Professional Documents
Culture Documents
Web Lct-Alfoplus2 1.1 Mn00351e 002
Web Lct-Alfoplus2 1.1 Mn00351e 002
ALFOplus2
ALFOplus2 in Full Outdoor configuration
management software application
Release 1.1
User manual
MN.00351.E - 002
The information contained in this handbook is subject to change without notice.
Property of SIAE MICROELETTRONICA. All rights reserved according to the law and to the international reg-
ulations. No part of this document may be reproduced or transmitted in any form or by any means, elec-
tronic or mechanical, without written permission from SIAE MICROELETTRONICA.
Unless otherwise specified, any reference to a Company, name, data and address produced on the screen
display is purely indicative and aims to illustrate the use of the product.
MS-DOS®, MS Windows® are trademarks of Microsoft Corporation.
HP®, HP OpenView NNM and HP–UX are Hewlett Packard Company registered trademarks.
UNIX is a UNIX System Laboratories registered trademark.
Oracle® is a Oracle Corporation registered trademark.
Mozilla Firefox is a Mozilla Foundation registered trademark.
Linux term is a trademark registered by Linus Torvalds, the original author of Linux operating system. Linux
is freely distributed according to GNU General Public License (GPL).
Other products cited here in are manufacturer’s registered trademarks.
Contents
FUNCTIONALITIES .............................................................................................................. 13
LIMITS.............................................................................................................................. 14
INSTALLATION ................................................................................................................... 16
MAIN ................................................................................................................................ 35
Equipment Properties .................................................................................................... 36
Verify the basic configuration of the equipment........................................................... 36
Modify the equipment identifier ................................................................................ 36
Modify the IP address of the agent SNMP of the equipment .......................................... 36
Execute the equipment software reset ....................................................................... 36
Align the reference date/time of the equipment to the current date/time of the PC .......... 37
Verify the equipment feature .................................................................................... 37
Enable a new equipment feature ............................................................................... 37
Verify the equipment units ....................................................................................... 38
Equipment Properties context ................................................................................... 39
General Info tab ............................................................................................... 39
Equipment Features tab ..................................................................................... 40
Equipment Units tab.......................................................................................... 40
Performance Monitoring................................................................................................. 42
Verify the status, the results and the threshold exceeding alarms of a PM measure.......... 42
Activate one or more PM measures ........................................................................... 43
Deactivate one or more PM measures ........................................................................ 43
Reset the threshold exceeding alarms of one or more PM measures............................... 43
Reset the values of the records daily and primary of one or more PM measures............... 43
Set the thresholds of the control parameters and alarms of a PM measure...................... 44
Performance Monitoring context................................................................................ 46
Performances window........................................................................................ 47
PM measures available ............................................................................................ 51
G828 ><transceiver> ....................................................................................... 51
RxPwr ><transceiver> ...................................................................................... 51
TxPwr ><transceiver> ...................................................................................... 51
ACM > <Radio Link name> (<transceiver>) ......................................................... 52
PM measures (info) ................................................................................................. 53
Report & Logger ........................................................................................................... 55
Save the log of the equipment alarms ....................................................................... 55
Delete the log of the equipment alarms ..................................................................... 56
Save the log of the operations executed by the users .................................................. 56
Delete the log of the operations executed by the users ................................................ 56
Save the equipment configuration ............................................................................. 57
Report & Logger context .......................................................................................... 58
NMS Wake Up Config. ................................................................................................... 59
Verify the Wake Up functionality status...................................................................... 59
Set the execution parameters and activate the Wake Up functionality ............................ 59
Disable the Wake Up functionality ............................................................................. 59
NMS Wake Up Config. context .................................................................................. 60
Wake Up functionality (info) ..................................................................................... 61
Software Info & Maint. .................................................................................................. 62
Verify the software/firmware version of the equipment ................................................ 62
Update the software/firmware of the equipment ......................................................... 62
Switch the functioning of the memory benches relevant to the controller........................ 63
Restore Factory Default of the equipment .................................................................. 64
Execute the equipment software reset ....................................................................... 64
Software Info & Maint context .................................................................................. 65
Equipment Firmware tab .................................................................................... 65
Advanced tab ................................................................................................... 66
EQUIPMENT ......................................................................................................................124
Radio Configurator.......................................................................................................125
Verify the Radio Link configuration ...........................................................................125
Create a Radio Link................................................................................................125
Modify a Radio Link ................................................................................................126
Delete a Radio Link ................................................................................................127
Radio Configurator context......................................................................................128
Radio Link (info) ....................................................................................................129
BW & Mod./Link ID ......................................................................................................130
Verify the reference band/modulation, the operating status and the configuration
parameters of the adaptive modulation.....................................................................130
Modify the reference band.......................................................................................130
Modify the reference modulation ..............................................................................131
Modify the operating status of the adaptive modulation...............................................131
Modify the lower threshold and the upper threshold of the modulation (ACM enabled) .....131
Verify/modify the Link identification number..............................................................131
BW & Mod./Link ID context .....................................................................................132
Modulation & Capacity tab.................................................................................132
Local Link ID tab..............................................................................................133
General Preset ............................................................................................................134
Verify/modify the threshold level of the signal at reception ..........................................134
Verify/modify the radio Link label.............................................................................134
General Preset context ...........................................................................................135
Xpic ...........................................................................................................................136
Verify the configuration parameters of the XPIC function .............................................136
Disable temporarily the function XPIC for a single transceiver ......................................136
Restore the XPIC function of the single transceiver .....................................................136
Enable/disable XPIC fault management procedure (FMP) .............................................137
Restore the function XPIC after a fault detection ........................................................137
Xpic context..........................................................................................................138
RADIO .............................................................................................................................247
Radio Branch ..............................................................................................................248
Verify/modify the duplex frequency ..........................................................................248
Verify/modify the frequency which the equipment transmitter is tuned on .....................248
Verify/modify the resolution of the received power (Prx) .............................................249
Verify/modify the resolution of the transmitted power (Ptx) .........................................249
Verify/modify the functioning status of the ATPC ........................................................249
Verify/modify the maximum output power value at the transmitter...............................250
Verify/modify the range of the ATPC regulation..........................................................250
Verify/modify the threshold of the ATPC device ..........................................................250
Radio Branch context .............................................................................................251
ODU Settings tab .............................................................................................251
ODU Powers tab ..............................................................................................252
MAINTENANCE ..................................................................................................................253
S/N Meas ...................................................................................................................254
Verify the value of the S/N measure .........................................................................254
Update the value of the S/N measure .......................................................................254
S/N Meas. context .................................................................................................255
Radio BER ..................................................................................................................256
Verify the status and the configuration parameters of Radio BER measure .....................256
This manual describes the commands and the functionalities of the WEB Local Craft Terminal application
(release 1.1) present in the equipment ALFOplus2.
The WEB LCT release present in the equipment can be verified opening the relevant WEB Local Craft Ter-
minal page and selecting Main > Equipment Properties - General Info tab - WEB LCT Version parameter.
WEB LCT application allows a user connecting to equipment via his own machine (PC, Workstation, etc.)
using the operating system and the Web browser at his disposal.
WEB LCT is an application resident in the equipment controller. It does not require any additional module
installed on the user PC (see Installation).
At start-up of WEB LCT, the browser displays the WEB Local Craft Terminal (WEB LCT) page that is the
application graphical interface (GUI).
The WEB LCT page can be opened directly from browser (see Open/close the WEB LCT page - Fig.1).
Through WEB LCT application, the user can check the equipment operating status and directly intervene
to manage it, verifying/modifying the configuration parameters (see Functionalities and Menu and com-
mands (Equipment Menu).
Fig.1 WEB LCT application (start-up of the WEB LCT page from browser)
User PC
Equipment
(e.g. 172.18.60.33) NE management Browser
(HTTP/
Controller MNGT WEB LCT page
HTTPS)
port *
equipment
WEB LCT (172.18.60.33) Help file
application IP
network
SFTP/SSH
SSH Server Help Web Server
FTP **
FTP Server Web Lct Console
• The properties (identifier, addresses, reference date/time, hardware, features key, etc.) and to
execute the reset of the equipment software (Equipment Properties).
• The measures of Performance Monitoring (Performance Monitoring).
• The log of the equipment alarms, the log of the operations executed by the users and the equip-
ment configuration (Report & Logger).
• The Wake Up trap (NMS Wake Up Config.).
• The equipment software/firmware and the restore of the default equipment settings (Software
Info & Maint.).
• The backup/restore of the whole equipment configuration (Backup/Restore Config.).
• The forward status of the alarms and their severity (Alarm Severity Config.).
• The equipment users list (Group/User Management).
• The equipment communication protocols (SNMP, HTTP, Telnet, FTP, SSH, SFTP, HTTPS), the Ra-
dio Encryption function and the control list of IP accesses (Access Control List) (Security Man-
agement).
• The equipment general configuration (radio configuration, modulation/capacity, adaptive mod-
ulation, etc.) (Equipment).
• The Ethernet Switch configuration, the management ports (Base Band).
• The sources and the outputs of synchronism (Synchronisation).
• The radio parameters (Radio).
• The maintenance parameters (S/N, Radio BER, MAB, digital loops, RMon) (Maintenance).
• The remote element list (Remote elements list area)
• The manual operations and the relevant timeout (Equipment status area).
The following limits must be considered for every single piece of equipment.
User list
Maximum number of groups in the list: 10
Maximum number of users in the list: 10
Users management (info)
Login to equipment
Maximum number of contemporary connections (login): 10
The system supports at most 10 groups, 10 users and 10 login at the same time.
As regards the logged users, these are distributed in the following mode:
CLI users* connected at the same time to a piece of equipment: 7.
SNMP users** connected at the same time to a piece of equipment: 10.
WEB users*** connected at the same time to a piece of equipment: 4.
Area Events
Maximum number of signals in the area Events: 500
The GUI accepts and recognizes the character set defined by the ISO/IEC 8859-1.
Only exception are the fields relevant to the management of user/groups, which accept and recognize only
the characters 0÷9, a÷z and A÷Z.
WEB LCT
WEB LCT is an application resident in the equipment controller.
It does not require any installation on the user PC.
At the first equipment switch-on, the user can immediately connect to it via WEB LCT because
the application is already present in the controller (see Open the WEB LCT page).
Then you can Update the software/firmware of the equipment.
Add-ins
As help to equipment WEB LCT for the management of:
• FTP protocol, it is necessary to install the program WEB Lct Console (WLC) or a FTP
Server (see FTP/SFTP protocol (info).
• Help online of WEB LCT (Help Web Server), it is necessary to install the program
WEB Lct Console.
• SFTP protocol, it is necessary to install a SSH server on one’s PC (see Installation and
configuration of SSH server).
The instructions for the installation of the WLC are reported in the relevant manual. WEB LCT
Console work in MS Windows® environment.
WARNING ALFOplus2 equipment is managed from version 1.2.0 of WLC or later.
Help online
WEB LCT is equipped with a help on-line which can be opened selecting the option [Help] or
in WEB LCT page.
The help on-line must be installed on one’s PC using the installation file specific for the WEB LCT
of the equipment you wish to use.
WARNING If Ethernet connection is used, checks or settings are not generally necessary. Only if more net-
work cards are equipped, it will be necessary to select the card you wish to use (Host Adapter) (see Web
Lct Console user manual).
When the equipment is connected to the PC via LAN network, the relevant WEB LCT page can be opened
also selecting the equipment from the address book of Web Lct Console (see relevant documentation).
The following procedure requires that:
• The relevant WEB LCT application is present on the equipment which you are connecting to.
• The user, you wish to use to open the WEB LCT page, is valid. With valid user (username/pass-
word) we mean a user present in the users list stored in the controller. The user must be asso-
ciated to a group for which the protocol HTTP and/or HTTPS is active (see Users management
(info).
For the first connection or after a Factory Default operation (see Advanced tab) use the creden-
tials Username: admin, Password: admin.
1. Run a browser.
5. Check the Remember Me box if you wish that, on the next opening of the application, the current user
name and password are automatically displayed; otherwise uncheck the considered box.
6. Press Login.
If the typed values are correct, the system displays the WEB LCT page of the equipment (see Fig.2).
As regards the messages that can be displayed during the start procedure of WEB LCT see Messages
displayed in the WEB LCT page.
It is possible to open:
• More WEB LCT pages on more machines or on the same machine, using the same user or dif-
ferent users.
• Only one WEB LCT page relevant to the same equipment.
• More WEB LCT pages relevant to different equipment.
For more information about the limits of the application, refer to the Limits paragraph.
3
1 2
5
6
This area contains the commands to manage the equipment configuration (see Fig.2).
Commands
The commands are subdivided in groups:
Main. Commands to manage the general equipment parameters: management ports,
Routing Table, Performance Monitoring measures, etc.
Equipment, Synchronisation, etc. Commands to manage the configuration parame-
ters typical of the equipment type which the WEB LCT page refers to.
For the description of every group/command see Menu and commands (Equipment Menu).
The selection of a group expands or compresses the list of the underlaying commands. At each
selection, the list takes the status complementary to the previous one (if compressed it becomes
expanded, or vice versa). The symbol:
identifies an expanded group.
identifies a compressed group.
It is possible:
• Expand all the groups at the same time, pressing
• Compress all the groups at the same time, pressing .
The symbol identifies a command which, once selected, displays the parameters associated
to it in the context area (see Context area).
Display/hide area
When the WEB page is opened, the Equipment Menu area is displayed.
Press to hide the area. Press to display the area again.
Parameters
Equipment Type. Equipment type.
Bridge Mode. Bridge mode (according to IEEE 802.1ad) of the Ethernet Switch:
• Customer Bridge. The Switch is in Customer Bridge mode. In this mode, the Switch
operates as a Bridge 802.1Q VLAN.
• Provider Bridge (802.1ad). The Switch is in Provider Bridge mode. In this mode, the
Switch operates as a Bridge Q-in-Q.
• Provider Edge Bridge. The Switch is in Provider Edge Bridge mode. In this mode, the
Switch operates as a Provider Edge Bridge 802.1ad with one S-VLAN component and
at least one C-VLAN component.
Tables
LEFT TABLE (see Fig.2). Status and radio parameters of the transmitter and receiver.
Every row of the table corresponds to a transceiver for which is displayed:
Transceiver which the data, present in the relevant row, refer to:
• Tx <transceiver>. Operating status and parameters of the specific transceiver
relevant to transmission (TRX A/TRX B).
• Rx <transceiver>. Operating status and parameters of the specific transceiver
relevant to reception (TRX A/TRX B).
RF frequency. The wording:
• ODU Hardware Failure. Hardware problem.
• Must be Set (Dplx). The specific frequency is not set.
Power in input to the receiver (lines Rx...) and in output to the transmitter (lines Tx...).
Both the powers are measured at the antenna flange.
The wording Tx Off (lines Tx...) indicates that the transmitter is off because of an action
of the user (see Verify/modify the operation of the transmitter - selection of Off or Per-
manent Off option) or because of the activation of one or more alarms which cause the
switch-off of the transmitter (for example ...Vco Fail Alarm).
If a Radio Link has not been defined yet, the parameters present in the table are not meaningful.
The area displays the wording Data Unavailable.
Update data
The information present in the Equipment Info area is updated every 15 seconds (timeout).
Display/hide area
When the WEB page is opened, the Equipment Info area is displayed.
Press to hide the area. Press to display the area again.
Profile of the user who has opened the WEB LCT page.
Options
Admin. The user has Administrator profile.
The user with this profile can both verify the parameters and send commands or change the
equipment configuration with no exception.
Login/Logout
At the opening of the WEB LCT page, the user will be connected to the equipment with the user/
profile entered during the login request.
In any moment it is possible to execute the logout and re-execute the login using the same or
a different user with respect to that used for the login.
NMS
If the equipment is managed also by the NMS5UX-B/NMS5LX supervisory system (NMS GUI,
NMS5WI GUI), the supervisory system considers the connection of a WEB user with Read Only
or Maintenance profile a WEB LCT connection in Monitoring mode.
While the supervisory system considers the connection to the equipment of a WEB user with
Read/Write or Administrator profile a WEB LCT connection in Configuration mode.
[Logout] parameter
This parameter opens the WEB LCT page of remote equipment to contained in the Remote Element Table.
[Help] parameter
The message Unable to contact help support... indicates that the program WEB Lct Console necessary for
the management of the Help Web Server has not been started (see Installation).
In this area, you can manage the remote equipment list stored in the equipment controller.
Parameters
Station/Equip. Name of the station and equipment in the list.
STATION ( )
Equipment is subdivided into stations.
Selecting the symbol of a station expands or compress the list of underlaying equipment.
At each selection, the list takes the status complementary to the previous one (if com-
pressed it becomes expanded and vice versa).
The name of the station is assigned by the user during the creation of the station itself.
The stations are displayed in the same order as they are inserted in the list.
An empty station, that is a station without associated equipment, cannot be stored in the
list.
EQUIPMENT ( or )
The symbol represents the equipment of type Remote Link (see column Type). The
symbol represents other types of the equipment.
The name of the equipment is automatically assigned by the application during the cre-
ation of the equipment itself: Equipment <progressive number>.
Within the station, the equipment are listed in increasing order with respect to the IP ad-
dress.
Buttons
GENERAL
Apply. Confirm the changes.
Refresh. Update the list.
Clear. Reset the remote equipment list
Open. Open the WEB LCT page of equipment of the list (Remote Link)
STATION
Add. Add a station to the list
Remove. Remove a station of the list
Rename. Rename a station of the list
Display/hide area
When the WEB page is opened, the Remote elements list area is hidden.
Press to hide the area. Press to display the area again.
See also
Remote equipment list (info)
2. Type, into the text box, the name to be assigned to the station (alphanumeric string with minimum 1
and maximum 11 characters).
The program does not create two stations with the same name in the same list. Moreover, a digit cannot
be used as first character and the space character cannot be used at the beginning or within the name
string.
3. Press OK.
The application displays the new station into the Remote elements list area, at the end of the list rele-
vant to the already existing stations.
2. Press Rename.
3. Type, into the text box, the new name (alphanumeric string with minimum 1 and maximum 11 char-
acters).
The program does not create two stations with the same name in the same list. Moreover, a digit cannot
be used as first character and the space character cannot be used at the beginning or within the name
string.
4. Press OK.
The application displays the new name of the station into the Remote elements list area.
WARNING The deleting of the station causes also the removal of all pieces of equipment coupled with such
a station.
1. In the Remote elements list area, select the station to which the equipment has to be coupled.
If the user does not select any station, the application will automatically couple the equipment with the
last selected station.
4. Set the Type of element box, selecting the option relevant to the element type to be inserted:
• Managed By SCT. Equipment managed by the WEB LCT application.
• Remote Link. Equipment managed by the WEB LCT application that constitutes the equipment
placed on the other end of the radio connection with respect to the local equipment.
• Element Manager. Element Manager of the equipment (IP address of the machine where the
NMS5UX-B/NMS5LX system resides).
• Not Managed. Element not managed by WEB LCT application.
This option can be used to insert into the remote equipment list for instance the coupling be-
tween the IP address and the NSAP (Gosip) one piece of equipment inserted into an OSI net-
work.
• 2x1+1-Xpic-Main. IDU Master belonging to an ALCplus2e equipment in XPIC 1+1 configuration.
Option to use only if problems have occurred regarding the automatic configuration of the re-
mote equipment list during the creation of a XPIC 1+1 system.
• 2x1+1-Xpic-Res. IDU Reserve belonging to an ALCplus2e equipment in XPIC 1+1 configuration.
Option to use only if problems have occurred regarding the automatic configuration of the re-
mote equipment list during the creation of a XPIC 1+1 system.
5. Press OK.
In the Remote elements list area, under the selected station, a record named Equipment <progressive
number> is displayed with the characteristics of the new equipment.
Open the WEB LCT page of equipment of the list (Remote Link)
1. In the Remote elements list area select the equipment of Remote Link type to be opened the WEB LCT
page.
2. Press Open.
The WEB LCT page to login to the remote equipment opens.
3. Type the name (Username box) and the access code (Password box) of the WEB user to use to activate
the connection and press Login.
In a new page the WEB LCT of the remote equipment is displayed.
WEB LCT
The remote equipment list can be used to define the remote equipment with respect to the local
equipment.
In order to perform this operation, it is necessary to define, within the remote equipment list of
the local equipment, the remote equipment located at the other side (remote equipment) as-
signing the type Remote Link to it (see Add equipment to the list).
In this way, when the button Open Far End present in the GUI is pressed, it will be possible to
open the page WEB LCT of the remote equipment (see Open the WEB LCT page of equipment
(Remote Link).
See also
Remote elements list area
Add a station to the list
Remove a station of the list
Rename a station of the list
Add equipment to the list
Remove equipment from the list
Reset the remote equipment list
Open the WEB LCT page of equipment of the list (Remote Link)
This area is the part of the WEB LCT page where the equipment parameters are displayed.
Its content changes accordingly to the selected command in the Equipment Menu area, which is indicated
in the top part of the area.
In the remainder of manual, for ease of wording, the contextual area will be simply called “context”.
Buttons
Apply. Selecting it makes the changes, executed on the parameters present in the context, ef-
fective.
Its selection opens a confirmation window. The confirmation windows are timed. When this pe-
riod is elapsed (pointed out by the progress bar), if the user has not confirmed the operation,
the window is closed and the operation cancelled.
The confirmation window displays the option Don’t ask again. Activate the option to avoid the
system displays the confirmation request when Apply is selected in any context of WEB LCT
page. This setting remains valid until the exit from the current session (logout or page closing).
If the Apply button is not available:
• It is not possible to execute changes because the user profile does not allow this or
the equipment is in connected/monitor status.
• No parameter present in the window has been modified. In this case, the button be-
comes available when the value of a parameter is changed.
• Another button is present in the context for the confirmation of the operation or the
change of the parameters.
WARNING For some commands, other buttons are displayed relevant only to the context which
contains them. These buttons are described in the paragraph relevant to the specific command.
Tabs
For some commands, the parameters are subdivided in tabs. The selection of a tab dynamically
changes the content of the context.
Parameters
The parameters present in the context can be read-only or set or modified.
The description of the single commands (see Menu and commands (Equipment Menu) indicates
the parameters which can be modified and modalities to do that.
Generally, for the parameter setting, the following rules are valid:
• Entering a value (alphanumeric string) in a text box.
If a red line is displayed below the text box, the entered value is not allowed because,
for example, a number of characters greater than the allowed one or an invalid value
has been entered (for example, entering of value 172.18.70.334 as IP address).
• Box with possible values displayed in a drop-down menu.
When the value is changed, a red triangle is displayed in the top left edge of the box.
It signals that the value has been changed, but the change has not been communi-
cated yet to the equipment (pressure of button Apply).
Parameters
URGENT <alarms number>. Number of Critical and/or Major alarms. Colour box:
• Orange. The most serious alarm present into the equipment has Major severity
• Red. The most serious alarm present into the equipment has Critical severity.
• Grey. The equipment has no active alarms with Critical or Major severity.
Select the box to display the active alarm.
NOT URG. <alarms number>. Number of Minor and/or Warning alarms. Colour box:
• Light blue. The most serious alarm present into the equipment has Warning severity.
• Yellow. The most serious alarm present into the equipment has Minor severity.
• Grey. The equipment has no active alarms with Minor or Warning severity.
Select the box to display the active alarm.
Events area
List of the status/alarm signals of the equipment.
Each signal corresponds to a record that is displayed:
• Colour box. Signal type and alarm gravity:
• Green/Status. Status signal.
• Light blue/Warning. Alarm detected with Warning severity.
• Yellow/Minor. Alarm detected with Minor severity.
• Orange/Major. Alarm detected with Major severity.
• Red/Critical. Alarm detected with Critical severity.
• White/Cleared. Alarm detected/cleared.
• Alphanumeric string which details the nature of the signal.
• Logic group which the signal belongs to: COMMON, etc.
• Date/time of the signal detection.
If the row refers to a detected/cleared alarm, the date/time of alarm detection will be
pointed out under the date/time of alarm clearing.
The date/time is set by the network element that has generated the signal. The for-
mat of date/time changes depending on the setting made in the operating system.
Operations
Verify the active manual operations
Verify/modify the manual operation timeout
Update data
The information present in the Events area are dynamically updated when an alarm is generated
or cleared.
Press to force the Events area updating and remove the detected and cleared alarms (box
White/Cleared).
Display/hide area
When the WEB page is opened, the Events area is displayed.
See also
Alarms management (info)
WARNING The timeout setting is common for all the manual forcing operations of the equipment.
2. To change the parameter, set a value between 0 and 172800 sec. (48 hours).
The setting of the value 0 corresponds to the disabling of the timeout.
Opening page
Login Failed! Invalid User or Password!. It means that the typed username and/or password is
wrong and/or not present in the equipment user list.
The equipment is update protected by element manager, retry to login as Read Only user. It
means that the equipment is managed also by the NMS5UX-B/NMS5LX supervisory system and
the NMS5UX user has prevented the possibility, for the WEB user, to be able to execute the login
of the equipment. In this case, it is necessary that the NMS5UX user enables again the WEB user
for the execution of the operation.
Too many WEB users!. It means that the equipment has been connected to the maximum num-
ber of allowed users (see Limits).
Open page
When the page is open, self-explanatory messages are usually displayed about the result of an opera-
tion or the impossibility to carry out an action because of the incongruence of the selected parameters.
Moreover, one of the following messages can be displayed:
Warning. Invalid or time-out session. You will be redirected to login form The equipment is in
disconnected status. In this condition, the parameters cannot be verified/modified.
Press Ok to display the WEB LCT page of login to the equipment. Fill the fields Username and
Password and press Login to reconnect to the equipment.
Access Denied. The selected context is available only to the user with profile Administrator.
Warning: You are forcing a manual operation. Operation timeout: <value>. The setting you wish
to execute is a manual operation subjected to timeout.
For each equipment, a timeout can be set after which the relevant active manual operations are
automatically deactivated. The wording No Timeout indicates that the timeout is disabled; this
means that a manual operation remains active until when the user deactivates it.
Loading The request of data is in progress between the PC and the equipment.
Updating, Applying Changes The sending of data is in progress between the PC and the equip-
ment.
Operation Fail! Unable to Get or Update parameter(s). Wrong user profile or not logged yet! The
operation cannot be executed because the user profile in use is not enabled to execute the action
or is not logged to the equipment yet.
Not Implemented Yet!. The command is not available for the current version of the program.
The description of every single command indicates the status of login/user profile (User Profile parameter)
necessary to use the command or execute the relevant procedures.
The Equipment Properties command manages the basic configuration of the equipment.
Operations
Verify the basic configuration of the equipment
Modify the equipment identifier
Modify the IP address of the agent SNMP of the equipment
Execute the equipment software reset
Align the reference date/time of the equipment to the current date/time of the PC
Verify the equipment feature
Enable a new equipment feature
Verify the equipment units
GUI
Equipment Properties context
2. In the Equipment ID field set an alphanumeric string with minimum 1 and maximum 50 characters.
Align the reference date/time of the equipment to the current date/time of the PC
WARNING Depending on the protocol set for the file transfer (see Ftp/Sftp context), check out that:
• Protocol FTP. The program WEB Lct Console or a FTP Server is active, otherwise start them.
If you use an FTP Server, the credentials used to access to the WEB LCT page must be the same
configured for the FTP Server and the file (certificate) must be present into a sub-folder of the
Shared Folder set during the configuration of FTP Server (see FTP/SFTP protocol (info).
• Protocol SFTP. A SSH server is installed on one’s PC (see SSH protocol (info).
The default SFTP credentials are the same used by the user to access to the WEB LCT page. For
a correct management of the data transfer, the SFTP credentials shall correspond to the user
(or to one of the users) defined during the installation of the SSH server (see Installation and
configuration of SSH server).
In order to enable one or more features, IT IS NECESSARY to require the enabling certificate, represented
by a file (with sfc extension), to the company that provides the equipment.
For each equipment you wish to enable one or more feature, a specific enabling certificate is required, be-
cause there is an univocal Link between each certificate and each specific equipment.
3. Press Upgrade.
6. Press Send.
A message indicates the end and the result of the operation:
• Operation Done. The operation has been executed with success.
• Invalid operation for this equipment…. The selected certificate and equipment are not compati-
ble (wrong serial number or wrong MIB version, etc.).
Tabs
General Info tab. Equipment properties: type, ID, IP address, software/firmware version, date/
time.
Equipment Features tab. Functionalities enabled for the equipment.
Equipment Units tab. Equipment units.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Equipment Properties (command)
Parameters
Equipment Type. Equipment type.
Ethernet Bridge Mode. Bridge mode (according to IEEE 802.1ad) of the Ethernet Switch:
• Customer Bridge. The Switch is in Customer Bridge mode. In this mode, the Switch
operates as a Bridge 802.1Q VLAN.
• Provider Bridge (802.1ad). The Switch is in Provider Bridge mode. In this mode, the
Switch operates as a Bridge Q-in-Q.
• Provider Edge Bridge. The Switch is in Provider Edge Bridge mode. In this mode, the
Switch operates as a Provider Edge Bridge 802.1ad with one S-VLAN component and
at least one C-VLAN component.
Firmware Version. Identification code and version of the equipment software/firmware pre-
sent on the memory bench in use.
WEB LCT Version. Version of the WEB LCT application for ALFOplus2 present into the equip-
ment.
WEB LCT Product Code. Identification code of the WEB LCT application for ALFOplus2 present
into the equipment.
System Up Time. Days, hours, minutes and seconds since the last restart of the equipment.
SYSTEM DATE/TIME
Date. Reference date of the equipment.
Time. Reference time of the equipment.
The format of date/time changes according to the setting made in the operating system.
Buttons
System Restart. Execute the equipment software reset
See also
Modify the equipment identifier
Modify the IP address of the agent SNMP of the equipment
The tab displays the list of the equipment feature enabled on demand.
Parameters
FEATURE NAME
Buttons
Upgrade. Enable a new equipment feature
Table
Every row of the table corresponds to an unit for which are indicated:
Real Type. Unit type really present into the equipment. The wording Unequipped indi-
cates that the unit is not physically present into the equipment.
Expected Type. Foreseen unit type. The wording Unequipped indicates that the unit is
not foreseen.
HW Ver. Unit version.
Part Number. Part Number of the unit.
Par. Part Number. Part Number of the group that contains the unit. Usually the group
represents the equipment part that can be replaced. Not all the unit are into a group. In
WARNING Command meaningful only with at least one Radio Link defined.
Operations
Verify the status, the results and the threshold exceeding alarms of a PM measure
Activate one or more PM measures
Deactivate one or more PM measures
Reset the threshold exceeding alarms of one or more PM measures
Reset the values of the records daily and primary of one or more PM measures
Set the thresholds of the control parameters and alarms of a PM measure
GUI
Performance Monitoring context
See also
PM measures available
PM measures (info)
Verify the status, the results and the threshold exceeding alarms of a PM measure
3. Select the group that contains the measure and than the wished measure.
For every measure is pointed out the status:
• (Stop.). The measure is not on progress.
• (Run.). The measure is on progress.
Below the measure, more options are pointed out: seconds, blocks, Rlts, etc. depending on the type of
selected measure.
Every option indicates the measurement unit of the control parameters for which you wish to display
the results and the threshold exceeding alarms.
This subdivision is necessary because the results of the control parameters cannot be graphically dis-
played by means of different measurement units.
3. To activate:
• All measures in a group, select the group.
• Single measure, select the group that contains the measure and than the wished measure.
3. To deactivate:
• All measures in a group, select the group.
• Single measure, select the group that contains the measure and than the wished measure.
Reset the values of the records daily and primary of one or more PM measures
3. Select the group, the measure and the wished measurement unit (for example G828 > TRX A > Sec-
onds).
4. Press Commons.
If G828 ><transceiver> measure is selected, the Commons window displays the following parameters:
• General area. Threshold levels of the UAS parameter:
• N Ses Set UAS(P) (sec.). Threshold (expressed as number of consecutive seconds with
SES) over which starts the UAS unavailability period.
To change the parameter set a value between 1 and 10 sec (default 10), press Apply
and confirm.
• N Ses Reset UAS(Q) (sec.). Threshold (expressed as number of consecutive seconds
without SES) over which ends the UAS unavailability period.
To change the parameter set a value between 1 and 10 sec (default 10), press Apply
and confirm.
The threshold (expressed as percentage of the errored blocks) over which it is declared a SES
is 30% and is not changeable.
Press to compress the area. Press to expand the area.
• 15M Es Threshold (sec.). Threshold (expressed as number of seconds, within a 15 minute peri-
od, when ES has occurred) over which it is activated the alarm 15M ES.
To change the parameter set a value between 1 and 900 (default 0), press Apply and confirm.
The value 0 represents the deactivation of the threshold and accordingly of the alarm.
• 24H Es Threshold (sec.). Threshold (expressed as number of seconds, within a 24 hour period,
when ES has occurred) over which it is activated the alarm 24H ES.
To change the parameter set a value between 1 and 86400 (default 0), press Apply and con-
firm. The value 0 represents the deactivation of the threshold and accordingly of the alarm.
• 15M Ses Threshold (sec.). Threshold (expressed as number of seconds, within a 15 minute pe-
riod, when SES has occurred) over which it is activated the alarm 15M SES.
To change the parameter set a value between 1 and 900 (default 0), press Apply and confirm.
The value 0 represents the deactivation of the threshold and accordingly of the alarm.
• 24H Ses Threshold (sec.). Threshold (expressed as number of seconds, within a 24 hour period,
when SES has occurred) over which it is activated the alarm 24H SES.
To change the parameter set a value between 1 and 86400 (default 0), press Apply and con-
firm. The value 0 represents the deactivation of the threshold and accordingly of the alarm.
• 15M Sep Threshold (events). Threshold (expressed as number of SEP events within a 15 minute
period) over which it is activated the alarm 15M SEP.
To change the parameter set a value between 1 and 900 (default 0), press Apply and confirm.
The value 0 represents the deactivation of the threshold and accordingly of the alarm.
• 24H Sep Threshold (events). Threshold (expressed as number of SEP events within a 24 hour
period) over which it is activated the alarm 24H SEP.
To change the parameter set a value between 1 and 86400 (default 0), press Apply and con-
firm. The value 0 represents the deactivation of the threshold and accordingly of the alarm.
If RxPwr ><transceiver> measure is selected, the Commons window displays the following parame-
ters:
• 15M Rlts Thresholds area. 15M Rlts alarms threshold:
• Rlts 1 (sec.), Rlts 2 (sec.), Rlts 3 (sec.), Rlts 4 (sec.), Rlts 5 (sec.). Threshold levels (ex-
pressed as number of seconds, within a 15 minute period, when the received power is
lower than the RLT1, RLT2, RLT3, RLT4, RLT5 threshold levels) over which the system
activates the relevant alarms.
To change a threshold, set into the relevant box, a number between 1 and 900 (default
0), press Apply and confirm. The value 0 represents the deactivation of the threshold
and accordingly of the alarm.
If TxPwr ><transceiver> measure is selected, the Commons window displays the following parameters:
• 15M Tlts Thresholds area. 15M Tlts alarms threshold:
• Tlts 1 (sec.), Tlts 2 (sec.), Tlts 3 (sec.), Tlts 4 (sec.). Threshold levels (expressed as num-
ber of seconds, within a 15 minute period, when the transmitted power is higher than the
TLT1, TLT2, TLT3, TLT4 threshold levels) over which the system activates the relevant
alarms.
To change a threshold, set into the relevant box, a number between 1 and 900 (default
0), press Apply and confirm. The value 0 represents the deactivation of the threshold
and accordingly of the alarm.
• 24H Tlts Thresholds area. 24H Tlts alarms threshold:
• Tlts 1 (sec.), Tlts 2 (sec.), Tlts 3 (sec.), Tlts 4 (sec.). Threshold levels (expressed as num-
ber of seconds, within a 24 hour period, when the transmitted power is higher than the
TLT1, TLT2, TLT3, TLT4 threshold levels) over which the system activates the relevant
alarms.
To change a threshold, set into the relevant box, a number between 1 and 86400 (default
0), press Apply and confirm. The value 0 represents the deactivation of the threshold
and accordingly of the alarm.
• Tlt Thresholds area. Threshold levels of the transmitted power:
• Tlt 1 (dBm), Tlt 2 (dBm), Tlt 3 (dBm), Tlt 4 (dBm). Respectively the first, the second, the
third and the fourth threshold level of the transmitted power.
To change a threshold, set into the relevant box, a number between -40dBm and 35dBm,
press Apply and confirm.
Press to compress an area. Press to expand the area.
If ACM > <Radio Link name> (<transceiver>) measure is selected, the Commons window displays the
following parameters:
• 15M Thresholds area. Alarms threshold:
• 15M <modulation> Threshold. Threshold - expressed as number of seconds, within a 15
minute period, when the counter <modulation> has increased - over which it is activated
the alarm.
To change a threshold, set into the relevant box, a number between 1 and 900 (default 0), press
Apply and confirm. The value 0 represents the deactivation of the threshold and accordingly of
the alarm.
• 24H Thresholds area. Alarms threshold:
• 24H <modulation> Threshold. Threshold - expressed as number of seconds, within a 24
hour period, when the counter <modulation> has increased - over which it is activated
the alarm.
To change a threshold, set into the relevant box, a number between 1 and 86400 (default 0),
press Apply and confirm. The value 0 represents the deactivation of the threshold and accord-
ingly of the alarm.
<modulation> = 4QAMS, 4QAM, 16QAMS, 16QAM, 32QAM, 64QAM, 128QAM, 256QAM, 512QAM,
1024QAM, 2048QAM or 4096QAM.
Press to compress an area. Press to expand the area.
WARNING Context available only with at least one Radio Link defined.
Buttons
Open new performance window. Open the Performances window which allows:
Manage the PM measures (activation, deactivation, threshold setting).
Display the activation status of the PM measures
Display the results of the measures in graphic and table format.
Display the status of the threshold exceeding alarms.
It is possible to open more Performances... window pressing again Open new performance
window or pressing Open New Window present in the Performances.... window itself.
See also
Performance Monitoring (command)
Verify the status, the results and the threshold exceeding alarms of a PM measure
Activate one or more PM measures
Deactivate one or more PM measures
Reset the threshold exceeding alarms of one or more PM measures
Reset the values of the records daily and primary of one or more PM measures
Set the thresholds of the control parameters and alarms of a PM measure
PM measures available
PM measures (info)
3 4 6
(1) Title bar. When the window is opened, the title bar displays Performances [none selected].
When you select an option which allows displaying the results of a measure ( see note 3), Perfor-
mances [Selected group / Selected measure / Selected measurement unit] will be displayed, for
example Performances [G828 / TRX A / seconds].
Buttons
The buttons Start, Stop, Clear Alarms and Clear Counters, if a group is selected, execute their
action for all the measures present in the group. Otherwise, if one measure or one option below the
measure is selected, they execute their action only for the selected measure.
The symbol:
identifies an expanded group or measure.
identifies a compressed group or measure.
identifies a measuring unit.
The group and the relevant measures (group > measure) available are the following:
G828 ><transceiver> measure, checks the quality of the received signal at radio side.
The results of the control parameters are shown subdivided into the following measuring units:
• seconds. Seconds: ES, SES, SEP, UAS.
• blocks. Blocks: BBE.
RxPwr ><transceiver> measure, checks the power of the signal at reception.
The results of the control parameters are shown subdivided into the following measuring units:
• Rlts. Seconds: Rlts1, Rlts2, Rlts3, Rlts4, Rlts5.
• TM. dBm: TMMax, TMMin, Average Lev.
TxPwr ><transceiver> measure, checks the power of the signal at transmission.
The results of the control parameters are shown subdivided into the following measuring units:
• Tlts. Seconds: Tlts1, Tlts2, Tlts3, Tlts4.
• TM. dBm: TMMax, TMMin, Average Lev.
ACM > <Radio Link name> (<transceiver>) measure, traces the trend of the ACM profiles in the
time.
The results of the control parameters are shown subdivided into the following counters:
• seconds. Counters relevant to the ACM profiles.
• UpDownShift. Counters Unavailable, DownShift and UpShift.
Press to hide the list of measures. Press to display the list again.
(4) Graphical representation of the measure results. This area displays, in graphical format, the
results of the control parameters of the selected measure/measurement unit.
Every bar represents the result of the measure of one parameter in a given observation period (daily
or primary record).
The position of the bar on the x-axis indicates the daily or primary record which it is referred to:
• C.D. Current daily record (24 hours). The X100 suffix indicates that the value must be mul-
tiplied by 100 to obtain the real measured value.
• L. D. Preceding daily record. The displayed value must be multiplied by 100 to obtain the
real measured value.
• Curr. 15 Min. Current primary record (15 minutes).
• 15 Min. ÷ 4 Hours. 16 preceding primary records (each record is of 15 minutes).
Moreover, for every record the relevant status is displayed: (ML), (MF), (IN), (LO), (RE). The de-
scription of every single status is reported in the following note. If the status indication is not pre-
sent, the record is not available, because the measure was not active during the considered
observation period.
The position on the y-axis indicates the value achieved by the parameter during the specific obser-
vation period (record). The measurement unit on the y-axis changes depending on the type of pa-
rameter represented in the graph. Moreover the y-scale dynamically changes depending on the
entity of the represented values.
The results relevant to a given parameter can be hidden selecting the parameter label located in
the top part of the area (for example ). To display the parameter results again, select the
label again.
(5) Table representation of the measure results. This area displays, in table format, the results of
the control parameters of the selected measure/measurement unit.
For every parameter, the result of the measure is pointed out relevant to a given observation period
(daily or primary record):
• Type. According to the selected measure this field indicates:
• G828, RxPwr and TxPwr measures: Control parameters (see PM measures availa-
ble).
• ACM measure: Counters. One counter is foreseen for every ACM profile (see PM
measures available).
For every counter, the column of the specific observation period indicates (expressed
in seconds) the number of times the counter is increased. Besides one counter per
modulation, the following counters are foreseen:
• Unavailable. Number of seconds, within the specific observation period, for
which the count has not been possible because the current ACM profile was
not connected to the radio.
• DownShift. Number of times the profile, during the specific observation period,
has changed assuming a profile lower than the previous one.
• UpShift. Number of times the profile, during the specific observation period,
has changed assuming a profile higher than the previous one.
Into the table, the system does not point out the results relevant to all the counters. Such
results have been subdivided according to the selected measure/measuring unit (see note
3).
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15 Min. Current primary record (15 minutes).
• 15 Min. ÷ 4 Hours. 16 preceding primary records (each record is of 15 minutes).
What just said is valid from the second row of the table on, because the first row indicates the status
of the records (Count. Status):
• Meaningless (ML) (green). The record has been completely acquired and the measure is not
affected by errors.
• Meaningful (MF) (green). The record has been completely acquired and it detected some per-
formance errors.
If one or more alarms are active (see note 6) means that the counter(s) have exceeded their
threshold value.
• Incomplete (IN) (yellow). The record has not been completely acquired during the corre-
sponding observation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily re-
cords are acquired at 23.59 of each day.
• Lost (LO) (red). The record has not reached the main controller of the equipment for instance
because the corresponding peripheral card has been physically extracted before it could have
forwarded the record itself or for generic hardware/software troubles.
• Restarted (RE) (red). The record has been lost after a reset of the equipment.
When the equipment has a software restart and checks that the measure is activated for a
certain measure point, all the record coupled with such a measure point will result in this
status.
(6) Status of the threshold exceeding alarms and configuration parameters. These fields change
according to the selected measure:
G828 measures
• 15M <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the primary observation periods (15 minutes) present into the window.
• 24H <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the daily observation periods (24 hours) present into the window.
• UAS. Unavailability alarm.
RxPwr measure
• 15M <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the primary observation periods (15 minutes) present into the window.
• 24H <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the daily observation periods (24 hours) present into the window.
• Rlt Thresh. Threshold levels of the received power actually set. These parameters can
be configured by the user.
TxPwr measure
• 15M <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the primary observation periods (15 minutes) present into the window.
• 24H <control parameter>. Threshold exceeding alarm of the specific control parameter
into one of the daily observation periods (24 hours) present into the window.
• Tlt Thresh. Threshold levels of the transmitted power actually set. These parameters
can be configured by the user.
ACM measure
• 15M <counter>. Threshold exceeding alarm of the specific counter into one of the pri-
mary observation periods (15 minutes) present into the window.
• 24H <counter>. Threshold exceeding alarm of the specific counter into one of the daily
observation periods (24 hours) present into the window.
The colour of the alarm boxes represents the alarm status and severity:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the Critical,
Major, Minor, Warning severity.
• Green. Alarm activated coupled with the Status severity.
• Grey. Alarm deactivated.
G828 ><transceiver>
RxPwr ><transceiver>
TxPwr ><transceiver>
ACM > <Radio Link name> (<transceiver>)
G828 ><transceiver>
The G828 > <transceiver> measure checks the quality of the received signal at radio side.
The check consists of measuring the following quality parameters:
BBE (Background Block Error). Number of blocks where it has been detected at least one er-
rored bit not belonging to SES.
ES (Errored Second). The second when there have been one or more errored blocks.
SES (Severely Errored Second). The second when there have been a percentage of errored
blocks > 30% or the second when it has been activated an alarm equivalent to the interruption
of the signal at reception.
SEP (Severely Errored Period). Number of periods with a number of consecutive SES comprised
between 3 and 9. The sequence is ended by a second without SES.
UAS (UnAvailable Seconds). Number of unavailability seconds. The counting of the seconds
starts after P consecutive seconds with SES presence and it ends at the beginning of a period of
Q consecutive seconds without SES. The P seconds are counted into the unavailability period.
The Q and P values can be configured.
The BBE, ES, SES, UAS parameters are implemented according to G.829 ITU-T Recom. The SEP parameter
is implemented according to G.828 ITU-T Recom.
RxPwr ><transceiver>
The RxPwr > <transceiver> measure checks the power of signal at reception.
The check consists of measuring the following quality parameters:
TMMax (Tide Mark Max). Maximum value reached by the power at reception (RL) during the
observation period (15 min or 24 hours).
TMMin (Tide Mark Min). Minimum value reached by the power at reception (RL) during the ob-
servation period (15 min or 24 hours).
Average Level. Average level of the power at reception (RL) during the observation period (15
min or 24 hours).
Rlts (Received Level Threshold Second). Number of seconds where it has been detected that
the value of the power at reception (RL - Received Level) is lower than the pre-defined threshold
level. It is possible to define up to a maximum of 5 threshold levels.
The parameters are implemented according to Standard EN 301 129 of the ETSI.
TxPwr ><transceiver>
The parameters are implemented according to Standard EN 301 129 of the ETSI.
The ACM > <Radio Link name> (<transceiver>) traces the trend of the ACM profiles (receiver) in the time.
The trend is traced using one counter for each ACM profile and further counters (Unavailable, UpShift and
DownShift):
4QAM Str. Number of seconds, within the specific observation period, during which the profile
ACM 4QAM Str has been active.
4QAM. Number of seconds, within the specific observation period, during which the profile ACM
4QAM has been active.
16QAM Str. Number of seconds, within the specific observation period, during which the profile
ACM 16QAM Str has been active.
16QAM. Number of seconds, within the specific observation period, during which the profile
ACM 16QAM has been active.
32QAM. Number of seconds, within the specific observation period, during which the profile
ACM 32QAM has been active.
64QAM. Number of seconds, within the specific observation period, during which the profile
ACM 64QAM has been active.
128QAM. Number of seconds, within the specific observation period, during which the profile
ACM 128QAM has been active.
256QAM. Number of seconds, within the specific observation period, during which the profile
ACM 256QAM has been active.
512QAM. Number of seconds, within the specific observation period, during which the profile
ACM 512QAM.
1024QAM. Number of seconds, within the specific observation period, during which the profile
ACM 1024QAM has been active.
2048QAM. Number of seconds, within the specific observation period, during which the profile
ACM 2048QAM has been active.
4096QAM. Number of seconds, within the specific observation period, during which the profile
ACM 4096QAM has been active.
Unavailable. Number of seconds, within the specific observation period, during which the count
has not been possible because the current ACM profile was not connected to the radio.
DownShift. Number of times the ACM profile, during the specific observation period, has
changed assuming an ACM profile lower than the previous one.
UpShift. Number of times the ACM profile, during the specific observation period, has changed
assuming an ACM profile higher than the previous one.
WARNING The representation in graphical and table format of the counter results (see Fig.3) uses a counter
resolution with granularity of 1 second. If the modulation change has lasted for less than 1 second, it will
not be indicated by the modulation counters (4QAM Str, 4QAM, etc.) but by the counter DownShift or Up-
shift.
Control parameters
The control parameters under examination change according to the equipment type and to the
measure type supported by that type of equipment.
Usually, all the executed measures refer to ITU-T Recommendations (eg. G.828, etc.).
PM activation/deactivation
The activation (and the deactivation) of the PM measures can be executed by the user.
When it has been activated a PM measure, the equipment starts the storing of the values rele-
vant to the control parameters.
The results of the measures are sub-divided into records.
Each record contains the values recorded into a specific time range (observation period).
If at the end of the observation period, the measure has not yet been deactivated the system
starts another observation period and so on until when the operator stops the measure.
Record
The equipment group the results of the PM measures into observation period of 15 minutes (pri-
mary records) and of 24 hours (daily records).
The observation periods can not be synchronized with the instant when the measure is activated
but such records refer, for the primary records, to the quarter of an hour (00.00, 00.15, 00.30,
etc.) and, for the daily records, to the time 00.00 UTC (Universal Time, Coordinated).
For instance, if a measure starts at 11.40, the first primary record will have as observation pe-
riod the time 11.4011.45 (corresponding to the time range 11.3011.45), while the first daily
record will have as observation period 11.4000.00.
When the user requires the display of the results of the PM measures, the daily and primary
records relevant to the running PM measures are displayed in the WEB LCT page of the equip-
ment.
For each type of measure, the equipment keeps stored the current records and also the last 16
primary records (corresponding to the last 4 hours) and the last daily one (corresponding to the
preceding day).
The preceding records are overwritten.
When the operator stops a measure, the system stores the uncompleted current record.
If the operator activates and deactivates the measure more times during the same observation
period, the system will store the record that contains the results of the last executed measure.
For instance if the measure has been activated at 9.02 and deactivated at 9.07, then it has been
newly activated at 9.09, the record relevant to the observation period 9.009.15 will contain
the results of the measures relevant to the period 9.099.15, while the ones relevant to the
period 9.029.07 will not be stored.
See also
Performance Monitoring (command)
Performance Monitoring context
Verify the status, the results and the threshold exceeding alarms of a PM measure
Activate one or more PM measures
Deactivate one or more PM measures
Reset the threshold exceeding alarms of one or more PM measures
Reset the values of the records daily and primary of one or more PM measures
Set the thresholds of the control parameters and alarms of a PM measure
PM measures available
PM measures (info)
The Report & Logger command manages the log of the equipment alarms, the log of the operations ex-
ecuted by the users and the equipment configuration.
With log of the equipment alarms we mean the list of the status and alarm signals currently active on the
equipment (current alarms) and the signals memorized in the equipment controller (alarm history).
With log of the operations we mean the list of the operations executed by all the users who can connect to
the equipment. The list is stored in the equipment controller.
Operations
Save the log of the equipment alarms
Delete the log of the equipment alarms
Save the log of the operations executed by the users
Delete the log of the operations executed by the users
Save the equipment configuration
GUI
Report & Logger context
See also
Alarms management (info)
The context allows to save the log of the equipment alarms, the log of the operations executed by the users
and the equipment configuration.
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Help. Open the help on-line.
See also
Report & Logger (command)
Alarms management (info)
The NMS Wake Up Config. command manages the Wake Up trap (Wake Up functionality).
Operations
Verify the Wake Up functionality status
Set the execution parameters and activate the Wake Up functionality
Disable the Wake Up functionality
GUI
NMS Wake Up Config. context
See also
Wake Up functionality (info)
WARNING The execution parameters (NMS IP Address, Timeout, etc.) cannot be modified when the Wake
Up functionality is already active. To modify them, it is necessary Disable the Wake Up functionality and
them modify them.
2. Set the IP address of the server, which the Wake Up trap must be sent to, in the NMS IP Address box.
3. Set the time interval, for which the Wake Up trap is sent at the end of which it is automatically disabled,
in the Timeout (Minutes) box.
Typing or selecting the arrows of the box, set a number between 0 and 1440 minutes.
The setting of the value 0 indicates that the trap is sent until when the user manually disables it or the
NMS server automatically disables it when intercepts it.
4. Set the physical location (for example, the name of the site) of the equipment in the NE Location box.
The setting of the parameter is optional.
2. Select the Disable option or reset the value present in the NMS IP Address box (value 0.0.0.0).
Parameter
Status. Transmission status of Wake Up trap. The sending of the Wake Up trap is:
• Active, when the Enable option is selected and a valid value (different from 0.0.0.0)
is set as IP address of the server (option NMS IP Address).
• Inactive, when the Disable option is selected and the value 0.0.0.0 is set as IP ad-
dress of the server (option NMS IP Address).
NMS IP Address. IP address of the server which the Wake Up trap must be sent to. With server
we mean the machine where the supervision system NMS5UX-B or NMS5LX or a different man-
agement system, able to manage the reception of the Wake Up trap, is installed.
Timeout (Minutes). Time interval for which the Wake Up trap, when enabled, is sent to the
server. The setting of the value 0 indicates that the trap is sent until when the user manually
disables it or the NMS server automatically disables it when intercepts it.
NE Location. Optional parameter. The user can insert the physical location (for example the
name of the site) of the equipment in this field. This information is communicated to the remote
manager together with the characteristics of the equipment. The supervision system NMS5UX-
B or NMS5LX does not use this information.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
NMS Wake Up Config. (command)
Set the execution parameters and activate the Wake Up functionality
Disable the Wake Up functionality
Wake Up functionality (info)
Wake Up functionality
The Wake Up functionality allows the user enabling the spontaneous forward, from the equip-
ment to a remote server, of a SNMP trap for the notification of the equipment commissioning
(Wake Up trap).
This functionality has been implemented as help to the Auto Discovery modality available in the
supervision systems NMS5UX-B and NMS5LX.
The Auto Discovery mode has the purpose to point out new equipment in the network, not man-
aged by the supervision system yet.
More information about the Auto Discovery modality is reported in the supervision system doc-
umentation.
Here below only the management of the Wake Up trap by the equipment is described.
ALFOplus2
The user can configure, via WEB LCT, the parameters for the management of the Wake UP trap:
• IP address of the server where the supervision system, which the trap must be sent
to (NMS IP Address option) is installed.
• Time interval for which the trap must be sent, after which the sending of the trap is
automatically disabled (Timeout option).
If the value 0 is set for the Timeout option, the Wake Up trap will be sent until when
the user manually disables it or the NMS server automatically disables it when inter-
cepts it.
Then, the trap forwarding shall be activated.
To activate the Wake Up functionality, it is necessary to set a valid value (different from 0.0.0.0)
as IP address of the server (NMS IP Address option) and select the Enable option.
To deactivate the functionality, it is necessary to select the Disable option or reset the NMS IP
Address option (value 0.0.0.0).
When the Wake Up functionality is activated, the equipment starts sending the Wake Up trap
every minute for the time interval defined by the user (Timeout option).
For example, if the value 60 has been set as timeout, the trap is sent each 60 minutes. At the
end of 60 minutes, the sending of the trap is automatically disabled.
If, in the period when the sending of the trap is enabled, the supervision system intercepts the
Wake Up notification records the presence of the new equipment in its database and disables
the sending of the Wake Up trap by the equipment (trap switch-off).
See also
NMS Wake Up Config. (command)
NMS Wake Up Config. context
Verify the Wake Up functionality status
Set the execution parameters and activate the Wake Up functionality
Disable the Wake Up functionality
The Software Info & Maint. command manages the equipment software/firmware and the restore of the
default equipment settings.
Operations
Verify the software/firmware version of the equipment
Update the software/firmware of the equipment
Switch the functioning of the memory benches relevant to the controller
Restore Factory Default of the equipment
Execute the equipment software reset
GUI
Software Info & Maint context
See also
Equipment software/firmware (info)
Factory Default of the equipment (info)
WARNING Depending on the protocol set for the file transfer (see Ftp/Sftp context), check out that:
• Protocol FTP. The program WEB Lct Console or a FTP Server is active, otherwise start them.
If you use an FTP Server, the credentials used to access to the WEB LCT page must be the same
configured for the FTP Server and the file for the update must be present into a sub-folder of
the Shared Folder set during the configuration of FTP Server (see FTP/SFTP protocol (info).
• Protocol SFTP. A SSH server is installed on one’s PC (see SSH protocol (info).
The default SFTP credentials are the same used by the user to access to the WEB LCT page. For
a correct management of the data transfer, the SFTP credentials shall correspond to the user
(or to one of the users) defined during the installation of the SSH server (see Installation and
configuration of SSH server).
The application automatically updates the software/firmware of the memory bench not on progress or not
present (Bench Status parameter - Loaded or Not Loaded value).
This operation cannot be executed when the update is already in progress (Download Status parameter -
Downloading value).
The software/firmware update procedure could change the equipment functions.
3. In the box Download file path, type the path/name of the file you wish to use for update.
4. Set, in the FTP Server IP Addr. box, the IP address of the FTP Server or the SSH Server (if not differently
set at the configuration of FTP Server, it corresponds to IP address of PC).
6. Activate the Bench Switch? box, if at the end of the download, the system has automatically to execute
a switching of the memory bench in such a way to use the bench with the software/firmware that has
been updated.
WARNING The operation, if executed on equipment subjected to the radio supervision, could cause the loss
of the link because the restore of the factory settings involves the re-channelling of the radios to the default
values.
WARNING After the reset, all the values activated before the operation result as valid ones.
Operation is no traffic affecting.
Tabs
Equipment Firmware tab. Version and status of the equipment software/firmware.
Advanced tab. Factory default.
Buttons
Refresh. Update the context.
Help. Open the help on-line.
See also
Software Info & Maint. (command)
The tab shows the version, the status and the composition of the equipment software/firmware.
First table
The table displays the version and the status of the equipment software/firmware:
Software Version. File name and version of the equipment software/firmware respec-
tively present on the memory bench 1 (Bench 1 column) and 2 (Bench 2 column).
Bench Status. Functioning status of the memory bench 1 (Bench 1 column) and 2
(Bench 2 column):
• Running. It is on progress the software/firmware relevant to the subject mem-
ory bench.
• Loaded. The software/firmware is present into the bench but actually it is not
on progress (StandBy).
• Not Loaded. The software/firmware is not present into the memory bench.
Download Status. Status of the update operation of the software/firmware respectively
present on memory bench 1 (Bench 1 column) and 2 (Bench 2 column):
• ---. Update is not in progress.
• Downloading. It is on progress the updating relevant to the memory bench.
• Interrupted. The update has been interrupted.
• Complete. The update operation is ended.
Second table
The table displays the list of the codes and of the FPGA files that compose the equipment soft-
ware/firmware. Every row corresponds to a software/firmware element for which is pointed out
in the column:
Unit. Name of the unit or of the equipment part where there is the controller (code) or
the programmable device (FPGA file).
Software. Name which usually identifies the type of component:
• FW_Boot. Boot code. This part of code can not be updated in fact it is not pro-
vided with a version of the memory benches.
• FW_. Application code.
• Conf, Prog, Init or FPGA Configuration file of the programmable devices.
• WEB_LCT. WEB Local Craft Terminal application.
Actual Release. Version of the code or of the FPGA file present into the controller.
For some elements, the system shows the version and also the relevant identification
code composed by the letter E or N followed by a number (each number identifies a dif-
ferent code type).
Buttons
Upgrade. Update the software/firmware of the equipment.
Bench Switch. Switch the functioning of the memory benches relevant to the controller.
See also
Equipment software/firmware (info)
Advanced tab
The tab displays the parameters to restore the factory default of the equipment.
Parameters
Factory default. Box to Restore Factory Default of the equipment.
Buttons
Apply. Confirm the changes.
Restart. Execute the equipment software reset
See also
Factory Default of the equipment (info)
Equipment software/firmware
The software/firmware of the equipment is the assembly of all the firmware necessary for the
management of the entire equipment and WEB LCT application.
The software/firmware of the equipment is present into the main controller that is provided with
two memory benches (bench) the first one on service and the other one in waiting status.
Each bench can contain one software/firmware version (also different from the other one) of the
equipment.
Operation Traffic
See also
Software Info & Maint. (command)
Software Info & Maint context
Factory Default
Through the WEB LCT application, the Factory Default settings of equipment can be restored
(see Restore Factory Default of the equipment).
At the restart or at the new switch-on of the equipment, the Factory Default configuration will
be applied.
All the settings executed until then by the user will be deleted (for example, user list, remote
equipment list, etc.).
255.255.255.255* - High
See also
Software Info & Maint. (command)
Software Info & Maint context
The Backup/Restore Config. command manages the backup/restore from file of the whole equipment
configuration.
Operations
Save the whole equipment configuration (backup configuration)
Transfer the equipment configuration previously saved (restore configuration)
Retrieve the equipment configuration automatically saved by the program before the last oper-
ation of configuration restore (revert configuration)
GUI
Backup/Restore Config. context
See also
Backup/restore of the equipment configuration (info)
WARNING Depending on the protocol set for the file transfer (see Ftp/Sftp context), check out that:
• Protocol FTP. The program WEB Lct Console or a FTP Server is active, otherwise start them.
If you use an FTP Server, the credentials used to access to the WEB LCT page must be the same
configured for the FTP Server (see FTP/SFTP protocol (info).
• Protocol SFTP. A SSH server is installed on one’s PC (see SSH protocol (info)).
The default SFTP credentials are the same used by the user to access to the WEB LCT page. For
a correct management of the data transfer, the SFTP credentials shall correspond to the user
(or to one of the users) defined during the installation of the SSH server (see Installation and
configuration of SSH server).
2. Set, in the FTP Server IP Addr. box, the IP address of the FTP Server or the SSH Server (if not differently
set at the configuration of Server, it corresponds to IP address of PC).
Setting the address 0.0.0.0, the system automatically retrieves the IP address of the manager which
has made the request.
3. Type, in the Backup file name box, the path where you wish to save the file and the name of the file
with bak extension.
It is possible to set a name already existing for the file in the chosen path. In this case, the data present
in the file will be overwritten.
If the equipment uses the:
• FTP protocol and the FTP Server activated at start-up of WLC, it is necessary to enter the full
path (c:\..). Otherwise, if you use own FTP Server, it is necessary to enter the partial path (only
the sub-folder and the filename of the Shared Folder).
• SFTP protocol you must set the path defined during the configuration of the SSH server (see
Installation and configuration of SSH server - SFTP tab).
WARNING This operation restores the equipment configuration saved to file, transferring the data of the
file to the same equipment (configuration restore) or, if the equipment is faulted, to the spare equipment
which will replace it.
If this procedure is used to copy a default configuration on more equipment, the correct operation of the
cloned equipment is not ensured.
Depending on the protocol set for the file transfer (see Ftp/Sftp context), check out that:
• Protocol FTP. The program WEB Lct Console or a FTP Server is active, otherwise start them.
If you use an FTP Server, the credentials used to access to the WEB LCT page must be the same
configured for the FTP Server and the file with the configuration must be present into a sub-
folder of the Shared Folder set during the configuration of FTP Server (see FTP/SFTP protocol
(info).
• Protocol SFTP. A SSH server is installed on one’s PC (see SSH protocol (info).
The default SFTP credentials are the same used by the user to access to the WEB LCT page. For
a correct management of the data transfer, the SFTP credentials shall correspond to the user
(or to one of the users) defined during the installation of the SSH server (see Installation and
configuration of SSH server).
2. Set, in the FTP Server IP Addr. box, the IP address of the FTP Server or the SSH Server (if not differently
set at the configuration of Server, it corresponds to IP address of PC).
Setting the address 0.0.0.0, the system automatically retrieves the IP address of the manager which
has made the request.
3. Set, in the Restore file name box, the name of the file you wish to use to restore the configuration.
If the equipment uses the:
• FTP protocol and the FTP Server activated at start-up of WLC, it is necessary to enter the full
path (c:\..). Otherwise, if you use own FTP Server, it is necessary to enter the partial path (only
the sub-folder and the filename of the Shared Folder).
• SFTP protocol you must set the path defined during the configuration of the SSH server (see
Installation and configuration of SSH server - SFTP tab).
4. If you wish to activate a previous software/firmware version (Release Downgrade procedure), it is nec-
essary to load on the equipment a configuration coherent with the previous software/firmware.
In order that the configuration is still compatible after the restore procedure, the option Bench switch
after restore has to be activated.
Retrieve the equipment configuration automatically saved by the program before the
last operation of configuration restore (revert configuration)
WARNING Depending on the protocol set for the file transfer (see Ftp/Sftp context), check out that:
• Protocol FTP. The program WEB Lct Console or a FTP Server is active, otherwise start them.
If you use an FTP Server, the credentials used to access to the WEB LCT page must be the same
configured for the FTP Server (see FTP/SFTP protocol (info).
• Protocol SFTP. A SSH server is installed on one’s PC (see SSH protocol (info).
The default SFTP credentials are the same used by the user to access to the WEB LCT page. For
a correct management of the data transfer, the SFTP credentials shall correspond to the user
(or to one of the users) defined during the installation of the SSH server (see Installation and
configuration of SSH server).
2. Set, in the FTP Server IP Addr. box, the IP address of the FTP Server or the SSH Server (if not differently
set at the configuration of Server, it corresponds to IP address of PC).
Setting the address 0.0.0.0, the system automatically retrieves the IP address of the manager which
has made the request.
The context displays the parameters to save and restore the whole equipment configuration.
Parameters
Backup file name. Path and name of the file which you wish to save the whole equipment con-
figuration to.
Restore file name. Path and name of the file which you wish to use for the restore of the pre-
viously saved configuration.
Bench switch after restore. Activate this option if you wish to return to the previous software/
firmware version during the configuration restore (Release Downgrade procedure).
FTP Server IP Addr. IP address of the FTP Server or of the SSH Server used for the file trans-
fer.
The address 0.0.0.0 indicates that the system automatically retrieves the IP address of the man-
ager which has made the request.
Revert. Date/time of the backup file automatically created by the program before the last re-
store operation.
The format of date/time changes according to the setting made in one’s operating system. The
wording --- shows that the file is not available.
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Help. Open the help on-line.
Backup. Save the whole equipment configuration (backup configuration)
Restore. Transfer the equipment configuration previously saved (restore configuration)
Revert. Retrieve the equipment configuration automatically saved by the program before the
last operation of configuration restore (revert configuration)
See also
Backup/Restore Config. (command)
Backup/restore of the equipment configuration (info)
Backup
The WEB LCT allows save the whole equipment configuration (backup configuration).
The saved file is in binary format and can be saved on PC or external support according to the
user needs.
Restore
In any moment, the user can restore the equipment configuration saved to file transferring the
data of the file to the same equipment (configuration restore) or, if the equipment is faulted, to
the spare equipment which will replace it.
Before restoring the configuration:
• The equipment saves its own current configuration and keeps it available until the suc-
cessive restore operation.
• It checks if the version of the equipment sw/fw used to generate the file and the hard-
ware type (Real Type - see Equipment Units tab), which the file refers to, match those
of the equipment where you are performing the restore operation.
Revert
In any moment, the user can retrieve the equipment configuration automatically saved by the
program before the last operation of configuration restore (revert configuration).
In this way, two backup versions will be always available for equipment: one executed by the
user and the other automatically executed by the program before the last restore operation.
See also
Backup/Restore Config. (command)
Backup/Restore Config. context
Save the whole equipment configuration (backup configuration)
Transfer the equipment configuration previously saved (restore configuration)
Retrieve the equipment configuration automatically saved by the program before the last oper-
ation of configuration restore (revert configuration)
The Alarm Severity Config. command manages the alarm transmission and their severity.
Operations
Verify the severity and the enabling/forwarding status of the alarms
Enable/disable an alarm
Enable/disable the forwarding of the trap of an alarm
Change the severity of an alarm
GUI
Alarm Severity Config. context
See also
Alarms management (info)
Enable/disable an alarm
2. Select the alarm and press Edit Alarm Config or double click on the alarm.
3. Set the Severity parameter, selecting:
• Disable, to disable the alarm.
• Status, Warning, Minor, Major or Critical to enable the alarm. Select the option relevant to the
severity to be assigned to the alarm
4. Press Ok.
The settings are reported in the Alarm Severity Config. context. The symbol [*] is displayed next to the
name of the changed alarm.
WARNING It is possible to change the forwarding status of the trap only if it has been enabled the alarm
(see Enable/disable an alarm).
2. Select the alarm and press Edit Alarm Config or double click on the alarm.
4. Press Ok.
The settings are reported in the Alarm Severity Config. context. The symbol [*] is displayed next to the
name of the changed alarm.
5. Press Apply and confirm.
2. Select the alarm and press Edit Alarm Config or double click on the alarm.
3. Set the Severity parameter, selecting the severity you wish to associate to the alarm: Status, Warning,
Minor, Major or Critical.
If the alarm was disabled (Disable option selected), the selection of a different option, besides modify-
ing the alarm severity, automatically enables it.
4. Press Ok.
The settings are reported in the Alarm Severity Config. context. The symbol [*] is displayed next to the
name of the changed alarm.
Table
Each row of the table corresponds to a group or alarm.
Alarms are subdivided into groups. The groups and the alarms change according to the equip-
ment configuration.
When context is opened in the table, only the groups are displayed (Group/Alarm column).
To expand and compress the list of alarms associated to a group, select the symbol next to
the name of the group. Every selection of the symbol makes the list assumes the status com-
plementary to the previous one (if compress it is expanded and vice versa).
When a group is expanded, for every alarm is displayed the following characteristics:
Group/Alarm. Alarm name.
A colour box is before the name, pointing out the alarm status and severity:
• White box with red X. Alarm disabled.
• Green box. Alarm enabled with severity equivalent to a status signal.
• Light blue box. Alarm enabled with Warning severity.
• Yellow box. Alarm enabled with Minor severity.
• Orange box. Alarm enabled with Major severity.
• Red box. Alarm enabled with Critical severity.
• The presence of an asterisk [*] between the box and the alarm name shows
that at least one characteristic of the alarm has been changed.
Severity. Enabling status of the alarm and, if it is enabled, the relevant severity:
• Disabled. Alarm disabled.
• Status. Alarm enabled with severity equivalent to a status signal.
• Warning, Minor, Major or Critical. Alarm enabled with severity respectively
Warning, Minor, Major or Critical.
• Not available in this SW version. Alarm not supported by the current firmware
version present into the equipment controller.
Trap Notification. Forwarding status of the trap:
• Enabled. The transmission of the alarm trap to the management system is en-
abled.
• Disabled. The transmission of the alarm trap to a possible external manage-
ment system is disabled (for exampleNMS5UX-B/NMS5LX).
• ---. Information not meaningful because the alarm is disabled.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
Edit Alarm Config. Enable/disable an alarm, Enable/disable the forwarding of the trap of an
alarm or Change the severity of an alarm
See also
Alarm Severity Config. (command)
Alarms management (info)
Displaying alarms
The list of the current alarms is indicates in the Equipment status area.
Enabling/disabling alarms
The equipment alarms can be disabled and re-enabled by the user according to the needs.
Disabling an alarm means that, on the detection of the alarm itself, this is not registered in the
equipment controller and, as consequence, is not communicated to a possible management pro-
gram: as the alarm had never occurred.
On the contrary, enabling an alarm (default condition) means that, when the alarm is detected,
this is registered in the equipment controller and, if the forwarding of the relevant trap is ena-
bled (see next item), the alarm is communicated to the management system and displayed in
the current alarms and the history alarms.
WARNING The enabling/disabling of the alarm is independent for each alarm and local to the
equipment which the operation is executed for. This means that the setting must be executed
for each alarm of each equipment.
Enabling/disabling traps
The trap is a message (in this case of detection or clearing of an alarm) spontaneously sent by
the equipment to a possible external management system, for exampleNMS5UX-B/NMS5LX.
The forwarding of the trap of each alarm can be disabled and re-enabled by the user according
to his own needs.
Disabling a trap means that, on the detection of the alarm, this is not registered in the equip-
ment controller and, as consequence, is not communicated to a possible management program.
On the contrary, enabling a trap (default condition) means that, on the detection of the alarm,
this is registered in the equipment controller and communicated to the management system,
which displays it in the current alarms and the history alarms.
WARNING The enabling/disabling of the forwarding of the trap is independent for each alarm
and local to the equipment which the operation is executed for. This means that the setting must
be executed for each alarm of each equipment.
Alarm severity
Each alarm acknowledged and managed by the local management program has an associated
severity which determinates the importance of the alarm.
This severity is not fixed, but can be changed by the user as he likes.
Alarms log
With log of the equipment alarms we mean the list of the status and alarm signals currently ac-
tive on the equipment (current alarms) and the signals memorized in the equipment controller
(alarm history).
WEB LCT allows to Save the log of the equipment alarms and to Delete the log of the equipment
alarms.
See also
Alarm Severity Config. (command)
Alarm Severity Config. context
Operations
Verify the user groups
Add a user group
Modify a user group
Delete a user group
GUI
Groups context
See also
Users management (info)
HTTP/HTTPS protocol (info)
SNMP protocol (info)
FTP/SFTP protocol (info)
SSH protocol (info)
3. Into the Name box, type the group name (alphanumeric string with a number of characters from 4 up
to 31, the accepted and recognized characters are 0÷9, a÷z and A÷Z).
The parameter is Case Sensitive; pay attention to uppercase and lowercase characters.
It is not possible to assign the same name to two different groups present into the same list.
The parameter can not be changed later.
4. Set the profile you wish to assign to the user who will belong to the group in the Profile box:
• Administrator. The user with this profile can both verify the parameters and send commands or
change the equipment configuration with no exception.
Moreover, every user belonging to a group with profile Administrator, besides being a WEB user,
is even a CLI user because a user with profile Administrator is automatically enabled by the sys-
tem to access to the equipment even by the application SM-OS (Siae Microelettronica - Operat-
ing System).
5. Define the protocols/interfaces available to the users associated to the group (Allowed Protocols pa-
rameter):
• HTTP. HyperText Transfer Protocol. Protocol used to transfer hypertext pages on the WEB.
• HTTPS. HyperText Transfer Protocol over SSL. It is a variation of HTTP protocol and uses, be-
sides TCP/IP protocol, SSL layer (Secure Sockets Layer) which implements the encryption and
the authentication of the transmitted data.
• SNMP. Simple Network Management Protocol. Protocol which allows monitoring and controlling
the network devices.
If you activate this protocol, select the relevant version:
• SNMPv1. First version.
• SNMPv2c. Second version.
• SNMPv3. Third version.
• FTP. File Transfer Protocol. Protocol for the file transfer.
• SFTP. SSH File Transfer Protocol. Protocol for the secure file transfer.
• SSH. Secure SHell. Protocol for the secure and encrypted access.
The active box ( ) indicates that the protocol will be available for the WEB LCT session opened by the
users of the group; the inactive box indicates that the protocol will not be available.
At least one protocol must be activated.
2. To modify the profile of the users associated to a group, select the relevant Profile box and then the
option:
• Administrator. The user with this profile can both verify the parameters and send commands or
change the equipment configuration with no exception.
• Read/Write. The user with this profile can as check the parameters as send commands or exe-
cute changes to the equipment configuration except for the following operations: modifying the
user list, aligning the date/time of the equipment, force the logout of a user and all those oper-
ations available only to the Admin. user.
• Maintenance. The user with this profile can check the parameters and execute only maintenance
operations (MAN. OP) in the Manual Operations context and Radio BER context.
• Read Only. The user with this profile can only check the parameters.
The parameter of the last group with profile Administrator cannot be modified.
Pressing Revert changes cancels all the changes executed.
3. To change the protocols/interfaces available to the users associated to a group, select the relevant box:
• HTTP. Protocol HTTP (HyperText Transfer Protocol).
The active box ( ) indicates that the protocol will be available for the WEB LCT session opened
by the users of the group; the inactive box indicates that the protocol will not be available.
WARNING A group with at least one associated user cannot be deleted. First delete the users and then the
group.
This operation is not available if the default group Admin is selected.
The context displays the list of the users groups of the equipment.
Table
Every row of the table corresponds to a group for which are indicated:
Name. Group name
Profile. Profile of the users associated to the group:
• Administrator. The user with this profile can both verify the parameters and
send commands or change the equipment configuration with no exception.
• Read/Write. The user with this profile can as check the parameters as send
commands or execute changes to the equipment configuration except for the
following operations: modifying the user list, aligning the date/time of the
equipment, force the logout of a user and all those operations available only
to the Admin. user.
• Maintenance. The user with this profile can check the parameters and execute
only maintenance operations (MAN. OP) in the Manual Operations context and
Radio BER context.
• Read Only. The user with this profile can only check the parameters.
CLI. Permission of the user to access to the equipment even by the application SM-OS
(Siae Microelettronica - Operating System).
The active box ( ) indicates that the WEB user is even a CLI user, the inactive box in-
dicates that the WEB user is not a CLI User too.
The parameter is read-only because the setting is automatically made by system, accord-
ing to the profile defined during the group creation: only the users belonging to groups
with profile Admin have the functionality CLI enabled.
HTTP. Protocol HTTP (HyperText Transfer Protocol): protocol used to transfer hypertext
pages on the WEB.
The active box ( ) indicates that the protocol will be available for the WEB LCT session
opened by the users of the group; the inactive box indicates that the protocol will not be
available.
HTTPS. Protocol HTTPS (HyperText Transfer Protocol over SSL): variation of HTTP pro-
tocol and uses, besides TCP/IP protocol, SSL layer (Secure Sockets Layer) which imple-
ments the encryption and the authentication of the transmitted data.
The active box ( ) indicates that the protocol will be available for the WEB LCT session
opened by the users of the group; the inactive box indicates that the protocol will not be
available.
SNMP. Protocol SNMP (Simple Network Management Protocol): protocol which allows
monitoring and controlling the network devices. Option:
• Disabled. Protocol SNMP disabled.
• SNMPv1. First version.
• SNMPv2c. Second version.
• SNMPv3. Third version.
FTP. Protocol FTP (File Transfer Protocol): protocol for the file transfer based on TCP.
The active box ( ) indicates that the protocol will be available for the WEB LCT session
opened by the users of the group; the inactive box indicates that the protocol will not be
available.
SFTP. Protocol (SSH File Transfer Protocol): protocol for the secure file transfer.
The active box ( ) indicates that the protocol will be available for the WEB LCT session
opened by the users of the group; the inactive box indicates that the protocol will not be
available.
SSH. Protocol (Secure SHell): protocol for the secure and encrypted access.
The active box ( ) indicates that the protocol will be available for the WEB LCT session
opened by the users of the group; the inactive box indicates that the protocol will not be
available.
Buttons
Apply. Not available in this context.
See also
Groups (command)
Users management (info)
HTTP/HTTPS protocol (info)
SNMP protocol (info)
FTP/SFTP protocol (info)
SSH protocol (info)
HTTP protocol
HTTP (HyperText Transfer Protocol) is used to transfer hypertext pages within WEB.
All HTTP traffic takes place via the TCP/IP protocol on port 80 of PC.
HTTPS protocol
HTTPS (HyperText Transfer Protocol over SSL) is a variation of HTTP and uses, besides TCP/IP
protocol, SSL layer (Secure Sockets Layer) which implements the encryption and the authenti-
cation of the transmitted data. All HTTPS traffic takes place on port 443 of PC.
In web browsers, URI which refers to this technology is named https.
For more information about RFC 2818 specification (HTTP Over TLS).
ALFOplus2
Equipment can operate with HTTP protocol or HTTPS protocol.
Protocols are implemented in exclusive mode in such a way that, when a user connects via HTT-
PS, HTTP requests will be re-addressed to HTTPS and vice versa.
The use of the protocol HTTP and/or HTTPS at equipment level can be enabled in any moment
(see Enable/disable the operating of a communication protocol).
If the operator enables both the HTTP protocol and the HTTPS protocol, the system will auto-
matically use the more secure protocol (HTTPS).
The operator is advised against the contemporary disabling of the protocols HTTP and HTTPS,
because the connection with the equipment WEB LCT would be lost.
The utilization of a protocol during a WEB LCT session depends even on the enabling state of the
user, who has opened the session, in relation to the use of this protocol. The protocols enabled
for one user depend on the group associated to the user (see Group/User Management).
Example. If the user XY is associated to a group not enabled to the use of HTTPS protocol but
only HTTP, this user can open the WEB LCT session only in HTTP mode even if the HTTPS pro-
tocol is enabled in the Services Status Config context. In the same way, if the user XY is asso-
ciated to a group enabled to the use of HTTPS and HTTP protocol, but the HTTPS protocol is
disabled in the Services Status Config context, the user XY can open the WEB LCT session in
HTTP mode.
As general rule, for the correct use of one protocol, it is necessary that the protocol is enabled
to the use and that the user who opens the WEB LCT session is associated to a group enabled
to the use of the same protocol.
First time equipment is switched-on or after the restore of the Factory Default, equipment uses
HTTP protocol.
NMS5UX-B/NMS5LX
If the equipment is managed even by NMS5UX-B/NMS5LX supervision system, the protocol
(HTTP or HTTPS) used to open the WEB NMS page is defined at level of NMS system.
WARNING ALFOplus2 equipment is not provided with SSL certificates when it is put in field.
Moreover, the restore of Factory Default deletes possible certificates already loaded on equip-
ment.
The procedure to request the certificate can change from CA to CA depending on the required
information and on the procedure for the generation and the communication of the pair of key
(see documentation of specific CA).
Generally, all CA’s will require to provide a CSR (Certificate Signing Request), that is a request
containing the data which shall be certificated. To generate the CSR of an equipment see Gen-
erate the Certificate Signing Request for an equipment.
The generation of CSR includes also the generation of a Private Key, which will not be included
in CSR itself will be used only to sign the request of certificate.
The information to include in CSR changes depending on the context for which you request the
certification. CA will define which information is useful.
In any case the name/address of server (Common Name), which you require the certificate for,
will be required.
For the generation of SSL certificates relevant to ALFOplus2 equipment, the Common Name of
the certificate must correspond to the IP address of the equipment for which you wish to use
the certificate (for more information, see Certificate license - ALFOplus2 hereinafter in the chap-
ter).
With IP address we mean the address entered in the URL of the browser to open the page WEB
LCT.
As result of the certification request, CA will provide the file relevant to final SSL certificate. This
file must be loaded on the equipment (see Download the SSL certificate in an equipment).
See also
Groups (command)
Services Status Config (command)
SSL/HTTP Secure (command)
SNMP protocol
The SNMP protocol is available in 3 versions: SNMPv1, SNMPv2c and SNMPv3.
The main differences between SNMPv1/v2c and SNMPv3 are the management of message se-
curity and the control of the accesses.
SNMPv1/v2c protocol
The versions 1 and 2 of SNMP have the security model based on the community: messages are
passed not-encrypted and can be copied or modified.
SNMPv3 protocol
The version 3 of SNMP, instead, foresees a security model based on the user for the protection
of the messages and the control of the access.
In SMNMPv3, every user has his own authentication password and encryption password for the
packets.
In order to authenticate the packets, SNMPv3 utilizes the HMAC-MD5 or HMAC-SHA1 algorithm.
The secret key used to calculate the HMAC code is the user password; in order to be authenti-
cated, the packet must contain even the user name besides the HMAC code.
Moreover, the SNMPv3 protocol foresees the possibility to cipher the part of the packet contain-
ing the OID of the MIB objects and the relevant values using the cipher algorithm DES56; the
key used for the cipher procedure is different from the key used for HMAC authentication.
This allows defining if allowing the user an access:
• Without authentication (noAuthNoPriv).
• With authentication (AuthNoPriv).
• With authentication and encryption (AuthPriv).
For more information, refer to RFC 3410, 3411, 3412, 3413, 3414, 3415, 3584 specifications.
ALFOplus2
The equipment can work with SNMPv1/v2c protocol and with SNMPv3 protocol.
In order to preserve the security, SNMPv3 protocol must be used.
The use of the protocol SNMPv1/v2c and/or SNMPv3 can be enabled at equipment level in any
moment (see Enable/disable the operating of a communication protocol).
The user can then disable the protocol SNMPv1/v2c or SNMPv3, respecting the following rules:
• The two protocols cannot be disabled at the same time.
• If only one of the two protocols is enabled, it cannot be disabled if the other protocol is
not contextually enabled.
The use of a protocol during a WEB LCT session, however, depends on the enabling state of the
use of this protocol by the user who has opened the session. The protocols enabled for a user
depend on the group associated to the user (see Group/User Management).
Example. If the user XY is associated to a group enabled to the use of the protocol SNMPv3, a
WEB LCT session opened by the user XY will accept and process only SNMPv3 packets; the re-
ceived SNMPv1/v2c packets will be dropped.
In analogous way, if the user YZ is associated to a group enabled to the use of the protocol
SNMPv2c, a WEB LCT session opened by the user YZ will accept and process only SNMPv1/v2c
packets.
As general rule, for the correct use of one protocol, it is necessary that the protocol is enabled
to the use and that the user who opens the WEB LCT session is associated to a group enabled
to the use of the same protocol.
First time equipment is switched-on or after the restore of the Factory Default, equipment uses
SNMPv1/v2c protocol.
WARNING If an equipment is configured to work in SNMPv3 and you need to change the site
(operation involving a change of IP address) before the change is necessary to restore the Fac-
tory Default.
Tab.2 displays, for every SNMP version, the security levels (noAuthNoPriv, AuthNoPriv, Auth-
Priv) supported by the equipment and the description of the provided security mechanisms.
See also
Groups (command)
Users (command)
Services Status Config (command)
FTP/SFTP protocol
FTP (File Transfer Protocol) and SFTP (SSH File Transfer Protocol) are two protocols for the file
transfer based on TCP.
Main difference between FTP and SFTP is the management of security.
The FTP protocol does not foresee the data encryption, while the SFTP protocol is based on SSH
protocol for the data encryption and the secure file transfer.
ALFOplus2
The equipment can be used for the file transfer (download/upload) the FTP protocol or the SFTP
protocol.
The use of the protocol FTP and/or SFTP can be enabled in any moment (see Enable/disable the
FTP and/or SFTP protocol).
If the operator enables the protocols FTP and SFTP at the same time, the system will automat-
ically use the most secure protocols (SFTP).
The utilization of a protocol during a WEB LCT session depends even on the enabling state of the
user, who has opened the session, in relation to the use of this protocol. The protocols enabled
for one user depend on the group associated to the user (see Group/User Management).
Example. If the user XY is associated to a group not enabled to the use of the protocol SFTP,
even if the protocol SFTP is enabled in the Ftp/Sftp context, the file transfer between PC and
equipment during a WEB LCT session opened by XY will take place via FTP. In the same way, if
the user XY is associated to a group not enabled to the use of the protocol SFTP, but the protocol
SFTP is not enabled in the context area Ftp/Sftp, the file transfer between PC and equipment
during a WEB LCT session opened by XY will take place via FTP.
As general rule, for the correct use of one protocol, it is necessary that the protocol is enabled
to the use and that the user who opens the WEB LCT session is associated to a group enabled
to the use of the same protocol.
When the equipment is switched-on for the first time after the restore of the Factory Default
setting the equipment uses the FTP protocol.
NMS5UX-B/NMS5LX
If the equipment is managed even by NMS5UX-B/NMS5LX supervision system, the management
of the protocol for the file transfer (FTP or SFTP) between NMS and equipment is defined at NMS
level.
To manage the FTP protocol, as tool auxiliary to WEB LCT application, it is necessary to install
and run one of the following programs:
• Web Lct Console version 1.2.0 or later.
When the program is started, the FTP server provided with the program itself is automat-
ically started.
The server does not perform any check on the credentials.
For the download operations, it is sufficient to enter the complete path where the file re-
sides.
At start-up of WLC, if a FTP Server is already active, the FTP server available with the
program is not started. This condition is signalled by a message.
• Standard FTP Server (e.g., free FTP Server FileZilla).
If you use your own FTP Server, it must be installed and configured if not already present
on the PC.
As help for the WEB LCT application in order to manage the protocol SFTP, it is necessary to
install and configure a SSH server (see Installation and configuration of SSH server).
See also
Groups (command)
Ftp/Sftp (command)
b. When asked Do you want to run FreeSSHd as a system service? press No.
2. Verify that, during the program installation, a service has not been installed in Windows.
c. Press Services.
d. Verify that the list does not contain the option FreeSSHDServices.
e. If present, select it, open the Properties window and set the parameter Startup type -> Manual.
c. Activate the Start SSH server on free SSHd startup box and press Apply.
e. Deactivate the Start Telnet server on free SSHd startup box and press Apply.
f. Select the Authentication tab and verify the setting of the following parameters:
• Password authentication -> Allowed.
• Public key authentication -> Allowed.
If the parameters are set in different way, set them as displayed and press Apply.
g. Select the Encryption box and verify the setting of the parameter:
• Allowed ciphers -> Any.
If the parameter is set in different way, set it as displayed and press Apply.
h. Select the Tunneling tab and verify the setting of the following parameters:
• Allow local port forwarding -> inactive box.
• Allow remote port forwarding -> inactive box.
If the parameters are set in different way, set them as displayed and press Apply.
i. Select the SFTP tab, in the SFTP home path set the path of the home directory for the file trans-
fer and press Apply.
The file path must be in C:\. It is suggested NOT to save the files in C:\, but to create a subfolder
in C and set it to save the files (for instance, C:\ftps or C:\backup).
This allows saving the backup files without being Administrator user (in some version of Win-
dows, in order to save the files in C:\, it is necessary to be Administrator user).
j. Select the Automatic updates tab and verify the setting of the following parameters:
• Check for new version on startup -> inactive box.
• Update without asking me for confirmation -> inactive box.
• Show info messages from freeSSHd.com -> inactive box.
If the parameters are set in different way, set them as displayed and press Apply.
k. Select the Logging tab, in the Log file box set the path/filename to save the log file and press
Apply.
l. Select the Host restrictions tab and verify the setting of the parameter:
• Refuse these IP addresses -> active box.
If the parameter is set in different way, set it as displayed and press Apply.
m. Select the Users tab, press Add and create the SFTP users setting the following characteristics
and press OK.
• Login -> User name
• Authorization -> Password stored as SHA1 hash.
WARNING It is suggested to create the users presents in the user list of the equipment because
the equipment uses, as default SFTP credentials, the same of the user used to access the WEB
LCT page.
WARNING After the configuration of SSH server, if the one or more parameters must be changed, to make
the change operative, restart the server selecting the Unload command present in the contextual menu of
the FreeSSHD Service application.
See also
FTP/SFTP protocol (info)
SSH protocol
SSH (Secure SHell) protocol allows implementing secure connections between two system, us-
ing a client/server architecture.
Documents defining the protocol can be found at http://www.ietf.org.
ALFOplus2
The equipment operate with SSH2 protocol.
By means of WEB LCT, the use of the protocol SSH can be enabled/disabled (see Enable/disable
the operating of a communication protocol).
For the correct use of the protocol SSH, it is necessary that the user, who opens the WEB LCT
session, is associated to a group enabled to the use of the protocol itself (see Group/User Man-
agement).
When the equipment is switched-on for the first time after the restore of the Factory Default
setting, the SSH protocol is disabled.
See also
Groups (command)
Services Status Config (command)
The Users command manages the users (WEB and SNMP) of the equipment.
Operations
Verify the user list
Add a user
Modify a user
Delete a user
GUI
Users context
See also
Groups (command)
Users management (info)
SNMP protocol (info)
Add a user
3. Into the User box, type the user name (alphanumeric string with a number of characters from 4 up to
31, the accepted and recognized characters are 0÷9, a÷z and A÷Z).
It is not possible to assign the same name to two different users present into the same list.
The parameter can not be changed later.
5. Into the New Password and Confirm New Password box, type the access code of the (alphanumeric
string with a number of characters from 4 up to 31, the accepted and recognized characters are 0÷9,
a÷z and A÷Z) and press OK.
The fields are Case Sensitive. Pay attention to uppercase and lowercase characters.
6. Set the group, to which you wish to associate the user, in the Group box.
The user will inherit the group characteristics: profile and use of the protocols HTTP, HTTPS, SNMP, FTP,
SFTP and SSH.
The parameter can not be changed later.
8. Only if the user you are creating belongs to a group for which the SNMP3 protocol has been set, execute
the following steps:
a. Set, in the Auth Protocol box, the authentication protocol (algorithm) associated to the user:
• None. No authentication algorithm.
• MD5. Authentication algorithm MD5 (Message Digest version 5) based on hash code.
• SHA. Authentication algorithm SHA-1 (Secure Hash Algorithm) with 96 bit digest
based on hash code (HMAC).
The parameter can not be changed later.
d. Set, in the Priv Protocol box, the cypher protocol (algorithm) associated to the user:
• None. No cypher algorithm.
• DES. 3DES (Triple Data Encryption Standard) block cypher algorithm based on the
repetition of DES algorithm for three times.
• AES. AES (Advanced Encryption Standard) cypher algorithm.
The parameter can not be changed later.
f. Set, in the New Password and Confirm New Password boxes, the cypher password associated to
the user (alphanumeric string of at least 4 characters and at most 31 characters. The characters
accepted and recognised are 0÷9, a÷z and A÷Z) and press OK.
The cypher password must be a string with a minimum length of 4 (SNMPv1/V2c) or 8 (SNMPv3)
characters and a maximum length of 31 characters. The accepted and recognised characters are
0÷9, a÷z and A÷Z). The fields are Case Sensitive. Pay attention to uppercase and lowercase
characters.
Modify a user
2. Select the user and press Modify User or double click on the user.
3. Execute the changing.
The setting modes of the parameters are the same ones above pointed out into the par. Add a user.
The parameter User, Group, Auth Protocol and Priv Protocol can NOT be changed. To change them, it
is necessary to delete the user and create him again with the wished characteristics.
The fields for the setting of the password are Case Sensitive; pay attention to uppercase and lowercase
characters.
WARNING The operation is not available if the selected user is the current user or the last user with Ad-
ministrator profile.
The context displays the user list (WEB and SNMP) currently stored in the equipment.
Table
Every row of the table corresponds to a user for which are indicated:
User. User name.
Group. Group which the user is associated to.
Profile. User profile:
• Administrator. The user with this profile can both verify the parameters and
send commands or change the equipment configuration with no exception.
• Read/Write. The user with this profile can as check the parameters as send
commands or execute changes to the equipment configuration except for the
following operations: modifying the user list, aligning the date/time of the
equipment, force the logout of a user and all those operations available only
to the Admin. user.
• Maintenance. The user with this profile can check the parameters and execute
only maintenance operations (MAN. OP) in the Manual Operations context and
Radio BER context.
• Read Only. The user with this profile can only check the parameters.
Auth. Authentication protocol (algorithm) associated to the user:
• None. No authentication algorithm.
• MD5. Authentication algorithm MD5 (Message Digest version 5) based on hash
code.
• SHA. Authentication algorithm SHA-1 (Secure Hash Algorithm) with 96 bit di-
gest based on hash code (HMAC).
Parameter meaningful only for users associated to a group with protocol SNMPv3 ena-
bled.
Priv. Cypher protocol (algorithm) associated to the user:
• None. No cypher algorithm.
• DES. 3DES (Triple Data Encryption Standard) block cypher algorithm based on
the repetition of DES algorithm for three times.
• AES. AES (Advanced Encryption Standard) cypher algorithm.
Parameter meaningful only for users associated to a group with protocol SNMPv3 ena-
bled.
Timeout. Timeout of WEB LCT session opened by the user:
• O. Session timeout disabled. WEB LCT session opened by the user (even if dis-
connected) will be kept for an infinity period of time.
• <number>. Session timeout enabled. WEB LCT session opened by the user, if
disconnected, will be automatically ended once reached the set time limit.
With disconnected session we mean a WEB LCT session whose relevant WEB LCT page
has been closed but for which the disconnection from the equipment has not been exe-
cuted (user logout).
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Help. Open the help on-line.
See also
Users (command)
Users management (info)
SNMP protocol (info)
Users list
The user list is a list of the users who can connect and require to login to the equipment by the
WEB LCT application (WEB user) or the NMS5UX-B/NMS5LX program (SNMP user).
If an user is not present in the list stored in the equipment controller, that user cannot connect
and/or login to the that equipment.
Users are subdivided into groups (for details, see successive paragraphs).
Before creating an user, it is necessary to create the group which the user must be associated
to. One group can contain more users, but one specific user can belong to only one group.
A maximum of 10 groups and 10 users can be created in the equipment user list.
At the first connection with the equipment or after a Factory Default operation, a default group
and a default user are available. Then, through WEB LCT application, new users and groups can
be created, modified and deleted.
The management of the user list can be performed even by NMS5UX-B/NMS5LX system (NMS
GUI).
Groups
The users belonging to the list are organized in groups for which it is possible to define a profile
and the enabling to the use of HTTP, HTTPS, SNMP, FTP, SFTP and SSH protocols.
The profile and the authorization of a group will be automatically assigned to the user who is
associated to that group.
The characteristics of a group are:
• Name of the group. The name of the group must be unique within an user list.
The name of the group, once assigned, cannot be changed.
• Profile which will be automatically assigned to the users associated to the group:
• Administrator. The user with this profile can both verify the parameters and send
commands or change the equipment configuration with no exception.
Moreover, every user belonging to a group with profile Administrator, besides be-
ing a WEB user, is even a CLI user because a user with profile Administrator is
automatically enabled by the system to access to the equipment even by the ap-
plication SM-OS (Siae Microelettronica - Operating System).
• Read/Write. The user with this profile can as check the parameters as send com-
mands or execute changes to the equipment configuration except for the following
operations: modifying the user list, aligning the date/time of the equipment, force
the logout of a user and all those operations available only to the Admin. user.
• Maintenance. The user with this profile can check the parameters and execute
only maintenance operations (MAN. OP) in the Manual Operations context and Ra-
dio BER context.
• Read Only. The user with this profile can only check the parameters.
• Protocols which will be available to the users assigned to the group:
• Protocol HTTP (HyperText Transfer Protocol), used to transfer hypertext pages on
the WEB.
• Protocol HTTPS (HyperText Transfer Protocol over SSL): variation of HTTP proto-
col and uses, besides TCP/IP protocol, SSL layer (Secure Sockets Layer) which im-
plements the encryption and the authentication of the transmitted data.
• Protocol SNMP (Simple Network Management Protocol), which allows monitoring
and controlling the network device. The user can activate the use of the first ver-
sion (SNMPv1), the second version (SNMPv2c) or the third version (SNMPv3) of
the protocol.
• Protocol FTP (File Transfer Protocol), for the file transfer based on TCP.
• Protocol SFTP (SSH File Transfer Protocol): protocol for the secure file transfer.
• Protocol SSH (Secure SHell Protocol): protocol for the secure and encrypted ac-
cess.
More options can be enabled at the same time.
Via WEB LCT page, the user can Verify the user groups and only one user with Administrator
profile can Add a user group, Modify a user group or Delete a user group.
Users
The users belonging to the list are organized in groups for which a profile and the enabling to
the use of the HTTP, HTTPS, SNMP, FTP, SFTP and SSH protocols can be defined.
The profile and the authorization of a group will be automatically assigned to the user who is
associated to that group.
The characteristics of an user are:
• Name/Password. Name and access password, which allow the program recognizing the
user as authorized.
The same user can open more WEB LCT page relevant to different equipment.
The name of an user must be unique within an user list.
The name of an user, once assigned, cannot be changed.
• Group which the user is associated to and from which the user inherits the profile and
the enabling to the use of HTTP, HTTPS, SNMP, FTP, SFTP and SSH protocols.
Every user belonging to a group with profile Administrator, besides being a WEB user, is
even a CLI user because a user with profile Administrator is automatically enabled by the
system to access to the equipment even by the application SM-OS SM-OS (Siae Micro-
elettronica - Operating System).
• Timeout of the WEB LCT session opened by the user. It is possible to:
• Disable the timeout: the WEB LCT session opened by the user (even if disconnect-
ed) will be preserved for an indefinite period of time.
• Enable the timeout: the WEB LCT session opened by the user, if disconnected, will
be automatically terminated once the set time period is reached.
With disconnected session we mean a WEB LCT session for which the relevant
WEB LCT page has been closed, but the disconnection from the equipment has not
been performed (user logout).
At the first connection with the equipment or after a Factory Default operation, the following
default users are available:
admin
User: admin
Password: admin
Group: Admin (default group - see characteristics in previous paragraph).
Profile: Administrator.
Auth: None.
Priv: None.
Timeout: 300 sec.
root
User: root
Password: admin123
Group: Root (default group - see characteristics in previous paragraph).
Profile: Administrator.
Auth: None.
WARNING At the first access, it is suggested to immediately change the password of the default
users in order to limit the risk of intrusion via these accounts.
The default users can be modified or deleted. The only condition is that there must be at least
one other user with Administrator profile in the user list.
Through WEB LCT page, the user can Verify the user list and, only an user with Administrator
profile, Add a user, Modify a user or Delete a user.
NMS5UX user
If the equipment is managed even by NMS5UX-B/NMS5LX supervision system (NMS GUI,
NMS5WI GUI), it is necessary to create the user used by the supervision system for the connec-
tion to the equipment: User: NMS5UX, Password: SIAEMICR.
This user must be associated to a group with profile Administrator and all the protocols enabled.
More information about the NMS5UX-B/NMS5LX supervision system is reported in the relevant
documentation.
See also
Groups (command)
Users (command)
Groups context
Users context
FTP/SFTP protocol (info)
The Permanent Login command manages the remote users who have the possibility to be connected to
the equipment (Permanent Login).
The remote user has the same characteristics of the NMS5UX user with the only exception that he does
not need for a login password.
A maximum of 2 remote users can be set.
Operations
Verify the IP address of Permanent Login
Set/modify the IP address of Permanent Login
GUI
Permanent Login context
See also
Users management (info)
The context displays the IP address of the remote users who have the possibility to be connected to the
equipment (Permanent Login).
Parameters
Manager IP Address 1. IP address of the machine relevant the first remote user.
Manager IP Address 2. IP address of the machine relevant the second remote user.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Permanent Login (command)
Set/modify the IP address of Permanent Login
Users management (info)
The Logged Users command manages the users connected to the equipment.
Operations
Verify the users connected to the equipment
Force the logout of a user
GUI
Logged Users context
See also
Users management (info)
The context displays the list of the users connected to the equipment when the command is selected.
Table
Every row of the table corresponds to a user for which are indicated:
User. User name.
The wording NMS5UX shows the user of the NMS5UX-B/NMS5LX supervisory system
(NMS GUI and NMS5WI GUI) or a remote user who has the possibility to be connected
to the equipment (Permanent Login).
Profile. User profile (see User Profile parameter)
Timeout. Timeout of the WEB LCT session:
• 0 s. Session timeout disabled. WEB LCT session opened by the user (even if
disconnected) will be kept for an infinity period of time.
• <number> s. Session timeout enabled. WEB LCT session opened by the user,
if disconnected, will be automatically ended once reached the set time limit.
With disconnected session we mean a WEB LCT session whose relevant page has been
closed but for which the disconnection from the equipment has not been executed (user
logout).
Login Type. User type:
• WEB. User of the WEB LCT application.
• SNMP. SNMP user or user of the NMS5UX-B/NMS5LX supervision system.
• CLI. User of SM-OS application, connected to the equipment via telnet or serial
line.
IP Address. Machine IP address.
With the wording machine, it is intended the PC/server/workstation on which the appli-
cation used by the user is actually running.
Parameter not meaningful for the user of SM-OS application, connected to the equipment
via serial line.
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Force Logout. Force the logout of a user
Help. Open the help on-line.
See also
Logged Users (command)
Users management (info)
The Services Status Config command manages the control list of IP accesses (ACL - Access Control List).
Operations
Verify the rules used by the ACL
Add a rule to ACL
Modify a rule of ACL
Remove a rule from ACL
GUI
Access Control List context
See also
ACL function (info)
3. Press Add.
4. Set, in Priority box, the priority used to analyse the rule (value between 1 and 255, where 255 is the
highest priority).
The same priority can be assigned to more rules.
5. Set, in Interface box, the management ports which the rule must be applied to, activating the relevant
check-box ( ):
• vlan.... management VLAN (see MNGT Port Configuration context).
6. Set, in IP Address box, the IP subnetwork or the single IP address which the rule refers to.
7. Set, in Mask, the netmask relevant to the IP subnetwork/IP address which the rule refers to.
The mask format must be expressed in bits (value between 0 and 32) and not in dotted decimal nota-
tion.
8. In the Filter Action box, set the usage condition of the rule:
• drop. The IP subnetwork/IP address is not allowed accessing the equipment.
• allow. The IP subnetwork/IP address is allowed accessing the equipment.
2. In order to modify the priority used to analyse the rule, select the relevant Priority box and set a value
between 1 and 255, where 255 is the highest priority.
The same priority can be assigned to more rules.
3. In order to change the management port which the rules must be applied to, select the relevant Inter-
face box and activate or deactivate the check-box:
• vlan.... Management VLAN (see MNGT Port Configuration context).
The active check-box ( ) indicates that the rule is applied to the port; the inactive check-box indicates
that the rule is not applied to the port.
4. In order to change the IP subnetwork or the single IP address, select the relevant IP Address box and
set the new value.
5. In order to change the netmask relevant to IP subnetwork/IP address which the rules refers to, select
the relevant Mask box and set the new value.
The mask format must be expressed in bits (value between 0 and 32) and not in dotted decimal nota-
tion.
6. In order to change the usage conditions of the rule, select the relevant Filter Action box and set the
value:
• drop. The IP subnetwork/IP address is not allowed accessing the equipment.
• allow. The IP subnetwork/IP address is allowed accessing the equipment.
7. Press Apply and confirm.
The rule is changed.
2. Select the row relevant to the rule you wish to delete from the list.
Multiple selections can be executed using the Ctrl or Shift keys.
The context shows the IP Access Control List (ACL) of the equipment.
Table
The table lists the rules used by the equipment for the control of the IP accesses for the man-
agement ports.
Each row identifies a rule:
Index. Value identifying univocally the rule within the ACL table.
Priority. Rule priority: 1 ÷ 255 (1 is the lowest priority, 255 the highest).
For the packet analysis, the rule with highest priority is used.
Interfaces. Management port which the rule must be applied to:
• vlan.... Management VLAN (see MNGT Port Configuration context).
The active box ( ) indicates that the rule is applied to the port; the inactive box indi-
cates that the rule is not applied to the port.
IP Address. IP subnetwork or single IP network which the rule refers to.
Mask. Netmask relevant to the IP subnetwork or to the IP address which the rule refers
to.
The mask format is expressed in bits (value between 0 and 32).
Filter Action. Usage conditions of the rule:
• allow. The IP subnetwork/address is allowed accessing the equipment.
• drop. The IP subnetwork/address is not allowed accessing the equipment.
Selecting the heading of the Index column, the rows of the table are sorted in increasing alpha-
numeric order with respect to the considered column and an arrow is displayed with the tip di-
rected upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
Buttons
Apply. Confirm the changes.
Refresh. Updates the context.
Help. Opens the help on-line.
Add. Add a rule to ACL.
Remove. Remove a rule from ACL.
See also
Access Control List (command)
ACL function (info)
Modify a rule of ACL
ACL function
ACL (Access Control List) functionality is a mechanism which allows/blocks new connections to
the equipment in selective mode on the basis of the source IP address (SRC).
The functionality applies to all the management interfaces (MNGT).
This mechanism consists in a list of rules (Access Control Entry) which determine if an IP sub-
network or a single IP address is allowed accessing to the selecting equipment.
Every rule is composed by a descriptive part and a decision-making part.
The descriptive part of the rule is represented by the IP address (or by a set of IP addresses)
source of the packet, by the MNGT ports where the packet enters and by the priority used to
analyse the rule.
The decision-making part is the action to execute: making the packet passes or refusing it.
ALFOplus2
In ALFOplus2 equipment, the rules present in the IP access control list must be defined by the
operator via WEB LCT, CLI or WEB NMS.
When the rule is created, it is immediately inserted in ACL and becomes immediately active.
In ALFOplus2 equipment, when a packet is analysed, the considered conditions are the follow-
ing:
• The rules, once activated, are immediately applied to all the packets (UDP and TCP) ex-
cept for those relevant to TCP connections already open and, for these ones, only to the
closing of the connection.
• The ACL rules apply to the new requests of connection; the existing connections are not
analysed.
• The rules are analysed according to the priority, starting from the highest value. The first
compatible rule is executed, after which no other rule will be checked/executed.
• All the packets not associated to any rule will be correctly forwarded to the higher layers.
The Services Status Config command manages the equipment communication protocols (services used
by the management program to access to the equipment).
Operations
Verify the operating of the communication protocols
Enable/disable the operating of a communication protocol
GUI
Services Status Config context
See also
HTTP/HTTPS protocol (info)
SNMP protocol (info)
FTP/SFTP protocol (info)
SSH protocol (info)
2. To modify a parameter, select the new value in correspondence of the wished protocol.
The operator is advised against the contemporary disabling of the protocols HTTP and HTTPS, because
the connection with the equipment WEB LCT would be lost.
The protocol HTTPS can be enabled if:
• there is, in the user list, at least one user enabled to use it.
• the relevant SSL certificate is present in the equipment (see HTTP/HTTPS protocol (info).
The user can disable the protocol SNMPv1/v2c or SNMPv3, respecting the following rules:
• The two protocols cannot be disabled at the same time.
• If only one of the two protocols is enabled, it cannot be disabled if the other protocol is not con-
textually enabled.
Table
Every table row corresponds to a protocol for which are indicated:
Service Name. Name of the protocol (service):
• SNMPv1v2c. SNMP (Simple Network Management Protocol) protocol first and
second version: protocol which allows monitoring and controlling the network
devices.
• SNMPv3. SNMP protocol third version.
• Telnet. TCP-based Client-server network protocol which provides the user with
sessions of remote login.
• SSH. SSH (Secure SHell) protocol: protocol for the secure and encrypted ac-
cess.
• HTTP. HTTP (HyperText Transfer Protocol) protocol: protocol used to transfer
hypertext pages on the WEB.
• HTTPS. HTTPS (HyperText Transfer Protocol over SSL) protocol: variation of
HTTP and uses, besides TCP/IP protocol, SSL layer (Secure Sockets Layer)
which implements the encryption and the authentication of the transmitted
data.
Admin Status. Administrative state (enabling) of the protocol:
• Enable. The protocol is enabled.
• Disable. The protocol is disabled.
Operative Status. Operating status of the protocol:
• Running. The protocol is operating.
• Stopped. The protocol is not operating (disabling of the protocol or malfunc-
tion).
Selecting the heading of a column, the rows of the table are sorted in increasing alphanumeric
order with respect to the considered column and an arrow is displayed with the tip directed up-
wards. The next selection sorts the rows in decreasing order (an arrow is displayed with the tip
directed downwards) and so on.
Buttons
Apply. Not available in this context.
Refresh. Updates the context.
Help. Opens the help on-line.
See also
Services Status Config (command)
Enable/disable the operating of a communication protocol
HTTP/HTTPS protocol (info)
SNMP protocol (info)
FTP/SFTP protocol (info)
SSH protocol (info)
The command SSL/HTTP Secure manages the configuration of the protocol SSL and the SSL certificate
(generation of CSR and loading of the certificate in the equipment).
Operations
Verify the configuration of the SSL protocol
Modify the list of CipherSuite managed by the equipment
Generate the Certificate Signing Request for an equipment
Download the SSL certificate in an equipment
GUI
SSL/HTTP Secure context
See also
HTTP/HTTPS protocol (info)
4. In order to make the change effective, it is necessary to disable and re-enable the protocol HTTPS:
b. In the Admin State box of the HTTPS option, select the Disable value.
WARNING This operation is included in the procedure for the implementation of the protocol HTTP for
equipment. Before executing it, read How to implement the protocol HTTPS - ALFOplus2 in HTTP/HTTPS
protocol (info).
3. Set, in the box RSA Key Size, the length of RSA key: 512 or 1024.
4. Set, in the box Common Name, the IP address of the equipment for which you wish to use the certifi-
cate.
With IP address we mean the address entered in the URL of the browser to open the page WEB LCT.
5. Press Generate.
The text area displays the CSR. Moreover, the key associated to the certificate request is communicated
to the equipment.
6. Select and copy the content of the area into a text file.
The file shall be sent to the Certificate Authority to obtain the relevant SSL certificate.
WARNING Operation available only if you have the file of to the SSL certificate relevant to the equipment
you are connected to.
The certificate license is valid for only one piece of equipment, because SSL certificates are specific with
respect to the Common Name for which they are required and released.
For the equipment ALFOplus2, the Common Name of the certificate must correspond to the IP address of
the equipment for which you wish to use the certificate.
This operation is included in the procedure for the implementation of the protocol HTTP for equipment. Be-
fore executing it, read How to implement the protocol HTTPS - ALFOplus2 in HTTP/HTTPS protocol (info).
3. Open, in a text editor, the file relevant to the SSL certificate obtained by the Certificate Authority rel-
evant to the equipment you are connected to and copy it.
4. Paste the SSL certificate to the text area of the window Enter Certificate Signed By Certification Author-
ity.
5. Press Send.
The new certificate is now in use.
The message Invalid certificate indicates that the operation has not been executed because the certi-
fication is corrupted or because the key present on the equipment does not match that of the certificate.
The context shows the configuration of SSL protocol and allows managing the SSL certificate (generation
of CSR and loading of the certificate in the equipment).
Parameters
HTTP SECURE CIPHERSUITE
SSL Version. Version of the protocol in use:
• TLS-1. Protocol Transport Layer Security version 1.
Read only parameter.
List of CipherSuite managed by the equipment:
• RSA-3DES-SHA. Algorithm for the key exchange: RSA. Algorithm of data en-
cryption: 3DES. Algorithm for the Message Authentication Code: SHA.
• RSA-WITH-AES-128-CBC-SHA. Algorithm for the key exchange: RSA. Algo-
rithm of data encryption: AES-128-CBC. Algorithm for the Message Authenti-
cation Code: SHA
• RSA-WITH-AES-256-CBC-SHA. Algorithm for the key exchange: RSA. Algo-
rithm of data encryption: AES-256-CBC. Algorithm for the Message Authenti-
cation Code: SHA.
The active box ( ) means that the CipherSuite is in use, the inactive box means that it
is not used.
Buttons
Apply. Confirm the changes.
Refresh. Updates the context.
Help. Opens the help on-line.
See also
SSL/HTTP Secure (command)
HTTP/HTTPS protocol (info)
Modify the list of CipherSuite managed by the equipment
WARNING Command available only if the Radio payload encryptions feature is enabled (see Equipment
Features tab).
Moreover, the command is available only if the current WEB LCT session has been opened using the HTTPS
protocol and the user who has opened the session has the following security protocols enabled: HTTPS and
SNMPv3 with authentication password.
Operations
Verify the status and configuration of Radio Encryption function
Modify the allocation of memory for Radio Encryption function
Modify the enabling of Radio Encryption function
Modify the data encryption algorithm
Modify the encryption key
GUI
Radio Encryption context
See also
Radio Encryption (info)
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
3. In the New Key box, set an alphanumeric string between 1 and 16 (with algorithm AES 128 set) or 32
(with algorithm AES 256 set) characters.
4. Press OK.
WARNING Context available only if the Radio payload encryptions feature is enabled (see Equipment Fea-
tures tab).
Moreover, the context is available only if the current WEB LCT session has been opened using the HTTPS
protocol and the user who has opened the session has the following security protocols enabled: HTTPS and
SNMPv3 with authentication password.
The context shows the status and configuration of Radio Encryption function.
Parameters
System Control. Enabling state of the Radio Encryption function:
• Start. The system activates the Radio Encryption function: the necessary memory is al-
located for the function.
• Shutdown. The system stops the Radio Encryption function: the allocated memory is de-
allocated and made available for other activities.
Default Shutdown.
Mismatch Alarm. Radio Encryption Mismatch Alarm status. The color of the box represents the
alarm status and severity:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the Critical,
Major, Minor, Warning severity.
• Green. Alarm activated coupled with the Status severity level.
• Grey. Alarm deactivated.
Parameter available only if the parameter System Control has value Start.
Buttons
Apply. Confirm the changes.
Refresh. Updates the context.
Help. Opens the help on-line.
See also
Radio Encryption (command)
Radio Encryption (info)
Modify the allocation of memory for Radio Encryption function
Modify the enabling of Radio Encryption function
Modify the data encryption algorithm
ALFOplus2
The ALFOplus2 equipment can be configured to operate with the Radio Encryption function ac-
tive or inactive.
When the function is active, the data encryption is based on the encryption algorithm AES128
or AES 256 (CTR mode).
When the function is inactive, no encryption algorithm is used on the flow of Ethernet data within
the system.
See also
Radio Encryption (command)
Radio Encryption context
The command Ftp/Sftp manages the FTP and SFTP protocols on the equipment.
Operations
Verify the operating status of the FTP and SFTP protocols
Enable/disable the FTP and/or SFTP protocol
Modify the FTP access credentials
Modify the SFTP access credentials
GUI
Ftp/Sftp context
See also
FTP/SFTP protocol (info)
SSH protocol (info)
WARNING If the operator enables the protocols FTP and SFTP at the same time, the system will automat-
ically use the most secure protocols (SFTP).
WARNING Operation meaningful only if the management of FTP protocol is active and the equipment op-
erates as SSH Client.
The default FTP credentials are: user Anonymous, no password.
The change of FTP credentials is valid only for the current WEB LCT session. When the WEB LCT page is
re-opened, the default credentials are used.
3. Type, in the box User, the new user name (alphanumeric string with minimum 1 and maximum 31 char-
acters).
4. Type, in the box Password, the new access code (alphanumeric string with minimum 1 and maximum
31 characters).
WARNING Operation meaningful only if the management of SFTP protocol is active and the equipment op-
erates as SSH Client.
The default SFTP credentials are the same used by user to access to WEB LCT page.
The change of SFTP credentials is valid only for the current WEB LCT session. When the WEB LCT page is
re-opened, the default credentials are used.
3. Type, in the box User, the new user name (alphanumeric string with minimum 1 and maximum 31 char-
acters).
4. Type, in the box Password, the new access code (alphanumeric string with minimum 1 and maximum
31 characters).
The context displays the operating status of the FTP and SFTP protocols.
Parameters
FTP
Service Status. Operative status of the FTP protocol:
• Enable. The protocol is enabled.
• Disable. The protocol is disabled.
SFTP
Service Status. Operative status of the SFTP protocol:
• Enable. The protocol is enabled.
• Disable. The protocol is disabled.
Buttons
Apply. Not available in this context.
Refresh. Updates the context.
Help. Opens the help on-line.
FTP
Reset Credentials. Modify the FTP access credentials
SFTP
Reset Credentials. Modify the SFTP access credentials
See also
Ftp/Sftp (command)
FTP/SFTP protocol (info)
SSH protocol (info)
Enable/disable the FTP and/or SFTP protocol
The command Radio Configurator displays the radio configuration present on the equipment.
Operations
Verify the Radio Link configuration
Create a Radio Link
Modify a Radio Link
Delete a Radio Link
GUI
Radio Configurator context
See also
Radio Link (info)
WARNING Operation not available if all the Radio ports have been already used for other Links.
If you wish to configure the equipment with two Radio Links connected to the same site - 2x(1+0) - you
have to create two different Radio Links in configuration 1+0.
4. Set, in the Link Name box, the name of the Link (alphanumeric string with minimum 1 and maximum
32 characters).
By default, the name Link <progressive number> is suggested.
5. In the table Available Radio, select the wished TRX’s according to the set type of Radio Link. In detail,
for the Radio Link in configuration:
• 1+0, select TRX A or TRX B.
• 2+0 XPIC, select TRX A and TRX B.
Press <Prev to come back to previous step.
6. Press:
• Next, to set the radio parameters of the Link.
• Done, to create the Radio Link (to set the radio parameters see BW & Mod./Link ID and Radio
Branch).
10.Press:
• Next, to set the duplex frequency of the Link.
• Done, to create the Radio Link.
If at least one parameter has not been properly set, the button Done and Next are not available.
The message This feature is not enabled indicates that the feature Upgrade up to... specific for the set
band/modulation is disabled (see Equipment Features tab).
11.If selected the button:
• Next, continue the procedure.
• Done, the Radio Link is created and displayed in the table Current Radio Configuration.
12.Set, in the Duplex Frequency Selection table, the duplex frequency (MHz) for the available Radio.
In detail, if the box displays the wording:
• Select Duplex, the parameter can be set.
The displayed value is always positive, independently from the position of the transmission fre-
quency with respect to the receiving frequency.
• Not Available, the parameter is not available.
• HW Failure, the parameter cannot be set due to hardware failure.
Press <Prev to come back to previous step.
13.Press Done.
The Radio Link is created and displayed in the table Current Radio Configuration.
If at least one parameter has not been properly set, the button Done is not available.
3. Set, in the Current Link box the Radio Link you want to modify.
4. Set, in the New Link Type box, the new type of the Radio Link.
Depending on the configuration of the Radio Link selected in the previous step, different values will be
available as indicated here below.
The wording No Configurations means that the Radio Link type cannot be changed.
5. In the table Available Radio, select the wished TRX’s depending on the new type of Radio Link:
• 1+0, select TRX A or TRX B.
6. Press:
• Next, to set the radio parameters of the Link.
• Done, to complete the modification of the Radio Link (to set the radio parameters see BW &
Mod./Link ID and Radio Branch).
If at least one parameter has not been properly set, the button Done and Next are not available.
The message This feature is not enabled indicates that the XPIC feature is disabled (see Equipment
Features tab).
10.Press:
• Next, to set the duplex frequency of the Link.
• Done, to create the Radio Link.
If at least one parameter has not been properly set, the button Done and Next are not available.
The message This feature is not enabled indicates that the feature Upgrade up to... specific for the set
band/modulation is disabled (see Equipment Features tab).
11.If selected the button:
• Next, continue the procedure.
• Done, the Radio Link is changed and displayed in the table Current Radio Configuration.
12.Set, in the Duplex Frequency Selection table, the duplex frequency (MHz) for the available Radio.
In detail, if the box displays the wording:
• Select Duplex, the parameter can be set.
The displayed value is always positive, independently from the position of the transmission fre-
quency with respect to the receiving frequency.
• Not Available, the parameter is not available.
• HW Failure, the parameter cannot be set due to hardware failure.
Press <Prev to come back to previous step.
13.Press Done.
The Radio Link is changed and displayed in the table Current Radio Configuration.
If at least one parameter has not been properly set, the button Done is not available.
4. Press Done.
The Radio Link is removed from the table Current Radio Configuration.
Parameters
CURRENT RADIO CONFIGURATION
Link#. Number of the Radio Link.
Link Name. Name of the Radio Link.
Link Type. Type of the Radio Link:
• 1+0. Radio Link in unprotected configuration.
• 2+0 XPIC. Radio Link realized by two isofrequential transceivers which trans-
mit on orthogonal polarization at the same time.
Radio. Transceivers on the equipment: TRX A, TRX B.
Radio Ports. Radio port which every single transceiver is connected to.
Select Operation. Operations for the management of the Radio Links:
Create New Link. Create a Radio Link
Modify a Link. Modify a Radio Link
Delete a Link. Delete a Radio Link
An option in grey is not available in the specific context.
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Help. Open the help on-line.
Prev. During an operation, it allows going back to the previous step.
Next. During an operation, it allows going to the next step.
Done. Confirm the changes.
See also
Radio Configurator (command)
Radio Link (info)
1+0
The Radio Link in configuration 1+0 uses a single transceiver.
In this configuration, the radio offers no protection against the hardware failures.
2x(1+0)
The equipment in radio configuration 2x(1+0) uses two transceivers connected to the same site.
In this configuration, two different Radio Links in configuration 1+0 have to be defined, which
use two different frequencies.
The two Radio Links are automatically aggregated by system in such a way to create a single
Bundle routed into the same direction.
The radio parameters can be independent.
2+0 XPIC
The Radio Link in configuration 2+0 XPIC uses two transceivers which transmit on two polariza-
tions of one antenna using the same frequency (functionality XPIC - Cross Polarization Interfer-
ence Cancellation).
In this configuration, one Radio Link in configuration 2+0 XPIC.
The two transceivers are aggregated in such a way to create a single Bundle routed into the
same direction.
The creation of the Radio Link must be executed by the operator via WEB LCT (see Create a
Radio Link). Once created, a Radio Link can be changed or deleted (see Modify a Radio Link and
Delete a Radio Link).
See also
Radio Configurator (command)
Radio Configurator context
WARNING Command available only with at least one Radio Link defined.
For the correct operation of the Radio Link, it is necessary that all the parameters of the considered context
have the same values both on the local and on the remote equipment.
The parameter setting can be performed according to logical groups. For instance, you can change the pa-
rameters of the Bandwidth & Modulation area and confirm, but you cannot change one parameter of the
Bandwidth & Modulation area and one parameter of the ACM Engine Configuration area and confirm. The
system allows changing the parameter of the Bandwidth & Modulation area and confirm; only later you can
change the parameter of the ACM Engine Configuration area and confirm.
For the equipment with Radio Link in 1+0 or 2+0 XPIC configuration is present the BW & Mod./Link ID
command. For the equipment in 2x(1+0) radio configuration there are more BW & Mod./Link ID <Radio
Link name> commands, one per every single Radio Link.
The BW & Mod./Link ID command manages the parameters relevant to modulation/capacity, adaptive
modulation and Link identification number.
Operations
Verify the reference band/modulation, the operating status and the configuration parameters of
the adaptive modulation
Modify the reference band
Modify the reference modulation
Modify the operating status of the adaptive modulation
Modify the lower threshold and the upper threshold of the modulation (ACM enabled)
Verify/modify the Link identification number
GUI
BW & Mod./Link ID context
Verify the reference band/modulation, the operating status and the configuration
parameters of the adaptive modulation
Modify the lower threshold and the upper threshold of the modulation (ACM enabled)
2. To change the parameters Upper Profile and Lower Profile, select the value relevant to the wished mod-
ulation.
3. To change the parameter, type the new value in the box (value between 1 and 255).
Set the value 0 to not use the Link identifier.
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 or 2+0 XPIC configuration, the BW & Mod./Link ID command
is available which opens the BW & Mod./Link ID context. For the equipment in 2x(1+0) radio configuration
there are more BW & Mod./Link ID <Radio Link name> commands. Every command opens a context
area BW & Mod./Link ID <Radio Link name> containing the parameters relevant to the specific Radio Link.
The context displays the parameters relevant to modulation/capacity, adaptive modulation and Link iden-
tification number.
Tabs
Modulation & Capacity tab. Reference band/modulation, operating status and configuration of
the adaptive modulation.
Local Link ID tab. Link identification number.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
BW & Mod./Link ID (command)
The tab displays the reference band/modulation, the operating status and the configuration parameters of
the adaptive modulation.
Parameters
BANDWIDTH & MODULATION
Bandwidth. Radio channelling.
Reference Modulation. Modulation.
The modulation 4096QAM is not available for 14MHz and 20MHz channels.
Table
The ACM Table shows, for each ACM level, the capacity used by Ethernet tributaries. Depending
on the operating status of the adaptive modulation, one or more profile will be available. If the
adaptive modulation is:
• Disabled. The table contains only the ACM profile relevant to the reference modulation
(Bandwidth & Modulation).
• Enabled. The table contains all the ACM profiles. Among these, the profile included
between the minimum and the maximum modulation are available.
For each ACM profile is pointed out:
Active Modulation. Availability modulations.
Ethernet Capacity. Capacity used by the Ethernet tributaries.
See also
Modify the reference band
Modify the reference modulation
Modify the operating status of the adaptive modulation
Modify the lower threshold and the upper threshold of the modulation (ACM enabled)
Parameters
Local Link ID. Link identification number.
Set the value 0 to not use the Link identifier.
See also
Verify/modify the Link identification number
WARNING Command available only for equipment with at least one Radio Link defined.
For the equipment with a single Radio Link, the General Preset command is present. For the equipment
with more Radio Links, there are more General Preset <Radio Link name> commands, one for every
single Radio Link.
The General Preset command manages the modem and radio parameters.
Operations
Verify/modify the threshold level of the signal at reception
Verify/modify the radio Link label
GUI
General Preset context
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with a single Radio Link, the General Preset command is present, which opens the
General Preset context. For the equipment with more Radio Links, there are more General Preset <Radio
Link name> commands. Every command opens the General Preset <Radio link name> context containing
the parameters relevant to the specific Radio Link.
Parameters
POWER THRESHOLD
Rx Signal Level Alarm Threshold: <current value> dBm. Threshold of the signal at
reception.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
General Preset (command)
Verify/modify the threshold level of the signal at reception
Verify/modify the radio Link label
WARNING Command available only with Radio Link in 2+0 XPIC configuration.
Operations
Verify the configuration parameters of the XPIC function
Disable temporarily the function XPIC for a single transceiver
Restore the XPIC function of the single transceiver
Enable/disable XPIC fault management procedure (FMP)
Restore the function XPIC after a fault detection
GUI
Xpic context
See also
XPIC function (info)
3. Press Apply.
A message warns that you are executing a forcing and shows the current setting of timeout.
2. To ENABLE the fault management procedure (FMP), select the Enable value (Status parameter).
To DISABLE the procedure, select the Disable value (Status parameter).
WARNING Context available only for equipment with Radio Link in 2+0 XPIC configuration.
Parameters
XPIC
TRX A. Activation of XPIC function for transceiver A:
• Enable. Function active.
• Disable. Function temporarily deactivated (manual operation).
TRX B. Activation of XPIC function for transceiver B:
• Enable. Function active.
• Disable. Function temporarily deactivated (manual operation).
FAULT MANAGEMENT PROCEDURE
Status. Status of XPIC fault management procedure (FMP):
• Disable. FMP procedure is inactive.
• Enable. FMP procedure is active.
When XPIC fault management procedure is active, the detection of a fault on a transceiv-
er and the consequent action automatically executed by FMP procedure to save the other
transceiver are pointed out by the faults present in the Fault Management Procedure ar-
ea. If a box becomes red, orange, yellow, light blue or green (depending on the severity
of the relevant to the relevant alarm), the box:
TRX A FMP: Tx Off Under Remote End Request, indicates that, after the de-
tection of a fault on one of the transceivers belonging to Link A, the FMP procedure
has switched off the TRX A from the local terminal.
TRX A FMP: Xpic Disable, indicates that, after the detection of a fault on one of
the transceivers belonging to Link A, the FMP procedure has forced the disabling
of the XPIC function of the TRX A from the local terminal.
TRX B FMP: Tx Off Under Remote End Request, indicates that, after the de-
tection of a fault on one of the transceivers belonging to Link B, the FMP procedure
has switched off the TRX B from the local terminal.
TRX B FMP: Xpic Disable, indicates that, after the detection of a fault on one of
the transceivers belonging to Link B, the FMP procedure has forced the disabling
of the XPIC function of the TRX B from the local terminal.
When the box is grey, this means that the specific fault has not been detected.
XPD
TRX A. Value of Cross Polar Discrimination (XPD) of the transceiver A.
XPIC systems use two different polarizations to transmit two independent signals: H
(Horizontal) and V (Vertical), by means of double input antenna or of the OMT (Ortho
Mode Transducer) module embedded in the ALFOplus2 unit.
Depending on the antenna aiming, a residual of the signal H can reach the polarization
V and vice versa. The power ratio between the useful signal and the residual signal of the
other polarization is the XPD value.
This value is useful to perform the proper aiming of the antenna by means of the rotation
of the OMT module (inside the radio or the antenna) on the pole support.
TRX B. Value of Cross Polar Discrimination of the transceiver B.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
XPIC function
The function XPIC (Crosspolar Interference Canceller) is a modem functionality which allows us-
ing the double polarization (vertical and horizontal) in the transmission system.
In this way, exploiting two polarizations, the transmission capacity of the Radio Link can be dou-
ble using a single frequency.
WEB LCT
In relation to XPIC function, through GUI it is possible:
• To disable temporarily the function XPIC for every single TRX (Disable temporarily the
function XPIC for a single transceiver) and then to re-enable it (Restore the XPIC
function of the single transceiver).
Disabling the function XPIC is a manual operation (MAN. OP). Remember that, if the
timeout of the manual operations is inactive, the function XPIC remains disabled until
when it is restored by the user.
• To enable and disable XPIC fault management procedure (FMP) (see Enable/disable
XPIC fault management procedure (FMP).
In case of detection and signalling of a fault, the function XPIC can be restored (see
Restore the function XPIC after a fault detection).
FMP procedure
Purpose of the FMP (Fault Management Procedure) procedure is to identify a malfunction caused
by equipment faults and by equipment faults and to preserve the horizontal or vertical branch
where there are not problems
The procedure differentiates the alarms due to external causes (e.g., fading) from those due to
equipment faults.
The activation of the FMP procedure involves the switch-off of a transmitter and the disabling of
the Xpic inputs.
The condition is permanent and only an operator by means of WEB LCT or WEB NMS
can restore the normal operating condition.
See also
Xpic (command)
Xpic context
Ethernet. It manages the Ethernet Switch configuration: port physical Layer, layer 2 forwarding, VLAN
settings, LLF, Link Aggregation, STP/RSTP, interface statistics.
DCN. It manages the configuration of equipment management parameters: IP addressing and Routing
Table.
Bridge Mode Conf.. It manages the Bridge mode (according to IEEE 802.1ad) of the Ethernet Switch.
Port Manager. It manages the ports configuration of the Switch.
VLAN. It manages the virtual LAN (VLAN) configuration.
Prov. Bridge-VLAN. It manages the parameters relevant to VLAN’s when the Switch is in Provider Edge
Bridge modality.
Prov. Bridge-EtherType. It manages the EtherType values in the S-Tag field of the Ethernet ports.
Header Compression. It manages the compression of the headers of the Ethernet packets of streams
on the ports of a Radio Link.
RSTP. It manages the Spanning Tree Protocol.
LLF. It configures the operation of LLF functionality for the equipment.
Queue Depth. It manages the depth of the output queues.
LA Manager. It manages the Link Aggregation module.
Statistics. It displays the trend of the traffic on the Ethernet ports displaying the counters of packets/
bytes in input/output. The counters are based on the standard RFC 1213 (Interfaces group) and RFC
1284 (Ethernet-like Statistics group).
The Bridge Mode Conf. command manages the Bridge mode (according to IEEE 802.1ad) of the Ethernet
Switch.
Operations
Verify the Bridge mode of the Ethernet Switch
Modify the Bridge mode of the Ethernet Switch
GUI
Bridge Mode Conf. context
WARNING The operation involves the equipment restart. When the equipment restarts, the Ethernet Switch
shall be reconfigured.
Before performing the operation, it is necessary to disable the Spanning Tree protocol, if in use (see RSTP).
The context displays the Bridge mode (according to IEEE 802.1ad) of the Ethernet Switch.
Parameters
Bridge Mode. Operating modality of the Ethernet Switch:
• Customer Bridge. The Switch is in Customer Bridge mode.
In this mode, the Switch operates as a Bridge 802.1Q VLAN. The port of type Cus-
tomer Bridge is supported.
• Provider Bridge (802.1ad). The Switch is in Provider Bridge mode.
In this mode, the Switch operates as a Bridge Q-in-Q (system composed by a single
S-VLAN component, actuated in compliance with clause 5 of IEEE Standard 802.1Q).
The ports of type Provider Network and Provider Network (Proprietary) are supported.
• Provider Edge Bridge. The Switch is in Provider Edge Bridge mode.
In this mode, the Switch operates as Provider Edge Bridge 802.1ad with a S-VLAN
component and, at least, one C-VLAN component. The ports of type Provider Net-
work, Provider Network (Proprietary), Customer Network and Customer Edge are
supported.
In Provider Bridge and Provider Edge Bridge modalities, the Ethernet Service model is used to
describe the traffic packets according to the requirements of Metro Ethernet Forum (MEF 10.2
and MEF 6.1).
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Bridge Mode Conf. (command)
Modify the Bridge mode of the Ethernet Switch
The Port Manager command manages the configuration of the Switch ports.
Operations
Verify the Ethernet ports configuration
Modify the enabling status of a port
Activate the loop on line side of a port
Deactivate the loop on line side of a port
Modify the activation state of the autonegotiation for a port
Restart the auto negotiation procedure for a port
Modify the transmission speed of a port
Modify the inversion status of the Tx and Rx lines of a port
Modify the maximum dimension of the packet accepted by a ports
Modify the Bridge Port Type for a port
Verify the optical module configuration of the Ethernet ports
Verify the flow control configuration of the Ethernet ports
Verify/modify the traffic class which a packet, in input from a port, is assigned to, depending on
its priority (User Priority)
Verify the status of the ports as regards the Link Aggregation function
Verify the parameters for the Tunneling management
GUI
Port Manager context
2. Set the Loopback value in the Admin State box relevant the wished port.
3. Press Apply.
A message warns that you are executing a forcing and shows the current setting of timeout.
2. Set the Enabled or Disabled value in the Admin State box relevant the wished port.
WARNING Operation meaningful only for the line ports of the Switch.
Remember that a peer-to-peer connection works correctly if the two peers have set the same modality for
the autonegotiation management.
The port with optical interface can negotiate only the transmission speed of 1Gb. If the user activates the
autonegotiation for an optical port with speed of 2.5Gb, the system automatically will re-configure the port
transmission speed to 1Gb.
2. In the Auto Neg. box relevant the wished port, set the box:
• Active ( ). The autonegotiation is enabled. The port negotiates the transmission speed with the
peer at the other end of the Link, in order to find the optimal mutual connectivity. In autonego-
tiation, the Full Duplex without flow control is proposed by default.
The port with optical interface can negotiate only the transmission speed 1Gb.
• Inactive ( ). The autonegotiation is disabled. The port uses the transmission speed configured
in the Speed box (see Modify the transmission speed of a port), the flow control configured in
the Data Flow tab, while the operation modality is Full Duplex.
2. In the Auto Neg. box relevant the wished port, press Restart and confirm.
2. In the Speed box relevant the wished port, select the wished option.
If selected a port with electrical interface, the following values are available:
• 100 Mbps. The data transmission speed through the port is 100 Mbit/s.
• 10 Mbps. The data transmission speed through the port is 10 Mbit/s.
• 1 Gbps. The data transmission speed through the port is 1 Gbit/s.
If selected a port with optical interface, the following values are available:
• 1 Gbps. The data transmission speed through the port is 1 Gbit/s.
• 2.5 Gbps. The data transmission speed through the port is 2.5 Gbit/s.
Operation available only if the SFP optical module supports both the options.
WARNING Operation available only for line ports with electrical interface and disabled (Admin State - Dis-
abled).
2. In the MDI/MDIX box relevant the wished port, select the option:
• MDI. The inversion of the Tx and Rx lines is not active (Network Interface Card modality).
• MDIX. The inversion of the Tx and Rx lines is active (Switch modality).
• Auto. The inversion of the Tx and Rx lines is active in automatic modality.
3. Press Apply and confirm.
WARNING Operation available only for the disabled ports (Admin State - Disabled) not belonging to a LAG.
2. In the MTU box relevant the wished port, set a number between 46 and 12266.
WARNING Operation available only if the current Bridge modality of the Switch is Provider Bridge (802.1ad)
or Provider Edge Bridge (see Bridge Mode Conf. context).
In Customer Bridge modality the port is always of type Customer Bridge.
For the line Ethernet ports, this operation involves the re-configuration of the following port parameters to
the default values: Auto Neg., MTU and Ingress Filtering.
If the port belongs to one LAG, the operation is not available at single port level, but only at Link Aggre-
gation level (see LA Manager).
2. In the Bridge Port Type box relevant the wished port, select the wished option.
If the Switch mode is Provider Bridge (802.1ad), the following options are available:
• Provider Network. Port where S-TAG’s (NNI) are observed and managed if the equipment im-
plements a Provider Bridge or a Provider Edge Bridge. More C-TAG’s can be present within one
S-TAG.
• Provider Network (Proprietary). Not standard port which allows the management of the packets
with C-Tag (EtherType 0x8100) or without Tag within a Provider or Provider Edge Bridge con-
text. It is used for the forwarding of the Management packets from/to the equipment controller.
If the Switch mode is Provider Edge Bridge, the following options are available:
• Provider Network. Port where S-TAG’s (NNI) are observed and managed if the equipment im-
plements a Provider Bridge or a Provider Edge Bridge. More C-TAG’s can be present within one
S-TAG.
• Provider Network (Proprietary). Not standard port which allows the management of the packets
with C-Tag (EtherType 0x8100) or without Tag within a Provider or Provider Edge Bridge con-
text. It is used for the forwarding of the Management packets from/to the equipment controller.
• Customer Network (port-based). Port which allows the routing of the traffic of a single user, in
case of Provider Edge Bridge. All the packets with C-TAG received on this port are routed on a
single S-VLAN.
If this type of port is selected, the relevant parameter Acceptable Frame Type must be set to
value UnTagged and Priority Tagged (see Port Settings tab).
• Customer Edge - (c-tagged). Port which allows the routing of the traffic of a single user already
associated to one C-TAG, in case of Provider Edge Bridge.
WARNING In the current equipment version, the flow control for the line ports is not available, while for
the port to the Radio it is assigned by default.
The flow control is implemented in the Ethernet connections in Full Duplex modality by means of the com-
mand PAUSE.
Verify/modify the traffic class which a packet, in input from a port, is assigned to, depending
on its priority (User Priority)
3. To change the association priority-traffic class relevant to the packets in input from a port, execute one
of the following actions:
• Double click on the port.
• Select the row relevant to the port and press Show.
The Traffic Class Mapping window shows a table which indicates the traffic class (columns Classes)
which the priority 802.1p (rows Priority) is assigned to, for the packets in input to the selected port.
4. In the table, select the option corresponding to the wished combination: priority value - traffic class.
For the same priority value, only one class can be selected.
The values of the traffic class range from 0 to 7. Every single value represents a type of traffic:
• 0 - Best effort. Traffic not sensitive to QoS metric.
• 1 - Background. Traffic not interfering with the use of the network by users and applications.
• 2 - Standard (spare traffic). Traffic more important than that of Background type, but less im-
portant than the Excellent Load type.
• 3 - Excellent load. Traffic representing the best service offered to the most important customers.
• 4 - Controlled load. Traffic which must be received even when the network is overloaded.
• 5 - Video. Traffic with delay lower than 100 milliseconds (video traffic).
• 6 - Voice. Traffic with delay lower than 10 milliseconds (voice traffic).
• 7 - Network control. Traffic reserved to the network control.
5. Press Apply and confirm.
0 1 2 3 4 5 6 7
0 X - - - - - - -
1 - X - - - - - -
2 - - X - - - - -
Internal 3 - - - X - - - -
Priority
(802.1p) 4 - - - - X - - -
5 - - - - - X - -
6 - - - - - - X -
7 - - - - - - - X
Tab.4 indicates the default mapping of the priority IP DSCP (Differentiated Services Code Point) (Layer 3).
0 1 2 3 4 5 6 7
000xxx X - - - - - - -
001xxx - X - - - - - -
010xxx - - X - - - - -
Internal 011xxx - - - X - - - -
Priority
(DSCP) 100xxx - - - - X - - -
101xxx - - - - - X - -
110xxx - - - - - - X -
111xxx - - - - - - - X
Verify the status of the ports as regards the Link Aggregation function
WARNING The wording [MEF Services Active] next to the name of the context indicates that MEF services
have been activated. The change of the forwarding parameters or of the port type by WEB LCT could pre-
vent its operation.
Tabs
Physical Interface tab. General configuration of the ports.
Optical tab. Displays the SFP optical module relevant to Ethernet ports with optical interface
available on the equipment.
Data Flow tab. Configuration of the flow control.
Traffic Class 802.1p Mapping tab. Mapping between priority of the packets in input to the Switch
and the traffic classes.
LA Status tab. Status of the ports as regards the Link Aggregation function.
Tunneling tab. Configuration of the parameters for the Tunneling management.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Port Manager (command)
Table
Every table row corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Read only parameter.
Description. Name of the port (see Tab.5).
Read only parameter.
Media. Type of interface:
• Copper. Line Ethernet port with electrical interface.
• Fiber. Line Ethernet port with optical interface.
Parameter not meaningful for the Radio port.
Link Status. Status of the physical connection between the port and a device in network:
• Up (green box). The Link works: the physical connection is active and ready
for the traffic exchange.
• Down. The Link does not work: no physical connection has been enabled or
the established physical connection is not active or is defective.
Read only parameter.
Admin State. Enabling state/loop of the port:
• Disabled. The port is not enabled to use: the port does not transmit/receive
traffic.
• Enabled. The port is enabled to use: the port transmits/receives traffic.
The port cannot transmit/receive traffic if the physical connection does not
work.
See also
Modify the enabling status of a port
Activate the loop on line side of a port
Deactivate the loop on line side of a port
Modify the activation state of the autonegotiation for a port
Modify the transmission speed of a port
Modify the inversion status of the Tx and Rx lines of a port
Modify the maximum dimension of the packet accepted by a ports
Modify the Bridge Port Type for a port
Optical tab
The tab displays the data of the SFP (Small Form-factor Pluggable) optical module relevant to the Ethernet
ports with optical interface available on the equipment.
All parameter are read only.
Table
Every table row corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Description. Name of the port (see Tab.5).
Fail Alarm. Status of the alarm which indicates the malfunctioning of the optical module
(Plug-in module Fail Alarm). The colour of the box displays the status of the alarm:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the
Critical, Major, Minor, Warning severity.
• Green. Alarm activated coupled with the Status severity.
• Grey. Alarm deactivated.
Vendor Name. Name of the optical module.
Vendor PN. Part number of the optical module.
Vendor SN. Serial number of the optical module.
Vendor Date. Manufacturing date of the optical module.
Wave Length (nm). Wave length (in nanometres) of the optical module.
Nominal Bit Rate (Mbps)). Nominal data transmission speed in Mbit/sec.
Link Length 9um (m). Maximum distance (in meters) of the 9/125 µm fiber supported
by the optical module.
Selecting the heading of the Port or Description column, the rows of the table are sorted in in-
creasing alphanumeric order with respect to the considered column and an arrow is displayed
with the tip directed upwards. The next selection sorts the rows in decreasing order (an arrow
is displayed with the tip directed downwards) and so on.
Table
Every table row corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Description. Name of the port (see Tab.5).
Flow Control Admin Status. Management of the flow control assigned by default for
the specific port:
• Disabled. The transmission/reception of the MAC packets used for the trans-
port of the command PAUSE is disabled.
• Transmit. The transmission of the MAC packets used for the transport of the
command PAUSE is enabled towards a remote device, in case of internal con-
gestion due to excess of received traffic.
• Receive. The reception from a remote device of the MAC packets used for the
transport of the command PAUSE is enabled, which interrupts the data trans-
mission if required by an external equipment.
• Transmit & Receive. The transmission/reception to/from a remote device of
the MAC packets used for the transport of the command PAUSE is enabled.
Flow Control Oper Status. It displays the management modality of the flow control
currently used by the specific port:
• Disabled. The transmission/reception of the MAC packets used for the trans-
port of the command PAUSE is disabled.
• Transmit. The transmission of the MAC packets used for the transport of the
command PAUSE is enabled towards a remote device, in case of internal con-
gestion due to excess of received traffic.
• Receive. The reception from a remote device of the MAC packets used for the
transport of the command PAUSE is enabled, which interrupts the data trans-
mission if required by an external equipment.
• Transmit & Receive. The transmission/reception to/from a remote device of
the MAC packets used for the transport of the command PAUSE is enabled.
Selecting the heading of the Port or Description column, the rows of the table are sorted in in-
creasing alphanumeric order with respect to the considered column and an arrow is displayed
with the tip directed upwards. The next selection sorts the rows in decreasing order (an arrow
is displayed with the tip directed downwards) and so on.
The tab shows the mapping between the priority 802.1p within the Tag VLan (field User Priority) of the
packets in input to the Switch and the traffic classes managed by the equipment.
The packet received on a port with a specific priority will be forwarded according to the relevant traffic
class. For the packets without Tag, the priority is equivalent to the value of Default User Priority of the port
in input (see Port Settings tab).
Table
Every table row corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Read only parameter.
Description. Name of the port (see Tab.5).
Read only parameter.
Priority 0. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 0 is assigned to.
Priority 1. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 1 is assigned to.
Priority 2. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 2 is assigned to.
Priority 3. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 3 is assigned to.
Priority 4. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 4 is assigned to.
Priority 5. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 5 is assigned to.
Priority 6. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 6 is assigned to.
Priority 7. This column displays, for every single port, the traffic class which a packet
with User Priority value equal to 7 is assigned to.
Default see Tab.3.
Buttons
Show. Verify/modify the traffic class which a packet, in input from a port, is assigned to, de-
pending on its priority (User Priority)
LA Status tab
The tab displays the current status of every port of the Ethernet Switch as regards the Link Aggregation
function (see LA Manager).
All parameters in the tab are read only.
The table is not populated if the parameter System Control has value Shutdown (see General Settings tab).
Table
Each row of the table corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Description. Name of the port (see Tab.5).
Port Channel State. Current status of the port as regards the Link Aggregation func-
tion:
• Up In Bundle. The port is an active member of a LAG (Link Aggregation
Group): it is operative and takes part to the aggregation.
• Standby. The port is a member of a LAG, but currently in standby. It can re-
place a port in failure within the LAG.
Selecting the heading of the Port or Description column, the rows of the table are sorted in in-
creasing alphanumeric order with respect to the considered column and an arrow is displayed
with the tip directed upwards. The next selection sorts the rows in decreasing order (an arrow
is displayed with the tip directed downwards) and so on.
Tunneling tab
WARNING L2CP tunneling cannot be partially overlapped: all needed tunnelings must be enabled at the
same port. In case of:
• Cascaded Links without traffic dropping, tunneling can be enabled at the first and the last port.
• Cascaded Links with traffic dropping, tunnellings must be enabled on all intermediate ports.
The tab displays the configuration of the parameters for the Tunneling management, that is the modality
for which one protocol is encapsulated within another lower level protocol.
All parameters in the tab are read only.
Parameters
MAC ADDRESS CONFIGURATION
BPDU Priority. Predefined priority for all the BPDU packets encapsulated at level 2 and
received on the tunnel ports: 0 ÷ 7.
Default 7.
STP. Destination MAC address used for the Tunneling of BPDU STP packets.
LACP. Destination MAC address used for the Tunneling of LACP packets.
Dot1x. Destination MAC address used for the Tunneling of Dot1x packets.
GVRP. Destination MAC address used for the Tunneling of PDU GVRP packets.
GMRP. Destination MAC address used for the Tunneling of PDU GMRP packets.
MVRP. Destination MAC address used for the Tunneling of MVRP packets.
MMRP. Destination MAC address used for the Tunneling of MMRP packets.
LLDP. Destination MAC address used for the Tunneling of LLDP packets.
TUNNEL STATUS
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
The list contains the ports of Customer Network (port-based) or Customer Edge type.
Dot1x. State of the Tunneling for Dot1x protocol:
• Peer. The Dot1x packets received by the Bridge are accepted and processed.
• Tunnel. The received Dot1x packets are transmitted in transparent mode by
the Provider network, this avoids the processing of the packets by PB’s and
PEB’s.
• Discard. The Dot1x packets received by the Bridge are dropped.
LACP. State of the Tunneling for LACP (Link Aggregation Control Protocol) protocol:
• Peer. The LACP packets received by the Bridge are accepted and processed.
• Tunnel. The received LACP packets are transmitted in transparent mode by the
Provider network, this avoids the processing of the packets by PB’s and PEB’s.
• Discard. The LACP packets received by the Bridge are dropped.
STP. State of the Tunneling for STP (Spanning Tree Protocol) protocol:
• Peer. The STP packets received by the Bridge are accepted and processed.
• Tunnel. The received STP packets are transmitted in transparent mode by the
Provider network, this avoids the processing of the packets by PB’s and PEB’s.
• Discard. The STP packets received by the Bridge are dropped.
WARNING In the equipment, VLAN’s work in the Switch in VLAN Aware Bridging modality.
In this modality, the bridge identify the packets with TAG VLAN and can insert and remove TAG’s in the
packet heading.
The Switch operates in compliance with Standard IEEE 802.1q and 802.1ad.
The command VLAN manages the parameters relevant to the configuration and the management of the
virtual LAN’s (VLAN).
Operations
BASIC SETTINGS
Verify the basic configuration of the VLAN management
Enable/disable the learning of the addresses in the MAC Table
Modify the aging time of the addresses stored in the MAC Table
Modify the limit of MAC unicast addresses per VLAN managed by the Switch
PORT SETTINGS
Modify the type of packets accepted in input by a port/LAG
Modify the check modality (filtering) applied to the packets in input on a port/LAG
Modify the default VLAN identifier of a port/LAG (Port VID)
Modify the default value to enter in the User Priority field of the packets without priority
802.1p received on the port/LAG
STATIC VLANS
Verify the existing static VLANs
Create one or more static VLANs
Modify the configuration of a static VLAN
Delete one or more static VLANs
GUI
VLAN context
WARNING The MAC-based routing functionality in the Switch is available only if enabled this function.
The setting is common for all port of the Switch.
WARNING Operation meaningful only if the learning of the addresses in the MAC Table (Global MAC Learn-
ing Status - Enable) is enabled.
2. In the MAC Addr Table Aging Time box, set the validity period of the MAC addresses, dynamically ac-
quired and stored in the specific table (number between 10 and 1000000 seconds).
Default 300 seconds.
Modify the limit of MAC unicast addresses per VLAN managed by the Switch
2. Set, in the box Unicast MAC Learning Limit, the limit of MAC Unicast addresses per VLAN managed by
the Switch (number between 0 and 16000).
The limit represents the maximum number of different MAC unicast addresses which can be learned by
the Switch.
WARNING Operation not available for the ports of type Customer Network (port-based) or Customer Edge
(see Bridge Port Type - Physical Interface tab), which have always the value UnTagged and Priority Tagged.
3. In the Acceptable Frame Types box relevant the wished port/LAG, select the option:
• All. The port/LAG accepts all the following packets:
• Tagged. Packet containing, in its heading, one TPID identified as valid by the port/LAG,
one VLAN Tag different from 0 and the field User Priority.
• UnTagged. Packet containing, in its heading, one TPID identified as not valid by the port/
LAG.
• Priority Tagged. Packet containing, in its heading, one TPID identified as valid by the
port/LAG, one VLAN Tag equal to 0 and the field User Priority.
• Tagged. The port/LAG accepts only the Tagged packets. UnTagged and Priority Tagged packets
are rejected.
• UnTagged and Priority Tagged. The port/LAG accepts only the UnTagged and Priority Tagged
packets. Tagged packets are rejected.
Modify the check modality (filtering) applied to the packets in input on a port/LAG
3. In the Ingress Filtering box relevant the wished port/LAG, select the option:
• Enabled. The port/LAG accepts, in input, only packets with VLAN ID contained in VTU and the
input port/LAG must be member of this VLAN, otherwise the packet is discarded.
• Disabled. The port/LAG does not execute any check: all the packets are accepted.
WARNING The default VLAN identifier of a port/LAG is used to assign a VLAN to the UnTagged or Priority
Tagged packets received on the port/LAG itself. The parameter is used for the classification of the VLAN’s
on port basis (Port-Based VLAN classification).
3. In the PVID box relevant the wished port/LAG, set a value between 1 and 4094.
Modify the default value to enter in the User Priority field of the packets without priority 802.1p
received on the port/LAG
3. In the Default User Priority box relevant the wished port/LAG, set a value between 0 (lowest priority)
and 7 (highest priority).
3. Press Add.
5. Activate ( ), in the box Member Ports, the ports enabled to the transit of packets with VLAN ID equal
to the VLAN’s one.
For every port are indicated the port identifier (slot number/port number), the port name (LAN 1, LAN
2, etc.) and the type of Bridge port (Customer Bridge, Provider Network, etc.) (see Bridge Port Type,
Physical Interface tab).
If two or more ports belong to a LAG, the list will display the LAG and not the single ports.
The label po<identification number> (for example po100) indicates a LAG.
At least one port and/or LAG must be activated to create a VLAN.
One port can be Member of more VLAN’s at the same time.
6. Activate ( ), in the box Untagged Ports, the ports/LAGs whose packets in output the Tag 802.1Q is
removed from.
7. Select, in the box Ether Type, the hexadecimal value of EtherType which the packets must have to be
identified as belonging to the VLAN:
• 0x8100. Customer VLAN Tag in according to Ieee802.1Q specifications.
• 0x88a8. Service VLAN Tag in according to Ieee802.1ad specifications.
8. In the Unicast MAC Limit box, set the maximum number of Unicast MAC addresses for single VLAN (val-
ue between 0 and 1000).
3. Double click on the box relevant to the parameter of VLAN you wish to change.
Except for the identifier (VLAN ID), all the parameters of a VLAN can be modified (VLAN Name, Member
Ports, Untagged Ports, Ether Type, Unicast MAC Limit).
The parameter setting modes are the same pointed out in par. Create one or more static VLANs.
WARNING The wording [MEF Services Active] next to the name of the context indicates that MEF services
have been activated. The change of parameters relevant to the VLAN management from WEB LCT could
preclude the operation of the VLAN’s themselves.
The context displays the parameters relevant to the configuration and the management of the virtual LAN’s
(VLAN).
Tabs
Basic Settings tab. Basic configuration of the VLAN management.
Port Settings tab. VLAN management parameters relevant to the physical ports available in the
equipment.
Static VLANs tab. Configuration of the existing static VLANs.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
VLAN (command)
Parameters
LEARNING OPTIONS
Learning Mode. Learning mode for the addresses in the MAC Table.
The writing Independent VLAN Learning indicates that the partition and the indicization
on VID basis of the Source Addresses in the MAC Table is enabled. The learning registers
them in a MAC Table segment whose index is the value of the VID contained in the VLAN’s
in input to the Switch and registered in VTU.
In this modality, the information learned by a VLAN are not used by other VLAN’s for the
packet forwarding.
Parameter common to all port of the Switch.
Read only parameter.
Global MAC Learning Status. Enabling status of the learning of the addresses in the
MAC Table:
• Enable. The learning of the Source Addresses in the MAC Table is enabled.
• Disable. The learning of the Source Addresses in the MAC Table is disabled. In
this condition MAC Table is not used.
Parameter common to all port of the Switch.
MAC Add. Table Aging Time. Validity period of the MAC addresses stored in the MAC
Table (expressed in seconds).
Default 300 seconds.
Unicast MAC Learning Limit. Maximum number of different MAC unicast addresses per
VLAN which can be learned by the Switch.
VLAN STATUS
Max. VLAN ID. VLAN identifier accepted by the Switch as maximum value.
Read only parameter.
See also
Enable/disable the learning of the addresses in the MAC Table
Modify the aging time of the addresses stored in the MAC Table
Modify the limit of MAC unicast addresses per VLAN managed by the Switch
The tab displays the VLAN management parameters relevant to the physical ports or LAGs available in the
equipment.
Table
Each row of the table corresponds to a port or LAG.
If two or more ports belong to a LAG, the list will display the LAG and not the single ports (e.g.
if the ports LAN 1 and LAN 2 belong to the LAG po100, the list will display only the option po100
and not the options LAN 1 and LAN 2). The settings made to a channel will be automatically
performed on all the ports belonging to the LAG.
For each port/LAG are indicated:
Port. Port or channel identifier.
The port ID is a combination of slot and the port number (slot number/port number).
The label po<identification number> (for example po100) indicates a LAG.
Read only parameter.
Description. Name of the port (see Tab.5) or LAG.
The parameter is not available for the LAGs created by WEB LCT.
Read only parameter.
Acceptable Frame Types. Types of BPDU (Bridge Protocol Data Unit) packets accepted
in input by the port/LAG and subjected to control policies (see Ingress Filtering):
• All. The port/LAG accepts all the following packets:
• Tagged. Packet containing, in its heading, one TPID identified as valid by
the port/LAG and one VLAN Tag different from 0 and the field User Priority.
• UnTagged. Packet containing, in its heading, one TPID identified as not val-
id by the port/LAG.
• Priority Tagged. Packet containing, in its heading, one TPID identified as
valid by the port/LAG and one VLAN Tag equal to 0 and the field User Pri-
ority.
• Tagged. The port/LAG accepts only the Tagged packets. The UnTagged and
Priority Tagged packets are rejected.
• UnTagged and Priority Tagged. The port/LAG accepts only the UnTagged and
Priority Tagged packets. The Tagged packets are rejected.
Default All.
The parameter has always value UnTagged and Priority Tagged for the ports of type Cus-
tomer Network (port-based) and Customer Edge (see Bridge Port Type - Physical Inter-
face tab).
Ingress Filtering. Control modality (filtering) applied to the packets in input on the
port/LAG:
• Enabled. The port/LAG accepts in input only packets with VLAN ID contained
in VTU and the port/LAG in input must be a member of this VLAN, otherwise
the packet is discarded.
• Disabled. The port/LAG performs no check: all the packets are accepted.
Selecting the heading of a column, the rows of the table are sorted in increasing alphanumeric
order with respect to the considered column and an arrow is displayed with the tip directed up-
wards. The next selection sorts the rows in decreasing order (an arrow is displayed with the tip
directed downwards) and so on.
See also
Modify the type of packets accepted in input by a port/LAG
Modify the check modality (filtering) applied to the packets in input on a port/LAG
Modify the default VLAN identifier of a port/LAG (Port VID)
Modify the default value to enter in the User Priority field of the packets without priority 802.1p
received on the port/LAG
LA Manager (command)
The tab displays the configuration of the physical ports of the Switch.
The static VLAN’s are configured per port (Port-based VLAN) differently from the dynamic VLAN’s which
are configured according to MAC address or to protocol.
During the creation of a static VLAN, one port of the Switch is assigned to the specific VLAN, so that the
device connected to that port automatically becomes member of the assigned VLAN.
Table
Each row of the table corresponds to a VLAN for which are indicated:
VLAN ID. VLAN identifier.
Read only parameter.
VLAN Name. VLAN name.
Member Ports. Ports enabled to the transit of packets with VLAN ID equal to that of the
VLAN.
For every port, the port identifier is indicated (slot number/port number) and the name
of the port (LAN 1, LAN 2, etc.).
If two or more ports belong to a LAG, the list will display the LAG and not the single ports.
The label po<identification number> (for example po100) indicates a LAG.
The ports/LAGs are separated by comma.
Untagged Ports. Ports/LAGs whose packets in output the Tag 802.1Q is removed from.
For every port, the port identifier is indicated (slot number/port number) and the name
of the port (LAN 1, LAN 2, etc.).
If two or more ports belong to a LAG, the list will display the LAG and not the single ports.
The label po<identification number> (for example po100) indicates a LAG.
The ports/LAGs are separated by comma.
Ether Type. Value of EtherType which the packets in input must have to be identified as
belonging to the VLAN:
• 0x8100. Customer VLAN Tag in according to Ieee802.1Q specifications.
• 0x88a8. Service VLAN Tag in according to Ieee802.1ad specifications.
Unicast MAC Limit. Number of Unicast MAC addresses for single VLAN.
Selecting the heading of the VLAN ID column, the rows of the table are sorted in increasing al-
phanumeric order with respect to the considered column and an arrow is displayed with the tip
Buttons
Add. Create one or more static VLANs
Remove. Delete one or more static VLANs
See also
Modify the configuration of a static VLAN
WARNING Command available only when the Switch is in Provider Edge Bridge modality.
The command Prov. Bridge-VLAN displays the parameters relevant to the VLAN’s when the Switch is in
Provider Edge Bridge modality.
Operations
Verify the C-VID registration table (C-VID Registration)
Verify the Provider Edge Port configuration table (PEP Configuration)
GUI
Prov. Bridge-VLAN context
WARNING The wording [MEF Services Active] next to the name of the context indicates that MEF services
have been activated.
The context shows the parameters relevant to the VLAN’s when the Switch is in Provider Edge Bridge mo-
dality.
Tabs
C-VID Registration tab. C-VID registration table (C-VID Registration).
PEP Configuration tab. Provider Edge Port configuration table (PEP Configuration).
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Prov. Bridge-VLAN (command)
An internal connection between one Customer Network Port (CNP) on S-VLAN component and one Provider
Edge (PEP) port on C-VLAN component is instanced for every VLAN.
The connection between CNP and PEP is set by the mutual entries in C-VID registration table (C-VID Reg-
istration) and PEP configuration table (see PEP Configuration tab).
In C-VID registration table, one entry is created for every C-VLAN supported in the C-VLAN component
associated with one Customer Edge port (CEP).
The CEP identifier and the C-VID combination identify one PEP. The entry contains (among the other pa-
rameters) a S-VID value corresponding to the PVID of CNP, which associates the PEP to a specific Customer
Network port (CNP).
Table
Each row of the table corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
The list contains the ports of Customer Edge type.
C-VLAN ID. Customer VLAN ID value present in the C-TAG of the packets in input to the
specific port: 1 ÷ 4094.
S-VLAN ID. VLAN ID of the service instance which the port and the Customer VLAN ID
are mapped to: 1 ÷ 4094.
Untagged PEP. Forwarding modality of the packets, with the specific C-VID, in inputs
to the Customer Edge port through the Provider Edge port:
• TRUE. The packets are forwarded without TAG C-VLAN.
• FALSE. The packets are forwarded with a valid C-TAG and C-VID.
Untagged CEP. Forwarding modality of the packets, with the specific C-VID through the
Customer Edge port:
• TRUE. The packets are forwarded without TAG C-VLAN.
• FALSE. The packets are forwarded with TAG C-VLAN. If this is missing, it is
added.
The tab displays the Provider Edge Port configuration table (PEP Configuration).
For every VLAN, one internal connection is instanced between one Customer Network port (CNP) on S-
VLAN component and one Provider Edge port (PEP) on C-VLAN component.
The connection between CNP and PEP is set by the mutual entries in C-VID registration table (see C-VID
Registration tab) and PEP configuration table.
In PEP configuration table, one entry is created for every S-VID corresponding to one service instance ac-
cessible by the C-VLAN component.
The Customer Edge Port (CEP) identifier and the S-VID combination identify one CNP. The entry contains
(among the other parameters) one C-VID value corresponding to the PVID of PEP, which associates the
CNP to a specific PEP.
Table
Each row of the table corresponds to a port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
The list contains the ports of Customer Edge type.
S-VID. S-VLAN identifier: 1 ÷ 4094.
P-VID. Default VLAN identifier assigned to the UnTagged packets received on the PEP
port: 1 ÷ 4094.
Default User Priority. Default priority value (User Priority) assigned to the UnTagged
packets received on the PEP port: 0 (lowest priority) ÷ 7 (highest priority).
Default 0.
Acceptable Frame Types. Types of BPDU packets accepted in input by the PEP port and
subjected to control policies (see Ingress Filtering):
• All. The port accepts all the following packets:
• Tagged. Packet containing, in its heading, one TPID identified as valid by
the port, one VLAN Tag different from 0 and the field User Priority.
• UnTagged. Packet containing, in its heading, one TPID identified as not val-
id by the port.
• Priority Tagged. Packet containing, in its heading, one TPID identified as
valid by the port, one VLAN Tag equal to 0 and the field User Priority.
• Tagged Only. The port accepts only the Tagged packets. UnTagged and Prior-
ity Tagged packets are rejected.
• Untagged & Priority Tagged. The port accepts only the UnTagged and Priority
Tagged packets. Tagged packets are rejected.
Default Admit-All.
Ingress Filtering. Control modality (filtering) applied to the packets in input on the PEP
port:
• TRUE. The port drops the packets classified to the specific C-VLAN if the port
is not a member of the C-VLAN itself.
• FALSE. The PEP port performs no check: all the packets are accepted.
Default FALSE.
COS Preservation. Enabling status, for the PEP port, of the function Class of Service
Preservation for a Service Provider:
• Enable. Function CoS preservation enabled: the mapping between the priority
of the packets in input to the Switch and the traffic classes is preserved in the
Provider network.
WARNING Command available only when the Switch is configured in Provider Bridge or Provider Edge
Bridge modality.
The Prov. Bridge-EtherType command manages the EtherType values in the S-Tag field of the Ethernet
ports.
Operations
Verify the EtherType values in the S-Tag field of the Ethernet ports
Modify the EtherType values in the S-Tag field of a port/LAG
GUI
Prov. Bridge-EtherType context
Verify the EtherType values in the S-Tag field of the Ethernet ports
2. Set, in the field Ingress EtherType of the specific port or LAG, the hexadecimal value of EtherType which
must have the packets in input to the port/LAG.
For the port of PNP (Provider Network Port) type, the default value is 0x8100. For all the other ports,
the default value is 0x88a8.
3. Set, in the field Egress EtherType of the specific port or LAG, the hexadecimal value of EtherType which
must be applied to the packets in output from the port/LAG.
For the port of CEP (Customer Edge Port) and PNP type, the default value is 0x8100. For all the other
ports, the default value is 0x88a8.
WARNING Context available only when the Switch is configured in Provider Bridge or Provider Edge Bridge
modality.
The context displays the EtherType values in the S-Tag field of the Ethernet ports.
Parameters
Each row of the table corresponds to a port or LAG (see LA Manager).
If two or more ports belong to a LAG, the list will display even the LAG. In this case, the value
used by the aggregated ports will be that indicated for the relevant LAG.
For each port/LAG are indicated:
Port. Port or channel identifier.
The ID value is a combination of slot number and the port number (slot number/port
number).
The label po<identification number> (for example po100) indicates a LAG.
Read-only parameter.
Description. Name of the port (see Tab.5) or the LAG.
The parameter is not available for the LAGs created by WEB LCT.
Read-only parameter.
Ingress EtherType. Value EtherType in the field S-Tag of the packets in input to the
port/LAG.
For the port of PNP (Provider Network Port) type, the default value is 0x8100. For all the
other ports, the default value is 0x88a8.
Egress EtherType. Value EtherType in the field S-Tag applied to the packets in output
from the port/LAG.
For the port of CEP (Customer Edge Port) and PNP type, the default value is 0x8100. For
all the other ports, the default value is 0x88a8.
Selecting the heading of the Port or Description column, the rows of the table are sorted in in-
creasing alphanumeric order with respect to the considered column and an arrow is displayed
with the tip directed upwards. The next selection sorts the rows in decreasing order (an arrow
is displayed with the tip directed downwards) and so on.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Prov. Bridge-EtherType (command)
The command Header Compression allows managing the compression of the headers of the Ethernet
packets of streams on the ports of a Radio Link.
Operations
Verify the status of the function for the compression of the headers of Ethernet packets
Enable/disable the functionality for the compression of the headers of Ethernet packets
Verify/modify the context depth to compress in the header of the Ethernet packets
Verify/modify the parsing mode applied to the header of the Ethernet packets
GUI
Header Compression context
See also
Header Compression (info)
Verify the status of the function for the compression of the headers of Ethernet packets
Enable/disable the functionality for the compression of the headers of Ethernet packets
2. To change the enabling status of the functionality, select the wished value.
Verify/modify the context depth to compress in the header of the Ethernet packets
Verify/modify the parsing mode applied to the header of the Ethernet packets
The context displays the status of the Header Compression functionality for the Ethernet packets in output
from the LANs to the radio.
The lower part of the context displays the protocols and the modes supported by the Parser of Header Com-
pression functionality.
Table
Every row of the table corresponds to one radio port for which are indicated:
Port. Name of the port (see Tab.5).
Read only parameter.
H.C. Status. Enabling status of Header Compression functionality.
• Enable. The compression of the headers of the Ethernet packets is enabled.
• Disable. The compression of the headers of the Ethernet packets is disabled.
Context Depth. The context depth is in inverse relation to the number of contexts.
• 16 bytes (up to 2048 contexts).
• 32 bytes (up to 1024 contexts).
• 64 bytes (up to 512 contexts).
• 128 bytes (up to 256 contexts).
Parsing Mode. Modality used by the header of the Ethernet packets in output to the ra-
dio is examined for the compression:
• IPv4/IPv6 without C.W., EoMPLS without C.W.
• EoMPLS without C.W.
• IPv4/IPv6 without C.W.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Header Compression (command)
Header Compression (info)
Enable/disable the functionality for the compression of the headers of Ethernet packets
Verify/modify the context depth to compress in the header of the Ethernet packets
Verify/modify the parsing mode applied to the header of the Ethernet packets
See also
Header Compression (command)
Header Compression context
Operations
Enable/disable the use of STP/RSTP protocol for the equipment
OPERATIONS AT SWITCH LEVEL
GUI
RSTP context
See also
STP/RSTP Protocol (info)
2. In the System Control box, set the Start value, press Apply and confirm.
This operation activates the STP/RSTP function on every port of the Switch: the memory necessary for
the operation is allocated.
3. Select the box Enable Ports, activate the ports you wish set for the RSTP function, press Apply and
confirm.
This operation creates an instance for every single port activated in the STP/RSTP table (see Port Set-
tings tab and Port Status tab).
If two or more ports belong to a LAG, the list will display the LAG and not the single ports (see LA Man-
ager). For example, if the ports LAN 1 and LAN 2 belong to the LAG po100, the list will display the option
po100 and not the options LAN 1 and LAN 2.
4. In order to change the default values of the general parameters of the Switch, execute the following
procedures:
Verify/modify the dynamic path cost calculation functions (STP/RSTP) (parameters: Dynamic
Path Cost Calculation and Dynamic Path Cost Lag-Speed - Default: Disable).
Verify/modify the version of the protocol (STP/RSTP) (parameter: Version - Default: RSTP Com-
patible).
Verify/modify the priority assigned to the Switch (STP/RSTP) (parameter: Priority - Default:
32768 (8).
6. Verify that the parameter RSTP Status is set to Enable for all the ports. Otherwise, set the value Enable,
press Apply and confirm.
The ports in state Enable are enabled to the operation of STP/RSTP protocol: the ports take part to the
Spanning Tree process and are ready to transmit/receive BPDU packets.
7. In order to change the default values of the port parameters, execute the following procedures:
Verify/modify the priority of a port (STP/RSTP) (parameter: Port Priority - Default: 128 (8).
Verify/modify the cost of the a port (STP/RSTP) (parameter: Path Cost - Default: 8000 for Radio
ports and line ports configured at 2.5Gb/s, 20000 for 1Gb/s, 200000 for 100Mb/s and 2000000
for 10Mb/s).
Verify/modify the interoperability of the equipment with other equipment (RSTP) (parameter:
802.1W Interop - Default: Disable).
WARNING If, in this moment of the procedure, a software reset is performed (see Execute the equip-
ment software reset), the ports enabled to the use of STP/RSTP protocol (see step 6) are “locked” even
if the use of STP/RSTP protocol is not completely enabled.
In order to “unlock” them, it is necessary to disable the ports (set the parameter RSTP Status of every
port to Disable) and then re-enable them (setting the parameter RSTP Status of every port to Enable).
9. Set the value Enabled in the box Status, press Apply and confirm.
This operation enables the use of the protocol STP or RSTP (depending on the selected version) for the
equipment: the ports begin transmitting/receiving BPDU packets.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
If the default value of a port is changed (see Verify/modify the cost of the a port (STP/RSTP)), this value
will be used as Path Cost independently from the state (Enable or Disable) of the parameter Dynamic Path
Cost Calculation and Dynamic Path Cost Lag-Speed.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
2. The parameter Tx Hold Count indicates the maximum number of BPDU packets which can be transmit-
ted within a given interval.
The parameter is common for all the ports of the Switch.
WARNING Operation available only if the System Control parameter has Start value.
3. In order to change a parameter, select the box RSTP Status relevant to the wished port and select the
wished option.
WARNING The default value of Path Cost for every single port is automatically set as function of the port
bit rate: 8000 for Radio ports and line ports configured to 2.5Gb/s, 20000 for 1Gb/s, 200000 for 100Mb/s
and 2000000 for 10Mb/s.
If the default value of the port cost is changed, this value will be used as Path Cost independently from the
state (Enable or Disable) of the parameter Dynamic Path Cost Calculation.
3. In order to modify a parameter, select the box Path Cost relevant to the wished port and set a value
between 1 and 200 000 000.
3. In order to change a parameter, select the box 802.1W Interop.relevant to the wished port and select
the wished option.
The context displays the parameters for management of Spanning Tree protocol.
Tabs
Settings tab. Parameters of the STP/RSTP module, used at global level by the Switch and by all
its ports.
Port Settings tab. Parameters of the Ethernet ports relevant to STP/RSTP function.
Port Status tab. Information stored by every Switch port as regards the STP/RSTP functionality.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
RSTP (command)
STP/RSTP Protocol (info)
Settings tab
The tab displays the general basic parameters of the STP/RSTP module, used at global level by the Switch
and all its ports.
Parameters
GLOBAL CONFIGURATION
System Control. Enabling state, by the control system, of the STP/RSTP function for the
Switch:
• Start. The system activates the STP/RSTP function on every Switch port: the
necessary memory is allocated for the function.
• Shutdown. The system stops the STP/RSTP function on every Switch port: the
allocated memory is made available for other activities.
Default Shutdown.
Enable Ports. Setting of the STP/RSTP function for every Switch port.
Select the option, the active box ( ) indicates that the STP/RSTP function is set for the
port (the port is inserted in the STP/RSTP tables: Port Settings and Port Status); the in-
active box ( ) indicates that the STP/RSTP function is not set for the port (the port is
not present in the STP/RSTP tables).
The identifier of the port (slot number/port number) and the port name (LAN 1, LAN 2
etc.) is indicated for every port.
The label po<identification number> indicates a LAG (see LA Manager). If two or more
ports belong to a LAG, the list will display the LAG and not the single ports. For example,
if the ports LAN 1 and LAN 2 belong to the LAG po100, the list will display the option
po100 and not the options LAN 1 and LAN 2.
By default, all the ports are disabled.
Parameter available only if the System Control parameter has Start value.
Dynamic Path Cost Calculation. State of the path cost dynamic calculation function.
The Path Cost represents the distance between the port Root and the port Designated.
The Path Cost, according to the Specification 802.1d, is calculated dividing the bit rate
by the bandwidth of the network portion connected to the port:
• Enable. The Path Cost is calculated according to the bit rate of the ports whose
administrative state is active (Enabled) in that moment. The path cost, once
calculated, is not changed according to the operating state of the ports.
• Disable. The Path Cost is calculated according to the bit rate of the connection
when the port is created.
RSTP CONFIGURATION
Version. Spanning Tree protocol version currently used by the Switch:
• STP Compatible. Spanning Tree Protocol standard IEEE 802.1d.
• RSTP Compatible. Rapid Spanning Tree protocol standard IEEE 802.1D-2004.
Protocol characterized by a greater speed (lower convergence time).
Default RSTP Compatible.
Parameter available only if the System Control parameter has Start value.
Priority. Priority assigned to the Switch. This value is used during the election of the
Root.
Values between 0 (highest priority) and 61440 (lowest priority) are available, subdivided
in intervals of 4096: 0, 4096 (1), 8192 (2), 12288 (3), 16384 (4), 20480 (5) and so on,
up to 61440 (15).
Default 32768 (8).
Parameter available only if the System Control parameter has Start value.
Tx Hold Count. Maximum number of BPDU packets which can be transmitted within a
given interval.
Default 6.
Parameter available only if the System Control parameter has Start value.
Max Age.Maximum number of switches which the packet can pass through before ex-
piring. The passage from a Switch to another one involves the decrease of 1 second per
equipment.
Default 20 seconds.
Parameter available only if the System Control parameter has Start value.
Hello Time. Interval between two consecutive transmissions of the BPDU (Bridge Proto-
col Data Unit) packet, generated by the Switch.
Default 2 seconds.
Parameter available only if the System Control parameter has Start value.
Forward Delay. Time interval which passes between the passage between the Discard-
ing status and the Learning status and between the Learning status and the Forwarding
status of the port.
Default 15 seconds.
Parameter available only if the System Control parameter has Start value.
The tab displays the parameters of the Ethernet ports in relation to STP/RSTP function.
Table
Every table row corresponds to one port set for the STP/RSTP function (parameter Enable Ports,
box active).
The table will be empty if the parameter System Control has value Shutdown or if the parameter
Enable Ports has not active values (see Settings tab).
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
The label po<identification number> indicates a LAG (see LA Manager).
Read only parameter.
Description. Name of the port (see Tab.5).
The parameter is not available for the LAGs created by WEB LCT.
Read only parameter.
Port Role. Role assigned by STP/RSTP to the port. The role defines the behaviour of the
port according to the state of the Bridge in the network:
• Disabled. Porta disabled manually (state STP/RSTP) or automatically (Link): it
will not take part to Spanning Tree process.
• Root. Port offering the best path (lowest cost) to the Bridge elected Root. Eve-
ry Bridge can have only one Root port. When the Spanning Tree algorithm is
at steady state, every Root port is in state Forwarding.
• Alternate. Port alternative to the Root port, as it offers an alternative path to
the Bridge Root with cost higher with respect to the Root port. Generally, the
Alternate port is in state Discarding. It is enabled and declared Root if the Root
port is in state Discarding.
• Designated. Port which does not offer paths to the Bridge Root and is used to
forward the information of the Bridge Root to other Bridges. Every Designated
port is in state Forwarding. In every segment, only one port is Designated.
• Backup. Port physically connected to a Lan where a Designated port of the
same Bridge is connected. The Backup port is in state Discarding. It is enabled
and declared Designated if the current Designated port is in state Discarding.
Read only parameter.
Port Priority. This value is used during the process of selection of the port role (see Port
Role).
Values between 0 (highest priority) and 240 (lowest priority) are available, subdivided in
intervals of 16: 0, 16 (1), 32 (2), 48 (3), 64 (4), 80 (5) and so on up to 240 (15).
Default 128 (8).
RSTP Status. Port enabling state as regards the operation of STP/RSTP protocol:
• Disable. Protocol operation disabled: the port does not take part to Spanning
Tree process and does not receive/transmit BPDU packets.
• Enable. Protocol operation enabled: the port stake part to Spanning Tree pro-
cess and is ready to receive/transmit BPDU packets.
See also
Verify/modify the priority of a port (STP/RSTP)
Verify/modify the status of the STP/RSTP function of a port
Verify/modify the cost of the a port (STP/RSTP)
Verify/modify the interoperability of the equipment with other equipment (RSTP)
The tab displays the information stored by every Switch port as regards the STP/RSTP functionality.
All the parameters are read-only.
Table
Every table row corresponds to one port set for the STP/RSTP function (parameter Enable Ports,
active box).
The table will be empty if the parameter System Control has value Shutdown or if the parameter
Enable Ports has not active values (see Settings tab).
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
The label po<identification number> indicates a LAG (see LA Manager).
Read only parameter.
Description. Name of the port (see Tab.5).
The parameter is not available for the LAGs created by WEB LCT.
Read only parameter.
Port Role. Role assigned by STP/RSTP to the port. The role defines the behaviour of the
port according to the state of the Bridge in the network:
• Disabled. Porta disabled manually (state STP/RSTP) or automatically (Link): it
will not take part to Spanning Tree process.
• Root. Port offering the best path (lowest cost) to the Bridge elected Root. Eve-
ry Bridge can have only one Root port. When the Spanning Tree algorithm is
at steady state, every Root port is in state Forwarding.
• Alternate. Port alternative to the Root port, as it offers an alternative path to
the Bridge Root with cost higher with respect to the Root port. Generally, the
Alternate port is in state Discarding. It is enabled and declared Root if the Root
port is in state Discarding.
• Designated. Port which does not offer paths to the Bridge Root and is used to
forward the information of the Bridge Root to other Bridges. Every Designated
port is in state Forwarding. In every segment, only one port is Designated.
• Backup. Port physically connected to a Lan where a Designated port of the
same Bridge is connected. The Backup port is in state Discarding. It is enabled
and declared Designated if the current Designated port is in state Discarding.
Port State. Current state of the port in relation to RSTP functionality.
Designated Root. Univocal identifier of the Bridge registered as Root for the segment
of the network which the port is connected to.
Designated Cost. Path Cost of the Designated port of the segment connected to the
porta.
Designated Bridge. Univocal identifier of the Bridge which the port considers the Bridge
Designated for the segment of the port. The Bridge Designated is the only Bridge allowed
to transmit the packets from/to the segment.
Designated Port. Identifier of the port on the Bridge Designated for the relevant seg-
ment. It represents the port through which the Bridge Designated forwards/receive the
packets to/from the segment.
Type. Operating state of the port in relation to the LAN segment connected to the port:
• SharedLan. The port is treated as connected to a shared connection.
• Point-to-Point. The port is treated as connected to a point-to-point connection.
The selection of present in the header of each column, shows the following commands:
Sort Ascending. Not available in this context.
Sort Descending. Not available in this context.
Columns. Activate ( ) or deactivate ( ) the display of a column in the table.
See also
Verify the information stored by every single Switch port (STP/RSTP)
ALFOplus2
The equipment can be configured to work with the STP protocol or the RSTP protocol (see Verify/
modify the version of the protocol (STP/RSTP).
The use of the protocol must be enabled at Switch level and at single port level (see Enable/
disable the use of STP/RSTP protocol for the equipment).
Before enabling the protocol, it is suggested to set the relevant configuration parameters. By
WEB LCT, it is possible to configure:
PARAMETERS AT SWITCH LEVEL
System Control (see Verify/modify the allocation of memory for the STP/RSTP
function).
Enable Ports (see Verify/modify the ports set for the STP/RSTP function).
Dynamic Path Cost Calculation and Dynamic Path Cost Lag-Speed (see Verify/
modify the dynamic path cost calculation functions (STP/RSTP).
Status (see Verify/modify the enabling of STP/RSTP function).
Priority (see Verify/modify the priority assigned to the Switch (STP/RSTP).
Tx Hold Count (see Verify/modify the maximum number of BPDU packets in trans-
mission (STP/RSTP).
Max Age, Hello Time and Forward Delay (see Verify/modify the parameters for the
transmission of BPDU packets (STP/RSTP).
PARAMETERS AT PORT LEVEL
See also
RSTP (command)
RSTP context
The command LLF allows configuring the operation of LLF (Link Loss Forwarding) functionality for the
equipment.
Operations
Verify the status of the LLF functionality for the Ethernet ports
Configure a port for the management of LLF functionality
Remove a port of the switch from the management of LLF functionality
Configure the radio circuit for the forwarding of the LOS alarm present on LAN
Remove a radio circuit from the management of LLF functionality for a given LAN
Enable/disable the LLF functionality for a LAN
Enable/disable the forwarding of LLF alarm on the radio
Modify the hysteresis value for the LLF functionality
Modify the propagation modality of LLF alarm
Modify the forwarding of LOS alarm of a LAN to the radio
Modify the modality used to forward the alarm LOS on the radio circuit
GUI
LLF context
See also
Bidirectional LLF (info)
Verify the status of the LLF functionality for the Ethernet ports
3. Set, in the Port box, the line Ethernet port for the functionality is configured.
It is not possible to select a port already selected for the functionality.
The management port and the Radio port will not be present in the list.
5. Set, in the Alarm to Circuit box, the status of forwarding of the LLF alarm on a given radio circuit as-
sociated to the considered port:
• Disable. The alarm is not forwarded to the radio.
• Enable. The alarm is forwarded to the radio.
Value meaningful only if at least one radio circuit, where transmitting the LOS signal (see area
Mapped circuits on current port selection), has been created.
7. Set, in the box Protection Mode, the propagation mode of LLF alarm:
• Disable. The alarm LLF is propagated when at least one radio is alarmed.
• Enable. The alarm LLF is propagated when all the radios are alarmed.
8. Press OK.
WARNING A port cannot be removed if there is at least one radio circuit associated to the port itself. If the
operator attempts executing this operation, the system displays an error message. First remove all the
radio circuits associated to the LAN and then remove the port.
2. Select the row of the table in the Ports area corresponding to the port for which you wish not to manage
the LLF functionality.
3. In the Ports area, press Remove and confirm.
Configure the radio circuit for the forwarding of the LOS alarm present on LAN
2. In the Ports area, select the row corresponding to the LAN for which you wish to configure the func-
tionality.
4. Set, in the Circuit box, the circuit of the radio where transmitting the LOS signal.
Every radio has eight circuits. It is not possible to select an already used circuit (displayed grey in the
selection menu).
5. Set, in the LOS to Circuit box, the enabling status of the forwarding of LOS alarm on the radio circuit:
• Disable. The alarm is not forwarded to the radio.
• Enable. The alarm is forwarded to the radio.
6. Set, in the box LOS Insertion Mode, the mode used to forward the LOS alarm on the radio circuit:
• Single. The alarm is forwarded on the radio when the signal is present on one of the LAN which
the circuit is associated to.
For example, if the circuit #1 Link ID... has been configured for the port LAN 1 and even for the
port LAN 2, the LOS alarm will be forwarded to the radio circuit if the alarm is present on LAN 1
or on LAN 2.
• Group. The alarm is forwarded on the radio only if the signal is present on every port associated
to the circuit.
7. Press OK.
Remove a radio circuit from the management of LLF functionality for a given LAN
2. Select, in the Ports area, the row of the table corresponding to the port for which you wish to remove
a radio circuit.
3. Select, in the Mapped circuit on current port selection area, the row of the table corresponding to the
radio circuit you wish to remove.
4. In the Mapped circuit on current port selection area, press Remove and confirm.
WARNING Operation available and meaningful only if the management of the LLF functionality has been
configured for the specific port.
WARNING Operation available and meaningful only if the management of the LLF functionality has been
configured for the specific port.
2. To change the parameter, select the box and then select the wished value in menu.
WARNING Operation available and meaningful only if the management of the LLF functionality has been
configured for the specific port.
2. To change the hysteresis value, type the wished value in the box.
2. To change the parameter, select the box and then select the wished value in the menu.
3. Press Apply and confirm.
WARNING Operation available and meaningful only if the specific circuit of the radio for the forwarding of
the LOS alarm present on the LAN has been configured.
2. Select, in the area Ports, the row corresponding to the LAN which the wished radio circuit is associated
to.
In the Mapped circuit on current port selection area, the box LOS to Circuit indicates the enabling status
of the forwarding of the LOS alarm on the radio circuit:
• Disable. The LOS alarm of the LAN is not forwarded to the radio.
• Enable. The LOS alarm of the LAN is forwarded to the radio.
3. To change the parameter, select the box and then select the wished value in menu.
Modify the modality used to forward the alarm LOS on the radio circuit
WARNING Operation available and meaningful only if the specific circuit of the radio for the forwarding of
the LOS alarm present on the LAN has been configured.
2. Select, in the area Ports, the row corresponding to the LAN which the wished radio circuit is associated
to.
In the Mapped circuit on current port selection area, the box LOS Insertion Mode indicates the modality
used to forward the alarm LOS on the radio circuit:
• Single. The alarm is forwarded to the radio when the signal is present on one of the LAN’s which
the circuit is associated to.
For example, if the circuit #1 Link ID... has been configured for the port LAN 1 and even for the
port LAN 2, the alarm LOS will be forwarded to the radio circuit if the alarm is present on LAN 1
or on LAN 2.
• Group. The alarm is forwarded to the radio only if the signal is present on all the ports which the
circuit is associated to.
For example, if the circuit #1 Link ID... has been configured for the port LAN 1 and even for the
port LAN 2, the alarm LOS will be forwarded to the radio circuit if the alarm is present on LAN 1
and on LAN 2.
3. To change the parameter, select the box and then select the wished value in menu.
The context shows the configuration of the LLF functionality (Link Loss Forwarding).
Ports table
Each row of the table corresponds to a port for which are indicated:
Port. Identifier of the port. The ID value is the combination between the slot number and
the port number (slot number/port number).
Read-only parameter.
Descr. Name of the port (see Tab.5).
Read-only parameter.
LLF Status. Enabling status of LLF functionality for the considered port:
• Disable. The functionality is disabled.
• Enable. The functionality is enabled.
Alarm to Circuit. Enabling status of the forwarding of LLF alarm present on the consid-
ered LAN to the radio:
• Disable. The disabled status of the local LAN is not communicated to the re-
mote equipment.
• Enable. The disabled status of the local LAN is communicated to the remote
equipment by means of the selected radio circuit.
Value meaningful only if at least one radio circuit has been created where for-
warding the signal of LOS (see area Mapped circuits on current port selection).
Delay Time. Hysteresis (in seconds) of LLF functionality in reception.
The alarm received from the radio direction (... Demodulator Fail Alarm, RADIO Link Id
Alarm) must persist for Delay Time seconds before the equipment disables the corre-
sponding LAN.
In the same way, if the LAN is disabled by LLF functionality, the radio alarm must be
cleared on the radio for Delay Time seconds before the equipment enables the considered
LAN.
Protection Mode. Propagation modality of LLF alarm:
• Disable. The LLF alarm is propagated when at least one radio is alarmed.
• Enable. The LLF alarm is propagated when all the radios are alarmed.
Selecting the heading of a column, the rows of the table are sorted in increasing alphanumeric
order with respect to the considered column and an arrow is displayed with the tip directed up-
wards. The next selection sorts the rows in decreasing order (an arrow is displayed with the tip
directed downwards) and so on.
Add. Configure the radio circuit for the forwarding of the LOS alarm present on LAN
Remove. Remove a radio circuit from the management of LLF functionality for a given
LAN
Refresh Signal Fail. Updates the alarm signal.
See also
LLF (command)
Bidirectional LLF (info)
Enable/disable the LLF functionality for a LAN
Enable/disable the forwarding of LLF alarm on the radio
Modify the hysteresis value for the LLF functionality
Modify the propagation modality of LLF alarm
Modify the forwarding of LOS alarm of a LAN to the radio
Modify the modality used to forward the alarm LOS on the radio circuit
See also
LLF (command)
LLF context
The command Queue Depth manages the depth of the output queues.
Operations
Verify the policy for the management of the depth of the queues in output
Modify the policy for the management of the depth of the queues in output
GUI
Queue Depth context
Verify the policy for the management of the depth of the queues in output
Modify the policy for the management of the depth of the queues in output
2. Press the option Activate relevant to the policy you wish to activate and confirm.
The context displays the policy for the management of the depth of the queues in output (8 queues per
port).
The Switch can insert a limited number of packets into every queue. This limit, indicated as depth, can be
configured by the user. During the period of high traffic, a queue is filled by packets waiting for the trans-
mission. When a queue reaches its limit, by default the Switch discards the packets until when the queue
is not full longer.
Parameters
Profile. Available profiles of the output queues:
• Full dynamic memory (All HW). This configuration, identical for every queue, allows
the dynamic allocation of memory per queue up to 1/8 of the total memory available
in every moment.
• Priority based memory allocation This configuration is based on the principle for which
the lower priority traffic needs longer queues. The proper forwarding of the traffic at
the different priorities (and queue) allows achieving the wished length.
• Uniform memory allocation. This configuration provides queues with constant length,
independently from the traffic priority. The use of WRED algorithms allows changing
the method used to store the different traffic types, obtaining different depths.
Buttons
Refresh. Updates the context.
See also
Queue Depth (command)
Operations
Verify the status and configuration of Link Aggregation function
Modify the allocation of memory for the Link Aggregation function
Modify the enabling of Link Aggregation function
Verify the static LAGs
Create a static LAG
Create a static LAG for protection (ELP)
Modify the configuration of a static LAG (Admin State, MTU and/or Max Ports)
Delete a static LAG
Verify the ports member of one LAG
Define the ports member of one LAG
Add/remove the ports to/from one LAG
Remove all the ports from one LAG
Verify the LACP settings for the ports member of one LAG
Modify the LACP settings for the ports member of a LAG (Activity and/or Timeout)
Verify/modify the policy for the distribution of the Ethernet traffic (Link Aggregation)
GUI
LA Manager context
See also
Link Aggregation (info)
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
WARNING Operation available only if the System Control parameter has Start value.
3. Set, in the box Port Channel ID, the univocal LAG identifier (value between 1 and 65535).
4. Set, in the box Admin State, the enabling state of LAG interface:
• Disabled. The LAG interface is not enabled to the aggregation of the corresponding ports: the
interface does not transmit/receive traffic.
• Enabled. The LAG interface is enabled to the aggregation of the corresponding ports: the inter-
face transmits/receives traffic.
5. Set, in the box MTU, the maximum size in byte of the packet accepted by LAG interface (value between
46 and 12266).
7. Set, in the box Max Ports, the maximum number of ports which can be attached to the LAG (value be-
tween 2 and 8).
The best ports are maintained in active state and other ports are maintained in standby state, if the
total number of ports attached to the LAG exceeds the configured value.
8. Set, in the box Bridge Port Type, the type of ports which will be members of the LAG.
If the Bridge is in configuration:
• Customer Bridge. The LAG can aggregate ports of type Customer Bridge (port where C-TAG’s
(UNI) are observed and managed if the equipment implements a Customer Bridge).
WARNING Operation available only if the System Control parameter has Start value.
If you have created a static LAG for protection (ELP) between two optical ports, it is suggested to enable
the autonegotiation for the considered ports (see Physical Interface tab) in such a way to preserve the con-
nection in case of interruptions of the optical signal in one direction.
3. Set, in the box Port Channel ID, the univocal LAG identifier (value between 1 and 65535).
4. Set, in the box Admin State, the enabling state of LAG interface:
• Disabled. The LAG interface is not enabled to the aggregation of the corresponding ports: the
interface does not transmit/receive traffic.
• Enabled. The LAG interface is enabled to the aggregation of the corresponding ports: the inter-
face transmits/receives traffic.
5. Set, in the box MTU, the maximum size in byte of the packet accepted by LAG interface (value between
46 and 12266).
7. Set, in the box Bridge Port Type, the type of ports which will be members of the LAG.
If the Bridge is in configuration:
• Customer Bridge. The LAG can aggregate only ports of type Customer Bridge.
Port type where C-TAG’s (UNI) are observed and managed if the equipment implements a Cus-
tomer Bridge.
• Provider Bridge (802.1ad) or Provider Edge Bridge. The LAG can aggregate only ports of type
Provider Network.
Port type where S-TAG’s (NNI) are observed and managed if the equipment implements a Pro-
vider Bridge or a Provider Edge Bridge. More C-TAG’s can be present within one S-TAG.
8. Press Apply.
Modify the configuration of a static LAG (Admin State, MTU and/or Max Ports)
WARNING Operation available only if the parameter System Control has value Start and if at least one LAG
has been created.
The parameter Max Ports cannot be changed if at least one port is associated to the LAG (see LAG tab).
4. To modify the maximum number of ports which can be attached to the LAG, set, in the box Max Ports
relevant to the wished LAG, a value between 2 and 8.
If the field Max Ports contains the string [ELP], this means that the record refers to a LAG for protection
(ELP). In this case, the change of the value from [ELP] to a number between 2 and 8, besides changing
the maximum number of port, changes the LAG type: from LAG for protection (ELP), it becomes a nor-
mal aggregation LAG.
Setting the value 1 in the field Max Ports changes a normal aggregation LAG to a protection LAG (ELP).
WARNING Operation available only if the parameter System Control has value Start and if at least one LAG
has been created.
2. Select the LAG you wish to delete in the area Port Channel Interface Settings.
WARNING Operation meaningful only if at least one LAG has been created.
WARNING Operation meaningful only if at least one LAG has been created.
Operation available only for the LAG’s which no port has been assigned to and if there are free ports (ports
not associated yet to a LAG).
3. Select the LAG which you wish to associate the ports to.
4. Press New.
The parameter Port Channel ID in the New Aggregation window indicates the selected LAG.
5. Set, in the box Mode, the operating mode of the LACP protocol (Link Aggregation Control Protocol) for
the specific LAG:
• Lacp. The protocol LACP is active. The protocol manages the exchange of information with the
remote device connected to the LAG, in such a way that the Switch is synchronized with the
WARNING If a LAG for protection is selected (ELP), the parameter Mode is not meaningful and is not
available because this type of LAG uses the protocol Ethernet Line Protection to operate.
6. Select the box Ports and activate ( ) the ports you wish to become members of the LAG.
For every port, the port identifier (slot number/port number) and the port name (LAN 1, LAN 2 etc.)
are indicated.
The list will contain only the ports not associated yet to a LAG.
For a correct operation of the LAG, the selected ports must have a homogeneous configuration: same
transmission speed, same transmission mode (Full-Duplex) and same MTU.
If a LAG for protection is selected (ELP), it is necessary to select two ports. The selection of three or
more ports will generate an error message.
WARNING Operation meaningful only if at least one LAG has been created.
Ports can be added to/removed from one LAG without affecting the traffic on the LAG itself.
WARNING Operation meaningful only if at least one LAG has been created.
Modify the LACP settings for the ports member of a LAG (Activity and/or Timeout)
4. To change the time within which the LACPDU packets should be received on a port to avoid the timeout
of the aggregated Link (LACP timeout), set, in the box Timeout relevant to the wished port, the option:
• Long. The value of LACP timeout (no packet is received from the peer) is 90 seconds.
• Short. The value of LACP timeout is 3 seconds.
Operation meaningful only for LAGs that using the LACP protocol.
Verify/modify the policy for the distribution of the Ethernet traffic (Link Aggregation)
The context displays the parameters for the management of the Link Aggregation module.
Tabs
General Settings tab. Configuration parameters of the Link Aggregation module used by the
Switch.
LAG tab. List and configuration of the Ethernet ports aggregated to every LAG.
LACP tab. LACP settings for the ports member of one LAG.
Load Balancing tab. Policy for the distribution of the Ethernet traffic among the aggregated links.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
LA Manager (command)
Link Aggregation (info)
The tab displays the configuration parameters of the Link Aggregation module used by the Switch.
Parameters
MAIN
System Control. Enabling state, by the control system, of the Link Aggregation function
for the Switch:
• Start. The system activates the function Link Aggregation in the Switch: the
necessary memory is allocated for the function.
• Shutdown. The system interrupts the Link Aggregation function in the Switch:
the allocated memory is made free and available for other activities.
Default Shutdown.
LA Status. Enabling state of the Link Aggregation function:
• Enabled. Enables the Link Aggregation function in the Switch for all the ports.
• Disabled. Disables the Link Aggregation function in the Switch for all the ports.
Default Disabled.
Parameter available only if the parameter System Control has value Start.
System ID. MAC unicast address used as univocal LACP identifier of the Switch.
Default 00:00:00:00:00:00.
Read only parameter.
Parameter can be configured via CLI
Table
PORT CHANNEL INTERFACE SETTINGS
The table displays the static LAG’s (Link Aggregation Group) created by the operator.
The table will be empty if the parameter System Control has value Shutdown or if no port chan-
nel has been created.
Port Channel ID. Univocal LAG identifier.
Read only parameter.
Link Status: Status of the physical link between the LAG interface and a device in the
network:
Buttons
Add. Create a static LAG
Remove. Delete a static LAG
See also
Modify the allocation of memory for the Link Aggregation function
Modify the enabling of Link Aggregation function
Modify the configuration of a static LAG (Admin State, MTU and/or Max Ports)
LAG tab
The tab displays the list and the configuration of the Ethernet ports aggregated to each LAG.
Table
Each row of the table corresponds to one LAG.
The table will be empty if the parameter System Control has value Shutdown or if no port chan-
nel has been created (see General Settings tab).
Port Channel. LAG identifier: po<identification number>.
Read only parameter.
Ports. Identifier of the ports which are members of the specific LAG.
The ID value is a combination of slot number and the port number (slot number/port
number).
Aggregation Type. Type of LAG:
• Static: the ports are manually assigned to the LAG. They remain dedicated
LAG members until when otherwise configured.
Buttons
New. Define the ports member of one LAG
Remove. Remove all the ports from one LAG
See also
Add/remove the ports to/from one LAG
LACP tab
The tab displays the LACP (Link Aggregation Control Protocol) settings for the ports member of a LAG.
Table
Every row of the table corresponds to one Ethernet port member of a LAG.
The table will be empty if the parameter System Control has value Shutdown or if no port is
member of a LAG (see LAG tab).
Port. Port identifier.
The ID value is a combination of slot number and the port number (slot number/port
number).
Read only parameter.
Description. Name of the port (see Tab.5).
Read only parameter.
Port Channel State. Current status of the port as regards the Link Aggregation func-
tion:
• Up In Bundle. The port is an active member of a LAG (Link Aggregation
Group): it is operating and takes part to the aggregation.
• Standby. The port is a member of a LAG, but is currently in standby. It can
replace a port in malfunction in the LAG.
• Down. The port is not active or is active, but currently cannot take part to the
aggregation because of a mismatch of the information among the LAG mem-
bers.
• Up Individual. The port is operating but is not member of any LAG.
Read only parameter.
Mode. Operating mode of the LACP protocol for the port:
• LACP. The LACP protocol is active. The protocol manages the exchange of in-
formation with the remote device connected to the LAG in such a way the
Switch is synchronized with the peer to start the negotiation between the LAG
interface. The degradation or the loss of the signal on a port of the LAG is sig-
nalled to the relevant peer by the LACP protocol.
• Manual. The LACP protocol is inactive. The loss of the signal on a port of the
LAG is signalled to the relevant peer by the alarm Loss of Signal Alarm.
See also
Modify the LACP settings for the ports member of a LAG (Activity and/or Timeout)
The tab displays the policy for the distribution of the Ethernet traffic among the aggregated links to define
the load balancing.
See also
Verify/modify the policy for the distribution of the Ethernet traffic (Link Aggregation)
MAC Table
For a correct operation of the LAG’s, the learning of the addresses in the MAC Table must be
active (Global MAC Learning Status: Enable - see Basic Settings tab).
See also
LA Manager (command)
LA Manager context
Interface. It displays the trend of the traffic on the Ethernet interfaces displaying the counters of pack-
ets/bytes in input/output.
The counters are based on the standard RFC 1213 (Interfaces group) and RFC 1284 (Ethernet-like Sta-
tistics group).
The Interface command displays the trend of the traffic on the Ethernet interfaces displaying the counters
of packets/bytes in input/output
The count of a counter is cyclic and always active.
The depth of the events stored by each counter is equal to 2^32; when this limit is reached, the count
restarts from zero. In any moment, you can reset all the counters.
The counters are based on the standard RFC 1213 (Interfaces group) and RFC 1284 (Ethernet-like Statis-
tics group).
Operations
Verify the counters of the Ethernet interfaces (Interfaces group)
Reset the counters’ results (Interfaces group)
Verify the counters of the Ethernet interfaces (Ethernet-like Statistics group)
Reset the counters’ results (Ethernet-like Statistics group)
GUI
Interface context
The context displays the trend of the traffic on the Ethernet interfaces displaying the counters of packets/
bytes in input/output.
The counters are based on the standard RFC 1213 (Interfaces group) and RFC 1284 (Ethernet-like Statis-
tics group).
Tabs
Interface tab. Counters of packets/bytes in input/output (Interfaces group).
Ethernet tab. Counters of packets/bytes in input/output (Ethernet-like Statistics group).
Buttons
Help. Open the help on-line.
See also
Interface (command)
Interface tab
The tab displays the counters of the Ethernet interfaces (RFC 1213 - Interfaces group).
Table
Each row of the table corresponds to an interface for which are indicated:
Port. Port or channel identifier.
The port ID is a combination of slot and the port number (slot number/port number).
The label po<identification number> indicates a LAG (see LA Manager).
Descr. Name of the port (see Tab.5.) or LAG.
The parameter is not available for the LAGs created by WEB LCT.
The remnant rows indicate the counters (see Tab.6).
Buttons
Refresh. Update the context.
Reset Counters. Reset the counters’ results (Interfaces group).
Ethernet tab
The tab displays the counters of the Ethernet interfaces (RFC 1284 - Ethernet-like Statistics group).
Table
Each row of the table corresponds to a physical port for which are indicated:
Port. Port identifier. The ID value is a combination of slot number and the port number
(slot number/port number).
Descr. Name of the port (see Tab.5.).
The remnant rows indicate the counters (see Tab.7).
Buttons
Refresh. Update the context.
Reset Counters. Reset the counters’ results (Ethernet-like Statistics group).
Received Octects x x x x x x x x x OK
Total number of octets received
x x x x x x x x x KO
Received Errors x x x - - - - - - OK
Total number of inbound packets discarded because con-
tained errors. x x x x x x x x x KO
Transmitted Octects - - - - - - x x x OK
Total number of transmitted octets
- - - - - - - - - KO
x Counter incremented
- Counter not incremented.
* OK. Frame Check Sequence (FCS) correct.
KO. Wrong FCS against an integer number (FCS Error) or not integer number of octets (Alignment Error).
Align. Errors - - - - - - - - - OK
A count of frames received on a particular interface that
are not an integral number of octets in length and do not
pass the FCS check.
The count represented by an instance of this object is in-
cremented when the Alignment Error status is returned by
the MAC service to the LLC (or other MAC user). Received x x x x x x x x x KO
frames for which multiple error conditions obtain are, ac-
cording to the conventions of IEEE 802.3 Layer Manage-
ment, counted exclusively according to the error status
presented to the LLC.
FCS Errors - - - - - - - - - OK
A count of frames received on a particular interface that
are an integral number of octets in length but do not pass
the FCS check.
The count represented by an instance of this object is in-
cremented when the Frame Check Error status is returned
by the MAC service to the LLC (or other MAC user). Re- - - - x x x x x x KO
ceived frames for which multiple error conditions obtain
are, according to the conventions of IEEE 802.3 Layer Man-
agement, counted exclusively according to the error status
presented to the LLC.
This value does not include packets shorter than 64 bytes.
x Counter incremented
- Counter not incremented.
MNGT Port Configuration. It manages the Ethernet port reserved to supervision of the equipment.
Routing Table. It manages the Routing Table of the equipment.
The MNGT Port Configuration command manages the Ethernet port reserved to local and remote super-
vision of the equipment (management port).
Operations
Verify the configuration of the management port
Modify the IP Address/NetMask of the management port
Modify the IP Address used as Default Gateway
Modify the VLAN reserved for the in-band management
Modify the enabling status of management port
Modify the 802.1p priority for the management VLAN
Modify the DSCP value for the management VLAN
Modify the activation state of the autonegotiation for the management port
Modify the transmission speed of the management port
Modify the inversion status of the Tx and Rx lines of the management port
Modify the Bridge Port Type for the management port
Restart the auto negotiation procedure for the management port
Enable/disable the Loss of Signal Alarm for the management port
GUI
MNGT Port Configuration context
2. In the Default Gateway box, type the IP Address of the equipment used as Default Gateway.
WARNING The management VLAN must be present in the VLAN Table (see Static VLANs tab) and, in order
to operate correctly as VLAN for the In-band Management, management port must be enabled for the tran-
sit of the packets with VLAN ID equal to that of VLAN.
The VLAN can have, as Member Port, other Ethernet ports. In this case, even these ports will be used for
the contemporary transit of traffic and supervision (In-band Management).
1. Select Base Band > DCN (LAN 3) > MNGT Port Configuration.
2. In the PCP Priority box, set a value between 0 and 7 (0 = lowest priority, 7 = highest priority).
1. Select Base Band > DCN (LAN 3) > MNGT Port Configuration.
Modify the activation state of the autonegotiation for the management port
WARNING Remember that a peer-to-peer connection works properly if the two peers have set the same
autonegotiation management modality.
The values of the parameters Auto Neg. and Speed cannot be changed at the same time. First change one
of the parameters and confirm after having pressed Apply, then change the other parameter.
Modify the inversion status of the Tx and Rx lines of the management port
WARNING Operation available only if the port is disabled (Admin State - Disabled).
1. Select Base Band > DCN (LAN 3) > MNGT Port Configuration.
WARNING Operation available only if the current Bridge modality of the Switch is Provider Bridge (802.1ad)
or Provider Edge Bridge (see Bridge Mode Conf. context).
In Customer Bridge modality the port is always of type Customer Bridge.
This operation involves the re-configuration of the following port parameters to the default values: Auto
Neg., MTU and Ingress Filtering.
WARNING The alarm can be enabled/disabled using the Alarm Severity Config. command.
The only difference is that, with this operation, you intervene only on the alarm Loss of Signal of the man-
agement port while, in the context Alarm Severity Config, you intervene on the alarm Loss of Signal of all
the LANs.
Depending on the setting made in the two contexts, the alarm status will be as indicated in Tab.8.
Context
The context displays the configuration of the Ethernet port reserved to local and remote supervision of the
equipment (management port).
Parameters
IP Address. IP address of the management port.
Default Gateway. IP Address of the equipment used as Default Gateway from the management
port.
VLAN ID. VLAN reserved for the in band supervision (In-Band Management).
PHYSICAL INTERFACE
Port Alarm Report. Enabling state of the Loss of Signal Alarm for the management port:
• Disabled. Alarm disabled: the detection of the alarm is not registered in the
equipment controller and, as consequence, is not communicated to a possible
management program: as the alarm had never occurred.
• Enabled. Alarm enabled: the detection of the alarm is registered in the equip-
ment controller and, if the forwarding of the relevant trap is enabled (see
Alarm Severity Config. context), the alarm is communicated to the manage-
ment system and displayed in the current alarms and the history alarms.
Admin State. Enabling state of the management port:
• Disabled. The port is not enabled to use: the port does not transmit/receive
traffic.
• Enabled. The port is enabled to use: the port transmits/receives traffic.
The port cannot transmit/receive traffic if the physical connection does not work.
PCP Priority. 802.1p priority present in Tag VLAN of the management VLAN.
DSCP Priority. DSCP (Differentiated Services Code Point) value inserted in the heading
of the IP packets transported by the management Vlan.
Link Status. Status of the physical connection between the management port and a de-
vice in network:
• Up. The physical connection is active and ready for the traffic exchange.
• Down. The physical connection does not work: no physical connection has
been enabled or the established physical connection is not active or is defec-
tive.
Read only parameter.
Auto Neg. Activation state of the autonegotiation for the management port:
• Enabled. The autonegotiation is enabled. The port negotiates the transmission
speed with the peer at the other end of the Link, in order to find the optimal
mutual connectivity. In autonegotiation, the Full Duplex modality without flow
control is proposed.
• Disabled. The autonegotiation is disabled. The port uses the transmission
speed configured in the Speed box, the flow control is disabled and the oper-
ation modality is Full Duplex.
Speed. Data transmission speed of the management port.
• 100 Mb. The data transmission speed through the port is 100 Mbit/s.
• 10 Mb. The data transmission speed through the port is 10 Mbit/s.
MDI/MDIX. Inversion status of the Tx and Rx lines:
• MDI. The inversion of the Tx and Rx lines is not active (Network Interface Card
modality).
• MDIX. The inversion of the Tx and Rx lines is active (Switch modality).
• Auto. The inversion of the Tx and Rx lines is active in automatic modality.
Bridge Port Type. Type of Bridge port:
• Customer Bridge. Port where C-TAG’s (UNI), are observed and managed if the
equipment implements a Customer Bridge.
Option available only when the Switch is in Customer Bridge modality.
• Provider Network. Port where S-TAG’s (NNI) are observed and managed if the
equipment implements a Provider Bridge or a Provider Edge Bridge. More C-
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
Store. Store the values into the equipment controller.
Restart. Execute the equipment software reset.
Retrieve. Read again the values set into the equipment controller.
Restart Auto Neg. Restart the auto negotiation procedure for the management port.
See also
MNGT Port Configuration (command)
Modify the IP Address/NetMask of the management port
Modify the IP Address used as Default Gateway
Modify the VLAN reserved for the in-band management
Modify the enabling status of management port
Modify the 802.1p priority for the management VLAN
Modify the DSCP value for the management VLAN
Modify the activation state of the autonegotiation for the management port
Modify the transmission speed of the management port
Modify the inversion status of the Tx and Rx lines of the management port
Modify the Bridge Port Type for the management port
Enable/disable the Loss of Signal Alarm for the management port
WARNING When all pieces of equipment belongs to the same IP network and sending packets to other net-
works is not necessary, the Routing Table must not be necessarily defined because the network can man-
age its own internal traffic. Setting the Routing Table is necessary when equipment must send packets
between two different networks, then the traffic must be re-routed from a network to another one (routing
functionality of the equipment).
The Routing Table command manages the Routing Table of the equipment.
Operations
Verify the Routing Table of the equipment
Add an element to the Routing Table
Remove one or more elements from the Routing Table
GUI
Routing Table context
2. Press Add.
3. Into the Destination box, type the IP Address of the IP network or of the destination element.
4. Into the Subnet Mask box, type the mask for the destination IP network.
5. Set, in Next Hop box, the type of the next element by which the IP network or the destination element
can be reached:
• Interface. Local interface to the equipment, where the management traffic is routed via VLAN
(see MNGT Port Configuration context).
This element is mandatorily associated to the routing via VLAN.
• Gateway. Network element which allows reaching a remote network.
6. If, in the step before, the selected value is Gateway, set the IP address of the Gateway equipment for
the destination network in the Gateway box.
7. Set, in the Distance box, the metric value of the destination (value between 1 and 254).
The context shows the Routing Table currently used by the equipment.
Table
Each row of the table corresponds to an item of the Routing Table for which are indicated:
Destination. IP address of the IP network or of the destination element.
Gateway. IP address of the equipment that acts as Gateway.
Parameter not meaningful for the elements relevant to the equipment local interfaces
(VLAN).
Subnet Mask. IP NetMask of the IP network or of the destination element.
Interface. Equipment local interface (VLAN) by which the IP network of the destination
element can be reached (see MNGT Port Configuration context.
Parameter not meaningful for the elements which identify the Gateway.
Distance. Metric value of the destination.
Protocol. Modality of connection (direct or indirect) between the equipment and desti-
nation IP network or element:
• Connected. The IP network or the element are directly connected to the equip-
ment interface. The IP network or the element are automatically inserted by
the equipment software according to their own IP address and NetMask.
• Static. The IP network or the element are not directly reachable from the
equipment interfaces. The IP network or the element have been manually in-
serted by the user (static element).
Selecting the heading of the Distance column, the rows of the table are sorted in increasing al-
phanumeric order with respect to the considered column and an arrow is displayed with the tip
directed upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
Buttons
Apply. Not available in this context.
Refresh. Update the context.
Help. Open the help on-line.
See also
Routing Table (command)
The Synchronisation command manages the sources and the outputs of synchronism
Operations
T0 SYNCHRONISM
SYNCHRONISM SOURCES
GUI
Synchronisation context
See also
Synchronisation (info)
1. Select Synchronisation.
The General tab displays the configuration parameters and the alarms status of the T0 synchronism.
1. Select Synchronisation.
The Status Control parameter indicates the status of T0 synchronism:
3. Press Apply.
Only if you are activating the forcing (selection of the Free Running or Hold Over option) a message
warns that you are executing a forcing and displays the current setting of timeout.
1. Select Synchronisation.
The Hold Off Time parameter indicates the time (expressed in ms) during which the system keeps the
evaluated frequency of an invalid synchronism source (absent or degraded).
At the end of the Hold Off time, the invalid source will be rejected and it will be used the first input
source having a valid signal.
2. To change the parameter, set into the box a value between 300 and 1800 msec.
1. Select Synchronisation.
The WTR Time parameter indicates the time (expressed in minutes) that has to pass in such a way to
allow to the selected input source having a valid signal to be really used within the process for the se-
lection of T0 synchronism.
1. Select Synchronisation.
The LTI Set Time and LTI Reset Time parameters point out the threshold level of LTI alarm (Timing
Synk Loss Alarm):
• LTI Set Time. Threshold value - expressed as number of consecutive seconds with the presence
of the LTI alarm - over which the system activates the alarm itself.
• LTI Reset Time. Threshold value - expressed as number of consecutive seconds without the
presence of the LTI alarm - over which the system deactivates the alarm itself.
2. To change the parameter, set the new values in the specific boxes (allowed interval between 0 and 60
seconds).
WARNING Operation available only if the Sync Quality management feature is enabled (see Equipment Fea-
tures tab).
1. Select Synchronisation.
The parameter Status indicates the status of use of the source quality level as criterion to select the
synchronism:
• On. Use enabled.
• Off. Use disabled.
WARNING Before disabling the synchronisation management (all the sources Dis.), it is suggested to tem-
porarily force the status of synchronism T0 to Free Running (and then reset it to Locked) to avoid the oc-
currence of the alarms BASE BAND Sets T0 Fail Alarm and BASE BAND Sets Holdover Status (see Force
the status of the T0 synchronisation).
1. Select Synchronisation.
1. Select Synchronisation.
1. Select Synchronisation.
3. To enable the use of a source, select the specific Priority box and then a number between 1 and 9 ac-
cording to the desired priority level to assign to the source (1: maximum priority, 9: minimum priority).
WARNING Operation available only if the use of the synchronism source is active.
1. Select Synchronisation.
3. To change the priority level of a source, select the specific Priority box and then a number between 1
and 9 according to the desired priority level to be assigned to the source (1: maximum priority, 9: min-
imum priority).
Pressing Revert changes cancels all the changes executed.
1. Select Synchronisation.
WARNING Operation meaningful only if the use of the synchronism source is active.
1. Select Synchronisation.
WARNING Operation available only if the use of the quality, as criterion for the selection of the synchro-
nism, is enabled.
1. Select Synchronisation.
3. To change the parameters, select the Ovw Rx Qlty or Ovw Tx Qlty box and than the option:
• none. The quality of the synchronism source is not forced. The quality is that taken from the
SSM messages i enabled (see Quality of synchronism source).
• PRC. The source quality complies with the G.781/G.8264 ITU-T Recom. that defines the param-
eters of the primary reference clock.
• SSUT. The source quality complies with the G.781/G.8264 ITU-T Recom. that defines the pa-
rameters of the transit synchronism units.
• SSUL. The source quality complies with the G.781/G.8264 ITU-T Recom. that defines the pa-
rameters of the local synchronism units.
• SEC. The source quality complies with the G.781/G.8264 ITU-T Recom. that defines the param-
eters of the equipment clock.
• DNU. The source has not to be used for the synchronization.
Pressing Revert changes cancels all the changes executed.
1. Select Synchronisation.
3. Select the source, with valid signal, whose availability you wish to restore for the generation of T0 syn-
chronism.
4. Press Wtr Clear and confirm.
The source is immediately used for the generation of T0 synchronism. The period Wtr Time is consid-
ered elapsed.
WARNING Operation available only if the use of the quality, as criterion for the choice of the synchronism,
is enabled.
1. Select Synchronisation.
3. To change the management of the SSM messages, in the SSM Enable box in corresponding of the
wished LAN, select the option:
• On. The SSM messages are managed by the LAN.
• Off. The messages are not managed.
Pressing Revert changes cancels all the changes executed.
4. Press Apply changes and confirm.
1. Select Synchronisation.
3. To modify the direction of a LAN, select the relevant box in the Role column and then one of the fol-
lowing option:
• Slave. The line synchronism is generated with the clock retrieved from the line (Loop Time).
• Master. The line synchronism is generated starting from the local clock.
• Auto. The assignment of role Master or Slave of the line synchronism is automatically managed
by SSM independently from the setting of the port parameters.
Pressing Revert changes cancels all the changes executed.
The context displays status and configuration of the sources and the outputs of synchronism.
Tabs
General tab. Configuration and alarms status of the T0 synchronism.
T0 tab. Configuration and status of the synchronism sources.
LAN SSM tab. Enabling status of the SSM messages for the traffic LAN’s.
1000Base-T Role tab. Role of the LAN synchronism sources.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Synchronisation (command)
Synchronisation (info)
General tab
The tab displays the configuration parameters and the alarms status of the T0 synchronism.
Parameters
ALARMS
Alarms status of the T0 synchronism. The colour of each box displays the status of the
specific alarm:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the
Critical, Major, Minor, Warning severity.
• Green. Alarm activated coupled with the Status severity.
• Grey. Alarm deactivated.
SETTINGS
Status Control. Status of T0 synchronism:
• Free Running. The status of Free Running is forced (synchronism T0 is gener-
ated by the equipment internal reference - Internal Source).
• Hold Over. The status of Hold Over is forced.
• Locked. The synchronism is locked to an external source.
TIME
Hold Off Time. Time (expressed in ms) during which the system keeps the evaluated
frequency of an invalid synchronism source (absent or degraded). At the end of the Hold
Off time, the invalid source will be rejected and it will be used the first input source having
a valid signal.
WTR Time. Time (expressed in minutes) that has to pass in such a way to allow to the
selected input source having a valid signal to be really used within the process for the
selection of T0 synchronism.
LTI Set Time / LTI Reset Time. Threshold level of LTI alarm (TimingSynkLossAlarm):
• LTI Set Time. Threshold value - expressed as number of consecutive seconds
with the presence of the LTI alarm - over which the system activates the alarm
itself.
• LTI Reset Time. Threshold value - expressed as number of consecutive sec-
onds without the presence of the LTI alarm - over which the system deacti-
vates the alarm itself.
See also
Force the status of the T0 synchronisation
Set the Hold Off Time parameter
Set the WTR Time parameter
Set the threshold levels of the LTI alarm
Enable/disable the use of the source quality as criterion to select the synchronism
T0 tab
The tab displays the Configuration and status of the synchronism T0.
Table
Every row of the table corresponds to one source for which are indicated:
Name. Synchronism source name (see Tab.9).
Read only parameter.
Source. Not meaningful in this context.
Priority. Status and priority use of the source:
• Dis. The synchronism source is not used.
• <1 ÷ 9>. The synchronism source is enabled and has a priority level pointed
out by the number (1: maximum priority, 9: minimum priority).
WARNING If all the sources are disabled, the synchronisation management is disabled.
Forced Switch. Forced use of the source:
• Off. The source has not been manually forced for the generation of the T0 syn-
chronism.
• On <light blue box>. The source has been manually forced for the generation
of the T0 synchronism (Manual Operation).
Preferential Switch. Status of preferential usage of the source:
• Off. The synchronism source is not preferential as opposed to the other ena-
bled synchronism sources.
The Rx Quality, Tx Quality, Ovw Rx Qlty and Ovw Tx Qlty parameters are present only if the use of
the quality, as criterion for the choice of the synchronism, is enabled.
The source of synchronism whose row has red border indicates the source which the equipment ex-
tracts the synchronization T0 from.
When the source, which the synchronization is extracted from, changes, the row relevant to the new
source will become yellow and will blink before becoming of color sky-blue with red border.
Buttons
Refresh. Update the context.
Apply changes. Confirm the changes.
Revert changes. Cancel the changes not confirmed yet.
See also
Verify/modify the management of synchronisation
Enable/disable the use of a synchronism source
Modify the use priority of a synchronism source
Force the use of a synchronism source
Set a synchronism source as preferential
Force the quality level in input and/or output of a synchronism source
WARNING Tab available only if the use of the quality, as criterion for the choice of the synchronism, is en-
abled.
The tab shows the enabling status of the SSM messages for the traffic LAN’s.
Table
Every row of the table corresponds to a LAN for which are indicated:
Port. Identifier of the port. The value ID is the combination of the slot number and the
port number (slot number/port number).
Read only parameter.
Description. Name of the port (see Tab.5.).
Read only parameter.
Media. Type of interface:
• Copper. Ethernet port with electrical interface.
• Fiber. Ethernet port with optical interface.
• ---. Parameter not meaningful for the port (for example, Radio port).
Read only parameter.
SSM Enable. Management status of the SSM messages for the equipment LAN’s:
• On. The SSM messages are managed by the LAN.
• Off. The messages are not managed.
Rx Pkts. Number of packets received on the corresponding port.
Read only parameter.
Tx Pkts. Number of packets transmitted by the corresponding port.
Read only parameter.
Rx Dropped Pkts. Number of packets dropped among those received on the corre-
sponding port.
Read only parameter.
Rx Errored Pkts. Number of errored packets among those received on the correspond-
ing port.
Read only parameter.
Buttons
Refresh. Update the context.
Apply changes. Confirm the changes.
Revert changes. Cancel the changes not confirmed yet.
See also
Verify/modify the management of SSM messages
The tab displays the direction of the line synchronism for the LAN’s with electrical interface.
Table
Every row of the table corresponds to a LAN for which are indicated:
Port. Identifier of the port. Identifier of the port. The value ID is the combination of the
slot number and the port number (slot number/port number).
Read only parameter.
Description. Name of the port (see Tab.5).
Read only parameter.
Media. Type of interface:
• Copper. Ethernet port with electrical interface.
Read only parameter.
Role. Line synchronism direction for the LAN’s with electrical interface displayed in the
table:
• Slave. The line synchronism is generated with the clock retrieved from the line
(Loop Time).
• Master. The line synchronism is generated starting from the local clock.
• Auto. The assignment of role Master or Slave of the line synchronism is auto-
matically managed by SSM independently from the setting of the port param-
eters.
Buttons
Refresh. Update the context.
Apply changes. Confirm the changes.
Revert changes. Cancel the changes not confirmed yet.
See also
Verify/modify the line synchronism direction of the LAN’s
Topics
Management of synchronisation
Synchronism sources
Enabling of the synchronism sources
Priority of the synchronism source
Quality of synchronism source
Forcing of a synchronism source
Function of preferential synchronism source
Internal synchronism T0
See also
Synchronisation (command)
Synchronisation context
Management of synchronisation
Synchronism sources
TE LAN 1 LAN Eth Source extracted from the LAN 1 of Ethernet Switch
TE LAN 2 LAN Eth Source extracted from the LAN 2 of Ethernet Switch
TE LAN 3 LAN Eth Source extracted from the LAN 3 of Ethernet Switch
TE LAN 4 LAN Eth Source extracted from the LAN 4 of Ethernet Switch
Internal - Source extracted from an its own internal reference (25MHz STRA-
TUM 3e)
A synchronism source, in order to be used, must be enabled by the user (see Enable/disable the use of a
synchronism source).
A priority level can be associated to every synchronism source (see Modify the use priority of a synchronism
source).
The source with the highest priority level and whose signal is valid, is used to synchronize the equipment
(if a forcing or a preferential source is not active).
The priority level of the synchronism source is pointed out by a number between 1 and 9, where 1 indicates
the highest priority and 9 the lowest one.
Generally the equipment takes the synchronism from the source with the highest priority level: if this
source is missing or is degraded, the synchronism is taken from the source with priority level immediately
lower.
When the source with highest priority level returns to be valid, the equipment after the WTR time will au-
tomatically start to use it to take the synchronism. If all the synchronism sources (set by the user) become
unavailable, the equipment automatically takes the synchronism from its own internal reference.
The degradation of the signal is caused by the presence of, at least, one of the following conditions:
• The source is not physically present.
• The difference between the source frequency and the internal reference source (STRATUM 3e)
is greater than ± 7 ppm.
If two or more sources with the same priority are activated, these sources will be inserted into a circular
and not Revertive list.
Depending on the type of synchronism source, the modality used to insert and extract the SSM messages
changes as pointed out here below.
Type of LAN’s on SSM messages Line synchronism Quality management Quality management
the equipment management direction (role) * in input (Rx) in output (Tx)
LAN with electrical Enable Role dynamically Quality value (SSM) is ex- The quality value of T0 or
interface managed by the tracted from the received DNU (if T0 is derived from
system packet the considered LAN) is in-
serted in the transmitted
packet.
Disable Role set by Quality value is DNU SSM messages are not
operator ** transmitted
LAN with optical Enable Quality value (SSM) is ex- The quality value of T0 or
interface tracted from the received DNU (if T0 is derived from
- packet the considered LAN) is in-
serted in the transmitted
packet.
WEB LCT
As regards the quality management via the GUI, it is possible:
Enable/disable the use of the source quality as criterion to select the synchronism
Force the quality level in input and/or output of a synchronism source
Verify/modify the management of SSM messages
Verify/modify the line synchronism direction of the LAN’s
WARNING The quality of the synchronism sources is a feature subjected to enabling (Sync quality man-
agement equipment feature).
If this feature is not enabled, all the parameters relevant to the quality management will not be available
(see Equipment Features tab).
This function foresees the user can force the selection of one synchronism source (see Force the use of a
synchronism source).
This function must not be used for the normal operation of the synchronism. It is a maintenance operation
and remains active until the user disables it or the Timeout period of the manual operations expires (if set).
This function foresees the choice of a source to use as preferential among those enabled (see Set a syn-
chronism source as preferential).
When the function of preferential source is not active, the internal synchronism is taken from the enabled
source with highest priority.
When the function of preferential source is activated for a source, this source will be used (in absence of
alarms causing its degradation or forced sources) to take the internal synchronism independently from its
priority level.
This condition is maintained until when the user disables the function of preferential source or the source
signal becomes degraded.
Internal synchronism T0
The synchronism source, which the internal synchronism T0 is extracted from, is determined by the SETS
of the equipment according to the following order of criteria:
• Status of the source (enabled/disabled)
• Forcing of the source
• Status of the signal (valid/degraded)
• Preferential source
• Source priority
The user can force the status of the internal synchronism T0 (see Force the status of the T0 synchronisa-
tion).
The forcing of the status Hold Over or Free Running is not the normal operation of the synchronism T0.
These forcings are maintenance operations and remain active until when the user does not disable them
or the Timeout period of the manual operation expires (if set).
WARNING Option available only for equipment with at least one Radio Link defined.
WARNING Command available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 or 2+0 XPIC configuration is present the Radio Branch com-
mand. For the 2+0 XPIC configuration, the parameters present in the context refer both to transceiver A
and transceiver B.
For the equipment in 2x(1+0) radio configuration the commands Radio Branch TRX A (transceiver A pa-
rameters) and Radio Branch TRX B (transceiver B parameters) are present.
Operations
Verify/modify the duplex frequency (Dplx Freq)
Verify/modify the frequency which the equipment transmitter is tuned on (Tx Freq)
Verify/modify the resolution of the received power (Prx) (Measurements Resolutions)
Verify/modify the resolution of the transmitted power (Ptx) (Measurements Resolutions)
Verify/modify the functioning status of the ATPC (Tx Power Control)
Verify/modify the maximum output power value at the transmitter (Max Ptx)
Verify/modify the range of the ATPC regulation (ATPC Regulation)
Verify/modify the threshold of the ATPC device (ATPC Thresholds on Local PRx)
GUI
Radio Branch context
WARNING Setting the parameter does NOT automatically modify even the RF frequency of remote equip-
ment.
Before setting the transmission frequency of the equipment, set the duplex frequency value.
WARNING Asymmetrical configuration of the Radio Link between local and remote equipment, as regards
the value of Ptx / modulation, are not supported.
3. To change the parameter, move the cursor on the wished value. If you wish to set the maximum value
of available range, activate the box ATPC Full Range.
WARNING Operation available only if the ATPC device is in automatic functioning mode (Tx Power Control
parameter - Automatic value).
3. To change the threshold move the High and/or Low cursor to the wished value.
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 or 2+0 XPIC configuration is present the Radio Branch com-
mand. For the 2+0 XPIC configuration, the parameters present in the context refer both to transceiver A
and transceiver B.
For the equipment in 2x(1+0) radio configuration there are the commands Radio Branch TRX A (which
opens the context area Radio Branch TRX A containing the radio parameters of transceiver A) and Radio
Branch TRX B (which opens the context area Radio Branch TRX B containing the radio parameters of
transceiver B).
Tabs
ODU Settings tab. Radio parameters: RF channel, power resolution.
ODU Powers tab. Radio parameters: ATPC.
Buttons
Apply. Confirms the changes.
Refresh. Updates the context.
Help. Opens the help on-line.
See also
Radio Branch (command)
The tab displays the radio parameters (RF channel, measurements resolutions).
Parameters
TX FREQUENCY SELECTOR
Tx Freq. Frequency of the radio transmission. The wording:
• Must be Set indicates that for the radio a channel is not planned.
• HW Fail indicates a hardware problem.
Dplx Freq. Frequency of duplex.
MEASUREMENTS RESOLUTION
Ptx. Resolution used to communicate the changes of the power transmitted by the equip-
ment (Ptx) to a possible external management program (trap Ptx change).
For instance, if the operator sets a resolution of 2 dB and the last communicated Ptx value
corresponds to 10 dBm, the equipment will communicate to the program the changing of
the transmitted power when the Ptx gets a value < 8 or > 12.
Prx. Resolution used to communicate the changes of the power received by the equip-
ment (Prx) to a possible external management program (trap Prx change).
For instance, if the operator sets a resolution of 2 dB and the last communicated PRx val-
ue corresponds to -70 dBm, the equipment will communicate to the program the chang-
ing of the transmitted power when the PRx gets a value <-72 or > -68.
Buttons
Freq. Table. Display the table of the preferential frequencies.
See also
Verify/modify the duplex frequency (Dplx Freq)
Parameters
TX POWER CONTROL
Operating status of the ATPC device:
• Manual. The ATPC device is in manual functioning mode (ATPC function disa-
ble).
• Automatic. The ATPC device is in automatic functioning mode.
Max Ptx <current value> dBm. Maximum output power value at the transmitter. The
parameter affects the ATPC device as when it is in manual functioning mode as in auto-
matic one.
ATPC Regulation <current value> dB. Range of the ATPC regulation (expressed in
dB) with respect to the current value of maximum Tx output, that is intended as the up-
per limit of the range.
Parameter available only if the ATPC device is in automatic functioning mode (Tx Power
Control parameter - Automatic value) and the box ATPC Full Range is not active.
ATPC Full Range. The active box ( ) indicates that the ATPC device operates at the
maximum limit of the range; the inactive box indicates that the maximum limit of the
ATPC device is indicated by the parameter ATPC Regulation.
Parameter available only if the ATPC device is in automatic functioning mode (Tx Power
Control parameter - Automatic value).
See also
Verify/modify the functioning status of the ATPC (Tx Power Control)
Verify/modify the maximum output power value at the transmitter (Max Ptx)
Verify/modify the range of the ATPC regulation (ATPC Regulation)
Verify/modify the threshold of the ATPC device (ATPC Thresholds on Local PRx)
WARNING Command available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration is present the S/N Meas command. For the equip-
ment with Radio Link in 2+0 XPIC configuration or equipment in 2x(1+0) radio configuration are present
the S/N Meas TRX A (transceiver A, S/N measure) and S/N Meas TRX B (transceiver B, S/N measure)
commands.
The S/N Meas command displays the measure of the signal/noise ratio (S/N), which allows evaluating the
quality of the radio communication channel.
Operations
Verify the value of the S/N measure
Update the value of the S/N measure
GUI
S/N Meas. context
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration the S/N Meas command is available which opens
the S/N Meas context.
For the equipment with Radio Link in 2+0 XPIC configuration or equipment in 2x(1+0) radio configuration
the commands S/N Meas TRX A, which opens the S/N Meas TRX A context containing the parameters
relevant to S/N measure of transceiver A, and S/N Meas TRX B, which opens the S/N Meas TRX B context
containing the parameters relevant to S/N measure of transceiver B, are available.
Parameters
S/N. Value of the signal/noise ratio.
The measure is always in progress.
Buttons
Refresh. Update the value of the S/N measure
Help. Open the help on-line.
See also
S/N Meas (command)
WARNING Command available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration is present the Radio BER command. For the equip-
ment with Radio Link in 2+0 XPIC configuration or equipment in 2x(1+0) radio configuration are present
the Radio BER TRX A (transceiver A, BER measure) and Radio BER TRX B (transceiver B, BER measure)
commands.
The Radio BER command allows verifying the quality of the signal received by the equipment.
Operations
Verify the status and the configuration parameters of Radio BER measure
Activate the measure (BER and error count)
Deactivate the measure (BER and error count)
GUI
Radio BER context
Verify the status and the configuration parameters of Radio BER measure
3. Press Apply.
A message warns that you are executing a forcing and shows the current setting of timeout.
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration the Radio BER command is available which opens
the Radio BER context.
For the equipment with Radio Link in 2+0 XPIC configuration or equipment in 2x(1+0) radio configuration
the commands Radio BER TRX A, which opens the Radio BER TRX A context containing the parameters
relevant to BER measure of transceiver A, and Radio BER TRX B, which opens the Radio BER TRX B con-
text containing the parameters relevant to BER measure of transceiver B, are available.
The context shows the status and the configuration parameters of Radio BER measure.
Parameters
GENERAL
BER. Bit Error Rate: ratio between the number of received errored bits and the number
of total received bits. BER value is dynamically updated during the measure.
Errors. Number of errors detected from the start of the measure.
Elapsed Time. Time (expressed in seconds) range after the measure active.
Synch Loss events. Number of times that the Sync Loss Alarm activated from the start
of the measure.
Sync Loss Alarm. Status of Synch Loss alarm. The colour of the box represents the
alarm status and severity:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the
Critical, Major, Minor, Warning severity.
• Green. Alarm activated coupled with the Status severity level.
• Grey. Alarm deactivated.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
(Re)Start Measure. Start or restart the measure.
See also
Radio BER (command)
Activate the measure (BER and error count)
Deactivate the measure (BER and error count)
The MAB command manages the Microwave Adaptive Bandwidth (MAB) function.
Operations
Verify the existing MAB instances
Create a MAB Monitor instance
Modify the configuration of a Monitor MAB instance
Delete one or more Monitor MAB instance
Create a MAB Sender instance
Modify the configuration of a Sender MAB instance
Delete one or more Sender MAB instances
GUI
MAB context
See also
MAB function (info)
3. In the ODU Index box, select the Ethernet port to the Radio associated with the instance (see Tab.5).
4. In the Admin Status box, select the administrative status of the instance:
• Down. Instance disabled.
• Up. Instance enabled.
5. In the Link ID box, type the value that identifies the Radio Link in the radio (number between 0 and
4294967294).
The 0 value corresponds to the non-selection of the identification.
6. In the BW Mode box, set the criterion used to calculate the band value available within every transmis-
sion period (Observ Time):
• Average. The BNM messages contain the indication of the average value of the available band
within the observation period.
• Min. The BNM messages contain the indication of the minimum value of the available band within
the observation period.
• Max. The BNM messages contain the indication of the maximum value of the available band
within the observation period.
8. In the Observ. Time (s) box, set the transmission period (in seconds) between one BNM message and
the next one (1, 10 or 60 seconds).
9. Press Apply.
The new instance is added to the list (Sensor Table area).
The message Unable to create Sensor instance 9 indicates that the maximum allowed number of MAB
Monitor instances has been already created. In this case, first it is necessary to Delete one or more
Monitor MAB instance.
2. Select the Monitor MAB instance you wish to modify (Sensor Table area).
For every single instance you can change the following parameters:
• Admin Status. Administrative status of the instance:
Double click on the wished box (Admin Status column) and set the value:
• Down. Instance disabled.
• Up. Instance enabled.
• Link ID. Value that identifies the Radio Link in the radio.
Double click on the wished box (Link ID column) and type a number between 0 and
4294967294. The 0 value corresponds to the non-selection of the identification.
• BW Mode. Criterion used to calculate the band value available within every transmission period
(Observ Time):
Double click on the wished box (BW Mode column) and set the value:
• Average. The BNM messages contain the indication of the average value of the available
band within the observation period.
• Min. The BNM messages contain the indication of the minimum value of the available
band within the observation period.
• Max. The BNM messages contain the indication of the maximum value of the available
band within the observation period.
• Holdoff Time (s). Waiting period (in seconds) before declaring Fading and starting the transmis-
sion of BNM messages.
Double click on the wished box (Holdoff Time column) and type a number between 0 and 60.
• Observ. Time (s). Transmission period (in seconds) between one BNM message and the next
one.
Double click on the wished box (Observ. Time column) and set the 1, 10 or 60 value.
WARNING A MAB Monitor instance with, at least, one MAB Sender option associated cannot be deleted.
First it is necessary to delete the MAB Sender instance and then the Monitor instance.
2. Select the MAN instance you wish to delete (Sensor Table area).
The multiple selection can be executed using the Ctrl or Shift keys.
4. Select, in the Port Index box, the identifier of the Ethernet port on line side or to the Radio, which you
wish to associate the MAB Sender instance to (see Tab.5).
The list does not contain the ports belonging to LAG (see LA Manager).
5. In the Admin Status box, select the administrative status of the instance:
• Down. Instance disabled.
• Up. Instance enabled.
6. In the VLAN ID box, type the Tag 802.1Q VLAN value (number between 0 and 4095).
7. In the User Priority box, type the 802.1p priority value (number between 0 and 7).
8. In the OAM Maint Level box, type the maintenance Level of the OAM domain (number between 0 and 7).
9. In the PDU Compliance box, select the standard which the transmitted BNM packets are in compliance
with:
• Standard. The BNM packets are compliant to the MW Capacity Management (MCM) functionality.
• Ext. The BNM packets are compliant to the Microwave Adaptive Bandwidth Extension function-
ality.
• G.8013. The BNM packets are compliant to the G.8013 /Y.1731 (OAM Functions and Mechanisms
for Ethernet based Networks) ITU-T Recom.
10.Press Apply.
The new instance is added to the list (Sender Table area).
The message Unable to create Sensor instance 9 indicates that the maximum allowed number of MAB
Monitor instances has been already created. In this case, first it is necessary to Delete one or more
Sender MAB instances.
2. Select the Sender MAB instance you wish to modify (Sender Table area).
For every single instance you can change the following parameters:
• Admin Status. Administrative status of the instance:
Double click on the wished box (Admin Status column) and set the value:
• Down. Instance disabled.
• Up. Instance enabled.
• VLAN ID. Tag 802.1Q VLAN value.
Double click on the wished box (VLAN ID column) and type a number between 0 and 4095.
The context displays the configuration of the Microwave Adaptive Bandwidth (MAB) function.
Sensor Table
The table lists the Monitor MAB instances.
Each row of the table corresponds to an instance for which are indicated:
ODU Index. Identifier of the Ethernet port to the Radio associated with the Monitor MAB
instance (see Tab.5).
Sensor Index. Value identifying univocally the instance within the MAB Sensor table.
Admin Status. Administrative status of the Monitor MAB instance:
• Down. Instance disabled.
• Up. Instance enabled.
Default Down.
Link ID. Value that identifies the Radio Link in the radio.
Default 0.
BW Mode. Criterion used to calculate the band value available within every transmission
period (Observ Time):
• Average. The BNM messages contain the indication of the average value of the
available band within the observation period.
• Min. The BNM messages contain the indication of the minimum value of the
available band within the observation period.
• Max. The BNM messages contain the indication of the maximum value of the
available band within the observation period.
Default Average.
Holdoff Time (s). Waiting period (in seconds) before declaring Fading and starting the
transmission of BNM messages.
Default 10 seconds.
Observ. Time (s). Transmission period (in seconds) between one BNM message and the
next one.
Default 10 seconds.
Nom. BW (Mbps). Rated bandwidth in transmission of the Radio connection present in
the BNM messages.
Curr. BW (Mbps). Current bandwidth in transmission of the Radio connection present
in the BNM message.
The parameter indicates the current bandwidth value detected at the moment of the con-
figuration of the MAB instance or that detected after an update of the context.
WARNING The value of Nom. BW and Curr. BW is calculated using a correction factor
equal to ETH Cap x 0,837.
The instances are listed in numerical order with respect to the column Sensor Index.
Selecting the heading of the Sensor Index column, the rows of the table are sorted in increasing
alphanumeric order with respect to the considered column and an arrow is displayed with the
tip directed upwards. The next selection sorts the rows in decreasing order (an arrow is dis-
played with the tip directed downwards) and so on.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
SENSOR TABLE AREA
See also
MAB (command)
MAB function (info)
Modify the configuration of a Monitor MAB instance
Modify the configuration of a Sender MAB instance
MAB function
The transmission capacity of the radio equipment depends on the propagation conditions of the
radio channels.
In case of Ethernet rings, the signal degradation can influence one side of the ring, while the
other side continues working at rated capacity.
In case of network congestion, the radio will give priority to the Ethernet traffic decreasing or
deleting the low priority traffic.
An analogous situation is present even in other types of network where the changes of the band-
width must be communicated to the upstream Ethernet Switches/Routers in order to adapt the
relevant traffic.
By knowing the radio connection capacity, external equipment can optimize the transport on
ring networks or select additional criteria for the quality management.
The Microwave Adaptive Bandwidth (MAB) function allows achieving optimized performances
even in the worse conditions of radio propagation as it allows forwarding the traffic on the Ether-
net ring according with the bandwidth available on each ring branch.
The function is based on a protocol used by the equipment to notify the changes in the capacity
to connect the Ethernet Switch/Router which, in turn, applies the relevant forward rules.
Notifications take place by means of messages of type E-OAM (Ethernet-Operations, Adminis-
tration and Maintenance) which signal the changes in the band availability (BNM messages -
Bandwidth Notification Message).
Through the management (transmission and reception) of these messages and the proper con-
figuration of the forwarding rules, the ring will be able to change its traffic profile to consider the
degraded path.
During the normal operation of the Radio connection, if there is no Fading, the BNM messages
are not generated.
When the transceiver detects, in the connection quality, a degraded condition which persist
more than the observation period and the equipment changes its modulation scheme, a BNM
message is generated to inform the network equipment about the signal degradation. The mes-
sage contains the indication of the rated and current bandwidth values in transmission.
Later periodical BNM messages will be transmitted for the duration of the Fading event.
At the end of the Fading event, a last BNM message will be sent where the current bandwidth
corresponds to the rated bandwidth. This message determines the interruption of the transmis-
sion of the BNM messages until the next Fading event.
In ALFOplus2 equipment, the BNM messages are forwarded according to the MAB (Monitor and
Sender) instance defined for every equipment (see next paragraph).
The transmitted BNM packets can be in compliance with the MCM (Capacity Management MW)
functionality, the MAB (Microwave Adaptive Bandwidth) extension functionality or the Recom-
mendation ITU-T G.8013 /Y.1731 (OAM Functions and Mechanisms for Ethernet based Net-
works) which you are addressed for further information.
See also
MAB (command)
MAB context
Create a MAB Monitor instance
Modify the configuration of a Monitor MAB instance
Delete one or more Monitor MAB instance
Create a MAB Sender instance
Modify the configuration of a Sender MAB instance
Delete one or more Sender MAB instances
WARNING Command available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration is present the Radio Loop & Cmd command. For
the equipment with Radio Link in 2+0 XPIC configuration or equipment in 2x(1+0) radio configuration are
present the Radio Loop & Cmd TRX A (transceiver A radio parameters) and Radio Loop & Cmd TRX B
(transceiver B radio parameters) commands.
The Radio Loop & Cmd command manages the loops, the transmitter operating status and the carrier
modulation.
Operations
Verify the digital loops status
Activate a digital loop
Deactivate a digital loop
Verify/modify the operation of the transmitter
Verify/modify the modulation status of the RF carrier
GUI
Radio Loop & Cmd context
WARNING The deactivation of a loop for one transceiver involves the automatic deactivation of the same
loop even for the other transceiver.
WARNING Switching the transmitter off (option Off) is a maintenance operation (MAN. OP).
The permanent switch-off of the transmitter (option Permanent Off) is NOT a maintenance operation, so
the selection of this value is not subjected to the Timeout of MAN. OP and the setting is not lost after a
controller restart.
For equipment with Radio Link in configuration 2+0 XPIC, switching off the power supply disabled the XPIC
Fault Management Procedure (FMP) (see Xpic context).
3. Press Apply.
Only if you are switching off the transmitter (selection of the Off option) a message warns that you are
executing a forcing and displays the current setting of timeout.
WARNING Deactivating the modulation (option On) is a maintenance operation (MAN. OP).
Before deactivating the modulation, configure the transmitter power to the minimum value.
For equipment with Radio Link in configuration 2+0 XPIC, switching off the modulation:
• Disables the XPIC Fault Management Procedure (FMP) (see Xpic context).
• Could cause interference in reception.
WARNING Context available only for equipment with at least one Radio Link defined.
For the equipment with Radio Link in 1+0 configuration the Radio Loop & Cmd command is available
which opens the Radio Loop & Cmd context.
For the equipment with Radio Link in configuration 2+0 XPIC configuration or equipment in 2x(1+0)radio
configuration there are the commands Radio Loop & Cmd TRX A (which opens the context area Radio
Loop & Cmd TRX A containing the radio parameters of transceiver A) and Radio Loop & Cmd TRX B
(which opens the context area Radio Loop & Cmd TRX B containing the radio parameters of transceiver B).
The context shows the current status of the loops, the transmitter operating status and the carrier modu-
lation.
Parameters
RADIO LOOP
Loop. Status of the loops:
• Loop OFF. No loop active.
• I/Q Loop (Traffic squelched). Digital loop executed before the modulation and
RF amplification block: traffic is not looped.
• I/Q Loop (Traffic not squelched). Digital loop executed before the modulation
and RF amplification block: traffic is looped.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Radio Loop & Cmd (command)
Activate a digital loop
Deactivate a digital loop
Verify/modify the operation of the transmitter
Verify/modify the modulation status of the RF carrier
The Manual Operations command manages the available maintenance operations (MAN. OP) with the
exception of the BER measure.
Operations
Verify the manual operations status
Turn-off/turn-on the transmitter
Disable/enable the modulation of the RF carrier
Activate/deactivate a digital loop
Disable temporarily/restore the XPIC function
Force the status of the T0 synchronisation
Force the use of a synchronism source
GUI
Manual Operations context
WARNING Operation available only for equipment with at least one Radio Link defined.
Switching the transmitter off is a MAN. OP. Before executing the operation, verify the timeout setting (see
Verify/modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the Tx is on, independently from the previous set-
ting.
The permanent turn-off of the transmitter is not a maintenance operation, so the operation is not available
in this context. To execute it see Verify/modify the operation of the transmitter.
For equipment with Radio Link in 2+0 XPIC configuration, turn off the transmitter disables the XPIC fault
management procedure (FMP) (see Xpic context).
2. To turn-off the transmitter select the Off option, press Apply and confirm.
3. To turn-on the transmitter select the On option, press Apply and confirm.
WARNING Operation available only for equipment with at least one Radio Link defined.
Deactivating the modulation of the RF carrier is a MAN. OP. Before executing the operation, verify the time-
out setting (see Verify/modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the modulation is active independently from the
previous setting.
For equipment with Radio Link in configuration 2+0 XPIC, switching off the modulation:
• Disables the XPIC Fault Management Procedure (FMP) (see Xpic context).
• Could cause interference in reception.
It is not advisable to perform the operation of Carrier Only on both transceivers. If it was however done,
it will be necessary to deactivate the operation for both the transceivers in rapid succession.
2. To disable the modulation of the RF carrier select the On value, press Apply and confirm.
3. To enable the modulation of the RF carrier select the Off value, press Apply and confirm.
WARNING Operation available only for equipment with at least one Radio Link defined.
The activation of a digital loop affects the traffic.
The activation of the I/Q Loop (traffic not squelched) loop could cause the loss of supervision.
For equipment with Radio Link in configuration 2+0 XPIC:
• The activation of a loop disables the XPIC Fault Management Procedure (FMP) (see Xpic con-
text).
• The activation of a loop I/Q... switches the local transmitter off.
In order to verify the transit of the Ethernet traffic through the loop I/Q..., the loop must be activated on
both branches.
The activation/deactivation of a loop for one transceiver involves the automatic activation/deactivation of
the same loop even for the other transceiver.
The activation of a loop is a MAN. OP. Before executing the operation, verify the timeout setting (see Verify/
modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the loop is deactive independently from the pre-
vious setting.
3. To deactivate the loop select the Loop OFF value, press Apply and confirm.
WARNING Operation available only for equipment with Radio Link in 2+0 XPIC configuration.
Disabling temporarily the XPIC function is a MAN. OP. The activation of a loop is a MAN. OP. Before exe-
cuting the operation, verify the timeout setting (see Verify/modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the XPIC function is active independently from the
previous setting.
3. To restore the XPIC function, select Enable, press Apply and confirm.
WARNING The activation of the forcing is a MAN. OP. Before executing the operation, verify the timeout
setting (see Verify/modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the forcing results inactive, independently from
the previous setting.
2. To force the status of the T0 synchronisation select the Free Running or Hold Over value, press Apply
and confirm.
3. To remove the forcing select the Locked option, press Apply and confirm.
WARNING The activation of the forcing is a MAN. OP. Before executing the operation, verify the timeout
setting (see Verify/modify the manual operation timeout).
If the equipment is switched off and, then, switched on, the forcing results inactive, independently from
the previous setting.
2. To force a source select the specific option, press Apply and confirm.
3. To remove the forcing select the Off option, press Apply and confirm.
The context shows the current status of the available maintenance operations (MAN. OP) with the excep-
tion of the BER measure.
Parameters
TRX A AND TRX B
Areas available only for equipment with at least one Radio Link defined.
The following parameters are present in every area:
Tx Transmitter. Operating status of the transmitter:
• On. The transmitter is turned on.
• Off. The transmitter is turned off.
Carrier Only. Modulation status of the RF carrier:
• On. The carrier is not modulated.
• Off. The carrier is modulated.
Radio Loop. Status of the digital loops:
• Loop OFF. No loop active.
• I/Q Loop (Traffic squelched). Digital loop executed before the modulation and
RF amplification block: traffic is not looped.
• I/Q Loop (Traffic not squelched). Digital loop executed before the modulation
and RF amplification block: traffic is looped.
Xpic. Activation of XPIC function:
• Enable. Function active.
• Disable. Function temporarily deactivated.
Parameter available only for equipment with Radio Link in 2+0 XPIC configuration.
SYNCHRONISATION
Status Control. Status of T0 synchronism:
• Free Running. The status of Free Running is forced (synchronism T0 is gener-
ated by the equipment internal reference - Internal Source).
• Hold Over. The status of Hold Over is forced.
• Locked. The synchronism is locked to an external source.
Forced Switch. Forced use of a synchronism source for the generation of the T0 syn-
chronism:
• Off. No source has been forced.
• <source name>. The use of the specific source is forced.
The list of the available sources is in Tab.9.
Buttons
Apply. Confirm the changes.
Refresh. Update the context.
Help. Open the help on-line.
See also
Manual Operations (command)
Turn-off/turn-on the transmitter
Disable/enable the modulation of the RF carrier
Activate/deactivate a digital loop
Disable temporarily/restore the XPIC function
Force the status of the T0 synchronisation
Force the use of a synchronism source
Settings. It manages the count of the RMon statistics (group Statistics and History).
Ethernet Statistics. It displays the current values of RMon statistic counters (RMon instances per Port).
Ethernet Service Statistics. It displays the current values of RMon statistic counters (RMon instances
Port & Priority and Port & VLAN).
Ethernet History. It displays the history of the RMon statistics (RMon instances per Port).
Ethernet Service History. It displays the history of the RMon statistics (RMon instances Port & Priority
and Port & VLAN).
The Settings command manages the count of the RMon statistics (group Statistics and History).
Operations
Verify the count status of the RMon statistics
Activate the count of the RMon statistics
Deactivate the count of the RMon statistics
Reset the counters’ results of the RMon statistics
STATISTICS GROUP
Set a RMon instance per Port to the count of the RMon statistics
Delete a RMon instance per Port for the count of the RMon statistics
Set a RMon instance Port & Priority or Port & VLAN to the count of the RMon statistics
Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMon statistics
HISTORY GROUP
Set a RMon instance per Port to the count of the RMON history
Delete a RMon instance per Port for the count of the RMON history
Set a RMon instance Port & Priority or Port & VLAN to the count of the RMON history
Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMON history
GUI
Settings context
See also
RMon standard (info)
WARNING Operation meaningful only if at least one RMon instance has been set.
WARNING The operation resets the current values of RMON statistic counters (see Ethernet Statistics and
Ethernet Service Statistics) and the RMon history (see Ethernet History and Ethernet Service History).
Set a RMon instance per Port to the count of the RMon statistics
WARNING The recommended maximum number of RMon instances per Port is 10.
4. Set, in the Data source box, the Ethernet port or the LAG you wish to enable for the count of the RMon
statistics for the specific instance.
The Ethernet port identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager). If a LAG is selected, the specific
instance RMon per Port will allow monitoring all the traffic in input/output in/from the ports belonging
to the LAG.
The list will display only the ports/LAGs not associated yet to any RMon per Port instance.
5. Set, in Owner box, the information relevant to the user who is enabling the instance (alphanumeric
string of 30 characters at most).
Optional parameter. If the parameter is not set, as soon as the context is updated, the system will dis-
play the wording monitor.
6. Press Apply.
The instance is added to the list.
The instance will be enabled until when deleted by the user (see Delete a RMon instance per Port for
the count of the RMon statistics).
WARNING This operation involves the loss of the values of the counters for the specific instance.
2. In the Ethernet Statistics tab, select the instance you wish to delete.
An instance per Port cannot be deleted if an instance associated to the same Ethernet port is present
in the Ethernet History tab. To delete it, it is first necessary to remove the instance per Port present in
the tab Ethernet History.
Set a RMon instance Port & Priority or Port & VLAN to the count of the RMon statistics
WARNING The recommended maximum number of RMon instance for service (instances Port & Priority +
instances Port & VLAN) is 64. Within this limit, a maximum number of 40 instances Port & VLAN is foresee.
3. Press Add.
4. Set, in Index box, a value which identifies in unique mode the port in the database table of RMon sta-
tistics (number between 1 and 65535).
It is not possible to set a value already present in the list or in the Ethernet Statistics tab.
5. Set, in the box Data source, the Ethernet port or LAG you wish to enable to the count of RMon statistics
for the specific instance.
The Ethernet port identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager). If a LAG is selected, the specific
instance RMon Port & Priority or Port & VLAN will allow monitoring all the traffic in input/output in/from
the ports belonging to the LAG.
6. Set, in Owner box, the information relevant to the user who is enabling the port (alphanumeric string
of 30 characters at most).
Optional parameter. If the parameter is not set, as soon as the context is updated, the system will dis-
play the wording monitor.
7. Set, in the box Select Service, the criterion you wish to enable to filter the traffic:
• Priority. Priority value (C-PCP in Customer Bridge, S-PCP in Provider Bridge and Provider Edge
Bridge) which the packet in input/output must have to be counted by the RMon statistics (RMon
instance Port & Priority).
• SVID. S-VID (Service VLAN Identifier) which the packet in input/output must have to be counted
by the RMon statistics (RMon instance Port & VLAN).
Value available and meaningful when the Switch is in Provider Bridge or Provider Edge Bridge
modality.
• CVID. C-VID (Customer VLAN Identifier) which the packet in input/output must have to be
counted by the RMon statistics (RMon instance Port & VLAN).
Value available and meaningful when the Switch is in Customer Bridge modality.
8. Set, in the box Priority, the priority value which the packet in input/output from the port must have to
be counted by the RMon statistics.
Value available and meaningful only if the value Priority is present in the box Select Service.
9. Set, in the box SVID, the S-VID which the packet in input/output from the port must have to be counted
by the RMon statistics.
10.Set, in the box CVID, the C-VID which the packet in input/output from the port must have to be counted
by the RMon statistics.
The set value must correspond to a VLAN ID present in the VLAN Table (see Static VLANs tab).
Parameter available and meaningful only if the value CVID is present in the box Select Service.
11.Press Apply.
The instance is added to the list.
The instance will be enabled until when deleted by the user (see Delete a RMon instance Port & Priority
or Port & VLAN for the count of the RMon statistics).
Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMon statistics
WARNING This operation involves the loss of the values of the counters for the specific instance.
Set a RMon instance per Port to the count of the RMON history
WARNING The total recommended maximum number of RMon instances for the count of the RMon history
is 74. The limit is for instances of 1 minute and 240 buckets.
3. Press Add.
4. Set, in Index box, a value which identifies in unique mode the instance in the database table of RMon
history (number between 1 and 65535).
It is not possible to set a value already present in the list or in the Ethernet Service History tab.
5. Set, in the box Data source, the Ethernet port or LAG you wish to enable for the count of the RMon
history for the specific instance.
The Ethernet port identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager). If a LAG is selected, the specific
instance RMon per Port will allow monitoring all the traffic in input/output in/from the ports belonging
to the LAG.
6. Set, in Owner box, the information relevant to the user who is enabling the RMon instance (alphanu-
meric string of 30 characters at most).
Optional parameter. If the parameter is not set, as soon as the context is updated, the system will dis-
play the wording monitor.
7. Set, in Buckets Requested, the total number of samples to collect (value between 1 and 240).
8. Set, in Persistence box, the status of automatic storing of RMon statistics on non-volatile memory:
• Disable. Automatic storing inactive.
• Enable. Automatic storing active.
9. Set, in the Interval (s) box, the sampling interval used to collect the data of the history.
If, in the previous step, the parameter Persistence has been set to:
• Disable, any value can be set, between 1 and 3600 seconds, as sampling interval.
• Enable, one of the following values can be set: 60, 300, 600, 900, 1200, 1800 or 3600 seconds.
The minimum recommended value is 60 seconds.
10.Press Apply.
The message Ethernet Statistics for <port name> are not present, they will be created automatically?
indicates that, for the Ethernet port selected at step 5, there is not an analogous instance in the Ether-
net Statistics tab. Press OK to continue the operation.
The instance is added to the list.
The instance will be enabled until when deleted by the user (see Delete a RMon instance per Port for
the count of the RMON history).
In the Ethernet Statistics tab, an instance per Port is automatically created with the following charac-
teristics:
• Index. First value Index free in the table of the current RMon statistics of the database.
• Data Source and Owner. Respectively Ethernet port and user of the instance per Port just cre-
ated for the count of the RMon statistics.
Delete a RMon instance per Port for the count of the RMON history
WARNING This operation involves the loss of the values of the counters for the specific instance.
Set a RMon instance Port & Priority or Port & VLAN to the count of the RMON history
WARNING The total recommended maximum number of RMon instances for the count of the RMon history
is 74. The limit is for instances of 1 minute and 240 buckets.
3. Press Add.
4. Set, in Index box, a value which identifies in unique mode the instance in the database table of RMon
history (number between 1 and 65535).
It is not possible to set a value already present in the list or in Ethernet History tab.
5. Set, in the box Data source, the Ethernet port or LAG you wish to enable for the count of the RMon
history for the specific instance.
6. Set, in Owner box, the information relevant to the user who is enabling the instance (alphanumeric
string of 30 characters at most).
Optional parameter. If the parameter is not set, as soon as the context is updated, the system will dis-
play the wording monitor.
7. Set, in Buckets Requested, the total number of samples to collect (value between 1 and 240).
The equipment stores these data in a circular buffer, where the new information in input overwrites the
old one.
The recommended maximum value of bucket for all the instances is 2400.
8. Set, in Persistence box, the status of automatic storing of RMon statistics on non-volatile memory:
• Disable. Automatic storing inactive.
• Enable. Automatic storing active.
9. Set, in the Interval (s) box, the sampling interval used to collect the data of the history.
If, in the previous step, the parameter Persistence has been set to:
• Disable, any value can be set, between 1 and 3600 seconds, as sampling interval.
• Enable, one of the following values can be set: 60, 300, 600, 900, 1200, 1800 or 3600 seconds.
The minimum recommended value is 60 seconds.
10.Set, in the box Select Service, the criterion you wish to use to filter the traffic:
• Priority. Priority value (C-PCP in Customer Bridge, S-PCP in Provider Bridge and Provider Edge
Bridge) which the packet in input/output from the port must have to be counted in the RMON
history (RMon instance Port & Priority).
• SVID. S-VID (Service VLAN Identifier) which the packet in input/output from the port must have
to be counted in the RMon history (RMon instance Port & VLAN).
Value available and meaningful when the Switch is in Provider Bridge or Provider Edge Bridge
modality.
• CVID. C-VID (Customer VLAN Identifier) which the packet in input/output from the port must
have to be counted in the RMon history (RMon instance Port & VLAN).
Value available and meaningful when the Switch is in Customer Bridge modality.
11.Set, in the box Priority, the priority value which the packet in input/output from the port must have to
be counted in the RMon history.
Value available and meaningful only if the value Priority is present in the box Select Service.
12.Set, in the box SVID, the S-VID which the packet in input/output from the port must have to be counted
in the RMon history.
The set value must correspond to a VLAN ID present in the VLAN Table (see Static VLANs tab).
Parameter available and meaningful only if the value SVID is present in the box Select Service.
13.Set, in the box CVID, the C-VID which the packet in input/output from the port must have to be counted
in the RMon history.
The set value must correspond to a VLAN ID present in the VLAN Table (see Static VLANs tab).
Parameter available and meaningful only if the value CVID is present in the box Select Service.
14.Press Apply.
The message Ethernet Service Statistics for <port name> with <priority or identifier> is not present,
will be created? indicates that, for the selected Ethernet port and priority or C-VID/S-VID there is not
an analogous instance in the Ethernet Service Statistics tab. Press OK to continue the operation.
The instance is added to the list.
The instance will be enabled until when deleted by the user (see Delete a RMon instance Port & Priority
or Port & VLAN for the count of the RMON history).
In the tab Ethernet Service Statistics, an instance is automatically created with the following charac-
teristics:
• Index. First value Index free in the table of the RMon history of the database.
• Data Source, Owner, Priority or C-VID/S-VID. Respectively Ethernet port, user, priority or VLAN
identifier of the instance just created for the count of the RMon history.
WARNING This operation involves the loss of the values of the counters for the specific instance.
This context shows the status and RMon instances enabled for the count of the RMon statistics (group Sta-
tistics and History).
Tab
Ethernet Statistics tab. RMon instances per Port (Statistics group).
Ethernet History tab. RMon instances per Port (History group).
Ethernet Service Statistics tab. RMon instances Port & Priority and Port & VLAN (Statistics
group).
Ethernet Service History tab. RMon instances Port & Priority and Port & VLAN (History group).
Parameters
RMON Status. Status of the count of the statistics and of the history of the statistics for all the
RMon instance set by the user:
• Enabled. The count is active.
• Disabled. The count is not active.
Buttons
Refresh. Updates the context.
Help. Open the help on-line.
Reset Counters. Reset the counters’ results of the RMon statistics
See also
Settings (command)
RMon standard (info)
Activate the count of the RMon statistics
Deactivate the count of the RMon statistics
The tab shows the RMon instances per Port enabled for the count of the RMon statistics (group Statistics).
Table
Every row of the table corresponds to one instance for which are indicated:
Index. Value which identifies in unique mode the instance in the database table of the
RMon statistics.
Data source. Identifier of the Ethernet port or LAG enabled to the count of the RMon
statistics for the specific instance.
The identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Owner. Information relevant to the user who has enabled the instance.
Selecting the heading of the Index column, the rows of the table are sorted in increasing alpha-
numeric order with respect to the considered column and an arrow is displayed with the tip di-
rected upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
The selection of present in the header of each column, shows the following commands:
Sort Ascending. Sort in ascending order (from lowest to greatest value) the rows of the
table with respect to the value present in the specific column.
Command available only for Index column.
Sort Descending. Sort in descending order (from greatest to lowest value) the rows of
the table with respect to the value present in the specific column.
Buttons
Add. Set a RMon instance per Port to the count of the RMon statistics
Remove. Delete a RMon instance per Port for the count of the RMon statistics
The tab shows the RMon instances per Port enabled for the count of the history of the RMon statistics
(group History).
Table
Every row of the table corresponds to one instance for which are indicated:
Index. Value which identifies in unique mode the RMon instance in the database table
of history of RMon statistics.
Data source. Identifier of the Ethernet port or LAG which the RMon instance enabled to
the count of the RMon statistics history is associated to.
The identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Owner. Information relevant to the user who has created the instance.
Buckets Requested. Total number of samples to collect. The equipment stores these
data in a circular buffer, where the new information in input overwrites the old one.
Persistence. Status of automatic storing of RMon statistics on non-volatile memory:
• Disable. Automatic storing inactive.
• Enable. Automatic storing active.
Interval (s). Sampling interval (in seconds) used to collect the data of the statistics his-
tory.
Selecting the heading of the Index column, the rows of the table are sorted in increasing alpha-
numeric order with respect to the considered column and an arrow is displayed with the tip di-
rected upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
The selection of present in the header of each column, shows the following commands:
Sort Ascending. Sort in ascending order (from lowest to greatest value) the rows of the
table with respect to the value present in the specific column.
Command available only for Index column.
Sort Descending. Sort in descending order (from greatest to lowest value) the rows of
the table with respect to the value present in the specific column.
Command available only for Index column.
Columns. Activate ( ) or deactivate ( ) the display of a column in the table.
Buttons
Add. Set a RMon instance per Port to the count of the RMON history
Remove. Delete a RMon instance per Port for the count of the RMON history
The tab shows the RMon instances Port & Priority and Port & VLAN enabled for the count of the RMon sta-
tistics (group Statistics).
Selecting the heading of the Index column, the rows of the table are sorted in increasing alpha-
numeric order with respect to the considered column and an arrow is displayed with the tip di-
rected upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
Buttons
Add. Set a RMon instance Port & Priority or Port & VLAN to the count of the RMon statistics
Remove. Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMon sta-
tistics
The tab shows the RMon instances Port & Priority and Port & VLAN enabled for the count of the history of
the RMon statistics (group History).
Table
Every row of the table corresponds to one instance for which are indicated:
Index. Value which identifies in unique mode the instance in the database table of his-
tory of RMon statistics.
Data source. Identifier of the Ethernet port or LAG enabled to the count of the history
of RMon statistics for the specific instance.
The identifier is a combination of slot number and the port number (slot number/port
number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Owner. Information relevant to the user who has created the instance.
Buckets Requested. Total number of samples to collect. The equipment stores these
data in a circular buffer, where the new information in input overwrites the old one.
Persistence. Status of automatic storing of RMon statistics on non-volatile memory:
• Disable. Automatic storing inactive.
• Enable. Automatic storing active.
Interval (s). Sampling interval (in seconds) used to collect the data of the statistics his-
tory.
Priority. Priority value (C-PCP in Customer Bridge, S-PCP in Provider Bridge and Provider
Edge Bridge) of the packet in input/output from the port.
Value meaningful for RMon instances Port & Priority.
SVID. S-VID (Service VLAN Identifier) of the packet in input/output from the port.
Selecting the heading of the Index column, the rows of the table are sorted in increasing alpha-
numeric order with respect to the considered column and an arrow is displayed with the tip di-
rected upwards. The next selection sorts the rows in decreasing order (an arrow is displayed
with the tip directed downwards) and so on.
Buttons
Add. Set a RMon instance Port & Priority or Port & VLAN to the count of the RMON history
Remove. Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMON his-
tory
RMon Standard
RMon (Remote Monitoring) is a standard whose function is providing a set of services of statistics
count, monitoring and alarm report with reference to the activity of a LAN network.
These services are defined in terms of MIB (Management Information Base) group described in
the document RFC2819 - Remote Network Monitoring Management Information Base, which
must be read for any further detail.
Limits
Instances per Port & VLAN per Port & Priority per Port
Limit 74
Limit 64
Limit 40
Instances per Port & VLAN per Port & Priority per Port
74
Limits min 1 minutes
max 240 bucket each
WARNING If the number of created instances is the recommended one or lower, but the pro-
cessing requires a time greater than that defined in one’s browser for the script processing, the
WEB LCT page displays a warning window.
The window contains the buttons to continue the script processing or to stop it (see the docu-
mentation relevant to one’s browser).
In this case, the use of CLI interface (application SM-OS) to display the counters or the enabling
of the Persistence function (automatic archive of RMon statistics non volatile memory) and the
export via FTP of the results on CSV file are suggested.
See also
Settings (command)
Ethernet Statistics (command)
The command Ethernet Statistics displays the current values of the RMon statistic.
The traffic is analyzed subdivided per Ethernet port (RMon instances per Port).
Operations
Display the values of the RMon statistic counters (RMon instances per Port)
GUI
Ethernet Statistics context
See also
RMon standard (info)
Display the values of the RMon statistic counters (RMon instances per Port)
WARNING Operation meaningful only if at least one Ethernet port is enabled for the count and if the count
of the RMon statistics is active (see Set a RMon instance per Port to the count of the RMon statistics and
Activate the count of the RMon statistics).
The context displays the current values of the RMon statistic counters (RMon instances per Port).
Table
Counters. The first rows indicate the characteristics of the RMon instance:
• Index. Value which identifies in unique mode the instance in the database table of the
RMon statistics.
• Owner. User who has enabled the instance.
The remnant rows indicate the RMon counters (see Tab.11).
<Interface>. Identifier of the Ethernet port or LAG enabled to the count of RMon statistics for
the specific RMon instance per Port.
The Ethernet port identifier is a combination of slot number and the port number (slot number/
port number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Every port/LAG (RMon instance) corresponds to a column where the results of the relevant RMon
counters are displayed.
Buttons
Help. Open the help on line.
Refresh. Update the table of counters.
See also
Ethernet Statistics (command)
RMon standard (info)
Drop Events - - - - - - - - - OK
Number of dropped packets **
- - - - - - - - - KO
Octets x x x x x x x x x OK
Number of received octets
x x x x x x x x x KO
Pkts x x x x x x x x x OK
Number of received packets
x x x x x x x x x KO
BroadcastPkts - - - - - - - x - OK
Number of packets received directed to the broadcast ad-
dresses - - - - - - - - - KO
MulticastPkts - - - - - - - - x OK
Number of packets received directed to a multicast addresses
- - - - - - - - - KO
UndersizePkts x x x - - - - - - OK
Number of Undersize packets received
- - - - - - - - - KO
OversizePkts - - - x x x - - - OK
Number of Oversize packets received
- - - x x x - - - KO
Fragments - - - - - - - - - OK
Number of Undersize packets received
x x x - - - - - - KO
Pkts 65 to 127 - - - - - - x x x OK
Number of packets transmitted/received with length between
65 and 127 octets - - - - - - x x x KO
** Packets are discarded after the exhaustion of the local memory resources. This value is not necessarily
the absolute number of discarded packets, as it represents only the number of times that this condition
occurred after the exhaustion of the memory resources; the packets can be discarded also for other rea-
sons. This value does not include Output Dropped Frames.
The command Ethernet Service Statistics displays the current values of RMon statistic counters.
The analysed traffic is filtered according to the input/output port and the packet characteristics: value of
User Priority (RMon instances Port & Priority) or C-TAG identifier or S-TAG identifier (RMon instances Port
& VLAN).
Operations
Display the values of the RMon statistic counters (RMon instances Port & Priority and Port &
VLAN)
GUI
Ethernet Service Statistics context
See also
RMon standard (info)
Display the values of the RMon statistic counters (RMon instances Port & Priority and Port &
VLAN)
WARNING Operation meaningful only if at least one RMon instance is enabled for the count and if the count
of the RMon statistics is active (see Set a RMon instance Port & Priority or Port & VLAN to the count of the
RMon statistics and Activate the count of the RMon statistics).
The context displays the values of the RMon statistic counters (RMon instances Port & Priority and Port &
VLAN).
Table
Counters. The first rows indicate the characteristics of the RMon instance:
• Index. Value which identifies in unique mode the instance in the database table of the
RMon statistics.
• Owner. User who has enabled the RMon instance.
• Priority. Priority value (C-PCP in Customer Bridge, S-PCP in Provider Bridge and Pro-
vider Edge Bridge) which the packet in input/output from the port must have to be
counted in the RMon statistics.
Value meaningful for RMon instances Port & Priority.
• SVID. S-VID (Service VLAN Identifier) which the packet in input/output from the port
must have to be counted by the RMon statistics.
Value available and meaningful for RMon instances Port & VLAN when the Switch is
in Provider Bridge or Provider Edge Bridge modality.
• CVID. C-VID (Customer VLAN Identifier) which the packet in input/output from the
port must have to be counted by the RMon statistics.
Value available and meaningful for RMon instances Port & VLAN when the Switch is
in Customer Bridge modality.
The remnant rows indicate the RMon counters (see Tab.12).
<Interface>. Identifier of the Ethernet port or LAG enabled to the count of the RMon statistics
for the specific RMon instances.
The Ethernet port identifier is a combination of slot number and the port number (slot number/
port number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Every RMon instance corresponds to one column where are indicated the characteristics of the
instance and the results of the relevant RMon counters.
Buttons
Help. Open the help on line.
Refresh. Update the table of counters.
See also
Ethernet Service Statistics (command)
RMon standard (info)
WARNING The counters per service (RMon instances Port & Priority and Port & VLAN) include even frames
received with wrong FCS or frames too long. The condition can be checked using the counters per port
(RMon instances per Port).
Received Pkts - - - x x x x x x OK
Total number of Good and Oversize packets received
- - - x x x x x x KO
Sent Pkts - - - - - - x x x OK
Total number of transmitted packets
- - - - - - - - - KO
Received Octects - - - x x x x x x OK
Total number of received octets
- - - x x x x x x KO
Sent Octects - - - - - - x x x OK
Total number of transmitted octets
- - - - - - - - - KO
Received Discard Pkts - - - x x x x x x OK
Total number of inbound packets which were discarded due
to forbidden forwarding or policing violation. - - - x x x x x x KO
x Counter incremented
- Counter not incremented.
The command Ethernet History displays the history of the RMon statistics.
The traffic is analyzed subdivided per Ethernet port (RMon instances per Port).
Operations
Display the history of the RMon statistic (RMon instances per Port)
Filter the history of RMon statistic (RMon instances per Port)
GUI
Ethernet History context
See also
RMon standard (info)
Display the history of the RMon statistic (RMon instances per Port)
WARNING Operation meaningful only if at least one RMon instance is created and if the count of the RMon
statistics is active (see Set a RMon instance per Port to the count of the RMON history and Activate the
count of the RMon statistics).
2. Set the criteria used to filter the records. The filter criteria works in AND logic:
• Index. Values which identify in unique mode the RMon instances in the database table of history
of RMon statistics (indexes) for which you wish to display the sampling intervals in table.
• Source. Ports of the Switch or LAG for which you wish to display the sampling intervals in table.
• Owner. Users who have enabled the RMON instances for which you wish to display the sampling
interval in table.
To activate an index, port/LAG or user, select the relevant box ( ), to deactivate it deactivate the rel-
evant box ( ).
It is possible to activate more indexes/ports-channels/users at the same time. By default, the table dis-
plays the records relevant to all the indexes/ports-channels/users.
3. Press Apply Filter.
4. To remove the filters and display in the table all the records relevant to all the indexes/ports-channels/
users, press Remove Filter.
The context displays the values of the RMon statistic counters (RMon instances per Port).
Table
Every line of the table corresponds to a sampling interval of an instance for which is indicated:
Time (Sample Start). Start instant (day/month/year, hour/minute/second) of every
sampling interval with which the statistics history data are collected.
Index. Value which identifies in unique mode the RMon instance in the database table
of history of RMon statistics.
Source. Identifier of the Ethernet port or LAG which the RMon instance enabled to the
count of the statistics history is associated to.
The Ethernet port identifier is a combination of slot number and the port number (slot
number/port number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Owner. User who has enabled the instance.
The remnant rows indicate the RMon counters (see Tab.13).
The selection of present in the header of each column, shows the following commands:
Sort Ascending. Not available in this context.
Sort Descending. Not available in this context.
Columns. Activate ( ) or deactivate ( ) the display of a column in the table.
Parameters
FILTERING
Criteria available to filter the sampling interval in the table. The filter criteria works in AND logic:
Index. Values which identify in unique mode the RMon instances in the database table
of history of RMon statistics).
Source. Ports of the Switch or LAGs.
Owner. Users who have enabled the RMON instances.
For every criterion, the active box ( ) indicates that the table contains sampling intervals
matching the specific criterion. The inactive box ( ) indicates that the table contains no sam-
pling interval matching the specific criterion.
Buttons
Help. Open the help on line.
Refresh. Update the context.
Apply Filter/Remove Filter. Filter the history of RMon statistic (RMon instances per Port)
See also
Ethernet History (command)
RMon standard (info)
Drop Events - - - - - - - - - OK
Number of dropped packets **
- - - - - - - - - KO
Octets x x x x x x x x x OK
Number of received octets
x x x x x x x x x KO
Pkts x x x x x x x x x OK
Number of received packets
x x x x x x x x x KO
BroadcastPkts - - - - - - - x - OK
Number of packets received directed to the broadcast ad-
dresses - - - - - - - - - KO
MulticastPkts - - - - - - - - x OK
Number of packets received directed to a multicast ad-
dresses - - - - - - - - - KO
UndersizePkts x x x - - - - - - OK
Number of Undersize packets received
- - - - - - - - - KO
OversizePkts - - - x x x - - - OK
Number of Oversize packets received
- - - x x x - - - KO
Fragments - - - - - - - - - OK
Number of Undersize packets received
x x x - - - - - - KO
Utilization (%)
Estimate (expressed in percentage) of the average use of
the port during the sampling interval.
The percentage of use refers to the line rate of the associ- - - - - - - - - - -
ated porta.
The percentage of use of the radio port refers to the rate
of 2.5 Gbps
x Counter incremented
- Counter not incremented.
** Packets are discarded after the exhaustion of the local memory resources. This value is not necessarily
the absolute number of discarded packets, as it represents only the number of times that this condition
occurred after the exhaustion of the memory resources; the packets can be discarded also for other rea-
sons. This value does not include Output Dropped Frames.
The command Ethernet Service History displays the history of the RMon statistics.
The analysed traffic is filtered according to the input/output port and to the characteristics of the packet:
value of User Priority (RMon instance Port & Priority) or C-TAG or S-TAG identifier (RMon instance Port &
VLAN).
Operations
Display the history of the RMon statistic (RMon instance Port & Priority and Port & VLAN)
Filter the history of RMon statistic (RMon instance Port & Priority and Port & VLAN)
GUI
Ethernet Service History context
See also
RMon standard (info)
Display the history of the RMon statistic (RMon instance Port & Priority and Port & VLAN)
WARNING Operation meaningful only if at least one RMon instance is created and if the count of the RMon
statistics is active (see Set a RMon instance Port & Priority or Port & VLAN to the count of the RMON history
and Activate the count of the RMon statistics).
Filter the history of RMon statistic (RMon instance Port & Priority and Port & VLAN)
2. Set the criteria used to filter the records. The filter criteria works in AND logic:
• Index. Values which identify in unique mode the RMon instances in the database table of history
of RMon statistics (indexes) for which you wish to display the sampling intervals in table.
• Source. Ports of the Switch or LAG for which you wish to display the sampling intervals in table.
• Owner. Users who have enabled the RMON instances for which you wish to display the sampling
interval in table.
To activate an index, port-channel or user, select the relevant box ( ), to deactivate it deactivate the
relevant box ( ).
It is possible to activate more indexes/ports-channels/users at the same time. By default, the table dis-
plays the records relevant to all the indexes/ports-channels/users.
4. To remove the filters and display in the table all the records relevant to all the indexes/ports-channels/
users, press Remove Filter.
The context displays the history of the RMon statistics (RMon instance Port & Priority and Port & VLAN).
Table
Every row of the table corresponds to one sampling interval of one instance for which is indicat-
ed:
Time (Sample Start). Start instant (day/month/year, hour/minute/second) of every
sampling interval with which the statistics history data are collected.
Index. Value which identifies in unique mode the RMon instance in the database table
of history of RMon statistics.
Source. Identifier of the Ethernet port or LAG which the RMon instance enabled to the
count of the statistics history is associated to.
The Ethernet port identifier is a combination of slot number and the port number (slot
number/port number) followed by the port name (see Tab.5).
The label po<identification number> indicates a LAG (see LA Manager).
Owner. User who has enabled the instance.
Priority. Priority value (C-PCP in Customer Bridge, S-PCP in Provider Bridge and Provider
Edge Bridge) which the packet in input/output from the port must have to be counted by
the RMon statistics.
Value available and meaningful for RMon instances Port & Priority.
SVID. S-VID (Service VLAN Identifier) which the packet in input/output from the port
must have to be counted by the RMon statistics.
Value available and meaningful for RMon instances Port & VLAN when the Switch is in
Provider Bridge or Provider Edge Bridge modality.
CVID. C-VID (Customer VLAN Identifier) which the packet in input/output from the port
must have to be counted by the RMon statistics.
Value available and meaningful for RMon instances Port & VLAN when the Switch is in
Customer Bridge modality.
The remnant rows indicate the RMon counters (see Tab.12).
The selection of present in the header of each column, shows the following commands:
Sort Ascending. Not available in this context.
Sort Descending. Not available in this context.
Columns. Activate ( ) or deactivate ( ) the display of a column in the table.
Parameters
FILTERING
Criteria available to filter the sampling interval in the table. The filter criteria works in AND logic:
Index. Values which identify in unique mode the RMon instances in the database table
of history of RMon statistics).
Source. Ports of the Switch or LAG.
Owner. Users who have enabled the RMON instances.
For every criterion, the active box ( ) indicates that the table contains sampling intervals
matching the specific criterion. The inactive box ( ) indicates that the table contains no sam-
pling interval matching the specific criterion.
Buttons
Help. Open the help on line.
Refresh. Update the context.
Apply Filter/Remove Filter. Filter the history of RMon statistic (RMon instance Port & Priority
and Port & VLAN)
See also
Ethernet Service History (command)
RMon standard (info)
Equipment
COMMON
ETH LAN
OAM
P.M. ACM
P.M. G.828
P.M. Rx Power
P.M. Tx Power
Plug-in module
Queue Depth
RADIO
SETS
UNIT
For each alarm, the wording present in the Events area (see Equipment status area) of the GUI and the
wording present in the Alarm Severity Config. context are displayed.
Some alarms have some wordings in italic contained between the symbols < >. They, in the alarm dis-
played in the Events area, represent a variable.
The symbol “-“means that the alarm is not meaningful for the Alarm Severity Config. context.
Equipment
COMMON
ETH LAN
<LAN 1, LAN 2, LAN 3, LAN 4, MGNT, TRX> Loss of Signal Alarm ifextLosAlarm
OAM
Service OAM Domain <domain name> MA <MA name> MepId <MEP identifier> RDI Alarm defRdiCcmAlarm
Service OAM Domain <domain name> MA <MA name> MepId <MEP identifier> MAC Status defMacStatusAlarm
Alarm
Service OAM Domain <domain name> MA <MA name> MepId <MEP identifier> Remote CCM defRemoteCcmAlarm
Alarm
Service OAM Domain <domain name> MA <MA name> MepId <MEP identifier> Error CCM defErrorCcmAlarm
Alarm
Service OAM Domain <domain name> MA <MA name> MepId <MEP identifier> Xconn CCM defXconCcmAlarm
Alarm
P.M. ACM
P.M. ACM <Radio Link name> 15M counter <1=unavail., 2=downshift, 3=upshift, 6=4QAMS, acmsTpProfile15mAlarm
7=4QAM, 10=16QAMS, 11=16QAM, 13=32QAM, 15=64QAM, 17=128QAM, 19=256QAM,
21=512QAM, 23=1024QAM, 25=2048QAM, 27=4096QAM> threshold cross Alarm
P.M. ACM <Radio Link name> 24H counter <1=unavail., 2=downshift, 3=upshift, 6=4QAMS, acmsTpProfile24HAlarm
7=4QAM, 10=16QAMS, 11=16QAM, 13=32QAM, 15=64QAM, 17=128QAM, 19=256QAM,
21=512QAM, 23=1024QAM, 25=2048QAM, 27=4096QAM> threshold cross Alarm
P.M. G.828
P.M. G.828 <transceiver> 15M counter SEP threshold cross Alarm pmG828-15MSepAlarm
P.M. G.828 <transceiver> 15M counter SES threshold cross Alarm pmG828-15MSesAlarm
P.M. G.828 <transceiver> 24H counter SEP threshold cross Alarm pmG828-24HSepAlarm
P.M. G.828 <transceiver> 24H counter SES threshold cross Alarm pmG828-24HSesAlarm
P.M. Rx Power
P.M. RxPower <transceiver> 15M counter Rlts1 threshold cross Alarm pmRxPwr-15MRltsAlarm
P.M. RxPower <transceiver> 15M counter Rlts2 threshold cross Alarm pmRxPwr-15MRlts2Alarm
P.M. RxPower <transceiver> 15M counter Rlts3 threshold cross Alarm pmRxPwr-15MRlts3Alarm
P.M. RxPower <transceiver> 15M counter Rlts4 threshold cross Alarm pmRxPwr-15MRlts4Alarm
P.M. RxPower <transceiver> 15M counter Rlts5 threshold cross Alarm pmRxPwr-15MRlts5Alarm
P.M. RxPower <transceiver> 24H counter Rlts1 threshold cross Alarm pmRxPwr-24HRltsAlarm
P.M. RxPower <transceiver> 24H counter Rlts2 threshold cross Alarm pmRxPwr-24HRlts2Alarm
P.M. RxPower <transceiver> 24H counter Rlts3 threshold cross Alarm pmRxPwr-24HRlts3Alarm
P.M. RxPower <transceiver> 24H counter Rlts4 threshold cross Alarm pmRxPwr-24HRlts4Alarm
P.M. RxPower <transceiver> 24H counter Rlts5 threshold cross Alarm pmRxPwr-24HRlts5Alarm
P.M. Tx Power
P.M. TxPower <transceiver> 15M counter Tlts1 threshold cross Alarm pmTxPwr-15MTltsAlarm
P.M. TxPower <transceiver> 15M counter Tlts2 threshold cross Alarm pmTxPwr-15MTlts2Alarm
P.M. TxPower <transceiver> 15M counter Tlts3 threshold cross Alarm pmTxPwr-15MTlts3Alarm
P.M. TxPower <transceiver> 15M counter Tlts4 threshold cross Alarm pmTxPwr-15MTlts4Alarm
P.M. TxPower <transceiver> 24H counter Tlts1 threshold cross Alarm pmTxPwr-24HTltsAlarm
P.M. TxPower <transceiver> 24H counter Tlts2 threshold cross Alarm pmTxPwr-24HTlts2Alarm
P.M. TxPower <transceiver> 24H counter Tlts3 threshold cross Alarm pmTxPwr-24HTlts3Alarm
P.M. TxPower <transceiver> 24H counter Tlts4 threshold cross Alarm pmTxPwr-24HTlts4Alarm
Plug-in module
Queue Depth
RADIO
<transceiver> Invalid Frequency Alarm radioInvalidFrequencyAlarm
Radio Link <Radio Link name> Adaptive Modulation Reduced Capacity Notification linkReducedCapacityAlarm
Radio Link <Radio Link name> Rescue Modulation Setup Alarm linkRescueSetupAlarm
Radio Link <Radio Link name> FMP: Tx Off Under Remote End Request linkXpicRemTxOffAlarm
Radio Link <Radio Link name> Transmitter Switch on Remote Terminal BER linkTfcAlarm
<LAN 1, LAN 2, LAN 3, LAN 4, MGNT, TRX> Link Loss Forwarding Alarm llfAlarm
<LAN 1, LAN 2, LAN 3, LAN 4, MGNT, TRX> Link BER Sync Loss Alarm linkBerSyncLossAlarm
SETS
BASE BAND Sets <synchronism signal name> Active Status timingSynkActiveStatus
UNIT
A
ACL
Add a rule to ACL ..............................................................................................................106
Modify a rule of ACL ...........................................................................................................107
Remove a rule from ACL .....................................................................................................107
Verify the rules used by the ACL ..........................................................................................106
Alarms
Change the severity of an alarm ........................................................................................... 75
Delete the log of the equipment alarms ................................................................................. 56
Enable/disable an alarm ...................................................................................................... 74
Enable/disable the forwarding of the trap of an alarm .............................................................. 74
Save the log of the equipment alarms ................................................................................... 55
Verify the severity and the enabling/forwarding status of the alarms ......................................... 74
ATPC
Verify/modify the functioning status .....................................................................................249
Verify/modify the intervention threshold ...............................................................................250
Verify/modify the maximum output power value at the transmitter ..........................................250
Verify/modify the range of the ATPC regulation .....................................................................250
B
Bridge Mode
Modify the Bridge mode of the Ethernet Switch ......................................................................143
Verify the Bridge mode of the Ethernet Switch .......................................................................143
C
Communication protocol
Enable/disable the administrative status of a communication protocol .......................................111
Verify the operating status of the communication protocols .....................................................111
D
Delete the log of the operations executed by the users ................................................................. 56
Digital loop
Activate ...........................................................................................................................266
Deactivate ........................................................................................................................267
Verify the status ................................................................................................................266
E
Enable a new equipment feature ............................................................................................... 37
Equipment firmware
Switch the memory benches ................................................................................................ 63
Equipment reference date/time, align to the PC date/time ............................................................ 37
Equipment software/firmware
Update .............................................................................................................................. 62
Verify the version ............................................................................................................... 62
Ethernet ports
Activate the loop on line side of a port ..................................................................................146
Deactivate the loop on line side of a port ..............................................................................146
Modify the activation state of the autonegotiation for a port ....................................................146
Modify the Bridge Port Type for a port ..................................................................................148
Modify the enabling status of a port .....................................................................................145
Modify the inversion status of the Tx and Rx lines of a port .....................................................147
Modify the maximum dimension of the packet accepted by a ports ...........................................147
Modify the transmission speed of a port ................................................................................147
Modify the type of interface ................................................................................................145
Restart the auto negotiation procedure for a port ...................................................................147
Verify the Ethernet ports configuration ......................................................................... 145, 148
Verify the flow control configuration of the Ethernet ports .......................................................149
Verify the parameters for the Tunneling management ............................................................150
Verify the status of the ports as regards the Link Aggregation function .....................................150
Verify/modify the traffic class which a packet, in input from a port, is assigned to, depending
on its priority (User Priority) ...............................................................................................149
EtherType
Modify the EtherType values in the S-Tag field of a port/LAG ...................................................171
Verify the EtherType values in the S-Tag field of the Ethernet ports .........................................171
H
Header Compression
Enable/disable the functionality ...........................................................................................173
Verify the status of the functionality .....................................................................................173
Verify/modify the context depth to compress in the header of the Ethernet packets ....................173
Verify/modify the parsing mode applied to the header of the Ethernet packets ...........................174
HTTPS
Download the SSL certificate in an equipment .......................................................................114
Generate the Certificate Signing Request for an equipment .....................................................114
Modify the list of CipherSuite managed by the equipment .......................................................113
Verify the configuration of the SSL protocol ...........................................................................113
L
LAN
Link Aggregation
Add/remove the ports to/from one LAG ................................................................................205
Create a static LAG ............................................................................................................202
Create a static LAG for protection (ELP) ................................................................................203
Define the ports members of one LAG ..................................................................................204
Delete a static LAG ............................................................................................................204
Modify the allocation of memory for the Link Aggregation function ...........................................201
Modify the configuration of a static LAG (Admin State, MTU and/or Max Ports) ...........................203
Modify the enabling of Link Aggregation function ...................................................................202
Modify the LACP settings for the ports member of a LAG (Activity and/or Timeout) .....................206
Remove all the ports from one LAG ......................................................................................205
Verify the LACP settings for the ports member of one LAG ......................................................206
Verify the ports member of one LAG ....................................................................................204
Verify the static LAGs .........................................................................................................202
Verify the status and configuration of Link Aggregation function ...............................................201
Verify/modify the policy for the distribution of the Ethernet traffic ............................................206
LLF
Configure a port for the management of LLF functionality .......................................................190
Configure the radio circuit for the forwarding of the LOS alarm present on LAN ..........................191
Enable/disable the forwarding of LLF alarm on the radio .........................................................192
Enable/disable the LLF functionality for a LAN ........................................................................192
Modify the forwarding of LOS alarm of a LAN to the radio .......................................................193
Modify the hysteresis value for the LLF functionality ...............................................................193
Modify the modality used to forward the alarm LOS on the radio circuit ....................................193
Modify the propagation modality of LLF alarm ........................................................................193
Remove a port of the switch from the management of LLF functionality ....................................191
Remove a radio circuit from the management of LLF functionality for a given LAN ......................192
Verify the status of the LLF functionality for the Ethernet ports ................................................190
M
MAB
Create a MAB Monitor instance ............................................................................................258
Create a MAB Sender instance .............................................................................................260
Delete one or more Monitor MAB instance .............................................................................259
Delete one or more Sender MAB instances ............................................................................261
Modify the configuration of a Sender MAB instance ................................................................260
Modify the configuration of the Monitor MAB Instance .............................................................259
Verify the existing MAB instances ........................................................................................258
MAN OP
Activate/deactivate a digital loop .........................................................................................271
Disable temporarily/restore the XPIC function .......................................................................272
Disable/enable the modulation of the RF carrier .....................................................................271
Force the status of the T0 synchronisation ............................................................................272
Force the use of a synchronism source .................................................................................272
Turn-off/turn-on the transmitter ..........................................................................................270
Verify the active manual operations ...................................................................................... 32
Verify the manual operations status .....................................................................................270
Verify/modify the manual operation timeout ........................................................................... 32
P
PB-VLAN
Verify the C-VID registration table (C-VID Registration) ..........................................................167
Verify the Provider Edge Port configuration table (PEP Configuration) .......................................167
PM
Activate one or more measures ............................................................................................ 43
Deactivate one or more measures ........................................................................................ 43
Reset the threshold exceeding alarms of one or more PM measures .......................................... 43
Reset the values of the records daily and primary of one or more PM measures .......................... 43
Set the thresholds of the control parameters and alarms of a PM measure ................................. 44
Verify the status, the results and the threshold exceeding alarms of a PM measure ..................... 42
Q
Queue Depth
Modify the policy for the management of the depth of the queues in output ..............................198
Verify the policy for the management of the depth of the queues in output ...............................198
R
Radio
Modify the lower threshold of the modulation ........................................................................131
Modify the operating status of the adaptive modulation ..........................................................131
Modify the reference band ..................................................................................................130
Modify the reference modulation ..........................................................................................131
Modify the upper threshold of the modulation ........................................................................131
Verify the operating status and the configuration parameters of the adaptive modulation ............130
Verify the reference band/modulation ...................................................................................130
Verify/modify the duplexer frequency ...................................................................................248
Radio BER
Activate the measure .........................................................................................................256
Deactivate the measure .....................................................................................................256
Verify the configuration parameters of the measure ...............................................................256
Verify the status of the measure ..........................................................................................256
Radio configuration
Delete a Radio Link ............................................................................................................127
Modify a Radio Link ............................................................................................................126
Verify the Radio Link configuration .......................................................................................125
Radio Encryption
Modify the allocation of memory for Radio Encryption function .................................................116
Modify the data encryption algorithm ...................................................................................117
Modify the enabling of Radio Encryption function ...................................................................117
Modify the encryption key ...................................................................................................117
Verify the status and configuration of Radio Encryption function ...............................................116
RMon
Activate the count of the RMon statistics ...............................................................................275
Deactivate the count of the RMon statistics ...........................................................................276
Delete a RMon instance per Port for the count of the history of the RMON statistics ....................279
Delete a RMon instance per Port for the count of the RMon statistics ........................................277
Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMON history ............281
Delete a RMon instance Port & Priority or Port & VLAN for the count of the RMon statistics ..........278
Display the history of the RMon statistic (RMon instance per Port & Priority and per Port & VLAN) 299
Display the history of the RMon statistic (RMon instances per Port) ..........................................296
Display the values of the RMon statistic counters (RMon instances per Port) ..............................290
Display the values of the RMon statistic counters (RMon instances Port & Priority and
Port & VLAN) ....................................................................................................................293
Filter the history of the RMon statistic (RMon instance Port & Priority and Port & VLAN) ...............299
Filter the history of the RMon statistic (RMon instances per Port) .............................................296
Reset the counters’ results of the RMon statistics ...................................................................276
Set a RMon instance per Port to the count of the RMon history ................................................278
Set a RMon instance per Port to the count of the RMon statistics ..............................................276
Set a RMon instance Port & Priority or Port & VLAN to the count of the history of the RMON
statistics ..........................................................................................................................279
Set a RMon instance Port & Priority or Port & VLAN to the count of the RMon statistics ................277
Verify the count status of the RMon statistics ........................................................................275
RSTP
Enable/disable the use of STP/RSTP protocol for the equipment ...............................................177
Verify the information stored by every single Switch port ........................................................182
Verify/modify the allocation of memory for the STP/RSTP function ...........................................178
Verify/modify the cost of the a port ......................................................................................182
Verify/modify the dynamic path cost calculation function (STP/RSTP) .......................................179
Verify/modify the enabling of STP/RSTP function ...................................................................179
Verify/modify the interoperability of the equipment with other equipment .................................182
Verify/modify the maximum number of BPDU packets in transmission ......................................180
Verify/modify the parameters for the transmission of BPDU packets .........................................180
Verify/modify the ports set for the STP/RSTP function ............................................................178
Verify/modify the priority assigned to the Switch ...................................................................180
Verify/modify the priority of a port .......................................................................................181
Verify/modify the status of the STP/RSTP function of a port ....................................................181
Verify/modify the version of the protocol ..............................................................................180
S
S/N measure
Update the value ...............................................................................................................254
Verify the value .................................................................................................................254
Save the equipment configuration ............................................................................................. 57
Security
Enable/disable the FTP and/or SFTP protocol .........................................................................121
Modify the FTP access credentials ........................................................................................121
Modify the SFTP access credentials ......................................................................................122
Verify the operating status of the FTP and SFTP protocols .......................................................121
Statistics
Reset the counters’ results (Ethernet-like Statistics group) ......................................................216
Reset the counters’ results (Interfaces group) .......................................................................216
Verify the counters of the Ethernet interfaces (Ethernet-like Statistics group) ............................216
Verify the counters of the Ethernet interfaces (Interfaces group) .............................................216
Synchronisation
Enable/disable the use of a synchronism source ....................................................................234
Enable/disable the use of the source quality as criterion to select the synchronism .....................234
Force the quality level in input and/or output of a synchronism source ......................................236
Force the status of the T0 synchronisation ............................................................................232
Force the use of a synchronism source .................................................................................235
Modify the use priority of a synchronism source .....................................................................235
Restore the availability of a source for the selection of the T0 synchronism without waiting
for the expiry of Wait Time .................................................................................................236
Set a synchronism source as preferential ..............................................................................235
Set the Hold Off Time parameter .........................................................................................233
Set the threshold levels of the LTI alarm ..............................................................................233
Set the WTR Time parameter ..............................................................................................233
U
Users
Add a user ......................................................................................................................... 94
Add a user group ................................................................................................................ 79
Delete a user ..................................................................................................................... 96
Delete a user group ............................................................................................................ 81
Force the logout of a user ...................................................................................................103
Modify a user ..................................................................................................................... 95
Modify a user group ............................................................................................................ 80
Set/modify the IP address of Permanent Login ......................................................................101
Verify the IP address of Permanent Login ..............................................................................101
Verify the user groups ......................................................................................................... 79
Verify the users connected to the equipment .........................................................................103
Verify the users list ............................................................................................................. 94
V
Verify the basic configuration of the equipment ........................................................................... 36
Verify the equipment feature .................................................................................................... 37
Verify the equipment units (type, code, version and functional status) ............................................ 38
W
Wake Up functionality
Activate ............................................................................................................................ 59
Deactivate ......................................................................................................................... 59
Set the execution parameters .............................................................................................. 59
X
Xpic
Disable temporarily the function XPIC for a single transceiver ..................................................136
Enable/disable XPIC fault management procedure (FMP) .........................................................137
Restore the function XPIC after a fault detection ....................................................................137
Restore the XPIC function of the single ODU ..........................................................................136
Verify the configuration parameters of the XPIC function ........................................................136
A E
ACL Equipment Feature
Filter Action ........................................108 2+0 radio configuration ......................... 40
Index .................................................108 ETH transport ...................................... 40
Interfaces ...........................................108 Packet processing (1) ............................ 40
IP Address ..........................................108 Radio payload encryptions ..................... 40
Mask .................................................108 Security package .................................. 40
Priority ...............................................108 Sync Quality management ..................... 40
Upgrade up to 100Mbps ........................ 40
ACM Engine .............................................132
Upgrade up to 200Mbps ........................ 40
ACM Table Upgrade up to 300Mbps ........................ 40
Active Modulation ................................132
Upgrade up to 400Mbps ........................ 40
Ethernet Capacity ................................132
Upgrade up to 500Mbps ........................ 40
Global Capacity ...................................133 Upgrade up to 50Mbps .......................... 40
Agent IP Address .................................. 22, 39 XPIC ................................................... 40
Equipment unit
B Expected Type ..................................... 40
EthType
Description .........................................172
Egress EtherType ................................172
D
Ingress EtherType ...............................172
Dplx Freq ................................................251 Port ...................................................172
IP Address ................................................ 39
L MAB
Sender
LA Admin Status .................................262
General Settings OAM Maint Level .............................263
Admin State ...................................208 PDU Compliance .............................263
Bridge Port Type .............................208 Port index ......................................262
LA Status ......................................207 Sensor Index .................................262
Link Status ....................................207 User Priority ...................................263
Max Ports ......................................208 VLAN ID ........................................262
MTU ..............................................208 Sensor
Port Channel ID ..............................207 Admin Status .................................262
System Control ..............................207 BW Mode .......................................262
System ID .....................................207 Curr. BW (Mbps) ............................262
LACP Holdoff Time (s) .............................262
Activity .........................................210 Link ID ..........................................262
Description ....................................209 Nom. BW (Mbps) ............................262
Mode ............................................209 Observ. Time (s) ............................262
Port ..............................................209 ODU Index .....................................262
Port Channel State ..........................209 Sensor Index .................................262
Port State ......................................210
MAC Address ............................................ 39
Timeout ........................................210
LAG Manager IP Address 1 ...............................102
Aggregation Type ...........................208
Manager IP Address 2 ...............................102
Mode ............................................209
Port Channel ..................................208 Measurements Resolution
Ports .............................................208 Prx ....................................................251
T
W
Tx Freq ...................................................251
Wake Up
Tx Transmitter ................................. 269, 273
NE Location ......................................... 60
NMS IP Address .................................... 60
Status ................................................. 60
U Timeout (Minutes) ................................ 60
For more information, refer to the section relevant to the technical support on the Internet site of the com-
pany manufacturing the product.