to a certain level (for example, only
limited set of defined number of input values), only input values corresponding to the
required level are accepted. If the input parameter is not accepted, the modem
subsystem raises a failure indication to the xDSL Manager indicating “Configuration
Error”
• In case extra consistency checks need to be performed on a parameter or between
parameters and the configuration should be rejected, 'rejection' always means that
the modem subsystem raises a failure indication to the SHDSL Manager indicating
“Configuration Error”, rather that a returned error of the considered SHDSL API call.
• An SHDSL API configuration request is replied with an error only when the call is done
in a wrong administrative state.
The SHDSLx Modem Subsystem allows that the configuration can be independently set
on individual line basis.
M-pair (1 < M < 4) stands for a multiple-pair operation over SHDSL span for some
applications having higher data rate requirements for end users.
Four-wire mode is identical to M-pair mode with M = 2, except for the method of assigning
ordinal numbers to the wire pairs.
• Data Rates: M-pair operational mode is capable of supporting user (payload) data
rates from M *192 kbit/s to M *2.312 Mbit/s in increments of M * 8 kbit/s, where 1 < M
< 4. Note that optional extensions described in Annex F/G allow user data rates up to
M *5696 kbit/s. Four-wire mode is identical to M-pair mode with M = 2, except for the
method of assigning ordinal numbers to the wire pairs.
• Embedded Operations Channel (EOC): For optional M-pair operation, each EOC
message is sent in parallel such that redundant and identical messages are sent over
all M loops. In M-pair mode, eoc01 - eoc20 on Pair 1 carries the primary EOC data.
The corresponding Pair 2 to Pair M eoc bits are duplicates of the Pair 1 eoc bits.
• SHDSL Transceiver Unit at the Remote side (STU-R) Power Status: In M-pair mode,
ps on Pair 1 carries the primary power status indication. The ps bit on all other pairs
are duplicates of the Pair 1 ps bit.
• Power Feeding/Wetting Current: In the optional M-pair mode, the requirements for
remote power feeding or wetting current for each of the M pairs are identical to the
requirements for a single pair.
• Activation Procedure: In devices supporting the optional M-pair mode, the core
activation procedure is considered as an independent procedure for each pair. Such
devices are capable of detecting the completion of activation for all pairs and upon
completion will initiate the transmission of user data over all pairs.
• Line Probe: In the optional M-pair mode, STU-R remote probe signal Pri and STU-C
central probe signal Pci are sent in parallel on all wire pairs.
• G.994.1: In the optional 4-wire mode, Pair 1 and Pair 2 are determined during the
preactivation sequence procedures defined in Annex B/G.994.1 entitled, “Operation
over multiple wire pairs”. Pair 1 is defined as the pair on which the final G.994.1
transaction is conducted. In the optional M-pair mode, the G.994.1 exchange follows
the defined procedures for multi pair operation.
Operating Modes
The standards that need to be supported for the current projects are listed in
SHDSL_R24.
Operational modes not supported by the STU-C shall be ignored (that is, they
are not considered selected).
Multiple mode selection is not allowed.
The operational mode is selected by the SHDSL Manager before startup the
line, each line’s operational mode are independent to the other lines, with
exception of M-pair mode which requires all lines belong to a M-pair
configuration in the same operational mode.
Operational modes are not exchanged by G.hs.
The modem rejects the configuration and raises the “Configuration error”
activation failure in the following scenarios:
• No mode is selected (or no STU-C supported mode is selected)
In IMA Mode, Minimum and Maximum Requested Data Rates are to be set to
the same value, which would be the same for all links in the IMA group. For this
reason, the IMA mode selection and Group assignment needs to be made at the
same time as the initial provisioning.
IMA is not supported over M-pair links.
Instances Span
Values shdsl_native_mode
shdsl_ima_mode
shdsl_efm_mode
Granularity & Unit -
Number of Repeaters
Description Configures the number of SRU (repeater) units to be configured for this SHDSL
span. It controls the number of SRU (repeater) entries in the unit configuration.
Instances Span
(1 of 2)
Values 0-8
(2 of 2)
Spectral Profile
Description Specifies the spectral mode in which this SHDSL span is to be configured with.
Two options are supported:
• AsymmetricProfile
• SymmetricProfile
Examples:
Annex A/2-Wire: 768 kb/s & 1536 kb/s
Annex A/4-Wire: 1536 kb/s & 3072 kb/s
Annex B/2-Wire: 2048 kb/s & 2304 kb/s
Annex B/4-Wire: 4096 kb/s & 4608 kb/s
Instances Span
Values symmetricProfile
asymmetricProfile
Wire Mode
Instances Span
(1 of 2)
Values shdsl_two_wire
shdsl_four_wire
shdsl_six_wire
shdsl_eight_wire
(2 of 2)
Instances Span
Values disabled
enabled
Regional Setting
Description Specifies the regional setting for the SHDSL line per the ITU-T G.992.1
Annexes (Annex A/F and Annex B/G).
• Region 1 - G.991.2 Annex A/F
• Region 2 - G.991.2 Annex B/G
Instances Span
Values BitMap:
Bit Setting
--- ---------
0 Region 1
1 Region 2
Description Defines the minimum requested transport payload bitrate which shall be set up
and which shall be maintained during showtime by the STU.
When line probe is enabled, the SHDSL line is probed for levels between this rate
and the maximum requested data rate. The Line will not be activated at a lower
rate.
Only ATM/EFM Mapping is supported, this limits the resulting data rates to
multiples of 64k (192 to 5696) in TwoWire mode; and to multiples of 128k (384 to
11,392) in FourWire mode, to multiples of 192k (576 to 17,088) in SixWire mode,
to multiples of 256k (768 to 22,784) in EightWire mode.
In IMA Mode, Minimum and Maximum Requested Data Rates are to be set to the
same value which would be the same for all links in the IMA group. This result in
a constraint to use exact 64 kb/s multiples in provisioning.
Instances Span
Description Specifies the maximum requested SHDSL data rate which can range from 192 to
5696 kb/s in Two Wire mode, plus the rate of 2312; and from 384 to 11.392 kb/s
in FourWire mode; from 576 to 17,088 kb/s in SixWire mode; from 768 to 22.784
kb/s in EightWire mode
The SHDSL line is probed for levels between this rate and the minimum
requested data rate. The Line will not be activated at a higher rate.
Only the ATM/EFM Mapping is supported, this limits the resulting data rates to
multiples of 64k (192 to 5696) in TwoWire mode; and to multiples of 128k (384 to
11.392) in FourWire mode, to multiples of 192k (576 to 17.088) in SixWire mode,
to multiples of 256k (768 to 22.784) in EightWire mode.
In IMA Mode, Minimum and Maximum Requested Data Rates are to be set to the
same value which would be the same for all links in the IMA group. This result in
a constraint to use exact 64 kb/s multiples in provisioning.
This parameter is relevant only in line probe enabled mode. When line probe is
not “enabled”, the Maximum Bitrate parameter is ignored.
As the data rate granularity is in multiple of 64 kbps, the following rounding
scheme for Minimum and Maximum Bitrates is implemented:
• The Minimum Bitrate is rounded up and the Maximum Bitrate is rounded
down according to the data rate granularity when for the corresponding
direction Maximum Bitrate ¡Ý Minimum Bitrate after rounding.
• Otherwise, both bitrates are rounded up and Minimum Bitrate = Maximum
Bitrate after rounding up.
The SHDSL modem subsystem raises failure indication “Configuration Error” for
configurations where Maximum Bitrate < Minimum Bitrate for one of the
directions when line probe is “enabled”.
Instances Span
(1 of 2)
(2 of 2)
Description Specifies the Target Margin in the Downstream direction, relative to the
reference Worst Case, to be used during handshake and line-probe procedure
in gauging a Bit Error Rate (BER) better than 1E-7.
Target margin is used by the receiver to determine if a data rate can be
supported with this margin under current noise measured during line probe
and/or reference worst-case noise specified in Annexes A and B. A data rate
may be included in the capabilities list resulting from line probe only if the
estimated Signal-to-Noise Ratio (SNR) associated with that data rate minus the
SNR required for BER = 1E-7 is greater than or equal to the target margin in dB.
If both worst-case target margin and current-condition target margin are
specified, then the capabilities exchanged shall be the intersection of data rates
calculated using each noise condition separately.
The use of negative target margins with respect to reference worst-case noise
corresponds to reference noise with fewer disturbers. This may be applicable
when the number of disturbers is known to be substantially fewer than specified
by the reference worst-case noise. Use of negative target margins with respect
to current conditions is not advised. Use of the current-condition target margin
mode may result in retrains if the noise environment changes significantly.
The negotiation of the target margins is done as follows:
The target margins to be used by both the STU-C and the STU-R for
determining the supported data rates are under the control of the STU-C. In the
PMMS parameter exchange, the STU-C shall set the upstream and
downstream PMMS target margins to identical values. This does not imply that
the worst-case and current-conditions target margins are the same.
To determine which data rates the STU-C can support, the STU-C can choose
to use the upstream PMMS target margin transmitted by the STU-R in the
PMMS parameter exchange, or the STU-C may choose to use an alternative
internal value for the PMMS target margins. The STU-R shall use the
downstream PMMS target margin parameters sent by the STU-C for
determining which data rates the STU-R can support. This procedure is
applicable to both the current-condition and the worst-case target margins.
In M-pair operation, the same Downstream Target Noise Margin is used on all
pairs.
A value of -11 indicates not to use the Worst Case method in the downstream
direction.
Instances Span
Values -11to 10
Description Specifies the Target Margin in the Downstream direction, relative to the Current
noise conditions, to be used during handshake and line-probe procedure in
gauging a BER better than 1E-7.
Target margin is used by the receiver to determine if a data rate can be
supported with this margin under current noise measured during line probe
and/or reference worst-case noise specified in Annexes A and B. A data rate
may be included in the capabilities list resulting from line probe only if the
estimated SNR associated with that data rate minus the SNR required for BER
= 1E-7 is greater than or equal to the target margin in dB. If both worst-case
target margin and current-condition target margin are specified, then the
capabilities exchanged shall be the intersection of data rates calculated using
each noise condition separately.
The use of negative target margins with respect to reference worst-case noise
corresponds to reference noise with fewer disturbers. This may be applicable
when the number of disturbers is known to be substantially fewer than specified
by the reference worst-case noise. Use of negative target margins with respect
to current conditions is not advised. Use of the current-condition target margin
mode may result in retrains if the noise environment changes significantly.
The negotiation of the target margins is done as follows:
The target margins to be used by both the STU-C and the STU-R for
determining the supported data rates are under the control of the STU-C. In the
PMMS parameter exchange, the STU-C shall set the upstream and
downstream PMMS target margins to identical values. This does not imply that
the worst-case and current-conditions target margins are the same.
To determine which data rates the STU-C can support, the STU-C can choose
to use the upstream PMMS target margin transmitted by the STU-R in the
PMMS parameter exchange, or the STU-C may choose to use an alternative
internal value for the PMMS target margins. The STU-R shall use the
downstream PMMS target margin parameters sent by the STU-C for
determining which data rates the STU-R can support. This procedure is
applicable to both the current-condition and the worst-case target margins.
In M-pair operation, the same Downstream Target Noise Margin is used on all
pairs.
A value of -11 indicates not to use the Worst Case method in the downstream
direction.
Instances Span
Values -11to 10
Description Specifies the Target Margin in the Upstream direction, relative to the reference
Worst Case, to be used during handshake and line-probe procedure in gauging
a BER better than 1E-7.
Target margin is used by the receiver to determine if a data rate can be
supported with this margin under current noise measured during line probe
and/or reference worst-case noise specified in Annexes A and B. A data rate
may be included in the capabilities list resulting from line probe only if the
estimated SNR associated with that data rate minus the SNR required for BER
= 1E-7 is greater than or equal to the target margin in dB. If both worst-case
target margin and current-condition target margin are specified, then the
capabilities exchanged shall be the intersection of data rates calculated using
each noise condition separately.
The use of negative target margins with respect to reference worst-case noise
corresponds to reference noise with fewer disturbers. This may be applicable
when the number of disturbers is known to be substantially fewer than specified
by the reference worst-case noise. Use of negative target margins with respect
to current conditions is not advised. Use of the current-condition target margin
mode may result in retrains if the noise environment changes significantly.
The negotiation of the target margins is done as follows:
The target margins to be used by both the STU-C and the STU-R for
determining the supported data rates are under the control of the STU-C. In the
PMMS parameter exchange, the STU-C shall set the upstream and
downstream PMMS target margins to identical values. This does not imply that
the worst-case and current-conditions target margins are the same.
To determine which data rates the STU-C can support, the STU-C can choose
to use the upstream PMMS target margin transmitted by the STU-R in the
PMMS parameter exchange, or the STU-C may choose to use an alternative
internal value for the PMMS target margins. The STU-R shall use the
downstream PMMS target margin parameters sent by the STU-C for
determining which data rates the STU-R can support. This procedure is
applicable to both the current-condition and the worst-case target margins.
In M-pair operation, the same Downstream Target Noise Margin is used on all
pairs.
A value of -11 indicates not to use the Worst Case method in the downstream
direction.
Instances Span
Values -11to 10
Description Specifies the Loop Attenuation Threshold Value in dBs, for generated
associated alarms.
A value of 0 disables alarm generation.
Instances Unit
Values 0-127
Description Specifies the SNR Margin Threshold Value in dBs, for generated associated
alarms.
A value of 0 disables alarm generation.
Instances Unit
Values 0-15
Loopback Timeout
Instances Unit
Values 0-4095
Loopback Config
Description Specifies the loopbacks for the associated side of an SHDSL unit.
Only Network Side loopbacks are supported for SRU and STU-R units
Values NoLoopback
NormalLoopback
Description Specifies the Power Backoff rule at the associated Segment Termination.
Values Default
Selected
Granularity & Unit -
Soft Restart
Description Initiate a Soft Restart message towards the relevant segment termination.
When the value of this object is set from 0 to 1, a Soft Restart EOC message is
initiated. After 5 minutes the value of the object is automatically set back to 0.
The SHDSL Modem Subsystem assures that the Showtime values (if applicable for the
considered parameter) are available for retrieval over the SHDSL API within 10 seconds
after entering the Operational Up state. During the first 10 seconds of the Operational Up
state, the SHDSL Modem Subsystem returns the Initialisation values (if applicable for the
considered parameter) if the Showtime value for the considered parameter is not
available yet.
Span State
Instances Span
Values unknown
unequipped
faulty
idle
startup
active
Granularity & Unit -
Detected Units
Description Indicates the units that have been detected on this SHDSL span, bits are set(1)
for detected units.
Instances Span
Values Bitmap:
Bit Unit
--- ------
0 STU-C
1 STU-R
2 SRU-1
3 SRU-2
4 SRU-3
5 SRU-4
6 SRU-5
7 SRU-6
8 SRU-7
9 SRU-8
Initialization value NA
Update frequency NA
Configured Units
Description Indicates the units in the SHDSL span which have been successfully
configured, bits are set (1) for units which have been successfully configured.
Instances Span
Values Bitmap:
Bit Unit
--- ------
0 STU-C
1 STU-R
Initialization value NA
Update frequency NA
Span Status
Instances Span
Values Bitmap:
Bit Condition
--- ---------
0 No Error
1 LOSW
2 Loop Attenuation Alarm
3 SNR Margin Alarm
4 DC Continuity Fault
5 Device Fault
6 Configuration Error
7 Loopback(s) Active
8 Non-Conform to STU-C Enable/Disable of STU-R Initiated Management
Flow
9 ATM LCD/PTM LPD
10 Loss of Power
11 ATM NCD/PTM NPD
Initialization value NA
Update frequency NA
Description Provides the correlation between the actual ports and their dynamic designation
as fistPair and secondPair and thirdPair and fourthPair (if M>2 is supported) as
a result of the pre-activation sequence in a modem ASIC. (firstPair is defined as
the pair on which the final G.994.1 transaction is conducted)
For 4-wire mode:
• 00000100b: if the first port is the first pair, second port is the second pair
• 00000001b: if the second port is the first pair
Instances Span
Values Bitmap:
Bit Condition
--- ---------
1,0 wirePair of the 1st modem ASIC port for 6/8-wire, 1st/3rd numbered port
for 4-wire
3,2 wirePair of the 2nd modem ASIC port for 6/8-wire, 2nd/4th numbered port
for 4-wire
5,4 wirePair of the 3rd modem ASIC port for 6/8-wire, set to 0 for 4-wire
7,6 wirePair of the 4th modem ASIC port for 8-wire, set to 0 for 4/6-wire
wirePair value
---------- --------
1stPair 00
2ndPair 01
3rdPair 10
4thPair 11
Initialization value NA
Update frequency NA
The SHDSL Modem Subsystem assures that the Showtime values (if applicable for the
considered parameter) are available for retrieval over the SHDSL API within 10 seconds
after entering the Operational Up state. During the first 10 seconds of the Operational Up
state, the SHDSL Modem Subsystem returns the Initialisation values (if applicable for the
considered parameter) if the Showtime value for the considered parameter is not
available yet.
Unit Operational Data only exist for those units that are configured as indicated by the
shdslSpanConfiguredUnits, and which support SHDSL EOC Performance Status
messages defined in ITU-T G.991.2[1].
Unit DC Powering
Description Indicates whether this unit is powered locally, or derives power from the SHDSL
span.
Instances Unit
Values LocalPowered
spanPowered
Initialization value NA
Showtime value: Derived from EOC
Update frequency NA
The SHDSL Modem Subsystem assures that the Showtime values (if applicable for the
considered parameter) are available for retrieval over the SHDSL API within 10 seconds
after entering the Operational Up state. During the first 10 seconds of the Operational Up
state, the SHDSL Modem Subsystem shall return the Initialisation values (if applicable for
the considered parameter) if the Showtime value for the considered parameter is not
available yet.
Segment Termination Operational Data only exist for those units that are configured as
indicated by the shdslSpanConfiguredUnits, and which support SHDSL EOC
Performance Status messages defined in ITU-T G.991.2[1].
Description Indicates any exception conditions active at this SHDSL segment termination
Values Bitmap:
Bit Condition
--- ---------
0 No Error
1 LOSW
2 Loop Attenuation Alarm
3 SNR Margin Alarm
4 DC Continuity Fault
5 Device Fault
6 Configuration Error
7 Loopback(s) Active
8 Non-Conform to STU-C Enable/Disable of STU-R Initiated Management
Flow
9 ATM LCD/PTM LPD
10 Loss of Power
11 ATM NCD/PTM NPD
Initialization value NA
Showtime value: Derived from EOC
Update frequency NA
Loopback State
Values noLoopback
normalLoopback
specialLoopback
Granularity & Unit -
SNR Margin
Accuracy 1 dB
Loop Attenuation
Accuracy 1 dB
Update frequency NA
Description Indicates the current Power Backoff value in dB at this SHDSL segment
termination.
Accuracy 1 dB
Showtime value: NA
Update frequency NA
Description Indicates the current state of the Tip/Ring pair at this SHDSL segment
termination.
Values normal
reversed
Accuracy -
Update frequency NA
Description Indicates the Power Backoff status at this SHDSL segment termination.
This value indicates the mode that will be selected at the next reset.
Accuracy -
Showtime value: NA
Update frequency NA
Introduction
This TNG document is not used for Release 3.2, but is reserved for future releases.
Introduction
This TNG provides configuration examples for:
Both ADSL and VDSL port configuration examples are provided. Unless otherwise
specified, the examples in this TNG apply to both the 7302 ISAM and 7330 ISAM FTTN.
Note — The examples in this TNG use the command repetition (also
called ranging) feature of CLI. This feature can be used to execute a
command over a group of ports. See the 7330 ISAM FTTN Operations
and Maintenance Using CLI document for more information about
command repetition.
Equipment planning
This section shows an example of the steps required to plan the equipment of an NE.
This example assumes that the NE is a 7330 ISAM FTTN ARAM-D shelf with the
following cards installed:
Note — In CLI, LT1 is identified as 1/1/4, LT2 as 1/1/5, LT3 as 1/1/6, and
LT4 as 1/1/7.
1 Configure a VDSL spectrum profile. This profile is called g993_vdsl11 and supports
only VDSL without upstream power backoff.
configure xdsl spectrum-profile 1 name g9931_vdsl1 dis-etsi-dts
dis-ansi-t1413 dis-g992-1-a dis-g992-1-b dis-g992-2-a
dis-g992-3-a dis-g992-3-b dis-etsi-ts itu-g993-1
2 Configure the VDSL options for the profile, such as band plan and upstream power
backoff mode:
configure xdsl spectrum-profile 1 vdsl vdsl-band-plan
band-plan-a4 optional-band up adsl-band allow-adsl
max-agpowlev-down 145 max-agpowlev-up 145 psd-shape-down
ansi-ftt-cab-m2 psd-shape-up ansi-ftt-cab-m2 pbo-mode-down
rx-psd-shape-up ansi-a
3 Activate the spectrum profile:
configure xdsl spectrum-profile 1 active
4 Configure a service profile for 25 Mb/s downstream and 3 Mb/s upstream service.
The profile is called 25Mpbs_3Mbps.
configure xdsl service-profile 1 name 25Mbs_3Mbps
min-bitrate-down 32 min-bitrate-up 32 plan-bitrate-down 512
plan-bitrate-up 512 max-bitrate-down 25024 max-bitrate-up 3008
max-delay-down 8 max-delay-up 8 imp-noise-prot-dn 10
imp-noise-prot-up 10
5 Activate the service profile:
configure xdsl service-profile 1 active
6 Assign the spectrum and service profiles to the VDSL ports and put the ports in
service:
• For a single port, use the following command:
configure xdsl line 1/1/4/1 service-profile 1
spectrum-profile 1 admin-up
• For a range of ports, use the following commands:
configure xdsl line 1/1/4/[1...24] service-profile 1
spectrum-profile 1 admin-up
configure xdsl line 1/1/5/[1...24] service-profile 1
spectrum-profile 1 admin-up
7 STOP. This procedure is complete.
If all the physical connections are made, you can now train a VDSL modem on LT1 and
LT2.
1 Configure a spectrum profile. The profile is called multi_adsl and supports ADSL,
ADSL2, READSL, and ADSL2+.
configure xdsl spectrum-profile 2 name multi_adsl g992-3-l1
g992-3-l2 g992-3-am g992-5-a
2 Activate the spectrum profile:
configure xdsl spectrum-profile 2 active
3 Configure a service profile for 15 Mb/s downstream and 1 Mb/s upstream service.
The profile is called 15Mpbs_1Mbps and has minimum delay and impulse noise
protection configured.
configure xdsl service-profile 2 name 15Mbps_1Mbps
min-bitrate-down 32 min-bitrate-up 32 plan-bitrate-down 1024
plan-bitrate-up 256 max-bitrate-down 15360 max-bitrate-up 1024
max-delay-down 1 max-delay-up 1 imp-noise-prot-dn 0
imp-noise-prot-up 0
4 Activate the service profile:
configure xdsl service-profile 2 active
5 Assign the spectrum and service profiles to the multi-ADSL ports and put the ports in
service:
• For a single port, use the following command:
configure xdsl line 1/1/6/1 service-profile 2
spectrum-profile 2 admin-up
• For a range of ports, use the following commands:
configure xdsl line 1/1/6/[1...48] service-profile 2
spectrum-profile 2 admin-up
configure xdsl line 1/1/7/[1...48] service-profile 2
spectrum-profile 2 admin-up
6 STOP. This procedure is complete.
If all the physical connections are made, you can now train a multi-ADSL modem on LT3
and LT4.
• vlan-id; the vlan-id parameter makes the port a member of the VLAN so traffic can
flow through the system
• pvid; the pvid parameter is used to place the untagged Ethernet frames from the xDSL
port into the correct VLAN; by default, all traffic is sent toward the end user with no
VLAN tag
• max-unicast-mac; the max-unicast-max parameter limits the number of devices that
can be active on a bridge port
The system can now pass data traffic. Data traffic from the VDSL ports is carried out of
the system on VLAN 101 and traffic from the multi-ADSL ports is carried out of the system
on VLAN 102. Figure TNG 110-1 shows an example of the traffic flow from the network
to the VDSL ports on LT1 for the iBridge VLAN model.
Figure TNG 110-1: Example of traffic flow for iBridge VLAN model
NT
LT1
SHub
3
It:1/1/4 BP 1
VLAN 101 CPE
2 VLAN 101
BP 24
1
CPE
5 For each multi-ADSL port, create an ATM PVC that matches the PVC configured on
the multi-ADSL modem. This step is not required for VDSL ports.
• For a single port on each LT unit, use the following commands:
configure atm pvc 1/1/6/1:8:35
configure atm pvc 1/1/7/1:8:35
• For a range of ports on each LT unit, use the following commands:
configure atm pvc 1/1/6/[1…48]:8:35
configure atm pvc 1/1/7/[1…48]:8:35
6 Create the bridge port for each xDSL port. You must specify a vpi:vci identifier for
each multi-ADSL port. This step is not required for VDSL ports.
configure bridge port 1/1/4/[1...24]
configure bridge port 1/1/5/[1...24]
configure bridge port 1/1/6/[1...48]:8:35
configure bridge port 1/1/7/[1...48]:8:35
7 Assign each VDSL port on LT1 to the corresponding VLAN:
configure bridge port 1/1/4/1 vlan-id 101
configure bridge port 1/1/4/1 pvid 101 max-unicast-mac 4
configure bridge port 1/1/4/2 vlan-id 102
configure bridge port 1/1/4/2 pvid 102 max-unicast-mac 4
...
configure bridge port 1/1/4/23 vlan-id 123
configure bridge port 1/1/4/23 pvid 123 max-unicast-mac 4
configure bridge port 1/1/4/24 vlan-id 124
configure bridge port 1/1/4/24 pvid 124 max-unicast-mac 4
8 Assign each VDSL port on LT2 to the corresponding VLAN:
configure bridge port 1/1/5/1 vlan-id 201
configure bridge port 1/1/5/1 pvid 201 max-unicast-mac 4
configure bridge port 1/1/5/2 vlan-id 202
configure bridge port 1/1/5/2 pvid 202 max-unicast-mac 4
...
configure bridge port 1/1/5/23 vlan-id 223
configure bridge port 1/1/5/23 pvid 223 max-unicast-mac 4
configure bridge port 1/1/5/24 vlan-id 224
configure bridge port 1/1/5/24 pvid 224 max-unicast-mac 4
The system can now pass data traffic. Data traffic from each xDSL port is carried out of
the system on a separate VLAN. Figure TNG 110-1 shows an example of the traffic flow
from the network to the VDSL ports on LT1 for the cross-connect VLAN model.
Figure TNG 110-2: Example of traffic flow for cross-connect VLAN model
NT VLAN101
LT1
SHub VLAN 101
VLAN 101
3 It:1/1/4 BP 1
CPE
2 VLAN 124
BP 24
VLAN 124 1
CPE
Multicast
This example shows one of the ways you can configure multicast for a 7302 ISAM or
7330 ISAM FTTN. Multicast is the transmission from a single device (such as an IPTV
host) to a group of recipients (such as xDSL subscribers). See the
7302 ISAM / 7330 ISAM FTTN System Description document for more detailed
information on multicast.
• The system is configured for basic data traffic using the cross-connect VLAN model.
This configuration allows for all multicast traffic to be delivered to the NE on a single
VLAN separate from the VLAN configured on the subscriber bridge port. The system
then connects the subscriber to a multicast group and forwards it to the subscriber
VLAN when the subscriber requests the group using IGMP. See the
7302 ISAM / 7330 ISAM FTTN System Description document for more detailed
information about multicast and IGMP.
• All multicast traffic is delivered on network port 2, with a VLAN ID of 10.
• The multicast sources available to subscribers are 224.1.1.1 to 224.1.1.100.
• There is an IGMP router connected to the NE on network port 2.
• The NE is not required to restrict multicast connections based on bandwidth.
• The IP addresses used by the NE for IGMP messaging are:
• toward the subscribers: 192.168.1.1
• toward the network: 10.10.10.1
The configuration procedure is as follows:
1 Configure VLAN 10 on the SHub so that multicast traffic can be delivered to all LT
units:
configure vlan shub id 10 mode residential-bridge
configure vlan shub id 10 egress-port network:2
configure vlan shub id 10 egress-port lt:1/1/[4…7]
2 Configure VLAN 10 on the NT subsystem:
configure vlan id 10 mode residential-bridge
3 Configure the multicast source table on the NE. This table contains the list of all
multicast groups available to subscribers and the corresponding VLAN group for
each multicast group.
configure mcast src 224.1.1.[1…100] vlan-id 10
atm-peak-bit-rate 0 atm-sus-bit-rate 0
4 Configure the system to disallow the joining of unconfigured multicast groups for
iBridge subscribers:
configure mcast general no package-member [1...1024]
configure mcast capacity max-num-uncfg 0
5 Set the maximum number of unique groups that can be active on a single LT unit:
configure mcast capacity max-num-group 256
6 Start the IGMP system and configure the IP address used for IP messaging toward
the subscribers and the SHub. This address is not used for messaging toward the
router.
configure igmp system src-ip-address 192.168.1.1 start
7 Configure the VLAN IP address used for IGMP messaging toward the upstream
router:
configure interface shub vlan-id 10 admin-status down
configure interface shub ip 10 ip-addr 10.10.10.1/24
configure interface shub vlan-id 10 admin-status up
8 Enable snooping on the SHub:
configure igmp shub igs-system enable-snooping
9 Configure the port and VLAN ID connection for the router upstream of the NE:
configure igmp shub vlan-router-port 10 network-port 2
query-timer 125
10 Disable the snooping filter on the multicast VLAN. This step enables snooping on the
VLAN.
configure igmp shub vlan-filter 10 no snoop-filter
11 Enable the snooping filter on the subscriber VLANs. This disables snooping on the
VLANs, since there should be no IGMP on these VLANs.
configure igmp shub vlan-filter [101…124] snoop-filter
configure igmp shub vlan-filter [201…224] snoop-filter
configure igmp shub vlan-filter [301…348] snoop-filter
configure igmp shub vlan-filter [401…448] snoop-filter
12 Enable IGMP on the subscriber interface and limit the maximum number of multicast
groups to which a subscriber can belong at any one time:
configure igmp channel 1/1/4/[1...24] max-num-group 10
configure igmp channel 1/1/5/[1...24] max-num-group 10
configure igmp channel 1/1/6/[1...48]:8:35 max-num-group 10
configure igmp channel 1/1/7/[1...48]:8:35 max-num-group 10
13 STOP. This procedure is complete.
Subscribers can now join configured multicast groups from xDSL ports using IGMP.
802.1x authentication
This example shows how to set up 802.1x authentication. See the
7302 ISAM / 7330 ISAM FTTN System Description document for more detailed
information about 802.1x authentication on a 7302 ISAM or 7330 ISAM FTTN.
• The system is configured for basic data traffic using the iBridge or cross-connect
VLAN model.
• A RADIUS server is available upstream of the NE.
• The RADIUS server is configured as follows:
• accessible over management VLAN 4093
• authentication server IP address is 192.168.2.22
• accounting server IP address is 192.168.2.23
• default domain is ALCATEL
• NAS-ID for the NE is ISAM-1
• NAS-IP for the NE is 192.168.1.1
The configuration procedure is as follows:
1 Configure the server used for authentication. The shared RADIUS secret key is
mysecret.
configure system security radius auth-server sampleAuth
vrf-index 0 ip-address 192.168.2.22 secret mysecret
2 Configure the server used for accounting. The shared RADIUS secret key is
mysecret.
configure system security radius acc-server sampleAcc
vrf-index 0 ip-address 192.168.2.23 secret mysecret
3 Configure a RADIUS policy for the NE specifying the NAS-ID and the NAS-IP:
configure system security radius policy sampleRadPol
nas-id ISAM-1 nas-ip-address 192.168.1.1
4 Configure the policy to use the authentication and accounting servers. These servers
were created in steps 1 and 2.
configure system security radius policy sampleRadPol servers 1
auth-server name:sampleAuth vrf-index-auth 0 priority 40
acc-server name:sampleAcc vrf-index-acc 0
5 Configure the domain used by the RADIUS policy:
configure system security domain ALCATEL vrf-index -1
authenticator radius:sampleRadPol
6 Create a connection profile for the ALCATEL domain and configure handling of
requests without a domain:
configure system security conn-profile sampleConnProf
version 1 domain-name ALCATEL no reject-no-domain
reject-inv-domain
7 Configure the connection profile for the connection policy defined in step 6:
configure system security conn-policy conn-profile-name
sampleConnProf
8 Enable 802.1x authentication at the system level:
configure system security pae port-access
9 Enable 802.1x authentication on each xDSL port:
configure system security pae ext-authenticator 1/1/4/[1...24]
authentication
configure system security pae ext-authenticator 1/1/5/[1...24]
authentication
configure system security pae ext-authenticator
1/1/6/[1...48]:8:35 authentication
configure system security pae ext-authenticator
1/1/7/[1...48]:8:35 authentication
10 STOP. This procedure is complete.
The system can now authenticate xDSL ports using 802.1x toward the subscribers and
RADIUS as the backend authentication server.
Purpose
This TNG provides information about configuring the 7330 ISAM FTTN ES.
General
Table TNG 111-1 lists the correlation between the LT port number entered in CLI and the
GENC-E downlink port linked by fiber to the EDSE-A card on the ES.
6 (1) 8
7 (1) 9
8 10
9 11
10 12
11 13
12 14
13 15
14 16
15 17
16 18
17 19
Note
(1) Dual-mode port. This port can be configured as an uplink or downlink port. The default setting is
uplink. The SFP alarms behave differently depending on whether the port is configured as uplink or
downlink.
Procedure
Use this procedure to configure the ES.
where
systemname is the name of the ES
hostIP is the IP address and mask of the host shelf, in the format xxx.xxx.xxx.xxx/yy
defaultgwaddress is the IP address of the default gateway
shubport# is the port number for the SHub; you can enter a single port number or a range of port
numbers
shubporttype is the type of SHub port
adminstatus is the administrative status of the SHub port
shubvlanid is the number of the SHub VLAN
networkport# is the port number for the network; the network port number must match the SHub port
number
Example:
2 Plan the ECNT-A and GENC-E or GENC-F cards on the host shelf:
Example:
where
rack is the rack number of the ES
shelf is the shelf number of the ES
Example:
where
rack is the rack number of the ES
shelf is the shelf number of the ES
Example:
where
rack is the rack number of the ES
shelf is the shelf number of the ES
slot is the slot number of the unit
LT is the designation of the LT card
applique is the designation of the applique
Example:
where
servprofile# is the number of the service profile
servprofilename is the name of the service profile
version# is the version number of the service profile
minbrdown is the minimum downstream bit rate
minbrup is the minimum upstream bit rate
planbrdown is the planned downstream bit rate
planbrup is the planned upstream bit rate
maxbrdown is the maximum downstream bit rate
maxbrup is the maximum upstream bit rate
maxbrdelaydown is the maximum downstream bit rate delay
maxbrdelayup is maximum upstream bit rate delay
Example:
where
specprofile# is the number of the spectrum profile
specprofilename is the name of the spectrum profile
version# is the version number of the spectrum profile
maxnoisedown is the maximum downstream noise
maxnoiseup is the maximum upstream noise
rfbandlist is the RF band list
Example:
where
sysvlanid is the number of the ES VLAN
shubvlanid is the number of the SHub VLAN
networkport is the port number for the network; the network port number must match one of the
SHub port numbers
shelf is the shelf number of the SHub
slot is the slot number of the SHub
port is the port number of the SHub
Example:
9 If one or more dual-mode ports are used to connect the GENC-E to the EDSE-A on
the ES, configure the dual-mode ports as downlink ports:
where
dualport# is the number of the dual-mode port as shown in Table TNG 111-1; you can enter a single
port number or a range of port numbers
Example:
where
rack is the rack number of the ES
shelf is the shelf number of the ES
slot is the slot number of the xDSL line
port is the port number of the xDSL line
servprofile# is the number of the service profile
specprofile# is the number of the spectrum profile
vpi is the VPI number of the ATM PVC and bridge port
vci is the VCI number of the ATM PVC and bridge port
sysvlanid is the number of the ES VLAN
macaddress is the unicast MAC address; you can enter a single address or a range of addresses
Example:
Purpose
This TNG provides information about configuring a 7330 ISAM FTTN system in a
subtended configuration.
General
Subtending allows several 7330 ISAM FTTN nodes to be connected to the network
through a single node. For more information about subtending, see the
7302 ISAM | 7330 ISAM FTTN System Description.
Figure TNG 112-1 shows an example of subtended 7330 ISAM FTTN nodes.
VLAN associations:
4093 400
VLAN associations:
4093 200 400
Node #2 Node #4
Traffic on Traffic on
Network VLAN 200 VLAN 400
Subtended NE
VLAN associations: Node #1 (subtending host: Node #2)
4093 100 200 Traffic on
300 400 VLAN 100
VLAN associations:
4093 300 Node #3
Traffic on
VLAN 300
Subtended NEs
(subtending host: Node #1)
18850
In this example:
The master subtending node, Node 1 in Figure TNG 112-1, receives the management
and customer traffic from the network and distributes it to the appropriate node.
Management traffic is sent to all nodes. Customer traffic is sent only to the appropriate
node, which is determined by the VLAN associated with the customer traffic. In the
example in Figure TNG 112-1, the customer traffic is distributed as follows.
1 For each node (Node 1, Node 2, Node 3, and Node 4), configure the network port
and the SHub management VLAN.
2 For each subtending node (Node 1 and Node 2), configure the management
VLAN ID:
3 For each node (Node 1, Node 2, Node 3, and Node 4), configure the VLAN
associated with the node:
4 For each node (Node 1, Node 2, Node 3, and Node 4), configure the egress ports
associated to each VLAN:
5 For each subtending node (Node 1 and Node 2), create and configure the VLAN
associated with the nodes subtended to it:
i Node 1:
ii Node 2:
6 For each subtending node (Node 1 and Node 2), configure the subtending ports for
each subtending node:
i Node 1:
ii Node 2:
Introduction
This TNG provides more information about the parameters used by the Multi-ADSL
modem:
• Re-initialization triggers
• Multi-ADSL configuration management
• Line operation configuration
• Multi-ADSL common configuration parameters
• Flavor-dependent configuration parameters
• ADSL2plus-specific configuration parameters
• Supported operational data parameters
Re-initialization triggers
During showtime (L0 line state), the Multi-ADSL Modem Subsystem performs
persistency/severity checking and correlation on the defects/anomalies, in order to detect
re-initialization triggers. Table TNG 113-1 lists them for the ATU-C and includes the
required persistency time for each showtime error.
Near-End Far-End
Note — All the triggers, except los and sef based triggers, make up the
“high-ber-hs” condition, specified in G.992.3 ([6]), annex D. The
Multi-ADSL modem subsystem implements correct state behavior as
specified in the different standards, according to the actual operation
mode,
All the far-end countdown timers are frozen when any near-end defect occurs. When all
the near-end defects have disappeared, the far-end count-down timers resume from the
frozen values (ignoring the in-between time).
All the near-end defects are correlated independent from each other. The same holds for
all the far-end defects in absence of near-end defects.
• In case a parameter is indicated as “optional”, the input value is do not care, and any
value is accepted without having impact on the modem subsystem behavior.
• In case a parameter is indicated to be required to a certain level (for example, only a
limited set of defined number of input values), only input values corresponding to the
required level are accepted. If the input parameter is not accepted, the modem
subsystem raises a failure indication to the xDSL manager indicating “Configuration
Error”
• In case extra consistency checks need to be performed on a parameter or between
parameters and the configuration should be rejected, “rejection” always means that
the modem subsystem raises a failure indication to the xDSL Manager indicating
“Configuration Error”, rather that a returned error of the considered xDSL API call.
• An xDSL API configuration request is replied with an error only when the call is done
in a wrong administrative state.
• Operating modes
• Auto-mode criterion
• Rate adaptation mode
• Target noise margin
• Minimum noise margin
• Maximum noise margin
• Carrier mask
• RF band data
• Minimum bitrate
• Maximum bitrate
• Rate adaptation ratio
• Maximum interleaving delay
• Minimum impulse noise protection
• L3 Power State Permission
• L2 Power State Permission
• L0 Time
• L2 Time
• L2 ATPR
• L2 Bitrate Downstream
• L2 ATPRT
• Bonding Mode
• BondingGroupId
• Upshift Noise Margin
• Downshift Noise Margin
• Minimum Time Interval for Upshift Rate Adaptation
• Minimum Time Interval for Downshift Rate Adaptation
• Artificial Noise PSD
• Impulse Noise Monitor (INM):
• INM Sensitivity Threshold
• INM Pulse-Gap-Bridging Value
• Warm Re-Init Disable
• Programmable Resynch Triggers
Description This parameter defines which standards are allowed for the Modem Subsystem
for line activation.
Different DSL standards can be allowed by the XDSL Manager. The Modem
Subsystem does the following:
• check if allowed modes are not conflicting (see MGMT_R12), and raise an
error if there is a conflict.
• if allowed modes are accepted, try to initialize with peerend modem in one
of the allowed operation modes. Selection of best-fit mode shall be done
according to MGMT_R13.
Instances Line
Values Bitmap:
ANSI.T1.413 (1998)
Alcatel-proprietary ETSI mode
G.992.1 Annex A & B, each overlapped & non-overlapped
G.992.2 Annex A (non-overlapped) & B (overlapped)
G.992.3 Annex A, B, I, J & L, M each overlapped & nonoverlapped
G.992.4 Annex A & I, each overlapped & non-overlapped
G.992.5 Annex A, B & I, M each overlapped & non-overlapped
Description This parameter shall be used to set the policy to select optimal operation mode
in case READSL2 operation mode has been enabled. If no READSL2 operation
mode has been set by the xDSL Manager, this parameter shall be ignored.
Currently, three policies are defined:
• 0x0 : chipset proprietary criterion (full freedom)
• 0x1 : optimize DS bitrate with US bitrate above Minimum Bitrate.
• 0x2 : optimize US bitrate with DS bitrate above Minimum Bitrate.
Instances Line
Values Bitmap:
ANSI.T1.413 (1998)
Alcatel-proprietary ETSI mode
G.992.1 Annex A & B, each overlapped & non-overlapped
G.992.2 Annex A (non-overlapped) & B (overlapped)
G.992.3 Annex A, B, I, J & L, M each overlapped & nonoverlapped
G.992.4 Annex A & I, each overlapped & non-overlapped
G.992.5 Annex A, B & I, M each overlapped & non-overlapped
Remarks:
In case the CPE does not support SRA or if a line initializes in an XDSL flavour
(f.i. ADSL1) which does not support SRA, RA mode 3 behavior shall be identical
to RA mode 2. In state L2, no Downstream SRA bit rate change is allowed.
Instances Line DS, US
Values RaModeManual
RaModeAtInit
RaModeDynamic
Description Specifies the required noise margin, relative to a BER of 10-7 (= 0 dB noise
margin), the modem will achieve in order to successfully complete the
initialization. This parameter is not used in showtime.
When the modem cannot initialize at this margin, it fails.
For DS, the parameter is passed to the ATU-R, it is the responsibility of the
ATU-R to use this parameter correctly.
For ADSL2x standards, all values between 0.0 and 31.0 can be passed, while
for ADSL1x standards, only values 0 to 31 with 1 dB granularity can be passed.
In that case, non-integer values shall be rounded to the nearest value of the
standard
Instances DS, US
Values 0.0..31.0
Description Specifies the minimum noise margin, relative to a BER of 10-7 (= 0 dB noise
margin), the modem shall tolerate in order to maintain showtime. This
parameter is only used in showtime.
For DS, the ATU-C regularly polls the actual DS noise margin to the ATU-R, and
compares this value with the minimum noise margin.
For both US and DS, the Multi-ADSL modem subsystem raises the lom (loss of
margin) defect whenever the actual noise margin is below the Minimum Noise
Margin.
The Modem Subsystem raises failure indication "Configuration Error" for
configurations where Minimum Noise Margin > Target Noise Margin for one of
the directions.
For ADSL2x standards, all values between 0.0 and 31.0 can be passed, while
for ADSL1x standards, only values 0 to 31 with 1 dB granularity can be passed.
In that case, non-integer values shall be rounded to the nearest value of the
standard
Instances DS, US
Values 0.0..31.0
Description Specifies the maximum noise margin sustained by the modem. This parameter
is both used during initialization and in showtime.
• during initialization:
• When the noise margin for transport configuration is higher than the
Maximum Noise Margin, then the modem takes action to reduce the
power to get the actual noise margin below this value.
• When the noise margin is lower than the Maximum Noise Margin, then
the modem tries to optimize the Receive Power below the configured
masks to get the noise margin as high as possible (still below the
Maximum Noise Margin).
• in showtime:
• When the current noise margin gets above the Maximum Noise Margin,
the modem attempts to reduce the far-end output power to get the noise
margin below this limit (by means of bit-swap actions).
• When the current noise margin gets below the Maximum Noise Margin,
then the ATU attempts to increase the far-end output power (still below
the maximum allowed templates or masks) to get the noise margin as
high as possible (by means of bits-swap actions).
The special value 51.1 is interpreted as meaning that no Maximum Noise
Margin limit must be applied. Other values strictly bigger than 31.0 are
converted to t51.1 as well.
Note 1: for DS, the parameter has to be passed to the ATU-R during initialization
(C-Msg-1 or C-Msg-RA). For ADSL2x standards, all values between 0.0 and
31.0 plus 51.1 can be passed, while for ADSL1x standards, only values 0 to 31
with 1 dB granularity can be passed. In that case, non-integer values shall be
rounded to the nearest value of the standard, while the special value 51.1 is
translated to 31. It is up to the CPE to interpret this value as infinity or 31.
Note 2: In ADSL1x, the average PSD may not change too much due to SYNC
symbols, which cannot change PSD in showtime. Therefore, the showtime
behavior is different than stated above : far-end output power shall only be
varied within a 1.5 dB range with regard to the initial (that is, before the first bit
swap) showtime output power.
Instances DS, US
Values 0..51.1
For clarification, Figure TNG 113-1 gives an overview of the noise margin parameters,
and the required actions from the modem.
Description The Carrier Mask specifies the sub-carriers that can be used for data transport
by the Modem Subsystem. There is one mask for each direction. A sub-carrier
shall be “masked”, i.e. not used for data transport (bi=gi=0), when the XDSL
manager has set the bit for that sub-carrier to “1”.
The total number of carriers for which the mask is specified: 512 (carrier #0 to
carrier #511).
The usage of this information depends on the actual used operation mode:
• ADSL1x :
US : modem subsystem shall request no bits and no power on masked
sub-carriers in bit loading process.
DS : modem subsystem shall not transmit masked sub-carriers during
medley signal.
• ADSL2x :
US & DS : “masked” sub-carriers shall be indicated as “not supported” in
G.hs CL messages.
Note 1: Besides respecting the carrier mask, the modem subsystem must also
respect the standard band plans and configured PSD masks. This means that
the fact that a sub-carrier is not masked in one direction does not necessarily
mean that it can be used for data transmission in that direction.
Note 2 : In ADSL1x operation modes, when carrier masking is applied, and
modem initialization continuously fails, the masking may be suspected as cause
for these init problems. Therefore, when conditions for activation failures CMP
or CNF are met, the modem subsystem replaces them by CE activation failure
if masking is applied on carriers between tone 60 and 100, and the selected
operational mode is ADSL1x mode.
Instances US, DS
Values Bitmap, 1 bit per sub-carrier, “1”= masked, “0” = not masked
From these 8 specified RF bands, only 2 are relevant for the spectra used by
the different ADSLx operation modes (and especially ADSL2plus). All other
bands will be specified for higher frequencies, typically in VDSL bands.
The Modem Subsystem scans the complete set of RF bands, checks the start
frequency for each band, and only considers the bands, which are in-band for
the current operation mode. All other RF bands are ignored.
When the number of RF bands to be considered is higher than the supported
number of RF bands (min 2 for the spectra used by the different ADSLx
operation modes ), the Modem Subsystem generates a “configuration error”
towards the XDSL Manager.
Granularity & Unit -
Figure TNG 113-2: Restrictions on breakpoints and PSD mask for RFI band
specification
PSD in
dBm/Hz
Limitmask(f)
< 33.5 dB
PSD(i+1) < 33.5 dB
PSD5
PSD6
PSD(i+4)
PSD(i+2)
PSD(i+3)
Description Defines the minimum requested bitrate which will be set up and which will be
maintained during showtime by the ATU.
Rounding of bitrate parameters is as follows:
• For ADSL1x:
The Minimum Bitrate is rounded up and the Maximum Bitrate is rounded
down according to the bitrate granularity (32 kbps) when for the
corresponding direction Maximum Bitrate Minimum Bitrate after rounding.
Otherwise, both bitrates are rounded up and Minimum Bitrate = Maximum
Bitrate after rounding.
In case of the current showtime makes use of s=0.5 in dowstream, the
downstream bitrate granularity is 64 kbps instead of 32 kbps.
• For ADSL2:
The accuracy of the bit rates parameters "net_max" and "net_min" passed
in G.Hs have a granularity of 4kb/s.
G9923_net_max = rounddown_to_next_4k ( G9971_maximum_datarate)
G9923_net_min = roundup_to_next_4k ( G9971_minimum_datarate)
• For ADSL2plus:
The accuracy of the bit rates parameters "net_max" and "net_min" passed
in G.Hs have a granularity of 8kb/s.
G9925_net_max = rounddown_to_next_8k (G9971_maximum_datarate)
G9925_net_min = roundup_to_next_8k ( G9971_minimum_datarate)
• General
If G992x_net_max < G992x_net_min then new G992x_net_max =
G992x_net_min = highest of both
In other words: in case of ADSL2 fixed rate (i.e.
G9923_net_max=G9923_net_min), the value exchanged during the
handshake can be up to 4kb/s above the user specified value and the actual
bitrate value in showtime can be 8kb/s above the value exchanged during
the handshake which means in G992.3 the actual rate can be up to
4kb/s+8kb/s=12 kb/s above the user configured value. For G992.5, the
actual bitrate can be up to 8kb/S+8kb/s=16 kb/s above the user configured
value.
The minimum supported data rate is be 32 kbps. Lower configured rates may
be rounded to 32 kbps.
Values 0..65535
Granularity & Unit 1 kbit/s
Notes
(1) In G.lite operating mode, supported bitrates are only up to 512 kbps US and up to 1500 kbps DS.
When the minimum bitrate is configured above this limitation, and selected operation mode is G.lite,
the Multi-ADSL modem subsystem might still try to activate at this higher bitrate. If however
initializations continuously fail due to this minimum setting, the modem subsystem raises the
activation failure "Configuration not feasible on line". At the same time, the Relative Capacity
Occupation for the direction causing the problem is set to 100%.
Description Defines the maximum allowed transport bitrate which is set up and which is
maintained during showtime by the ATU. This parameter is relevant only in
'atInit' RA Mode.
For the rounding of bitrate parameters: see Table TNG 113-10.
The Multi-ADSL modem subsystem raises failure indication “Configuration
Error” for configurations where Maximum Bitrate < Minimum Bitrate for one of
the directions in case of the “atInit” RA Mode.When RA Mode is ‘manual’, the
Maximum Bitrate parameter will be ignored.
Values 0..65535
Description The Rate Adaptation Ratio specifies the ratio that should be taken into account
for allocating available data rate (in excess of the minimum data rate summed
over all bearer channels) among the different bearer channels in a given
direction.
The ratio is defined as a percentage from 0 to 100. The sum of the raRatios for
all bearers must be 100.
The excessive bitrate (that is, the available bitrate minus the sum of the
minimum bitrates) must be distributed among the different bearers according to
their respective raRatio.
When the maximum bitrate is achieved for one of the bearers, the raRatio of that
bearer must be distributed to the other bearers according to their respective
raRatio share.
This parameter is only meaningful in case multiple bearers are used (for
example, 2 for dual latency) and is ignored in case of single latency.
Instances Bearer DS, US
Values 0..100
Description Specifies the maximum allowed delay introduced by the interleaving and
deinterleaving function in the corresponding direction.
This parameter puts a constraint the parameter PMS-TC delay, but is extended
towards all Multi-ADSL standards.
The Modem Subsystem selects FEC parameters such that
SpxDp/4 < ILVDbc
for the latency path carrying the specified bearer channel bc.
If multiple bearer channels are carried over the same latency path, obviously the
minimum of all Interleaving Delay limits constrains this latency path.
Values 0 - 63. All integer values between these borders shall be supported.
• Special Value 0 is used as "No delay bound"
The value 0 indicates that the system chooses the optimal delay value as
follows:
The method used by the receiver to select data rates, power, overhead and
latency is implementation dependent. However, within the raw data rate
provided by the local PMD, the selected values will meet all the constraints
communicated by the operator :
- (message based) overhead data rate: Minimum overhead data rate
- Net data rate: Minimum net data rate
- Impulse Noise Protection: Minimum impulse noise protection for all bearer
channels.
- Delay: Maximum delay for all bearer channels.
Within those constraints, the receiver selects the values to optimize the
modem behavior as listed in the following priority order:
1. Maximize net data rate (within MaximumBitrate constraint).
2. Maximize SNR margin (within MaximumNoiseMargin constraint).
3. Minimize Power consumption.
If within the given constraints, the modem is unable to select a set of
operation parameters for one or both directions, the Modem Subsystem
raises failure indication to XDSL Manager (“configuration not feasible on
line”). However, it keeps on trying to activate the line.
• Special Value 1 is used to specify that no interleaving must be used.
The value 1 indicates that the Fast latency Path shall be used in the G.992.1
and ANSI operating mode and Sp and Dp shall be selected such that Sp<1
and Dp=1 in G.992.2, G.992.3 , G.992.4 and G.992.5 operating modes.
When the ILVD=1 the INP should be set to zero.
Note: due to the choice of 1 as special value, it is impossible to set the max
interleaving delay to a value of 1ms
• Exception1:
In G992.1 and Ansi, the Interleaved path shall be selected If delay = 1
and max DS rate is too large to be possible to reach without S=0.5 (i.e.
max DS rate >8128kbps) and If (CPE is able to do S=0.5 ) and (CO
decides to apply S=0.5)
• Exception 2
If one of the 2 directions (upstream or downstream) is configured in
interleaved mode and other one in fast. It's allowed to use the
interleaved path for both upstream and downstream direction in order
to avoid possible showtime interoperability issues with some CPEs.
Description Specifies the minimum required impulse noise protection as a number of DMT
symbols.
This parameter puts a constraint the parameter PMS-TC impulse noise
protection but extends towards all Multi-ADSL standards.
The Modem Subsystem selects FEC parameters such that
0.5 × SpxDp × (Rp / N_FECp) > INPbc
for the latency path carrying the specified bearer channel bc.
If multiple bearer channels are carried over the same latency path, obviously the
maximum of all INP limits constrains this latency path (see also Table TNG
113-13
Notes
(1) Support of INP_min values 4 and 8:
The ITU standards require mandatory support of the INP_min values 0.0, 0.5, 1.0 and 2.0 while
support of the INP_min values 4 and 8 is optional. This MGMT-requirement requests support of
INP_min values 4 and 8.
(2) Support of INP_min=2 up to the highest supported DS and US interleaved net data rates.
The ATU-C shall support bitrates up to 2.6 Mbps upstream and 22.8 Mbps downstream for INP_min
=2. This proprietary behaviour shall be coupled to the modem features bitmap.
Note: This means support of higher interleaving depth D_ds > 64, D_us > 8. In case ATU-C or ATU-R
is not supporting these bitrates the following behavior (as mentioned in ITU) is applicable:
Configuration of Minimum Net Data rates such that the sum of all Minimum Net Data rates over all
bearer channels results in values higher than the ITU standard tables with min INP and maxium delay
related net data rates limits may lead to configuration errors by the ATU-C and/or initialization failures
with “configuration error” failure cause by the ATU-R.
(3) Standard Compliant extension of S and D
The Multi-ADSL Modem Subsystem shall support all optional values for S and D as provisionally
agreed in ITU. Negotiating capabilities with CPE through G.hs and implementation constraints shall
be according to the same amendments.
Description This bit controls allowed link state transitions to L3 power management state:
• If enabled (bit = 1), the Modem Subsystem is allowed to use orderly
shutdown as a means to reduce power in both US and DS. It also accepts
orderly shutdown requests initiated bythe ATU-R. In this case, the modem
subsystem transitions from L0 to L3 state without failure event.
• If disabled (bit = 0), the Modem Subsystem is NOT allowed to use orderly
shutdown. When orderly shutdown procedure is initiated by the ATU-R, the
ATU-C refuses this procedure. This means that no transition to L3 should
be done without failure notification.
This bit has the same interpretation for all ADSL1x and ADSL2x opmodes.
Instances Line
Description This bit controls allowed link state transitions to L2 power management state:
• If enabled (bit = 1), the Modem Subsystem is allowed to use L2 as a means
to reduce power in DS. Parameters described in Tables TNG 113-17 to
TNG 113-20 will be used by Multi-ADSL modem subsystem to control the
power management.
• If disabled (bit = 0), the Modem Subsystem is NOT allowed to enter L2 state.
Parameters described in Tables TNG 113-17 to TNG 113-20 will be
ignored.
Instances Line
Values Bit : L2-Enabled / L2-Disabled
Name L0-TIME
Description Specifies the minimum time - after entering L0 - before transition to L2 Power
State.
Note: Any time lower than 10 s will be considered as 10 s.
Instances Line
Values 0 to 1800 s
Unit 1s
Name L2-TIME
Description Specifies the minimum time between L2 entry and first power trim or 2
consecutive power trims.
Instances Line
Values 0 to 1800 s
Unit 1s
The proposed value of PCBds (in dB) in any L2 trim command is limited by
following constraint:
PCBds(proposed) - PCBds(current) < L2_ATPR
where
• PCBds(proposed) is PCBds value proposed in the L2 trim command
• PCBds(current) is the PCBds value currently used in the L2 state
Instances Line
Values 0 to 31 dB
Description Specifies the minimum bitrate that shall be set up during L2 state (up to eventual
rounding within 8 kbps, see “Description” in Table TNG 113-10).
The same value is used by the Modem Subsystem as maximum DS bitrate
measured in fixed, consecutive 1 second intervals that may not be exceeded -
during a time interval MAXIMUM (10s, L0-TIME) - as trigger for transition to L2
state.
In case of multiple used latency paths, the DS actual bitrate must be below the
threshold for each path during MAXIMUM (10s, L0-TIME), before transition to
L2 occurs. The total bitrate during L2 will then be at least the sum of all
configured L2 bitrates.
Note: In case L0min > L2min, additional restrictions are implemented such that
there is no possibility to swap to L2 Mode in case this would lead to a bitrate
increase.
Note: if the actual DS bitrate in L2 state is lower than the configured L2 Bitrate
Downstream (this is always the case if the configured L2 Bitrate Downstream
force an Lp larger than 1024), the modem refuses the transition to L2 state.
Description This parameter represents the total maximum aggregate transmit power
reduction (in dB) that can be performed in an L2 state. This is the sum of all
reductions of L2 Request (i.e. at transition of L0 to L2 state) and Power Trims.
It ranges from 0 dB to 31 dB.
All PCBds values in the L2 state (i.e. the maximum PCBds in a L2 request
command, and the proposed value of PCBds (in dB) in any L2 trim command)
shall be limited by following constraint :
PCBds - PCBds(L0) < L2_ATPRT
where:
• PCBds is any PCBds value in the L2 state
• PCBds(L0) is the PCBds value of the L0 state
Instances Line
Values 0 to 31 dB
Figure TNG 113-3: Illustration of the Layer 2 power state control parameters
PSD in
dBm/ Hz
PSD2 = -36.5
PSD1 = -95
An L2 request message is sent from the CO towards the CPE asking for a transition to the L2 link state
and indicating the maximum allowed first power cutback (smaller than or equal to L2_ATPR). The CPE
will investigate this and respond with an L2 grant message, indicating the actual first power cutback (can
be lower than what was requested by CO).
When entering L2, the bit rate becomes equal to the L2 bit rate, but as a consequence of the (typical) small
first power cutback it is possible that there is still a significant amount of excess margin (compared to the
target margin). Therefore with intervals of L2_TIME power trim messages are sent from the CO to the
CPE, indicating the maximum requested power cutback (smaller than or equal to L2_ATPR). The CPE
will respond with a L2 trim grant message, indicating the actual allowed power trim (can be lower than
what was requested by CO). With each new power trim the power is decreased with the maximum per
trim limited to L2_ATPR until the excess margin has been eliminated.
The total of all these power reductions should not exceed L2_ATPRT.
Description This parameter indicates whether the bearer channel is used to carry one
complete ATM stream (native mode) or used on a pair within a bonding group
(atmBonding). In the latter case, ATM bonding is be set up according to all
requirements.
In case ATM bonding would not be supported by the chipset, a configuration
error is raised upon startUpLine command if ATM bonding would have been
configured.
Instances Bearer
Values Enumeration:
• native : default, line shall not operate in bonding group
• atmBonding : line is used for ATM bonding.
Name BondingGroupId
Description This parameter provides the group identification number of the bonding group
the bearer channel belongs to in case the bondingMode (see previous) is set to
atmBonding. The bonding group ID 0 is not used.
Instances Bearer
Values unsigned long
Instances DS, US
Values 0.0..31.0
Instances DS, US
Values 0.0..31.0
Table TNG 113-26: Minimum Time Interval for Upshift Rate Adaptation
Instances DS, US
Values 0..16383
Table TNG 113-27: Minimum Time Interval for Downshift Rate Adaptation
Instances DS, US
Values 0..16383
Description TXREFANL defines the Transmitter Referred Artificial Noise Level to be used
as additional noise source at the transmitter. It is defined as an array of 32
breakpoints for downstream.
Points are given in frequency [kHz] and PSD [dBm/Hz] components, and are
translated to an array of the following form: TXREFANL = [(t1, PSD1), (t2, PSD2),
…, (tN, PSDN)], where t1 < ti < tN.
For ADSL1 and ADSL2 only the frequencies upto 1104 kHz are taken into
account.
Description The sensitivity threshold of x dB makes the impulse noise monitor x dB more
sensitive. To make the impulse noise monitor less sensitive, one has to use
negative “x” values. The expected behaviour is explained in PERF_R.A.1001.3.
A change in the configuration of the sensitivity threshold will trigger a reset of
the histograms at the CPE.
Instances Line DS
Instances Line DS
Values 1 - 10
Default: 0 (no Pulse-Gap-Bridging)
Instances Line
Description This array of integers controls the values of the required resynch triggers at both
the xTU-C and xTU-R. For each trigger, a special value is used for disabling.
The parameters applicable to the far-end are communicated to the CPE.
Meaning:
Persistency in seconds of [los; sef; lom; se; ncd; lcd; flos; rdi; flom; fse; fncd;
flcd]
Instances Line
Values [0¨255; c ; 0¨255] with a minimum of 3 seconds for (f)los
Default: [5; 5; 60; 10; 15; 15; 6; 6; 60; 10; 17; 17]
Special persistency value for each trigger: 0: disable trigger (except for (f)los)
• Modem features
• Maximum aggregate transmit power
• Maximum value of Maximum Aggregate Transmit Power for nonoverlapped operating
modes
• Maximum PSD
• Maximum value of Maximum PSD
• Power backoff mode
• Maximum aggregate receive power
Description Specifies modem features which can be allowed or not by the operator.
Currently, only bit 0 (LSB) of this bitmap is interpreted by the Multi-ADSL
modem subsystem.
BIT0 – Standard Compliancy: if active (1), the modem subsystem must turn off
all features not strictly compliant to the standard. If not active (0), the modem
subsystem is allowed to use to use these features.
The following examples are given to indicate which features shall be mapped to
this bit:
• For all ADSLx flavors : transmission of NSIF messages in G.hs (see
GEN_R13.4).
• For ADSL2x mode: Support of higher bitrates than allowed in ITU standards
for certain INP values (= support of higher D) (see also Table TNG 113-13)
Instances Line
(1 of 2)
Values Bitmap
(2 of 2)
Description Specifies the maximum total power level that is allowed to be transmitted in the
corresponding direction.
The maximum value (25.5 dBm) is used as special value to indicate that the
value defined in the corresponding Multi-ADSL standard must be used.
The usage of this parameter shall depend upon the used operation mode:
• ADSL1x : parameter shall be ignored, since Max. Aggregate Power levels
are fixed within the relevant standards.
• ADSL2x : input shall correspond to parameter MAXNOMATP
When the configured value is above the maximum aggregate transmit power
allowed by the relevant standard, the configured value is ignored.
The constraints imposed by the standards are summarized in Table TNG 113-35.
Table TNG 113-35: Maximum value of Maximum Aggregate Transmit Power for
nonoverlapped operating modes
MaxATP US MaxATP DS
ADSL1/ADSL2/ADSL2plus Annex A 12.5 dBm 19.9 dBm
Note
(1) The aggregate transmit power across the whole passband and measured at the line terminals, must
not exceed the values of Table TNG 113-35 by more than 0.5 dB, in order to accommodate
implementation tolerances
Description Maximum PSD parameter specifies the maximum nominal power spectral
density allowed on the line at the transmitter output (upstream and downstream)
for initialization and showtime signals.
Lowering the maximum PSD results in reduction of power consumption, by
paying the price of having a lower capacity.
When the configured value of MAXPSD is above the maximum PSD allowed by
the relevant standard, the configured value is ignored.
If only ADSL1x is enabled in the profile, and the configured value
MAXPSDds_ADSL is below -52 dBm/Hz, the modem subsystem generates a
configuration error only in case it is not able to support this non-standard setting.
Note: only one parameter exists for both READSL2 US masks. The same input
value will thus be interpreted for both modes.
Notes
(1) The Maximum PSD parameter cannot be used to boost the PSD beyond the standard PSD, it can
only be used to put additional constraints on top of the standard. The constraints imposed by the
standards are summarized in Table 9.
Instances Line US
Values PsdPboOff
PsdPboOn
Description Specifies the maximum allowed total receive power level allowed for ADSL2x .
This parameter shall only be used when Psd PBO parameter (see Power
backoff mode) is on.
The input shall correspond to parameter MAXRXPWR
This parameter shall be ignored for ADSL1x.
Instances Line US
• PSD shape
• Custom PSD shape:
• Custom DS PSD Shape
• Custom US PSD Shape
In all other operation modes, they will be ignored.
Description For DS and US: specifies a predefined (standard) PSD shape (mask or
template) to be respected on the line in the corresponding direction.
The different predefined shapes are specified through enumeration. Each PSD
shape is characterized completely by the enumeration tag.
Values Enumeration. Next PSD Shapes Tags are defined for ADSL2plus:
DOWNSTREAM:
• PSD_SHAPE_CUSTOM : The “Custom PSD Shape” (see further) will
specify the PSD shape.
• PSD_SHAPE_ADSL2PLUS_CO : Normal PSD Mask for CO deployment.
• PSD_SHAPE_ADSL2PLUS_CA_[X] : PSD Masks for Cabinet deployment.
[X] designates the cut-off frequency for the passband. The possible values
for [X] are 100 to 280 in steps of 10 tones.
In case the Central Office Mask is selected, there shall be no additional PSD shaping on
top of the PSD Mask defined by G.992.5 Annex A, Annex B and Annex M.
In case a Cabinet Mask is selected, the lower part of the spectrum shall be transmitted at
lower PSD level (shaped). The set of Cabinet Masks only differ in the cut-off frequency
for the stopband (see Figure 8).
PSD1 = -95
This results in a total of 19 PSD Masks for Cabinet deployment, as illustrated in Table 10
Instances Line DS
Instances Line US
The Multi-ADSL Modem Subsystem assures that the Showtime values (if applicable for
the considered parameter) are available for retrieval over the xDSL API within 10
seconds after entering the L0 state. During the first 10 seconds of the L0 state, the VDSL
Modem Subsystem returns the Initialization values (if applicable for the considered
parameter) if the Showtime value for the considered parameter is not available yet.
Description The operational mode used for the current operation of the Multi-ADSL modem
subsystem (see Operating modes).
Instances Line
Update frequency NA
Description The total set of operational modes supported by the ATU-C and the ATU-R
respectively.
Update frequency NA
Initialization value ATU-C: parameter reflects all the standards the modem chipset is able to
support.
ATU-R: parameter reflects the CPE supported standards indicated in G.hs. If
ANSI or ETSI activation tones have been detected, also the operation mode bits
for these mode are set.
Description Indicates the current noise margin relative to the noise power that the ATU can
tolerate and still meet the target BER of 10-7 at 0 dB noise margin accounting
for all coding gains included in the design.
The SNR Margin given shall be the average of the margins (expressed in dB) of
all loaded carriers.
ADSL2:
According to ADSL2 standard an SNRM value of -512 is a special value
indicating that signal to noise ratio margin is out of range.
For downstream this special value -512 is translated to 51.2 dB.
For upstream the complete range -64 to 63 dB can be used
Instances DS/US
Values -64.0..+63.0 dB
Accuracy 0.5 dB
Description The difference in dB between the power received at one end and that
transmitted at the opposite end over all subcarriers during initialization. It is not
updated during showtime.
Instances DS/US
(1 of 2)
Values 0..102.3 dB
Note: when the actual loop attenuation is exceeding an extremum value that can
be represented, clamping to this extremum representable value is done.
Accuracy 0.5 dB
Update frequency NA
(2 of 2)
Description The difference in dB between the power received at one end and that
transmitted at the opposite end over all subcarriers during showtime.
Note: difference with Loop Attenuation is that the transmit power has changed
for the subcarriers and that the total number of subcarriers during showtime
typically will be less than during initialization.
Instances DS/US
Values 0..102.3 dB
Note: when the actual loop attenuation is exceeding an extremum value that can
be represented, clamping to this extremum representable value is done.
Granularity & Unit 0.1 dB
Accuracy 0.5 dB
Description Actual aggregate output power (that is, the total output power for the carriers of
the corresponding direction) when the modem is in showtime.
Instances DS/US
Description Actual transmit power spectrum density over the subcarriers at the U interface,
including artificial noise.
Instances DS/US
Values -127.0 to 0 dBm/Hz.
A value indicated as “noPSD” is a special value. It indicates that no power is
transmitted on that carrier.
Description This parameter represents the last successful transmitted initialization state in
the relevant direction in the last full initialization performed on the line.
Initialization states are defined in the individual ADSL Recommendations and
are counted from 0 (if G.994.1 is used) or 1 (if G.994.1 is not used) up to
Showtime (= 32).
The DS parameter is stored in ADSL2x operation modes only and is provided
during loop diagnostics mode. The index of the ATU-C state is represented by
an 8-bit integer value from 0 (G.994.1 phase) and 1 (C-QUIET1) to 31
(C-SEGUE4) and 32 (CSHOWTIME).
The US parameter is retrieved from the ATU-R and provided to the xDSL
Manager only during loop diagnostics mode. The index of the ATU-R state is
represented by an 8-bit integer value from 0 (G.994.1 phase) and 1 (R-QUIET1)
to 30 (R-SEGUE4) and 31 (R-SHOWTIME).
Instances DS/
(1 of 2)
Values 0 to 32
(2 of 2)
Instances DS/US
Values 0..65535
Remark: in case of no EOC, the initialization value for Attainable DS Line Bitrate
is returned.
Description The total line rate currently set up by PMD layer (i.e. the actual ATM payload
plus all overhead information from the PMD, PMS-TC and TPS-TC layers). The
Line Bitrate is given by the number of bits per DMT symbol, multiplied with the
number of DMT symbols per second, divided by 1000 (kbps).
Instances DS/US
Values 0..65535
Description The ratio of the Actual Line Bitrate and the Attainable Line Bitrate when both are
available.
In case of an activation error “Configuration not feasible”, it is set to 100 % for
each direction where the minimum bitrate cannot be sustained.
Note : L2 state transitions shall be transparent, i.e. DS Line Relative Capacity
Occupation shall always be L0 line bitrate, even if line state is L2 !
Instances DS/US
Values 0..100%
Update frequency Every time Actual and/or Attainable Line Rate are updated.
Description Indicates the maximum ATM bitrate (i.e. ATM payload plus header bytes) the
ATU can sustain on the line taking the current configuration (INP, delay,
carriermask, coding …) into account, with margin not lower than Target Noise
Margin. This parameter is provided for each activated bearer channel. The
calculation estimates the attainable ATM Bitrate assuming that all available
capacity is allocated to that bearer channel.
Note: the ATU-C takes the CPE capabilities into account (e.g. if the CPE does
not support S=1/2, even if the CO supports S=1/2 the reported rate is the value
without S=1/2 support)
The accuracy of this attainable ATM bitrate is 10 %. This means that if the
modem retrains - without change in loop or noise conditions - the actual ATM
bitrate is within 10% of the reported attainable ATM bitrate before
re-initialisation.
Values 0..65535
Description The actual transport rate (that is, the transported payload plus header bytes)
expressed in kbps in the L0 state.
Values 0..65535
Update frequency ADSL2x : updated every time Sp and/or Dp changes (during Initialization or
showtime)
Table TNG 113-58: Actual impulse noise protection (per bearer channel)
Description Actual value of INP parameter, defined in Minimum impulse noise protection, in
current session:
The Modem Subsystem uses this formula to calculate actual INP
Actual INP = 0.5 * SpxDp* (Rp / N_FECp)
for each latency path p.
Values 0..8.0 DMT symbols. Actual INP values of 16 DMT symbols will be ceiled to
actual INP of 8 DMT symbols.
Granularity & Unit ADSL2x : updated every time Sp, Dp, Rp or N_FECp changes (during
Initialization or showtime)
Update frequency NA
Table TNG 113-59: Actual L2 low power ATM Bitrate (per bearer channel)
Description The actual ATM rate (i.e. the ATM payload plus header bytes) expressed in
kbps in the L2 state.
Values 0 – 65535
Description The total set of TPS-TC modes supported by the VTU-O and the VTU-R
respectively.
(1 of 2)
Values Bitmap:
TPSTCModesATMBit
TPSTCModesPTM_64_65Bit
TPSTCModesPTM_HDLCBit
Update frequency NA
(2 of 2)
Description Actual artificial noise power spectrum density per subcarrier at the constellation
encoder.
Purpose
This document gives a summary of the configuration used in the configuration examples
in the DLP documents
Equipment
Table TNG 114-1 lists the equipment.
Subrack XD
acu aacu-c
iont ecnc-a
lt:1/1/4 evlt-c
lt:1/1/5 eblt-c
lt:1/1/6 polt-b
lt:1/1/7 eblt-k
lt:1/1/8 eblt-k
lt:1/1/9 smlt-k
xDSL profiles
Table TNG 114-2 lists the configured xDSL profiles.
ID Name
8 VDSL_profile
10 XSRVC_0_0
5 adsl_profile
Bonding 2 GroupProfile1
Notes
(1) Other profiles are not used for actual lines
SHub ports
Table TNG 114-3 lists the configured SHub ports.
2 Subtending
3 Network
4 Network
5 Network
6 Network
7 Network
VLANs
Table TNG 114-4 lists the configured VLANs.
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 0 1 2 3 4 5 6 7
56 residential-bridge
70 layer2-term-netwport T
80 layer2-term-netwport T
400 cross-connect x T
400:0 cross-connect
401 cross-connect x T
401:0 cross-connect
500 cross-connect x T
500:0 layer2-terminated
500:600 cross-connect
501 cross-connect x T
501:0 layer2-terminated
501:601 cross-connect
512 layer2-terminated x
512:0 layer2-terminated
512:57 cross-connect
560 residential-bridge
1450 layer2-term-netwport T
4093 reserved T
Notes
(1) U: untagged - T: tagged
VRFs
Table TNG 114-5 lists the VRFs on the LT.
1 Forwarder
0 Slow-path
15 Fast-path 70 192.168.70.39/24
80 192.168.80.39/24
4090 10.178.14.97/27
Lines
VDSL
Table TNG 114-7 lists the VDSL lines.
ADSL
Table TNG 114-8 lists the ADSL lines.
1/1/5/14 IPoE 16
1/1/5/15 PPPoE
Bonding
SHDSL
IP bridge
DHCP
relay
IP forwarder
DHCP
relay
IP router
10.178.14.97/27 10.178.14.85/27
ES Expansion Shelf
An expansion shelf using the same shelf (ARAM-D) as the
7330 ISAM FTTN host shelf, but with some different units installed to
provide additional subscriber line connections for the host shelf.
ESD Electrostatic Discharge
ETR Extended Temperature Range
ETSI European Telecommunications Standards Institute
The European counterpart to ANSI. Established to produce
telecommunication standards integration in the European community for
users, manufacturers, suppliers, and Post Telephone and Telegraph
administration.
EVLT-A xDSL Line Termination Unit
A board that supports connectivity between an NT unit and ADSL, VDSL,
and VDSL2 subscribers through the VPSC-D applique.
FDM Frequency Division Multiplexing
Multiplexing in which several independent signals are allocated separate
frequency bands for transmission over a common channel.
FE Fast Ethernet
FENT Fast Ethernet Network Termination
FIB Forwarding Information Base
The FIB is an internal table containing only the IP routes actually used by a
router to forward IP traffic.
FIFO First In, First Out
FPGA Field Programmable Gate Array
An integrated chip with functions that can be programmed by software.
FTP File Transfer Protocol
GE Gigabit Ethernet
Ethernet interface running at 1000 Mb/s.
GENC-E Alarm Control and Host Expansion Interface unit
An alarm control and host expansion interface unit that performs multiple
functions and provides additional optical Gigabit Ethernet connectivity and
expansion links for the ARAM-D shelf.
GENC-F Alarm Control and Host Expansion Interface unit
An alarm control and host expansion interface unit that performs multiple
functions, including ITSC, and provides additional optical Gigabit Ethernet
connectivity and expansion links for the ARAM-D shelf.
Numbers B
7330 ISAM FTTN basic data traffic
configuration for subtending, TNG 112-1 configuration example, TNG 110-5
ES configuration, TNG 111-1 cross-connect VLAN configuration
expansion unit management, TNG 106-3 example, TNG 110-12
maintaining, NTP 124-1 iBridge VLAN configuration example,
802.1x TNG 110-11
configuring, DLP 145-1 basic management connectivity
disabling, DLP 145-1 configuration example, TNG 110-2
802.1x parameters bridge
configuring, DLP 145-1 configure
general parameters, DLP 195-1
A configure IP-aware bridge, NTP 106-2
ADSL profile C
configuration example, TNG 110-3
alarms CC-VLAN, NTP 104-2, TNG 100-2
creating snapshots, DLP 154-2 configure QoS-aware VLAN, DLP 135-2
fault isolation, TAP 104-1 create S-VLAN, DLP 118-1
managing, DLP 110-2 create SC-VLAN, DLP 119-2
monitoring, NTP 115-1, DLP 155-1 CLI session
troubleshooting, TAP 104-1 setting up, DLP 100-1
viewing alarm logs, DLP 110-2 cluster management, NTP 122-2
viewing current alarms, DLP 110-2 configure, DLP 169-2
viewing snapshots, DLP 154-2 configuration
7330 ISAM FTTN ES, TNG 111-1
7330 ISAM FTTN subtending, TNG 112-1
backing up, RTP 100-3
IP router — QoS
IP router OSFP
configure, NTP 107-2 configuring, DLP 107-2
IP-aware bridge
configure, NTP 106-2 P
IPoA
add cross-connect user, NTP 125-1 password
create cross-connect user, DLP 174-1 rules, DLP 101-1
create user, DLP 125-1 performance monitoring, NTP 118-1
IPoE commands, DLP 176-1
add user, NTP 112-1 ping, DLP 164-1, DLP 182-1
create user, DLP 126-1 planning equipment
IPProxy CPE configuration example, TNG 110-2
configure management, DLP 192-1 plug-in unit
configure session, DLP 194-1 locking, DLP 112-1
enable management, DLP 193-1 unlocking, DLP 112-1
IPProxy CPE management, NTP 128-2 plug-in units
configuring, NTP 103-1
L port
view configuration, DLP 197-1
L2CP view operational data, DLP 197-1
configure session, DLP 185-2 PPPoA-PPPoE relay
layer 2 termination, TNG 100-2 disabling, DLP 147-1
link aggregation enabling, DLP 147-1
configuring, DLP 105-2 PPPoE
local authentication add user, NTP 113-1
configuring, DLP 143-1 create user, DLP 127-1
enable PPPoE server, DLP 148-1
M PPPoE profile
configure, DLP 149-1
MAC address, TNG 106-3 PPPoE relay
MAC concentration disabling, DLP 146-2
configuration, DLP 186-2 enabling, DLP 146-2
MAC learning, TNG 100-5 PPPoE termination
multicast configure, NTP 109-1
configure on LT, DLP 136-1
configure on the SHub, DLP 198-1 Q
configuring, DLP 137-1
QoS
N configuring
L2, DLP 133-1
NT redundancy L3, DLP 134-1
configuring, DLP 114-2 QoS-aware VLAN, DLP 135-2
configuring on the SHub, DLP 199-1
O
operator
create default profile, DLP 172-1
R — system parameter
T — xDSL profile
T Voice SIP
configure, DLP 196-1
TCA VRF
configure, DLP 190-2 creating, DLP 121-1
traceroute, DLP 165-1 forwarding VRF, DLP 122-1
traffic router VRF, DLP 123-1
configuration example, TNG 110-5
trap X
configuring, DLP 109-2
reporting modes, DLP 109-1 xDSL
troubleshooting create user, DLP 124-1
alarms, TAP 104-1 xDSL bonding group
events, TAP 104-1 create, DLP 130-2
troubleshooting commands, NTP 120-1 create profile, DLP 130-2
xDSL profile
U create, DLP 173-1
custom PSD points
unicast configuration, TNG 100-5 ADSL2+, DLP 188-2
user VDSL, DLP 188-2
create IPoA user, DLP 125-1 VDSL2, DLP 188-2
create IPoE user, DLP 126-1 modify, DLP 163-1
create PPPoE user, DLP 127-1 types, DLP 129-1
create xDSL user, DLP 124-1 VDSL2 virtual noise, DLP 189-2
creating and configuring, DLP 101-2
V
VDSL profile
configuration example, TNG 110-3
verifying configuration, DLP 113-1
VLAN
add an LT to a VLAN, DLP 128-1
add network interfaces, DLP 121-1
configure iBridge VLAN, NTP 105-2,
NTP 127-1
configuring global parameters, DLP 187-1
creating, DLP 115-3, DLP 116-3
cross-connect VLAN configuration
example, TNG 110-12
iBridge VLAN configuration example,
TNG 110-11
modifying
external management VLAN,
DLP 162-1
subtending configuration for 7330 ISAM
FTTN, TNG 112-1
Customer documentation
http://www.alcatel.com/osds/
Product manuals and documentation updates are available through the Alcatel Support
Documentation and Software Download service at Alcatel.com. If you are a new user and
require access to this service, please contact your Alcatel sales representative.
Technical support
http://www.alcatel.com/support/