Professional Documents
Culture Documents
FibeAir IP-10
G-Series
Version I6.6.1
Web Based
Management
User Guide
Registered TradeMarks
Ceragon Networks® is a registered trademark of Ceragon Networks Ltd.
FibeAir® is a registered trademark of Ceragon Networks Ltd.
CeraView® is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave
FiberTM, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or
consequential damage in connection with the furnishing, performance, or use of this
document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer
could void the user’s authority to operate the equipment and the warranty for such equipment.
Copyright © 2010 by Ceragon Networks Ltd. All rights reserved.
Contents
General .......................................................................................................... 1
Menus ............................................................................................................ 2
Faults ...................................................................................................................... 2
Configuration........................................................................................................ 22
Getting Started
To start the management application:
1. Start your web browser.
2. In the URL address field at the top, type http://yourIP, and press Enter, whereby yourIP is the IP
address of your FibeAir unit.
3. In the Login page that appears, enter your user name and password, and click Login.
The main management page appears:
Configuration and other operations are performed by clicking the menus on the left side of the page.
Faults
Current Alarms
Select the Current Alarms item to view a list of alarms that are active in the system.
Click an alarm in the list to view probable cause and corrective action information.
The date and time the alarm was triggered appear in the Date & Time column.
The Event Log displays the last 200 alarms that occurred. If the number of alarms exceeds 200, the first
alarms will be removed.
Date & Time - The date and time the alarm was triggered.
To scroll through additional alarms, click the page number in the Page field.
The performance Monitoring commands page allows the clearing of all performance monitoring
measurements in the unit, except for RMON.
The RMON counters display values relating to the bridge performance. The counters are designed to
support:
RFC 2819, RMON MIB
RFC 2665, Ethernet-like MIB
RFC 2233, MIB II
RFC 1493, Bridge MIB
The statistic counters are divided into ingress statistics and egress statistics.
End-to-end PM measurements are taken for TDM trails. This PM is based on BER measurement, and not on
code violation, which distinguishes it from line interface PMs.
The measurements are the same as those for line interfaces (ES, SES, UAS, BBE), but are based on BER
measurements.
PM for trails are measured in the following cases, and are maintained in the relevant IDUs:
• End point interfaces: trail end line interfaces
• Radio interfaces that perform SNCP
If TDM trail path protection is configured, the system performs measurement on both the primary and
secondary paths.
The Radio Aggregate Performance Report page displays tributary values measured over the last 24 hours, in
15 min intervals, or the past month, daily intervals.
UAS is the Unavailable Seconds value of the current interval. The value can be between 0 and 900 seconds
(15 minutes).
The Integrity column indicates whether or not the values received at that time and date are reliable. An x in
the column indicates that the values are not reliable due to a possible power surge or power failure that
occurred at that time.
The Tributaries Performance Report page displays values measured for the E1/T1 interfaces.
You can configure if the displayed performance covers the last 24 hours, in 15 min intervals, or covers a
month, with daily intervals.
UAS is the Unavailable Seconds value of the current interval. The value can be between 0 and 900 seconds
(15 minutes).
The Integrity column indicates whether or not the values received at that time and date are reliable. An x in
the column indicates that the values are not reliable due to a possible power surge or power failure that
occurred at that time.
The RSL Performance Report page displays received signal level values measured over the past 24 hours, in
15 min intervals, or the past month, daily intervals.
In the Thresholds Configuration area at the bottom of the value table, specify the value you want
for the thresholds. The range of values appears at the end of the threshold line.
Min RSL values are the minimum received level measured during the interval.
Max RSL values are the maximum received level measured during the interval.
RSL Exceed #1 displays the number of seconds the RSL threshold #1value was exceeded during the current
interval.
RSL Exceed #2 displays the number of seconds the RSL threshold #2 value was exceeded during the current
interval.
Min TSL values are the minimum transmitted level measured during the interval.
Max TSL values are the maximum transmitted level measured during the interval.
TSL Exceed displays the number of seconds the TSL threshold value was exceeded during the current
interval.
The Integrity column indicates whether or not the values received at that time and date are reliable. An x in
the column indicates that the values are not reliable due to a possible power surge or power failure that
occurred at that time.
The Tributaries Performance Report page displays values measured for the STM-1/OC-3 interface.
Select PM & Counters, STM1, STM1 #1 (for an E1 board) or OC-3 #1 (for a T1 board).
For Report Interval, you can select either every 15 minutes, or Daily for the list to include values for the
entire day.
The MRMC Performance Report page displays 15-minute or daily values of Multi-Rate Multi-Constellation
performance.
Min Profile is the minimum radio profile during the last interval.
Max Profile is the maximum radio profile during the last interval.
Min BitRate (Mbps) is the minimum total radio throughput (Mbps), delivered during the last interval.
Max BitRate (Mbps) is the maximum total radio throughput (Mbps), delivered during the last interval.
Min Number of TDM interfaces is the minimum number of TDM channels (E1/T1) delivered over the
radio during the last interval.
Max Number of TDM interfaces is the maximum number of TDM channels (E1/T1) delivered over the
radio during the last interval.
The MSE Performance Report page displays the modem’s Minimum Square Error performance statistics.
The values are for every 15 minutes or daily.
Min MSE is the minimum MSE in dB, measured during the last interval.
Max MSE is the maximum MSE in dB, measured during the last interval.
MSE Exceed is the number of seconds the MSE exceeded the threshold (configured in the field below the
table) during the last interval.
MSE Threshold (dB) is the value that will be compared with the current MSE value, to calculate if the limit
was exceeded.
The XPI Performance page displays the Cross Polarization Interference value over 15 minutes or per
day.
XPI Threshold (dB) is the value that will be compared with the current XPI value, to calculate if the limit
was exceeded.
The TDM Channels page displays the unavailable seconds (UAS) of the expected E1/T1 trails on the radio.
When ACM decreases, the capacity of the radio is reduced, and several E1/T1 trails with not enough
bandwidth in the radio link capacity may be dropped.
When an E1/T1 trail is dropped, its Radio-TDM UAS counter PM will start counting the seconds for which
the E1/T1 trail was not serviced.
The Frame Error Rate Performance Report page displays statistics of the Ethernet frame error rate (%)
measured on the radio Ethernet port.
Frame Error Rate (%) is the number of received error frames measured by the radio Ethernet port, relative
to all frames received by the radio Ethernet port.
The Throughput Performance Report page displays radio Ethernet throughput statistics (excluding TDM
traffic), measured on the radio port.
Peak Throughput (bps) is the maximum throughput measured during the last interval.
Average Throughput (bps) is the average throughput measured during the last interval.
Throughput Exceed (Seconds) is the number of seconds the throughput exceeded the threshold (configured
in the field below the table) during the last interval.
Throughput Threshold (Mbps) is the throughput value that will be compared with the current value, to
calculate if the limit was exceeded.
The Capacity Performance Report page displays statistics of the Ethernet capacity (including Ethernet data
and overhead bytes) measured on the radio port.
Peak Capacity (bps) is the maximum capacity measured during the last interval.
Average Capacity (bps) is the average capacity measured during the last interval.
Capacity Exceed (Seconds) is the number of seconds the throughput exceeded the threshold (configured in
the field below the table) during the last interval.
Capacity Threshold (bps) is the capacity value that will be compared with the current value, to calculate if
the limit was exceeded.
The Utilization Performance Report page displays statistics of Ethernet utilization (%) measured on the radio
port.
Ethernet utilization is a measurement of actual Ethernet throughput, relative to the potential Ethernet
throughput of the radio (excluding TDM channels). Ethernet utilization during the last interval is displayed
as one of five bins:
1. 0-20%
2. 20-40%
3. 40-60%
4. 60-80%
5. 80-100%
Peak Utilization (%) is the maximum utilization measured during the last interval.
Average Utilization (%) is the average utilization measured during the last interval.
Utilization Exceed (Seconds) is the number of seconds the value exceeded the threshold (configured in the
field below the table) during the last interval.
Utilization threshold (%) is utilization threshold value, which must be configured in the bin resolution
listed above.
Unit Parameters
This page allows you to view and define information for the IP-10 system.
(Optional) In the System name field, enter a name for the node. By convention, this is the node’s fully
qualified domain name.
In the Slot label field, enter a name for the link. By convention, this is the name and slot label of the unit
across the radio link.
The read-only System Description field provides information about the FibeAir system.
(Optional) In the System location field, enter the actual physical location of the node or agent.
The System up time field is read-only and shows how long the system has been operating continuously.
The read-only Voltage input field displays the current input voltage.
In the Measurement system field, select the type of measurement you want the system to use.
In the Date & Time Configuration field, click the calendar to set the date, and click the time area to set the
time. Offset from GMT is the Hours and Minutes offset of the time of day from GMT (Greenwich Mean
Time).
In the Daylight Saving Time area, you can configure the following options:
Start Date - the date when daylight saving time will automatically be activated.
End Date - the date when daylight saving time will automatically be terminated.
Offset (in hours) - the required offeset time, in hours, when daylight saving time is activated.
The read-only IDU/RFU temperature fields display the current temperatures of the IDU and RFU.
The read-only IDU serial/part number fields display the serial and part numbers of the IDU.
The read-only RFU serial/part number fields display the serial and part numbers of the RFU.
The External Alarms page enables you to set up the external alarm system.
Text is free text for the alarm description. When an alarm input is raised, this text will appear as the alarm
description text.
Severity is used to configure the alarm's severity. When an alarm input is raised, the severity will be added
to it.
Alarm Output Configuration (single output)
Admin sets the alarm input to active (enable) or inactive (disable), disregarding current raised alarms. This
operation can be used to test the output alarm.
Group is used to configure the group of alarms that will trigger an Alarm Output:
Communication - alarms related to traffic: radio, Ethernet line, TDM line
Quality of Service
Processing - alarms related to software: configuration, resets, corrupted files
The Management page enables you to define local and remote IP addresses and parameters.
In the Local IP Configuration area, enter the IP address of the local unit, its subnet mask, and the default
gateway.
In the Remote IP Configuration area, enter the IP address of the remote unit and its subnet mask.
In the Management Ports area, for Number of ports, specify the number of ports that will be used for
management data.
For Type, select the management mode of operation - Inband or Out of band.
For Management VLAN ID, specify the VLAN ID that will be used to manage the unit, when the In-band
management type is used.
For Capacity, select the bandwidth that will be allocated to the port(s).
For Auto negotiation, select On to activate the feature, or Off to disable it.
For Rate, select the bit rate you want for the port.
This page is used to configure traps sent from a Network Element to the NMS system.
Each line in the Trap Managers list displays the setup for a manager defined in the system.
To change the setup for a manager, click the plus box at the beginning of the line.
For Trap manager, specify the IP address to which traps will be sent.
For Trap port, enter the number of the port through which traps will be sent.
For Heartbeat period (minutes) specify the period of the heartbeat trap.
For Trap CLLI, you can enter free text that will be sent with the trap.
For Filter by severity, select the severity level(s) to determine which types of alarms will be forwarded.
To select/deselect all levels, choose Select All.
This page allows you to view and set IP-10 licensing information.
This page allows you to view and set IP-10 Network Timing Protocol information.
For Admin, select Enable to activate the NTP client, or Disable to deactivate it.
Status shows the current condition of the NTP client, which can be Up or Down.
Sync Server shows the IP address of the NTP server with which the system is currently synchronized.
The values that can appear include:
IP of the remote NTP server
Local, if locked to the local element’s real-time clock.
NA, if not synchronized with any clock (valid only when Admin is set to Disable).
Poll Interval is the the interval used by the NTP client to maintain synchronization with the current NTP
server.
This page allows you to configure the characteristics of the peer port, which the local port of the element is
connected to.
Each IDU port has its own IP table, allowing the configuration of the characteristics of the peer port to which
it is connected.
For Peer MAC address, enter the MAC address of the peer port.
For Peer Slot ID, enter the slot ID of the element (IDU) the peer port is located in.
For Peer Description, you can add a general description of the peer port.
In the SNMP Version field, select V1 for SNMP V1, or V3 for SNMP V3.
In the SNMP V3 User Settings area, you can configure the following:
Security Mode - determines the SNMPv3 security mode, which can be:
Authentication (default)
Authentication Privacy
No security
Authentication Algorithm - valid only when security mode is not set to No security. The value can be MD5
or SHA.
Password - if a security mode other than No security was selected, you will be prompted for a password,
which has to be at least eight characters.
This page allows you to activate support for the All ODU enclosure.
Select Enable for All ODU support, or Disable if your system is not configured as All ODU.
If you select Enable, the All ODU enclosure interface is activated, and the enclosure controller can then be
powered to monitor fan failure alarms.
When the enclosure is enabled, External Alarm Input #1 becomes an output, which together with 3.3V is
used to drive the enclosure’s electronic board.
External Alarm Input #2 is set with a specific text & severity, and is used to monitor any enclosure fan
failure, and to raise an alarm for it (polarity change was required to adapt it to the enclosure behavior).
The Versions pages summarize all installed and running versions of the IDU and RFU.
IDU Versions
Installed Version are IDU software files that were successfully installed.
Upgrade Package are IDU software files that were successfully downloaded to the IDU, and are ready to be
installed when IDU upgrade is executed.
Downgrade Package are IDU software files that were successfully downloaded to the IDU, and are ready to
be installed when IDU downgrade is executed.
RFU Installed Versions - These are RFU software packages currently installed in the IDU, as part of the
overall software package.
RFU Running Versions - These are software versions that are currently running on the RFU.
RFU Upgrade & Downgrade Versions - These are RFU software packages successfully downloaded to the
IDU, and ready to be installed when RFU Software Download is executed.
Switch Configuration
The Managed Switch method allows QoS configuration, and all Ethernet ports are allowed for traffic.
Metro Switch is a 802.1ad Provider Bridge, allowing Q-in-Q switching capabilities. Each traffic port
can be assigned as a "Customer Network" port or a "Provider Network" port. The port attributes are
listed in the following table:
Note that S-Tag Ether type can be configured to one of the following values: 0x88a8 (default), 0x8100,
0x9100, or 0x9200.
In theSwitch Configuration page, you can choose the Ethernet switching method.
Single pipe - Ethernet switching is disabled, whereby only a single Ethernet interface is used for traffic and
the unit operates as a point-to-point microwave Ethernet radio.
In the Unit allowed VIDs area, you can define VLANs for the managed switch, as follows:
In the Operation field, select the operation you want to perform for the VLANs:
Set - to add the VLANs to the database.
Remove - to remove the VLANs from the database.
Change name - to change the VLAN name you specified previously.
Disable - to suspend usage of the VLAN you specified.
Enable - to activate the VLAN you specified.
In the Start/End VID fields, enter the VLAN start and end IDs.
STP Protocol
This option is available only when the system operates in the Managed Switch mode.
STP (Spanning Tree Protocol) ensures a loop-free topology for any bridged LAN. Spanning tree allows a
network design to include spare (redundant) links for automatic backup paths, needed for cases in which an
active link fails. The backup paths can be included with no danger of bridge loops, or the need for manual
enabling/disabling of the backup links. Bridge loops must be avoided since they result in network "flooding".
Note that only Ring RSTP optimized to a ring topology network is supported.
Select either Enable to activate the STP protocol, or Disable to deactivate it.
This page allows you to configure RSTP parameters and view status information.
RSTP algorithms are designed to create loop-free topologies in any network design, which makes it sub-
optimal to ring topologies.
In the Ring RSTP Configuration area, you can configure the following:
Priority - The priority of the bridge, which is part of the bridge ID.
In the Ethernet Ports that Support Ring RSTP table, each interface in the IDU can be configured with the
following RSTP parameters:
Priority
Path Cost.
Edge port. This port is not part of the ring itself, and is used as a service access port. Non-edge ports are
those that construct the ring.
5 Policers
Shaper
Calssifier (Ingress Queue
Marker Scheduler (Egress rate
(4 Queues) Rate Controller
limiting)
Limiting)
The QoS & Rate Limiting page lets you configure Quality of Service parameters for each Ethernet port.
Ingress Classifier
A frame ingressed to a port will be classified according to the following criteria:
1. First Criteria: MAC DA (Destination Address) overwrite. A frame ingressed to a port, carrying a
MAC DA that appears in the Static MAC table (see details below), will be classified, its VLAN Pbits
will be overwritten (assuming the frame egress is tagged) according to the following options:
Disable - No MAC DA classification or VLAN Pbits will be overwritten (no marking).
Queue Decision - There will only be classification to queue. No marking.
Policer List
Click Policer List in the Advanced options area at the bottom of the QoS & Rate Limiting page.
Click Static MAC in the Advanced options area at the bottom of the QoS & Rate Limiting page.
This table is used to load static MAC addresses to the forwarding table of the switch.
VLAN ID is the ID of the frame. Each frame is attached with a VLAN ID. Frames are learned and filed in
the static MAC table under their VLAN ID.
Priority sets the classification and/or VLAN Pbits overwrite (marking), according to the QoS configurations
(see QoS & Rate Limiting page above).
Since it is common to set QoS and rate limiting settings identically in several ports, this option can be used
to copy the configurations from one port to another. This saves considerable time and prevents configuration
errors.
Copy Priorities Configuration - Copies all Traffic Priorities using the ingress classifier.
The Radio menu includes the Radio Parameters and Radio Thresholds items.
Radio Parameters
RFU type - The RFU used in the system (1500HP, RFU-C, other).
MSE - Mean Square Error value, which quantifies the performance of the receiver.
XPI level - Read only, displays the current cross polarization interference value.
Defective blocks - Amount of blocks in which errors were detected. The larger the amount, the poorer
the radio link quality.
Set also remote unit - Used to set the remote unit with the specified local unit values.
Radio IF interface - Allows the user to enable/disable the radio interface. The change requires system
reset.
Radio IF operational status - Displays the current status of the radio interface.
ATPC reference RSL - The RSL reference value for the ATPC mechanism.
Link ID - The identification number of the link. When working with an IDU that has the Link ID feature
on one end and an IDU that does not have this feature on the other end, set the Link ID to 1.
Mac header compression - Radio transmission (compared with Fiber optics and other line base links)
has limited bandwidth and compression is required to improve available capacity utilization.
The benefit of using MAC header compression is that it can be used as a supplement to the other without
affecting traffic performance.
Ceragon proprietary MAC Header compression improves the effective throughput by up to 45%, and
does not affect user traffic.
MAC header compression is based on the following:
• Dropping the Preamble + SFD + IFG saves 20 bytes
• Dropping the Ethernet type saves 2 bytes
• Adding a GFP header adds 4 bytes
In addition:
• Frequently repeating SA & DA are learned
• Learned DA & SA are not transmitted
• A short pointer is used instead of the original 12 bytes
Remote Radio
In this page, you can configure how the remote radio operates.
Remote force max Tx level - Used to force the remote unit maximum transmit level.
Remote ATPC reference Rx Level - Used to configure the ATPC Rx level of the remote unit.
For Radio excessive BER threshold, click the drop-down list and select the level above which an excessive
BER alarm is issued for errors detected over the radio link.
For Radio signal degrade threshold, select the level above which a Signal Degrade alarm is issued for
errors detected over the radio link.
The Radio BER field is read-only and shows the value above which a BER alarm is issued for errors
detected over the radio link.
Configuration
Occupied bandwidth (MHz) displays the actual bandwidth occupied by the radio signal. This should not be
confused with Channel Spacing, which indicates the allocated bandwidth for the RF channel.
Operational mode can be ACM Adaptive, ACM Fixed, Regular (non ACM radio script).
Max adaptive ACM profile is the maximum configured profile that will never be exceeded when ACM is
active.
Current TX
ACM adaptive profile indicates the current ACM profile used for transmission.
ACM adaptive profile indicates the current ACM profile used by the receiver.
MRMC Table
Select the desired script and mode (ACM/Non-ACM). ACM scripts can be distinguished from regular scripts
by their ACM prefix.
When you expand the line of the selected script (by clicking the +) all available options for the selected
script will appear.
For regular scripts (non-ACM), expand the line (by clicking the +), and then click Apply.
For ACM scripts, expand the line (by clicking the +).
When configuring ACM script with Aadaptive Mode, you can determine whether or not the RFU power
will be adaptive as well.
In the Adaptive Power admin field, enable or disable the capability to adapt the power.
In the Reference class field, configure the system reference class, which can be "Class-2/4/5B/6A"
for ETSI, or “FCC” for FCC.
Reference Class
Reference QAM
Configuration
Class2 4
Class 4 16
Class 5B 64
Class 6A 256
FCC 4
If the adaptive feature is used, a few critical dBs can be gained in the lower constellations.
Ethernet Ports
In the Managed Switch, Metro Switch, or Single Pipe Ethernet Ports area, you can configure the
following:
In the Port admin field, select Enable if you want to activate the port.
In the Type field, the option depends on the Ethernet application, which may be
For Default VLAN ID (not used in the single pipe switch application), enter the VLAN ID number.
For Flow Control (used only in the single pipe switch application), select On or Off to activate or deactivate
the traffic control mechanism.
For Auto Negotiation, select On if you want the system to control the flow of data.
Actual Duplex is read-only and displays the duplex type the port is actually converged to.
Operational Status is read-only and indicates whether or not the port is operating.
Automatic state propagation - This feature enables propagation of radio failures back to the line, to
improve the recovery performance of resiliency protocols (such as xSTP). You can enable or disable this
feature.
Link aggregation allows the user to group several ports into a single logical channel bound to a single MAC
address. Traffic sent to the ports in such a group is distributed through a load balancing function. The group
is called a LAG.
There can be up to three LAG groups per IDU. Only traffic ports (including a radio port) can belong to a
LAG group. The following groups of ports can be in the same LAG (ports from different groups cannot be in
the same LAG):
• Ports 1-2 and 8 (GBE ports and radio)
• Ports 3-7 (FE only ports)
To add or remove ports in the LAG group, select the desired port in the window. Ports selected for the LAG
group are highlighted; and ports selected for deletion are cleared in the window.
The system will not allow selection of ports with different configurations (such ports will not be
highlighted).
Ports removed from a LAG will remain with their existing parameters, but will be initially disabled to
prevent loops.
In the Advanced line, you can click Allowed VIDs to assign VIDs to the LAG.
Local LOF - When Automatic State Propagation is enabled, an LOF (Radio Loss of Frame) fault
will always be propagated.
Link ID Mismatch - When Automatic State Propagation is enabled, a Radio Link ID mismatch
fault will always be propagated.
MAC address ageing time - The aging time used by the MAC learning table can be a value between 15
and 3825 seconds. The default value is 300 seconds.
Ethernet shutdown Rx profile threshold - When ACM adaptive mode is active, you can
determine an Rx profile that will be considered a fault when the radio performance degrades
below that profile.
Local Excessive BER - When an Excessive BER alarm is raised locally, it will be propagated as
a fault.
Local LOC - When a Loss of Carrier alarm (only for optical GBE interface) is raised, it will be
propagated as a fault.
Remote Fault - If any of the events described above occurs at the remote (remote fault), it will be
propagated locally as a fault.
In the All Ports area at the top of the page, the parameters you can configure include the following:
Excessive BER threshold - Click the drop-down list and select the level above which an excessive BER
alarm is issued for errors detected over the radio link.
Signal degrade threshold - Click the drop-down list and select the level above which a Signal Degrade
alarm is issued for errors detected over the link.
Click the plus sign at the beginning of an E1 line to configure parameters for that specific port.
Cable length - Select the length of the cable used to connect to the interface.
Priority -Specify the priority of the interface to determine when it will be dropped, if the radio capacity
decreases.
E1/T1 T-Card
The T-Card is not a stand-alone entity within the IP-10 IDU. When inserted in the system, the new interfaces
become integral interfaces of the IP-10.
As an example, if you insert a 16 x E1 T-Card in the IDU, no special menu will appear for it. Instead, E1s
#17-32 will be added to the existing 1-16.
DS1 Ports
The parameters in this page are the same as those for the E1 Ports page above.
Mute Tx - Used to force mute or unmute the T-Card interface. If muted, the radio will still receive
signals, but will not transmit any.
Clock Source - the clock source used, which can be Internal clock, Loop, or STM-1 VC.
LOS from
# LOF from Framer Mode of Operation Clock Source
Optics
1 LOF LOS Free run/holdover Local clock
2 LOF NO LOS Free run/holdover Local clock
3 NO LOF LOS N/A Local clock
4 NO LOF NO LOS Lock mode (loop timing) CDR
If you choose STM-1 VC, the signal will be synchronized to the signal clock derived from a TDM
trail. The clock will be taken from the first VC-12 configured in the STM-1 port.
There is no web support for this, but there is a way to change the VC source through the CLI using
the following commands:
cd interfaces/sdh/stm1/
get sync-vc (shows the VC that the system will use as the clock and sync)
Set sync-vc XX (XX = VC number)
AIS VC Signalling Admin - when enabled, if a signal failure at the trail outgoing from the STM-1
interface occurs, the system will signal AIS at the VC level (AIS-V) in the V5 byte of the overhead.
Line Tx Protection Mode - If you choose Normal, the system will behave regularly when configuring
the system to 1+1 with the STM-1 card. The redundant STM-1 will not transmit signals unless the
primary IDU performs a switch due to a failure. Choose Uni-direction MSP when the system is
configured for 1+1 with STM-1 cards. Both cards will transmit, and the decision of which will actually
function, will be decided by other equipment connected to it.
Received Trace Identifier - Read-only field. The received trace identifier, used to verify ongoing
connection to the transmitter.
Transmit Trace Identifier - The trace identifier used to verify ongoing connection to the receiver.
Expected Trace Identifier - The trace identifier that will be used to verify ongoing connection to the
remote side of the link.
Signal Degrade Threshold - The value can be 1e-6, 1e-7, 1e-8, or 1e-9.
AIS Status on VC12 - If AIS Detection Admin is enabled, this section will appear in the page. The table
shows if AIS is detected in incoming traffic at any VC-12, from the STM-1 interface.
Auto negotiation - select On if you want the system to control the data flow between the wayside
channel and other ports activated in the system.
Asynchronous RS-232
Asynchronous V.11
If enabled, a signal failure is generated at the corresponding trail, which will cause the far end not to receive
a signal (including trail ID indications). The trail status will show “signal failure”. In addition, an indication
is sent to the relevant interface.
Note that this is not a system alarm, since the problem originates elsewhere in the network.
Synchronous Ethernet consists of the transport of a frequency timing reference through the Ethernet physical
layer. It allows the receiving side of an Ethernet link to lock onto the physical layer clock of the received
Ethernet signal, which was derived from a reference clock source. The receiver is therefore frequency-
synchronized with the source.
IP-10 allows sychronization of the frequency of the outgoing Ethernet carrier signal with any existing TDM
trail.
Click the desired interface type (Line/STM-1/Radio) to select it as the synchronization source.
Note that if you choose an interface and then click Apply, the configuration will be cleared.
1+1 Protection
Protection Configuration
Mate Parameters
External alarm #1 admin (enable/disable) - initiate a switchover when external alarm #1 is raised.
Radio excessive BER admin (enable/disable) - initiate a switchover when a radio excessive BER
alarm is raised. This option is valid only when the MRMC script is regular or ACM running in Fixed
mode.
Protection Commands
Protection force switch - force a protection switchover and then freeze the protection state.
Manual Switch - issue a switchover, which will take affect when no other protection related alarms
are raised.
Copy to mate - copy all configurations to the mate unit (configuration synchronization between
local and mate).
TDM Trails
This page is used to configure the FibeAir® IP-10 Cross Connect (XC) system for operation.
FibeAir IP-10 Cross Connect system serves as a node in a microwave radio network.
The system is designed to comply with requirements of a node in a network that aggregates several sites
(downlinks) into a radio pipe (uplink). It can also be deployed in a mesh network configuration.
The system consists of up to six IDUs placed together in a single chassis, for TDM traffic cross connect.
Once the IDUs are linked through the common backplane (as shown in the photo above), the XC system is
constructed by building trails.
The following web page is an example of the IP-10 IDUs that appear in a nodal configuration.
2. On the left side of the main window, select Configuration, Trails, TDM Trails.
4. To select the E1/T1 ports for the trail, in the Add New Trail window, click the E1/T1 interface in any
IDU, and select the E1/T1, as shown in the example below.
5. Continue the trail configuration using the following options in the Add New Trail window:
Protected - Select Yes if you want a secondary trail to cover for the main trail if it fails.
If you chose Yes for Protected, a second interface will appear in the Add New Trail window, as follows:
Trail ID - Enter the ID of the trail. This ID is used to ensure that the flow of data over the link matches
the trail designations.
Trail Description - Enter a textual description of the trail for further identification purposes.
ACM Priority - Adaptive Coding & Modulation employs the highest possible modulation during
changing environmental conditions, which may be from QPSK to 256 QAM. If you select High for
priority, the system will ensure that this trail is used to pass traffic when throughput for other trails is less
efficient.
Active/Reserved - Set the trail to Active, to enable its operation. If you want to define the trail, but keep
it inactive for the time being, select Reserved.
For the trail to function properly, it must be configured accordingly on both sides of the link.
If a unit (IDU) is disconnected from the nodal enclosure and ceases to function as part of the shelf
configuration, the removal will be acknowledged as an alarm.
The IDU can then function as a stand-alone unit, using a "default" E1/T1 configuration.
However, note that you do not enable the ports in this page.
The ports are enabled only in accordance with the trails that you configure, as described in this guide.
The following is an example of connected trail ports and their system status.
Cross connection at the KLM level operates the same way as that for E1s.
When a trail is defined, you can choose one of the interfaces to be an STM-1 VC-12.
Note that in the CLI (Command Line Interface), this is done by setting the interface type to STM1 instead of
Line.
For example, for a trail between VC#1 in the radio and VC-12 #1 in the STM-1 interface of slot number one,
you would use the following command:
add-trail id1 desc1 high operational unprotected 1 stm1 1 1 radio 1
As with other interface types, the number after the interface type represents the interface number.
For STM-1, this means which VC-12 to use. The KLM slot to be used corresponds to the VC number
chosen, as specified in the ITU-T G.707 clause 7.3 standard.
Thus, for example, interface number 35 corresponds to TS#35 in the above table, which is KLM address 252
(TU-3#2, TU-2#5, TU-12#2).
MAID (Maintenance Association Identifier) is an identifier for a Maintenance Association, unique over the
domain that CFM is to protect against the accidental concatenation of service instances. The MAID has two
parts: the Maintenance Domain Name and the Short MA Name.
Status is the status of the current domain, which can be one of the following:
No Meps - only MAID configured, no MEPs. This state is used for empty domains, before defining
MEPs, or for a domain that contains only MIPs.
Disable - no continuity (CCM) frames are sent from the local MEP to remote MEPs.
Enable - continuity (CCM) frames are sent from the local MEP to remote MEPs.
CCM interval is the (periodic) time interval during which CCM messages are sent. Valid values include
1Sec, 10Sec, 1Min, and 10Min.
In the Add Maid window, for Domain name specify the maintenance domain name.
To delete a MAID, mark the checkbox at the end of its line, and click Delete selected.
Local MEP
LDI - Local Defect Indication. If the value Yes, a + in the right corner of the table describes the
reasons for this bug.
CCM Configuration
Send CCM - Select Disable if you don't want continuity messages (CCM) sent over the specific MAID.
Select Enable if you want continuity messages (CCM) sent over the MAID.
CCM Interval - Set the MAID time interval, which can be 1 second, 10 seconds, 1 Minute, or 10 Minutes.
Remote MEP
Actual MAC address - the MAC address of the remote MEP, which the local MEP recognizes.
Configured MAC address - used when you decide to specify a selected MAC address for the remote
MEP.
Cross Check - indicates if the current remote MEP was cross checked (pre-configured) or learned from
incoming CCMs.
Ping - run ping (loopback) from the local MEP to a specific remote MEP ID by clicking the ping icon.
The upper part of the window provides a short summary of the MAID and the remote MEP
being pinged.
The lower part shows the ping success rate percentage (LBM packet transmission over the
received LBR packets).
Checkbox - used to delete the selection or issue a linktrace (ETH-LT) command from the local MEP to
the current remote MEP.
Mark a remote MEP checkbox (only one) and click Linktrace, to trace the link.
The upper part of the window provides a short summary of the MAID and the Remote MEP being traced.
Automatic Link-trace results appear at the bottom of the page. The table is refreshed automatically every
fixed period of time (configurable, set to 15 min by default), displaying the last updated date and time.
This page shows in which Ethernet port the user defined an MEP or MIP.
Table Columns:
MEP or MIP defined is marked with a check when you define an MEP or MIP on this port.
Click the + beside a line for additional MEP/MIP configuration on the current port.
Add MEP
Click the Add button to add new local MEPs on the port.
Ethernet port is the port you will be adding (appears automatically to prevent errors).
For Priority, select the Pbit priority that the CCM message carries.
Add MIP
Under Service OAM in menu list on the left side of the window, click Advanced for additional MEP/MIP
operations.
Manual Ping
Click the Manual Ping item to send a ping to the remote MEP/MIP.
Priority is the Pbit priority bit for the outgoing ETH-LBM packets.
Click the Manual Linktrace item to send a linktrace command to the remote MEP/MIP.
Priority is the Pbit priority bit for the outgoing ETH-LTM packets.
In this page, you can set the parameters for a radio loopback test.
To apply any change you made and start the test, click Apply.
In this page, you can set the parameters for a PDH loopback test.
# loopback - for each line interface, select On if you want to perform a loopback test, Off if you don't
want to perform a test for that line, or Loopback towards radio to test the radio data flow.
To apply any change you made and start the test, click Apply.
In this page, you can set the parameters for an SDH loopback test.
Timeout - the amount of time you want the test to run (in minutes).
Line Loopback - select Enabled if you want to perform a loopback test, or Disabled if you don't want to
perform a test for that line.
Uploading
Uploading a configuration involves the following steps:
1. Create archive - This command creates a default archive in the target (IDU). The IDU configuration will
first be copied to this location.
2. Upload Archive - Uploading the IDU configuration to the host PC.
Config creation status - indicates whether or not the configuration file was created successfully.
Config upload status - indicates whether or not the configuration file was uploaded successfully from
target to host.
Configuration:
Click Create Archive to create the requested archive file on the target.
Click Create Archive to create the requested archive file on the target.
Downloading
This option allows you to download uploaded files from a host (such as a PC) to the target (IDU).
Downloading a configuration involves three steps:
1. Download archive - This command copies the configuration file from the host to the target.
2. Install archive - This command installs the configuration file, which will be operational only after a
hardware reset.
3. HW reset - When the system is up and running, the new downloaded configuration will be valid.
Config download status - indicates indicates whether or not the configuration file was downloaded
successfully from host to target.
Config install status - indicates whether or not the configuration file was installed successfully on the
target.
Click Download Archive to download the archive file from the host to the target.
Click Install Archive to install the requested archive file on the target.
Host path - path in the host (FTP directory) where the archive is to be stored. For the default FTP
path use set // for Windows, or set / for Linux.
User password - password for the FTP session. If you use the default user name (anonymous), use the
host login for the password.
New Version:
Click Download to download newer packages from the remote server (without installation).
Click Rollback to undo the recent IDU application upgrade operation (one step back).
CAUTION!
Packages are still upgraded after a rollback is applied to the IDU!
Note:
Rollback does not reverse a "downgrade" operation. To do so, use the "upgrade" command instead.
Click Downgrade to install all downloaded files (for downgrade). The downgraded version will be
activated only after a cold reset.
Remote SW update server URL - remote software update server URL, where the software updates
reside.
RFU software download status - shows the current state of RFU software download.
RFU receiver errors - monitors IDU-RFU interface errors detected by the RFU.
IDU receiver errors - monitors IDU-RFU interface errors detected by the IDU
Upload public key status - The current status of the uploading process.
Upload public key (button) - Click to upload the public key of the element.
Download security status - The current status of the digital certificate download process.
Download certificate (button) - Click to download the Target certificate (WEB server digital
certificate) or Target ca certificate (WEB CA digital certificate) to the element.
Security file type - The digital certificate type. The options include "Target certificate" for WEB
server digital certificate, or "Target ca certificate" for WEB CA digital certificate.
WEB CA certificate - Select Enable if the downloaded file is “WEB CA digital certificate” or
Disable if the file is "WEB server digital certificate".
Security Parameters
WEB Protocol - Determines whether the Web protocol is “HTTP” or “HTTPS” (Secured HTTP).
Telnet protocol admin - Allows you to enable or disable the telnet protocol.
Automatic logout period - The amount of minutes the system will wait for web activity before
closing the management session.
This page displays the users and groups defined in the system.