Professional Documents
Culture Documents
INSTALLATION AND
ETX-2
Carrier Ethernet Demarcation
Carrrier Ethernet Demarcation Version 6.5
ETX-2
Carrrier Ethernet Demarcation
Installation and Operation Manual
Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the ETX-2 and any
software components contained therein are proprietary products of RAD protected under
international copyright law and shall be and remain solely with RAD.
ETX-2 is a registered trademark of RAD. The ETX-2 product name is owned by RAD. No right,
license, or interest to such trademark is granted hereunder, and you agree that no such right,
license, or interest shall be asserted by you with respect to such trademark. RAD
products/technologies are protected by registered patents. To review specifically which product is
covered by which patent, please see ipr.rad.com. The RAD name, logo, logotype, the term
Distributed GM, and the product names MiNID, Optimux, Airmux, IPmux, and MiCLK are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their
respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
ETX-2. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute,
license, or sell any product that supports substantially similar functionality as the ETX-2, based on
or derived in any way from the ETX-2. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the ETX-2 package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof. Upon
such termination by RAD, you agree to return to RAD the ETX-2 and all copies and portions thereof.
For further information contact RAD at the address below or contact your local distributor.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-2 to be delivered hereunder shall be
free of defects in material and workmanship under normal use and service for a period of twelve
(12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by reason
of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall
have the option to choose the appropriate corrective action: a) supply a replacement part, or b)
request return of equipment to its plant for repair, or c) perform necessary repair at the
equipment's location. In the event that RAD requests the return of equipment, each party shall
pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or modifications
were made by persons other than RAD's own authorized service personnel, unless such repairs by
others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties
which extend beyond the face hereof, including, but not limited to, warranties of merchantability
and fitness for a particular purpose, and in no event shall RAD be liable for consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not limited
to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-2, and in no event shall RAD's
liability exceed the purchase price of the ETX-2.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-2 and for ensuring that replacements and other adjustments required in connection
with the said warranties are satisfactory.
Software components in the ETX-2 are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or indirect,
special, incidental or consequential damages of any kind. In spite of the above RAD shall do its
best to provide error-free software products and shall offer free Software updates during the
warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-2 shall not
exceed the sum paid to RAD for the purchase of the ETX-2. In no event shall RAD be liable for any
indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has
been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste equipment
in protecting the environment, the owner of this RAD product is required to refrain
from disposing of this product as unsorted municipal waste at the end of its life
cycle. Upon termination of the unit’s use, customers should provide for its
collection for reuse, recycling or other form of environmentally conscientious
disposal.
This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or
service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
This symbol appears on the top of the ETX203AX model specially designed
for installation in a small cell cabinet.
Hot surface! Contact may cause burn. Do not touch.
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near
the optical transmitter. The laser warning symbol may be also attached.
Warning Please observe the following precautions:
• Before turning on the equipment, make sure that the fiber optic cable is
intact and is connected to the transmitter.
• Do not attempt to adjust the laser drive current.
• Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
• The use of optical devices with the equipment will increase eye hazard.
• Use of controls, adjustments or performing procedures other than those
specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
Caution Some products may be equipped with a replaceable battery. There is danger
of explosion if batteries are mishandled or incorrectly replaced. On systems
with replaceable batteries, replace only with the same manufacturer and type
or equivalent type recommended by the manufacturer per the instructions
provided in the product service manual. Do not disassemble batteries or
attempt to recharge them outside the system. Do not dispose of batteries
in fire. Dispose of batteries properly in accordance with the manufacturer’s
instructions and local regulations.
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of this
product. Only qualified and authorized service personnel should carry out adjustment, maintenance
or repairs to this product. No installation, adjustment, maintenance or repairs should be performed
by either the operator or the user.
The ETX203AX unit that is specially designed for small cell cabinets, is restricted to installation in
Restricted Access Locations only.
In Denmark, Finland, Norway and Sweden, the unit is restricted to installation by service personnel
in Restricted Access Locations only.
Apparatets stikprop skal tilsluttes en stikkontakt med jord, som giver forbindelse
DK
til stikproppens jord
FI Laite on liitettävä suojamaadoituskoskettimilla varustettuun pistorasiaan
NO Apparatet må tilkoples jordet stikkontakt
SE Apparaten skall anslutas till jordat uttag
Connecting AC Mains
The following applies only to ETX203AM and ETX205A:
The unit may be equipped with surge protectors between the AC mains and
ground. The connection to the protective ground must be maintained
whenever the unit is connected to AC mains.
Warning
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be readily
disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF position.
When connecting the DC supply wires, first connect the ground wire to the corresponding terminal,
then the positive pole and last the negative pole. Switch the circuit breaker back to the ON
position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both ends.
The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk, there
are restrictions on the diameter of wires in the telecom cables, between the equipment and the
mating connectors.
Caution To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Attention Pour réduire les risques s’incendie, utiliser seulement des conducteurs de
télécommunications 26 AWG ou de section supérieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Français
Mise au rebut du produit
Afin de faciliter la réutilisation, le recyclage ainsi que d'autres formes de
récupération d'équipement mis au rebut dans le cadre de la protection de
l'environnement, il est demandé au propriétaire de ce produit RAD de ne pas
mettre ce dernier au rebut en tant que déchet municipal non trié, une fois que le
produit est arrivé en fin de cycle de vie. Le client devrait proposer des solutions
de réutilisation, de recyclage ou toute autre forme de mise au rebut de cette unité
dans un esprit de protection de l'environnement, lorsqu'il aura fini de l'utiliser.
Symboles de sécurité
Ce symbole peut apparaitre sur l'équipement ou dans le texte. Il indique des
risques potentiels de sécurité pour l'opérateur ou le personnel de service,
quant à l'opération du produit ou à sa maintenance.
Avertissement
Danger de choc électrique ! Evitez tout contact avec la surface marquée tant
que le produit est sous tension ou connecté à des lignes externes de
télécommunications.
Certains produits peuvent être équipés d'une diode laser. Dans de tels cas,
une étiquette indiquant la classe laser ainsi que d'autres avertissements, le
cas échéant, sera jointe près du transmetteur optique. Le symbole
d'avertissement laser peut aussi être joint.
Avertissement
Veuillez observer les précautions suivantes :
• Avant la mise en marche de l'équipement, assurez-vous que le câble de
fibre optique est intact et qu'il est connecté au transmetteur.
• Ne tentez pas d'ajuster le courant de la commande laser.
• N'utilisez pas des câbles ou connecteurs de fibre optique cassés ou sans
terminaison et n'observez pas directement un rayon laser.
• L'usage de périphériques optiques avec l'équipement augmentera le
risque pour les yeux.
• L'usage de contrôles, ajustages ou procédures autres que celles spécifiées
ici pourrait résulter en une dangereuse exposition aux radiations.
ATTENTION : Le rayon laser peut être invisible !
Les utilisateurs pourront, dans certains cas, insérer leurs propres émetteurs-récepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas être tenue responsable de
tout dommage pouvant résulter de l'utilisation d'émetteurs-récepteurs non conformes. Plus
particulièrement, les utilisateurs sont avertis de n'utiliser que des produits approuvés par l'agence
et conformes à la réglementation locale de sécurité laser pour les produits laser de classe 1.
Respectez toujours les précautions standards de sécurité durant l'installation, l'opération et la
maintenance de ce produit. Seul le personnel de service qualifié et autorisé devrait effectuer
l'ajustage, la maintenance ou les réparations de ce produit. Aucune opération d'installation,
d'ajustage, de maintenance ou de réparation ne devrait être effectuée par l'opérateur ou
l'utilisateur.
Connexion d'alimentation CC
Sauf s'il en est autrement spécifié dans le manuel, l'entrée CC de l'équipement est flottante par
rapport à la mise à la terre. Tout pôle doit être mis à la terre en externe.
A cause de la capacité de courant des systèmes à alimentation CC, des précautions devraient être
prises lors de la connexion de l'alimentation CC pour éviter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isolée de toute source de courant CA (secteur) et que
l'installation est conforme à la réglementation locale.
La capacité maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
bâtiment devrait avoir une capacité élevée de rupture et devrait fonctionner sur courant de court-
circuit dépassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des câbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'équipement et fixez-le en
position OFF. Lors de la connexion de câbles d'alimentation CC, connectez d'abord le conducteur
de mise à la terre à la borne correspondante, puis le pôle positif et en dernier, le pôle négatif.
Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapté et approuvé devrait être intégré à l'installation du
bâtiment.
Le disjoncteur devrait déconnecter simultanément les deux pôles si l'alimentation en courant CC
est flottante.
Glossary
Address A coded representation of the origin or destination of data.
Azimuth The horizontal direction from the GPS satellite, measured clockwise
with reference to north as the base direction. For example, a
coordinate due north has an azimuth of 0°, one due east has an
azimuth of 90°, one due south has an azimuth of 180°, etc.
Best Effort A QoS class in which no specific traffic parameters and no absolute
guarantees are provided.
Bridge A device interconnecting local area networks at the OSI data link
layer, filtering and forwarding frames according to media access
control (MAC) addresses.
Cell The 53-byte basic information unit within an ATM network. The user
traffic is segmented into cells at the source and reassembled at the
destination. An ATM cell consists of a 5-byte ATM header and a 48-
byte ATM payload, which contains the user data.
Channel A path for electrical transmission between two or more points. Also
called a link, line, circuit or facility.
Ethernet A local area network (LAN) technology which has extended into the
wide area networks. Ethernet operates at many speeds, including
data rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000
Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
Framing At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame, plus
information about the integrity of the frame. All other information,
GFP (Generic Framing Defined by ITU-T G.7041, generic framing procedure allows efficient
Procedure) mapping of variable length, higher-layer client signals, such as
Ethernet, over a transport network like SDH/SONET. Recently, GFP
has been extended to lower speed PDH networks.
Latency The time between initiating a request for data and the beginning of
the actual data transfer. Network latency is the delay introduced
when a packet is momentarily stored, analyzed and then forwarded.
Link The definition of a physical connection on the RV-SC/TDM map
Logical MAC A concept used to describe and map the Ethernet traffic passing over
different media (E1/T1, SDH/SONET, etc). Logical MAC represents the
MAC layer of the entity. It should be bound to a GFP, HDLC or MLPPP
port, which, in its turn, should be bound to the physical layer.
Association)
MEG (Maintenance MEs are grouped into ME groups. For a point-to-point Ethernet
Entity Group) connection/S-VLAN, a MEG contains a single ME. For a multipoint
Ethernet connection, a MEG contains n*(n-1)/2 MEs, where n is the
number of Ethernet connection end points. Each MEG is assigned a
unique ID that is used in OAM messages. (MEGs are also referred to
as Maintenance Associations or MAs in IEEE language.)
MEP (Maintenance MEPs are located at the ends of managed entities. MEPs generate
Entity Group End Point) and process OAM frames to monitor and maintain the ME.
Master Clock The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
Parameters Parameters are often called arguments, and the two words are used
interchangeably. However, some computer languages such as C
define argument to mean actual parameter (i.e., the value), and
parameter to mean formal parameter. In RAD CLI, parameter means
formal parameter, not value.
Payload The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.
Physical Layer Layer 1 of the OSI model. The layer concerned with electrical,
mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.
Policing A method for verifying that the incoming VC complies with the
user’s service contract.
Prioritization Also called CoS (class of service), classifies traffic into categories
such as high, medium, and low. The lower the priority, the more
“drop eligible” is a packet. When the network gets busy,
prioritization ensures critical or high-rated traffic is passed first, and
packets from the lowest categories may be dropped.
Routing The process of selecting the most efficient circuit path for a
message.
SNR Signal to Noise Ratio is the ratio of signal strength to the level of
background noise, usually expressed in decibels (dB)
SONET (Synchronous A North American standard for using optical media as the physical
Optical Network) transport for high speed long-haul networks. SONET basic speeds
start at 51.84 Mbps and go up to 2.5 Gbps.
SSH (Secure Shell) A network protocol that allows data to be exchanged over a secure
channel between two computers. Encryption provides confidentiality
and integrity of data.
Traffic Shaping A method for smoothing the bursty traffic rate that might arrive on
an access virtual circuit so as to present a more uniform traffic rate
on the network.
Trunk A single circuit between two points, both of which are switching
centers or individual distribution points. A trunk usually handles
many channels simultaneously.
EU Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Product Options: All options (may be followed by several suffixes separated by slashes)
Supplementary Information: The product herewith complies with the requirements of the EMC
Directive 2014/30/EU, the Low Voltage Directive 2014/35/EU and the
ROHS Directive 2011/65/EU.
The product was tested in typical configurations.
Signed for and on behalf of
RAD Data Communications Ltd.
Tel Aviv, 26 February 2017
Zohar Zosmanovich
Compliance Team Leader
EU Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Product Options: All options (may be followed by several suffixes separated by slashes)
Supplementary Information: The product herewith complies with the requirements of the EMC
Directive 2014/30/EU, the Low Voltage Directive 2014/35/EU and the
ROHS Directive 2011/65/EU.
The product was tested in typical configurations.
Signed for and on behalf of
RAD Data Communications Ltd.
Tel Aviv, 26 February 2017
Zohar Zosmanovich
Compliance Team Leader
EU Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Product Options: All options (may be followed by several suffixes separated by slashes)
Supplementary Information: The product herewith complies with the requirements of the EMC
Directive 2014/30/EU, the Low Voltage Directive 2014/35/EU and the
ROHS Directive 2011/65/EU.
The product was tested in typical configurations.
Signed for and on behalf of
RAD Data Communications Ltd.
Tel Aviv, 27 February 2017
Zohar Zosmanovich
Compliance Team Leader
EU Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Product Options: All options (may be followed by several suffixes separated by slashes)
Supplementary Information: The product herewith complies with the requirements of the EMC
Directive 2014/30/EU, the Low Voltage Directive 2014/35/EU and the
ROHS Directive 2011/65/EU.
The product was tested in typical configurations.
Signed for and on behalf of
RAD Data Communications Ltd.
Tel Aviv, 27 February 2017
Zohar Zosmanovich
Compliance Team Leader
Connecting to Terminal
To connect the unit to a terminal:
1. Connect the male 8-pin RJ-45 connector of the CBL-RJ45/D9/F/6FT terminal
cable to the unit’s 8-pin female connector, designated CONTROL.
2. Connect the other end of the CBL-RJ45/D9/F/6FT terminal cable to the ASCII
terminal equipment.
Connecting to Power
Regular units are available with AC, DC, or universal AC/DC power supply,
depending on the ordering option. AC/DC plugs or terminal block connectors are
available for DC power supplies.
Connecting to AC Power
For indoor installations, a standard K.21 power cable is supplied to provide AC
power to the unit.
For connection to unprotected AC power networks, devices that do not have
built-in AC surge protection are provided with an Enhanced AC power cable per
ITU-T K.21E enhanced mode.
To connect to AC power:
1. Connect the relevant AC power cable to the power connector on ETX-2.
2. Connect the power cable to the mains outlet.
The unit turns on automatically once connected to the mains.
Connecting to DC Power
For indoor installations, a standard K.21 power cable is supplied to provide AC
power to the unit.
All DC options support NEBS level 3 on port type 8b (DC inlet).
To connect to DC power:
1. Connect the standard power cable to the power connector on ETX-2.
2. Connect the power cable to the mains outlet.
The unit turns on automatically once connected to the mains.
Refer to the relevant DC Power Supply Connection section at the end of Chapter
2 in this manual for instructions on wiring the DC connection.
6. Log in with your user name (default: su for full configuration and monitoring
access) and password (default: 1234).
The device prompt appears:
ETX-2#
7. Type the necessary CLI commands.
8. Continue with product configuration.
#***************************Adding Classifier_Profiles***********************
config flows
classifier-profile all match-any match all
classifier-profile untagged match-any match untagged
#***************************Configuring_Flows********************************
flow mng_in
classifier untagged
no policer
ingress-port ethernet 101
egress-port svi 1
no shutdown
exit
flow mng_out
classifier all
ingress-port svi 1
egress-port ethernet 101 queue 0 block 0/1
no shutdown
exit all
#*********************Configuring_Router_Interface***************************
configure router 1
interface 1
bind svi 1
address 172.18.141.39/24
no shutdown
exit
static-route 172.17.0.0/16 address 172.18.141.1
exit all
save
Saving Configuration
Type save in any level to save your configuration in startup-config.
4. Verifying Connectivity
At the ASCII terminal, ping the IP address assigned to the management router
interface and verify that replies are received. If there is no reply to the ping,
check your configuration and make the necessary corrections.
5. Configuring Services
Proceed with service configuration (refer to the Services chapter for details of
different scenarios for provisioning supported services).
ETX-2 i
Table of Contents Installation and Operation Manual
ii ETX-2
Installation and Operation Manual Table of Contents
ETX-2 iii
Table of Contents Installation and Operation Manual
iv ETX-2
Installation and Operation Manual Table of Contents
ETX-2 v
Table of Contents Installation and Operation Manual
vi ETX-2
Installation and Operation Manual Table of Contents
ETX-2 vii
Table of Contents Installation and Operation Manual
viii ETX-2
Installation and Operation Manual Table of Contents
ETX-2 ix
Table of Contents Installation and Operation Manual
x ETX-2
Installation and Operation Manual Table of Contents
ETX-2 xi
Table of Contents Installation and Operation Manual
xii ETX-2
Installation and Operation Manual Table of Contents
ETX-2 xiii
Table of Contents Installation and Operation Manual
xiv ETX-2
Installation and Operation Manual Table of Contents
ETX-2 xv
Table of Contents Installation and Operation Manual
xvi ETX-2
Installation and Operation Manual Table of Contents
ETX-2 xvii
Table of Contents Installation and Operation Manual
xviii ETX-2
Installation and Operation Manual Table of Contents
ETX-2 xix
Table of Contents Installation and Operation Manual
xx ETX-2
Chapter 1
Introduction
1.1 Overview
ETX2 is RAD’s family of Carrier Ethernet demarcation and aggregation devices,
delivering RAD’s Service Assured Access solution, offering Ethernet services to the
customer premises in native Ethernet access networks over various infrastructure
types. ETX2 includes the demarcation devices ETX203AX, ETX203AM, and
ETX205A, as well as ETX220A, a 10 GbE demarcation and aggregation device. It
provides carrier-grade packet and TDM services for carriers, mobile operators,
and wholesalers, seeking to offer their customers unified SLA-based Ethernet
business services over any access technology.
ETX2 provides E-LAN, E-Line, and E-Tree Ethernet services over FE/GbE and
10GbE interfaces. It offers the same services over SHDSL, VDSL, PDH, and SDH
access lines. ETX2 supports an integrated Bridge functionality to allow full
support of E-LAN and E-Tree services, as well as ring topologies. Multiple VRFs (up
to 10) are supported when the TWAMP license is enabled.
ETX2 supports a rich offering of QoS functionality, including MEF 10.3 rank
policers that deliver high-scale multi-CoS services with hierarchical Quality of
Service (HQoS). It supports advanced scheduling, WRED per CoS, shaping per EVC
and port, and flexible classification rules with flexible access lists. Additionally, it
supports multicast with MLD snooping.
Featuring ultra-fast, hardware-powered processing, ETX2 performs OAM and PM
measurements with microsecond precision, offering powerful benefits such as
measuring and reporting bandwidth utilization per flow (EVC.CoS), collection of
PM parameters, and Y.1731-based measurement of frame loss, delay, and delay
variation. It also offers immediate detection of loss of continuity (LOC), triggering
sub 50 ms protection switching in ring topologies (G.8032v2) and end-to-end
service protection (G.8031).
ETX2 provides these types of Ethernet OAM:
• Single-segment (link) OAM according to IEEE 802.3-2005, active and passive
mode
• End-to-end connectivity OAM based on IEEE 802.1ag
• End-to-end service and performance monitoring based on ITU-T Y.1731
ETX2 supports L3 PM measurements based on TWAMP Light. It also offers
diagnostic tools that include MAC and IP-based intrusive and non-intrusive
loopbacks with MAC and IP swap, as well as advanced RFC-2544, Y.1564, and
L3 SAT generators and analyzers for service-oriented SLA validation and service
“birth certificate” reports.
Product Options
Several product options of the unit are available, offering different combinations
of ports, enclosures, and functionalities. Available product options in the ETX2
family are ETX203AX, ETX203AM, ETX205A, and ETX220A. The following SW
licenses are available:
ETX203AX
ETX203AX device has six Ethernet ports. ETX203AX-E1 has five Ethernet ports
and one E1 port: ETX203AX-DSL has one Ethernet port and four SHDSL ports
(eight-wire).
• Network ports:
In the device option without E1 port, up to two SFP or copper, depending
on whether port 2 is configured as a network or user port.
In the device option with E1 port, the port 2 default functional mode is
network. However, you can only use this port once you change its
functional mode to user.
• User ports – up to four SFP or copper, or five if port 2 is configured as a user
port
• E1 port – a single integrated port for ETH and voice access applications
• SHDSL port – four ports (eight-wire); two ports per RJ-45 connector
The device has a universal AC/DC power supply in a plastic 8.6” enclosure or in a
metal enclosure for NEBS and temperature hardened options.
ETX203AX is offered with three SW licenses, as described in Table 1-1.
Maximum 100M 1G 1G
capability
of UTP port
Support 100BaseFx and 100BaseFx and 100BaseFx The FE option supports GE SFP,
SFP types 1000BaseFx 1000BaseFx and allowing for upgrade to GE or
1000BaseFx GE30 without having to change
HW. BW is limited by the shaper
rates.
Maximum 2 2 64
shapers per
NNI port
Maximum 2 2 8
shapers per
UNI port
Maximum 12 12 128
shapers per
device
ETX203AM
The ETX203AM device has a modular interface with network ports, as well as
four fixed SFP or copper ports that are user ports unless otherwise specified
below. The module has the following options:
• Two GbE SFP/copper combo ports (port 2 can be configured as a user port)
• Two SHDSL ports (four-wire)
• Four SHDSL ports (eight-wire)
• Four VDSL ports (eight-wire)
• Four E1/T1 ports (EoPDH)
• Eight E1/T1 ports (EoPDH)
• One T3 port (EoPDH)
• Two T3 ports (EoPDH)
• No module – The first fixed port can be configured as a user or network port.
• The device has an AC or DC power supply and a metal 8.5” enclosure.
Maximum 100M 1G 1G
capability
of UTP port
Support 100BaseFx and 100BaseFx and 100BaseFx The FE option supports GE SFP,
SFP types 1000BaseFx 1000BaseFx and allowing for upgrade to GE or
1000BaseFx GE30 without having to change
HW. BW is limited by the shaper
rates.
Maximum 2 2 8
shapers per
UNI port
Maximum 12 12 128
shapers per
device
ETX205A
The ETX205A device has the following different options according to the metal
enclosure type:
Metal Network Ports User Ports E1/T1 Ports X86 Card AC/DC Power
Enclosure Supply
Type
ETX205A (19” enclosure, non-NEBS and PMC) can be ordered with SyncE/1588v2
timing options, in which case the device provides the ports specified in Timing
Options.
ETX220A
The ETX220A device has two, three, or four 10GbE ports, and 10 or 20GbE ports,
as follows:
• Network ports – two 10GbE XFP-based ports (The second port can be
configured as a network or user port.)
• User ports:
Up to two 10GbE XFP-based ports
0, 10, or 20GbE user ports (the first two ports can be configured as
network or user ports)
The following software license options are available:
• Basic Software Key (BSK) – one level of QoS with two shapers per NNI port
(2×8 CoS)
• Enhanced Software Key (ESK) – full QoS
The device has a single or dual AC or DC power supply and a metal 17.4”
enclosure.
ETX220A can be ordered with SyncE/1588v2 timing options, in which case the
device provides the ports specified in Timing Options.
Timing Options
If ETX205A or ETX220A are ordered with the timing option (PTP), the following
features are supported:
• Clock selection mechanism to select and distribute the device system clock,
including the holdover mechanism
• SyncE
• 1588 slave
• 1588 BC
In this option, the device also provides these additional timing ports:
• Station clock port (RJ-45) if the unit provides SyncE or 1588v2 timing
• ToD/1PPS RS-422 port (RJ-45) if the unit provides 1588v2 timing
• SMA port supplying external clock if the unit provides 1588v2 timing, or in
case of ETX220A if the unit provides SyncE
• SMA port supplying 1 pps if the unit provides 1588v2 timing
Applications
troubleshooting the network, using its enhanced Ethernet OAM and performance
monitoring capabilities.
Core Services Metro/Core Access Aggregation Access Network First Mile
Internet
FE/GbE
Access
Management MiNID
1/10 GbE
ETX-2
Cell-Site
ETX-5 PDH/
Cloud/Data Center SDH
SDH/
SONET ETX-2
10 GbE
IP/MPLS
Ring
Customer
Premises
1/10 GbE
ETX-5 Ring
RAN Controller Site ETX-2
ETX-2
FE/GbE/10GbE
ETX-2
Service Assured Access
Macro or Small
Cells
BTS
RNC/aGW Router
ETX-5 MiNID
Packet
Switched G.8032 v2 eNB
Network 1/10 GbE
n x STM-1/ Ring
OC-3 ETX-5
ETX-2 TDM
BTS
ETX-2
Timing (1588PTP/SyncE)
Features
Traffic Processing
ETX2 incorporates a complete set of CE 2.0-certified Ethernet service tools that
allow the service provider to distinguish between high- and low-priority traffic,
and to optimize TCP sessions.
Forwarding
Traffic forwarding is performed via point-to-point or bridge mechanisms.
The ETX2 bridge operates in VLAN-aware or VLAN-unaware mode.
TDM Pseudowire
Note This feature is applicable to ETX203AX with a built-in E1 port, ETX205A with
built-in E1/T1 ports , and devices that support smart SFP MiTOP functionality.
ETX203AX can be ordered with an E1 port and ETX205A can be ordered with
integrated four or eight E1/T1 interfaces for TDM over packet pseudowire
services. Devices that have integrated MiTOPs also allow TDM over packet
pseudowire services. Each TDM pseudowire (PW) carries a single bundle (group of
timeslots) to a predefined far-end bundle.
The following standard payload encapsulation methods are supported:
CESoPSN (with or CES (Circuit Emulation Services) over PSN, for framed
without CAS) traffic, according to IETF RFC 5086
The pseudowire connections can be encapsulated by the device for the following
types of PSN transport networks:
• MEF 8 (Ethernet)
• UDP over IP
MLDv2 Snooping
ETX2 IPv6 routers support Multicast Listener Discovery Version 2 (MLDv2)
protocol to discover multicast listeners on attached links and addresses that are
of interest to them. Bridges use MLDv2 Snooping to reduce multicast traffic by
analyzing MLDv2 messages and limiting multicast traffic to ports interested in it.
Routing
Device management, as well as other L3 ‘modules’, such as 1588 (8265.1), TDM
PW (UDP/IP), and TWAMP, use the ETX2 routing scheme.
When the TWAMP license is enabled, ETX2 supports multiple VRFs (up to 10);
management is supported over VRF1 only.
• Ethernet Ring Protection per G.8032v2 Layer-2 to protect against link and
node failures. This supports ring topology, and delivers low-cost traffic
protection and rapid service restoration, with SDH/SONET type resilience.
The ETX2 fault propagation mechanism enables propagating user port failures to
the network and the remote end, as well as propagating network failures back to
the user port. The mechanism has a set of triggers and actions (i.e. rules) that
are based on the physical layer (e.g. port failure) or ETH OAM (AIS, RDI, LOC,
etc.). Up to 32 fault propagation rules can be defined.
A Traffic Management Fault Propagation (TMFP) license can be enabled to provide
the Fault Propagation mechanism with a set of triggers and actions for queue
block shaper and flow policer (Event Manager).
The additional fault propagation actions are:
• Change policer rate
• Change shaper rate
Configuration of these actions enables you to implement network/application
level redundancy schemes while controlling the bandwidth of the different
redundant paths.
Note This section is relevant only when ETX205A or ETX220A are ordered with the
appropriate timing options.
The unit’s SyncToP™ suite includes clock recovery using IEEE 1588v2 Precision
Timing Protocol, Synchronous Ethernet (SyncE), and a built-in input/output clock
interface.
The ETX2 domain (system) clock is selected from up to two user-configurable
sources. Each source can be an Ethernet port (recovered SyncE clock), the station
clock, the internal GPS (for device with GNSS), or the recovered 1588v2 clock (i.e.
1588v2 slave clock; relevant only for devices without GNSS).
The clock selection mechanism (CSM) selects the best clock according to its
quality level (by SSM) and configured priority. The selected domain clock and its
quality level are distributed to all Ethernet ports (Tx SyncE and SSM) and is the
reference clock for the 1588v2 master.
A dedicated IEEE 1588v2 clock recovery module allows ETX2 to recover the clock
from a remote 1588v2 master clock. Furthermore, ETX2 supports a 1588v2
master clock that can function in a boundary clock application or as a standalone
grandmaster (relevant for GNSS option of ETX205A).
The Network Time Protocol (NTP) provides the means of synchronizing all
managed elements across the network to a reliable clock source provided by
multiple servers. ETX2 supports the client side of NTP v.3 (RFC 1305).
ETX2 supports a variety of access protocols including CLI over Telnet, SNMP, and
TFTP/SFTP. You can create databases and scripts of commonly used commands
and easily apply them to multiple units in your infrastructure.
To ensure client-server communication privacy and correct user authentication,
ETX2 supports the security protocols listed below:
• SNMPv3 (provides secure access to the device by authenticating and
encrypting packets transmitted over the network)
• RADIUS (client authentication)
• TACACS+ (client authentication)
• SSH for Secure Shell communication session
The ETX2 DHCP client enables plug-and-play zero touch provisioning via standard
TFTP functionality. This includes downloading the latest SW version and
configuration files.
ETX2 provides integrated management for RAD’s smart SFP devices, allowing
TDM over packet pseudowire services (using MiTOP devices), and Ethernet over
TDM (using MiRICi devices). The following devices are supported:
• MiRICi-E1/T1/E3/T3
• MiRICi-155
• MiTOP-E1/T1/E3/T3
Note In order to ensure discovery of the Ethernet services by RADview, you need to
assign a service name to the relevant flows, as well as ensure that collecting
performance monitoring data is enabled for the relevant flows, services, and
destination NEs.
Refer to the Installation and Setup chapter for a detailed description of the ETX2
interface connections.
Flow: Data
CoS/Queue Color CIR/EIR VLAN BE)
Mapping Mapping Policing Editing
EVC 1
EVC 2
WFQ
Classification
CoS/Queue Color CIR/EIR VLAN
Flow: Voice
Mapping Mapping Policing Editing
EVC n
Figure 1-4. Data Flow Including Scheduling and Shaping at Level 0 (ETX203AM, ETX203AX, and
ETX205A)
Figure 1-5. Data Flow Including Scheduling and Shaping at Level 0 and 1 (ETX220A)
Policer per Flow or Policing the traffic of the flow or group of flows.
Group of Flows If color aware policer, uses the packet ingress color as set by
color mapping.
Scheduling and Scheduling the various queues to transmit per queue priority
Shaping at Level 0 and weight
(EVC Level) Shaping the aggregate EVC traffic
Scheduling and Scheduling the various queues to transmit per queue priority
Shaping at Level 1 and weight
(Port Level) Shaping the aggregate port traffic (ETX220A only)
Ethernet Interfaces Number of Ports Six for device without E1 port; five for device with E1
(ETX203AX) port (ETX203AX-E1); one (User) for device with
embedded SHDSL ports (ETX203AX-DSL)
Network: up to two (Port 2 can be configured as a
network or user port.)
User: one, four, or five (if port 2 is configured as
user)
Note: In ETX203AX-E1, you can only use Port 2 after
you configure it as a user port.
Line Coding DMT; support for 16TCPAM and 32TCPAM line code
Line Rate (pair) 192 kbps–5696 kbps with steps of n × 64 kbps per
2-wire
Impedance 135Ω
Modular Network Number of Ports Two on slot 1 (The second port can be configured as
GbE Interface a network or user port.)
(ETX203AM)
Framing ESF
Line Coding DMT; support for 16TCPAM and 32TCPAM line code
Line Rate (pair) 192 kbps–5696 kbps with steps of n × 64 kbps per
2-wire
Impedance 135Ω
Ethernet Interfaces Number of Ports Network: two (The second port can be configured as
(ETX205A) a network or user port.)
User: four
E1/T1 Interface Number of Ports Four or eight (for half 19” enclosure, only 4)
(TDM PW), E1 Mode
Compliance G.703, G.732n, G.732s
(ETX205A)
E1/T1 Interface Number of Ports Four or eight (for half 19” enclosure, only 4)
(TDM PW), T1 Mode
Compliance ANSI T1.101, ANSI T1.403
(ETX205A)
Maximum Gain 50 dB
Recommended 1.5 dB
Noise Figure
RF DC Voltage 3.3V
Supply
Maximum DC 50mA
Current
Connector XFP
1GbE Interfaces Number of Ports 0, 10, or 20 (the first two ports can be configured as
(ETX220A) network or user ports)
Refer to the 10GbE specification for the Ethernet
configurations.
Max. Number 30
Classification
Matches per Profile
Bridge Instances 1
Number of VRFs 10
(Router Instances)
PMC in ETX205A: four
Number of Router 32
Interfaces
PMC in ETX205A: 64
Notes:
• Only one router interface is supported when
working with PWs.
• Only two router interfaces can be configured for
management.
• In PMC, one router interface can be shared
between the TWAMP controller/responder and
management access.
*
Note: The above OAM (CFM) values are subject to
the limit of 600 received PPS (packets per second).
This includes SLM, AIS, linktrace (LTM/LTR), and other
management packets. It does not include continuity
check (CC), loopback (LBM/LBR), delay measurement
messages (DMM/DMR), or loss measurement
messages (LMM/LMR), which are subject to the
hardware rate of 1 Gbps.
Max. Rate per 10 pps for Full TWAMP and TWAMP Light
TWAMP Session 1 pps for ICMP Echo and UDP Echo
Quality of Service Policer Dual Token Bucket mechanism (two rates, three
(Traffic colors)
Management)
CIR, CBS, EIR, EBS
Color Mode Color blind, color aware with coupling flag support
Max. Number 12
Marking Profiles
2.1 Safety
ETX2 devices are provided with the following types of grounding lugs:
• ETX2 NEBS-compliant enclosures (except for ETX203AM) for central office
or cell-sites have a UL-recognized dual grounding lug.
Screws are provided for attaching the grounding lug to ETX2, as well as star or
spring washers that ensure proper contact and preclude loosening of the screws.
Note Do not use any wires other than copper wires for grounding.
Note Refer also to the Connecting AC Mains and Connecting DC Power sections in the
Front Matter of this manual.
Allow at least 90 cm (36 in) of frontal clearance for operating and maintenance
accessibility. Allow at least 10 cm (4 in) clearance at the rear of the unit for signal
lines and interface cables.
The following table displays the ambient operating temperature of ETX2
products:
Device Connectors
• Plan carefully the grounding system for the central office or cell-site.
WM-34 wall-mount kit for ETX2 unit with 19” enclosure (ETX205A,
ETX220A)
WM-35 wall-mount kit for ETX203AM unit
• Network interface modules for modular ordering options (ETX203AM)
• AC/DC adapter
• Power supply according to ordering options:
Single AC power supply: ETX205A, ETX220A
Single DC power supply: ETX205A, ETX220A
• Lightning arrestor (also called lightning protector (LP)) for ETX205A with
GNSS option
ETX2 units (with the exception of ETX203AX model specially designed for
installation in a small cell cabinet) are intended for use in horizontal orientation
Warning only.
In case of vertical mounting orientation, install the unit on top of concrete or
For rack mounting instructions, refer to the associated installation kit manual.
For wall mounting instructions, refer to the drilling template at the end of this
manual (ETX203AX) or the associated installation kit manual (ETX203AM,
ETX205A, ETX220A).
If you are using ETX2 as a desktop unit, place and secure the unit on a stable,
non-movable surface.
See the clearance and temperature requirements in Site Requirements and
Prerequisites.
The following procedure describes how to mount an ETX203AX model specially
designed for installation in a small cell cabinet.
The ETX203AX model specially designed for installation in a small cell cabinet is
restricted for installation in Restricted Access Locations only.
Warning
To mount the specially designed ETX203AX unit in a small cell cabinet:
1. Remove the bottommost vacant metal tray from the cabinet.
2. Place the ETX203AX unit vertically on the metal tray, with the ventilation
holes facing outward, and leaving at least 1U (44.5 mm; 1.75”) distance
between the unit edges and tray edges.
3. Connect the unit to the metal tray, using 632UNC*8mm length screws.
4. Mount the tray vertically inside the cabinet, making sure to leave at least 10
mm between trays in the cabinet.
Upper Side
Bottom Side
Caution When calculating optical link budget, always take into account adverse effects of
temperature changes, optical power degradation, and so on. To compensate for
signal loss, leave a 3 dB margin. For example, instead of maximum receiver
sensitivity of -28 dBm, consider the sensitivity measured at the Rx side to be
-25 dBm. Information about Rx sensitivity of fiber optic interfaces is available in:
• SFP/XFP Transceivers data sheet for devices using SFPs or XFPs
• Chapter 1 of the installation and operation manual for devices with built-in
fiber optic interfaces
Note Some SFP/XFP models have a plastic door instead of a wire latch.
Caution Insert the SFP/XFP gently. Using force can damage the connecting pins.
Caution Do not remove the SFP/XFP while the fiber optic cables are still connected. This
may result in physical damage (such as a chipped SFP/XFP module clip or socket),
or cause malfunction (e.g., the network port redundancy switching may be
interrupted).
Before connecting or disconnecting any cable, you must connect the protective
ground terminals of this unit to the protective ground conductor of the mains (AC
or DC) power cord. If you are using an extension cord (power cable) make sure it
Warning is grounded as well.
Any interruption of the protective (grounding) conductor (inside or outside the
instrument) or disconnecting of the protective ground terminal can make this
unit dangerous. Intentional interruption is prohibited.
Note Refer also to the Connecting AC Mains and Connecting DC Power sections in the
Front Matter of this manual.
Connecting to AC Power
ETX2 units installed indoors require a 1.5m (5 ft) standard CBL-K21 AC external
power cable (per ITU-K.21) terminated by a standard 3-prong socket, to provide
AC power to the unit.
Hardened options of ETX2 units used in an unprotected power network, such as
AC cell site, AC street cabinet, AC pole, or rural area, require an AC Surge
Protection Unit to prevent hardware damage caused by current surges and
voltage spikes. In this unit, a single-phase AC power supply line protector
protects against lightning overvoltage for both common and differential modes.
ETX205A hardened devices have a built-in AC Surge Protection Unit, and
therefore, in unprotected power networks, can use the standard CBL-K21 AC
external power cable (per ITU-K.21) to provide AC power to the unit.
To connect to AC power:
1. Connect the relevant power cable to the power connector on ETX2.
For indoor installation – standard CBL-K21 AC power cable
For connection of hardened units to an unprotected power network:
For ETX203AX, ETX203AM, and ETX220A – Enhanced CBL-K21E AC
external power cable
For ETX205A (with built-in AC Surge Protection Unit) – Standard
CBL-K21 AC external power cable
2. Connect the power cable to the mains outlet.
The unit turns on automatically.
Connecting to DC Power
AC/DC plugs or terminal block connectors are available for wiring the DC
connection to the power cable (see AC/DC Adapter (AD) Plug for DC Power Supply
Connection and Terminal Block Connector for DC Power Supply Connection).
All DC options support NEBS level 3 on port type 8b (DC inlet).
To connect to DC power:
1. Wire the DC connection to the power cable, and connect it to the unit.
See the relevant DC Power Supply Connection section below for instructions
on wiring the DC connection –AC/DC Adapter (AD) Plug for DC Power Supply
Connection or Terminal Block Connector for DC Power Supply Connection.
2. Connect the power cable to the mains outlet.
The unit turns on automatically.
Caution Prepare all connections to the AD plug before inserting it into the unit’s power
connector.
• Reversing the wire voltage polarity will not cause damage to the unit, but the
internal protection fuse will not function.
Warning • Always connect a ground wire to the AD plug’s chassis (frame) ground
terminal. Connecting the unit without a protective ground, or interrupting the
grounding (for example, by using an extension power cord without a
grounding conductor) can damage the unit or the equipment connected to it!
• The AD adapter is not intended for field wiring.
Caution Prepare all connections to the TB plug before inserting it into the unit’s VDC-IN
connector.
To prepare and connect the power supply cable with the TB Plug:
1. Strip the insulation of your power supply wires according to the dimensions
shown.
2. Place each wire lead into the appropriate TB plug terminal according to the
voltage polarity mapping shown in Figure 2-11. (If a terminal is not already
open, loosen its screw.) Afterwards, tighten the three terminal screws to
close them.
3. Pull a nylon cable tie (supplied) around the power supply cable to secure it
firmly to the TB plug grip, passing the tie through the holes on the grip.
4. Isolate the exposed terminal screws/wire leads using a plastic sleeve or
insulating tape to avoid a short-circuit.
5. Connect the assembled power supply cable to the unit by inserting the
TB plug into the unit’s VDC-IN connector until it snaps into place.
Figure 2-11. Mapping of the Power Supply Wire Leads to the TB Plug Terminals
• Reversing the wire voltage polarity can cause damage to the unit!
• Always connect a ground wire to the TB plug’s chassis (frame) ground
Warning terminal. Connecting the unit without a protective ground, or interruption of
the grounding (for example, by using an extension power cord without a
grounding conductor) can cause harm to the unit or to the equipment
connected to it, and can be a safety hazard to personnel operating it!
Note Certain TB plugs are equipped with captive screws for securing the assembled
cable’s TB plug to the unit’s VDC-IN connector (C and E types only). To secure the
plug, tighten the two screws on the plug into the corresponding holes on the
sides of the input connector as shown in Figure 2-12.
Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.
Device Connectors
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
The following applies to all intra-building Ethernet ports with a copper interface
(RJ-45) that are indicated in Figures 2-17 through Figure 2-20:
Warning • The ports are suitable for connection to intra-building or unexposed wiring or
cabling only. The intra-building port(s) of the equipment or subassembly MUST
NOT be metallically connected to interfaces that connect to the OSP or its
wiring. These interfaces are designed for use as intra-building interfaces only
(Type 2 or Type 4 ports as described in GR-1089-CORE) and require isolation
from the exposed OSP cabling. The addition of primary protectors is not
sufficient protection in order to connect these interfaces metallically to OSP
wiring.
• The ports must use shielded intra-building cabling/wiring that is grounded at
both ends. The ground connection must be stable and with low impedance, in
order to ensure that surge currents, which can develop due to ground
potential rise, do not cause very high voltages to develop on the ETH isolation
transformer.
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
Note This section is relevant for ETX203AM with SHDSL network module, and for
ETX203AX with embedded eight-wire SHDSL uplink.
You can connect ETX2 to SHDSL equipment via one or two RJ-45 connectors
designated SHDSL; one RJ-45 connector for the 4-wire option and two RJ-45
connectors for the 8-wire option.
You can connect ETX203AM to VDSL equipment via the two RJ-45 (UTP)
connectors designated VDSL.
If you ordered ETX2 with E1/T1 network ports, you can connect ETX2 to E1/T1
equipment via the RJ-45 connectors designated E1/T1.
Note • You must configure the module with the correct module type (ETX203AM
only).
• Configure the E1/T1 ports as E1 or T1 ports.
Refer to the Cards and Ports chapter for details on configuring the module type
or E1/T1 ports.
To connect to E1 or T1 equipment:
• Connect an E1 or T1 line to the RJ-45 connector designated E1/T1 (1–4/8).
Refer to the Connection Data appendix for the RJ-45 connector pinout.
Note • If the network module has eight E1/T1 ports, use the cable CBL-E1-SPLT
(ETX203AM only).
• For unbalanced E1 connections, use the adaptor cable CBL-RJ45/2BNC/E1/X
(ETX205A only).
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
Note This section is relevant only for ETX203AM with T3 network module.
You can connect ETX203AMto T3 equipment via the BNC coaxial connectors on
the network module.
Note You must configure the module with the correct module type. Refer to the Cards
and Ports chapter for details.
To connect to T3 equipment:
1. Connect the Rx cable to the BNC connector labeled Rx.
2. Connect the Tx cable to the BNC connector labeled Tx.
Note This section is relevant only for ETX205A or ETX220A ordered with a timing
option that includes a station clock port.
You can connect ETX2 to an external clock source via a dedicated station clock
port, an RJ-45 connector designated EXT-CLK. Refer to the Connection Data
appendix for the connector pinout.
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
Note The cable length between the station clock port and the external clock source
must not exceed six meters (19.7 feet).
Note This section is relevant only for ETX205A or ETX220A ordered with a timing
option that includes the EXT-CLK/1PPS ports and/or the ToD/1PPS port.
Note The cable length between the ToD/PPS and EXT CLK/1PPS ports, and the external
synchronization equipment, must not exceed six meters (19.7 feet).
To connect to ToD/1PPS:
• Connect ETX2 to the synchronization equipment using a proprietary RAD
RS-422 cable terminated with a male RS-422 RJ-45 connector.
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to the supervisory
terminal port.
Note
After completing the configuration of the terminal, disconnect the terminal and
leave the CONTROL port open.
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
Caution Before leaving the installation site, it is highly recommended that you test
network connectivity between the device and the remote network management
station (for example, by sending a ping).
The enclosure of the specially designed ETX203AX unit installed in a small cell
cabinet can become very hot. Do not touch! Contact may cause burn.
Warning
ETX2 requires no operator attention once installed, with the exception of
occasional monitoring of front panel indicators. Intervention is only required
when ETX2 must be configured to its operational requirements, or diagnostic
tests are performed.
3.2 Indicators
The ETX2 unit’s LED indicators are located on the device’s front panel. These
LEDs enable the user to quickly observe the state of the device. Each LED has a
default “normal” functionality (see LED Behavior below).
You can also configure the TST/ALM or TST/ALM/PWR LED for LED signaling,
instead of its normal function (see LED Signaling below).
LED Behavior
The following tables summarize the normal functions of the ETX2 LED indicators
per device.
ETX203AM
ETX203AX
ETX205A
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
LASER
NET NET-USER USER
ETX-205A
CLASS
1
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT PS1 ~100-240VAC ~100-240VAC PS2
10/100/1000BT LOC 5 6 7 8 REM
ETX220A
LED Signaling
ETX2 supports LED signaling (blinking) using the following LEDS:
• TST/ALM/ – on ETX205A and ETX220A
• TST/ALM/PWR – on ETX203AM and ETX203AX
LED signaling is typically activated from the NOC to pass information to a
technician on the field, by blinking the device LED in agreed patterns. For
example, if the technician is not sure which device to reset in a rack, someone at
the NOC can point to it by blinking its LED.
You can configure the led-blink command to set the color, pattern, and duration
of a LED signal that is activated (see configuration details in the table below).
While this command is active, it overrides normal LED behavior. Once you cancel
an active command (by entering the no led-blink command or rebooting the
device), the LED behavior returns to normal.
Configuring LED blinking pattern led-blink <color> on <on-milliseconds> off color – LED color
<off-milliseconds> [forever | duration Possible values: red, green, yellow
<seconds>] (provided the device has these colors)
no led-blink on-milliseconds – time the LED is on
Possible values: 100-10000
off-milliseconds – time the LED is off
Possible values: 100-10000
seconds – total time of LED blinking
Possible values: 1-3600
Notes:
• The number of milliseconds (off or
on) must be a multiple of 100ms. If
you configure a different number,
the device rounds it up to the
nearest valid value and prints: Note:
On-time/Off-time was rounded up to
the nearest multiple of 100 not
above 10000.
• This command is not saved in the
configuration and cannot be
executed from a configuration file.
• If this command is repeated while a
previous one is active, it replaces the
previous one.
• Entering no led-blink cancels an
active command (if one exists), stops
the blinking, and returns the LED
behavior to normal.
• When the blinking is finished, the
device disables LED signaling.
Displaying the LED blinking status show led-blink-status For detailed information on the LED
blinking status report parameters, see
Viewing LED Blinking Status.
Note If LED Blinking Status is Off, only the first row of the report is displayed.
Parameter Description
3.3 Startup
Applicable Products
All configuration and software files, as well as the loading sequence, are
applicable to all ETX2 products and to PMC in ETX205A.
Note Although the CLI allows sw-pack-1 through sw-pack-4, you can define only two
SW packs simultaneously.
Note Configuration files should contain only printable ASCII characters (0x20–0x7E),
<Enter> (0x0D), <Line Feed> (0x0A), and <Tab> (0x09).
Loading Sequence
At startup, the device attempts to load configuration files in the following
sequence until a valid one is found:
• startup-config
• rollback-config
• user-default-config
• factory-default-config
If an error is encountered while loading a file, the default is to ignore the error
and continue loading. You can use the on-configuration-error command to
change this behavior, to either stop loading the file when the first error is
encountered, or reject the file and reboot; after rebooting, the next file in the
loading sequence is loaded).
To display the parameter values after startup, use the info [detail] command.
Applicable Products
These file operations are applicable to all ETX2 products.
PMC in ETX205A supports saving configuration changes; however, it does not
support Zero Touch.
Benefits
Zero Touch Provisioning (ZTP) allows a fully automated device field installation
with a minimal and set device initial configuration. ZTP automates tasks typically
performed by system and network managers, enabling you to install or upgrade
Functional Description
Show Me Demo
The video below describes Zero Touch via DHCP.
Note If you cannot view the video, ensure that you have the latest version of Adobe
Reader.
5. ETX2 downloads the ZTP file from the TFTP server according to the
information received in the lease. If not specified in the lease, the default
path is rad/, and the default file name is rad.xml.
6. If the ZTP file is loaded successfully, ETX2 sends the event download_end
(with success indication) to all configured network managers, and saves the
ZTP file as zero-touch-config-xml.
7. If zero-touch-config-xml contains directives for a software file, ETX2 does
one of the following, according to the action specified in the directives:
upgrade-only – loads software file if it is newer than the active software
image
downgrade-only – loads software file if it is older than the active
software image
replace – loads software file if different from the active software image
8. If zero-touch-config-xml contains directives for a configuration file, then if
the action specified in the directives is replace-cfg, ETX2 loads the specified
configuration file if it is different than the last configuration file loaded via
the ZTP mechanism, and saves it as specified by cfg-dst-file.
9. If a software file was downloaded, ETX2 installs it as the active software
pack.
10. If a software file and/or configuration file was downloaded, ETX2 reboots.
After startup, the normal startup loading sequence is performed, so that if
startup-config is loaded in the sequence, ETX2 executes the CLI commands
in the file.
11. If no reboot was needed, ETX2 performs the normal startup loading
sequence.
If an error occurs during the ZTP process, ETX2 does the following:
• Sends the event download_end (with failed indication) to all configured
network managers
• Starts a 10-minute timer
• Performs the normal startup loading sequence
• When the timer expires, ETX2 again attempts the ZTP process.
Prerequisites
• A Zero Touch Provisioning (ZTP) XML file, containing directives for the
software and configuration files. See Preparing the Zero Touch XML File for
details on the file structure.
• A DHCP or DHCPv6 server for providing the TFTP server address, in addition to
regular device IP address allocation (for management), default gateway, etc.
The DHCP server should support the following options:
Option 67 – ZTP XML file name
Option 150 – TFTP server address (option 66 may substitute option 150,
with the IP address expressed as a string formatted xxx.xxx.xxx.xxx)
The DHCPv6 server should support the following options:
Option 17, sub-option 32 – TFTP server IP address
Option 17, sub-option 33 – ZTP XML path and/or file name
• A TFTP server from which to download the following:
ZTP XML file
Software image file, if required by the directives
Configuration file, if required by the directives
• A preliminary configuration file in the device, which includes a Router
Interface (possibly configured over a known management VLAN) with
DHCP/DHCPv6 enabled.
Perform the following steps to ensure that on-net ZTP is performed on your
device when software or configuration files are changed:
1. Prepare the Zero Touch XML file with software and configuration file
directives.
2. Set up your DHCP or DHCPv6 server.
3. Place the software, configuration, and ZTP XML files in your TFTP server
directory.
4. Configure ETX2 for management access and enable as DHCP/DHCPv6 client.
Software Directives
The following directives supply information about the software file to download:
• sw-version – version of the software to download; must be formatted in the
same way as the chassis software revision displayed in the inventory display
(refer to Inventory in the Administration chapter).
• sw-action – software action to perform:
upgrade-only – Load software file if sw-version specifies a newer version
than the chassis software revision.
downgrade-only – Load software file if sw-version specifies an older
version than the chassis software revision.
replace – Load software file if sw-version specifies a version that is
different from the chassis software revision.
• sw-src-file – path and name of the software to download (must match the
file name in the TFTP server directory)
• sw-dst-file – file name for saving the downloaded software :
sw-pack-<n> – File is saved as the specified name, if it is not the active
software.
auto – File is saved as follows:
If there is an unused software pack number, and there is enough
space in the file system, then the file is saved as sw-pack-<n>, where
<n> is the smallest unused software pack number.
If all software packs numbers are in use, or if there is not enough
space to save the software, then the file is saved as sw-pack-<n>,
where <n> is the software pack number of the oldest version.
Configuration Directives
The following directives supply information about the configuration file to
download:
• cfg-version – version of configuration to download
• cfg-action – action to take regarding configuration:
replace-cfg – loads configuration file if cfg-version is different than the
last ZTP configuration version.
• cfg-src-file – path and name of the configuration file to download (must
match the file name in the TFTP server directory)
• cfg-dst-file – specifies the name under which to save the downloaded
configuration file; must contain startup-config
• ETX-100:
If version 4.3.30.10 is newer or older than the active software version,
download /rad/etx/etx100.sw and save it as specified for the auto option
in Software Directives.
If the last downloaded ZTP configuration version was not etx100 4.3.20,
download /rad/etx/etx100.cfg and save it as startup-config.
• ETX-200:
If version 4.3.50 is newer than the active software version, download
/rad/etx/etx200.sw and save it as specified for the auto option in
Software Directives.
If the last downloaded ZTP configuration version was not etx200 4.3.50,
download /rad/etx/etx200.cfg and save it as startup-config.
• ETX-300:
If version 4.3.10 is older than the active software version, download
/rad/etx/etx300.sw and save it as specified for the auto option in
Software Directives.
If the last downloaded ZTP configuration version was not etx300 4.3.10,
download /rad/etx/etx300.cfg and save it as startup-config.
<rpc message-id="1"
xsi:schemaLocation="urn:ietf:params:xml:ns:netconf:base:1.0
netconf.xsd http://www.rad.com/schema/zero-touch-
configuration/1.0 ztc_netconf.xsd">
<edit-config>
<target>
<running/>
</target>
<config>
<zero-touch-configuration>
<ETX-100>
<sw-version>4.3.30.10</sw-version>
<sw-action>replace</sw-action>
<sw-src-file>/rad/etx/etx100.sw</sw-src-file>
<sw-dst-file>auto</sw-dst-file>
<cfg-version>etx100 4.3.20</cfg-version>
<cfg-action>replace-cfg</cfg-action>
<cfg-src-file>/rad/etx/etx100.cfg</cfg-src-file>
<cfg-dst-file>startup-config</cfg-dst-file>
</ETX-100>
<ETX-200>
<sw-version>4.3.50</sw-version>
<sw-action>upgrade-only</sw-action>
<sw-src-file>/rad/etx/etx200.sw</sw-src-file>
<sw-dst-file>auto</sw-dst-file>
<cfg-version>etx200 4.3.50</cfg-version>
<cfg-action>replace-cfg</cfg-action>
<cfg-src-file>/rad/etx/etx200.cfg</cfg-src-file>
<cfg-dst-file>startup-config</cfg-dst-file>
</ETX-200>
<ETX-300>
<sw-version>4.3.10</sw-version>
<sw-action>downgrade-only</sw-action>
<sw-src-file>/rad/etx/etx300.sw</sw-src-file>
<sw-dst-file>auto</sw-dst-file>
<cfg-version>etx300 4.3.10</cfg-version>
<cfg-action>replace-cfg</cfg-action>
<cfg-src-file>/rad/etx/etx300.cfg</cfg-src-file>
<cfg-dst-file>startup-config</cfg-dst-file>
</ETX-300>
</zero-touch-configuration>
</config>
</edit-config>
</rpc>
Note
You can navigate to file dir, to check if your device has a ZTP file (zero-touch-
confg-xml). If it does not, this means that the ZTP process has not yet been
performed on your device. The zero-touch-config-xml appears in the file directory
once ZTP has been performed on the device.
The following procedure describes how to prepare the ZTP XML file with software
image and configuration file directives, as required, before performing ZTP on
your device the first time. Once this file is prepared, place it on the TFTP server
(see Setting Up the TFTP Server) and update it, as required.
Note Steps 3 and 4 are optional, depending on whether the device requires
configuration, software, or both.
Note If required, you can install a TFTP server application on your PC (refer to TFTP
Application in the Administration chapter).
Software image file for current ETX2 SW version – if required by ZTP XML
file directives
Configuration file – if required by ZTP XML file directives
Note If required, you can install a DHCP server application on your PC.
Note DHCP/DHCPv6 is a common method for providing the device with an IP address,
but it is not mandatory. The IP address can be manually configured, or provided
by other methods, such as PPPoE.
Note The script below shows enabling the device as a DHCP client. You can enable the
device as a DHCPv6 client by replacing dhcp in the example below with dhcpv6-
client.
#*******************************Adding_SVI***********************************
config port
svi 1
no shutdown
exit all
#***************************Adding Classifier_Profiles***********************
config flows
classifier-profile all match-any match all
classifier-profile untagged match-any match untagged
#***************************Configuring_Flows********************************
flow mng_in
classifier untagged
no policer
ingress-port ethernet 101
egress-port svi 1
no shutdown
exit
flow mng_out
classifier all
ingress-port svi 1
egress-port ethernet 101 queue 0 block 0/1
no shutdown
exit all
#*********************Configuring_Router_Interface***************************
configure router 1
interface 1
bind svi 1
vlan 4094
dhcp
address 172.18.141.39/24
no shutdown
exit
static-route 172.17.0.0/16 address 172.18.141.1
exit all
save
Ethernet Local, remote Inband Telnet (IPv4 RADview (see Working with
FE/GbE/ only), SSH RADview below)
10GbE Terminal emulation application
(see Working with Telnet and SSH
below)
Note
By default, the terminal, Telnet (SSH), and SNMP management access methods
are enabled. See Management Access Methods for details on enabling/disabling a
particular method.
Applicable Products
This feature is applicable to all ETX2 products and to PMC in ETX205A.
Functional Description
MNG RI
(ETX Host)
Router NNI
NNI
MNG RI
(ETX Host)
Router Bridge Bridge Port
NNI
MNG RI
(ETX Host)
OOB
Router MNG
Port
Figure 3-11. Direct Host OOB MNG Access (all ETX2 devices)
OOB
MNG
Port
MNG RI
(ETX Host)
Router Bridge Bridge Port
NNI
Factory Defaults
By default, access is enabled for all the applications.
In the default factory configuration, ETX2 allows management from the OOB
management port.
The default factory configuration includes the following:
• Allows untagged management access from the OOB port
• Default IP address of the Router Interface is 169.254.1.1/16
• No default Gateway configuration
• Allows local management access using a PC to an ‘out of the box’ ETX2
device:
When PC uses DHCP, access to ETX2 device is automatically established
(PC address defaults to 169.254.x.y as no DHCP server Microsoft
protocol).
• Includes flows to and from an SVI Router and a Router Interface with a fixed
and set IP address
• SVI, RI, and flow are assigned with indexes at the end of the device range and
reserved flow names (to coexist with existing scripts).
SVI #: 96 (highest valid SVI index)
RI #: highest valid RI number (for example, for ETX205A: 32)
Flows: mng_access_default_in, mng_access_default_out
• Not backward compatible to user configuration CLI scripts that configure OOB
port
Characters typed at the ETX2 CLI prompt are redirected to and from either the
local terminal (if managing ETX2 via the control port) or the Telnet/SSH session
(if managing ETX2 remotely) to the x86 host, via the RS-232 connection
between the ETX2 NTU and the x86 card.
Note You can also run a Telnet (IPv4 only) or SSH session directly to the x86 processor
(SSH only in the case of PMC).
Network
Telnet RS-232
Remote RAD
Device RAD Device
PC
Source IP Address
The source IP address depends on the location in the CLI tree from which the
Telnet client command is activated:
• If the Telnet client command is activated from the router context, the routing
table of the current router defines the IP address that the packets are sent
from.
• If the Telnet client command is activated outside the router context, the
routing table of Router 1 defines the IP address that the packets are sent
from.
If the destination IP address is not a valid unicast IP address, ETX2 rejects the
command.
Special Characters
When the client session is open, its parent session passes all special characters
(such as <Ctrl> + <any key>) without parsing or acting upon them. The only
exception is the <Ctrl> + <_> key combination, which closes the client Telnet
session. This allows you to terminate the connection and return to the parent
session if the client session becomes unresponsive, rather than waiting for the
inactivity timeout to end the connection.
Inactivity Timeout
When a Telnet client is used, the inactivity timer of the parent session rearms.
This ensures that as long as the client session is active, its parent session is not
terminated due to an inactivity timeout. Likewise, when the inactivity timer of the
parent session expires, it is terminated together with its client session.
Termination
The client session is terminated if one of the following occurs:
• You quit the client session by using the <Ctrl> + <_> key combination. When
this key combination is entered, ETX2 terminates the client session and
returns to the parent session prompt. This is useful when the remote device
stops responding or the connection to it is lost.
• You quit the parent session.
• The parent session is terminated due to inactivity timeout.
Login
ETX2 supports various access levels to prevent unauthorized modification of the
operating parameters. Refer to User Access in the Management and Security
chapter for more information on the access levels, as well as a list of the default
users defined in the device and information on configuring additional users.
Note The superuser (su) can perform all the activities supported by the ETX2
management facility.
You can log into your device with your username and password.
If you fail to log in to the terminal five times (due to wrong username or
password) in less than five minutes, from the same IP address (or the local
console), the device does the following:
• Blocks further login attempts from the same IP (or the local console) for ten
minutes (the default) or the number of minutes configured in the login timer
(refer to timeout configuration in Control Ports section of Management and
Security chapter). Attempts from remote are answered with immediate TCP
reset, without trying to authenticate the user. Attempts from the local
console are rejected, and the following error is generated: Console temporary
blocked due to excessive failed login attempts.
• Blocks any management protocol from the same IP (or the local console),
such as SNMP and NETCONF, for ten minutes (the default) or the number of
minutes configured in the login timer (timeout).
• Logs the failed_login event, with the maximum number of attempts exceeded
string.
When the locking period is over, the device lifts the block, even if there were
further attempts during this time. Afterwards, you can fail five more attempts
before being locked again.
Note • SNMP access attempt with wrong credentials does not count as a failed login
attempt, and the user is not blocked due to it.
• Information on recent failed login attempts (of sources that failed since last
being unblocked) can be displayed by invoking the show failed-login-attempts
command (under the management level). Refer to Viewing Failed Login
Attempts in the Management and Security chapter.
• <CR> for either username or password is ignored, and not considered a failed
login attempt.
Logging In
To log in to ETX2:
1. At the user prompt (user>), enter the user name and press <Enter>.
The password prompt (password>) appears.
2. Enter the password (default is 1234) and press <Enter>.
The base prompt ETX2# appears.
Note You can display a banner at login. Refer to the Administration chapter for details.
Changing Password
It is recommended that you change the users’ default passwords to prevent
unauthorized access to the unit using the special option chngpass. This option is
also useful in case the user has forgotten their password.
To change/restore a password:
1. At the User prompt (config>mngmnt# user>), enter chngpass and press
<Enter>.
2. Enter user as user name and press <Enter> to receive a temporary password.
With this password you can enter as user and change the password to your
own.
A key code is displayed.
3. Send the key code to RAD Technical Support department.
RAD technical support department will generate a temporary password
which is valid for a single login.
4. Use this temporary password to log in and set a new permanent user name
and password.
Note Most commands are available only in their specific context. Global commands are
available in any context. You can type ? at any level to display the available
commands.
CLI Prompt
The base level prompt contains the device name, which is ETX2 by default (the
device name can be configured in the system level; refer to Device Information in
the Administration chapter). The prompt ends with $, #, or >, depending on the
type of entity being configured and the user level.
If a new dynamic entity is being configured, the last character of the prompt is $.
Examples of dynamic entities include flows, QoS profiles, and OAM CFM entities.
If a new dynamic entity is not being configured, the last character of the prompt
is > (for tech or user access levels) or # (for other access levels).
Note The examples in this manual use # as the last character of the prompt, unless the
creation of a new dynamic entity is being illustrated.
After you type a command at the CLI prompt and press <Enter>, ETX2 responds
according to the command entered.
Navigating
To navigate down the tree, type the name of the next level. The prompt then
reflects the new location. To navigate up, use the global command exit. To
navigate all the way up to the root, type exit all.
At the prompt, one or more level names separated by a space can be typed,
followed (or not) by a command. If only level names are typed, navigation is
performed and the prompt changes to reflect the current location in the tree. If
the level names are followed by a command, the command is executed, but no
navigation is performed and the prompt remains unchanged.
Note To use show commands without navigating, type show followed by the level
name(s) followed by the rest of the show command.
In the following example, the levels and command were typed together and
therefore no navigation was performed, so the prompt did not change.
ETX2# configure system date-and-time date-format yyyy-mm-dd
ETX2# show configure system system-date
2013-06-10 15:08:20 UTC +00:00
ETX2#
In the following example, the levels were typed separately and the navigation is
reflected by the changing prompt.
ETX2# configure
ETX2>config# system
ETX2>config>system# date-and-time
ETX2>config>system>date-time# date-format yyyy-mm-dd
ETX2>config>system>date-time# exit
ETX2>config>system# show system-date
2013-06-10 15:13:23 UTC +00:00
ETX2>config>system#
Full-Path Command
Full-path command allows you to enter a CLI command anywhere in the tree as if
the current level was the CLI root, by preceding the command or level change
Note Before executing a full path command, the CLI engine exits to the CLI root. Some
commands (e.g. ping) behave differently, depending on the location they were
executed from. The following command, for example, would use a router 1 source
address, although executed from router 2:
ETX2>config>router(2)# \configure router 1 ping 192.168.1.1.
Command Tree
The tree command displays a hierarchical list of all the commands in the CLI tree,
starting from the current context.
Command Structure
CLI commands have the following basic format:
command [parameter]{ value1 | value2 | … | valuen } [ optional-parameter
<value> ]
where:
You can type only as many letters of the level, command, or parameter as
required by the system to identify it. For example, you can enter config manag to
navigate to the management level.
Special Keys
The following keys are available at any time:
Getting Help
You can get help in the following ways:
• Type help to display general help (see General Help).
General Help
Enter help at any level to display general CLI help, including:
• Short description of CLI interactive help
• Commands and levels available at the current level
• Globally available commands
• CLI special keys (hotkeys)
• Output modifiers for filtering output
• URLs for device manual and shelf view manual
Example of help command output from the root level:
Level Help
Enter ? at the command prompt to display the commands available in the current
level.
ETX2>file# ?
delete - Delete file
delete-user - Deletes a file from the device
[no] description - Description of the file
dir - Display file directory
user-file-dir - List of all user files in the device
Command-Line Completion
Command-line completion saves you command-line entry time and reminds you
the syntax of command-line entities (levels, commands, parameters, flows, and
profiles).
In a command-line, ETX2 completes command-line entities, when you press
<Tab> immediately following a string (one or more characters).
Some user-defined entity names, such as flow names or profile names, can be
completed as well. If you enter an entity name (flow, profile, or similar) that does
not exist in the database, ETX2 creates this entity with the selected name.
• If the command-line entity name can be completed in only one way, when
you press <Tab>, ETX2 autocompletes the entire name and appends a space.
• If the command-line entity name can be completed in more than one way,
ETX2 appends the characters that are common to all possibilities, and
displays a list of the completion possibilities beginning with those characters.
• If the string is already a complete entity name
(level/command/parameter/flow/profile) or cannot be completed to a
complete name, no completion is done.
• Pressing <Tab> following a complete command name (followed by a space),
displays a list of available command arguments, if they exist (same behavior
as ?).
• Pressing <Tab> following a string and a space returns a CLI error: Ambiguous
Command. This is because the string entered could be completed to more
than one command and is therefore ambiguous.
• Pressing <Tab> at the beginning of a command line behaves like a regular
tab, and unlike ?, does not display a list of available commands.
The following tables show examples of string completion.
Interactive Help
To get interactive help, type ?.
In general, typing a ? directly after a string displays possibilities for string
completion, while typing <space> and then a ? displays possibilities of the next
argument.
When a <CR> appears in a ? list, the string you entered is itself a valid command
needing no further additions. Pressing <Enter> executes the command or
navigates to the indicated level.
Typing ? immediately after a command or partial command with no space before
the ?, tells ETX2 to display all possibilities for completing the string. Help output
is always followed by the string you typed with the cursor at the end of the
string waiting for input.
ETX2>config>flows# classifier-profile myclass m?
match-any
ETX2>config>flows# classifier-profile myclass m
ETX2>admin# fact?
factory-default-all - Return to factory default and reboot
factory-default - Return to factory default configuration and
reboot
ETX2>admin# fact
ETX2>admin# factory-default?
factory-default-all - Return to factory default and reboot
<CR>
ETX2>admin# factory-default
Current configuration will be erased and device will reboot with factory
default configuration. Are you sure ? [yes/no] _
When a string cannot be completed, ETX2 displays “cli error: Invalid Command”.
ETX2>admin# stac?
# cli error: Invalid Command
ETX2>admin# stac
ETX2>file# da ?
# cli error: Invalid Command
ETX2>file# da
Typing <?> after a space between a command or level name and the ? tells ETX2
to display possibilities of the next argument. If the string preceding the ? is
ambiguous or invalid, an explanatory message is displayed. The string does not
have to be a complete command.
If there is only one possible command starting with that string, pressing <Enter>
will execute the command. If there is more than one command that starts with
the string, the CLI displays a message that it can’t clarify which command you
want.
ETX2>admin# factory?
ETX2>admin# factory
A string that is a complete command name followed by a space ? displays all
possible command parameters.
ETX2>config>flows# show ?
summary - Displays list of flows
ETX2>config>flows# show
ETX2>config>flows# classifier-profile ?
<classification-n*> : [1..32 chars]
ETX2>config>flows# classifier-profile
The next example shows a complete command to which a parameter could be
appended. It also shows how a string that is a complete command is executed by
pressing <CR>, or <Enter>.
ETX2>config>access-control# resequence access-list acl_1 ?
<CR>
<number> : [0..100000]
The next example shows a complete command that has no parameters.
ETX2>config>flows# classifier-profile myclass match-any ?
<CR>
ETX2>config>flows# classifier-profile myclass match-any
Note
Schedules for date and time are saved in system local time. If the local time
changes, ETX2 does not modify the schedules to compensate for the change;
therefore, changing the time can cause schedules to be executed twice or not
executed at all.
To schedule a command:
• In any level, enter the schedule command according to the type of schedule:
In <minutes> – Enter:
schedule <name> in <minutes> “<command>”
The schedule is saved with its name set to <name>, and the specified
<command> is executed after the specified amount of <minutes> has
elapsed, regardless of changes to the local system time.
Range for <minutes>: 1–14400 [10 days]
At <date-and-time> – Enter:
schedule <name> at {january | february | march | april | may | june | july |
august | september | october | november | december} <dd> <yyyy>
<hh>:<mm> <command> [volatile | nonvolatile]
The schedule is saved with its name set to <name> (in permanent
memory if nonvolatile was specified), and the specified <command> is
executed at the specified date and time. If the local system time is
changed after the schedule is configured, the scheduled command might
not be executed, or might be executed twice.
Note An invalid date and time is not allowed; however, a date and time in the past is
allowed; a schedule with its date and time in the past will never be executed
unless the device date/time is changed such that the schedule date and time is
no longer in the past.
Note Schedules can be added or deleted, but not changed. If you wish to change the
details of a schedule, you have to delete it and then recreate it with the changes.
To delete schedules:
• To delete a specific schedule, in any level enter:
no schedule <name>
• To delete all finished schedules, navigate to the admin scheduler level and
enter:
clear-finished-schedules
Note You can also enter the info command from the root of the device to view all
commands of the device, including scheduled commands (see Viewing the Device
Configuration section below).
Summer Time
Start (Recurring): Last Sunday of May, 02:00
End (Recurring): Last Thursday of October, 02:00
Offset : 60 minutes
Start : 31 May 2015 12:21
End : 25 October 2015 12:21
Summer Time
Start (Recurring): Last Sunday of May, 02:00
End (Recurring): Last Thursday of October, 02:00
Offset : 60 minutes
Start : 31 May 2015 12:21
End : 29 October 2015 12:21
Offset : 60
Parameter Description
Current date Current date and time, and current offset from UTC
Activation In output of show scheduler, indicates the amount of time before the scheduled
command will be executed, according to the type of schedule:
• Once (In) – Amount of time before the scheduled command will be executed, in the
form <hh:mm:ss>, <1 day hh:mm:ss> or <ddd days, hh:mm:ss>
• Once (At) – Date and time at which the scheduled command will be executed
• For either type, -- is displayed if the schedule is marked as finished.
Activation (Local In output of show scheduler-details for schedule type Once (At), displays the date and
Time) time at which the scheduled command will be executed.
Activation In In output of show scheduler-details for schedule types Once (In) and Once (At), displays
(Seconds) the amount of time before the scheduled command will be executed.
Start (Date) For one-shot daylight saving time scheduling, displays daylight saving time start date
and time.
End (Date) For one-shot daylight saving time scheduling, displays daylight saving time end date and
time.
Start (Recurring) For recurring daylight saving time scheduling, displays the configured week of the
month, weekday, month, and time for daylight saving time start.
End (Recurring) For recurring daylight saving time scheduling, displays the configured week of the
month, weekday, month, and time for daylight saving time end.
End For recurring daylight saving time scheduling, displays the next scheduled date and time
for daylight saving time end.
Offset Number of minutes to move the clock during daylight saving time
Configuration Errors
The following table lists the messages generated by the device when a command
scheduling configuration error is detected.
Schedule with this name You tried to create a new schedule with Specify a name that is not being used
already configured a name that is used by an existing by an existing schedule.
schedule.
Warning: Scheduled The command that you specified to Check the command; if changes are
command failed sanity schedule may fail when executed. needed, delete the schedule and
re-enter it with the changed
command.
The logout command You specified the logout command as None. You are not allowed to
may not be scheduled the command to schedule. schedule the logout command.
Refreshing Output
You can specify that ETX2 should periodically refresh the output of a show
command.
Note The example uses a slot number to reference the port, which may not be
applicable to every device.
Administrative Status : Up
Operational Status : Down
Connector Type : SFP Out
Name ETH-1/1
Administrative Status : Up
Operational Status : Down
Connector Type : SFP Out
Auto Negotiation : Other
MAC Address : 00-20-D2-50-E3-84
To exit the refresh-mode press ESC or Ctrl+C
ETX2>config>port>eth(1/1)#
Filtering Output
Some commands, such as info and show display large amounts of information as
their output. It is possible to control the type and amount of information
displayed, by filtering the output.
To filter a command’s output, append to the command:
| [include | exclude | begin] <filter-expression>
Keyword Description
include The output includes only lines that match the filter
expression.
exclude The output includes only lines that do not match the filter
expression.
begin The output starts with the first line that matches the filter
expression and continues with all further lines.
Metacharacters
Metacharacters are characters with special meaning. They allow you to define
filter criteria, while not being part of the filter criteria themselves. Some are
placeholders or wildcards. Some allow you to define ranges of characters to
either include or exclude. You can construct complex filter expressions to see the
exact output you want. Table 3-10 describes filter metacharacters.
. Matches any single character. r.t matches the strings rat, rut, and r t, but not
root.
$ Matches the end of a line. device$ matches the end of the string header
device but not the string header device-name.
^ Matches the beginning of a line. ^device matches the beginning of the string
device loaded from but not the string header
device-name.
* Matches zero or more occurrences of .* means match any number of any characters.
the preceding character.
\ This character is used to treat the \$ is used to match the $ character rather than
following metacharacter as an ordinary match the end of a line.
character. \. is used to match a period rather than match
any single character.
[] Matches any one of the characters r[aou]t matches rat, rot, and rut, but not ret.
[c1-c2] between the brackets. [0-9] matches any digit.
[^c1-c2] Ranges of characters are specified by a [A-Za-z] matches any upper or lower case letter.
beginning character (c1), a hyphen,
[^269A-Z] matches any character except 2, 6, 9,
and an ending character (c2); multiple
and uppercase letters.
ranges can be specified as well.
To match any character except those in
the range, use ^ as the first character
after the opening bracket.
| Logical OR two conditions together (band|comp) matches the lines bandwidth cir
999936 cbs 65535 and compensation 0.
{i} Matches a specific number (i) or range A[0-9]{3} matches A followed by exactly three
{i,j} (i through j) of instances of the digits, i.e. it matches A123 but not A1234.
preceding character. [0-9]{4,6} matches any sequence of 4, 5, or 6
digits.
The following table provides some example of regular expressions and the
resulting string that will be used to filter the CLI output.
“str” str
“s t r” str
“str “str
“str\”str” str”str
“str\”str “str\”str
“str”str str
\”str” \”str”
Enabling Entities
Some dynamic entities are created as inactive by default. After the configuration
is completed, the no shutdown command activates the entity, as shown below.
Note The example uses a slot number to reference the port, which may not be
applicable to every device.
Using Scripts
CLI commands can be gathered into text files. They may be created using a text
editor, by recording the user commands or by saving the current configuration.
These files can be configuration files or scripts. Configuration files have specific
names and contain CLI commands that ETX2 can use to replace the current
configuration, while scripts contain CLI commands that add to the current
configuration. Configuration files can be imported from and exported to RAD
devices via file transfer protocols.
For more information on configuration files, refer to the description in the
Operation and Maintenance chapter.
In order to execute a CLI script, you have to copy/paste it to the CLI terminal, or
send it to ETX2 via the RADview Jobs mechanism, CLI script option.
Examples
To schedule copying a log file in two hours:
schedule sched-copy-2hrs in 120 “copy log tftp://1.1.1.1”
To schedule copying a log file on April 2 at 6:00, with the schedule saved in
permanent memory:
schedule sched-copy-Apr2 at april 2 2015 06:00 “copy log tftp://1.1.1.1” permanent
save
#***************************Adding Classifier_Profiles*********
config flows
classifier-profile all match-any match all
classifier-profile untagged match-any match untagged
#***************************Configuring_Flows******************
flow mng_in
classifier untagged
no policer
ingress-port ethernet 101
egress-port svi 92
no shutdown
exit
flow mng_out
classifier all
ingress-port svi 92
egress-port ethernet 101 queue 0 block 0/1
no shutdown
exit all
#*********************Configuring_Router_Interface*************
configure router 1
interface 1
bind svi 92
address 172.18.141.39/24
no shutdown
exit
Note There is no explicit configuration for inband and outband management access.
Allowing SSH (Secure Shell) access ssh Typing no ssh blocks access by SSH.
Allowing Telnet access (for IPv4 only) telnet Typing no telnet blocks access by Telnet.
Overview
RADview is a Windows-based modular, client-server, scalable management
system that can be used in a distributed network topology or a single-station
configuration. RADview consists of the system and the following optional
modules:
• Service Manager (SM) – end-to-end Carrier Ethernet service provisioning for
Ethernet Access products. This module includes the Service Center (SC)
module, which is an end-to-end Carrier Ethernet and TDM service provisioning
for AXCESS+ products.
• Performance Monitor (PM) – portal for service SLA monitoring for both
carriers and their customers
The ETX2 element and network management systems include a CORBA
northbound interface, enabling easy integration into the customer’s umbrella
NMS. CORBA enables interconnectivity and communication across heterogeneous
operating systems and telecommunications networks. CORBA effectively supplies
a software interface that defines data models used between various
management layers. It supports multi-vendor distributed network management
applications, providing the data interface between clients and servers.
For more details about the RADview network management software, and for
detailed instructions on how to install, set up, and use RADview, contact your
local RAD partner.
Note The service name configuration is necessary only in the endpoint devices.
• Enable PM collection for the Rx and Tx flows, as well as for the corresponding
destination NE.
• All flows belonging to the same service End Point must use the same port.
• Only one S-tag should be used for the service.
• Run the RADview Discovery Service function (refer to the RADview online
help).
Discovery can be performed only on the user port (UNI). For more information,
refer to Performance Management in the Monitoring and Diagnostics chapter.
Note Multi-port E-Line services can't be discovered and statistics can't be collected on
the flows.
3.9 Maintenance
The enclosure of the specially designed ETX203AX unit installed in a small cell
cabinet can become very hot. Therefore, it is recommended to power off the unit
and wait for it to cool down prior to servicing.
Hot surface! Do not touch! Contact may cause burn. Allow to cool before
servicing.
Warning
Profiles
Most packet processing features are defined by creating and applying various
profiles. Profiles comprise sets of attributes related to a specific service entity.
Profiles must be defined before other managed objects.
L2CP Ethernet/logical MAC port, Defines actions for L2CP processing (drop, peer,
PCS flow tunnel, and tunnel with MAC swap)
CoS mapping ETP/bridge flow/MultiCoS Defines method and values for mapping packet
flow (10.3 policer) attributes (P-bit, DSCP, IP precedence) to internal
CoS values
Color mapping Flow Defines method and values for mapping packet
attributes (P-bit, DSCP, IP precedence) to internal
color values
Policer, policer Ethernet port, flow Defines CIR, CBS, EIR, and EBS parameters
aggregate
Envelope policer Flow Defines policer attributes per rank, per MEF 10.3
Queue block Queue block within queue Defines queue and queue parameters. This
group includes defining all the queues forming the queue
block and defining per queue its parameters, such
as scheduling mode (strict, WFQ, BE), queue depth,
and queue WRED profile.
Queue group Ethernet/logical MAC Defines the group of queue blocks in a two-stage
port/PCS port hierarchy
Also sets the queue block profiles used and the
queue block shaper profile
Queue mapping Flow Defines method and values for mapping packet
attributes (P-bit, DSCP, IP precedence, CoS) to
internal priority queues
Physical Ports
Ethernet ports serve as ingress (UNI) and egress (NNI) ports for Ethernet flows.
The following packet processing attributes are assigned to them:
• Tag Ethertype for identifying VLAN-tagged frames at ingress and setting
Ethertype value for VLAN editing (stack, swap) at egress
• L2CP profile for defining L2CP frame handling (discard, peer, tunnel, or tunnel
with MAC swap)
• Queue group profile for associating a port with a queue group
• Policer profile for broadcast/multicast traffic (BUM filter)
Logical Ports
Logical ports maintained by ETX-2 serve as internal aggregation or forwarding
points for Ethernet flows. The following logical ports exist:
Logical MAC Provides a logical port to access smart SFP ports (via GFP
ports)
Link Aggregation Provides link protection. LAGs have the same attributes as
Group (LAG) the physical ports that serve as their members.
Forwarding Entities
Several internal entities carry traffic and make forwarding and switching
decisions. These are:
• Flows – Traffic-forwarding interconnection elements
• Bridge
Flows
Flows are entities that interconnect two physical or logical ports. Flow processing
is performed as follows:
• Ingress traffic is mapped in flows using classification match criteria defined
via a classification profile.
• L2CP frames are handled per flow according to L2CP profile settings.
• User priority (P-bit, IP Precedence, DSCP) is mapped into internal queue
according to a queue mapping profile or assignment per flow.
• Packet attributes may map packets to the ingress color, which together with
the color-aware policer (if applied), sets the egress packet color. Packet color
may be used in the marking and congestion avoidance process.
Bridge
The bridge is a forwarding entity used by ETX-2 for delivering E-LAN and E-Tree
services in multipoint-to-multipoint topology and G.8032 ring protection. The
bridge uses SVIs to connect logical and physical ports.
The bridge is defined by bridge ports and a VLAN membership table that specifies
which bridge ports are members in a certain broadcast domain (VLAN). The bridge
supports up to two VLAN editing actions, on ingress and/or egress. The editing is
performed at the flow level.
Router
The router uses service virtual interfaces (SVIs) to connect to logical and physical
ports. The connection is always made by directing flows from a port to an SVI,
and then binding the SVI to a router interface.
Device management, as well as other L3 ‘modules’, such as 1588 (8265.1), TDM
PW (UDP/IP), and TWAMP, use the ETX-2 routing scheme.
Ethernet to Bridge
In Figure 4-1, the rectangles illustrate the data flow for user traffic from an
Ethernet port to a bridge port. The rounded rectangles indicate the features that
need to be configured, numbered according to the order of configuration.
Table 4-2 shows the configuration steps corresponding to the numbers.
4) CoS mapping
6) Flows
6 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the Ethernet port to the
bridge port.
egress-port
mark
reverse-direction
vlan-tag
shutdown
Bridge to Ethernet
In Figure 4-2, the rectangles illustrate the data flow for user traffic from a bridge
port to an Ethernet port. The rounded rectangles indicate the features that need
to be configured, numbered according to the order of configuration. Table 4-3
shows the configuration steps corresponding to the numbers.
1) Bridge ports 2) Classification 3) Marking 6) Queue blocks 5) Shaping 6) Queue blocks 8) Ethernet ports
9) Flows
9 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the bridge port to the
Ethernet port.
egress-port
policer
mark
vlan-tag
shutdown
User to Network
In Figure 4-3, the rectangles illustrate the data flow for Ethernet user traffic from
a user port to a network port. The rounded rectangles indicate the features that
need to be configured, numbered according to the order of configuration.
Table 4-4 shows the configuration steps corresponding to the numbers.
Queueing Queueing
Ingress UNI Classification Flow Policing Shaping Egress NNI
level 0 level 1
9) Ethernet ports 1) Classification 2) Marking 4) Policing 6) Queue blocks 5) Shaping 6) Queue blocks 8) Queue groups
10) Flows
10 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the user port to the
network port.
egress-port
policer
mark
vlan-tag
shutdown
Network to User
In Figure 4-4, the rectangles illustrate the data flow for Ethernet user traffic from
a network port to a user port. The rounded rectangles indicate the features that
need to be configured, numbered according to the order of configuration.
Table 4-5 shows the configuration steps corresponding to the numbers.
Queueing
Ingress NNI Classification Flow Policing Shaping Egress UNI
level 0
9) Ethernet ports 1) Classification 2) Marking 4) Policing 6) Queue blocks 5) Shaping 8) Queue groups
10) Flows
10 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the network port to the
user port.
egress-port
policer
mark
vlan-tag
shutdown
Network to User
The following figure illustrates the data flow from a network port provisioned as
a TDM port via a smart SFP, to an Ethernet user port. Table 4-6 shows the
configuration steps corresponding to the figure callouts.
Figure 4-5. TDM User Traffic Data Flow – TDM Network to Ethernet User
Table 4-6. TDM User Traffic Configuration – TDM Network to Ethernet User
1 Smart SFPs smart-sfp You must provision the smart SFP for
type the network port.
shutdown
T1 Ports t1
name
line-code
line-length
line-type
rx-sensitivity
tx-clock-source
shutdown
E3 Ports e3
name
tx-clock-source
shutdown
T3 Ports t3
name
line-length
line-type
shutdown
fcs-payload
name
4 Logical MAC Ports logical-mac You must configure a logical MAC port,
name and bind the GFP port to it. The logical
MAC port is used as the ingress port
bind
of the flow.
egress-mtu
queue-group
tag-ethernet-type
shutdown
11 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the network port (logical
MAC port) to the user port.
egress-port
policer
mark
vlan-tag
shutdown
User to Network
The following figure illustrates the data flow from a user port provisioned as a
TDM port via a smart SFP, to an Ethernet network port. Table 4-7 shows the
configuration steps corresponding to the figure callouts.
Figure 4-6. TDM User Traffic Data Flow – TDM User to Ethernet Network
Table 4-7. TDM User Traffic Configuration – TDM User to Ethernet Network User to Network
1 Smart SFPs smart-sfp You must provision the smart SFP for
type the user port.
shutdown
T1 Ports t1
name
line-code
line-length
line-type
rx-sensitivity
tx-clock-source
shutdown
E3 Ports e3
name
tx-clock-source
shutdown
T3 Ports t3
name
line-length
line-type
shutdown
fcs-payload
name
4 Logical MAC Ports logical-mac You must configure a logical MAC port,
name and bind the GFP port to it. The logical
MAC port is used as the ingress port
bind
of the flow.
egress-mtu
queue-group
tag-ethernet-type
shutdown
11 Configuring Flows classifier You must define the flow for the user
ingress-port traffic from the user port to the
network port.
egress-port
policer
mark
vlan-tag
shutdown
Benefits
Viewing the entities associated with service names is useful for service
administration, and to ensure correct discovery of service-related entities by
network management systems.
Functional Description
If you have defined service names for flows, you can display the flows and
corresponding MEPs associated with the service names.
show status name For specific service name, display summary information of
<name-string> associated flows/MEPs.
summary
show status name For specific service name, display details of associated
<name-string> flows/MEPs.
details
Examples
To view list of defined service names:
ETX-2# configure service
ETX-2>config>service# show status list
Name : s1
Name : s2
Flows
-----------------------------------------------------------------------------
Name Admin Oper Egress Port MEP
-----------------------------------------------------------------------------
S.29.1_1_1_s1 Up Down ETH 6 101
S.29.1_1_s1 Up Down ETH 1 101
MD : 1 MA : 1
MD Level : 6
MD Name : ---
MA Name : 1
MEPs
-----------------------------------------------------------------------------
ID Status Defects Service Pbit RMEPs OK/Total
-----------------------------------------------------------------------
101 up No 7 0/1
Flows
---------------------------------------------------------------
Name : S.29.1_1_1_s1
Admin : Up
Operational Status : Down
Name : S.29.1_1_s1
Admin : Up
Operational Status : Down
Test Status : Off
Classifier Profile : S.29_s1_1
Ingress Port : Ethernet 6
Egress Port : Ethernet 1
MD : 1 MA : 1
MD Level : 6
MD Name : ---
MA Name : 1
MEPs
---------------------------------------------------------------
ID : 101
Status : up
Defects : No
Note
Ports are referenced generally as [<slot>/]<port>[/<tributary>], with the
following conditions according to product:
• ETX203AM – <slot>/<port> or <slot>/<port>/<tributary>:
• <slot> = 1 for modular ports
• <slot> = 0 for user Ethernet ports
• <tributary> is required only for smart SFP E1/T1/E3/T3/SDH/SONET ports,
and is always set to 1.
• ETX203AX – <port> or <port>/<tributary>:
• <tributary> is required only for smart SFP E1/T1/E3/T3/SDH/SONET ports,
and is always set to 1.
• ETX205A – <port> or <port>/<tributary>:
• <tributary> is required only for smart SFP E1/T1/E3/T3/SDH/SONET ports,
and is always set to 1.
• ETX220A – <slot>/<port> or <slot>/<port>/<tributary>:
• <slot> = 0: All timing interfaces and ETH MNG port
• <slot> = 1: Lower row of GbE ports (1/1–1/10, left to right)
• <slot> = 2: Higher row of GbE ports (2/1–2/10, left to right)
• <slot> = 3: 10GbE ports ( 3/1 , 3/2 , leftmost 10GbE pair, left to right)
• <slot> = 4: 10GbE ports (4/1 , 4/2 , rightmost 10GbE pair, left to right)
• <tributary> is required only for smart SFP E1/T1/E3/T3/SDH/SONET ports,
and is always set to 1.
5.1 Cards
This section describes how to configure the module type (card type) of the
network uplink.
Applicable Products
This feature is applicable to the ETX203AM modular option.
Benefits
The ability to preprovision the module type before actually inserting the module
provides more flexibility.
Functional Description
The ETX-2 module can contain ports of type GbE, E1, T1, T3, VDSL2, or SHDSL.
You can preprovision the module type before physically inserting the module. The
configured module type must match the actual module installed, for correct
operation.
When ETX-2 starts up, it verifies that the configured module type matches the
module that is installed. If they do not match, the card_mismatch alarm is sent.
The ETX-2 module is defined as slot 1; therefore, the ports on the module are
referenced with slot 1. The device ports that are not on the module are
referenced with slot 0.
Note The ETX-2 module is not hot swappable; it can be removed/replaced only when
ETX-2 is powered off.
Factory Defaults
By default, the module type is set according to the module type that is actually
installed.
Configuring Module
Note You can display the module type from the device level by typing
show cards-summary.
Configuring the module type as one of card-type eth 1g-2-full Type no card-type to set the module type
the following: card-type tdm {e1-t1-4-ch | e1-t1-8-ch} to null.
• Ethernet GbE card-type tdm {t3-1-ch | t3-2-ch} Notes:
• E1/T1 with four channels card-type shdsl {shdsl-4w | shdsl-8w} • If the configured module type does not
• E1/T1 with eight channels match the actual installed module, the
card-type vdsl2 {vdsl2-4p-pots | vdsl2-4p-
card_mismatch alarm is sent. This
• T3 with one channel isdn}
includes the case of changing the
• T3 with two channels module type to null while a module is
• SHDSL with 4-wire option installed.
• SHDSL with 8-wire option • When the module type is changed to
• VDSL2 with 8-wire option null, ETX-2 automatically deletes all the
interfaces that exist in the module.
• You are not allowed to change the
module type in the following cases:
• An active service is defined over one
or more of the module interfaces.
• One or more of the module
interfaces is being used as a timing
reference (e.g. domain clock source).
Applicable Products
This feature is applicable to following:
• ETX203AM with an E1/T1 module:
The E1/T1 ports are bound to VCGs via GFP ports and logical MAC ports.
The port numbers contain slot numbers.
• ETX205A with built-in E1/T1 ports – The E1/T1 ports are associated with
pseudowire (PW).
Benefits
There is no need to choose E1 or T1 when ordering the unit.
Functional Description
All ports must work in the same mode; therefore, configuring any port sets all
ports to the same mode.
Before changing the E1/T1 port mode, any corresponding GFP ports/VCGs/logical
MAC ports/pseudowires/PW cross connects must be deleted. After changing the
mode, ETX-2 must be restarted.
Factory Defaults
By default, the E1/T1 ports are set to E1 mode.
5.3 E1 Ports
The European Conference of Postal and Telecommunications Administrations
(CEPT) standardized the E-Carrier system, which was then adopted by the
International Union Telecommunication Standardization sector (ITU-T), and is
used in almost all countries outside the USA, Canada, and Japan.
The most commonly used versions are E1 and E3. E1 circuits are very common in
most telephone exchanges and used to connect medium and large companies to
remote exchanges. In many cases, E1 connects exchanges with each other.
Applicable Products
E1 ports are applicable to the ETX-2 products as follows:
• All ETX-2 products:
Smart SFP E1 ports are available when smart SFPs such as MiRICi-E1 or
MiTOP-E1 are provisioned (see Smart SFPs).
Smart SFP E1 ports do not support encapsulation via VCG.
Smart SFP E1 ports are referenced as [<slot>/]<port>/<tributary>:
<slot> is relevant to ETX203AM and ETX220A.
<tributary> is always set to 1.
Standards
CCITT G.732
ITU-T G.703
ITU-T G.704
ITU-T G.823
Benefits
E1 lines are high-speed dedicated lines that enable large volume usage.
Functional Description
An E1 link operates over a twisted pair of cables. A nominal 3-volt peak signal is
encoded with pulses using a method that avoids long periods without polarity
changes. The line data rate is 2.048 Mbps at full duplex, which means 2.048 Mbps
downstream and 2.048 Mbps upstream. The E1 signal splits into 32 timeslots
each of which is allocated 8 bits. Each timeslot sends and receives an 8-bit
sample 8000 times per second (8 x 8000 x 32 = 2,048,000), which is ideal for
voice telephone calls where the voice is sampled into an 8-bit number at that
data rate and restored at the other end. The timeslots are numbered from 0 to
31.
Factory Defaults
By default, no smart SFP E1 ports exist.
By default, built-in/modular E1/T1 ports are set to E1 mode and have the
following configuration.
If the line type for built-in E1/T1 ports is changed to g732s or g732s-crc, the
default configuration of the built-in E1 port is the same as shown above, with the
addition of the following parameters.
cas-oos-pattern space
Configuring E1 Ports
To configure E1 ports:
1. Navigate to configure port e1 <port>.
2. At the config>port# prompt, type:
e1 <port>/<tributary>
The prompt config>port>e1(<port>/<tributary>)# is displayed.
3. Enter all necessary commands according to the tasks listed below.
Specifying the framing mode of line-type { unframed | g732n | g732n-crc | • unframed – no framing;
the port g732s | g732s-crc } in ETX203AX with
E1oPHDH, unframed line
type is relevant only for E1
port with HDLC
encapsulation
• g732n – G.732N framing
with CRC disabled
• g732n-crc – G.732N
framing with CRC enabled;
in ETX203AX with
E1oPHDH, g732n-crc line
type is relevant only for E1
port with GFP
encapsulation
• g732s – G.732S framing
(CAS) with CRC disabled
• g732s-crc – G.732S
framing (CAS) with CRC
enabled.
Running loopback test on E1 port loopback {local | remote} • local – returns the
[duration <seconds>] transmitted data at the
physical layer to the
receiving path
• remote – returns the
received data at the
physical layer to the
transmitting path
Remote loopback test is
currently not supported
for ETX203AM EoPDH
ports.
• duration – specifies the
duration of the loopback
(in seconds).
Possible values: 1 to 3600
If duration is not
specified, the loopback
test runs forever, until
stopped.
Use no loopback to disable
the loopback test.
Specifying the port clock quality source-clock-quality {stratum1 | stratum2 | Clock quality used in adaptive
stratum3 | stratum3e | stratum4} clock recovery set according
to parameter specified:
• stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
Defining whether the E1 port trail-mode { extended | terminated } extended – ETX-2 forwards
alarms are forwarded toward the the E1 port alarms from the
TDM line PW toward the TDM line.
terminated – ETX-2 does not
forward the E1 port alarms
toward the TDM line.
Selecting the transmit clock tx-clock-source {loopback | internal | • loopback – clock retrieved
source domain <number> | pw <number>} from the port's incoming
(Rx) data
• internal – clock provided
by internal oscillator
• domain – clock provided
by clock domain, if device
has timing option
• pw – clock provided by PW
bundle
Note: After changing
tx-clock-source, you are
required to reset the device.
Displaying the port statistics show statistics current E1 current and interval
show statistics interval <interval-num> statistics for E1 unframed and
E1 framed with CRC.
show statistics all-intervals
show statistics all
To configure E1 ports:
1. If the module type is not E1/T1, power off ETX-2, insert the E1/T1 module,
and then power on ETX-2.
2. Provision the module type as E1/T1 (see Configuring Module).
3. Configure the port to E1 mode (see Configuring E1/T1 Ports).
4. At the config>port# prompt, type:
e1 [<slot>/]<port>/<tributary>
The prompt config>port>e1([<slot>/]<port>/<tributary>)# is displayed.
5. Enter all necessary commands according to the tasks listed below.
Specifying the framing mode of line-type { unframed | g732n | g732n-crc | • unframed – no framing
the port g732s | g732s-crc } • g732n – G.732N framing
with CRC disabled
• g732n-crc – G.732N
framing with CRC enabled
• g732s – G.732S framing
(CAS) with CRC disabled
• g732s-crc – G.732S
framing (CAS) with CRC
enabled
Note: Only g732n-crc can be
configured for modular E1
ports.
Running loopback test on E1 port loopback {local | remote} • local – returns the
[duration <seconds>] transmitted data at the
physical layer to the
receiving path
• remote – returns the
received data at the
physical layer to the
transmitting path.
Currently not supported.
• duration – specifies the
duration of the loopback
(in seconds).
Possible values: 1 to 3600
If duration is not
specified, the loopback
test runs forever, until
stopped.
Use no loopback to disable
the loopback test.
Note Initialize the database of the MiTOP before inserting it into the device. Refer to
Setting the Switches in the Installation and Setup chapter of the MiTOP E1T1
Installation and Operation manual.
Running loopback test loopback {local | remote} • local – returns the transmitted data at
on E1 port [duration <seconds>] the physical layer to the receiving path
• remote – returns the received data at
the physical layer to the transmitting
path
• duration – specifies the duration of the
loopback (in seconds).
Possible values: 1 to 3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the loopback.
test.
Specifying if pm-enable
performance reporting
is enabled for the port
Specifying the port source-clock-quality {stratum1 | Clock quality used in adaptive clock ×
clock quality stratum2 | stratum3 | stratum3e | recovery set according to parameter
stratum4} specified:
• stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
5.4 E3 Ports
Groups of E1 circuits are bundled into higher-capacity E3 links, which are mainly
used between exchanges, operators, and/or countries, and have a transmission
speed of 34.368 Mbps.
E3 ports are available when smart SFPs such as MiRICi-E3 or MiTOP-E3 are
provisioned (see Smart SFPs).
Applicable Products
This feature is applicable to all ETX-2 products. Smart SFP E3 ports are referenced
as [<slot>/]<port>/<tributary>:
• <slot> is relevant to ETX203AM and ETX220A.
• <tributary> is always set to 1.
Standards
ITU-T G.703
ITU-T G.704
ITU-T G.823
Benefits
E3 lines provide high-capacity circuits.
Functional Description
Each E3 signal has 16 E1 channels, and each channel transmits at 2.048 Mbps. E3
links use all eight bits of a channel.
Factory Defaults
By default, no E3 ports exist.
Configuring E3 Ports
To configure E3 ports:
1. Provision a smart SFP such as MiRICi-E3 or MiTOP-E3 and insert it into an
Ethernet port (see Smart SFPs).
Note Initialize the database of the MiTOP before inserting it into the device. Refer to
Setting the Switches in the Installation and Setup chapter of the MiTOP E1T1
Installation and Operation manual.
Running loopback test loopback {local | remote } • local – returns the transmitted
on E3 port [start <seconds> ] data at the physical layer to the
[duration <seconds>] receiving path
• remote – returns the received data
at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback starts.
Possible values: 1 to 3600
• duration – specifies the duration
of the loopback (in seconds).
Possilbe values: 1 to 3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Specifying if pm-enable
performance reporting
is enabled for the port
Specifying the port source-clock-quality {stratum1 | Clock quality used in adaptive clock ×
clock quality stratum2 | stratum3 | stratum3e | recovery set according to parameter
stratum4} specified:
• stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
Selecting the transmit tx-clock-source {loopback | internal | • loopback – clock retrieved from
clock source pw <number>} the port's incoming (Rx) data
• internal – clock provided by
internal oscillator
• pw – clock provided by PW bundle
Note: The pw option is available only
for MiTOP.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• Port types and configurations differ according to product, and this is
indicated where relevant; additionally the following apply:
Ethernet FE/GbE ports are applicable to all products.
Ethernet 10GbE ports are applicable to ETX220A.
• SFP/RJ-45 combo ports are applicable to ETX205A or ETX203AM network
ports when GbE module is inserted.
• <slot> is applicable to ETX203AM and ETX220A.
• Maximum advertised capability and speed/duplex parameters differ according
to product; this is indicated where relevant.
• Clock-related parameters are applicable to ETX205A or ETX220A with timing
options.
Functional Description
Options
ETX203AM ordered with the network GbE option has two fiber optic / copper
(combo) Gigabit Ethernet network ports. Regardless of the network port option,
the device has four fixed fiber optic or copper Fast/Gigabit Ethernet ports that act
as user ports. The first fixed port can be configured to act as a network port if no
module is inserted.
ETX203AX has two fiber optic or copper Fast or Gigabit Ethernet network ports
and up to four fiber optic or copper Fast or Gigabit Ethernet user ports.
ETX203AX-E1 has one E1 uplink, one fiber optic Gigabit Ethernet network port,
and four Gigabit Ethernet user ports (two copper and two fiber optic).
ETX203AX-DSL has an 8-wire DSL uplink and one copper Gigabit Ethernet user
port.
ETX205A has two network ports and up to four user ports that are SFP/UTP
combo ports. If ETX205A is ordered with a PM controller (PMC) option, it has up
to two user ports, as the last two user ports are used as internal ports to
interconnect with the integrated x86 processor.
ETX220A has two, three, or four 10GbE ports that consist of two network ports
and two optional user ports. The device also has 0, 10, or 20 GbE user ports.
Numbering
The following table shows how to refer to the ports when configuring them with
CLI commands.
ETX203AM
I/O 1 1/1
I/O 2 1/2
User 3 0/3
User 4 0/4
User 5 0/5
User 6 0/6
MNG-ETH 0/101
ETX203AX or ETX205A
Net or E1 1 1
Net/User 2 2
User 3 3
User 4 4
User 5 5
User 6 6
MNG-ETH 101
ETX203AX-DSL
User 1 1
MNG-ETH 101
SHDSL 1 1
SHDSL 2 2
SHDSL 3 3
SHDSL 4 4
ETX220A
MNG-ETH 0/101
Note For ETX205A with PMC option, user ports 5 and 6 are not available.
MAC Addresses
In older hardware versions, ETX-2 has two MAC addresses: One is assigned to
network ports and the Ethernet management port, and one is assigned to the
user ports. The MAC clients in the device (e.g. router interfaces, MEPs, etc.)
inherit their MAC addresses from the relevant port.
In newer hardware versions, ETX-2 has multiple MAC addresses. Each of the
following ports is assigned a different MAC address:
• Two network ports (10GbE for ETX220A)
• Four user ports (ETX203AM, ETX203AX, and ETX205A)
• Up to two 10GbE user ports (ETX220A)
• Twenty GbE user ports (ETX220A)
• Ethernet management port
You can view the MAC address assigned to an Ethernet port via show status (see
Viewing Ethernet Port Status). For information on which MAC address is used by a
particular feature, refer to the relevant section in this manual.
Ethertype
Ethertype configured per-port is used for identification of VLAN-tagged frames at
ingress and Ethertype stacking at egress. This refers to the outer VLAN only. The
outer VLAN of an incoming packet must match the configured Ethertype of the
port in order to be considered a VLAN-tagged frame (otherwise frame is
Note An L2CP profile that is attached to a port or flow can be modified or replaced; it
cannot be deleted.
ETX-2 supports Layer-2 Protocol Tunneling (L2PT) – L2CP tunneling with MAC
swap, which means that L2CP packets can be forwarded over networks that are
not transparent to L2CP.
L2PT is supported at the port level and applies for PTP flows, as well as for
bridged traffic.
• ETX-2 supports multiple network ports with L2PT functionality for both PTP
and Bridge applications.
• Any port configured as NNI is L2PT Network, by default.
• Any other port can be configured to be L2PT Network (default ‘no’).
• Any port assigned with an L2CP profile with MAC swap, including port 1, can
function as an L2PT user port.
You can bind an L2CP profile configured with L2CP MAC swap to a user port; it
cannot be bound to a flow. A port assigned with an L2PT profile expects “native”
L2CP frames. MAC swap is performed toward the relevant network port or user
port that is configured for use as L2PT network ports.
Silent Start
Network operators use both point-to-point and point-to-multipoint Optical
Access Networks (OANs), depending on the application. For example, a Passive
Optical Network (PON) is a point-to-multipoint OAN. One of the major challenges
to operating and maintaining such OANs securely is that misconnecting a point-
to-point Optical Network Terminal (ONT) or Ethernet equipment to a branch of a
PON can cause a service outage in the PON system. In order to address this issue,
a Silent Start function is introduced in all types of ONTs, which inhibits an ONT
transmitter's power at startup until the receiver recognizes consistent incoming
data. On recovery of "understandable" data by the receiver, the transmitter is
enabled to enter a handshaking process with the Optical Line Terminal (OLT).
Optical Network Units (ONUs) transmit in assigned time slots to avoid disturbing
each other over the shard fiber, as a non-GPON device transmitting continuously
is likely to bring down a GPON segment.
Ethernet equipment can also be connected by mistake to a PON network and
bring down the PON segment, to address this the ETX also supports a silent start
functionality which once enabled would allow optical Tx only once a valid Ethernet
signal is received.
Factory Defaults
By default, the non-management Ethernet ports have the following configuration.
functional-mode Note: Relevant to the following network for all relevant ports
ports: except ETX220A ports 1/1
• ETX203AM – Second modular and 1/2, where the default is
GbE port if GbE module is user
inserted, or first fixed port
(port 0/3) if there is no
module
• ETX203AX or ETX205A –
Second network interface
• ETX220A – Second 10GbE
network interface (port 4/2)
and first two GbE interfaces
on slot 1 (ports 1/1 and 1/2)
Note If a smart SFP has been provisioned, the Ethernet port parameters are not
accessible for configuration.
Note The only parameter that can be configured for the management Ethernet port is
PM collection. To configure the management Ethernet port, navigate to configure
port mng-ethernet.
Enabling autonegotiation for FE/GbE auto-negotiation [{sfp | rj45}] Entering no auto-negotiation disables
port autonegotiation.
auto-negotiation can be enabled only if
silent-start is disabled (sanity check).
Note: Use sfp or rj45 for combo ports to
configure different values for the SFP and
RJ-45 modes. If neither sfp nor rj45 is
specified, the command applies to both
modes. The device works with the values
that apply according to whether an SFP is
inserted.
Specifying classification key per port classification-key [src-ip-addr] src-ip-addr – classification key according to
[dst-ip-addr] [legacy] [vlan] [inner-vlan] source IP
dst-ip-addr – classification key according to
destination IP
legacy – No classification key is used.
vlan – classification key according to VLAN
inner-vlan – classification key according to
VLAN + Inner VLAN
You can change the port classification key
only if all flows using this port are
administratively disabled.
Refer to the relevant table in Classification
Keys in the Traffic Processing chapter to see
the queue/priority mapping methods for the
selected classification key, as well as the
flows / flow parameters that can be
configured for the key.
Configuring port to trust DHCP packets dhcp-trust Client ports must always be untrusted
sent from server (no dhcp-trust); otherwise, the DHCP relay
discards the discovery messages sent from
the client port to the server.
Relevant only if DHCP snooping is enabled.
Configuring OAM EFM descriptor efm descriptor <efm-descriptor-index> Refer to OAM EFM in the Monitoring and
Diagnostics chapter.
Setting port to function as network or functional-mode {network | user} Note: Relevant to the following ports:
user • ETX203AM – Second modular GbE port if
GbE module is inserted, or first fixed port
(port 0/3) if there is no module
• ETX203AX or ETX205A – Second
network interface
• ETX220A – Second 10GbE network
interface (port 4/2) and first two GbE
interfaces on slot 1 (ports 1/1 and 1/2).
See Table 5-2 for further information.
Associating a Layer-2 control l2cp profile <l2cp-profile-name> Be sure to assign the same L2CP profile to
processing profile with the port both network ports.
The associated L2CP profile must specify
peer action for MAC 0x02 in the following
cases:
• The port needs to receive clock
signals (i.e. is defined as clock source).
• LACP (LAG) is enabled for the port.
• Link OAM (EFM) is enabled for port.
For an explanation on how to configure an
L2CP profile, refer to Layer-2 Control
Protocol (L2CP) Processing in the Traffic
Processing chapter.
Configuring user port with L2PT l2pt-network Configurable for user ports only.
network functionality Enter no l2pt-network to disable user port
from functioning as L2PT network port.
Configuring LLDP parameters lldp Refer to Link Layer Discovery Protocol (LLDP)
in the Traffic Processing chapter for details.
Executing loopback test loopback {local | remote} See Testing Ethernet Ports.
[duration <seconds>]
Setting maximum advertised capability max-capability {10-full-duplex | 10-full-duplex – 10baseT full duplex
(highest traffic handling capability to 100-full-duplex | 1000-full-duplex | 100-full-duplex – 100baseT full duplex
be advertised during the 1000-x-full-duplex } [{sfp | rj45}]
1000-full-duplex – 1000base T full duplex
autonegotiation process) for FE/GbE
port if autonegotiation is enabled 1000-x-full-duplex – 1000 BaseX,
1000 BaseLX, 1000 BaseSX, or 1000 BaseCX
full duplex
Notes:
• The values 1000-full-duplex and
1000-x-full-duplex are relevant only for
GbE ports, not for FE ports.
• Use sfp or rj45 for combo ports to
configure different values for the SFP and
RJ-45 modes. If neither sfp nor rj45 is
specified, the command applies to both
modes. The device works with the values
that apply according to whether an SFP is
inserted.
• Maximum advertised capability for combo
fiber optic ports is permanently set to
1000-x-full duplex.
• For ETX220A, maximum advertised
capability for GbE ports is permanently
set to 1000-x-full duplex.
Defining maximum quality level of max-ql {prc | ssu-a | ssu-b | sec | dnu | The quality level of the SyncE transmitted
clock source, if SyncE is transmitted ssm-based | prs | stu | st2 | tnc | st3e | st3 over this port is the minimum of the quality
over the port | smc | st4 | dus | ssm-based | prov | unk | level set by this command, and the system
sec | dnu | ssm-based} quality level set by clock selection.
Note: Refer to the Clock Selection section in
the Timing and Synchronization chapter for
an explanation of the quality levels.
Assigning description to port name <string> Entering no name removes the name.
Configuring collection of performance pm-collection interval <seconds> Note: You can enable PM statistics collection
management statistics for the port, for all Ethernet ports rather than enabling it
that are presented via the RADview for individual ports. In addition to enabling
Performance Management portal PM statistics collection for the ports, it must
be enabled for the device. Refer to the
Performance Management section in the
Monitoring and Diagnostics chapter for
details.
Associating a policer profile for policer profile <policer-profile-name> Typing no policer removes any policer profile
broadcast/multicast traffic with the from the port.
port
Measuring port data rate and line rate rate-measure interval <seconds> Possible values: 10–300
See Viewing Ethernet Port Data Rate and
Line Rate for details.
Enabling/disabling Silent Start [no] silent-start This parameter is visible for optical ports
only.
silent-start can be configured only if auto-
negotiation is disabled (no uto-negotiation).
Setting data rate and duplex mode of speed-duplex {10-full-duplex | 10-full-duplex – 10baseT full duplex
FE/GbE port 100-full-duplex | 1000-full-duplex | 100-full-duplex – 100baseT full duplex
1000-x-full-duplex [{sfp | rj45}]
1000-full-duplex – 1000base T full duplex
1000-x-full-duplex – 1000 BaseX,
1000 BaseLX, 1000 BaseSX, or 1000 BaseCX
full duplex
Notes:
• The values 10-full-duplex,
100-full-duplex, 1000-full-duplex, and
1000-x-full-duplex are relevant only when
auto-negotation is disabled.
• The values 1000-full-duplex and
1000-x-full-duplex are relevant only for
GbE ports, not for FE ports.
• Use sfp or rj45 for combo ports to
configure different values for the SFP and
RJ-45 modes. If neither sfp nor rj45 is
specified, the command applies to both
modes. The device works with the values
that apply according to whether an SFP is
inserted.
• Speed/duplex for combo fiber optic ports
is permanently set to 1000-x-full duplex.
• For ETX205A, speed/duplex is relevant
only for RJ-45 copper ports when
autonegotiation is disabled.
• For ETX220A, speed/duplex for GbE
ports is permanently set to 1000-x-full
duplex.
Setting data rate and duplex mode of speed-duplex 10g-x-full-duplex 10g-x-full-duplex – 10GbaseER/SR full duplex
10GbE port
Enabling transmitting of clock tx-ssm You should enable this for Ethernet ports
availability and quality via SSM that transmit clock signals. The MAC address
of the transmitting port is used in the SSM
message.
Entering no tx-ssm disables sending SSM
messages.
Displaying L2CP statistics show l2cp-statistics See Displaying Layer-2 Control Processing
Statistics.
Displaying measured port data rate show rate See Viewing Ethernet Port Data Rate and
and line rate Line Rate for details.
Displaying the port statistics show statistics See Viewing Ethernet Port Statistics.
Displaying the port status show status See Viewing Ethernet Port Status.
IPv4SA+DSCP 1. Flow
dst-ip-addr 2. DSCP
Notes • When you change the functional mode, all flows related to the port are
deleted.
• The port must be administratively disabled before you can change the
functional mode.
Examples
To change the second network interface functional mode to user port for
ETX203AM:
exit all
configure port ethernet 1/2
shutdown
functional-mode user
no shutdown
save
To change the second network interface functional mode to user port for
ETX203AX or ETX205A:
exit all
configure port ethernet 2
shutdown
functional-mode user
no shutdown
save
To change the second 10GbE network interface functional mode to user port:
exit all
configure port ethernet 4/2
shutdown
functional-mode user
no shutdown
Note The port operational status indicates if the port is down to fault propagation.
Display of an optical Ethernet port status includes the Silent Start status,
provided Silent Start has been enabled. Silent Start status can be one of the
following:
To display the status of all Ethernet ports with full port names:
• At the prompt config>port#, enter:
show summary-full-name
Notes • The SFP/XFP wavelength values display the exact values from the SFP/XFP
registers.
• In case of DDM SFP/XFP, 1/100 nano meter resolution is supported
(e.g 1536.61).
Examples
To display the status of all Ethernet ports for ETX203AX with full name:
ETX-203AX>config>port# show summary-full-name
Name : testing
Admin : Up
Oper : Up
Speed : 1Gbps
Name : ETH-2
Admin : Up
Oper : Down
Speed : 1Gbps
Name : ETH-3
Admin : Up
Oper : Up
Speed : 1Gbps
Name : ETH-4
Admin : Up
Oper : Up
Speed : 1Gbps
Name : ETH-5
Admin : Up
Oper : Down
Speed : 1Gbps
Name : ETH-6
Admin : Up
Oper : Down
Speed : 1Gbps
Name : MNG-ETH
Admin : Up
Oper : Up
Speed : 100Mbps
Name : SVI 96
Admin : Up
Oper : Up
Speed : 0
ETX-203AX>config>port#
To display the status of Ethernet port 3 in ETX205A if the port is up and no SFP
is inserted:
ETX205A# configure port ethernet 3
ETX205A>config>port>eth(3)# show status
Name : ETH 3
Administrative Status : Up
Operation Status : Up
Connector Type : Combo RJ45+SFP Out - RJ45 Active
Auto Negotiation (SFP) : Complete
MAC Address : 00-20-D2-FA-04-CB
To display the status of Ethernet port 3 in ETX205A if the port is down due to
fault propagation, and no SFP is inserted:
ETX205A# configure port ethernet 3
ETX205A>config>port>eth(3)# show status
Name : ETH 3
Administrative Status : Up
Operation Status : Down (Fault-Propagation)
Connector Type : Combo RJ45+SFP Out - RJ45 Active
Auto Negotiation (SFP) : Other
MAC Address : 00-20-D2-F8-80-81
SFP
---------------------------------------------------------------
Connector Type : LC
Manufacturer Name : WTD
Manufacturer Part Number : RTXM191-551-C05
Typical Maximum Range (Meter) : 550
Wave Length (nm) : 850
Fiber Type : MM
Port Status
---------------------------------------------------------------
: OK
Administrative Status : Up
Operational Status : Up
SFP
---------------------------------------------------------------
Connector Type : LC
Manufacturer Name : FINISAR CORP.
Manufacturer Part Number : FTLX1412D3BCL
Typical Maximum Range (Meter) : 10000
Wave Length (nm) : 1310 Laser
Fiber Type : SM
Administrative Status : Up
Operational Status : Up
Connector Type : SFP
Auto Negotiation ……….. : Disabled
Speed And Duplex ……….. : 1000 Full Duplex
MAC Address : 00-20-D2-51-0C-50
Silent Start : In progress
While the test is running, entering show summary at the port level displays
the port’s operational status as Testing (see Viewing Ethernet Port Status).
3. To end the loopback test, enter:
no loopback
Example
Example
Running
---------------------------------------------------------------
Counter Rx Tx
Total Frames 312248842 0
Total Octets 41216847144 0
Total Frames/Sec 0 0
Total Bits/Sec (L1) 0 0
Minimum Bits/Sec (L1) 0 0
Maximum Bits/Sec (L1) 0 0
Total Bits/Sec (L2) 0 0
Minimum Bits/Sec (L2) 0 0
Maximum Bits/Sec (L2) 0 0
Unicast Frames 312248842 0
Multicast Frames 0 0
Broadcast Frames 0 0
CRC Errors 0
Error Frames 0 0
L2CP Discarded 0
OAM Discarded 0
Unknown Protocol Discarded 0
CRC Errors/Sec 0
Jabber Errors 0
Oversize Frames 0 0
Unmapped Cos Frames 0 --
MTU Discarded -- 0
64 Octets 0 0
65-127 Octets 0 0
128-255 Octets 312248842 0
256-511 Octets 0 0
512-1023 Octets 0 0
1024-1518 Octets 0 0
1519-2047 Octets 0 0
2048-Max Octets 0 0
Parameter Description
Window Size [Min.] Interval for sampling statistics, user-configurable (see Setting Sampling
Interval for Port Statistics)
Window Remain Time [Min.] Amount of time remaining in statistics sampling window
Total Frames Total number of frames received/transmitted
Total Octets Total number of bytes received/transmitted
Total Frames/Sec Number of frames received/transmitted per second
Total Bits/Sec (L1) Number of bits received/transmitted per second in Layer 1, using the line
rate: [Total number of bytes + (number of packets x 20 bytes of line
overhead)] divided by the time interval
Parameter Description
Minimum Bits/Sec (L1) Minimum number of bits received/transmitted per second in Layer 1, using
the line rate: [Total number of bytes + (number of packets x 20 bytes of line
overhead)] divided by the time interval
Maximum Bits/Sec (L1) Maximum number of bits received/transmitted per second in Layer 1, using
the line rate: [Total number of bytes + (number of packets x 20 bytes of line
overhead)] divided by the time interval
Total Bits/Sec (L2) Number of bits received/transmitted per second in Layer 2, using the data
rate: [Total number of bytes (not including line overhead) divided by the
time interval
Minimum Bits/Sec (L2) Minimum number of bits received/transmitted per second in Layer 2, using
the data rate: [Total number of bytes (not including line overhead) divided
by the time interval
Maximum Bits/Sec (L2) Maximum number of bits received/transmitted per second in Layer 2, using
the data rate: [Total number of bytes (not including line overhead) divided
by the time interval
Unicast Frames Total number of unicast frames received/transmitted
Multicast Frames Total number of multicast frames received/transmitted
Broadcast Frames Total number of broadcast frames received/transmitted
CRC Errors Total number of frames received that are an integral number of octets in
length, but do not pass the Frame Check Sequence (FCS) check. This count
excludes frames received with Frame-Too-Long or Frame-Too-Short error.
Error Frames Total number of discarded Rx/Tx error frames
L2CP Discarded Total number of L2CP frames discarded
OAM Discarded Total number of OAM frames discarded. Refer to OAM Packet Handling in the
Monitoring and Diagnostics chapter for all cases when OAM packet is
discarded.
Unknown Protocol Discarded Total number of frames with unknown protocol, which are discarded. This
includes:
• Packets dropped as they were not matched by a classifier profile
• Packets dropped by the L2PT mechanism as a result of a non-existent
forwarding path
CRC Errors/Sec Number of frames per second received that are an integral number of octets
in length, but do not pass the Frame Check Sequence (FCS) check. This count
excludes frames received with Frame-Too-Long or Frame-Too-Short error.
Jabber Errors Total number of frames received with jabber errors
Oversize Frames Total number of oversized frames received/transmitted
Unmapped CoS Frames
MTU Discarded Total number of packets dropped due to exceeding the egress-mtu limit
configured over the port. Relevant to Ethernet, PCS, and Logical MAC ports in
ETX220A.
64 Octets Total number of received/transmitted 64-byte packets
65–127 Octets Total number of received/transmitted 65 to 127-byte packets
128–255 Octets Total number of received/transmitted 128 to 255-byte packets
Parameter Description
256–511 Octets Total number of received/transmitted 256 to 511-byte packets
512–1023 Octets Total number of received/transmitted 512 to 1023-byte packets
1024–1518 Octets Total number of received/transmitted 1024 to 1518-byte packets
1519–2047 Octets Total number of received/transmitted 1519 to 2047-byte packets
2048–Max Octets Total number of received/transmitted packets with 2048 bytes and up to
maximum
MTU Discarded Flow The last flow from which MTU packets were discarded. Relevant to Ethernet,
PCS, and Logical MAC ports in ETX220A.
Example
Clearing Statistics
To start data rate and line rate measurements for an Ethernet port:
• At the prompt config>port>eth([<slot>/]<port-num>)#, enter:
rate-measure interval <seconds>
The rate measurement starts. You can use show rate to monitor how
much of the time interval has elapsed. The result is automatically
displayed, without the need to enter show rate, after the specified time
interval ends.
Example
To display the data rate and line rate for Ethernet port 1/2 in ETX203AM:
ETX-2# configure port ethernet 1/2
ETX-2>config>port>eth(1/2)# rate-measure interval 30
ETX-2>config>port>eth(1/2)#
Name : ETH-1/2
Status : Passed
Start Time : 2014-11-13 12:14:16 UTC +00:00
Duration (Sec) : 30
L1 L2
Rx Rate (bps) : 1000 950
Tx Rate (bps) : 1500 1400
5.6 Ethertype
Ethertype tag configuration of a packet allows identification of incoming and
outgoing VLAN-tagged packets.
Ethertype (tag protocol ID, or TPID) configured per port is used for:
• Identification of (outer) VLAN-tagged packets at ingress
• Setting the Ethertype value used in VLAN editing actions (Mark, Push) at
egress
Standards
IEEE 802.1Q
Benefits
Per-port tag Ethertype configuration allows identification of incoming and
outgoing VLAN-tagged frames.
Factory Defaults
By default, Ethertype is set to 8100.
Functional Description
Global tag Ethertype values, other than 8100 (the default), must be configured at
the device (chassis) level before they can be used to configure the port level
Ethertype.
ETX-2 supports up to two Ethertype tag values:
• 8100 – preconfigured default; cannot be deleted or changed
• 88a8
Configuration of a packet’s outer tag Ethertypes allows ingress identification of a
packet’s outer VLAN tags, as follows:
• The packet’s outer VLAN tag is identified if the packet’s outer tag Ethertype
equals the port’s configured tag Ethertype.
Ethertype configured per port is used for the identification of VLAN-tagged
frames at ingress and VLAN editing at egress. This refers to outer VLAN only. The
outer VLAN of the incoming frame must match the configured Ethertype of the
port in order to be considered a VLAN-tagged frame (otherwise the frame is
considered untagged or dropped).
Note Ethertype tag cannot be changed if a port (Ethernet or LAG) has flows attached
to it.
The following table describes the admission rules for different port and TPID
types.
Table 5-4. Ports with Configured Port TPID Y (Tag Ethertype port configuration)
Y None Admit 1
Y 8100 Admit 2
Y Other than 8100 Admit 1
Z (other than Y) Don’t care Admit Untagged
Configuring Ethertype
ETX-2 comes preconfigured with one global Ethertype tag value – 8100. This
Ethernet tag value cannot be modified or deleted.
You can configure an additional global Ethertype tag so that it can be used in
Ethertype tag configuration of a packet or port.
If an additional tag value is not defined, the port and packet can only use the
default global value 8100.
Example
To configure a port with global Ethertype tag 0x88a8:
ETX-2>config>port>tag-ethertype 0x88a8
Configuration Errors
The following table lists the messages generated by ETX-2 when a configuration
error is detected.
Message Description
Modify failed: Ethertype tag value is in The Ethertype tag value cannot be changed because it is
use currently used by a port of a flow.
Invalid port Ethertype tag value The Ethertype tag value for a port cannot be configured to the
default value (0x8100), and cannot be different from the one
configured at system level.
Cannot delete default Ethertype tag The default Ethertype tag value (0x8100) cannot be deleted.
value
Delete failed: Ethertype tag value is in The Ethertype tag value cannot be deleted because it is
use currently being used by a port of a flow.
Message Description
Setting failed: Ethertype tag value is The Ethertype tag value for a port or a flow is different from the
unknown one configured at system level.
Ethertype tag cannot be modified for a The Ethertype tag value is in use by the LAG.
port attached to LAG
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• E1/T1/T3 module and VCG ports are relevant to ETX203AM.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
G.7041
Benefits
GFP logical ports provide a logical link to smart SFP E1/T1/T3/SDH/SONET ports or
modular E1/T1/T3 ports.
Functional Description
ETX-2 uses GFP (Generic Framing Procedure) ports to provide a logical link to the
TDM ports that become available when smart SFPs are inserted (see Smart SFPs),
or an E1/T1/T3 module is installed.
ETX-2 supports up to 16 GFP ports when inserting up to 16 Smart SFPs (MiRICs)
into ETX220A ports; in other devices, supports up to four GFP ports.
When using the GFP module (ETX203AM), up to eight E1/T1 or two T3 can be
supported in a single GFP VCAToPDH group. ETX203AM supports four or eight
E1/T1 GFP ports as a single GFP group; it cannot be a central site to four RICs
(each with a single E1/T1).
Notes • If a module with multiple E1/T1/T3 ports is installed, the GFP port is bound to
the VCG port that is bound to the E1/T1/T3 ports.
• If a module with a single T3 port is installed, the GFP port is bound directly to
the T3 port.
Factory Defaults
By default, no GFP ports exist. When a GFP port is created, it is configured as
shown below.
Displaying GFP port statistics show statistics Not displayed for ETX203AX with E1.
Examples
To configure GFP logical port 1:
• Bind to VCG port 1, which must be bound to multiple E1/T1/T3 ports on the
module.
exit all
config port gfp 1bind vcg 1exit all
To display information on GFP logical port 1:
ETX-2# config port gfp 1ETX-2>config>port>gfp(1)# info detail
name "GFP 1 "
bind vcg 1 no fcs-payload
scrambler-payload rx-tx
ETX-2>config>port>gfp(1)# show status
Name : GFP 1Operation Status : Up
ETX-2>config>port>gfp(1)# show bind
Higher Layer
---------------------------------------------------------------
Lower Layer
---------------------------------------------------------------
VCG 1
To configure GFP logical port 3:
• Bind to smart SFP E1 port 3 on ETX203AM.
exit all
config port gfp 3
bind e1 0/3/1
exit all
To display the status of GFP logical port 3:
ETX-2# config port gfp 3
ETX-2>config>port>gfp(3)# show status
Name : GFP 3
Operation Status : Up
Applicable Products
This feature is applicable to ETX203AX with a built-in E1 port.
Factory Defaults
ETX203AX with E1 is supplied with all HDLC logical ports disabled.
Binding HDLC port to E1 port bind e1 <port> Type no bind form to remove the
binding.
Displaying E1 bound to the port show bind Lower level bind to E1.
Note
For ETX205A with PMC option, regular user ports 5 and 6 are not available.
Applicable Products
This feature is applicable to ETX205A with a PMC option.
Benefits
The internal ports enable interconnection with the x86 processor.
Factory Defaults
By default, the internal Ethernet ports have the following configuration.
Functional Description
The internal ports are always administratively enabled. They can be ingress or
egress ports in flows, to enable transmitting data between the ETX-2 NID and the
x86 processor.
The internal ports cannot be members of a LAG or be assigned Ethernet
protection group.
You can configure flows between the internal ports and the following types of
ports:
• Bridge port
• Ethernet port
• ETP Subscriber port
• LAG
You cannot configure flows between the internal Ethernet ports and the
following types of ports:
• ETP subscriber port
• SVI assigned to router interface
Configuring port to trust DHCP packets dhcp-trust Client ports must always be untrusted
sent from server (no dhcp-trust); otherwise, the DHCP relay
discards the discovery messages sent from
the client port to the server.
Relevant only if DHCP snooping is enabled.
Assigning description to port name <string> Entering no name removes the name.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• E1/T1/T3 module and VCG ports are relevant to ETX203AM.
• <slot> is relevant to ETX203AM and ETX220A.
Benefits
The logical MAC ports connect between flows and GFP or HDLC ports.
Functional Description
ETX-2 uses logical MAC ports to connect flows to GFP (Generic Framing
Procedure) or HDLC ports that provide a logical link to modular E1/T1/T3 ports, or
to the TDM ports that become available when smart SFPs are inserted (see Smart
SFPs).
Factory Defaults
By default, no logical MAC ports exist. When a logical MAC port is created, it is
configured as shown below.
Binding logical MAC port to GFP port bind gfp <port> • The GFP port must exist.
• Use the no bind form to
remove the binding.
Binding logical MAC port to HDLC port bind hdlc <port> • The HDLC port must exist.
• Use the no bind form to
remove the binding.
Configuring port to trust DHCP packets dhcp-trust Client ports must always be
sent from server untrusted (no dhcp-trust);
otherwise, the DHCP relay
discards the discovery
messages sent from the client
port to the server.
Relevant only if DHCP snooping
is enabled.
Configuring OAM EFM descriptor efm descriptor Refer to Configuring OAM EFM
<efm-descriptor-index> in the Monitoring and
Diagnostics chapter.
Setting maximum frame size to transmit egress-mtu <size> Maximum size is 12,288.
(frames above the specified size are
discarded)
Running loopback test on port loopback {local|remote} Use the no loopback command
[duration <seconds>] to stop the test.
Local and remote loopback test
are currently not supported in
ETX203AM EoPDH ports.
The ETH port hardware is disabled and then enabled, synchronizing the
ETH port, provided that line/cable/fiber is connected.
Examples
To configure logical MAC port 3:
• Bind to GFP port 3.
exit all
logical-mac 3
bind gfp 3
no shutdown
exit all
To display information on logical MAC port 3:
ETX-2>config>port# logical-mac 3
ETX-2>config>port>log-mac(3)# info detail
name "LOGICAL MAC 3"
no shutdown
bind gfp 3
tag-ethernet-type 0x8100
egress-mtu 1790
queue-group profile "DefaultQueueGroup"
l2cp profile "L2cpDefaultProfile
classification-key legacy
Applicable Products
This feature is applicable to:
• ETX203AM with an SHDSL or VDSL2 module
• ETX203AX with embedded SHDSL ports
Standards
ITU-T G.991.2
ETSI TS 101524
Benefits
You can create flows over the PCS port.
Functional Description
The PCS (physical coding sublayer) port represents the bundling of the
SHDSL/VDSL2 interfaces. By default, all SHDSL/VDSL2 lines are bound to a single
PCS port.
Factory Defaults
The PCS port default configuration is shown below.
Specifying classification key per port classification-key [src-ip-addr] src-ip-addr – Classification key according to
[dst-ip-addr] [legacy] [vlan] [inner-vlan] source IP
dst-ip-addr – Classification key according to
destination IP
legacy – No classification key is used.
vlan – Classification key according to VLAN
inner-vlan – Classification key according to
VLAN + Inner VLAN
You can change the port classification key
only if all flows using this port are
administratively disabled.
Refer to the relevant table in Classification
Keys in the Traffic Processing chapter to see
the queue/priority mapping methods for the
selected classification key, as well as the
flows / flow parameters that can be
configured for the key.
Configuring port to trust DHCP packets dhcp-trust Client ports must always be untrusted
sent from server (no dhcp-trust); otherwise, the DHCP relay
discards the discovery messages sent from
the client port to the server.
Relevant only if DHCP snooping is enabled.
Configuring OAM EFM descriptor efm descriptor <efm-descriptor-index> Refer to Configuring OAM EFM in the
Monitoring and Diagnostics chapter.
Associating a Layer-2 control l2cp profile <l2cp-profile-name> For an explanation on how to configure an
processing profile with the port L2CP profile, refer to Layer-2 Control
Protocol (L2CP) Processing in the Traffic
Processing chapter.
Typing no l2cp disassociates Layer-2 control
processing from the port.
Configuring LLDP parameters lldp See Link Layer Discovery Protocol (LLDP) for
details
Running loopback test on port loopback {local|remote} [duration Use the no loopback command to stop the
<seconds>] test.
Assigning description to port name <string> Typing no name removes the description
from the port.
Configuring collection of performance pm-collection interval <seconds> Note: In addition to enabling PM statistics
management statistics for the port, collection for the ports, it must be enabled
that are presented via the RADview for the device. Refer to Performance
Performance Management portal Management in the Monitoring and
Diagnostics chapter for details.
Associating a policer profile with the policer profile <policer-profile-name> Typing no policer removes any policer
port profile from the port.
Associating a queue group profile with queue-group profile Typing no queue-group removes any queue
the port <queue-group-profile-name> group profile from the port.
Displaying L2CP statistics show l2cp-statistics See Displaying Layer-2 Control Processing
Statistics.
Displaying port statistics show statistics running See Viewing PCS Port Statistics.
Example
Running
---------------------------------------------------------------
Counter Rx Tx
Total Frames 0 0
Total Octets 0 0
Total Frames/Sec 0 0
Total Bits/Sec 0 0
Minimum Bits/Sec 0 0
Maximum Bits/Sec 0 0
Unicast Frames 0 0
Multicast Frames 0 0
Broadcast Frames 0 0
CRC Errors 0
Error Frames 0 --
L2CP Discarded 0 --
CFM Discarded 0 --
MTU Discarded 0 56
Unknown Protocol Discarded 0 --
CRC Errors/Sec 0
Jabber Errors 0 --
Oversize Frames 0 0
64 Octets 0 0
65-127 Octets 0 0
128-255 Octets 0 0
256-511 Octets 0 0
512-1023 Octets 0 0
1024-1518 Octets 0 0
1519-2047 Octets 0 0
2048-Max Octets 0 0
MTU Discarded Flow : --/EVC1-TLV
Parameter Description
Window Size [Min.] Interval for sampling statistics, user-configurable (see Setting Sampling
Interval for Port Statistics)
Window Remain Time [Min.] Amount of time remaining in statistics sampling window
Total Frames Total number of frames received/transmitted
Total Octets Total number of bytes received/transmitted
Total Frames/Sec Number of frames received/transmitted per second
Total Bits/Sec Number of bits received/transmitted per second
Minimum Bits/Sec Minimum number of bits received/transmitted per second
Maximum Bits/Sec Maximum number of bits received/transmitted per second
Unicast Frames Total number of unicast frames received/transmitted
Multicast Frames Total number of multicast frames received/transmitted
Broadcast Frames Total number of broadcast frames received/transmitted
CRC Errors Total number of frames received that are an integral number of octets in
length, but do not pass the Frame Check Sequence (FCS) check. This count
excludes frames received with Frame-Too-Long or Frame-Too-Short error.
Parameter Description
Error Frames Total number of frames with errors received
L2CP Discarded Total number of L2CP frames discarded
CFM Discarded Total number of CFM frames discarded. Refer to OAM Packet Handling in the
Monitoring and Diagnostics chapter for all cases when OAM packet is
discarded.
MTU Discarded Total number of packets dropped due to exceeding the egress-mtu limit
configured over the port (displayed in ETX220A only)
Unknown Protocol Discarded Total number of frames with unknown protocol discarded
CRC Errors/Sec Number of frames per second received that are an integral number of octets
in length, but do not pass the Frame Check Sequence (FCS) check. This count
excludes frames received with Frame-Too-Long or Frame-Too-Short error.
Jabber Errors Total number of frames received with jabber errors
Oversize Frames Total number of oversized frames received/transmitted
64 Octets Total number of received/transmitted 64-byte packets
65–127 Octets Total number of received/transmitted 65 to 127-byte packets
128–255 Octets Total number of received/transmitted 128 to 255-byte packets
256–511 Octets Total number of received/transmitted 256 to 511-byte packets
512–1023 Octets Total number of received/transmitted 512 to 1023-byte packets
1024–1518 Octets Total number of received/transmitted 1024 to 1518-byte packets
1519–2047 Octets Total number of received/transmitted 1519 to 2047-byte packets
2048–Max Octets Total number of received/transmitted packets with 2048 bytes and up to
maximum
MTU Discarded Flow The last flow from which MTU packets were discarded (displayed in ETX220A
only)
5.12 Peers
Configuring peers provides access to remote devices.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• 1588v2 clock is relevant to ETX205A and ETX220A.
• TDM pseudowires are relevant to ETX205A.
Peers are remote devices operating opposite router interfaces that can be linked
in order to access TDM pseudowires or the 1588v2 master clock.
Factory Defaults
By default, no peers are defined in ETX-2.
Configuring Peers
You can define up to 64 peers as explained below.
To define a peer:
• At the config# prompt, do one of the following:
To define the peer according to IP address, type:
peer <number> ip <ip-address> [name <name>]
To define the peer according to MAC address, type:
peer <number> mac <mac-address> [name <name>]
Applicable Products
This feature is applicable to all ETX-2 products. Smart SFP SDH/SONET ports are
referenced as [<slot>/]<port>/<tributary>.
• <slot> is relevant to ETX203AM and ETX220A.
• <tributary> is always set to 1.
Standards
SDH is defined by ITU-T G.707, G.781, G.782, G.783, and G.803. SONET is an ANSI
standard defined in T1.105 and T1.119.
Benefits
SDH and SONET allow many different circuits from different sources to be
transported simultaneously within one single framing protocol.
Functional Description
SDH is based on STM-1 which has a data rate of 155.52 Mbps, equivalent to
STS-3. SONET is based on transmission at speeds of multiples of 51.840 Mbps, or
STS-1.
Factory Defaults
By default, no SDH/SONET ports exist.
Running loopback test loopback {local | remote } • local – returns the transmitted
on port [start <seconds> ] [duration <seconds>] data at the physical layer to the
receiving path
• remote – returns the received data
at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback starts
• duration – specifies the duration of
the loopback (in seconds). If
duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Specifying if pm-enable
performance reporting
is enabled for the port
5.14 SFPs
Depending on the product ordering options, some Ethernet ports can be fiber
optic SFP slots that require SFPs to be inserted, or can be combo ports that have
an RJ-45 connector and SFP slot, and the port can function as either. In the case
of combo ports, some of the Ethernet port commands can be used to configure
parameters for RJ-45 mode and for SFP mode (see Ethernet Ports for more
information).
The Ethernet ports that are fiber optic SFP slots, or are combo ports functioning
as SFP slots, are configured as shown in Ethernet Ports. When you display the
port status, the SFP information is shown if applicable (see Viewing Ethernet Port
Status). You can insert regular SFPs into the SFP slots, or you can insert smart
SFPs that provide integrated configuration and management (see Smart SFPs).
Managed 2 2 2 2
MiRICi-E1/T1/E3/T3
Unmanaged 4 4 4 20
Managed 2 2 2 2
MiRICi-155
Unmanaged 4 4 4 20
Managed 1 1 2 1
MiTOP-E1/T1/E3/T3
Unmanaged 4 4 4 20
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• <slot> is relevant to ETX203AM or ETX220A.
Benefits
ETX-2 offers the use of a wide variety of TDM E1/T1/E3/T3 OC-3/STM-1 ports via
the smart SFP feature.
Functional Description
The smart SFP is provisioned in the specific Ethernet port where the SFP shall be
inserted. After this provisioning, the Ethernet port is no longer available for
normal Ethernet port functioning. If the smart SFP is provisioned in a combo
Ethernet port, the copper connector can no longer be used.
The TDM port/s are automatically created when the smart SFP is provisioned, and
can be configured. For information on configuring the TDM port, see the
respective TDM port section.
After you provision a smart SFP, you can do the following:
• Define a logical GFP interface over the smart SFP port (see GFP Ports).
• Define a logical MAC interface over the GFP interface (see Logical MAC Ports).
• Create a flow over the logical MAC interface (refer to Classification by
Port/Flow in the Traffic Processing chapter).
Note If a smart SFP is inserted into ETX-2 while it is powered on, the smart SFP
becomes operational only after resetting ETX-2.
Factory Defaults
By default, no smart SFPs are provisioned. When a smart SFP interface is created,
it is administratively disabled by default, with type set to not-applicable.
Note You can provision the smart SFP before you insert it.
The smart SFP interface is created if it does not already exist and the
config>port>smart-sfp([<slot>/]<port>)$ prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Assigning the type of smart SFP type {mirici-e1 | mirici-t1 | mirici-e3 | • The smart SFP port must be
mirici-t3 | mirici-155 | mitop-e1 | administratively disabled
mitop-t1 | mitop-e3 | mitop-t3 | before you can change the
not-applicable } type.
• To change the type, you
must first set it to
not-applicable.
Examples
This example shows how a smart SFP can be provisioned, and a flow created over
the logical MAC port corresponding to a logical GFP port.
ETX-2>config>port# gfp 1
ETX-2>config>port>gfp(1)# info detail
name "GFP 1"
bind e1 1/1
no fcs-payload
scrambler-payload rx-tx
no vcat-header
ETX-2>config>port>gfp(1)# exit
ETX-2>config>port# logical-mac 1
ETX-2>config>port>log-mac(1)# info detail
name "LOGICAL MAC 1"
no shutdown
bind gfp 1
tag-ethernet-type 0x8100
egress-mtu 1790
queue-group profile "DefaultQueueGroup"
l2cp profile "L2cpDefaultProfile"
classification-key legacy
ETX-2>config>port>log-mac(1)#exit all
ETX-2# configure flows
ETX-2>config>flows>flow(flow1)# info detail
classifier "v1"
no drop
policer profile "Policer1"
no mark all
no vlan-tag
no l2cp
ingress-port logical-mac 1
egress-port ethernet 3 queue 0 block 0/1
no shutdown
Applicable Products
This feature is applicable to:
Standards
ITU-T G.991.2 (SHDSL.bis)
ITU-T G.994.1 (DSL Handshake)
EFM 802.3ah (EFM and EFM bonding)
Benefits
ETX-2 can aggregate traffic over the SHDSL.bis links.
Functional Description
SHDSL is a data communications technology that enables faster data
transmission over copper telephone lines than a conventional voice band modem
can provide. Compared to ADSL, SHDSL employs frequencies that include those
used by traditional POTS telephone services to provide equal data rates to
transmit and receive. As such, a telephone line cannot be used by both an SHDSL
service and a POTS service at the same time. Support of symmetric data rates has
made SHDSL a popular choice by businesses for PBX, VPN, web hosting and other
data services.
The SHDSL uplink supports up to eight wires with ordering options of either four
or eight wires. Each four wires is supported over an RJ-45 connector, meaning
that a four-wire ordering option is supported with a single RJ-45 and an eight-
wire option is supported with two RJ-45.
SHDSL.bis per G.991.2 features symmetrical data rates in both
upstream and downstream directions, Up to 5696 kbit/s of payload in for one
pair of wires is supported. The reach varies according to
the loop rate and noise conditions (more noise or higher rate means decreased
reach) and may be up to 3,000 meters.
SHDSL ports support EFM Bonding. The EFM Aggregation layer allows multiple
pairs of copper ports used as a single, high-capacity link. This enables carrying far
more bandwidth over the existing copper infrastructure.
Dying Gasp is supported over an SHDSL port, using OAM-EFM messages per IEEE
802.3-2005.
Displaying port status show status See Viewing SHDSL Port Status.
Displaying port statistics show statistics { current | interval SHDSL port statistics are supported per wire
<interval-num> | current-day | all-intervals pair for the following:
| all-days-intervals | all } current – current 15-minute interval
interval – specific 15-minute interval
interval-num – 1-96 (48 intervals per wire)
current-day – today’s statistics
all-intervals – statistics of all intervals
all-days-intervals – statistics of all of
today’s intervals
all – all statistics
See Viewing SHDSL Port Statistics.
Administratively enabling port no shutdown Entering shutdown disables the SHDSL port,
stops issuing alarms for the port, and turns
off the SHDSL LED.
Wires
-----------------------------------------------------------------------------
State SNR Loop Tx PSD Power
Margin Attenuation Power Mask Backoff
(db) (db) (dBm)
-----------------------------------------------------------------------------
Data 18 1 8.5 Symmetric 6
Parameter Description
Parameter Description
Wires
ES : 0 LOSWS : 0
SES : 0 CRC Anomalies : 0
UAS : 0
Parameter Description
Time Elapsed (Sec) The elapsed time (in seconds) for the current interval/day
Valid Intervals Number of valid intervals for which statistics are displayed; default is 15-
minute intervals.
ES Number of Errored Seconds where one or more CRC error events or one or
more LOSW error events have been detected. This parameter is inhibited
during UAS state.
SES Number of Severely Errored Seconds where 50 or more CRC error events or
one or more LOSW error events have been detected. This parameter is
inhibited during UAS state.
Parameter Description
LOSWS Number of seconds during which Loss Of Sync Word events have been
detected
Applicable Products
This feature is applicable to all ETX-2 products.
Benefits
SVIs are used as ingress and egress ports for flows, serving as intermediaries for
routers.
Functional Description
You can define three types of SVIs:
• Router – SVI that can be bound to router interface via Layer-2 flows
• TWAMP – In TWAMP Layer-2 Probe mode; TWAMP SVI enables performing no
shutdown to the router interface, even though there are no flows to and
from the SVI. After defining the TWAMP controller and responder, it becomes
possible to bind SVI to the router interface via Layer-2 flows.
Note • Router SVI is the default. In the CLI command, you do not specify a type for a
Router SVI.
• ETX-2 supports up to 96 SVIs.
Perform the following steps to create an SVI port between an Ethernet port and a
router.
1. Create an SVI port of a specific number and name, and if other than a Router
SVI, specify its type (TWAMP).
2. Enable the SVI by entering no shutdown.
3. Configure a flow with:
Ingress Ethernet port and egress SVI port (defined in step 1).
Ingress SVI port (defined in step 1) and egress Ethernet port.
(Refer to Configuring Flows in the Traffic Processing chapter.)
4. For Router or TWAMP SVI: Bind the router interface to the SVI (of type Router
or TWAMP). (Refer to Configuring Router Interface in the Traffic Processing
chapter.)
Note You can follow the steps above to create an SVI port between a Logical Mac or
PCS port (instead of Ethernet port) and a router.
Factory Defaults
By default, SVI 96 (the highest SVI ID) is configured in no shutdown mode.
The following is the configuration of SVI in the ETX205A factory default file.
# Factory Default File
configure
port
svi 96
no shutdown
exit
exit
flows
classifier-profile mng_untagged match-any
match untagged
exit
classifier-profile mng_all match-any
match all
exit
flow mng_access_default_in
classifier mng_untagged
no policer
ingress-port ethernet 0/101
egress-port svi 96
no shutdown
exit
flow mng_access_default_out
classifier mng_all
no policer
ingress-port svi 96
egress-port ethernet 0/101
no shutdown
exit
exit
router 1
interface 32
address 169.254.1.1/16
bind svi 96
no shutdown
exit
exit
exit
You can delete this default configuration, as required.
Note Entering no svi <svi-num> at the config>port prompt, deletes the SVI.
Examples
To configure router SVI:
• Number – 1
• Type – router
• Name – svi_3
ETX203AX>config>port>svi 3
ETX203AX>config>port>svi(3)# name svi_3
ETX203AX>config>port>svi(3)# no shutdown
Configuration Errors
The following table lists messages that ETX-2 generates when a configuration
error is detected.
Message Description
SVI cannot be created: max number of SVI cannot be created because the maximum number of SVIs has
SVIs has been reached been reached
SVI number is out of range SVI number cannot be used because it is out of allowed range
Delete failed: SVI is bound SVI cannot be deleted because it is currently in use
Delete failed: SVI is used by flow SVI cannot be deleted because it has flows bound to it
SVI is not configured Binding to the SVI failed because the SVI does not exist
Modify failed: flow is bound to SVI SVI cannot be modified because flows are bound to it
5.18 T1 Ports
The T-carrier signaling scheme was devised by Bell Labs and is a widely used
standard in telecommunications in the USA, Canada, and Japan to transmit voice
and data between devices. T1, also referred to as DS-1, is a dedicated data line
that transmits information at the speed of 1.544 Mbps.
Applicable Products
T1 ports are applicable to ETX-2 products as follows:
• All ETX-2 products:
Smart SFP T1 ports are available when smart SFPs such as MiRICi-T1 or
MiTOP-T1 are provisioned (see Smart SFPs)
Smart SFP T1 ports do not support encapsulation via VCG.
Smart SFP T1 ports are referenced as [<slot>/]<port>/<tributary>:
<slot> is relevant to ETX203AM and ETX220A.
<tributary> is always set to 1.
• ETX203AM with an E1/T1 module:
Modular E1/T1 ports can be configured to T1 mode (see DS1 (E1/T1)
Ports). The default mode is E1.
Modular T1 ports support encapsulation via VCG (see VCGs).
Modular T1 ports are referenced as <slot>/<port>.
• ETX205A with built-in E1/T1 ports:
Built-in E1/T1 ports can be configured to T1 mode (see DS1 (E1/T1)
Ports). The default mode is E1.
Built-in T1 ports support TDM pseudowire.
Built-in T1 ports are referenced as <port>.
Standards
ITU-T G.703
ITU-T G.704
ITU-T G.823
Benefits
T1 lines are high-speed dedicated lines that enable large volume usage.
Functional Description
A T1 link operates over a twisted pair of cables. A nominal 3-volt peak signal is
encoded with pulses using a method that avoids long periods without polarity
changes. The line data rate is 1.544 Mbps at full duplex, which means 1.544 Mbps
for downstream and 1.544 Mbps for upstream. The T1 signal splits into 24
timeslots each which is allocated 8 bits. Each timeslot sends and receives an 8-bit
sample 8000 times per second (8 x 8000 x 24 = 1,544,000), which is ideal for
voice telephone calls where the voice is sampled into an 8-bit number at that
data rate and restored at the other end. The timeslots are numbered from 0 to
24.
Factory Defaults
By default, no smart SFP T1 ports exist.
By default, modular or built-in E1/T1 ports are set to E1 mode. When they are
configured to T1 mode, they have the following configuration.
line-length 0-133
Configuring T1 Ports
To configure T1 ports:
1. Configure the port to T1 mode (see Configuring E1/T1 Ports)
2. At the config>port# prompt, type:
t1 <port>/<tributary>
The prompt config>port>t1(<port>/<tributary>)# is displayed.
3. Enter all necessary commands according to the tasks listed below.
Specifying transmission cas-oos-pattern {space | mark | Note: This command is relevant only
sequence for out-of-service space-mark} with line type esf or sf(D4).
indication for T1 port with CAS
signaling
Specifying the variety of zero line-code { ami | b8zs } • AMI – Referred to as Alternate
code suppression used for this Mark Inversion because a 1 is
port referred to as a mark and a 0 as a
space.
• B8ZS – Bipolar 8-zero
substitution, in which two
successive ones (bipolar
violations) are inserted whenever
the stream of user data contains
a string of eight or more
consecutive zeros. This insertion
is done in a way that allows each
of the 24 channels to carry 64
kbsp of data.
Specifying T1 operation mode line-interface {dsu | csu} • dsu – Digital Service Unit
• csu – Channel Service Unit
Specifying the T1 line type line-type { unframed | esf | sf } • unframed – No framing (this type
is relevant only for built-in T1
ports)
• sf (D4) – Super Frame (12 T1
frames)
• esf – Extended Super Frame (24
T1 frames, with on-line
performance monitoring and
4 Kbps control data link)
Running loopback test on T1 loopback {local | remote } • local – returns the transmitted
port [duration <seconds>] data at the physical layer to the
receiving path
• remote – returns the received
data at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback
starts. Possible values: 1 to 3600
• duration – specifies the duration
of the loopback (in seconds).
Possible values: 1 to 3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Specifying the port clock source-clock-quality {stratum1 | Clock quality used in adaptive clock
quality stratum2 | stratum3 | stratum3e | recovery set according to parameter
stratum4} specified:
• stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
Defining whether the T1 port trail-mode { extended | extended – ETX-2 forwards the E1
alarms are forwarded toward terminated } port alarms from the PW toward the
the TDM line TDM line.
terminated – ETX-2 does not forward
the E1 port alarms toward the TDM
line.
Selecting the transmit clock tx-clock-source {loopback | • loopback – clock retrieved from
source internal |domain <number> | the port's incoming (Rx) data
pw <number> } • internal – clock provided by
internal oscillator
• domain – clock provided by clock
domain, if device has timing
option
• pw – clock provided by PW bundle
Note: After changing tx-clock-source,
in ETX205A, you are required to
reset the device.
To configure T1 ports:
1. If the module type is not E1/T1, power off ETX-2, insert the E1/T1 module,
and then power on ETX-2.
2. Provision the module type as E1/T1 (see Configuring Module).
3. Configure the port to T1 mode (see Configuring E1/T1 Ports).
4. At the config>port# prompt, type:
t1 [<slot>/]<port>/<tributary>
The prompt config>port>t1([<slot>/]<port>/<tributary>)# is displayed.
5. Enter all necessary commands according to the tasks listed below.
Specifying the variety of zero line-code { ami |b8zs } • AMI – Referred to as Alternate
code suppression used for this Mark Inversion because a 1 is
port referred to as a mark and a 0 as a
space.
• B8ZS – Bipolar 8-zero
substitution, in which two
successive ones (bipolar
violations) are inserted whenever
the stream of user data contains
a string of eight or more
consecutive zeros. This insertion
is done in a way that allows each
of the 24 channels to carry 64
kbsp of data.
Note: Only B8ZS can be configured
for modular T1 ports.
Specifying the length (in feet) line-length {0-133 | 134-266 | This command appears in the CLI only
of the T1 line, in DSU mode 267-399 | 400-533 | 534-655} if rx-sensitivity is configured to
short-haul, which indicates DSU
mode.
Running loopback test on T1 loopback {local | remote } • local – returns the transmitted
port [duration <seconds>] data at the physical layer to the
receiving path
• remote – returns the received
data at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback starts
Possible values: 1–3600
• duration – Specifies the duration
of the loopback (in seconds)
Possible values: 1–3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Note Initialize the database of the MiTOP before inserting it into the device. Refer to
the Setting the Switches section in the Installation and Setup chapter of the
MiTOP E1T1 Installation and Operation manual.
Specifying the variety of zero code line-code { ami | b8zs } • AMI – Referred to as Alternate
suppression used for this port Mark Inversion because a 1 is
referred to as a mark and a 0 as a
space.
• B8ZS – Bipolar 8-zero
substitution, in which two
successive ones (bipolar
violations) are inserted whenever
the stream of user data contains
a string of eight or more
consecutive zeros. This insertion
is done in a way that allows each
of the 24 channels to carry 64
kbsp of data.
Specifying T1 operation mode line-interface {dsu | csu} • dsu – Digital Service Unit ×
• csu – Channel Service Unit
Specifying the T1 line type line-type { unframed |esf | sf } • unframed – No framing (relevant
only for MiTOP)
• sf – Super Frame (12 T1 frames)
• esf – Extended Super Frame (24
T1 frames, with on-line
performance monitoring and
4 Kbps control data link)
Running loopback test on T1 port loopback {local | remote } • local – returns the transmitted
[duration <seconds>] data at the physical layer to the
receiving path
• remote – returns the received
data at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback starts
Possible values: 1–3600
• duration – specifies the duration
of the loopback (in seconds).
Possible values: 1–3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Specifying the port clock quality source-clock-quality {stratum1 Clock quality used in adaptive clock ×
| stratum2 | stratum3 | recovery set according to parameter
stratum3e | stratum4} specified:
• stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
Selecting the transmit clock source tx-clock-source {loopback | • loopback – clock retrieved from
internal | domain <number> | the port's incoming (Rx) data
pw <number> } • internal – clock provided by
internal oscillator
• domain – clock provided by clock
domain, if device has timing
option
• pw – clock provided by PW bundle
Note: The domain and pw options are
available only for MiTOP.
5.19 T3 Ports
T3, also referred to as DS-3 (Digital Signal Level 3), equates to 28 T-1 lines or
44.736 million bits per second (roughly 43-45 Mbps upstream/downstream
speeds). DS-3s have enough bandwidth to allow very large database transfers
over busy wide area networks.
Applicable Products
T3 ports are applicable to the ETX-2 products as follows:
• All ETX-2 products:
Smart SFP T3 ports are available when smart SFPs such as MiRICi-T3 or
MiTOP-T3 are provisioned (see Smart SFPs)
Smart SFP T3 ports do not support encapsulation via VCG
Smart SFP T3 ports are referenced as [<slot>/]<port>/<tributary>:
<slot> is relevant to ETX203AM and ETX220A.
<tributary> is always set to 1.
Standards
ITU-T G.703
ITU-T G.704
ITU-T G.823
Benefits
T3 lines enable high-capacity Ethernet services in remote locations and
transparently connect corporate LANs over existing PDH infrastructure.
Functional Description
In North America, DS-3 translates into T-3, which is the equivalent of 28 T-1
channels, each operating at 1.544 Mbps. Four T-1s are multiplexed to a T-2
frame, then seven T-2 frames are multiplexed, through an M23 (‘Multiplex 2-to-3’
multiplexer). As each frame is transmitted 8,000 times per second, the total T-3
signaling rate is 44.736 Mbps.
Factory Defaults
By default, no smart SFP T3 ports exist.
If a T3 module is inserted, the modular T3 ports have the following configuration.
line-length up-to-225ft
line-type c-bit-parity
name T3 <slot>/<port>
Configuring T3 Ports
Running loopback test loopback {local | remote } [start • local – returns the transmitted
on T3 port <seconds> ] [duration <seconds>] data at the physical layer to the
receiving path
• remote – returns the received data
at the physical layer to the
transmitting path
• start – specifies the time (in
seconds) until the loopback starts.
Possible values: 1–3600
• duration – specifies the duration of
the loopback (in seconds).
Possible values: 1–3600
If duration is not specified, the
loopback test runs forever, until
stopped.
Use no loopback to disable the
loopback test.
Specifying if pm-enable
performance reporting
is enabled for the port
Selecting the transmit tx-clock-source {loopback | internal } • loopback – clock retrieved from the
clock source port's incoming (Rx) data
• internal – clock provided by
internal oscillator
Note: This command is relevant only if
the module has a single T3 port. In the
case of a module with two T3 ports,
the Tx clock source is configured at
the VCG port level (see Configuring
VCG Ports).
Note Initialize the database of the MiTOP before inserting it into the device. Refer to
the Setting the Switches section in the Installation and Setup chapter of the
MiTOP E1T1 Installation and Operation manual.
Specifying type line-type {m23 | c-bit-parity | • m23 – Four DS1 signals are are
of T3 line unframed } multiplexed into one DS2 signal, then
seven DS2 signals are multiplexed into one
DS3 signal.
• c-bit-parity – The c-bit parity framing
format is an enhancement of the M13
application, providing greater management
and performance functions.
• unframed – No framing (relevant only for
MiTOP).
Running loopback loopback {local | remote } [start • local – Returns the transmitted data at the
test on T3 port <seconds> ] [duration <seconds>] physical layer to the receiving path
• remote – Returns the received data at the
physical layer to the transmitting path
• start – Specifies the time (in seconds)
until the loopback starts.
Possible values: 1–3600
• duration – Specifies the duration of the
loopback (in seconds).
Possible values: 1–3600
If duration is not specified, the loopback
test runs forever, until stopped.
Use no loopback to disable the loopback test.
Specifying if pm-enable
performance
reporting is
enabled for the
port
Specifying the source-clock-quality {stratum1 | Clock quality used in adaptive clock recovery ×
port clock quality stratum2 | stratum3 | stratum3e | set according to parameter specified:
stratum4} • stratum1 – PRC G.811
• stratum2 – Type II G.812
• stratum3 – Type IV G.812
• stratum3e – Type III G.812
• stratum4 – Free running
Selecting the tx-clock-source {loopback | internal | • loopback – clock retrieved from the port's
transmit clock pw <number>} incoming (Rx) data
source • internal – clock provided by internal
oscillator
• pw – clock provided by PW bundle
Note: The pw option is available only for
MiTOP.
5.20 VCGs
VCG ports provide a logical link to modular E1/T1/T3 ports.
Applicable Products
This feature is applicable to ETX203AM with an E1/T1/T3 module.
Standards
ITU-T G.7042
ITU-T G.7043
Benefits
The VCG port provides a logical link to modular E1/T1/T3 ports.
Functional Description
A VCG (Virtual Concatenation Group) logical port is used to group the E1/T1/T3
ports that are available if the appropriate type of module has been provisioned
and inserted.
By default, the Tx clock of the E1/T1/T3 ports in the module is the internal clock
provided by the internal oscillator of the module. You have the option of
selecting instead the loopback clock retrieved from the port's incoming (Rx) data,
as the Tx clock of the E1/T1/T3 ports.
Note
The VCG logical port is used only if the module contains multiple E1/T1/T3 ports,
and a GFP port is then bound to the VCG port. If a module with a single T3 port is
installed, the GFP port is bound directly to the T3 port.
Factory Defaults
By default, no VCG ports exist. When a VCG port is created, it is configured as
shown below.
Binding VCG port to E1 port bind e1 <slot>/<port> Note: Successful only if the
no bind e1 <slot>/<port> E1/T1 module is installed.
Binding VCG port to T1 port bind t1 <slot>/<port> Note: Successful only if the
no bind t1 <slot>/<port> E1/T1 module is installed.
Binding VCG port to T3 port bind t3 <slot>/<port> Note: Successful only if the T3
no bind t3 <slot>/<port> module is installed.
Selecting the transmit clock source tx-clock-source {loopback | • loopback – clock retrieved
internal } from the port's incoming
(Rx) data
• internal – clock provided by
internal oscillator of the
E1/T1/T3 module
•
Examples
To configure VCG port 1 with module containing two E1 ports:
#*****ports E1 configuration***************************
configure port
e1 1/1
no shutdown
exit
e1 1/2
no shutdown
exit all
#*****ports GFP bind MAC configuration******************
configure port
vcg 1
bind e1 1/1
bind e1 ½
exit
gfp 1
bind vcg 1
exit
logical-mac 1
bind gfp 1
no shutdown
exit all
To configure VCG port 1 with module containing two T3 ports:
ETX-2>config>port# vcg 1
ETX-2>config>port>vcg(1)$ bind t3 1/1
Lower Layer
---------------------------------------------------------------
T3 1
T3 2
Applicable Products
This feature is applicable to ETX203AM with a VDSL2 module; operates in CPE
mode only.
Standards
ITU-T G.993.2, G.997.1, G.998.2
IEEE 802.3
Benefits
ETX-2 can aggregate traffic over the VDSL.bis links.
Functional Description
Very High Speed Digital Subscriber Line Transceivers 2 (VDSL2) is an access
technology that enables delivery of very high-speed internet access over copper
telephone lines – much higher than a conventional voice band modem can
provide.
VDSL2 main features include:
• Four VDSL2 ports
• One bonding group; supports up to four VDSL port(s)
Displaying port status show status See Viewing VDSL2 Port Status.
Displaying port statistics show statistics See Viewing VDSL2 Port Statistics.
Assigning port name name <string> Typing no name removes the port name.
Parameter Description
Example
---------------------------------------------------------------
Time Elapsed (Sec) : 895
Valid Intervals : 6 Invalid Intervals : 90
ES : 0 SES : 0
UAS : 0 FEC : 2
LOSS : 0
Parameter Description
Interval Validity Indicates if the data for this historical interval is valid
Valid Intervals The number of 15-minute PM intervals for which data was
collected. The value is typically equal to the maximum number of 15-
minute intervals the implementation is planned to store, unless the
measurement was (re-)started recently, in which case the value is the
number of complete 15-minute intervals for which the agent has at
least some data. In certain cases (e.g., in the case where the agent is a
proxy), it is possible that some intervals are unavailable, in which case,
this interval is the maximum interval number for which data is available.
FEC Number of seconds with at least one FEC correction during this interval
LOSS Number of seconds that there was LOS during this interval
Applicable Products
This feature is applicable to all ETX2 products, with the following condition:
• ETX203AM, ETX203AX, ETX205A, and ETX220A – ACL can be applied only
to management packets.
Standards
Relevant sections of RFC 1812
Benefits
Service providers use ACLs to maintain network security by preventing malicious
traffic from entering the device. ACLs can be used to save network resources by
dropping unwanted packets.
When management data is marked via ACLs, service providers can apply various
traffic management techniques to the marked packets, such as allocating more
bandwidth to a certain traffic type.
Functional Description
Devices featuring ACLs can flexibly filter management traffic, by denying or
permitting IP packets to enter the host, according to the packet’s
source/destination address, protocol type, or other criteria.
ACL entries are sequentially numbered rules containing statements (Deny, Permit,
or Remark) and conditions. Remarks are free-text ACL entries used for
commenting and visually organizing ACLs.
Packets are permitted or denied access, based on the following conditions:
• IP source and destination address or address range
• IP protocol
• TCP port – TCP/23 (TELNET), TCP/22 (SSH)UDP port – UDP/161 (SNMP)
Note By default, logging is disabled. If you choose to enable it, the default logging
interval is five minutes.
Two packets matching the same rule on the same entity in the same direction are
logged only if the time between them exceeds the logging interval.
After a match, the rest of the rules are ignored. Packets not matching any rule
are dropped. Empty ACLs deny access of all packets matched to them.
Show Me Demo
Note If the video cannot be viewed, ensure that you have the latest version of Adobe
Reader.
Statistics
The device collects ACL statistics per management entity. The statistic counters
include the number of rule matches that occurred since the counters were last
cleared. The statistic counters are cleared upon device reboot. The user may also
clear ACL statistics of any entity.
Factory Defaults
Parameter defaults are alphabetically listed in the tables below.
All ACL Rules ACL statement sequence Highest number in use in the ACL plus 10
log Disable
sequence-number –
Configuring ACL
The ACL configuration tasks are performed at the access control and
management levels.
To configure ACL:
1. Create an access control list.
2. Add deny and permit rules to the ACL.
3. Bind the ACL to a management entity.
Access-Control-Level Tasks
The following commands are available in the CLI access-control context:
config>access-control#. The exception to this are the deny, permit and remark
commands, which are performed in the access-list(acl_name) context:
configure>access-control>access-list(acl_name)#.
Creating and access-list [{ipv4 | ipv6}] <acl_name> Creating an ACL is performed by assigning
deleting an ACL no access-list <acl_name> a name and specifying the ACL IP type.
The ACL names must be unique.
The ACL name contains up to
252 alphanumeric characters.
Adding deny deny {tcp | udp} {any | <src-address> [/<src- The arguments of the deny rule vary
rules to an ACL prefix-length>]} [<src-port-range>] any depending on the protocol (TCP, UDP).
[<dst-port-range>] [log] [sequence Management-bound ACLs have the
<sequence-number>] following configuration limitations:
• Only TCP- or UDP-based rules can be
defined.
• The destination IP address must be
any.
• For TCP/UDP, the destination port must
be tcp/23 (Telnet), tcp/22 (SSH), ,
udp/161 (SNMP), or any..
• The source port must remain any (i.e.
optional src-port-range field should not
be configured).
• DSCP and IP Precedence are not
supported.
log enables logging match events of the
rule into the event log and sending SNMP
traps.
Possible values for sequence:
1–2147483648.
Note: If the ACL already has a statement
with the same sequence number, the old
statement is replaced with the new one.
Adding permit permit {tcp | udp} {any | <src- The arguments of the permit rule vary
rules to an ACL address>[/<src-prefix-length>]} [<src-port- depending on the protocol (TCP, UDP).
range>] any [<dst-port-range>] [log] Management-bound ACLs have the
[sequence <sequence-number>] following configuration limitations:
• Only TCP- or UDP-based rules can be
defined.
• The destination IP address must be
any.
• For TCP/UDP, the destination port must
be tcp/23 (Telnet), tcp/22 (SSH),
udp/161 (SNMP) , or any..
• The source port must remain any (i.e.
optional src-port-range field should not
be configured).
• DSCP and IP Precedence are not
supported.
log enables logging match events of the
rule into the event log and sending SNMP
traps.
Possible values for sequence:
1–2147483648.
Note: If the ACL already has a statement
with the same sequence number, the old
statement is replaced with the new one.
Adding remarks remark <description> [sequence <sequence- The description contains up to 255
to an ACL number>] characters.
Reseqencing the resequence access-list <acl-name> Possible values for value: 1–100000
rules in an ACL [<value>]
Setting the logging access-list <value> Enable logging at the maximum rate of the
logging interval no logging access-list value set at Access Control level. <0> is
of all ACLs equivalent to no logging access-list
command.
no logging access-list disables event
logging for all rules in the ACL.
Management-Level Tasks
The following commands are available in the CLI management context:
configure>management>access#.
Binding the ACL access-group <acl-name> in The management entity supports the ACLs
to a no access-group in {ipv4 | ipv6} only in the in direction.
management When binding the ACL to the management
entity and entity, or when adding/editing rules in an
defining the ACL ACL that is bound to the management
direction entity, the rules must conform to the
following limitations:
• The protocol rules must be of TCP/UDP
type.
• The destination address must be set to
any.
• The source port must be set to any.
• The destination port must be tcp/23
(Telnet), tcp/22 (SSH), udp/161
(SNMP), or any.
• DSCP, IP precedence, and P-bit cannot
be used.
Displaying the show access-list summary Displays ACL status at the current level
summary of ACLs See Displaying Status below.
bound to a
management
entity
Examples
Management ACL
The table below summarizes the rules configured for the ACL. Items in red are
either implied or unavailable for the current parameter or serve as system
settings that cannot be changed. The deny rule appearing in the bottom row is a
system rule that is used to deny all non-compliant data.
Sequence Action Protocol Source IP TCP/UDP Dest. IP TCP/UDP Dest. Port Log
Number Source Port
Configuration Errors
Table 6-3 lists the messages generated by the device when a configuration error
is detected.
Message Description
Cannot execute; invalid statement Invalid matching rule. For example, binding the ACL with a rule,
using a protocol other than TCP or UDP to the management
entity.
Cannot add statement; sequence Invalid sequence number of the rule. Allowed sequence number
number out of range range is 1–2147483648.
Cannot resequence; sequence number Resequencing has failed because the ACL interspace value is
out of range invalid.
Cannot clear; no such router interface Statistic counters cannot be cleared on the non-existing router
interface.
Cannot bind; no such access list A non-existing ACL cannot be bound to the router interface or
the management entity.
Cannot show; no such router interface Statistic counters cannot be displayed on the non-existing
router interface.
Cannot bind; invalid statement An access list with statements, which are not supported by the
management ACL, cannot be attached to the management
entity.
Displaying Status
The ACL status displays information on the ACL name, type (IPv4 or IPv6), and the
entity that the ACL is bound to. The status information is available for the ACLs at
the management access levels.
Displaying Statistics
The ACL statistic counters gather information on the number of rule matches
registered on the ACL since the last reboot or counter clearing.
Note All ACLs have an implied last rule that denies all packets. The device does not
provide statistic counters for this rule. If you intend to collect statistics on the
number of packets discarded by the default ACL mechanism, you must add the
deny ip any any rule at the end of the ACL.
Applicable Products
This feature is applicable to all ETX2 products.
Factory Defaults
By default, authentication is via the locally stored database (1st-level local).
Specifying authentication method auth-policy 1st-level tacacs+ [2nd-level { If 2nd-level is set to local, authentication is
preferably via TACACS+, then local | none } ] performed via the TACACS server. If the
optionally local TACACS server does not answer the
authentication request, then ETX2
authenticates via the local database. .If the
TACACS server rejects the authentication
request, ETX2 ends the authentication
process.
If 2nd-level is set to none, authentication is
performed via the TACACS server only.
Specifying authentication method auth-policy 1st-level radius [2nd-level ETX2 first attempts authentication via the
preferably via RADIUS/ TACACS+, then tacacs+ [3rd-level {local | none}]] server specified by 1st-level. If the server
optionally TACACS+/ RADIUS, then auth-policy 1st-level tacacs+ [2nd-level does not answer the authentication
optionally local radius [3rd-level {local | none}]] request, then ETX2 attempts to
authenticate via the server specified by
2nd-level. If the server does not answer the
authentication request, then ETX2
attempts to authenticate according to
3rd-level:
• local – ETX2 authenticates via the local
database
• none – No further authentication is
done, and the authentication request is
rejected.
Note: If at any time in this process, an
authentication server rejects an
authentication request, ETX2 ends the
authentication process and does not
attempt authentication at the next level.
Note According to the format of the IP address (IPv4 or IPv6), it is saved as the IPv4 or
IPv6 management source IP address.
Applicable Products
This feature is applicable to all ETX2 products.
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS)
Benefits
The RADIUS protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device in the
network.
Due to its generic nature, the RADIUS protocol can easily be used by service
providers and enterprises to manage access to the Internet, internal networks,
wireless networks, and integrated email services. These networks may
incorporate DSL, access points, VPNs, network ports, and more.
Functional Description
RADIUS servers have built-in mapping of users to service-types (Table 6-4). Note
that each user has the rights of all users above it. All users have default password
1234. It is highly recommended to change the default password when setting up
your device (Refer to Changing Password on how to change a password).
su ETX2# 6 (administrative)
Network
Logging on to ETX-203AX or
returning authentication error ETX-203AX
RADIUS Server
Management Work Station Access accepted or denied
Shared Secret
Factory Defaults
By default, no RADIUS servers are defined. When the RADIUS server is first
defined, it is configured as shown below.
Defining a non-disclosed string (shared key <string> [hash] The shared secret is a secret key
secret) used to encrypt the user consisting of free text known to
password. the client and the server for
encryption.
The hash keyword denotes that
the string is hashed, rather than
clear text; usually it is added by
the device after hashing the clear
text that the user enters, before
saving it in the database.
If you enter the password as a
text string, do not use the hash
parameter. Use it only if you are
specifying the password as a
hashed value (obtained by using
the info command to display
RADIUS data).
Defining timeout (in seconds) for timeout <seconds> Possible values: 1–5
response from RADIUS server
Defining the UDP port to be used for auth-port <udp-port-number> Possible values: 1–65535
authentication
Timeouts :0 0 0 0
Unknown Types :0 0 0 0
Packets Dropped :0 0 0 0
Applicable Products
This feature is applicable to all ETX2 products.
Standards
TACACS+ Protocol Version 1.78 (IETF draft-grant-tacacs-02)
Benefits
The TACACS+ protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network. The TACACS+ server encrypts the entire body of the packet, but leaves a
standard TACACS+ header.
Customers do not have to adapt their TACACS+ server privilege levels to RAD CLI
default values; CLI levels can be remapped in accordance with the customer’s
TACACS+ levels.
Factory Defaults
By default, no TACACS+ servers are defined. When the TACACS+ server is first
defined, it is configured as shown below.
key “” hash
retry 1
timeout 5 seconds
authentication-port 49
accounting-port 49
Functional Description
TACACS+ is a protocol that provides access control for routers, network access
servers, and other networked computing devices via one or more centralized
servers. TACACS+ is based on the AAA model:
• Authentication – The action of determining identity of a user
• Authorization – The action of determining what a user is allowed to do. It can
be used to customize the service for the particular user.
• Accounting – The action of recording what a user is doing, and/or has done
Note TACACS+ performs authorization according to the user level; it does not send
each command to the server for authorization.
Components
The TACACS+ remote access environment has three major components: access
client, TACACS+ client, and TACACS+ server.
• The access client is an entity which seeks the services offered by the
network.
• TACACS+ client, running on ETX2, processes the requests from the access
client and passes this data to TACACS+ server for authentication.
• TACACS+ server authenticates the request, and authorizes services over the
connection. The TACACS+ server does this by matching data from the
TACACS+ client`s request with entries in a trusted database.
TACACS+ server decides whether to accept or reject the user's authentication or
authorization. Based on this response from the TACACS+ server, the TACACS+
client decides whether to establish the user's connection or terminate the user's
connection attempt. The TACACS+ client also sends accounting data to the
TACACS+ server to record in a trusted database.
TACACS+ uses TCP for its transport and encrypts the body of each packet.
TACACS+ client and server can agree to use any port for authentication and
accounting. TACACS+ supports authentication by using a user name and a fixed
password.
Accounting
ETX2 supports up to five accounting groups, with up to five TACACS+ servers per
group. However, each TACACS+ server can be bound to a single accounting group
only.
A group can be defined with its own accounting level:
• Shell accounting, which logs the following events:
Successful logon
Logon failure
Logoff
ETX2 - terminated management session
• System accounting, which records system events/alarms registered in local
log file
• Command accounting, which logs the following events:
Any shell command that was successfully executed by ETX2
Any level that was successfully changed in a shell
Note The password that you enter when creating a new user (configure management
login-user <name> password <password>, or when copying a file (file copy
<source-file-url> <destination-file-url> sftp://<username>:<password>) is masked
in TACACS+ under CLI command accounting. The password entered appears in the
TACACS+ command log as asterisks (*), thus providing protection from sniffers.
• You cannot map a TACACS+ level to multiple CLI levels. If the command is
repeated for a TACACS+ level, the new mapping replaces the old one.
• You can unmap both TACACS+ and CLI levels, with the exception of su, which
must be mapped to at least one TACACS+ level.
Note If you intend to use TACACS+ for authentication, verify that TACACS+ is selected
as a level-1 authentication method (see Access Policy).
Defining the TCP port to be used for accounting-port <port-number> Possible values: 1–65535
accounting
Defining the TCP port to be used for authentication-port <port-number> Possible values: 1–65535
authentication
Defining a non-disclosed string (shared key <string> [hash] The shared secret is a secret
secret) used to encrypt the user key consisting of free text
password known to the client and the
server for encryption.
The hash keyword denotes
that the string is hashed,
rather than clear text; usually
it is added by the device after
hashing the clear text that
the user enters, before saving
it in the database.
If you enter the password as
a text string, do not use the
hash parameter. Use it only if
you are specifying the
password as a hashed value
(obtained by using the info
command to display TACACS+
data).
Defining timeout (in seconds) for timeout <seconds> Possible values: 1–30
response from TACACS+ server
Notes • You can enter any combination of the parameters shell, system, or commands,
but you must enter at least one of them
• Type no accounting to disable TACACS+ accounting for the group.
Configuration Errors
The following table lists the messages generated by ETX2 when a configuration
error is detected.
su level must be mapped to a You tried removing the last Leave at least one mapping of su.
TACACS+ level mapping of su, but su must be
mapped to at least one
TACACS+ level.
Counter Description
Request Timeouts Number of transaction timeouts that occurred between the client and
server
Unexpected Responses Number of times the TACACS+ client receives a TACACS+ packet that is
not expected at that time. Usually, this occurs due to a delayed response
to a request that has already timed out
Counter Description
Server Error Responses Number of errors received from the TACACS+ server
Transaction Failures Number of times the TACACS+ client’s request is aborted by the TACACS+
server or the server fails to respond after maximum retry is exceeded
Pending Requests Number of TACACS+ client’s requests minus number of TACACS+ server
responses or timeouts
Applicable Products
This feature is applicable to all ETX2 products and to PMC in ETX205A.
Functional Description
ETX2 enables you to configure the following:
• Login timer – timer for local management login after login failure. In terminal
timeout, you configure the minimum amount of time that must pass before
you can log in after failed login attempts.
• Inactivity timer – Timer for local management session. In terminal console-
timeout, you configure the maximum amount of time that a CLI session on
the local console can be without activity, before it is automatically
disconnected.
Factory Defaults
length 20
Specifying the desired data rate baud-rate { 9600bps | 19200bps | The control port data rate of ETX205A with
38400bps | 57600bps | 115200bps PMC should be set to 9600 bps or higher to
be compatible with the x86 terminal.
Specifying the number of rows to length <number-of-rows> The number of rows to print before
display pausing, or 0 for no pausing (i.e. no limit on
the number of lines displayed).
Possible values: 0-255
Note Packets sent from or to the device itself are not related to the DHCP relay
functionality.
You can enable the following Layer-2 DHCP Relay agent features on your device
or on specific services of your device:
• DHCP Snooping – Configuration of servers and relay ports as trusted, and
client ports as untrusted.
• DHCP Option 82 – Add additional information to the DHCP request, including
Remote ID and Circuit ID.
Standards
[RFC 1542] — Clarifications and Extensions for the Bootstrap Protocol
[RFC 2131] — Dynamic Host Configuration Protocol
[RFC 2132] — DHCP Options and BOOTP Vendor Extensions
[RFC 3046] — DHCP Relay Agent Information Option
Benefits
• Layer-2 DHCP Snooping verifies DHCP transactions and protects against rogue
DHCP servers and clients.
• The DHCP server uses the Remote ID and Circuit ID information provided by
DHCP option 82 for the address allocation scheme.
Functional Description
A DHCP relay agent at Layer-2 forwards requests and replies between clients and
servers that are on the same Layer-2 subnet but not on the same physical
subnet. Unlike normal Layer-2 forwarding, in which IP datagrams are switched
transparently, a relay agent receives DHCP messages and generates new ones to
send on output interfaces.
DHCP servers are assumed to reside in trusted locations, usually beyond network
ports, while DHCP clients reside in untrusted locations, usually behind user ports.
Each port is configured as either DHCP trusted or untrusted (refer to the Cards
and Ports chapter - configuration of dhcp-trust parameter in Ethernet, LAG,
Logical MAC, and PCS ports).
The device can be configured with two DHCP functionalities:
• DHCP Snooping
• DHCP Option 82
DHCP Messages
The following table [per RFC 2131] describes the various DHCP client and server
messages:
DHCPINFORM Ask for configuration; address has been externally configured. Client
DHCP Snooping
DHCP relay supports DHCP snooping on the device (or specific services), for
added security. Servers and relay ports should be configured as trusted, and
client ports as untrusted.
In addition to verifying the validity of incoming DHCP messages, when enabled,
the DHCP relay does the following:
• Blocks server DHCP messages (DHCPOFFER, DHCPACK, and DHCPNACK)
arriving from untrusted ports; allows from trusted ports.
• Blocks client DHCP messages (DHCPDISCOVER, DHCPREQUEST, DHCPDECLINE,
DHCPRELEASE and DHCPINFORM) when they arrive from trusted ports; allows
from untrusted ports.
• Forwards DHCP server packets only to untrusted ports and DHCP client
packets only to trusted ports.
• DHCP snooping over a specific EVC is indicated by its Service ID (configured
over all EVC flows).
DHCP Option 82
The device (or specific services) can also be configured to enable DHCP option 82
(the relay agent information option). If enabled, upon intercepting a client DHCP
packet the relay agent adds option 82 to the DHCP request before forwarding the
packet to the DHCP server.
The following information is added to the DHCP request:
• Remote ID – the agent identification; usually agent MAC address
• Circuit ID – usually identification of the port and VLAN of the switch from
which the request was received.
The reply from the server is forwarded back to the client after removing option
82.
Figure 6-2 describes the flow of DHCP packets through a relay when option 82 is
enabled.
1. The DHCP client broadcasts a DHCP request.
2. The DHCP relay agent intercepts the request, and performs a sanity check on
the packet.
3. If it is not valid, it discards the message.
4. Otherwise, if it is valid, inserts option 82 in the packet and broadcasts it
towards the DHCP server. Option 82 information includes the two configured
suboptions: Circuit ID and Remote ID.
5. The DHCP server assigns an IP address based on the option 82 suboptions
and sends a lease back to the client.
6. The relay agent performs a sanity check on the packet and strips option 82
(Remote ID and Circuit ID fields) off the packet before forwarding the packet
to the client.
Factory Defaults
By default, no DHCP relay parameters are configured for ports. The system DHCP
relay parameters have the default values shown in the following table.
dhcp-option-82 no dhcp-option-82
dhcp-snooping no dhcp-snooping
• The snooping functionality can be enabled for all ingress traffic from the
ports or to traffic of specific services as configured in dhcp-snooping (see
table below).
• Refer to port configuration sections in Cards and Ports chapter to set port
dhcp-trust/untrust.
System Parameters
This section explains how to enable or disable DHCP Option 82 and DHCP
Snooping for the device.
You can enable DHCP Option 82 and DHCP Snooping globally for the entire device
(i.e. all services) or for a specific service. You can repeat the command for each
service on which to enable the feature.
Note If a feature is enabled for all services, the feature applies to all services,
regardless of service-specific configuration. If it is not enabled for all services, it
applies only to those services for which it was explicitly enabled.
It is possible to enable DHCP option 82 for the entire device, but set the format
of its sub-options (Circuit ID and Remote ID) either globally or per service.
You can disable these features on all services using the no form of the command.
To configure DHCP relay system parameters:
1. Navigate to configure system dhcp-relay.
The config>system>dhcp-relay# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Enabling DHCP option 82 dhcp-option-82 {all | service <service-name>} service – the service on which to
[circuit-id {vlan-card-port | string <circuit-id- enable option 82
string>}] [remote-id {mac | hostname | string Possible values: all, service name (1-
<remote-id-string>} 31 characters)
no dhcp-option-82 {all | service <service-name>} circuit-id – circuit ID format
Possible values: vlan-card-port
(default) , string (0-253 characters)
remote-id – remote ID format
Possible values: mac (default),
hostname (SNMP sysName), or
string (0-253 characters)
Notes:
• If hostname is chosen, if SNMP
sysName is > 253 characters, or
if SNMP sysName > 253
characters is configured while it
is in use by option 82, the
following message is displayed:
Only first 253 characters of
hostname are used in DHCP
option 82 remote ID.
• Option 82 suboptions format
can be configured for a specific
service to be different from the
global configuration; however,
option 82 cannot be disabled on
a specific service if it is globally
enabled.
• Both circuit-ID and remote-ID
suboptions are always sent if
option 82 is enabled.
Enabling DHCP snooping [no] dhcp-snooping {all | service <service-name>} service – the service on which to
enable snooping.
Possible values: all, service name (1-
31 characters)
all – All ports traffic is subjected to
snooping functionality.
remote access concentrator to establish a PPPoE session, and then build a PPP
link to the peer at the other end of the PPP link.
Applicable Products
This feature is applicable to all ETX2 products.
Standards
RFC 1332 – The PPP Internet Protocol Control Protocol (IPCP)
RFC 1334 – PPP Authentication Protocols
RFC 1661 – The Point-to-Point Protocol (PPP)
RFC 1994 – PPP Challenge Handshake Authentication Protocol (CHAP)
RFC 2516 – A Method for Transmitting PPP Over Ethernet (PPPoE)
RFC 5072 – IP Version 6 over PPP
Benefits
PPPoE in ETX2 is used to establish a management channel through which an IP
address can be acquired and the unit can be managed. You can connect ETX2 to
a central server for authentication and to acquire an IP address, and establish a
management channel that a remote management system can use to send
software and configuration files and manage ETX2.
Functional Description
PPPoE consists of the following stages:
• Discovery
• PPP Session
Discovery
ETX2 locates a remote access concentrator by broadcasting a request to initiate
a PPPoE session. The request can contain a user-configurable service name (sent
as empty string if service name has not been configured). When an access
concentrator answers the request and the PPPoE initiation message sequence is
performed successfully, the PPPoE session can be established.
If ETX2 cannot establish the session due to timeout (after a set number of
retries), or if the session is terminated or rejected by the access concentrator,
ETX2 restarts the session initiation process.
PPP Session
After discovering the access concentrator, ETX2 builds a PPP link with the remote
peer, in the following stages:
• Link Control Protocol (LCP) Negotiation
• Authentication
Authentication
ETX2 does not attempt to authenticate the PPP peer, but does respond to a
peer that requires authenticating ETX2.
The following authentication methods are supported (you can specify whether to
refuse a particular method if it is offered by the peer):
• Challenge Handshake Authentication Protocol (CHAP) – This is the
recommended authentication method if authentication is being performed, as
the username and password are not sent in clear text.
If CHAP authentication is performed, ETX2 receives a challenge from the
peer, and authenticates as follows:
If the user name in the challenge matches a configured user, ETX2 uses
the login-user and its password.
If the user name in the challenge does not match any of the configured
users, ETX2 uses the default CHAP password. If no default CHAP
password has been configured, the CHAP authentication fails.
• Password Authentication Protocol (PAP) –This authentication method is less
secure, as the username and password are sent in clear text. If the PAP
username and password have not been configured, ETX2 cannot perform
PAP authentication.
• No authentication
If authentication should be performed, ETX2 sends an authentication request to
the peer according to the method being performed, and the peer responds
accordingly.
If timeout occurs during authentication, ETX2 retries the authentication. After a
set number of retries, ETX2 terminates the PPPoE session, and then restarts the
session initiation process as described in Discovery.
If the peer rejects the authentication request, ETX2 terminates the PPPoE
session, and then restarts the session initiation process as described in
Discovery.
Factory Defaults
By default, no PPP port exists. When a PPP port is created, it is configured as
shown below.
Defining host name to send to PPP chap-hostname <name> If the CHAP host name is not configured,
peer if CHAP authentication is used ETX2 identifies itself by its device name
(assigned via the name command in the
system level).
Defining default password for CHAP chap-password <password> [hash] The default CHAP password is used for
authentication authentication if the username in a
received CHAP challenge does not match
any of the defined users.
The hash keyword denotes that the
string is hashed, rather than clear text;
usually it is added by the device after
hashing the clear text that the user
enters, before saving it in the database.
If you enter the password as a text
string, do not use the hash parameter.
Use it only if you are specifying the
password as a hashed value (obtained
by using the info command to display
PPP data).
Defining user name and password for pap-username <name> password <password> See above comments about the hash
PAP authentication [hash] parameter.
Specifying whether to refuse CHAP refuse-chap • If you do not want ETX2 to use CHAP
authentication if it is offered by the authentication for the PPP session,
peer enter refuse-chap.
• If you do want ETX2 to use CHAP
authentication if offered by the peer,
enter no refuse-chap.
Specifying whether to refuse not using refuse-no-auth • If you do not want ETX2 to skip
authentication (i.e. whether to refuse authentication for the PPP session,
skipping authentication), if that is enter refuse-no-auth.
offered by the peer • If you do want ETX2 to skip
authentication if offered by the peer,
enter no refuse-no-auth.
Specifying whether to refuse PAP refuse-pap • If you do not want ETX2 to use PAP
authentication if it is offered by the authentication for the PPP session,
peer enter refuse-pap.
• If you do want ETX2 to use PAP
authentication if offered by the peer,
enter no refuse-pap.
Displaying PPP port status show status See Viewing PPP and PPPoE Status.
Defining service name for PPPoE service-name <string> If the service name is configured, ETX2
session accepts PPPoE offers only if the service
name in the offer matches.
Displaying PPPoE status show status See Viewing PPP and PPPoE Status.
Example
To configure for PPPoE:
• Bind to SVI 1, router interface 1.
• Authentication – CHAP or PAP must be used.
CHAP hostname=ETXCHAP, default password=ppp1
PAP username=ETXPAP, password=ppp1
• Incoming flow: Untagged, ingress ETH 6, egress SVI 1
• Outgoing flow: Untagged, ingress SVI 1, egress ETH 6
exit all
configure
port
# Configure SVI 1
svi 1
no shutdown
exit
# Configure PPP port
ppp 1
bind svi 1
chap-hostname ETXCHAP
chap-password ppp1
pap-username ETXPAP password ppp1
no refuse-chap
no refuse-pap
refuse-no-auth
exit
exit
flows
# Configure classifier to match untagged packets
classifier-profile untagged match-any
match untagged
exit
# Configure incoming flow
flow ppp_in
classifier untagged
ingress-port ethernet 6
egress-port svi 1
no shutdown
exit
# Configure outgoing flow
flow ppp_out
classifier untagged
ingress-port svi 1
egress-port ethernet 6 queue 0 block 0/1
no shutdown
exit
exit
# Configure router interface bound to PPP port
router 1
interface 1
bind ppp 1
ipv6-autoconfig
no shutdown
exit
exit
# Save configuration
save
exit all
LCP
-----------------------------------------------------------------------------
state : Opened
MRU Local : 1500 Peer : 1500
Authentication
-----------------------------------------------------------------------------
Of Us : CHAP State : Completed Identity : admin
IPCP
-----------------------------------------------------------------------------
State : Opened
Local IPv4 address : 22.22.22.22 Negotiated
Peer IPv4 address : 10.0.0.1
IPV6CP
-----------------------------------------------------------------------------
State : Opened
Local IPv6 address : fe80::d31:494c:56c:71b0 Negotiated
State : Up
Service Name Requested :
Applicable Products
This feature is applicable to all ETX2 products and to PMC in ETX205A.
Standards
The supported SNMP versions are based on the following standards:
• RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working Group
• RFC 1902, Structure of Management Information for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1903, Textual Conventions for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1904, Conformance Statements for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1905, Protocol Operations for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1906, Transport Mappings for Version 2 of the Simple Network
Management Protocol (SNMPv2)
• RFC 1907, Management Information Base for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group
• RFC 1908, Coexistence between Version 1 and Version 2 of the Internet-
standard Network Management Framework. SNMPv2 Working Group
• RFC 2104, Keyed Hashing for Message Authentication
• RFC 2271, Architecture for Describing SNMP Management Frameworks
• RFC 2272, message processing and dispatching for the Simple Network
Management Protocol (SNMP)
• RFC 2273, SNMPv3 Applications
• RFC 2274, User-Based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3)
• RFC 2275, View-Based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)
• RFC 3412, Version 3 Message Processing and Dispatching
Benefits
SNMP allows you to remotely manage multiple units from a central workstation
using a network management system.
SNMPv3 allows data to be collected securely from SNMP devices. Confidential
information such as SNMP commands can thus be encrypted to prevent
unauthorized parties from being able to access them.
Functional Description
In an SNMP configuration, one or more administrative computers manage a group
of hosts or devices. Each managed system continuously executes a software
component called agent, which reports information via SNMP back to the
managing workstations.
Factory Defaults
The following is the default configuration of the SNMP parameters (see
Configuring SNMPv3 Parameters for explanations of the parameters):
• SNMP engine ID set to device MAC address
• View named “internet” providing access to IETF MIBs and IEEE MIBs
• User named "initial", with security level no authentication and no privacy
• Group for SNMPv3 named "initial":
Security levels – no authentication and no privacy, authentication and no
privacy, authentication and privacy
User – “initial”
Views for read/write/notify – "internet"
• Notifications with tag “unmasked” for the device traps
and be able to ask a device to resend them. This mechanism is called trap
synchronization.
NMSs (targets; such as RADview or third party) may be organized into trap sync
groups in order to provide redundancy between these NMSs. You can define the
tags and target parameters in each trap sync group – for example, you can define
one trap sync group for critical alarms such as linkDown and coldStart, and
another group for all other traps.
Each trap is sent to all targets attached to the group, and therefore it is
recommended to set identical traps masking for all group members.
Note When you enter password parameters, they should contain at least eight
characters.
Setting SNMP snmp-engine-id mac [ <mac-address> ] snmp If you use the mac
engine ID, as snmp-engine-id ipv4 [ <ip-address> ] option and don’t
MAC address or specify the MAC
snmp-engine-id text <string>
IP address or address, the SNMP
string engine ID is set to the
device MAC address.
If you use the ipv4
option and don’t
specify the IP address,
the SNMP engine ID is
set to the device IP
address.
Setting user privacy [ password <password> ] [ key <key-change> ] snmp>user Using no privacy
privacy disables privacy
password and protocol
optional key for Note: Password
changes minimum length is 10
for AES128 and 8 for
DES.
Examples
To create an SNMPv3 user and connect it to group:
• User named “MD5_priv”:
Security level – MD5 authentication, DES privacy
• Group named "MD5Group":
All security levels
Contains set of views named "internet" (from default configuration)
exit all
configure management snmp
#********* Configure user MD5_priv with authentication method MD5 with DES privacy protocol
#******** Configure access group MD5Group with various authentication and privacy options
access-group MD5Group usm no-auth-no-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
access-group MD5Group usm auth-no-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
access-group MD5Group usm auth-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
To create notifications:
• Notification named “TrapPort”:
Tag=“Port”
Bound to ethLos, sfpRemoved
• Notification named “TrapPower”:
Tag=“Power”
Bound to powerDeliveryFailure, systemDeviceStartup
exit all
configure management snmp
#******** Configure notification TrapPort
notify TrapPort
tag Port
bind ethLos
bind sfpRemoved
no shutdown
exit
notify TrapPower
tag Power
bind powerDeliveryFailure
bind systemDeviceStartup
no shutdown
exit all
save
To create communities, target parameters, and target for network devices that
are working with SNMPv1:
• Community “read”:
Name: “public”
Security name: “v1_read” (defined in default configuration)
• Community “write”:
Name: “private”
Security name: “v1_write” (defined in default configuration)
• Community “trap”:
Name: “public”
Security name: “v1_trap” (defined in default configuration)
Applicable Products
This feature is applicable to all ETX2 products.
Factory Defaults
By default, the following users exist, with default password 1234:
• su
• oper
• tech
• user
The default users cannot be deleted, but can be disabled (shut down).
Functional Description
ETX2 supports the following four user access levels:
• Superuser (su) can perform all the activities supported by the system,
including creating new users, changing its and other user access levels and
passwords, deleting and disabling other users.
• Operator (oper) can perform all the activities, except for defining, deleting or
disabling other users.
• Technician (tech) can monitor the device (info, show status, show statistics).
• User (user) can monitor the device (info, show status, show statistics).
The regular users (oper, tech, user) cannot define, delete or disable other users,
or change their own access levels. They are allowed to change their current
passwords. All users can view all CLI levels.
Password Hashing
You can specify a user’s password as a text string or as a hashed value, that you
obtain by using info detail to display user data.
Notes • User passwords are stored in a database so that the system can perform
password verification when a user attempts to log in. To preserve
confidentiality of system passwords, the password verification data is typically
stored after a one-way hash function is applied to the password, in
combination with other data. When a user attempts to log in by entering a
password, the same function is applied to the entered value and the result is
compared with the stored value.
• A cryptographic hash function is a deterministic procedure that takes an
arbitrary block of data and returns a fixed-size bit string, the (cryptographic)
hash value, such that any change to the data changes the hash value.
SSH Authentication
ETX2 supports management by SSHv2, enabling user authentication using one of
two methods:
Configuring Users
To add a new user:
1. Verify that you are logged on as superuser (su).
2. Navigate to the management context (config>mngmnt).
3. Enter login-user, followed by a new user name if you intend to create a new
user, or an existing name, if you intend to change previously defined user.
Specifying user password password <password> [hash] Maximum password length is as follows:
• Non-hashed – 20 characters
• Hashed – 40 characters
The use of hash function is illustrated in the
example below.
Setting user public key for public-key <public-key> Public key configuration is relevant only for the
authentication public key authentication method.
Public key format: “ ssh-rsa <space> public key
string <space> comment “ [1..512 chars]
Use the Base64 encoding (ASCII ‘A’ to ‘Z’, ‘a’
to ‘z’, ‘0’ to ‘9’, ’+’, ‘/’ and ‘space’) for the
public key configuration.
Entering no public-key deletes the public key.
Note: ETX2 does not have default public keys.
Enabling/disabling a user shutdown Default users (su, oper, tech, user) can be
no shutdown disabled, but cannot be deleted.
Deleting a User
To delete an existing user:
1. Verify that you are logged on as superuser (su).
2. Navigate to the management context (config>mngmnt).
3. Enter no login-user, followed by the name of the user that you intend to
delete.
Viewing Users
To display all connected users:
• At the config>mngmnt# prompt, enter show users.
A list of all connected users is displayed, showing their access level, the
type of connection, and the IP address from which they are connected.
ETX2# configure management
ETX2>config>mngmnt# show users
Num User Access Level Source IP Address
-----------------------------------------------------------------------------
1. su Su Terminal 0.0.0.0
For (sec) Duration of the active client Telnet session (to a remote
device) in seconds
Parameter Description
Attempts Number of failed login attempts since the source was last unblocked
Possible values: <number>
First Attempt The first failed login attempt recorded from the source
Possible values: <number> second
Blocked for Time remaining until the source will be unblocked from login
Possible values:
-- (if the source is not blocked)
<number> seconds (if the source is blocked)
Example
Defining Users
level su
password 4222
no shutdown
exit
exit all
configure management login-user staff1 info detail
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
exit all
configure management
login-user staff2
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
exit
exit all
configure management login-user staff2 info detail
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
ITU-T G.8031
Benefits
The Ethernet linear protection provides a way to protect the flows belonging to
an EVC.
Functional Description
The protection is based on an EVC Termination Point (ETP). An ETP has one
subscriber port and one or more transport ports. Multiple transport ports are
used for protection only. There are two kinds of flows connected to the ETP
ports, subscriber flows and transport flows.
• Subscriber flows run between UNIs and ETP subscriber port. You can define
classification and policing on subscriber flows, as well as marking.
• Transport flows run between ETP transport ports and NNIs. You can define
actions such as push, pop, and marking on transport flows.
Note You can define transport flows between ETP transport ports and logical MAC
ports corresponding to MiRICi-155 smart SFPs.
Flows entering the ETP assign an internal CoS value to every frame using mapping
profiles (priority-to-CoS) or by setting fixed CoS values.
Flows exiting the ETP perform queuing based on the internal CoS value using
mapping profiles (CoS-to-queue).
Classifier profile Required, with any type of Required, with Required, with Required, with
criteria criteria: criteria: criteria:
Unclassified or SP VLAN Unclassified
VLAN
Queue / block Not allowed Required, with Not allowed Required, with
queue mapping queue mapping
profile classified by profile classified
CoS by CoS
CoS Required, with CoS Not allowed Required, with Not allowed
mapping profile CoS mapping
profile
Mark Required, with marking Required, with CoS For at least one For at least one of
profile classified by CoS mapping profile of the actions, the actions,
CoS mapping marking profile
profile classified by CoS
EVC Loopback
You can activate a loopback on any of the transport ports toward the network
and on the subscriber port toward the user or network.
In most cases you would activate a loop on the subscriber port toward the
network, thus you can loop the EVC traffic without affecting protection.
If you wish to run a loop on a specific EVC path when you activate the loop on
the transport ports, you have two options:
• Loopback on a transport port affects OAM, as any traffic EVC path
redundancy is triggered if present.
• Loopback only data without affecting redundancy.
Factory Defaults
By default, no ETPs are configured.
When you create an ETP port, by default it is configured as follows:
• Name = “ETP <etp-name> Subscriber Port <port-index>” or
““ETP <etp-name> Transport Port <port-index>”, according to whether port is
subscriber or transport
• Administratively enabled
When you first enter the ETP protection level, by default the protection is
configured as follows:
ETX-2#configure etps etp ETP1 protection
ETX-2>config>etps>etp(ETP1)>protection$ info detail
shutdown
no master-etp
mode bi-directional-1-to-1
no aps-protocol
revertive
wait-to-restore 300
ETX-2>config>etps>etp(ETP1)>protection$
Configuring ETPs
This section describes how to configure ETPs.
To configure ETPs:
1. Navigate to configure etps etp <name> to select the ETP to configure.
Configuring ETP port port {subscriber | transport} <port-id> Use the no form to remove the port.
The port-id range is 1–2.
See the procedure below for more
information on configuring ETP ports.
Configuring ETP protection protection See Configuring ETP Protection for more
information.
Defining signal failure trigger sf-trigger { protection | working } port You can use MEPs from flows other
ethernet [<slot>/]<port-index> than the ETP transport flows.
sf-trigger { protection | working } port
logical-mac <port-number>
sf-trigger { protection | working } mep
<md-id> <ma-id> <mep-id>
sf-trigger { protection | working } port pcs
<port-number>
Examples
To configure an ETP:
• Name = ETP1
• Port members = subscriber 1, transport 1, transport 2
exit all
configure etps etp ETP1
port subscriber 1
exit
port transport 1
exit
port transport 2
exit all
• Revertive mode
• Time to wait before restoring transmission = 300 seconds
exit all
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• ETX203AX, ETX203AM, and ETX205A support up to four ring instances on
the same port.
• ETX220A supports up to eight ring instances on the same port.
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
ITU-T G.8032v2, Y.1731
Benefits
G.8032 rings provide sub 50 ms protection for Ethernet traffic.
Functional Description
Ethernet Ring Protection (ERP) technology provides a scalable solution for
low-cost traffic protection and rapid service restoration, with SDH/SONET-type
resilience. It is built on traditional Ethernet MAC (IEEE 802.3) and bridging (IEEE
802.1) functionality. It is independent of any physical layer technologies and can
be utilized in any carrier network.
A ring can be configured on network or user ports. If a ring is configured, LAG or
protection on the network ports is not allowed.
Note Rings are color-aware via the setting of the DEI bit:
• Set to 0 – maps to green
• Set to 1 – maps to yellow
No additional configuration is needed for the color-aware functionality.
You can also define the color-aware functionality of the ring by associating the
ring with a predefined color mapping profile (see Color Mapping).This is an
alternative method to using the DEI bit setting.
Ring Topology
ETX-2 supports the following topologies:
• Multi-ring
Multiple rings with a common link are usually referred to as ladder network (see
Figure 7-3).
The following terms are commonly used for describing ladder ring topology:
• Interconnection nodes – ring nodes that are common to both interconnected
rings (nodes C and G in Figure 7-3)
• Major ring – an Ethernet ring that controls a full physical ring and is
connected to the interconnection nodes on two ports (ring A-H-G-C-B in
Figure 7-3)
• Sub-ring – an Ethernet ring that is connected to a major ring at the
interconnection nodes. By itself, the sub-ring does not constitute a closed
physical ring. A sub-ring is connected to the interconnection nodes on only
one port (ring C-D-E-F-G in Figure 7-3). Link C–G is not a part of the sub-ring;
H G F
Virtual Channel
A Major Ring Sub-Ring E
B C D
Figure 7-3. Physical Ladder Topology for Sub-Ring with R-APS Virtual Channel
Note Sub-rings without R-APS virtual channel do not have a Virtual Channel between G
and C.
H G G F
B C C D
In ladder networks, a common VLAN is shared on more than one physical ring. For
example, in Figure 7-3, a user connected to node E communicates with a user
connected to node A over the same VLAN. Ring topology includes a physical link
between nodes G and C. It belongs to the major ring and is used by the sub-ring
as its R-APS channel. Note that a sub-ring without a virtual channel would not
have an R-APS virtual channel between nodes G and C.
Passthrough VLANs
Passthrough VLANs over the ring are those VLANs that are not added/dropped to
the ring at the local ring node (ETX), but only traverse via the ring node (East to
West or vice versa).
By default, added/dropped VLANs at the local ring node, as well as passthrough
VLANs, must be configured as data VLANs, and each one is assigned a bridge
broadcast domain (device resource).
ETX-2 ring configuration supports a passthrough attribute, which automatically
assigns a ring/bridge bypass (East to West, West to East) for all passthrough
traffic (i.e. all traffic other than the local added/dropped VLANs that are
configured as data VLANs and use bridge broadcast domains). Passthrough traffic
can be configured for the full VLAN range other than the VLANs defined as data
VLANs.
As they do not go through the bridge and use its resources, ETX-2 allows an
unlimited number of passthrough VLANS to enter the ring, and does not require
configuring them as data VLANs. Added/dropped VLANs at the local ring node still
need to be configured as data VLANs. The number of added/dropped VLANs is
limited, because they go through the bridge and use up its resources (bridge
broadcast domains).
Use of passthrough VLANs upscales the ring capacity – an unlimited number of
passthrough services can travel through the ring; there is only a limit to the
number of ring services added/dropped at the local ring node (maximum number
of broadcast domains per local node). Without using the passthrough attribute,
the maximum broadcast domain supported in a single local node limits the
number of VLANs at the entire ring to this number.
ERP Timers
The following timers are used in ERP operation:
Wait to Restore Period of time used by RPL owner to verify that the ring
(WTR) has stabilized before blocking the RPL after signal recovery.
Non-configurable; permanently set to 300 seconds.
Holdoff Period of time during which the Ethernet layer does not
report link faults to the ERP mechanism. This filters out
intermittent link faults.
Ring Commands
In addition to failure detection, protection switching can be initiated by the
following commands:
Color Mapping
ETX-2 supports color mapping configuration at ring nodes, in order to manage
ring QoS.
A ring can be configured with color mapping, according to either of the following
methods:
• DEI – the default; DEI value is not configurable; its default color aware
functionality is as follows:
DEI = 0 maps to green.
DEI = 1 maps to yellow.
• Color mapping profile – associating ring with a predefined color mapping
profile (p-bit to color). Refer to Color Mapping Profiles in Traffic Processing
chapter on how to define a color mapping profile.
By default, a ring is configured with DEI color mapping.
CoS Mapping
ETX-2 supports CoS mapping configuration at ring nodes, in order to manage ring
QoS.
By default, the ring is associated with a default one-to-one p-bit to CoS profile,
where CoS 0 maps to the highest p-bit 7.
You can associate a predefined CoS mapping profile to the ring. Refer to CoS
Mapping Profiles in the Traffic Processing chapter on how to define a CoS
mapping profile.
Factory Defaults
By default, there is no Ethernet protection ring created in the ETX-2 system.
When the ring is created, it has the following default configuration.
bridge 0
color-mapping dei
east-port 0
interconnection-node no interconnection-node
shutdown shutdown
west-port 0
To configure ERP:
1. At the config>protection# prompt, enter:
erp <ring-number> [{major | sub}]
An ERP instance of the specified type is created if it does not already
exist, and the config>protection>erp(<ring-number>)# prompt is
displayed.
2. Enter all necessary commands according to the tasks listed below.
Defining color mapping type for color-mapping {dei | profile <profile- Packet at ring ingress and at any
ring name>} node mapped to color according
to one of the following:
dei – DEI (default)
profile – predefined p-bit color
mapping profile (p-bit to color);
string 1-32 characters
Associating CoS profile with ring cos-mapping profile <cos-mapping- profile – predefined p-bit color
profile-name> mapping profile (p-bit to color);
no cos-mapping string 1-32 characters
no cos-mapping associates the
ring with a default one-to-one
p-bit to CoS profile, where CoS 0
maps to the highest p-bit.
Blocking the east or west port of force-switch {east | west} The force switch can be applied
a ring node, regardless of any to any number of nodes in the
failure conditions ring.
Blocking the east or west port of manual-switch {east | west} The manual switch command can
a ring node manually be applied to a single ring node
only.
Defining ring port type port-type { east | west } { node-port | node-port – Port is not
rpl | neighbor | next-neighbor } connected to RPL.
rpl – Port is designated as RPL.
neighbor – Port is directly
connected to RPL owner.
next-neighbor – Port is
connected to RPL owner via
neighbor.
Configuring dedicated VLAN for r-aps [vlan <vlan-id>] Range for vlan-id: 1–4094
R-APS messages [vlan-priority <vlan-priority>] Range for vlan-priority: 0–7
[mel <level>]
Range for level: 0–7.
The mel parameter specifies the
maintenance entity group (MEG)
level (MEL) of the R-APS
messages.
Enabling propagation of Signal sf-trigger {east | west} mep <md-id> Before enabling SF propagation,
Failure (SF) condition from the <ma-id> <mep-id> verify that the relevant CFM
Ethernet OAM service layer no sf-trigger {east | west} parameters have been
configured.
Connecting previously defined sub-ring <sub-ring-number> Note: This is available for major
sub-ring to a major ring rings only. The sub-ring number
must be lower than the number
of the major ring it is assigned
to.
Defining ring timers timers [guard <guard-msec>] guard – While the guard timer is
[holdoff <holdoff-msec>] active, all received R-APS
messages are ignored by the
node; thus preventing the
receipt of outdated R-APS
messages. The range is 10 ms to
2 seconds in 10 ms steps.
holdoff – specifies the amount
of time an ERP-enabled node
waits from the point it
recognizes a local failure until it
reacts to the failure, i.e. it blocks
the port adjacent to the failed
link and send R-APS (SF) to the
RPL owner. The range is 0 to
10 seconds in 100 ms steps.
Defining data VLANs for user vlan <vlan-id> If using No Passthrough VLAN
traffic mode (the default), configure
both added/dropped and
passthrough VLANs as data
VLANs. If configuring
passthrough VLANs, configure
dropped VLANs only.
Note: In Passthrough VLAN
mode, if you configure a
passthrough VLAN as a data
VLAN, it will behave as an added/
dropped VLAN, and go through
the bridge, instead of bypassing
it.
To remove the VLAN assignment,
enter: no vlan <vlan-id>.
Before removing the VLAN
assignment, verify that all flows
using this VLAN have been
disabled.
Enabling passthrough VLANs passthrough-vlan [queue-block east Configure all VLANs, excluding
<qb-east> west <qb-west>] those defined as data VLANs, as
no passthrough-vlan passthrough VLANs.
East and west queue blocks can
optionally be configured.
Enter no passthrough-vlan (the
default) to use the regular mode,
where both added/dropped
VLANs at the local ring node and
passthrough VLANs must be
configured as data VLANs and
are each assigned a bridge
broadcast domain (device
resource).
Defining amount of time for RPL wait-to-restore <seconds> This timer specifies how long the
owner to wait before blocking RPL owner waits to verify that
RPL after failure recovery ring failures have been cleared,
before blocking the RPL. The
range is 1 min (60 sec) to 12
min (720 sec).
Examples
This section illustrates the following configuration for ETX203AX or ETX205A:
• VLAN-aware bridge, with bridge ports 1–4
• Ring:
East port – Bridge port 1, Ethernet port 1
vlan 4000
queue-block east 0/2 west 0/2
no shutdown
exit
timers holdoff 0
no shutdown
exit all
#*******Configure flows
flow data
classifier v100
ingress-port ethernet 3
egress-port bridge-port 1 3
reverse-direction block 0/1
no shutdown
exit
flow mng_in
classifier v4000
no policer
vlan-tag pop vlan
ingress-port bridge-port 1 4
egress-port svi 1
no shutdown
exit
flow mng_out
classifier all
no policer
vlan-tag push vlan 4000 p-bit fixed 0
ingress-port svi 1
egress-port bridge-port 1 4
no shutdown
exit all
#*******Configure router
interface
configure router 1
interface 1
address 172.18.141.11/24
bind svi 1
no shutdown
exit
static-route 0.0.0.0/0 address 172.18.141.1
exit all
save
West Port
----------------------------------------------
R-APS Message Rx Frames Tx Frames
SF 0 0
NR 0 0
NR,RB 0 0
Total Valid 0 0
Total Errors 0 0
Counter Description
R-APS SF Message Tx/Rx Total number of R-APS Signal Fail (SF) messages received or transmitted
by East/West port.
Received R-APS Signal Fail message indicates a failed port in the ring.
Transmitted R-APS Signal Fail message indicates a failed port in the
node.
R-APS NR Message Tx/Rx Total number of R-APS No Request (NR) messages received or
transmitted by East/West port.
Received R-APS No Request message indicates absence of failed ports in
the ring.
Transmitted R-APS No Request message indicates that the node fixed its
failed port.
R-APS NR, RB Tx/Rx Total number of R-APS No Request (NR), RPL Blocked (RB) messages
received or transmitted by East/West port.
Received R-APS No Request, RPL Blocked message indicates that RPL
port is blocked and all other not-failed blocked ports are unblocked in
the ring.
Transmitted from the RPL No Request, RPL Blocked message indicates
that RPL port is blocked.
Counter Description
Total Valid Rx/Tx Total number of valid R-APS messages received or transmitted by
East/West port
Total Errors Rx/Tx Total number of errored R-APS messages received or transmitted by
East/West port
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.1ag-D8
ITU-T Y.1731
Benefits
You can ensure that you are sending packets via links that have not failed.
Failures are propagated end-to-end via actions such as OAM CFM messages and
entity deactivation.
Functional Description
In the network-to-user or user-to-network direction, if a link fails for which fault
propagation is enabled, the corresponding port shuts down or OAM CFM message
indicating failure is sent, thus signaling the connected CPE to stop forwarding
frames through the link.
You can enable fault propagation to be triggered by failure detection on a
network/user interface or entity, which causes a user-configurable action (such
as deactivation or OAM CFM message indicating failure sent) to be performed on
a user/network interface or entity. You can enable fault propagation in the
network-to-user or user-to-network direction, for a pair of entities such as PCS
port, Ethernet ports, MEPs, queue block shaper, flow policer, card (VDSL), TWAMP
sessions, and ETPs.
You can define the following when you enable fault propagation for a pair of
entities:
• Trigger:
Failure detected on port or MEP:
LOS – link down detected
Failure detected on MEP:
OAM CFM AIS – alarm indication signal detected
OAM CFM LOC – loss of continuity detected
OAM CFM RDI – remote defect indication detected
OAM CFM Interface status TLV – remote port failure detected
OAM CFM E-LAN failure – LOC has occurred for all the remote MEPs of
the MEP.
Failure detected in VDSL card connection (relevant for ETX203AM with
VDSL card). This is detected via ping to a remote station using ICMP Echo.
75% lost pings in one minute (i.e. unavailable minute) indicates an ICMP
Echo fail event.
• Action to take when fault propagation is triggered:
Action performed on port:
Deactivate interface.
Action performed on MEP:
Send OAM CFM alarm indication signal to indicate failure.
Or
Send OAM CFM interface status TLV to indicate failure.
Action performed on queue block shaper:
Change shaper rate according to specified shaper-profile.
Action performed on flow policer:
Change policer rate according to specified policer-profile.
Action performed on VDSL card (relevant for ETX203AM with VDSL card):
Reset VDSL card.
• Wait-to-restore time – the time period before enabling the shut-down entity
or ceasing to send OAM CFM interface status once the failed entity has been
restored
• Holdoff timer – Action is triggered only if detected fault propagation persists
for the amount of time configured in the holdoff timer. Holdoff timer enables
timing the fault propagation action and synchronizing with other network
redundancy mechansims.
Factory Defaults
By default, no fault propagation is configured. When you configure fault
propagation for a particular entity pair, the default configuration is as follows:
• No trigger is defined for fault detection.
• No action is defined to be performed when a fault is detected.
• No holdoff is defined. Trigger activates fault propagation as soon as it is
detected.
• Wait-to-restore time = 0
LAG port Logical MAC fault-propagation port lag <port> to port logical-
mac <port>
LAG port PCS port fault-propagation port lag <port> to port pcs <port>
Logical MAC Logical MAC fault-propagation port logical-mac <port> to port logical-
mac <port>
Logical MAC PCS port fault-propagation port logical-mac <port> to port pcs
<port>
PCS port (only Ethernet port fault-propagation port pcs <port> to port
with SHSDL ethernet [<slot>/]<port>
module/port)
PCS port (only Logical MAC fault-propagation port pcs <port> to port logical-
with SHSDL mac <port>
module/port)
PCS port (only PCS port (only fault-propagation port pcs <port> to port pcs <port>
with SHSDL with SHSDL
module/port) module/port)
Specifying the action to take when action-on-group { interface-deactivation | The following actions are supported:
fault propagation is triggered oam-cfm-if-status-tlv | oam-cfm-ais| • interface-deactivation – Deactivate
shaper-swap <shaper-profile> | policer- interface.
swap <policer-profile> | reset }
• oam-cfm-if-status-tlv – Send OAM CFM
interface status TLV to indicate failure.
• oam-cfm-ais – Send OAM CFM alarm
indication signal to indicate failure.
• shaper-swap – Change shaper rate
according to shaper-profile.
• policer-swap – Change policer rate
according to policer-profile.
• reset – Reset the card. Relevant for
ETX203AM with VDSL card.
Typing no action-on-group removes the
action.
Notes:
• The interface-deactivation action is
allowed only if the to-entity is an
Ethernet port.
• The oam-cfm-if-status-tlv or
oam-cfm-ais action is allowed only if
the to-entity is a MEP.
• The shaper-swap action is relevant
only for the Queue Block Shaper
destination.
• The policer-swap action is relevant
only for the Flow Policer destination.
• shaper-swap and policer-swap
actions are enabled only if you have
activated the tmfp license for
enhanced fault propagation features.
Specifying the trigger(s) trigger { los | oam-cfm-loc | oam-cfm-rdi | The following triggers are supported:
oam-cfm-if-status-tlv | oam-cfm-ais | • los – link down
oam-cfm-all-rmep-fail | oam-cfm-cfs-clos |
• oam-cfm-loc – LOC detected
unavailable }
• oam-cfm-rdi – RDI detected
• oam-cfm-if-status-tlv
• oam-cfm-ais – AIS detected
• oam-cfm-all-rmep-fail – All remote MEPs
failed.
• oam-cfm-csf-clos
• unavailable – VDSL connection to remote
station is down.
Typing no before the command removes the
specified trigger.
Note: The los trigger is allowed only if the
from-entity is an Ethernet port or ETP. The
OAM CFM triggers are allowed only if the
from-entity is a MEP.
Examples
To enable fault propagation on ETX220A:
• From Ethernet port 1/3
• To MEP 3 in maintenance association 3 in maintenance domain 2 (this
example assumes the MEP has been created)
• Trigger: LOS
• Action: Send OAM CFM interface status TLV.
• Wait-to-restore time = 120 seconds
• Holdoff timer = 150 milliseconds
exit all
config fault
fault-propagation port ethernet 1/3 to mep 2 3 3
trigger los
action-on-group oam-cfm-if-stat
wait-to-restore 120
holdoff 150
exit all
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• Ethernet 10GbE ports are relevant only to ETX220A.
• <slot> is relevant to ETX203AM and ETX220A.
• LAG is supported with or without LACP (user-configurable), with 50ms LAG
switchover time.
• Protection LAG groups can have up to two members, and load-balancing LAG
goups can have up to four members.
• A protection LAG group can be made up of one or two adjacent network
ports or user ports; not both types.
• A LAG group can include ports of the same speed only (1G or 10G).
• ETX203AM, ETX203AX, or ETX205A – You can configure up to three LAG
groups that function in protection mode.
A LAG group can contain one or two adjacent network or user ports in one of
the following combinations: ports 1 and 2; 3 and 4; 5 and 6. Any other
combinations are not valid and result in a sanity error.
• ETX220A – You can configure up to 11 LAG groups that function in
protection or load-balancing mode.
A protection LAG group can contain one or two network or user ports of the
same speed (both 10GbE or both GbE), in one of the following combinations:
1/1 and 1/2, 1/3 and 1/4, …, 1/9 and 1/10; 2/1 and 2/2,...,2/9 and 2/10; 3/1
and 3/2; 4/1 and 4/2. Any other combinations are not valid and result in a
sanity error.
A load-balancing LAG group can be made up of ports from the same slot only.
Exception: In case of the 4x10G + 10x1G ordering option, members in a load-
balancing LAG group can include ports from one of the following groups: (A
single LAG group cannot contain some ports from one group and other ports
from the other group.)
1/1 – 1/5
1/6 – 1/10
Standards
IEEE 802.3ad
Benefits
ETX-2 can continue to route traffic even if one of the links fails.
Functional Description
All LAG ports receive traffic at the same time and one port transmits. The LAG
members can be network or user interfaces, and must be connected to the same
switch. If LACP is activated, then LACP control frames are periodically transmitted
in order to locate failures as they occur.
Note LAG on user ports is not supported when the user ports are connected to bridge
ports (E-LAN).
You can configure an anchor port for a LAG group, which you can use to
configure flows to/from the LAG group. The default anchor port is the first port
bound to the LAG group. The MAC address of the anchor port is used for logical
port level entities (router interface over the LAG, OAM MEP over the LAG, etc.).
Protection
If the transmitting port fails, ETX-2 switches to a standby link. The equipment
connected to the Ethernet ports must use compatible switching criteria for
redundancy to be available:
• For networks using Layer 2 switching – The criterion is signal loss.
• For networks using Layer-3 routing – The router must support IEEE 802.3ad
or other link aggregation protocol that views the aggregated link as a single
logical interface.
Using link aggregation inherently provides redundancy, because if a port fails,
another port can continue transferring traffic. Failure of a link is detected by
sensing the loss of valid signals, or receiving a failure report via Link Aggregation
Control Protocol (LACP) if applicable, in which case all traffic is sent through the
other link.
Load Balancing
In a load balancing LAG group, traffic is distributed to the different ports
according to the configured distribution method. You can configure the following
distribution methods:
• MAC source address
• MAC destination address
• MAC source address and MAC destination address
• IP source address
• IP destination address
• IP source address and IP destination address
• MAC source/destination address and IP source/destination address
For distribution method based on IP address, all non IP packets are forwarded on
the same port. For distribution method based on MAC source/destination address
+ IP source/destination address, fallback for non IP packets is based on MAC
address info.
Note All load balancing LAG groups in the device must use the same distribution
method.
The load balancing and distribution is performed after the queuing mechanism.
The port policer is supported at the port level, not on LAG aggregate ingress
traffic. Aggregate LAG egress traffic can be shaped at the LAG level up to a
maximum of 10 Gbps (level 1 shaper supported for rates up to 10 Gbps).
You can configure the minimum number of active ports in the LAG for it to be
considered operationally active. A port is considered as active if it has no physical
layer failure and LACP is synched (if LACP is enabled).
If there are flows over the anchor port when the LAG group is created and
enabled, the flows are inherited by the LAG group. The LAG group can be
administratively enabled if flows exist over the anchor port, but not if flows exist
over a non-anchor port. If the LAG group is deleted or administratively disabled,
the flows and traffic remain on the anchor port; they are not distributed to other
ports.
Factory Defaults
By default, no LAG groups are configured. When a LAG group is created, it has
the following default configuration.
dhcp-trust no dhcp-trust
Configuring LAG
This section explains how to define a link aggregation group (LAG) and enable link
aggregation control protocol (LACP).
Notes • In order to enable LACP for the LAG, the ports bound to the LAG must be
associated with an L2CP profile that specifies peer action for MAC 0x02.
• In a load-balancing LAG, all non-anchor ports bound to the LAG must not be
associated with a queue group profile (use command no queue-group).
Assigning an admin key to the admin-key {giga-ethernet | You must define admin key
LAG to indicate the port speed fast-ethernet | ten-giga-ethernet} before binding ports to the
LAG.
Adding a port to the LAG bind ethernet [<slot>/]<port-num> Entering no bind removes a link
bind logical-mac <port-num> from the LAG.
Enabling LACP and setting lacp [tx-activity {active | passive}] tx-activity – Defines operation
LACP parameters [tx-speed { slow | fast }] [sys-priority mode:
<sys-priority>] • active – LAG interface
periodically transmits LACP
frames (LACPDUs) to all
links with LACP enabled.
• passive – LAG interface
does not initiate the LACP
exchange, but replies to
received LACPDUs.
tx-speed – Defines time to wait
before sending LACP frames:
• fast – three seconds
• slow – 90 seconds
sys-priority – determines
aggregation precedence. If
there are two partner devices
competing for the same LAG,
LACP compares the priorities
for each grouping of ports. The
LAG with the lower priority is
given precedence.
Possible values: 0–65535
Defaults:
• If you type lacp without
specifying tx-activity, it is
set to active.
• If you type lacp without
specifying tx-speed, it is set
to fast.
Typing no lacp disables LACP
protocol.
Examples
Protection LAG
To define LAG for ETX203AX or ETX205A:
• L2CP profile mac2peer, with mac0x02 set to peer action
• LAG members – Ethernet ports 1 and 2
• LACP operation mode – active
• Distribution method – one to one
• System priority –32768
#****************Create L2CP profile mac2peer
exit all
configure port l2cp-profile mac2peer
mac 0x02 peer
exit
#****************Configure LAG 1
lag 1
bind ethernet 1
bind ethernet 2
lacp tx-activity active tx-speed slow sys-priority 32768
distribution-method one-to-one
no shutdown
exit all
ethernet 1/4
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 1/5
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 1/6
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 1/7
l2cp profile mac2peer
no shutdown
exit
ethernet 1/8
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 1/9
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 1/10
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/1
l2cp profile mac2peer
no shutdown
exit
ethernet 2/2
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/3
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/4
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/5
l2cp profile mac2peer
no shutdown
exit
ethernet 2/6
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/7
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/8
l2cp profile mac2peer
no queue-group
no shutdown
exit
ethernet 2/9
l2cp profile mac2peer
no shutdown
exit
ethernet 2/10
l2cp profile mac2peer
no shutdown
exit
ethernet 4/1
l2cp profile mac2peer
no shutdown
exit
ethernet 4/2
l2cp profile mac2peer
no queue-group
no shutdown
exit
#***********Configure LAGs
lag 1
mode load-balance
distribution-method dest-mac
admin-key giga-ethernet
bind ethernet 1/3
bind ethernet 1/4
bind ethernet 1/5
bind ethernet 1/6
lacp tx-activity active tx-speed fast
anchor-port ethernet 1/3
no shutdown
exit
lag 2
mode load-balance
distribution-method dest-mac
admin-key giga-ethernet
bind ethernet 1/7
bind ethernet 1/8
bind ethernet 1/9
bind ethernet 1/10
lacp tx-activity active tx-speed fast
anchor-port ethernet 1/7
no shutdown
exit
lag 3
mode load-balance
distribution-method dest-mac
admin-key giga-ethernet
bind ethernet 2/1
bind ethernet 2/2
bind ethernet 2/3
bind ethernet 2/4
lacp tx-activity active tx-speed fast
anchor-port ethernet 2/1
no shutdown
exit
lag 4
mode load-balance
distribution-method dest-mac
admin-key giga-ethernet
bind ethernet 2/5
bind ethernet 2/6
bind ethernet 2/7
bind ethernet 2/8
lacp tx-activity active tx-speed fast
anchor-port ethernet 2/5
no shutdown
exit
lag 5
mode load-balance
distribution-method dest-mac
admin-key ten-giga-ethernet
bind ethernet 4/1
bind ethernet 4/2
lacp tx-activity active tx-speed fast
anchor-port ethernet 4/1
no shutdown
exit
flow lag1_3_to_1
classifier vlan100
no policer
ingress-port ethernet 1/3
egress-port ethernet 1/1 queue 0 block 0/1
no shutdown
exit
flow lag2_7_to_1
classifier vlan200
no policer
ingress-port ethernet 1/7
egress-port ethernet 1/1 queue 0 block 0/1
no shutdown
exit
flow lag3_3_to_21
classifier vlan300
no policer
ingress-port ethernet 2/1
egress-port ethernet 1/1 queue 0 block 0/1
no shutdown
exit
flow lag4_3_to_25
classifier vlan400
no policer
ingress-port ethernet 2/5
egress-port ethernet 1/1 queue 0 block 0/1
no shutdown
exit
flow lag4_3_to_41
classifier vlan500
no policer
ingress-port ethernet 4/1
egress-port ethernet 1/1 queue 0 block 0/1
no shutdown
exit all
save
Links
---------------------------------------------------------------
Port Admin Oper LACP Redundancy
---------------------------------------------------------------
1/3 Up Up Sync Active
1/4 Up Up Sync Active
1/5 Up Up Sync Active
1/6 Up Up Sync Active
(%) (%)
---------------------------------------------------------------
1/3 25.00 25.00
1/4 25.00 25.00
1/5 25.00 25.00
1/6 25.00 25.00
Group
---------------------------------------------------------------
Name : LAG 1
Group
---------------------------------------------------------------
Administrative Status : Up
Operation Status : Up
Mode : Redundancy
Speed : 1Gbps
MAC Address : 00-20-D2-50-C0-D3
Links
---------------------------------------------------------------
Port Admin Oper LACP Redundancy
---------------------------------------------------------------
1 Up Up Sync Active
2 Up Up Sync Active
Parameter Description
Group
Parameter Description
Links
Examples
To display the status of a protection LAG with all links down:
ETX-2# configure port lag 1
ETX-2>config>port>lag(1)# show status
Group
---------------------------------------------------------------
Name : LAG 1
Group
---------------------------------------------------------------
Administrative Status : Up
Operational Status : LLD (all links down)
Mode : Redundancy
Speed : Not Applicable
MAC Address : 00-20-D2-50-C0-D3
Links
---------------------------------------------------------------
Port Admin Oper LACP Redundancy
---------------------------------------------------------------
1 Up Down Not Sync Active
2 Up Down Not Sync Active
To display the status of a load balancing LAG with minimum links down:
ETX-2# configure port lag 1
ETX-2>config>port>lag(1)# show status
Group
---------------------------------------------------------------
Administrative Status : Up
Operational Status : LLD (minimum links down)
Mode : Load Balance
Speed : Not Applicable
MAC Address : 00-20-D2-EE-41-C1
Links
---------------------------------------------------------------
Port Admin Oper LACP Redundancy
---------------------------------------------------------------
1/1 Up Down Not Sync Active
1/2 Up Down Not Sync Active
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• Ethernet 10GbE ports are relevant only to ETX220A.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.3ad
Benefits
ETX-2 can continue to route traffic even if one of the links fails.
Functional Description
Link protection offers an alternative to link aggregation, if protection without
LACP is acceptable. You can configure parameters such as revertive/non-revertive
mode, the restoration time in revertive mode, forcing active link, etc., however
the switchover time to the standby link is longer than for LAG.
In 1:1 bidirectional mode mode, the following topologies can be used:
• Connection of both ports to the same switch/router
• Connection of the ports to different switch/routers. The main advantage of
this topology is its higher availability, because each port can be routed along
a different path through the network. This topology is also referred to as
dual homing.
With 1:1 bidirectional redundancy mode, at any time only one of the ports is
actively carrying traffic, and the other port serves as the backup port. A RAD
proprietary redundancy algorithm, based on loss of Ethernet signal, is used to
detect line failure. The protection switching (flipping) time is less than 1 second.
It also depends on the network “relearning“ time or aging.
The recovery mode after protection switching can be selected in accordance with
the application requirements:
• Non-revertive mode – ETX-2 does not automatically flip back after the failed
port returns to normal operation, but only when the currently used port fails,
or after a manual flip command.
• Revertive mode – ETX-2 flips back to the original port when it returns to
normal operation. Flipping back can be delayed by specifying a restoration
time, during which alarms are ignored. As a result, ETX-2 starts evaluating the
criteria for protection switching (flipping) only after the restoration time
expires, thereby ensuring that another flip cannot occur before the specified
time expires.
Factory Defaults
By default, bidirectional redundancy is not enabled.
To define the period of time that the failed link stops transmitting to report the
failure:
• At the Ethernet Group context (config>protection>eth-group(<group id>)),
enter
tx-down-duration-upon-flip <seconds>
The secondary port resumes transmitting after the specified ‘reporting’ time.
You may specify a time in the range between 0 and 30 seconds. This function
is useful if there is no autonegotiation between the link end points.
Example
To define link protection for ETX203AM:
• Ethernet group 1
• Protection port – Ethernet port 1/1
• Working port – Ethernet port 1/2
• Operation mode –One-to-one
exit all
configure protection ethernet-group 1
bind eth primary 1/1 secondary 1/2
oper-mode 1-to-1
exit all
To display configuration information for the link protection:
ETX-2#configure protection ethernet-group 1
ETX-2>config>protection>eth-group(1)# info detail
bind ethernet primary 1/1 secondary 1/2
oper-mode 1-to-1
revertive
wait-to-restore 0
tx-down-duration-upon-flip 0
no shutdown
8.1 Bridge
The ETX-2 bridge is a Layer-2 forwarding entity that can be VLAN-aware or
VLAN-unaware.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.1D
IEEE 802.1Q
Benefits
The bridge delivers E-LAN and E-Tree services.
Functional Description
The bridge operates in VLAN-aware or VLAN-unaware mode.
When the bridge is working in VLAN-aware mode:
• Bidirectional flows are supported.
• Each VLAN can work in E-LAN or E-Tree mode.
When the bridge is working in VLAN-unaware mode:
• Bidirectional flows are not supported.
• Only one egress flow per bridge port can be configured.
• The bridge can work in E-LAN or E-Tree mode.
Traffic through the bridge is configured via flows between non-bridge ports (e.g.
Ethernet, ETP, logical MAC, PCS, SVI) and bridge ports, allowing editing action at
the bridge ports.
Different flows from the same port can be mapped to different bridge ports (see
Figure 8-1). However, different flows from one bridge port cannot be mapped to
different ports (see Figure 8-2).
Figure 8-1. Flows Mapped from Same Port to Different Bridge Ports – Allowed
Figure 8-2. Flows Mapped from Same Bridge Port to Different Ports –Not Allowed
Admission to Bridge
In order for a frame to be admitted to the bridge, its classification must match
the flow classification configured for the bridge port.
In VLAN-aware mode, VLAN membership is read-only and automatically learned
from the VLAN classification used in bridge port flows. Additionally, flows with
untagged classification must have a push editing action.
In VLAN-unaware mode, any packet may be admitted according to the configured
flow classifications.
VLAN Y..Z Push VLAN X, swap VLAN Z Not allowed Not allowed
p-bit fixed/copy/profile
Note It is recommended to manage ETX-2 via the bridge only if the bridge is
VLAN-aware.
Link A Link A
Bridge 3 Bridge 3
Link Cost
Each link in the network is allocated a certain cost. Usually, higher-bandwidth
links that are adjacent to the root bridge are assigned a lower cost. Lower-
bandwidth links that are multiple hops away from the root bridge are assigned a
higher cost. Once link costs are estimated, STP determines the lowest cost
connections from each bridge to the root bridge to determine the lowest-cost
path. It also blocks all the other higher cost links to prevent loops in the network.
Bridge 1 Bridge 2
Bridge 3
Physical Topology
Root Root
Root
RSTP and MSTP uses OOB MNG MAC as the Bridge Identifier.
Note Before using RSTP or MSTP, you are required to configure trapping of
01-80-C2-00-00-00 using an L2CP profile with a peer action for
01-80-C2-00-00-00.
ETX-2 supports RSTP and MSTP per 802.1Q over a bridge with the following port
types:
• User
• Network
• PCS
• Logical MAC
Note ETX-2 does not support RSTP and MSTP over a bridge with the following port
types:
• OOB
• LAG group
• Ports configured with ETH protection
• Ports configured as G.8032 ring nodes
• Ports not connected to a physical port (such as a router interface or MEF 8
PW)
STP interoperability is supported per bridge port; when the RSTP/MSTP bridge
identifies STP messages on a port, it reverts to STP mode on that port.
Factory Defaults
By default, the bridge is not created in ETX-2. When the bridge is created, its
default configuration is VLAN-aware, filtering enabled, with no bridge ports or
VLANs. When VLANs are created, the default configuration is E-LAN mode.
ETX-2>config# bridge 1
ETX-2>config>bridge(1)$ info detail
name "BRIDGE 1"
vlan-aware
filtering
aging-time 300
echo "Spanning Tree Configuration"
# Spanning Tree Configuration
spanning-tree
mode rstp
max-age 20
forward-time 15
hello-time 2
priority 32768
tx-hold-count 6
exit
echo "MLD Snooping"
# MLD Snooping
mld-snooping
shutdown
host-aging-interval 260
router-aging-interval 260
exit
ETX-2>config>bridge(1)$ vlan 333
ETX-2>config>bridge(1)>vlan(333)$ info detail
maximum-mac-addresses 0
mode e-lan
The default STP parameters are as follows:
admin-edge Disable
auto-edge Enable
forward-time 15 sec
hello-time 2 sec
max-age 20 sec
max-hops 20
mcheck Disable
mode rstp
restricted-role Disable
restricted-tcn Disable
revision 0
tx-hold-count 6
Note In Bridge configuration, different bridge ports that egress to the same ETH port
with different VLAN editing cannot share the same queue block.
Defining aging time for MAC aging-time <seconds> Possible values: 60–3000
table entries (seconds)
Displaying MAC address table show mac-address-table static See Viewing the MAC Address
(static addresses, dynamic show mac-address-table dynamic Table.
addresses, or all addresses)
show mac-address-table all
See Displaying MAC Table.
Searching MAC address table for show mac-table [vlan <vlan>] Vlan – VLAN to search for
specific MAC address [mac-address <mac-address>] mac-address – MAC address to
search for
Configuring static MAC address [no] static-mac <vlan-id> Note: Before creating the static
<mac-address> <bridge-port> MAC, you must create a flow
with the bridge port, and VLAN
(if applicable).
Defining VLANs (see below) [no] vlan <vlan-id> Possible values: 1–4094
To delete a VLAN, enter
no vlan <vlan-id>
Note: This command is
available only if the bridge is
VLAN-aware.
Assigning a name to the bridge name <port-name> To delete the bridge port
port name, enter no name.
Configuring VLAN
The following commands are available in the vlan level, at the
config>bridge(1)>vlan(<vlan-id>)# prompt.
Configuring VLAN to work in mode {e-tree | e-lan} If you change to E-Tree, you
E-Tree or E-LAN mode need to define a bridge port as
root.
Configuring bridge port as root root <bridge-port number> Possible values: 1–16.
port in E-Tree mode no root < bridge-port_number> no root defines a bridge port
as a leaf in E-Tree mode.
Notes:
• This command is available
only if the VLAN mode is
E-Tree.
• Supports one root per VLAN
• ETX220A: Supports more
than one root per VLAN; the
number of roots supported
is equivalent to the number
of bridge ports.
• ETX203AX, ETX203AM,
and ETX205A: Support one
root per VLAN. The
following sanity error
appears if another root port
has already been configured
under the same VPN: Root
port is already allocated.
Configuring RSTP/MSTP
RSTP and MSTP are configured at the bridge and bridge-port levels.
Configuring the amount of time forward-time <4–30> sec When configuring forwarding
a port remains in the listening time, follow this rule:
and learning states before 2 × (forwarding time - 1) =>
entering the forwarding state maximum aging time
Defining how often ETX-2 hello-time <1–10> sec Limitation: Define hello-time
broadcasts hello messages to must be configured so that
other devices to indicate that 2 × (hello-time - 1) <= max-
the bridge is alive age.
Specifying spanning tree priority priority <0, 4096, 8192, 12288, This is the value of the first
of the bridge 16384, 20480, 24576, 28672, 32768, two octets of the bridge ID. It
36864, 40960, 45056, 49152, 53248, is used to make the bridge
57344, 61440> more (or less) likely to be
chosen as the root bridge.
The lower the number, the
more likely the bridge will be
chosen as the root bridge.
Mapping VLANs to MST instance vlan <1–4094> Map list of VLANS to MST
no vlan instance.
no vlan (vlan_lsit) removes
VLAN mapping from the MSTI.
This command can be repeated
to configure additional VLAN
mappings.
For two or more bridges to be
in the same MST region, they
must have the same VLAN-to-
MSTI mapping.
Defining port path cost cost <0–200000000> If a loop occurs, the path cost
is used to select an interface
to place into the forwarding
state.
A lower path cost represents
higher speed links. It is
recommended to use the
default cost value (0) to let
ETX-2 to compute the best
possible cost according to the
link bandwidth (Table 8-44).
Defining bridge port priority port-priority <0, 16, 32, 48, 64, 80, This is the value of the first
96, 112, 128, 144, 160, 176, 192, octet of the bridge port ID. If a
208, 224, 240> loop occurs, the MSTP uses the
port priority, when selecting an
interface to put into the
forwarding state.
The lower the number, the
higher the port priority (the
lowest numbered port is
selected if a tie breaker is
needed).
Displaying bridge port spanning show status See Displaying Spanning Tree
tree status Status below.
1 Gbps 20 000
10 Gbps 2 000
1 Tbps 20
10 Tbps 2
Specifying MSTI port priority port-priority <0, 16, 32, 48, 64, 80,
96, 112, 128, 144, 160, 176, 192,
208, 224, 240>
Examples
VLAN-Aware Bridge
This section illustrates the following configuration for ETX203AM:
• VLAN-aware bridge, with bridge ports 1–4
• VLAN 51 used for management, in E-LAN mode
• VLAN 100 used for traffic, in E-Tree mode, with root bridge port 2
• VLAN 200 used for traffic, in E-LAN mode
• Management flows (unidirectional) between SVI 1 and bridge port 1
• Traffic flows (bidirectional) between:
Ethernet port 1/1 and bridge port 2, with classification VLAN 100 and
VLAN 200
Ethernet port 0/3 and bridge port 3, with classification VLAN 100
Ethernet port 0/4 and bridge port 4, with classification VLAN 100
#*******Configure SVI
configure port svi 1
no shutdown
exit all
#*******Configure bridge
configure bridge 1
vlan-aware
#*******Configure VLANs
vlan 51
exit
vlan 100
mode e-tree
root 2
exit
vlan 200
exit all
flow mng_out
classifier unt
ingress-port svi 1
egress-port bridge-port 1 1
vlan-tag push vlan 51 p-bit fixed 0
no shutdown
exit
flow 1toBP2_200
classifier 200
ingress-port ethernet 1/1
egress-port bridge-port 1 2
reverse-direction block 0/1
no shutdown
exit
flow 3toBP3_100
classifier 100
ingress-port ethernet 0/3
egress-port bridge-port 1 3
reverse-direction block 0/1
no shutdown
exit
flow 4toBP4_100
classifier 100
ingress-port ethernet 0/4
egress-port bridge-port 1 4
reverse-direction block 0/1
no shutdown
exit all
VLAN ID : 51
VLAN ID : 100
VLAN ID : 200
Tagged Ports : 2
Untagged Ports : 0
VLAN-Unaware Bridge
This section illustrates the following configuration for ETX203AX or ETX205A:
• VLAN-unaware bridge, with bridge ports 1–4
• Traffic flows (unidirectional), with classification to match all, between:
Ethernet port 1 and bridge port 2
Ethernet port 3 and bridge port 3
Ethernet port 4 and bridge port 4
#*******Configure bridge
configure bridge 1
no vlan-aware
no shutdown
exit
port 4
no shutdown
exit all
flow BP2to1
class all
ingress-port bridge-port 1 2
egress-port ethernet 1 block 0/1
no policer
no shutdown
exit
flow 3toBP3
class all
ingress-port ethernet 3
egress-port bridge-port 1 3
no shutdown
exit
flow BP3to3
class all
ingress-port bridge-port 1 3
egress-port ethernet 3 block 0/1
no policer
no shutdown
exit
flow 4toBP4
class all
ingress-port ethernet 4
egress-port bridge-port 1 4
no shutdown
exit
flow BP4to4
class all
ingress-port bridge-port 1 4
egress-port ethernet 4 block 0/1
no policer
no shutdown
exit
Note ETX-2 displays only the first 1000 entries. To view the entire MAC table,
download it to your PC, using SFTP. Refer to File Operations in the Administration
chapter.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module and
ETX203AX with embedded SHDSL ports.
• Pseudowire (PW) is relevant to ETX205A with built-in E1/T1 ports.
• Multi-CoS flows per MEF 10.3 are relevant only for ETX220A.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.1ad, IEEE 802.1Q
Benefits
User traffic can be classified into different Ethernet flows (EVC.CoS) to provide
services in a flexible manner.
Functional Description
Ethernet flows are unidirectional, or in the case of bridge flows, can also be
bidirectional. For unidirectional flows, you have to define two flows between the
two ports, one for each direction. For bidirectional flows, you only need to define
one flow from a port to a bridge port, and specify the reverse-direction
command.
Note • In the case of bridge flows, you can configure two flows between a physical
port and a bridge port (one flow in each direction) or one bidirectional flow
(reverse-flow)).
• RAD recommends using bidirectional flows for bridge flows, as all testing is
performed with bidirectional flows – a newer and more advanced method
(than unidirectional flows).
• When configuring two unidirectional flows, in the flow from the egress bridge
port to the ingress physical port, the physical port automatically takes the
queue from the CoS configured in the flow. Therefore, in the configuration of
the flow in the other direction, from the ingress bridge port to the egress
physical port, you cannot configure a queue in the egress physical port. Doing
so results in the following error: A flow from bridge port must not use a
Queue Mapping or a Queue Mapping profile.
Flow Classification
The ingress traffic is first classified into flows according to classification profiles.
The classification is per port and is applied to the ingress port of the flow.
Packets can be classified by means of their VLAN IDs and other criteria, fully
specified in Configuring a Classifier Profile.
In the following descriptions, VLAN refers to the service provider (outer) VLAN,
sometimes referred to as SP-VLAN, while inner VLAN refers to the Customer
Entity VLAN, sometimes referred to as CE-VLAN or C-VLAN.
Flow classifications that apply to the same port are allowed in the combinations
shown in Table 8-2. The priority shown is used to determine which classification
is used if incoming packets for the port fit the criteria of more than one
classification. Priority 4 is the lowest, priority 1 is the highest. NNI indicates
ingress network port, UNI indicates ingress user port.
VLAN + inner VLAN VLAN Single value for 30 (for inner 3 Both
VLAN + VLAN priority VLAN and range range)
VLAN + VLAN priority + inner VLAN for inner VLAN
VLAN + source MAC address
VLAN + destination MAC address
VLAN + source IP address
VLAN + destination IP address
VLAN + inner VLAN VLAN Single value for 30 (for inner 3 Both
+ VLAN priority VLAN + inner VLAN VLAN and range range)
VLAN + source MAC address for inner VLAN
VLAN + destination MAC address
VLAN + source IP address
VLAN + destination IP address
Note 1 If you combine the classifications VLAN and VLAN + VLAN priority, the VLANs must
be different.
For example, the following combination is not allowed:
• VLAN 100
• VLAN 100 + p-bit 5
The following combination is allowed:
• VLAN 100
• VLAN 200 + p-bit 5
You can achieve the combination VLAN 100 and VLAN 100 + p-bit 5 via the
following:
• VLAN 100 + p-bit 0–4, 6–7
• VLAN 100 + p-bit 5
You cannot create flows with VLAN classification overlap.
For example, the following combination is not allowed:
• VLAN 100..300 + p-bit 3
• VLAN 200 + p-bit 4
A sanity check detects that VLAN 200 is in the range 100-300 (i.e. VLAN overlap),
and does not allow this configuration.
Note 2 If you apply two classification profiles with IP address ranges to a port, the
profiles must have the same mask.
For example:
The following is valid (mask1 equal to mask2):
Classification #1: 10.10.0.0 –10.10.0.255 -> mask1 = 255.255.255.0
Classification #2: 20.20.0.0 –20.20.0.255 -> mask2 = 255.255.255.0
The following is invalid (mask1 not equal to mask2):
Classification #1: 10.10.0.0–0.10.0.255 -> mask1 = 255.255.255.0
Classification #2: 20.20.0.0 –20.20.255.255 -> mask2 = 255.255.0.0
Classification Keys
The following classification keys are supported per port:
• Legacy
• IPv4DA+DSCP
• IPv4SA+DSCP
• VLAN
• VLAN Inner VLAN
Table 8-3 shows for the IPv4DA+DSCP and IPv4SA+DSCP classification keys, the
queue mapping method and the flows that can be configured, the range per flow,
and the flow priority.
Table 8-4 and Table 8-5 show for the VLAN and VLAN Inner VLAN classification
keys, respectively, the queue mapping method and the parameters that can be
configured in a flow, the range per classification rule, maximum number of rules
per flow, and the internal flow priority. See Table 8-2 for the combinations of
flow classifications that are allowed per port.
Table 8-3. Queue Mapping Method and Configurable Flows – IPv4DA+DSCP and IPv4SA+DSCP
Classification Keys
Key and Flow Range (per defined flow) Flow Priority Comments
Queue/Priority
Mapping Method
None IP 1
None IP 1
Table 8-4. Queue Mapping Method and Configurable Flow Classification Parameters – VLAN
Classification Key
5. Flow Untagged NA 1 3
6. DSCP Unclassified NA 1 2
7. P-bit
VLAN VLAN range [0..4094] 30 2
VLAN+P-bit VLAN range [0..4094]; 30 2
P-bit range [0..7]
VLAN+DSCP VLAN range [0..4094]; 30 2A
DSCP range [0..63]
VLAN+IP-P VLAN range [0..4094]; 30 2A
IP-P range [0..7]
VLAN+MAC SA Single VLAN value 1 1
SA MAC range
Table 8-5. Queue Mapping Method and Configurable Flow Classification Parameters – VLAN Inner
VLAN Classification Key
8. Flow Untagged NA 1 3
9. DSCP Unclassified NA 1 2
10. P-bit
VLAN, Inner VLAN Single Outer value 30 2
Inner VLAN range
[0..4094]
VLAN, Inner VLAN, p-bit Single Outer value 30 2
Inner VLAN range
[0..4094]
P-bit range [0..7]
VLAN, Inner VLAN, DSCP Single Outer value 30 2
Inner VLAN range
[0..4094]
DSCP range [0..63]
VLAN, Inner VLAN, non IP VLAN range [0..4094] 30 2
VLAN (one tag level only) VLAN range [0..4094] 30 2
MAC SA SA MAC range 1 1
VLAN Actions
You can perform marking and tagging actions on the outer and inner VLAN such
as adding, replacing, or removing, as well as marking with p-bit. Only certain
combinations of actions on the outer and inner VLAN are allowed. If no action is
performed for the outer VLAN, then for the inner VLAN there must be no action
performed. Table 8-6 shows valid VLAN action combinations on ingress frame
tags and the resulting egress frame tags and p-bits, according to whether the
ingress frame is untagged, contains one VLAN, or is double-tagged. Any
combination not shown in the table is not supported.
In the ETX-2 bridge, if one of the bridge ports is configured with VLAN
classification, and another bridge port with VLAN + p-bit classification, in order to
mark the p-bit of the inner VLAN, you must mark the required p-bit at the VLAN +
p-bit bridge port.
Action on: Egress VLAN(s) and P-bit(s) for Ingress Frame Types:
Outer VLAN Inner VLAN Untagged One VLAN (X) Double VLANs
(X and Y)
Action on: Egress VLAN(s) and P-bit(s) for Ingress Frame Types:
Outer VLAN Inner VLAN Untagged One VLAN (X) Double VLANs
(X and Y)
Push VLAN A. Push VLAN B, A + p-bit 7 A + p-bit according A + p-bit according
mark with profile E mark with p-bit D according to E, to E, to E,
B + p-bit D B + p-bit D, B + p-bit D,
X X,
Y
Push VLAN A. Push VLAN B, A + p-bit C, A + p-bit C, A + p-bit C,
mark with p-bit C mark with p-bit D B + p-bit D B + p-bit D, B + p-bit D,
X X,
Y
Push VLAN A. Push VLAN B. A + p-bit 7 A + p-bit according A + p-bit according
mark with profile E mark with profile F according to E, to E, to E,
See Note 1 B + p-bit 7 B + p-bit according B + p-bit according
according to F to F, to F,
X X,
Y
Push VLAN A. Push VLAN B. A + p-bit C, A + p-bit C, A + p-bit C,
mark with p-bit C mark with profile F B + p-bit 7 B + p-bit according B + p-bit according
according to F to F, to F,
X X,
Y
Mark with VLAN A None Untagged A A, Y
Mark with VLAN A Mark with p-bit D Not applicable – Not applicable – A,
unsupported unsupported Y + p-bit D
Mark with p-bit C Mark with p-bit D Not applicable – Not applicable – X+ p-bit C,
unsupported unsupported Y + p-bit D
Mark with VLAN A Mark with p-bit D Not applicable – Not applicable – A + p-bit,
+ p-bit unsupported unsupported Y + p-bit D
Mark with VLAN A Mark with VLAN B Not applicable – Not applicable – A + p-bit according
+ profile E +p-bit D unsupported unsupported to E,
B +p-bit D
Unidirectional Hubs
You can configure a unidirectional hub (UDH) by defining a group of flows with
the same ingress port, classifier profile, and policer aggregate, and different
egress ports. The egress ports must be physical Ethernet ports, not virtual ports
such as SVI, ETP, etc. Only one queue-mapping profile and one marking profile
can be used for the flows in a UDH group; however, VLAN tag editing can be
different in the different flows.
In unidirectional hub mode, the rate of each flow that is part of the group cannot
exceed the rate of the queue with the lowest rate; therefore, it is not possible to
use different rates for different p-bits.
Multi-CoS Flows
A multi-CoS flow per MEF 10.3 contains multiple classes of service. It can be
assigned an envelope policer (see Envelope Bandwidth Profiles) to enable sharing
bandwidth between the CoSs, where each CoS is assigned a rank. Alternatively, if
bandwidth policing is not required but per-CoS counters are required.you can
specify that a multi-CoS flow has per-CoS counters.
Factory Defaults
By default, no flows are configured.
Note When a classification profile is assigned to a flow, each match in the profile is
allocated one of the available internal classification match entries, according to
the flow ingress port.
For example, if a classification profile is defined with matches to two different
VLANS, then if the profile is assigned to two flows that use different ingress
ports, the result is that four internal classification match entries are allocated. If
the profile is assigned to two flows that use the same ingress port, the result is
that two internal classification match entries are used.
Note Using the matching type my-mac or my-ip is equivalent to using the matching
type dest-mac <device-MAC-address> or dest-ip <host-IP-address>.
4. When you have completed specifying the criteria, enter exit to exit the
classifier profile context.
Configuring Flows
To configure flows:
1. Navigate to config>flows.
2. Enter:
flow <flow-name>
If the flow already exists, the config>flows>flow(<flow-name>)# prompt
is displayed, otherwise the flow is created and the
config>flows>flow(<flow-name>)$ prompt is displayed.
Associating the flow with a classifier <classifier-profile-name> If the flow is multi-CoS, the
classifier profile classification must be one of the
following:
• VLAN, VLAN + inner VLAN, VLAN
range
• Match all
• Untagged
Specifying the ingress packet ingress-color green You can set the packet color to
color ingress-color yellow green or yellow, or use a color
ingress-color profile <color-mapping-profile-name> mapping profile (see Color Mapping
Profiles).
Specifying the ingress port ingress-port ethernet [<slot>/]<port> Note: If working with PW, packets
ingress-port bridge-port <bridge-number> forwarded to the SVI must be
<bridge-port-number> untagged, and pop any VLAN.
ingress-port etp <etp-name> {subscriber | transport}
<port-number>
ingress-port logical-mac <port>
ingress-port pcs <port>
ingress-port svi <port>
Specifying the egress port, and egress-port ethernet [<slot>/]<port> [queue If a queue mapping profile is used,
defining queue <queue-id> block <level-id/queue-id>] it must be compatible with the
egress-port ethernet [<slot>/]<port> classification criteria of the flow,
[queue-map-profile <queue-map-profile-name> e.g. if the classification is according
block <level-id/queue-id>] to DSCP then the queue mapping
should not be according to p-bit.
egress-port ethernet <port> [block <level-id/queue-id>]
egress-port bridge-port <bridge-number> For multi-CoS flows, the predefined
<bridge-port-number> [cos <cos-id>] q-map-for-cos queue mapping
profile should be used.
egress-port bridge-port <bridge-number>
<bridge-port-number> [cos-map-profile Notes:
<cos-map-profile-name>] • In the case that you choose to
egress-port etp <etp-name> {subscriber | transport} configure two flows between a
<port-number> [cos <cos-id>] bridge port and physical port (as
opposed to one bidirectional
egress-port etp <etp-name> {subscriber | transport}
flow), you cannot configure a
<port-number> [cos-map-profile
queue number in the egress
<cos-map-profile-name>]
physical port of the flow where
egress-port logical-mac <port> [queue <queue-id>
the bridge port is the ingress
block <level-id/queue-id>]
port, as the physical port’s
egress-port logical-mac <port> [queue-map-profile queue is automatically taken
<queue-map-profile-name> block <level-id/queue-id>] from the CoS configured in the
egress-port logical-mac <port> flow in the other direction (with
[block <level-id/queue-id>] egress bridge port and ingress
egress-port pcs <port> [queue <queue-id> physical port). Doing so results
block <level-id/queue-id>] in the following error: A flow
from bridge port must not use a
egress-port pcs <port> [queue-map-profile
Queue Mapping or a Queue
<queue-map-profile-name> block <level-id/queue-id>]
Mapping profile.
egress-port pcs <port> [block <level-id/queue-id>]
• If working with PW, packets
egress-port svi <port> [queue <queue-id>]
forwarded from the SVI must be
egress-port svi <port> [queue-map-profile untagged or match all, and push
<queue-map-profile-name>] any necessary VLAN.
Associating a Layer-2 control l2cp profile <l2cp-profile-name> L2CP profile can be attached only
processing profile with the flow to flows with the following
classification types:
• VLAN/VLAN+P-bit
• Outer+Inner VLAN / Outer +P-bit
+ Inner VLAN
• P-bits
• VLAN+Non IP
• Untagged
For an explanation on how to
configure an L2CP profile, see
Layer-2 Control Protocol (L2CP)
Processing.
Defining marking actions for the mark all See the following table for the
flow such as overwriting the VLAN marking actions.
ID or inner VLAN ID or setting the
priority, or specifying MAC and IP
address swap
Specifying that the flow is a multi-cos-counters <cos-list> <cos-list> is the list of CoS values
multi-CoS flow with counters for for the flow; the list can be a range
the multiple CoSs such as 1..3 or a list of values such
as 2,4,5
You can assign either multiple CoS
counters or an envelope policer to
a multi-CoS flow; you cannot assign
both.
Associating multi-CoS flow with policer envelope <policer-profile-name> You can assign either an envelope
envelope policer policer or multiple CoS counters to
a multi-CoS flow; you cannot assign
both.
Measuring data rate and line rate rate-measure interval <seconds> Possible values: 10–300
of flow See Viewing Flow Data Rate and
Line Rate for details.
Defining flow to bridge port as reverse-direction block <queue-block-id> Note: This command is allowed only
bidirectional, if bridge is if the bridge is VLAN-aware and the
VLAN-aware egress port is a bridge port.
Assigning service name to flow for service-name <name> The flows that belong to the same
its subsequent discovery by service must be tagged in both
RADview directions.
Displaying measured flow data show rate See Viewing Flow Data Rate and
rate and line rate Line Rate for details.
Displaying flow status show status Fault propagation actions are
visible only for flows configured
with fault propagation and
activated fault propagation license.
See Viewing Flow Status.
Adding VLAN ID with p-bit set to vlan-tag push vlan <sp-vlan> p-bit fixed <fixed-p-bit>
specific value, and optionally [inner-vlan <inner-sp-vlan>
adding inner VLAN ID with p-bit p-bit fixed <inner-fixed-p-bit>]
set to specific value
Adding VLAN ID with p-bit set to vlan-tag push vlan <sp-vlan> p-bit fixed <fixed-p-bit>
specific value, and optionally [inner-vlan <inner-sp-vlan>
adding inner VLAN ID with p-bit p-bit profile <inner-marking-profile-name>]
set via marking profile
Adding VLAN ID with p-bit set to vlan-tag push vlan <sp-vlan> p-bit fixed <fixed-p-bit>
specific value, and optionally [inner-vlan <inner-sp-vlan> p-bit copy]
adding inner VLAN ID with p-bit
set by copying from the incoming
frame
Adding VLAN ID with p-bit set via vlan-tag push vlan <sp-vlan>
marking profile, and optionally p-bit profile <marking-profile-name>
adding inner VLAN ID with p-bit [inner-vlan <inner-sp-vlan>
set to specific value p-bit fixed <inner-fixed-p-bit>]
Adding VLAN ID with p-bit set via vlan-tag push vlan <sp-vlan>
marking profile, and optionally p-bit profile <marking-profile-name>
adding inner VLAN ID with p-bit [inner-vlan <inner-sp-vlan>
set via marking profile p-bit profile <inner-marking-profile-name>]
Adding VLAN ID with p-bit set via vlan-tag push vlan <sp-vlan>
marking profile, and optionally p-bit profile <marking-profile-name>
adding inner VLAN ID with p-bit [inner-vlan <inner-sp-vlan> p-bit copy]
set by copying from the incoming
frame
Adding VLAN ID with p-bit set by vlan-tag push vlan <sp-vlan> p-bit copy
copying from the incoming frame, [inner-vlan <inner-sp-vlan>
and optionally adding inner VLAN p-bit fixed <inner-fixed-p-bit>]
ID with p-bit set to specific value:
Adding VLAN ID with p-bit set by vlan-tag push vlan <sp-vlan> p-bit copy
copying from the incoming frame, [inner-vlan <inner-sp-vlan>
and optionally adding inner VLAN p-bit profile <inner-marking-profile-name>]
ID with p-bit set via marking
profile
Adding VLAN ID with p-bit set by vlan-tag push vlan <sp-vlan> p-bit copy
copying from the incoming frame, [inner-vlan <inner-sp-vlan> p-bit copy]
and optionally adding inner VLAN
ID with p-bit set by copying from
the incoming frame
Displaying the flow statistics show statistics running See Viewing Flow Statistics.
Administratively enabling the flow no shutdown • You can activate a flow only if it
is associated with at least a
classifier profile, ingress port,
and egress port.
• A flow from a bridge port to a
physical port cannot be
activated if another flow from
the same bridge port, in the
same VPN, exits to a different
egress cluster (physical port and
queue block). This applies to
unidirectional flows and to the
reverse direction of bidirectional
flows.
• Type shutdown to disable the
flow.
The following marking actions can be performed in the mark level, at the
config>flows>flow(<flow-name>)>mark# prompt.
Overwriting inner p-bit according inner-marking-profile <inner-marking-profile-name> See comments for marking-profile.
to marking profile
Overwriting p-bit with a new value p-bit <p-bit-value> Typing no p-bit removes the
overwriting of p-bit.
Overwriting inner p-bit with a new inner-p-bit <inner-p-bit-value> Typing no inner-p-bit removes the
value overwriting of inner p-bit.
Overwriting VLAN ID with a new vlan <vlan-value> Typing no vlan removes the
value overwriting of VLAN ID.
Overwriting inner VLAN ID with a inner-vlan <inner-vlan-value> Typing no inner-vlan removes the
new value overwriting of inner VLAN ID.
Note In the case of LAG port, the port classifier rules must be configured for the
anchor port.
Examples
Classifier Profiles
To create classifier profile with criteria VLAN 20 and inner VLAN 30:
exit all
configure flows classifier-profile v20_inner_30 match-any
Traffic Flows
This section provides an example of configuring the following flows in ETX220A:
• Outgoing traffic from port ETH 1/3 to port ETH 4/1:
Accept only traffic tagged with VLAN 10.
Add VLAN 100 with p-bit 5 (this causes VLAN 100 to be the outer VLAN
and VLAN 10 to be the inner VLAN).
• Incoming traffic from port ETH 4/1 to port ETH 1/3:
Accept only traffic tagged with VLAN 100 and inner VLAN 10.
Remove the outer VLAN (VLAN 100).
ETP Flows
This section provides an example of configuring the following flows in ETX203AX
or ETX205A:
• Flow sub1:
Ingress = ethernet 3
Egress = etp ETP1 subscriber 1, CoS mapping profile my-p-bit (see CoS
Mapping Profiles for details on CoS mapping profiles)
• Flow trans1:
Ingress = etp ETP1 transport 1
Egress = ethernet 1, queue 0, block 0/1
Unidirectional Hub
This section provides an example of configuring a unidirectional hub with five
flows in ETX220A:
• Ingress port = ETH 4/1
• Egress ports:
ETH 1/3, queue 0, block 0/1
ETH 1/3, queue 0, block 0/2
ETH 1/5, queue 1, block 0/1
ETH 1/5, queue 1, block 0/2
ETH 1/6, queue 0, block 0/1
• Criteria = VLAN 100
• Policer profile bandwidth limits = CIR 10000, CBS 5000, EIR 0, EBS 0
Multi-CoS Flow
This section provides an example of configuring multi-CoS flows per MEF 10.3 in
ETX220A:
• Flow with multi-CoS counters:
Ingress port = ETH 4/1
Egress port: ETH 1/1
Criteria = VLAN 10
• Flow with envelope policer:
Ingress port = ETH 1/1
Egress port: ETH 4/1
Criteria = VLAN 10
• Envelope profile bandwidth limits:
CIR 1000; maximum CIR 10,000; CBS 2000; EIR 0; EBS 0; maximum EIR 0
CIR 2000; maximum CIR 10,000; CBS 2000; EIR 0; EBS 0; maximum EIR 0
CIR 4000; maximum CIR 10,000; CBS 5000; EIR 0; EBS 0; maximum EIR 0
CIR 8000; maximum CIR 10,000; CBS 5000; EIR 0; EBS 0; maximum EIR 0
flow multi2
classifier v10
cos-mapping profile cos-pbit
no policer
multi-cos-counters 0..3
ingress-port ethernet 4/1
egress-port ethernet 1/1 queue-map-profile q-map-for-cos block 0/1
no shutdown
exit
Note MAC swap is not performed if the flow is part of a unidirectional hub.
The following procedure shows how to run an application layer loopback test
using a flow.
2. Create a flow with the ingress port equal to the egress port with a test mac-
swap attribute.
test [{mac-swap | ip-swap}] [duration <seconds>] [ttl-force <ttl>]
The flow is activated upon flow ‘no-shutdown’, and the TEST LED is
turned on. The test runs for the duration specified. If 0 is specified for
the duration, the test runs until it is stopped manually, and the loop
remains after reset (including MAC/IP swap).
Example
Note This example uses the classifier profile ‘da mac aa’, created in the classifier
profile examples.
ETH1
Figure 8-10. Application Layer Loopback Test on Flow with Three Attributes
Note This example uses the classifier profile ‘all’, created in the classifier profile
examples.
ETH 3 ETH 1
Figure 8-11. Application Layer Loopback Test on Flow with a Single Attribute
Examples
Rx Statistics
-----------------------------------------------------------------------------
Total
Packets : 20000
Bytes : 20000000
Drop Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 197941 197941000
Green : 197941 197941000
Yellow : 0 0
Red : 0 0
Yellow/Red : 0 0
Drop Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 243 1947758 1800000
Green(Rate) : 243 1947758 1800000
Yellow(Rate) : 0 0 0
Red(Rate) : 0 0 0
Yellow/Red(Rate) : 0 0 0
Tx Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 197941 197941000
Green : 197941 197941000
Yellow : 0 0
Tx Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 243 1947758 1800000
Green(Rate) : 243 1947758 1800000
Yellow(Rate) : 0 0 0
Peak Measurement
-----------------------------------------------------------------------------
L1 Min. L2 Min L1 Max L2 Max.
Tx Bit Rate [bps] : 0 0 1300 1252
Drop Bit Rate [bps]: 0 0 13000 121203
Cos Number : 2
Rx Statistics
-----------------------------------------------------------------------------
Total
Packets : 0
Bytes : 0
Drop Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 0 0
Green : 0 0
Yellow : 0 0
Red : 0 0
Yellow/Red : 0 0
Drop Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 0 0 0
Green(Rate) : 0 0 0
Yellow(Rate) : 0 0 0
Red(Rate) : 0 0 0
Yellow/Red(Rate) : 0 0 0
Tx Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 0 0
Green : 0 0
Yellow : 0 0
Tx Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 0 0 0
Green(Rate) : 0 0 0
Yellow(Rate) : 0 0 0
Peak Measurement
-----------------------------------------------------------------------------
L1 Min. L2 Min L1 Max L2 Max.
Tx Bit Rate [bps] : 0 0 0 0
Drop Bit Rate [bps]: 0 0 0 0
Cos Number : 3
Rx Statistics
-----------------------------------------------------------------------------
Total
Packets : 0
Bytes : 0
Drop Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 197941 197941000
Green : 197941 197941000
Yellow : 0 0
Red : 0 0
Yellow/Red : 0 0
Drop Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 243 1947758 1800000
Green(Rate) : 243 1947758 1800000
Yellow(Rate) : 0 0 0
Red(Rate) : 0 0 0
Yellow/Red(Rate) : 0 0 0
Tx Statistics
-----------------------------------------------------------------------------
Packets Bytes
Cos Number : 5
Rx Statistics
-----------------------------------------------------------------------------
Total
Packets : 0
Bytes : 0
Drop Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 0 0
Green : 0 0
Yellow : 0 0
Red : 0 0
Yellow/Red : 0 0
Drop Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 0 0 0
Green(Rate) : 0 0 0
Yellow(Rate) : 0 0 0
Red(Rate) : 0 0 0
Yellow/Red(Rate) : 0 0 0
Tx Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 0 0
Green : 0 0
Yellow : 0 0
Tx Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 0 0 0
Green(Rate) : 0 0 0
Yellow(Rate) : 0 0 0
Peak Measurement
-----------------------------------------------------------------------------
L1 Min. L2 Min L1 Max L2 Max.
Tx Bit Rate [bps] : 0 0 0 0
Example
Status Details
-----------------------------------------------------------------------------
: Ingress Port Oper Status: Down
Example
To display data rate and line rate for flow:
ETX-2# configure flows flow f10_out
ETX-2>config>flows>flow(f10_out)# rate-measure interval 30
ETX-2>config>flows>flow(f10_out)#
Name : f10_out
Status : Passed
Start Time : 2014-11-13 12:24:36 UTC +00:00
Duration (Sec) : 30
Cos : 255
L1 L2
Rx Rate (bps) : 1000 950
Tx Rate (bps) : 1500 1400
Green Drop (bps) : 100 95
Yellow Drop (bps) : 100 95
Red Drop (bps) : 100 90
Applicable Products
This feature is applicable to all ETX-2 products.
Standards
IEEE 802.3
Benefits
ETX-2 offers high flexibility in handling L2CP packets. According to application
requirements, these packets can be tunneled, tunneled with MAC swap,
discarded, or trapped to the host CPU.
Functional Description
ETX-2 supports L2CP profiles to define the handling of Layer-2 Control Protocol
traffic. You can create and configure L2CP profiles to pass through Layer-2
control frames (including other vendors’ L2CP frames) across the network, peer
(trap to host for protocol processing) supported protocols, or discard L2CP
frames. You can also configure L2CP profiles to perform protocol tunneling with
MAC address swap, and discard Loopback packets (Ethertype 0x9000).
You can configure L2CP profiles (as described below), and then assign relevant
L2CP profiles to ports (Ethernet, PCS, or Logical MAC; refer to the relevant
configuration section in the Cards and Ports chapter) and/or to flows (see
Configuring Flows). You can also display the L2CP port statistics for a port
associated with an L2CP profile that is configured with tunneling and MAC swap
(refer to Displaying Layer-2 Control Processing Statistics in the Cards and Ports
chapter).
ETX-2 handles Layer-2 control protocol traffic on a per-port and per-flow basis.
L2CP traffic (both tagged and untagged L2CP frames) is processed using a two-
stage mechanism comprising per-port or per-flow profiles (set of rules for traffic
handling). If no per-flow L2CP profile is configured, a per-port-level profile is
used.
If no default action is configured for an address or protocol, this traffic is
tunneled.
Note An L2CP profile that is attached to a port or flow can be modified or replaced; it
cannot be deleted.
Notes • An L2PT network port is an NNI port or any other user port configured as an
L2PT network port (for tunnel with MAC swap).
• A single MAC address (per device) is supported for L2CP MAC swap. The last
L2PT MAC bound is the MAC used.
UNI
Port 3
Bridge
UNI L2PT Network Port
Port 1 Port 2
Factory Defaults
By default, a “tunnel all” profile is attached to every port. However, no default
L2CP profile is attached to a newly created flow, meaning that the flow traffic
behaves, by default, according to the port profile.
When you create a new L2CP profile, it has the configuration of
L2cpDefaultProfile, the ETX-2-provided default L2CP profile. It is configured as
follows:
• For MAC hex byte 0x00 through 0x2f, action = tunnel
• Default action = tunnel
Specifying the L2CP action for MAC mac <mac-addr-last-byte-value-list><mac-addr> mac-addr –can be either of the
addresses (discard, tunnel, or peer) {discard | tunnel | peer} following:
• Long MAC address, i.e. full
valid MAC adress [xx-xx-xx-
xx-xx-xx]
For example:
01-80-c2-00-00-02
Possible values:
01-80-c2-00-00-xx, where
xx= 0H-10H, 20H-2FH;
01-00-0c-cc-cc-cc
01-00-0c-cc-cc-cd
• Short MAC address, i.e. last
byte of the control protocol
MAC address
[0x00..0x10,0x20..0x2F]
For example: 0x02 is the
short MAC address of
01-80-c2-00-00-02.
Possible values: 0H-10H,
20H-2FH
discard – L2CP frames are
discarded.
tunnel – L2CP frames are
forwarded across the network
as ordinary data.
peer – ETX-2 peers with the
user equipment to run the
protocol. L2CP frames are
forwarded to the ETX-2 CPU.
Unidentified L2CP frames are
forwarded across the network
as ordinary data.
Notes:
• Peer action cannot be used
with the MAC addresses 01-
00-0c-cc-cc-cc and 01-00-
0c-cc-cc-cd.
• ETX-2 supports a single MAC
address per chassis. This
address is used by all L2PT
profiles and protocols that
user asks to tunnel. If you
configure different MACs in
different ports, the last MAC
you configured is the one
used.
Typing no mac
<mac-addr-last-byte-value-list>
<mac-addr> removes the
Defining a Loopback protocol for protocol loopback discard Typing no protocol loopback
discarding removes the action for the
Loopback protocol.
Defining a protocol for tunneling and protocol { lacp | stp | vtp | cdp | lldp | pvstp| pagp | udld | protocol – list of L2CP protocols
specifying MAC swap (for L2PT dtp | lamp | link-oam | e-lmi | 802.1x | gvrp | gmrp | in which tunneling, and
functionality) if desired mmrp | mvrp-customer-bridge | mvrp-provider-bridge | optionally MAC swap, can be
msrp | mirp } tunnel [mac-change [<mac-address>]] performed.
mac-address – the MAC address
to be used as an alternative to
the original MAC. This is an
optional parameter; its default
value is 01-00-0C-CD-CD-D0.
The last mac-address
configured is the MAC used.
Typing no protocol { lacp | stp |
vtp | cdp | lldp | pvstp| pvstp |
pagp | udld | dtp } removes the
action for the specified
protocols.
Notes:
• Supported over a user port
only.
• <mac-address> must be a
valid multicast address. Must
have a 1 value in the least-
significant bit of the first
octet (for example, 01-03-
05)
• You must use the same
<mac-address> for all
tunneled protocols.
• You can configure either
gmrp or gvrp in a single
profile; not both.
• You can configure either
mvrp-customer-bridge or
mvrp-provider-bridge in a
single profile; not both.
• For ETX203AM, ETX203AX,
and ETX205A, if the L2CP
profile is associated with a
flow, the MAC swap
functions only if the flow
uses network port 1, and
not network port 2.
Examples
To add L2CP profile named layer2ctrl1 with discard action for hex byte 0x01 and
0x03 (short MAC format):
exit all
ETX-2#configure port
l2cp-profile layer2ctrl1
ETX-2>config>port>l2cp-profile (layer2ctrl1)#mac 0x01 discard
mac 0x03 discard
exit all
To add L2CP profile named layer2ctrl2 with tunnel action for long MAC addresses
01-80-c2-00-00-00 and 01-80-c2-00-00-01 (long MAC format):
exit all
ETX-2#configure port
l2cp-profile layer2ctrl2
ETX-2>config>port>l2cp-profile(layer2ctrl2)#
mac 01-80-c2-00-00-00 tunnel
mac 01-80-c2-00-00-01 tunnel
exit all
To add L2CP profile 1 that uses LACP protocol for tunneling with L2CP MAC swap:
ETX-2#configure port l2cp-profile 1
ETX-2>config>port>l2cp-profile(1)#
protocol lacp tunnel mac-change 01-23-45-67-89-DD
exit all
To display the layer2ctrl1 L2CP profile:
ETX-2#configure port l2cp-profile layer2ctrl1
ETX-2>config>port>l2cp-profile(layer2ctrl1)# info detail
mac 0x00 tunnel
mac 0x01 discard
mac 0x02 tunnel
mac 0x03 discard
mac 0x04 tunnel
mac 0x05 tunnel
mac 0x06 tunnel
mac 0x07 tunnel
mac 0x08 tunnel
mac 0x09 tunnel
mac 0x0a tunnel
mac 0x0b tunnel
mac 0x0c tunnel
mac 0x0d tunnel
mac 0x0e tunnel
mac 0x0f tunnel
mac 0x10 tunnel
mac 0x20 tunnel
mac 0x21 tunnel
mac 0x22 tunnel
mac 0x23 tunnel
mac 0x24 tunnel
mac 0x25 tunnel
mac 0x26 tunnel
mac 0x27 tunnel
Note
The info detail command displays all actions (including the default action (in
above example, tunnel). The info command only displays non-default actions.
Configuration Errors
The following table lists the messages generated by ETX-2 when a configuration
error is detected.
Message Description
Cannot add MAC address: Max number of Cannot specify an L2CP processing action for a MAC address
MAC addresses has been reached because the maximum number of addresses has been reached.
Illegal L2CP processing action for this The L2CP processing action selected for the current MAC
MAC address type address type is not valid.
Illegal MAC address for peer action The MAC address selected for the peer processing action is not
valid. The address must be 01-80-C2-00-00-02.
Invalid L2PT protocol An invalid protocol was used to configure the L2CP MAC swap.
L2CP MAC swap available only on IO The L2CP MAC swap is not supported for ports that are not IO
ports ports.
L2CP MAC swap not available on flows L2CP MAC swap can only be configured for ports.
L2CP profile creation failure: Max number The L2CP profile cannot be added because the maximum number
of L2CP profiles has been reached of L2CP profiles has been reached.
L2CP profile deletion/modification The L2CP profile cannot be deleted or modified because it is
failure: L2CP profile is in use currently attached to a port or a flow.
L2CP profile does not exist Cannot bind an L2CP profile that has not yet been created.
Only tunnel supported MAC change An invalid action was used to configure the L2CP MAC swap.
Peer action is not allowed for port- An L2CP profile bound to a port cannot perform a peer action.
bound L2CP profile
LACP 0 0
STP 0 0
CDP 0 0
VTP 0 0
LLDP 0 0
PVSTP 0 0
PAGP 0 0
UDLD 0 0
DTP 0 0
LAMP 0 0
Link OAM 0 0
ELMI 0 0
802.1x 0 0
GVRP 0 0
GMRP 0 0
MMRP 0 0
MVRP Customer Bridge 0 0
MVRP Provider Bridge 0 0
MSRP 0 0
MIRP 0 0
Applicable Products
This feature is applicable to all ETX-2 products, with the following condition:
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.1AB-2009
IEEE 802.3az-2010
Benefits
Automated discovery of devices simplifies management and network
maintenance, and reduces general setup costs of new equipment.
Functional Description
LLDP is a neighbor discovery protocol that enables network devices to advertise
information to peer devices on the same physical LAN and store information
about the network. LLDP is supported for all Ethernet ports, including the
management port and Ethernet ports that are bound to LAG. LLDP information is
exchanged by means of LLDP packets.
Note LLDP runs on physical links and is configured on each individual physical port; it
neither runs nor is configured over the LAG logical layer.
TPMR (Two-port MAC Relay) indicates a bridge that has only two
externally-accessible bridge ports, and supports a subset of the regular functions
of a MAC bridge. A TPMR bridge is transparent to all frame-based
media-independent protocols except for packets with destinations that terminate
at the bridge, or packets with destinations that are reserved MAC addresses that
are not defined for forwarding by the relay function of the TPMR bridge.
LLDP Packets
LLDP packets are sent periodically between ETX-2 and neighboring devices, in
order to obtain neighbor information. The information from the LLDP packets is
stored for a period of time, determined by the time-to-live (TTL) value in the
received packet. When the TTL expires, the LLDP information is discarded.
LLDP packets contain the following information:
Port Description ifDescr per RFC 2863, which is port name Optional
Factory Defaults
By default, no LLDP parameters are configured for ports. The system LLDP
parameters have the default values shown in the following table.
hold-multiplier 4
Configuring LLDP
LLDP parameters are configured at the following levels:
• Global LLDP parameters that apply to the entire device are configured at the
system level.
• Port LLDP parameters are configured at the Ethernet port level, to specify
which TLVs to send for the port.
Note In order for LLDP to function properly for the port, an L2CP profile must be
associated with it that specifies peer action for MAC address 01-80-C2-00-00-00,
01-80-C2-00-00-03 or 01-80-C2-00-00-0E, depending on the LLDPDUs
destination addresses configured.
System Parameters
This section explains how to configure global parameters such as bridge type, as
well as enable or disable LLDP for the device.
To configure LLDP system parameters:
1. Navigate to configure system lldp.
The config>system>lldp# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Enabling or disabling LLDP for device shutdown Enter no shutdown to enable LLDP.
Port Parameters
This section explains how to configure which TLVs to transmit for the port for the
different LLDP bridge types (see Table 8-8, Table 8-9, and Table 8-10 for details
on TLVs).
Example
The following example illustrates how to configure LLDP in the system.
#*********************************Configuring_LLDP in
system*****************
conf system lldp
tx-interval 10
hold-time 2
bridge-type nearest-bridge
no shutdown
exit all
#***************************Configuring_L2CP_Profile***********
**************
configure port
l2cp-profile lldp
mac 0x0e peer
exit all
Basic-Management Info
Bridge-Type : NEAREST
Chassis-type : MAC_ADDRESS
Chassis-id : 00:01:00:00:00:03
Port-Type : Locally Assigned
Port-id : eth-0/1
802.1
Port-vlanId : 10
Port-protocol Vlan-id : --
Vlan Name : --
Protocol Identity : Link-aggregation, OAM, ELMI
VID Usage : --
Management VID : --
Link-Aggregation
Link Aggregation Status : Enabled
Lag-portId : 100
802.3
MAC/PHY configuration
Auto Negotiation Support Status : Supported
Auto Negotiation Current Status : Enabled
Auto-negotiation-advertised Capability : --
Operational MAU Type : --
POWER/MDI configuration
Port-class : --
MDI Support Status : --
MDI Current Status : Disabled
PSE Pair Control Ability : --
Power Class : --
Max Frame Size : 1500
Applicable Products
This feature is applicable to all ETX-2 products.
Standards
ETX-2 support MLD Snooping version 2.
Benefits
Enables reduction in traffic by reducing the number of unneeded packets on the
network.
Factory Defaults
By default, MLD Snooping is disabled.
Functional Description
ETX-2 supports MLD Snooping for both VLAN-unaware and VLAN-aware bridges.
MLDv2 snooping can be enabled and disabled per bridge. In VLAN-aware bridges
it can also be enabled and disabled per VLAN. If snooping is disabled at the bridge
level, the per-VLAN configuration is ignored. This allows MLDv2 snooping to be
disabled on the entire bridge, without changing the per-VLAN configuration (e.g.
for troubleshooting).
When MLDv2 snooping is enabled, the bridge keeps two lists, per port (in VLAN-
unaware bridges) or per port and VLAN (in VLAN-aware bridges).
Router port list Ports from which MLDv2 router traffic is received
Member port list Pairs of port and multicast group address, to which
multicast traffic is to be forwarded
Note Snooping is only enabled on a VLAN if it is enabled at both bridge and VLAN
levels. A command at either level does not change configuration of other levels.
Note Data for unsupported addresses is forwarded to all ports, including ones behind
which there is no host interested in the address. To avoid this, use addresses out
of the unsupported ranges.
Note Data for the duplicate address will be forwarded to the ports used by the one
already in the forwarding database. Duplicate addresses should either be
changed or configured statically.
Note
ETX-2 does not analyze group-specific and group-and-source-specific queries.
These queries are sent to group addresses, (unlike general queries, which are
sent to a fixed address). Information that could be learned from these queries
will eventually be learned from the periodic general queries, but it will take more
time for MLDv2 Snooping to adjust to that information.
Port Aging
Router port is the ETX-2 port facing the multicast router. Router port is learned
from receiving general queries and can age out. ETX-2x sets the router port aging
timer when a port is added to the router port list.
• The timer is rearmed when receiving an MLDv2 general query or an IPv6 PIM
hello message with source address different from 0::0.
• If the timer expires, the port is removed from the router port list.
• The router port list is maintained per bridge port in VLAN-unaware bridges, or
per VLAN and bridge port in VLAN-aware bridges.
A member port is the ETX-2 port facing a multicast client. Member port is learned
from report messages and is subjected to agin. The ETX-2 sets the member port
aging timer when a port joins an IPv6 multicast group.
• The timer is rearmed when receiving an MLDv2 report message.
• If the timer expires, the port is removed from the multicast group forwarding
table.
• The member port list is maintained per bridge port and multicast group in
VLAN-unaware bridges, or per VLAN, bridge port and multicast group in VLAN-
aware bridges.
ETX-2 must listen to MLDv2 general queries, sent to the link-scope all-nodes
multicast address (FF02::1), on all ports and all VLANs. General queries are sent
periodically by MLDv2 queries, to find the ports on which group members reside.
If a general query is received the bridge must:
• Forward the query to all ports (VLAN-unaware bridges) of all ports in the
VLAN (VLAN-aware bridges) except the receiving port.
• If the receiving port is not on the router-port list, add it to the list and set
the aging timer.
• If the receiving port is on the router-port list, rearm its aging timer.
ETX-2 must listen to MLDv2 reports, sent to FF02::16, to which all MLDv2
multicast routers listen, on all ports and all VLANs. Reports are sent by listeners
as responses to router queriers or when asking to join or leave a multicast group.
If MLDv2 report is received the bridge must:
• Peruse the report and update the member port list accordingly; that is, if a
host asks to join a group, add the receiving port to the member port list of
the group. Conversely, if a host is leaving a group the receiving port is not
immediately removed from the member list, since there may be other hosts
interested in the group on the port. Ports are only removed from the member
port list if the aging timer expires.
• Forward it to all router ports (in VLAN-unaware bridges) or all router ports in
the VLAN (in VLAN-aware bridges).
• If the receiving port is not on the member port list, add it to the list and set
the aging timer.
• If the receiving port is on the member port list, rearm the aging timer.
ETX-2 must receive all multicast traffic from all ports and VLANs. If multicast
packet that is not MLDv2 protocol traffic is received, the device must:
Note A static router port is always on the router port list; it is not subjected to timer
aging.
A static member port is always on the member port list; it is not subjected to
timer aging.
Source-Specific Multicast
Source-Specific Multicast, or SSM, is a multicast service allowing hosts to
subscribe to specific multicast sources, and thus further reducing multicast traffic
in the network.
In addition to subscribing to a multicast group, hosts may ask to receive traffic
from a specific host. ETX-2, however, does not maintain a per-source database.
This means that multicast traffic sent to a specific group will be forwarded to all
members of that group, regardless of whether or not they are interested in the
traffic source.
Display MLD snooping status show status See Displaying MLD Snooping
Status.
Router Ports:
VLAN Type Ports
------------------
r-v r-type r-ports
Host Ports:
VLAN IP Address Type Ports
----------------------------------------------------------
h-v h-ip h-type h-ports
Note
Port member tables are sorted by VLAN, then (the host port list) IP address, and
then type (static first).
Router Ports:
VLAN Type Ports
------------------
1 static 1-5, 7
2000 learned 2, 7-10
Host Ports:
VLAN Group IP Address Type Ports
----------------------------------------------------------
100 ff00:1111:2222:3333:4444:5555:6666:7777 static 1-5, 7
2000 ff11:1111:1111:1111:1111:1111:1111:1111 learned 2, 7-10
Parameter Description
admin-state MLD snooping admin state at bridge level; possible values: enabled,
disabled.
snooping-vlans VLANs for which MLD snooping is enabled
host-aging Aging time of host ports (in seconds)
router-aging Aging time of router ports (in seconds)
r-v VLAN the router ports of this entry are on; possible values: 1-4094.
r-type Type of this entry; possible values: static, learned
r-ports List of router ports
h-v VLAN the host ports of this entry are on; possible values: 1-4094.
h-ip Multicast IPv6 address this entry is on
h-type Type of this entry; possible values: static, learned
h-ports List of host ports
parameters define the way a payload is transported via the E1/T1 ports through
the PSN network. You can configure up to 64 PW bundles.
Note If you have performed shutdown and then no shutdown of a PW cross connect or
smart SFP port, you must perform shutdown and then no shutdown of the PW.
Applicable Products
This feature is applicable to ETX205A with built-in E1/T1 ports and devices that
support smart SFP MiTOP functionality.
Standards
• IETF RFC 5086 (CESoPSN)
• IETF RFC 4553 (SAToP)
• ITU-T Y.1413 (CESoPSN, SAToP)
• ITU-T Y.1453 (CESoPSN, SAToP)
Functional Description
The device supports the CESoPSN and SAToP network encapsulation methods,
transmitting E1/T1 traffic over Ethernet (MEF 8) or UDP/IP packet-switched
networks. TDM PW is supported over G.8032 rings, for MEF 8 and UDP/IP.
Note
If the E1/T1 port is in CAS mode, only CESoPSN with CAS encapsulation over
UDP/IP PSN is permitted.
Control Word Data control as defined in the relevant IETF RFCs and drafts
Note The source MAC address is the egress port MAC address for MEF 8 (Ethernet)
PWs, or the MAC address of the egress router interface for UDP/IP PWs.
CESoPSN CES (Circuit Emulation Services) over PSN, for framed E1/T1
traffic with or without CAS
CESoPSN
The CESoPSN method is a structure-aware format for framed E1/T1 services. It
converts structured E1/T1 data flows into IP packets and vice versa with static
assignment of timeslots inside a bundle according to IETF RFC 5086 and
ITU-T Y.1413. The CESoPSN packet size is a multiple of TDM frame size. The
following figure illustrates CESoPSN encapsulation without CAS.
TDM Payload
L2/L3 Control
4 25 4 25 4 25 CRC Ethernet Packet
Header Word
4 25 4 25 4 25
Figure 8-15. CESoPSN Encapsulation – E1 without CAS, Bundle with Timeslots 4 and 25
Note When there is no fragmentation, 16 E1 frames + CAS info are encapsulated into
one packet, causing a greater packetization delay than the two options with
fragmentation. The other two options have a lower packetization delay, but the
PW has increased bandwidth.
Similarly, when there is no fragmentation, 12 T1 frames + CAS info (for SF) or 24
T1 frames + CAS info (for ESF) are encapsulated into one packet, causing a
greater packetization delay than the option with fragmentation.
SAToP
The SAToP encapsulation method is used to convert unframed E1/T1 data flows
into Ethernet or IP packets and vice versa according to ITU-T Y.1413 and
IETF RFC 4553. It provides flexible packet size configuration and low end-to-end
delay.
FRG bits = 00
(no fragmentation)
TDM
Bitstream
N TDM Bytes
Jitter Buffer
The packets of each pseudowire are transmitted by ETX-2 at essentially fixed
intervals toward the PSN. The packets are transported by the PSN and arrive to
the far end after some delay. Ideally, the PSN transport delay should be constant,
meaning the packets arrive at regular intervals (equivalent to the intervals at
which they were transmitted). However, in reality, packets arrive at irregular
intervals, because of variations in the network transmission delay. The term
Packet Delay Variation (PDV) is used to designate the maximum expected
deviation from the nominal arrival time of the packets at the far end device.
Note
The deviations from the nominal transmission delay experienced by packets are
referred to as jitter, and the PDV is equal to the expected peak value of the jitter.
However, nothing prevents the actual delay from exceeding the selected PDV
value.
To compensate for deviations from the expected packet arrival time, ETX-2 uses
jitter buffers that temporarily store the packets arriving from the PSN (that is,
from the far end equipment) before being transmitted to the local TDM
equipment, to ensure that the TDM traffic is sent to the TDM side at a constant
rate.
For each pseudowire, the jitter buffer must be configured to compensate for the
jitter level expected to be introduced by the PSN; that is, the jitter buffer size
determines the Packet Delay Variation Tolerance (PDVT).
Two conflicting requirements apply:
• As packets arriving from the PSN are first stored in the jitter buffer before
being transmitted to the TDM side, TDM traffic suffers an additional delay.
The added delay time is equal to the jitter buffer size configured by the user.
• The jitter buffer is filled by the incoming packets and emptied to fill the TDM
stream. If the PSN jitter exceeds the configured jitter buffer size,
underflow/overflow conditions occur, resulting in errors at the TDM side:
A jitter buffer overrun occurs when it receives a burst of packets that
exceeds the configured jitter buffer size + packetization delay. When an
overrun is detected, ETX-2 clears the jitter buffer, causing an underrun.
A jitter buffer underrun occurs when no packets are received for more
than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is
automatically filled with a conditioning pattern up to the PDVT level in order to
compensate for the underrun. Then, ETX-2 starts processing the packets and
emptying the jitter buffer toward the TDM side.
To minimize the possibility of buffer overflow/underflow events, two conditions
must be fulfilled:
• The buffer must have sufficient capacity. For this purpose, the buffer size can
be selected by the user in accordance with the expected jitter characteristics,
separately for each pseudowire, in the range of 1 to 180 ms.
• TDM clocks at both ends should be synchronized so that the read-out rate
shall be equal to the average rate at which frames are received from the
network. One way to achieve this is by adaptive clock recovery, which
continuously adapts the recovered clock to the packet rate. Other ways may
be by distributing the same clock to ETX’s by SyncE, 1588, or External clock
input.
Factory Defaults
No PWs are included in the ETX-2 factory defaults. You must define the necessary
PWs in accordance with your application requirements.
When you create a PW, it is configured by default, as shown below.
ETX205A>config>pwe>pw(1)# inf d
shutdown
name "Put your string here"
description "Put your string here"
no peer
label in 0 out 0
no oam
vlan priority 0
ip-priority-type tos
tos 184
tdm-payload size 0 rate 0
jitter-buffer 2000
psn-oos stop-tx
udp-mux-method dst-port
pm-enable
5. Select the PW connection type: CESoPSN for framed E1/T1 packets, SAToP for
unframed E1/T1 packets.
6. Select the PSN type: UDP over IP or Ethernet.
Note
When an E1/T1 clock source is configured to adaptive, it uses the first configured
PW bundle as the adaptive clock source.
To add a PW:
• At the config>pwe# prompt, enter:
pw <pw> [type {ces-psn-data|e1satop|t1satop }] [psn {ethernet | udp-over-ip
}] [manually].
Parameter Description
Note When the PW encapsulation type is SAToP and the PSN type is Ethernet, alarms
are forwarded toward E1 ports only if the E1 port trail mode is configured to
extended (refer to Configuring E1 Ports in the Cards and Ports chapter).
To configure a PW bundle:
1. Add a PW bundle as explained in Adding Pseudowire Bundle above.
2. At the config>pwe>pw(<pw-number>)# prompt, enter all necessary
commands according to the tasks listed below.
Defining the fragmentation cas-frames-per-packet {4 | 8 Relevant only for CESoPSN with CAS
option for CESoPSN with | 12 | 16 | 24} • 4 – Four E1/T1 frames per packet
CAS (fragmented)
• 8 – Eight E1 frames per packet (fragmented)
• 12 – 12 T1 frames per packet (for SF, not
fragmented)
• 16 E1 frames per packet (not fragmented)
• 24 – 24 T1 frames per packet (for ESF, not
fragmented)
Clearing PW statistics clear statistics The current and running counters are cleared;
the interval counters are not cleared.
Configuring the value of dscp <number> number – the value of the IP DSCP field in egress
the IP header DSCP field packets.
Possible values: 0-63
Note: Relevant only when IP priority type is
DSCP, and PSN type is UDP over IP.
Providing pseudowire description <pw-descr> For identification of the PW customer
description no description
Defining the egress port egress-port svi Relevant only if the PSN type is Ethernet.
for PW with Ethernet <port-number> Note: If you need to change the egress SVI port
encapsulation for an active PW configured over a built-in E1/T1
port, you need to do the following:
• Administratively disable the PW.
• Change the egress SVI.
• Delete the relevant cross connect entry.
• Administratively re-enable the PW.
• Configure the cross connect.
Selecting the IP priority ip-priority-type {tos | dscp} Note: Relevant only when PSN type is UDP over
field used to configure the IP.
IP priority of the IP/UDP If you select IP priority type ToS, configure the
packet: ToS or DSCP tos value (see command in this table).
Otherwise, if you select IP priority type DCSP,
configure the dscp value (see command in this
table).
Selecting source and label [in <in-pw-label>] in-pw-label – the PW label used in the inbound
destination circuit bundle [out <out-pw-label>] direction
identifiers (CBID), also out-pw-label – the PW label used in the
referred to as PW labels outbound direction
Possible values for labels: 1–8191
Each PW bundle must have a unique in (source)
label.
It is not recommended to reuse the same out
(destination) value on PW bundles terminating at
the same peer.
Enabling OAM for the PW, oam [rising-threshold The delay threshold is set as follows:
and specifying rate in ms <rising>] [falling-threshold • rising-threshold – 1–180 ms
<falling>]
• falling-threshold – 1–180 ms
no oam
The falling threshold must be less than or equal
to the rising threshold.
Defining the peer for the peer <peer-number> peer-number – the number of the remote peer
PW no peer which terminated this PW
The peer type must be according to the PSN
type:
• IP address for UDP/IP
• MAC address for Ethernet
Selecting the response to psn-oos {l-bit | stop-tx} Out-of-service conditions receive a response by
out-of-service conditions transmitting PW frames filled with all ones, or by
detected at the local E1/T1 stopping transmission.
physical port
Specifying TDM payload tdm-payload size <size> Note: TDM payload size can be configured for
size in bytes and rate rate <rate> CESoPSN only if the associated E1/T1 port is not
(number of time slots for in CAS mode.
each frame in the packet) if Size according to PW type:
applicable e1satop – N×32; range 32–1440
t1satop – N×24; range 24–1440
ces-psn-data – N × number of time slots in a
bundle; range 4–1440
Rate: 1–31 for E1; 1–24 for T1
Note: Rate is relevant only for PW type
ces-psn-data.
It is recommended to specify the parameter
values such that the ratio size/rate is between 2
and 256.
A larger size increases the bandwidth utilization
efficiency, but also increases the connection
intrinsic latency, in particular when the PW
bundle is configured to carry a small number of
timeslots.
Specifying the Layer-3 tos <tos> tos – the value of the IP TOS byte in egress
priority assigned to the packets
traffic generated by the PW Possible values: 0–255
In accordance with RFC 2474, it is recommended
to use only values that are multiples of 4.
Note: Relevant only when IP priority type is TOS,
and PSN type is UDP over IP.
Specifying the UDP port udp-mux-method dst-port dst-port – Standard multiplexing method:
multiplexing method UDP destination port = 0xC000 + <out-PW-label>
UDP source port is 0xC000 + <in-PW-label>
Note: Relevant only for PSN type UDP over IP
Enabling the VLAN tag on vlan priority <vlan-priority> vlan-priority – the VLAN priority on every
every transmitting packet no vlan transmitted packet for this PW
for the PW and specifying Possible values: 0-7
the VLAN priority.
Entering no vlan disables the VLAN tag on the
transmitting packets for the PW.
Displaying PW statistics show statistics { current | • current – displays PW statistic counters for
interval <interval-num> | all- the current interval
intervals | all } • interval – displays PW statistics for the
selected interval
Possible values: 1–96
• all-intervals – displays PW statistics for all
intervals since the PW statistics collection has
been enabled
• all – displays PW statistics for current
interval and all intervals
Note: The statistics are visible only when
performance management is enabled for the
corresponding E1/T1 port.
See Viewing PW Statistics.
Displaying PW connectivity show connectivity-statistics Note: The statistics are visible only when
statistics performance management is enabled for the
corresponding E1/T1 port.
See Viewing PW Connectivity Statistics.
To delete a PW:
1. At the config>pwe>pw(<pw-number>)# prompt, enter:
shutdown
The PW is administratively disabled.
2. At the config>pwe# prompt, enter:
no pw <pw-number>.
The PW is removed.
To display PW information:
• At the prompt config>pwe#, enter show summary.
For example,
ETX-2>config>pwe# show summary
Viewing PW Statistics
ETX-2 PWs feature the collection of statistical diagnostics, thereby allowing the
carrier to monitor the transmission performance of the links.
The pseudowire transmission statistics enable analysis of pseudowire traffic
volume, and evaluation of the end-to-end transmission quality (as indicated by
sequence errors) and jitter buffer performance. By resetting the status data at
the desired instant, it is possible to ensure that only current, valid data is taken
into consideration.
Current
---------------------------------------------------------------
Time Elapsed (Sec) : 0
Valid Intervals : 0
Rx Packets : 354994
Tx Packets : 354995
Missing Packets : 0
Mis-order Dropped Packets : 0
Reordered Packets : 0
Malformed Packets : 0
Jitter Buffer Underrun : 0
The fields are:
Parameter Description
Missing Packets Number of missing packets as detected via CW sequence number gaps. This
count does not include misordered dropped packets.
Misordered Dropped Number of packets detected via CW sequence number to be out of sequence,
Packets and could not be re-ordered, or could not fit in the jitter buffer. This count
includes duplicated packets.
Parameter Description
Reordered Packets Number of packets detected via CW sequence number to be out of sequence,
but successfully reordered
Malformed Packets Number of packets with mismatch between the expected packet and the actual
packet sizes
Jitter Buffer Underrun Number of times jitter buffer was in underrun state
Parameter Description
Jitter Buffer Level Minimum – displays the minimum level of the jitter buffer since the last reset (in
msec)
Average/Current – for current and previous intervals, displays the average level
of the jitter buffer; for running interval, displays the current level of the jitter
buffer (in msec)
Maximum Units – displays the maximum level of the jitter buffer since the last
reset (in msec)
Round Trip delay Minimum – displays the minimum round trip delay since the last reset (in msec)
Average/Current – for current and previous intervals, displays the average round
trip delay; for running interval, displays the current round trip delay (in msec)
Parameter Description
Maximum Units – displays the maximum round trip delay since the last reset (in
msec)
Examples
To create and activate a CES PW with UDP encapsulation:
exit all
config flow
classifier-profile mng_untagged match-any
match untagged
exit
flow 1
classifier "mng_untagged"
ingress-port ethernet 1
egress-port svi 1 queue 0
no shutdown
exit
flow 2
classifier mng_untagged
ingress-port svi 1
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit all
config flow
classifier-profile mng_untagged match-any
match untagged
exit
flow 1
classifier mng_untagged
ingress-port ethernet 1
egress-port svi 1 queue 0
no shutdown
exit
flow 2
classifier mng_untagged
ingress-port svi 1
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit all
Note The E1 port must be configured for framed traffic with signaling.
configure
peer 1 ip 10.10.20.100
port
svi 1
no shutdown
exit
e1 1
tx-clock-source pw 1
line-type g732s
pm-enable
no shutdown
exit
exit
flows
classifier-profile "all" match-any
match all
exit
classifier-profile "unt" match-any
match untagged
exit
flow "in"
classifier "unt"
no policer
ingress-port ethernet 1
egress-port svi 1 queue 1
no shutdown
exit
flow "out"
classifier "all"
no policer
ingress-port svi 1
egress-port ethernet 1 queue 1 block 0/1
no shutdown
exit
exit
router 1
interface 1
address 10.10.20.200/24
bind svi 1
no management-access
dhcp-client
client-id mac
exit
no shutdown
exit
exit
pwe
pw 1 type ces-psn-cas psn udp-over-ip
peer 1
label in 20 out 20
no vlan
jitter-buffer 10000
psn-oos 1-bit
pm-enable
cas-frames-per-packet 16
no shutdown
exit
exit
cross-connect
pw-tdm pw 1 e1 1 time-slots 1..2
exit
exit
Applicable Products
This feature is applicable to ETX205A with built-in E1/T1 ports anddevices that
support smart SFP MiTOP functionality.
Functional Description
PW cross-connects are used to connect E1/T1 ports to pseudowire bundles.
Factory Defaults
No PW cross-connects are included in the ETX-2 factory defaults.
Note
Following shutdown and then no shutdown of PW cross connects, you must
perform shutdown and then no shutdown of PW.
Examples
In these examples, PW 1 must be active; see Examples in Pseudowire Connections
for instructions on configuring and enabling PWs.
To assign E1 port timeslots 1–31:
exit all
config cross-connect
pw-tdm pw 1 e1 1 time-slots 1..31
exit all
8.8 Router
The router provides an IP forwarding plane for IPv4 and IPv6 packets, and also
interconnects internal Layer-3 support modules, such as management and
1588v2 (recovered clock). Any flow related to IP forwarding, management traffic,
or timing must be via an SVI or PPP that is bound to a router interface.
Applicable Products
This feature is applicable to all ETX-2 products and to the PMC in ETX205A, with
the following conditions:
• Clock is relevant to ETX205A and ETX220A.
• Pseudowire connections are relevant to ETX205A.
Standards
RFC 1812 – Requirements for IP Version 4 Routers
RFC 2460 – Internet Protocol, Version 6 (IPv6) Specification
RFC 2464 – Transmission of IPv6 Packets over Ethernet Networks
RFC 4291 – IP Version 6 Addressing Architecture
RFC 4294 – IPv6 Node Requirements
RFC 4443 – Internet Control Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification
RFC 4862 – IPv6 Stateless Address Autoconfiguration
RFC 5880 – Bidirectional Forwarding Detection general protocol
RFC 5881 – Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single
Hop) protocol
RFC 5882 – Generic Application of Bidirectional Forwarding Detection (BFD)
RFC 2663 – IP Network Translator (NAT) Terminology and considerations
RFC 2766 – Traditional IP Address Translator
RFC 3489 – Simple Traversal of User Datagram Protocol through Network Address
Translator (STUN)
RFC 7857 –Traditional IP Address Translator
Benefits
The router provides IP Routing and Forwarding for IPv4 and IPv6 packets.
Functional Description
Notes • An ETX-2 router supports up to 32 router interfaces; however, only one router
interface is supported when working with PWs, and only two router interfaces
can be configured for management access.
• In order to enable management, you must configure a router interface
enabled for management access, assign it an IP address, and bind it to an SVI
for which management flows have been defined.
Overview
Any flow into/out of the device, which is related to management/timing, must be
via an SVI that is bound to a router interface. A router interface can be
associated via binding to only one SVI. If a flow is used for management
purposes, the router interface corresponding to the SVI should be enabled for
management access.
The router maintains a table of IPv6 neighbors, via discovery of neighboring IPv6
nodes. It is recommended to manage ETX-2 via a router interface defined as a
loopback interface, as this router interface remains active. To ensure that packets
generated by the router are transmitted with the loopback IP address, you need
to define the management source IP address for IPv4 and IPv6 (refer to
Management Source IP Address in the Management and Security chapter).
The MAC addresses used by router interfaces are as follows:
• Router interface that resides directly on a port uses that port’s MAC address
• Router interface that resides on a bridge port uses the Ethernet management
port MAC address
• Router interface connected to an ETP subscriber port uses the Ethernet
management port MAC address.
The management and control packets transmitted by the router have a
configurable IP DSCP value, so that each router entity can control its traffic
priority by setting its DSCP value for its protocols (see Configuring the Router on
how to configure the DSCP).
Untagged None, push single VLAN, push VLAN DSCP to queue or fixed DSCP to p-bit or fixed
and inner VLAN
Factory Defaults
By default, ETX-2 is configured with Router 1 and Router Interface 32. The
default values of the router interface parameters are configured as shown in the
following table.
address 169.254.1.1/16
bind svi 96
shutdown no shutdown
Once you create a new router, its dynamic entities are configured with the
default values shown in the following table.
dhcp-client vendor-class-id ent-physical-name In the DHCP client, the entity physical name
is used as the vendor class ID.
dscp 0
static-preference ipv4 1
static-preference ipv6 1
Once you create a new router interface, its dynamic entities are configured with
the default values shown in the following table.
management-access allow-all
mtu 1500
Deleting dynamic ARP entities clear-arp-table [<address>] Specify the IP address to clear only
the entries corresponding to it.
Setting the priority of static static-preference {ipv4 | ipv6} <priority> Possible values for number: 0–255
routes for IPv4 and IPv6 RTM Default: 1
Enabling the static route and static-route The next hop must be a subnet of
the next gateway (next hop) <ip-address/ip-mask-of-static-route> address one of the router interfaces.
using the next hop’s IP address <ip-address-of-next-hop> [metric <metric>][ To set the default-gateway,
install | no-install ] configure the static route of address
no static-route <ip-address/prefix-length> 0.0.0.0/0 to next hop default
address address gateway address.
no static-route deletes static route
entry.
metric specifies the priority of the
static route
Possible values: 0–255
Default: 1
install option forwards a specific
route entry into the FIB.
no-install option does not forward a
specific route entry into the FIB.
Enabling the static route and static-route no static-route deletes static route
the router interface number <ip-address/ip-mask-of-static-route> entry.
toward which the destination interface <router-interface-num> [metric metric specifies the priority of the
subnet is to be routed <metric>][ install | no-install ] static route: 1–255 (default: 1).
no static-route <ip-address/prefix-length> install option forwards a specific
interface <router-interface-num> route entry into the FIB.
no-install option does not forward a
specific route entry into the FIB.
Displaying the summary of show access-list summary Refer to Access Control List (ACL) in
ACLs bound to router interface the Management and Security
chapter for further information.
Displaying the interface table show summary-interface See Viewing Router Interface
Information.
Displaying IPv6 neighbors table show neighbor-table [address <ip-address>] See Viewing IPv6 Neighbors.
Displaying the routing table show routing-table [ address ip-address/ip-mask – View routing
<ip-address/ip-mask> ] information for a specific IP address
of a specified prefix length.
See Viewing Routing Information.
Displaying the IPv4 or IPv6 RIB show rib { ipv4 | ipv6 } See Viewing RIB.
(Routing Information Base)
table
Providing host name to DHCP host-name name <string> You can specify a name, or specify
server host-name sys-name sys-name to indicate that the
system name should be used as
no host-name
the host name.
Providing vendor ID to DHCP vendor-class-id name <string> You can specify an ID, or specify
server vendor-class-id ent-physical-name ent-physical-name to indicate that
the device name should be used as
the vendor ID.
Binding ACL to router interface access-group Refer to Access Control List (ACL)
in the Management and Security
chapter for further information.
Specifying parameters for BFD bfd min-tx {100ms | 1s | 10s} • min-tx – minimum time interval
sessions min-rx {100ms | 1s | 10s} for periodic transmission of BFD
multiplier <multiplier-val> control packets
• min-rx – minimum interval for
periodic reception of BFD
control packets
• multiplier – detection time
multiplier: BFD session
detection time is calculated by
multiplying the negotiated
transmit interval by this value.
Possible values: 2–60
Binding router interface to SVI bind svi <port-number> • You can bind one SVI
logical port (predefined; see Service Virtual
Interface section in the Cards
and Ports chapter) to a router
interface.
• Enter no bind to unbind the
router interface.
Note: This command is available
only if the interface is not
loopback.
Binding router interface to PPP bind ppp <port-number> • Only one router interface can
port for PPPoE be bound to a PPP port.
• Enter no bind to unbind the
router interface.
Enabling/disabling DHCP client dhcp You cannot enable DHCP (for IPv4)
no dhcp in the following cases:
• Router interface is bound to a
PPP port.
• IPv4 address is configured.
• Router interface is not
unnumbered.
• DHCPv6 is enabled.
•
Providing client ID to DHCP server client-id id <string> You can specify an ID, or specify
client-id mac mac to indicate that the device
MAC address should be used as the
client ID.
Displaying the summary of ACLs show access-list summary Refer to Access Control List (ACL)
bound to router interface in the Management and Security
chapter for further information.
Displaying router interface status show status See Viewing Router Interface
Status.
Deleting a Router
You can delete a router if there are no router interfaces associated with it.
To delete a router:
• At the config# prompt, enter:
no router <number>
Router Interface: 3
Name: RI003
Admin:Up Oper: Up Bound to: svi 31
Field Description
Field Description
IP Addresses
Field Description
IPv6 address
MAC address
State The Neighbor Unreachability Detection state for the interface when
the address mapping in this entry is used:
• reachable – confirmed reachability
• stale – unconfirmed reachability
• delay – waiting for reachability confirmation before entering
probe state
• probe – actively probing
• invalid – invalidated mapping
• unknown – state cannot be determined for some reason
• incomplete – address resolution is being performed
Field Description
Field Description
Viewing RIB
You can view the RIB (Routing Information Base) by using the command show rib.
This command is available in the CLI contexts for IPv4 or IPv6, at the router level:
config>router(<number>)#.
Field Description
Status Marks with a “*” an ‘Active Route’, i.e. route entry is forwarded to the
(Active FIB (Forwarding Information Base)
Route)
RI Local interface through which the next hop of this route should be
reached
Field Description
IP Addresses
Field Description
Lease Obtained Date and time when the DHCP lease was obtained
Lease Expires Date and time when the DHCP lease will expire, if not renewed
Lease Renewal Date and time when the device will try to renew the DHCP lease.
renewal time = (expired - obtained) * 0.5
If the lease last chance for renewal time passes, -- is displayed.
Otherwise, the next renewal time is displayed, as follows:
• Date and time, formatted like other date and time values in the
device (by default as dd mm-yyyy hh:mm:ss)
• If real time clock is not available, time in seconds since startup.
Lease Rebinding Date and time when the device will try to rebind the DHCP lease
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Cannot delete; interface You tried to delete a router Disassociate router interfaces from
associated with the router entity that has router router.
interfaces associated with it.
Cannot set address; DHCP You tried adding an IPv4 Disable DHCP.
enabled address when DHCP is
enabled.
Cannot set address; too many You tried adding an IP address, Delete one of the associated addresses
addresses already configured but the amount of IP before associating a new IP address.
addresses already reached its
limit.
Cannot set address; Router You tried adding an IP address Unbind the router interface from the
Interface bound to PPP port when the router interface is PPP port.
bound to a PPP port.
Cannot modify; activated router You tried modifying or Shut down the router interface and try
interface removing a bound port while again.
the router interface was
activated (no shutdown).
You tried adding, modifying, or
removing a VLAN while the
router interface was activated
(no shutdown).
Cannot enable; DHCPv6 is You tried enabling DHCP even Disable DHCPv6.
enabled though DHCPv6 is enabled.
Cannot set; Router Interface You tried enabling DHCP while Unbind the router interface from the
bound to PPP port the router interface is bound PPP port.
to a PPP port.
OR
You tried enabling DHCPv6
client while router interface is
bound to PPP port.
Cannot enable; DHCP client is You tried enabling DHCP relay Disable DHCP client.
enabled while DHCP client is enabled.
Cannot set; DHCPv6 client is You tried enabling DHCPv6 Remove existing DHCPv6 client.
already defined client when there is already
one defined in the device.
Cannot enable; DHCP (v4) is You tried enabling DHCPv6 Disable DHCPv4.
enabled while DHCPv4 is enabled.
Cannot set; Router Interface is You tried enabling DHCPv6 Associate DHCPv6 client with a router
loopback interface client while router interface is interface that is not defined as a
defined as loopback interface. loopback interface.
Cannot activate; must be bound You tried activating a router Bind the router interface to a loopback
to port interface, which is neither a interface or a port.
loopback interface nor bound
to a port.
Cannot activate; PPP lower layer You tried activating the router
is not bound interface bound to PPP port,
when PPP lower layer port is
not bound.
• Bandwidth profiles
• Queue block profiles
• Queue group profiles
These profiles can be applied to the traffic flows to ensure the desired flow
prioritization.
Applicable Products
This feature is applicable to all ETX-2 products, with the following exceptions:
• Best effort queues are relevant only for ETX220A.
• The non-envelope policer coupling flag is relevant only for ETX220A.
• Multi-CoS flows and envelope policers are relevant only for ETX220A.
Standards
The following standards are supported:
• IEEE 802.1p
• IEEE 802.1Q
• MEF 10.3
Benefits
QoS allows you to optimize bandwidth, avoiding the need to allocate excessive
bandwidth to facilitate the necessary bandwidth for traffic at different
requirements of speed and quality.
Functional Description
Traffic Management
ETX-2 traffic management entities are called queue groups. They are configured
over physical ports. The queue groups consist of 2-level scheduling elements
(queue blocks) per port. The queue blocks consist of internal queues.
Additionally, shapers operate at per-scheduling-element level to shape traffic into
a required traffic profile (CIR, CBS or CIR/EIR, CBS/EBS).
Each flow is assigned to a queue block as its destination. Each queue block
includes scheduling queues in accordance with CoS delivery priorities. Flow
packets are mapped in the following ways to queues:
• Mapped explicitly to a specific queue
• Mapped to a queue according a queue mapping profile (p-bit or DSCP to
queue)
• Mapped according to the packet’s CoS, in case of bridge or ETP (set by CoS
mapping profile at the ingress), whereby CoS 7 is mapped to the lower
priority queue, and CoS 0 to the highest
Scheduling
ETX-2 supports a combination of traffic scheduling techniques, whereby
applications requiring low latency and jitter are mapped to Strict priority queues,
while other services are mapped to the remaining slots using weighted fair
queuing (WFQ) and best effort (BE):
• The Strict priority queues ensure minimal latency and jitter for the RT traffic,
even when a large amount of bursty data traffic is sent over the same uplink.
Strict priority traffic is always processed first, while flows mapped to the WFQ
slots are buffered until the strict priority queues are empty.
• The WFQ technique avoids scheduling starvation of lower priority queues and
ensures relatively fair allocation of bandwidth by sharing it among all flows. In
this manner, packets belonging to lower classes of service are not penalized
when higher priority queues are not empty and may still receive transmission
time. QoS-conformant scheduling is handled by assigning different weights to
the various queues instead of equally dividing overall bandwidth among all
active flows.
• BE (best-effort) queues transmit packets only if there are no packets in
higher level queues.
Congestion avoidance is provided by WRED profiles (see WRED Profiles).
Factory Defaults
See the following sections for each QoS type’s specific defaults.
0 Best effort
1 Background
2 Spare
3 Excellent effort
4 Controlled load
5 Video
6 Voice
7 Network control
Queue mapping profiles are used to convert the following user priorities into
internal priority queues.
Class of Service When ingress traffic is mapped to an internal CoS (e.g p-bit
(CoS) or DSCP to CoS) at the Bridge port ingress, ETP subscriber
ingress, and flow that uses an envelope policer
For each profile, you have to define the queue mapping to map the user priority
values to the internal queue values. The internal queues are combined into a
queue profile, which can be assigned to a queue block.
Factory Defaults
Examples
Class of Service (CoS) mapping profiles map the following user priorities to
internal CoS values:
Note
If the flow from UNI to NNI is classified with one of the above classifications
(p-bit only, ip-dscp, or ip-precedence), Up MEP and customer-tag-excluded MEP
do not work and it is therefore recommended not to use them.
Factory Defaults
By default, there are no CoS mapping profiles. When you create a CoS mapping
profile, it is configured as follows:
• Classification p-bit
• Mappings:
Map 0 to CoS 7.
Map 1 to CoS 6.
Map 2 to CoS 5.
Map 3 to CoS 4.
Map 4 to CoS 3.
Map 5 to CoS 2.
Map 6 to CoS 1.
Map 7 to CoS 0.
Untagged to CoS 7, for profile assigned to multi-Cos flow in case of p-bit
mapping
Non-IP to CoS 7, for profile assigned to multi-Cos flow in case of DSCP
mapping
Examples
untagged-map to-cos 0
exit all
Factory Defaults
By default, there is no color mapping profile. When a color mapping profile with
classification type p-bit is created, all the p-bit values are mapped to green.
Example
To create a color mapping profile kcolpb to map odd p-bit values to green, and
even to yellow:
exit all
configure qos
color-map-profile kcolpb classification p-bit
map 0 to yellow
map 2 to yellow
map 4 to yellow
map 6 to yellow
exit all
save
Marking Profiles
Marking profiles map the p-bit, IP precedence, DSCP, or CoS classifications to the
egress priority tags (p-bit)). The marking can also be done per color (green
and/or yellow), to support color re-marking, optionally specifying the Drop Eligible
Indicator (DEI) bit in the frame header.
Factory Defaults
ETX-2 provides a default non color-aware marking profile named MarkingProfile1,
which can be used when the ingress traffic is prioritized according to the 802.1p
requirements. It is defined with classification p-bit and method p-bit, and the
following markings:
• P-bit 0 => priority 0
• P-bit 1 =>priority 1
• P-bit 2 =>priority 2
• P-bit 3 =>priority 3
• P-bit 4 =>priority 4
• P-bit 5 =>priority 5
• P-bit 6 =>priority 6
• P-bit 7 =>priority 7
When a non color-aware marking profile is created, it has the same configuration
as MarkingProfile1.
Note You must specify cos if the marking profile is intended for use with a multi-CoS
flow.
The dei parameter affects the Drop Eligible Indicator (DEI) bit in transmitted
frames as follows:
always-green — Frames transmitted from the device are marked via the
DEI bit as not eligible to be dropped. In this case, the color-aware
parameter can be none or green-yellow.
always-yellow — Frames transmitted from the device are marked via the
DEI bit as eligible to be dropped. In this case, the color-aware parameter
must be green-yellow.
by-policer — Yellow frames transmitted from ETX-2 are marked via the DEI
bit as eligible to be dropped, and green frames transmitted from ETX-2
are marked as not eligible to be dropped. In this case, the color-aware
parameter can be none or green-yellow.
3. Map the user priority (and packet color, if it is a color-aware marking profile)
to a priority marking value according to the specific profile parameters
(classification and method), as follows.
At the config>qos>marking-profile(<profile-name>)$ prompt, enter:
Non color-aware profile:
mark <user-priority> to <priority-marking>
Color-aware profile:
mark <user-priority> {all|green|yellow} to <priority-marking>
Where user-priority value can be set to:
0-7 – for marking profile configured with classification p-bit, ip-
precedence, or cos
And priority-marking value can be set to:
0-7 – for marking profile configured with method p-bit
Bandwidth Profiles
ETX-2 supports the following bandwidth profiles:
You can control the egress bandwidth utilization by defining the committed
information rate (CIR) and committed burst size (CBS) in shaper and policer
profiles. You can also define the excessive information rate (EIR), excessive burst
size (EBS), and compensation in policer profiles.
CBS Defines the Committed Burst Size (CBS) for the current
profile. The CBS specifies the maximum guaranteed burst
size (“green bucket” size).
EIR Defines the Excess Information Rate (EIR). The EIR specifies
an extra bandwidth with no service guarantee (“yellow
bucket” rate).
EBS Defines the Excess Burst Size (EBS). The EBS specifies the
extra burst with no service guarantee (“yellow bucket”
size).
Compensation Defines the amount of bytes that the shaper or policer can
compensate for Layer-1 overhead (preamble and IFG) and
the overhead for the additional VLAN header in case of
stacking.
Color Aware You can specify the policer profile as color aware.
If the policer profile is specified as color aware, you can set the packet color as
follows:
1. If the arriving packet is marked green and the CIR bucket complies, the packet
color is set to green.
2. If the result of the preceding test is not true, then ETX-2 checks if the EIR
bucket complies (if the coupling flag is set, the CIR+EIR bucket is used):
If the test result is true, the packet color is set to yellow.
If the test result is false, the packet color is set to red (packet is
dropped).
Factory Defaults
The default for bandwidth-round-up is no bandwidth-round-up.
ETX-2 provides default bandwidth profiles, as specified in the following table.
compensation 0 0
When an envelope profile is created, it has the default values shown in the
following table.
Parameter Value
compensation 0
cf-policy sharing-excess-bw
color-aware no color-aware
cos <n> bandwidth cir 0 cir-max 10000000 cbs 0 eir 0 eir-max 10000000 ebs 0
CIR3
EIR3
1
Rank #3 CBS 3 CF3
0
EBS3
CIR2
EIR2
1
Rank #2 CBS 2
CF 2
0
EBS2 Envelope
2
CIR
EIR1
1
Rank #1 CBS1 CF1
0
EBS1
0 0 1
CF
When the envelope profile is assigned to a multi-CoS flow (see Multi-CoS Flows),
it enables the flow to share excess bandwidth. The bandwidth sharing can be
overflowed to the excess bucket (see Figure 11-22) or independent from the
excess bucket (see Figure 11-23).
CIR3
EIR3
1
3 3
CBS CF
EBS3
CIR2
EIR2
2
1
2
CBS CF
EBS2
2
CIR
EIR1
1
1
1
CBS CF
EBS1
CIRenv
EIRenv
CBS3 CF3
0
EBS3
CBS2 CF2
0
EBS2
CBS1 CF1
0
EBS1
Specifying the CIR (Kbps) and CBS bandwidth [cir <cir-kbit-sec>] [cbs <cbs-bytes>] Notes:
(bytes) bandwidth limits • CIR allowed values:
ETX203AM, ETX203AX,
ETX205A: 0–1,000,000
ETX220A: 0–10,000,000
(see Table 11-27 for the
shaper CIR granularity)
• CBS allowed values:
ETX203AM, ETX203AX,
ETX205A:
0, or 64–65535
ETX220A:
0, or 64–16777215
Compensating for Layer-1 overhead compensation <0–63> For pre-forwarding (ingress)
and additional VLAN tag (in bytes) traffic management, the
compensation is configurable in
the 0-63 range.
For post-forwarding (egress),
traffic management, the
compation is applied to level-0
shapers only. It can be set to 0
(data rate) or 20 (line rate).
Device CIR > 130 Mbps (fast) CIR <= 130 Mbps
(slow)
Examples
Multicast Multicast traffic from the port is limited per the configured
CIR and CBS bandwidth limits.
Unknown Unicast Unknown Unicast traffic from the port is limited per the
configured CIR and CBS bandwidth limits. This is relevant
only for traffic into a bridge.
The new policer profile parameters (except for name) are configured by
default as described in Factory Defaults.
3. Configure the policer profile as described in Configuring Policer Profile
Parameters.
Specifying the CIR (Kbps), CBS bandwidth [cir <cir-kbit-sec>] [cbs <cbs-bytes>] Notes:
(bytes), EIR (Kbps), and EBS (bytes) [eir <eir-kbit-sec>] [ebs <ebs-bytes>] • CIR & EIR allowed values:
bandwidth limits
ETX203AM, ETX203AX,
ETX205A:
0–1000000
ETX220A: 0–10000000
• CBS & EBS allowed values:
ETX203AM, ETX203AX,
ETX205A:
0, or 64–1000000
ETX220A:
0, or 64–2097151
• CIR can be set to zero only if
CBS is set to zero.
• EIR can be set to zero only if
EBS is set to zero.
• CIR + EIR must not exceed the
maximum available bandwidth.
• CBS should be greater than the
maximum frame size.
• For policer profiles that will be
attached to Ethernet ports to
limit broadcast/multicast
traffic, only the CIR and CBS
parameters are relevant (EIR
and EBS should be set to 0).
• A high-speed policer (CIR or
EIR >= 100,000 Kbps) cannot
be associated with more than
64 flows.
• The CIR and EIR granularity
depend on the configured
values, as described in
Table 11-28 and Table 11-29.
• The actual rate is rounded
down or up according to the
setting of
bandwidth-round-up.
• The CBS must be greater than
or equal to the CIR divided by
policer granularity.
Table 11-28. Granularity Rounding of Policer CIR/EIR for ETX203AM, ETX203AX, or ETX205A
Policer Type CBS/EBS <= 64,000 Bytes < 128,000 Bytes < 256,000 Bytes < 512,000 Bytes <
64,000 Bytes CBS/EBS <= CBS/EBS <= CBS/EBS <= CBS/EBS <=
128,000 Bytes 256,000 Bytes 512,000 Bytes 1,048,575 Bytes
Port policer, or 64 Kbps 128 Kbps 256 Kbps 512 Kbps 1 Mbps
flow policer with
CIR and EIR <
100,000 Kbps
CBS CBS < 2 MB 2 MB <= CBS < 4 MB <= CBS < 8 MB <= CBS < 16 MB <= CBS <
IR (CIR, EIR) 4 MB 8 MB 16 MB 32 MB
10000 <= IR < 100 Kbps 200 Kbps 400 Kbps 800 Kbps 1600 Kbps
100000 Kbps
(100Mbps)
Factor 1 2 4 8 16
Examples
Note CIR and EIR are rounded down to 64K granularity, as this is a low-speed policer
with burst size < 64,000 bytes.
exit all
configure qos policer-profile Policer4
bandwidth cir 50000 cbs 28000 eir 30000 ebs 20000
compensation 56
exit all
Factory Defaults
By default, no policer aggregates exist. When a policer aggregate is created, it
has the following configuration:
• No assigned policer profile
• No assigned flows
• Rate sampling window (interval for sampling the associated flow statistics)
set to 15 minutes
Note You assign flows to the policer aggregate in the flow level (see Configuring Flows
for details).
Examples
An envelope profile with the specified name is created and the following
prompt is displayed:
config>qos>envelope-profile(<envelope-profile-name>)$
The new envelope profile parameters are configured by default as
described in Factory Defaults.
3. Configure the envelope profile as described in Configuring Envelope Profile
Parameters.
Specifying the CIR (Kbps), CBS cos <value> bandwidth [cir <cir-kbit-sec>] • Range for cos value is 0–7; you can
(bytes), EIR (Kbps), and EBS [cir-max <cir-max-kbit-sec>] [cbs <cbs-bytes>] define up to four cos values in an
(bytes) bandwidth limits, for a [eir <eir-kbit-sec>] [eir-max <eir-max-kbit-sec>] envelope profile.
particular CoS [ebs <ebs-bytes>] [coupling-flag <coupling-flag>] • Range for <cir-kbit-sec>,
<cir-max-kbit-sec>, <eir-kbit-sec>,
and <eir-max-kbit-sec>:
0–10000000 (0–10 Gbps)
• Range for <cbs-bytes>,
<ebs-bytes>:
0–2000000 (0–2Mbytes)
• <cir-max-kbit-sec> must be greater
than or equal to <cir-kbit-sec>.
• <eir-max-kbit-sec> must be greater
than or equal to <eir-kbit-sec>.
• coupling-flag controls the path of
overflow tokens: 0=overflow to
committed token bucket, 1=
overflow to excess token bucket.
Factory Defaults
ETX-2 provides a default queue block profile named DefaultQueue1, which
defines queues 0–7 as follows:
• Congestion avoidance – WRED profile corresponding to queue
• Scheduling method – WFQ, with weight set to 100
• Depth – 49,152
Specifying WRED profile that congestion-avoidance wred profile wred-profile-name – name of predefined wired
provides congestion avoidance policy <wred-profile-name> profile.
Specifying queue depth (in bytes) depth <value> Possible values: 64–1048576 for ETX-2 1GbE port;
64-8380416 for ETX220A 10GbE port
Notes:
• If queue depth is configured to below 64, it is
automatically rounded up to 64 bytes.
• The queue depth that you configure might be
changed by ETX-2 due to granularity (see
Table 11-30 for ETX203AM, ETX203AX, or
ETX205A; Table 11-31 for ETX220A). After you
configure the queue depth, it is recommended to
use info detail to see the actual value
• A queue contains 511 buffers, therefore it is
possible for the queue to be full when every
buffer is in use, even if the queue size has not
reached the maximum. This is more likely to
happen in the case of relatively small frame sizes.
Setting scheduling method scheduling { strict | wfq <weight>| The WFQ weight range is 3–1000
best-effort} Strict queues must have queue indices lower than
WFQ or best-effort queues, and WFQ queues must
have queue indices lower than best-effort queues.
0–1024 64
1025–16383 1024
16384–262143 16384
262144–1048576 262144
0–65535 64
65536–131071 128
131072–262143 256
262144–524287 512
524288–1048575 1024
1048576–2097151 2048
2097152–4194303 4096
Examples
Factory Defaults
ETX-2 provides a default queue group profile named DefaultQueueGroup,
configured as shown:
ETX-2# configure qos queue-group-profile DefaultQueueGroup
ETX-2> config>qos>queue-group-profile(DefaultQueueGroup)# info
detail
queue-block 1/1
name "Level1QueueBlock"
profile "Scheduling1"
no shaper
exit
queue-block 0/1
name "Put your string here"
profile "DefaultQueue1"
bind queue 0 queue-block 1/1
shaper profile "Shaper1"
exit
queue-block 0/2
name "Put your string here"
profile "DefaultQueue1"
bind queue 1 queue-block 1/1
shaper profile "Shaper1"
exit
Note
Normally there is no need for you to enter the bind command. When you add a
queue block in level 0 to the profile, bind is done automatically.
You cannot use the bind command if the queue group contains a single
queue block in level 0.
Examples
Note This example uses the shaper profile and queue block profile created in the
examples in the preceding sections.
exit all
configure qos queue-group-profile QGroupProf1
queue-block 0/1
profile QBlockProf1
shaper profile Shap2
exit all
WRED Profiles
The ETX-2 traffic management engine employs a weighted random early discard
(WRED) mechanism for intelligent queue management and congestion avoidance.
The WRED algorithm monitors the fill level of each queue and determines
whether an incoming packet should be queued or dropped, based on statistical
probabilities.
Applicable Products
This feature is applicable to all ETX-2 products.
Functional Description
Congestion control policy is defined by:
• Tail drop for green packets – Packets are queued if there is room in the
queue, and are dropped if the queue is full.
• WRED profile for yellow packets
WRED profiles include the following parameters:
100%
Tail drop for
green packets
Queue depth
Min Max 100% (% of maximum)
threshold threshold
Factory Defaults
There are eight WRED profiles available, named WREDProfile0 through
WREDProfile7, bound to the corresponding queues.
Note You can configure the parameters for the color yellow only.
Example
Applicable Products
This feature is applicable to ETX205A and ETX220A with PTP options, with the
following conditions:
• The following 1588v2 entities are supported by ETX205A and ETX220A:
Standalone slave clock
Standalone master clock (only for ETX205A with GNSS option)
Boundary clock
• For G.8275.1, the PTP port limits are as follows:
PTP ports with master role per device:
ETX205A: Up to 6
ETX220A: Up to 13
PTP ports with slave role per device (ETX205A, ETX220A): Up to 2
• <slot> is relevant for ETX220A.
Standards
IEEE 1588 Precision Time Protocol
Benefits
The Precision Time Protocol (PTP), defined in the IEEE 1588 standard, is a
high-precision time protocol for synchronization of clocks over a PSN. PTP is
beneficial for applications that recover or distribute timing information.
Best Master Clock Algorithm (BMCA) improves clock synchronization.
Functional Description
PTP Protocols
G.8265.1 is an end-to-end protocol based on IP packets. The synchronization
message rate and announce rate are negotiated between the slave and master.
The G.8265.1 protocol is used to obtain frequency and time.
G.8275.1 is a point-to-point protocol based on Layer-2 multicast messages. There
is no signaling phase; the message rate is always 16 PPS and the announce rate is
8 PPS. The G.8275.1 protocol is used to obtain time rather than frequency. It
obtains frequency from SyncE to get a more accurate time. The reference time is
taken from the CSM source if it is PRC; otherwise from the 1588v2 frequency.
1588v2 Entities
ETX2 supports the following 1588v2 entities:
Boundary clock Transfers time of day (ToD) and frequency from a remote
master clock to one or more slave clocks. The boundary
clock is implemented as a back-to-back master and slave
clock.
Note
Only IPv4 addresses are supported in the timing/synchronization messaging.
PTP Port
When a 1588v2 entity acts according to G.8275.1, you need to configure a PTP
port entity for each clock entity. The PTP port has a provisioned state that you
configure, as well as an actual state. The provisioned state can be one of the
following:
Slave Clock
The standalone slave clock complies with G.8265.1 or G.8275.1. The slave clock
complies with the standard G.8265.1 Telecom Profile 1 (E2E), as well as
Symmetricom Telecom-2008, when working according to G.8265.1.
G.8265.1
The G.8265.1 slave clock can work in one-way mode, where it receives only
frequency from up to two IEEE 1588 master clocks, or in two-way mode (full
synchronization), where it receives frequency and time. When the master clock
grants signal transmission it notifies the slave clock of the master clock quality
level and source port identification, then periodically transmits synchronization
signals.
The slave clock works in the following recovery modes:
G.8275.1
The G.8275.1 slave clock receives frequency from one or more IEEE 1588 master
clocks that periodically transmit synchronization signals.
The slave clock works in time (also referred to as hybrid) recovery mode. The slave
uses both Sync and Delay messages to reconstruct the remote clock, and takes
the reference frequency is taken from the clock domain (same the G.8265.1 slave
in hybrid mode).
G.8273.2 clock specification supports G.8275.1.
Boundary Clock
The boundary clock is defined in ETX2 as a back-to-back master and slave clock
sharing the same IP address and PTP domain. The slave can be a G.8265.1 or
G.8275.1 entity, and the master can be a G.8265.1 or G.8275.1 entity, or it can be
a dual mode master that supports both G.8265.1 and G.8275.1.
The boundary clock performs the following tasks:
• The local slave recovers reference ToD and frequency from a remote master.
• The local master uses the local slave recovered ToD as its reference ToD.
• The local master uses the local slave recovered frequency as its reference
frequency.
Forwarding
G.8265.1
You need to configure the following for the G.8265.1 clock entities to function
correctly:
• Corresponding SVI
• Corresponding flows
• Corresponding router interface. For the G.8265.1 boundary clock, the SVI
corresponding to the router interface must be connected via flow to a bridge
port. For the G.8265.1 master standalone clock, the SVI corresponding to the
router interface must be connected via flow to a bridge port if using more than
one Ethernet port.
Note The G.8265.1 standalone master clock can forward over a ring.
In order to communicate with the remote master of the G.8265.1 boundary clock,
a peer must be defined with the remote master IP address; additionally, if the
remote master is not in the same subnet as ETX2, a static route must be
configured to define how to reach the remote master.
G.8275.1
1588v2 traffic for PTP ports is transmitted and received by the 1588 entity
to/from an Ethernet port. You need to configure the following for the G.8275.1
clock entities to function correctly:
• Corresponding SVI
• Corresponding PTP port
• Corresponding flows. The traffic from the Ethernet port to the SVI port should
be classified as untagged. The traffic from the SVI port to the Ethernet port
should be classified to match all packets.
Factory Defaults
By default, there is no configured master or slave clock.
Specifying which mac {01-1b-19-00-00-00 | Layer-2 IEEE 1588 packets have destination
destination MAC address to 01-80-c2-00-00-0e} MAC address 01-1B-19-00-00-00 or
use 01-80-C2-00-00-0E
Setting port priority priority <value> Priority is used when selecting the best
source from the PTP ports that are
provisioned as slaves.
Provisioning PTP port state state {master | slave | auto | master – distributes time
auto-no-slave} slave – provides time source
auto – reserved for future use
auto-no-slave – reserved for future use
See Configuring PTP Ports for more details
on the PTP port state.
Viewing network metrics show network-metrics See Viewing Clock Recovery Metrics.
Specifying the requested announce [rate { 16sec | 8sec | The allowed range for grant-period is
rate for announce 4sec | 2sec | 1sec | 500msec | 60–1000 (default 300)
messages 250msec | 125msec }
[minimum-expected { 16sec |
8sec | 4sec | 2sec | 1sec |
500msec | 250msec |
125msec }]
[grant-period <grant-period>
Configuring port associated clock-identity clock-id <id> If this is not configured, by default a
with clock port [<slot>/]<number> standard clock ID is generated.
Specifying if recovered delay-respond [rate {16pps | The recovered clock works in one-way mode
clock works in one-way or 32pps | 64pps | 128pps }] if no delay-respond is entered. It works in
two-way mode, and [minimum-expected { 16pps | two-way mode if delay-respond is entered
desired rate if applicable 32pps | 64pps | 128pps }] with parameters.
[grant-period <grant-period>] The allowed range for grant-period is
60–1000 (default 300).
Setting quality level quality-level { prc | ssu-a | The quality level values are according to the
ssu-b | type1-sec | type1-dnu | network type.
type1-ssm-based }
quality-level { prs | stu | st2 |
tnc | st3e | st3 | smc | st4 | dus
| type2-ssm-based | prov }
Specifying the requested sync [rate { 16pps | 32pps | The allowed range for grant-period is
rate for synchronization 64pps | 128pps }] 60–1000 (default 300).
messages [minimum-expected { 16pps |
32pps | 64pps | 128pps }]
[grant-period <grant-period>]
Displaying statistics show statistics running Displaying the 1588v2 statistic counters
Note When configuring a boundary clock, the slave clock must be configured before the
master clock.
Defining the 1588v2 distributed-mode {frequency | In frequency mode, the master transmits sync and
message exchange mode time-frequency} announce messages to slaves.
In time-frequency mode, the master transmits
sync, announce, and delay response messages to
slaves.
Defining the master IP ip-address <address> The IP address must be the same as the IP address
address of the dedicated router interface.
Defining remote slave slave <ip> See the commands in the slave level below.
Defining the sync-rate { 16pps | 32pps | 64pps | All slaves within the domain must use the same
synchronization message 128pps } message rate.
rate
Enabling the master clock no shutdown shutdown disables the master clock.
Viewing current metrics show network-metrics current The metrics for the current
interval are displayed as
shown in Viewing Current
Metrics; see Table 9-1.
Viewing the metrics for a selected show network-metrics interval • Allowed values for
interval <interval-number> interval-num: 1–24
Viewing all metrics show network-metrics all The metrics are displayed as
shown in Viewing Current
Metrics and Viewing Metrics
for Selected Interval; see
Table 9-1.
Viewing metrics for all intervals show network-metrics all-intervals The metrics for all intervals
are displayed as shown in
Viewing Metrics for Selected
Interval; see Table 9-1.
Parameter Description
Parameter Description
minTdev (ns) Minimum Time Deviation PDV metric that characterizes floor delay
PDV spectral noise, as defined in ITU-T G.8260
Note: The minTdev values displayed in the network metrics are
squares of the actual minTdev values; therefore, you must compute
the square roots to obtain the correct values.
Elapsed Time This time counter, in seconds, shows the statistics total information
gathering time and indicates the statistics reliability (tightness).
Sampling Time Time of sample
Sampling Date Date of sample
Examples
G.8265.1
config flows
classifier-profile "Router_All" match-any
match all
exit
classifier-profile "Router_Untagged" match-any
match untagged
exit
flow "Router_In"
classifier "Router_Untagged"
policer profile policer1
ingress-port ethernet 1
egress-port svi 1 queue 1
no shutdown
exit
flow "Router_Out"
classifier "Router_All"
policer profile policer1
ingress-port svi 1
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit all
config router 1
interface 1
address 172.18.141.15/24
bind svi 1
no management-access
no shutdown
exit
static-route 172.17.171.0/24 address 172.18.141.1 metric 1
exit
peer 1 ip 172.17.171.158
exit all
configure
system
clock
domain 1
source 1 recovered 1
priority 1
quality-level ssm-based
wait-to-restore 0
clear-wait-to-restore
exit
exit
recovered 1 ptp
wait-to-restore 0
master 1
peer 1
priority 1
sync grant-period 60
announce grant-period 60
delay-respond grant-period 60
quality-level type1-ssm-based
no shutdown
exit
no shutdown
exit
Master Num : 1
IP : 222.17.171.158
PTSF : NACT
Clock Identity : 00B0AEFFFE011BC10001
Received QL : Type-1 SEC
Granted Sync Rate (pps) : 64
Granted Sync Period (sec) : 60
Granted Announce Rate (pps) : 2
Granted Announce Period (sec) : 60
Granted Delay Respond Rate (pps) : 64
Granted Delay Respond Period (sec) : 60
Master Num : 2
IP : 222.18.159.59
PTSF : NACT
Clock Identity : 00B0AEFFFE011BC10001
Received QL : Type-1 SEC
Granted Sync Rate (pps) : 64
Granted Sync Period (sec) : 60
Granted Announce Rate (pps) : 2
Granted Announce Period (sec) : 60
Granted Delay Respond Rate (pps) : 64
Granted Delay Respond Period (sec) : 60
G.8275.1
#****************Configure SVIs
exit all
configure port svi 1
no shutdown
exit
svi 4
no shutdown
exit
ethernet 1
l2cp profile SSM
tx-ssm
exit
ethernet 4
l2cp profile SSM
tx-ssm
exit
exit
#****************Configure flows
flow eth1_svi1
classifier untagged
ingress-port ethernet 1
egress-port svi 1
no shutdown
exit
flow svi1_eth1
classifier all
ingress-port svi 1
egress-port ethernet 1 queue 1 block 0/1
no shutdown
exit
flow eth4_svi4
classifier untagged
ingress-port ethernet 4
egress-port svi 4
no shutdown
exit
flow svi4_eth4
classifier all
ingress-port svi 4
egress-port ethernet 4 queue 4 block 0/1
no shutdown
exit
exit
#****************Configure PTP ports
system clock ptp-port 1 g.8275-1
port 1
bind svi 1
no shutdown
exit
port 4
bind svi 4
no shutdown
exit
exit
G.8265.1
To configure a boundary clock with G.8265.1 slave and master (for ETX220A):
#**************************** Configure slave clock ************
exit all
configure
system
clock
recovered 0/1 ptp
no ptp-domain
master 1
priority 0
peer 1
sync-rate 128pps
delay-respond 128pps
no shutdown
exit
no shutdown
exit
G.8275.1
To configure a boundary clock with G.8275.1 slave and master for ETX205A:
• Clock source: Ethernet port 1
• Flows between:
Ethernet port 1 and SVI 2
Ethernet port 3 and SVI 4
Ethernet port 5 and SVI 6
• PTP ports:
Port 3 bound to SVI 2
Port 5 bound to SVI 4
Port 7 bound to SVI 6
#****************Configure SVIs
exit all
configure port svi 2
no shutdown
exit
svi 4
no shutdown
exit
svi 6
no shutdown
exit
#****************Configure flows
flow eth1_svi2
classifier untagged
ingress-port ethernet 1
egress-port svi 2
no shutdown
exit
flow svi2_eth1
classifier all
ingress-port svi 2
egress-port ethernet 1 queue 1 block 0/1
no shutdown
exit
flow eth3_svi4
classifier untagged
ingress-port ethernet 3
egress-port svi 4
no shutdown
exit
flow svi4_eth3
classifier all
ingress-port svi 4
egress-port ethernet 3 queue 3 block 0/1
no shutdown
exit
flow eth5_svi6
classifier untagged
ingress-port ethernet 5
egress-port svi 6
no shutdown
exit
flow svi6_eth5
classifier all
ingress-port svi 6
egress-port ethernet 5 queue 5 block 0/1
no shutdown
exit
exit
save
Dual Mode
To configure a boundary clock with G.8265.1 slave, and dual mode master for
ETX205A:
• G8265.1 slave:
PTP domain 4
SVI port 1
VLAN 2385
Flows between Ethernet port 1 and bridge port 1
Flows between SVI port 1 and bridge port 2
Remote master IP address 172.19.171.100
• G8265.1 master:
PTP domain 4
IP address 172.19.171.101
Flows between Ethernet ports 2, 4, 6 and bridge ports 3, 5, 7
• Router interface 1 (used for both G8265.1 slave and G8265.1 master):
IP address 172.19.171.101
SVI port 1
• G8275.1 master:
PTP domain 5
Flows between Ethernet ports 3–5 and SVI ports 3–5
PTP ports 3–5 bound to SVI ports 3–5
ingress-port ethernet 6
egress-port bridge-port 1 7
reverse-direction block 1/1
no shutdown
exit
no shutdown
exit all
save
G.8265.1
G.8275.1
#****************Configure SVI
exit all
configure port svi 1
no shutdown
exit
#****************Configure flows
flow eth1_svi1
classifier untagged
ingress-port ethernet 1
egress-port svi 1
no shutdown
exit
flow svi1_eth1
classifier all
ingress-port svi 1
egress-port ethernet 1 queue 1 block 0/1
no shutdown
exit
Dual Mode
#****************Configure flows
flow eth1_svi1
classifier untagged
ingress-port ethernet 1
egress-port svi 1
no shutdown
exit
flow svi1_eth1
classifier all
ingress-port svi 1
egress-port ethernet 1 queue 1 block 0/1
no shutdown
exit
flow eth2_svi2
classifier untagged
ingress-port ethernet 2
egress-port svi 2
no shutdown
exit
flow svi2_eth2
classifier all
ingress-port svi 2
egress-port ethernet 2 queue 1 block 0/1
no shutdown
exit
flow eth3_svi3
classifier untagged
ingress-port ethernet 3
egress-port svi 3
no shutdown
exit
flow svi3_eth3
classifier all
ingress-port svi 3
exit
domain 1
sync-network-type 1
quality min-level-station dnu
max-frequency-deviation 1200
source 1 gnss 1
priority 1
quality-level prc
wait-to-restore 0
exit all
save
Master To Slave
-----------------------------------------------------------------------------
Id Tau Tdev minTdev Elasped Time
(Sec) (ns) (ns)
-----------------------------------------------------------------------------
1 1 100 501 00:33:29
2 2 55 452 00:33:28
3 4 41 400 00:33:28
4 8 39 400 00:33:29
5 12 71 400 00:33:25
6 16 121 438 00:33:21
7 24 171 411 00:33:14
8 32 231 520 00:33:06
9 48 180 484 00:32:51
10 64 162 593 00:33:07
11 96 63 674 00:32:06
12 128 115 402 00:32:07
13 196 146 547 00:32:41
14 256 138 673 00:29:57
15 384 132 879 00:32:07
16 512 96 400 00:25:46
17 768 172 400 01:04:00
18 1024 116 400 00:51:14
19 2048 1 1 00:34:14
20 4096 1 1 00:00:18
21 8192 1 1 00:00:19
22 32768 1 1 00:00:19
Slave To Master
-----------------------------------------------------------------------------
Id Tau Tdev minTdev Elasped Time
(Sec) (ns) (ns)
-----------------------------------------------------------------------------
1 1 128 449 00:33:30
2 2 63 400 00:33:30
3 4 45 400 00:33:28
4 8 54 406 00:33:29
5 12 75 400 00:33:25
Master To Slave
-----------------------------------------------------------------------------
Id Tau Tdev minTdev Elapsed Time
(Sec) (ns) (ns)
-----------------------------------------------------------------------------
1 1 41448968 58527396 00:05:49
2 2 18079422 28993502 00:05:48
3 4 5276496 15718937 00:05:48
4 8 1201367 12813626 00:05:45
5 12 691645 12206705 00:05:49
6 16 506413 8053903 00:05:38
7 24 622610 3623477 00:05:39
8 32 347378 4017002 00:05:22
9 48 78378 9761690 00:05:39
10 64 139133 6660025 00:05:23
11 96 606 139842 00:04:53
12 128 1 1 00:04:19
13 196 1 1 00:03:19
14 256 1 1 00:04:21
15 384 1 1 00:00:11
16 512 1 1 00:00:13
17 768 1 1 00:00:14
18 1024 1 1 00:00:15
19 2048 1 1 00:00:15
20 4096 1 1 00:00:18
21 8192 1 1 00:00:19
22 32768 1 1 00:00:19
Slave To Master
-----------------------------------------------------------------------------
Id Tau Tdev minTdev Elapsed Time
(Sec) (ns) (ns)
-----------------------------------------------------------------------------
1 1 617756 400 00:30:44
2 2 770042 400 00:30:44
3 4 344708 400 00:30:44
4 8 246177 2935 00:30:41
5 12 226724 65673 00:30:37
6 16 159360 316373 00:30:41
7 24 218542 1682603 00:30:27
8 32 231636 3483920 00:30:27
9 48 203230 6556856 00:30:29
10 64 166905 9179698 00:29:55
11 96 103179 14061712 00:30:29
12 128 88556 19896568 00:29:55
13 196 79678 34140880 00:29:25
14 256 50201 47704072 00:29:57
15 384 60187 119676112 00:25:45
16 512 60686 237447312 00:25:46
17 768 1 1 00:25:47
18 1024 1 1 00:17:10
19 2048 1 1 00:00:15
20 4096 1 1 00:00:18
21 8192 1 1 00:00:19
22 32768 1 1 00:00:19
Applicable Products
This feature is applicable to ETX205A and ETX220A with timing options. The
<slot> parameter is relevant for ETX220A.
Standards
ITU-T G.8261/G.8262-G.8264
Benefits
The clock selection provides synchronization over packet transport networks.
Functional Description
You can configure a slave (recovered) clock that complies with the IEEE-1588
Precision Time Protocol (PTP). You need to configure the clock domain before
configuring the recovered clock.
ETX2 supports one clock domain with up to two clock sources. The sources can be
network/user Ethernet ports, station clock, or internal GPS clock (in the case of
ETX205A with GNSS).
The timing subsystem automatically selects the best timing source to use for
synchronization.
Clock Domain
The domain parameters include the synchronization network type and the timing
quality level.
The synchronization network type identifies the type of synchronization network
connections and the synchronization level. Each synchronization network
connection is provided by one or more synchronization link connections, each
supported by a synchronized PDH trail, SDH multiplex section trail, or 802.3
physical media trail.
The synchronization network types are:
i. Option I (Europe)
ii. Option II (USA)
You can define the timing quality level of the domain and source, or work without
quality level. The supported quality levels are according to the synchronization
network type, as shown in the following tables. The quality levels are shown in
order of highest quality level to lowest quality level.
DNU Do Not Use – This signal should not be used for synchronization. Lowest
DUS Don't Use for Sync – This signal should not be used for synchronization. Lowest
Factory Defaults
By default, if a timing card is installed in the unit a clock domain entry is created
with the following configuration:
• Synchronization network type 1
• Minimum quality DNU
• Mode auto (clock selection mechanism functions normally)
Setting clock mode mode { auto | free-run | force-t0-holdover } auto – Clock selection
mechanism functions normally,
e.g. the best available clock
source is selected for
synchronization.
free-run – Internal oscillator is
used for synchronization.
force-t0-holdover – Clock is no
longer synchronized to
reference clock source.
Setting minimum quality of quality min-level-station { prc | ssu-a | ssu-b | sec | dnu } Typing no quality removes the
clock quality min-level-station { prs | stu | st2 | tnc | st3e | st3 | minimum quality parameter. If
smc | st4 | dus | prov } no minimum quality is defined
for the domain you cannot
quality min-level-station { unk | sec | dnu }
configure quality level for the
sources. A clock source with
quality level lower than the
defined minimum quality is
ignored by the clock selection
mechanism.
Note: The quality values are
according to the
synchronization network type
defined for the domain (see
Table 9-2 and Table 9-3).
Clock Sources
You can define up to two clock sources for the domain. The sources can be:
• Ethernet ports
• Recovered clock
• Station clock
• Internal GPS clock (for ETX205A with GNSS)
Factory Defaults
When a clock source is created, its default configuration is the following (see the
task list below for explanations of the parameters):
• Priority = 2
• Wait-to-restore = five minutes (300 seconds)
• Hold-off = 300 milliseconds
Setting quality level quality-level { prc | ssu-a | ssu-b | sec | dnu | ssm-based } Notes:
quality-level { prs | stu | st2 | tnc | st3e | st3 | smc | st4 | • If no minimum quality is
dus | ssm-based | prov } defined for the domain, this
command is not available.
• The quality level values are
according to the
synchronization network
type defined for the domain
(see Table 9-2 and
Table 9-3)
• The quality level ssm-based
indicates the quality level is
based on SSM messages.
This option requires that if
an Ethernet port is being
used as the clock source,
the port is associated with
an L2CP profile that
specifies peer action for
MAC 0x02.
Setting interface type interface-type e1 [{balanced | unbalanced}] If you specify e1 or 2mhz and
Note: You can configure interface-type 2mhz [{balanced | unbalanced}] do not specify balanced or
the interface type only if unbalanced, by default the
the station clock is interface is set as balanced.
administratively disabled
(shutdown).
Examples
To configure clock selection for ETX205A:
• Domain 1:
Synchronization network type 2
Quality level: Timing source is Stratum 3E clock
Source 1: Ethernet port 3 (which is configured with L2CP profile with peer
for MAC 0x02, and transmitting of clock SSM messages)
exit all
configure port l2cp-profile ssm
mac 0x02 peer
exit
ethernet 3
l2cp profile ssm
tx-ssm
exit all
ETX2>config>system>clock>domain(1)>source(1)$ exit
ETX2>config>system>clock>domain(1)# info detail
sync-network-type 2
quality min-level-station st3e
max-frequency-deviation 1200
mode auto
force-t4-as-t0
echo "Clock Source Configuration"
# Clock Source Configuration
source 1 rx-port ethernet 3
priority 2
quality-level ssm-based
wait-to-restore 300
hold-off 300
exit
Applicable Products
This feature is applicable to all ETX2 products, and to the integrated x86
processor, with the following restrictions:
• Manual configuration of the date and time is relevant for ETX2 products, as
well as the integrated x86 processor.
• SNTP configuration is relevant for ETX2 products.
• NTP configuration is relevant for integrated x86 processors (in ETX205A with
PMC).
Benefits
SNTP and NTP synchronize the internal clocks of network devices to a single time
reference source. SNTP and NTP provide comprehensive mechanisms to access
national time dissemination services, organize the NTP subnet of servers and
clients, and adjust the system clock in each participant. It improves the
timekeeping quality of the network by using redundant reference sources and
diverse paths for time distribution.
Functional Description
Network Time Protocol (NTP) is a networking protocol for clock synchronization
between computer systems over packet-switched, variable-latency data networks.
It is a large and very complex application for the synchronization of computers and
computer networks, incorporating complex statistical algorithms that filter out
small discrepancies in time and makes time adjustments. It synchronizes all
participating computers to within a few milliseconds of Coordinated Universal Time
(UTC).
Simple Network Time Protocol (SNTP), a less complex implementation of NTP, uses
the same protocol without requiring the storage of state over extended periods of
time. It synchronizes the internal clocks of network devices to a single time
reference source.
The SNTP client operates in one of the following modes:
Factory Defaults
The default configuration of the SNTP/NTP parameters is:
• No SNTP/NTP servers are defined.
• Polling interval is set to 15 minutes (relevant for SNTP only).
When an SNTP/NTP server is defined, its default configuration is:
• IP address is set to 0.0.0.0
• Not preferred
• Administratively disabled (shutdown)
Defining the date date <date> Date is according to the configured date
format.
Displaying daylight saving time show summer-time For details and an example on how to to
scheduling information view scheduled daylight saving time in your
device, refer to Viewing Scheduling
Information in the Operation and
Maintenance chapter.
Defining the time zone relative zone utc [<[{+|-}]hh[:mm]>] Possible values:
to Universal Time Coordinated -12:00 to +12:00, in 30-minute increments
(UTC)
Setting polling interval for SNTP poll-interval interval <minutes> • If interval parameter is
requests poll-interval fast-mode specified, the allowed
range of minutes is:
1–1440
• If fast-mode parameter is
specified, the interval is set
to 4 seconds (for accuracy
of TWAMP one-way
metrics).
Setting UDP port for NTP udp port <udp-port> Possible values: 1–65535
requests, to a specific UDP port udp default
or to default UDP port (123)
Examples
exit all
configure system date-and-time
date-format mm-dd-yyyy
date 05-17-2012
time 17:40
zone utc -04:30
NTP Server Type UDP Port Tstap Date Time Strat Received
• Administratively enabled
exit all
configure system
date-and-time
zone utc +03:00
ntp
server 1
address 172.17.171.141
prefer
no shutdown
exit
Applicable Products
This feature is applicable to all ETX2 products.
Factory Defaults
By default, no scheduling is configured.
The default value for daylight saving time offset is 60 minutes.
Functional Description
You can specify when the device local system time should reflect the start of
daylight saving time by adding an offset, and when it should reflect the end of
daylight saving time by subtracting the offset.
Daylight saving time can be scheduled in one of the following ways:
One shot Daylight saving time starts and ends once, at a specified
date and time (e.g. November 6 2016).
Note ETX2 logs the start and end of daylight saving time with the events
summer_time_started and summer_time_ended, respectively. Each event is also
sent as an SNMP notification to management stations.
Examples
To schedule daylight saving time starting March 27 2016 at 1:00 and ending
October 27 2016 at 2:00:
exit all
configure system date-and-time
summer-time date march 27 2016 01:00 october 27 02:00
save
To schedule daylight saving time starting on the first Friday in March at 2:00 and
ending on the last Sunday in October at 3:00:
exit all
configure system date-and-time
summer-time recurring 1 friday march 02:00 last sunday october
03:00
save
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Schedule with this name You tried to create a new schedule with Specify a name that is not being used
already configured a name that is used by an existing by an existing schedule.
schedule.
Summer-time already You entered the summer-time command Delete the existing summer-time
configured to configure daylight saving time, but configuration; and then re-enter the
the scheduling of summer-time has summer-time command.
already been configured.
Recurring summer-time You tried to configure summer-time start Enter the summer-time command
start and end must be and end in the same month. with summer-time start and end in
on different months different months.
Summer-time cannot You entered the summer-time command Enter the summer-time command
end before it starts (with one-shot schedule type) with with summer-time start time earlier
summer-time end time earlier than than the end time.
summer-time start.
Applicable Products
This feature is applicable to ETX205A with GNSS port.
ETX205A with GNSS ordering option includes the following:
• 1588v2 grandmaster
• GNSS antenna
• 1PPS interface
• Station clock
Benefits
The GNSS antenna receives accurate timing data from the global navigation
satellite system, to aid in recovering the clock timing.
Functional Description
GNSS satellites continuously broadcast satellite position and timing data. The GNSS
antenna receives accurate timing data by tracking satellites and locking onto 1PPS
signals.
The GNSS antenna cable could potentially introduce delays in the timing signal
delivered to ETX205A; therefore, it is possible to configure a delay that can be
taken into account.
Factory Defaults
The default configuration is shown below.
antenna-delay 0
shutdown no shutdown
Configuring GNSS
To configure the GNSS receiver:
1. Navigate to configure system clock gnss 1.
The config>system>clock>gnss(1)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Example
To configure the GNSS receiver antenna delay to 150 nanoseconds:
exit all
configure system clock gnss 1
antenna-delay 150
exit all
save
Mode : GPS
Tracking : GNSS Locked
Latitude : N32:06:40.730
Longitude : E034:50:22.031
Height : 83.235
Tracking Satellites GNSS is tracking satellites, but is not locked to 1PPS signal.
Applicable Products
This feature is applicable to all ETX2 products.
ETX203AX
ETX203AX ETX203AX
ETX203AX/E1 ETX203AX-E1
ETX203AX/DSL ETX203AX-DSL
ETX203AM
ETX203AM ETX203AM
ETX205A
ETX205A/PTP ETX205A-PTP
ETX205A/4E1/SYE ETX205A-4E1/T1-SYE
ETX205A/8E1/SYE ETX205A-8E1/T1-SYE
ETX205A/SYE ETX205A-SYE
ETX220A
ETX220A/4XFP ETX220A-4XFP
The ETX2 management software allows you to assign a different name to the
unit, specify its location to distinguish it from the other devices installed in your
system, and assign a contact person. You cannot change the description of the
unit (, which by default, is the same as the name).
Applicable Products
This feature is applicable to all ETX2 products.
Standards
The commands below are based on RFC 3841.
Specifying contact person contact <contact-person> Typing no contact removes contact person.
Assigning device name name <device-name> The device name can be 0-255 characters; however, the device
prompt displays only up to 20 characters, therefore if you enter a
name with more than 20 characters, the prompt displays the first
19 characters followed by *.
For example, a command that defines a device with a name
longer than 20 characters:
ETX2# config sys name 12345678901234567ETX2
results in the prompt:
12345678901234567ET*#
You can view the complete device name by typing
show device-information.
Typing no name removes the name entirely.
Examples
To configure device information for ETX203AX:
• Device name – ETX203AX
• Location – floor-8
• Contact – Engineer-1
exit all
configure system
name ETX-203AX location floor-8
contact Engineer-1
exit all
Description :
Name : ETX-220A-4XFP Hw: 1.0/A, Sw: 6.51 (0.11)
Location : floor-8
Contact : Engineer-1
MAC Address : 00-20-D2-30-CC-9D
Engine Time : 05:13:31
10.3 Environment
You can define the temperature threshold of a chassis, enable or disable
overheat auto shutdown, and display information about chassis components.
Applicable Products
These features are applicable to all ETX2 products, with the following conditions:
• Redundant power supplies are applicable to ETX205A and ETX220A.
• Fans are applicable to ETX203AM, ETX205A, and ETX220A.
• Temperature sensors are applicable to ETX205A and ETX220A.
• Temperature threshold can be configured for ETX205A and ETX220A.
• Overheat auto shutdown is applicable to ETX205A and ETX220A only.
Functional Description
Device Temperature
You can define minimum and maximum temperature thresholds, as well as
temperature unit (Celsius or Fahrenheit), in order to receive trap notification that
the device temperature has left the allowed range or returned to the allowed
range.
You can optionally use a hysteresis mechanism to avoid sending an excessive
amount of traps when a threshold is repeatedly crossed. The hysteresis defines
the margin around the temperature thresholds for sending trap notification of
temperature threshold crossed:
• Sends trap notification of temperature too high when the temperature rises
above <maximum temperature + hysteresis value>.
• After sending a trap notification of temperature too high, it sends a trap
notification of temperature OK when the temperature falls below <maximum
temperature - hysteresis value>.
• Sends trap notification of temperature too low when the temperature falls
below <minimum temperature - hysteresis value>.
• After sending a trap notification of temperature too low, it sends the trap
notification of temperature OK when the temperature rises above <minimum
temperature + hysteresis value>.
Device Fan
The device fan is activated when the temperature of the device exceeds a certain
limit (defined by RAD HW engineers; non-configurable). When the device
temperature once again drops below that limit, the fan stops.
A Fan Failure alarm is issued if the device fan stops working or its speed drops
below 100RPM.
temperature overheat”), and then immediately enters over heat shutdown state.
During shutdown, the following occurs:
• All physical interfaces (ETH, SFP lasers, E1), including Rx and Tx, shut down.
• FPGA remains in reset state.
• CPU remains in low power mode.
ETX2 leaves over heat shutdown state, when the device temperature drops
below the minimum temperature threshold. The device then automatically resets
and boots up.
Examples
To define temperature thresholds:
• Minimum temperature = -20 degrees Celsius
• Maximum temperature = 50 degrees Celsius
• Hysteresis = 4
exit all
ETX-2>configure chassis
ETX-2>config chassis#
temperature-threshold celsius min -20 max 50 hysteresis 4
exit all
save
FAN Status
---------------------------------------------------------------
1 OK
FAN Status
---------------------------------------------------------------
1 OK
2 OK
FAN Status
---------------------------------------------------------------
1 OK
2 OK
3 OK
4 OK
5 OK
Applicable Products
This feature is applicable to all ETX2 products.
Functional Description
Device Files
ETX2 supports the following files:
• Software files: sw-pack-1..sw-pack-4
• License files: license-1..license-n
• Configuration files: running-config, rollback-config, startup-config, user-
default-config, factory-default-config, restore-point-config
• Alarm and event logs: log, brief-log
• Performance management: pm-0
• Banner file: banner-text
• Zero touch configuration file: zero-touch-config-xml
• DB schema file: db-schema
• DB configuration file: db-config
• Sniffer file: sniffer-file
• Scheduler log: schedule-log
• User script: user-script
• Script result: script-result
• User files: user/<filename>
• Syslog accounting log: accounting-log
User Directory
The ETX2 file system supports a directory for user files, called user. The size of
the user directory varies per device and is determined by the disk space that the
device can allot. You can copy files to and from the user directory, and delete
files that are not in use. User file names are strings between 1 and 32 characters
long.
SFTP Application
The SFTP protocol is used to provide secure file transfers via the product's
Ethernet interface. SFTP is a version of FTP that encrypts commands and data
transfers, keeping your data secure and your session private. For SFTP file
transfers, an SFTP server application must be installed on the local or remote
computer.
A variety of third-party applications offer SFTP server software. For more
information, refer to the documentation of these applications.
Note SFTP file transfers are carried out through TCP port 22. You should check that the
firewalls you are using on the server and Windows allow communication through
this port. If not, configure the firewall settings to open TCP port 22.
TFTP Application
The TFTP protocol is typically used for remote IP-to-IP file transfers via the
product's Ethernet interface. It can be used, however, for local file transfer as
well, as the transfer rate of the Ethernet interface is much faster than that of the
RS-232 interface.
For TFTP file transfers, a TFTP server application must be installed on the local or
remote computer. As it runs in the background, the TFTP server waits for any
TFTP file transfer request originating from the product, and carries out the
received request automatically.
A variety of third-party TFTP applications are available that allow the instant
creation of a TFTP server on a client computer. For more information, refer to the
documentation of these applications.
Note TFTP file transfers are carried out through UDP port 69. You should check that
the firewalls you are using on the server and Windows allow communication
through this port. If not, configure the firewall settings to open UDP port 69.
Setting the number of retry-timeout <seconds> timeout-seconds – the number of seconds required between
seconds required between attempts to reconnect to the TFTP server
attempts to reconnect to Possible values: 1-60
TFTP server Default: 15
Setting the TFTP server timeout <timeout-seconds> timeout-seconds – the number of seconds after which the TFTP
connection timeout server connection terminates
Possible values: 60-1000
Default: 60
Note Although you can add a description to any file, it is typically added to user files.
Note You can remove the file description by entering no description. This sets the
description to an empty string (the default).
Copying Files
You can use the copy command to copy files within the ETX2 unit, or
download/upload files to the ETX2 unit via SFTP/TFTP.
To copy files:
• At any prompt, enter:
copy <source-file-url> <destination-file-url>
Where:
• <file-url> = <url-prefix> <file>
• <url-prefix> can be empty, or one of the following:
tftp://<ipv4-address>/
tftp://[<ipv6-address>]/
sftp://<username>:<password>@<ipv4-address>[:<port>]/
sftp://<username>:<password>@<ipv6-address>[:<port>]/
xmodem:
Note It is not necessary to specify <port> when using the well-known SFTP port.
• <file> can be empty, or one of the following files, or the file name on a
remote computer if applicable. If <file> is on a remote computer it can
contain a path and file name, or just a file name.
startup-config
restore-point-config
rollback-config
running-config
user-default-config
factory-default-config
log
sw-pack-1
sw-pack-2
sw-pack-3
sw-pack-4
zero-touch-config-xml
banner-text
pm-0
db-schema
mac-table
db-config
1tm_1
1tm_2
1tm_9
schedule-log
accounting-log (can be uploaded; not downloaded)
sniffer-file
user-script
script-result
• The maximum length/range is:
<username> – 1–60 characters
<password> – 1–60 characters
<file> – 1–96 characters
<port> – 1–65535
Examples
Example
ETX-2# file
ETX-2>file# dir
Codes: C-Configuration S-Software L-License LO-Log O-Other B-Banner U-
User
Note It is optional to enter folder-name, as user is currently the only available folder in
the device.
Example
ETX-2# file
ETX-2>file# user-file-dir
Name Type Size (bytes) Created Status
------------------------------------------------------------
my-default-config U 2500 01.10.2017 read only
00:00:10
Example
ETX-2# file
ETX-2>file# show configuration-files
Configuration Last Modified Valid
-----------------------------------------------------------------------------
startup-config 2012-08-02 18:19:07 Yes
factory-default-config 2012-08-13 17:18:07 Yes
running-config 2012-04-10 00:00:06 Yes
running-config has been modified since last time it was equal to startup-config
ETX-2# file
ETX-2>file# show file-details user/my-user-file
Name : user/my-user-file
Size (bytes): 5000
Created : 01.10.1949
Status : --
Description : Running configuration backup from 1 October
To display the contents of user text files (i.e. files stored in the /user directory):
• At the file# prompt, enter show user-dir <filename>.
Note You can only display the contents of a user file that is not binary.
Example
ETX-2# file
ETX-2>file# show sw-pack
Name Version Creation Time State
-------------------------------------------------
sw-pack-1 2.10 01-10-1949 00:00:01 active
sw-pack-2 2.15 01-10-1949 00:00:10 ready
Deleting Files
You can delete the following files:
• restore-point-config
• rollback-config
• script-result
• startup-config
• sw-pack-<n>
• user-default-config
• user-script
• zero-touch-config-xml
When you delete or override a software pack file, ETX2 displays a message:
Previous software deleted; restore point lost.
When you delete the restore-point-config file, ETX2 displays a message: restore-
point-config delete; restore point lost.
To delete a file:
1. At the file# prompt, enter:
delete <file-name>
You are prompted to confirm the deletion.
2. Confirm the deletion.
Example
ETX-2# file
ETX-2>file# delete startup-config
! The file will be erased. Are you sure? [yes/no] _yes
10.5 Inventory
The ETX2 inventory table displays the unit’s components, hardware and software
revisions, and power supply types. You can display an inventory table that shows
all installed components, and you can display more detailed information for each
component. You can configure an alias name, asset ID, and serial number for
inventory components.
Applicable Products
This feature is applicable to all ETX2 products; however, the inventory display
differs for each product according to the different chassis components and port
configurations. <slot> is relevant for ETX203AM or ETX220A.
Note
PMC does not support the show summary-inventory command. However,
inventory information is stored in the MIB table entityTable, which can be read via
SNMP.
Standards
The inventory feature is implemented according to RFC 4133 – Entity MIB
(RFC 2737 was made obsolete by RFC 4133 version 3).
Benefits
You can monitor the installed components and hardware/software revisions.
You can display more information for each installed inventory component. To do
so, you need to enter the inventory level with the corresponding inventory
component index, which is displayed in the Index column in the output of
show summary-inventory.
Parameter Description
Description Description of component type, in the form:
RAD.<device-name>.< Physical Class>, e.g. RAD.ETX2.Port
Contained In Index of the component that contains the component for which
information is being displayed. This is 0 for the chassis, as it is not
contained in any component, and 1001 for all other components, as they
are all contained in the chassis.
Physical Class Class of component
Possible values: Chassis, CPU, Power Supply, Fan, Sensor, Port, Container,
Module
Relative Position Contains the relative position of this component among other components
in the same index range (e.g. index 4001–4002, etc.)
Parameter Description
FRU Indicates whether this component is a field replaceable unit that can be
replaced on site.
For ETX2 this is normally true only for the chassis, and for the dual power
supplies.
Examples
To display inventory summary for ETX203AM with SHDSL module:
ETX-203AM# configure system
ETX-203AM# config>system# show summary-inventory
Index Physical Class Name HW Ver SW Ver FW Ver
-----------------------------------------------------------------------------
1001 Chassis ETX-203AM 0.00 6.51 (0.11) 1.5.1.0.0.0.0.8
3001 Container Slot 1
3002 Container Slot 2
4001 Fan Fan 1
4002 Power Supply PS-AC 1
5001 Module SHDSL 8W
7001 Port RS-232 Control Port
7002 Port MNG Port
7003 Port ETH Port 0/3
7004 Port ETH Port 0/4
7005 Port ETH Port 0/5
7006 Port ETH Port 0/6
7007 Port SHDSL Port 1/1
7008 Port SHDSL Port 1/2
7009 Port SHDSL Port 1/3
7010 Port SHDSL Port 1/4
8001 CPU CPU
Note
The ETX203AX factory default chassis name specifies the ordering option; in this
example, ETX203AX-DSL.
10.6 Licensing
Some features require a license to be enabled before the feature can be
configured.
The following licenses are available:
• TWAMP
• Traffic Management Fault Propagation (TMFP)
Note You should only activate features on a device after acquiring the appropriate
license from RAD (through a license order or specific device ordering options).
Activating a license-based feature without acquiring the appropriate license shall
be considered a breach of your undertakings and entitles RAD to stop supporting
the device and may also result in legal action.
Applicable Products
This feature is applicable to all ETX2 products.
Benefits
The license mechanism enables fewer software version variants to be produced.
Also, it can be used to track licensed feature usage.
Factory Defaults
By default, feature licenses are disabled.
Functional Description
A feature that requires a license can be configured only if the feature license is
enabled.
For backward compatibility, in the event that a feature was defined as requiring a
license after having already been released without a license in a previous
software release, the feature configuration is allowed if it was done in a release
that did not require a license. In this case, a command enabling the license is
automatically added to the running-config file.
If ETX2 loads a configuration file that configures a feature requiring a license
when the license is not enabled, the device rejects that feature’s configuration if
the configuration file was created by a software version that requires a license.
Configuring Licenses
The ETX2 TWAMP and enhanced Fault Propagation Event Manager features
require a license.
Traffic Management Fault Propagation (TMFP) license and TWAMP license in a VNF
(not in a device) are protected by a hardcoded password only known to you.
Configuration of the enhanced FP Event Manager or TWAMP (in VNF) features
requires you to enable the respective password-protected licenses.
To enable licenses:
1. Navigate to admin license.
The admin>license# prompt is displayed.
2. Enter the necessary commands according to the tasks listed below.
Enabling TWAMP license in license-enable twamp password – hardcoded password assigned to the device
VNF <password> [hashed] hashed – If this option is specified, the device assumes the
Enabling Traffic license-enable tmfp <password> entered password is hashed. If not specified, the device assumes
Management Fault [hashed] the password is plain text (non-ecrypted), and if correct, hashes
Propagation (TMFP) license the password, and saves the hashed result in the license hard
password feature.
Example
This example displays the license summary.
ETX-2>admin>license# show summary
Feature Status Amount In Use
-----------------------------------------------
TWAMP Disabled -- --
TMFP Enabled -- Yes
Parameter Description
Feature Feature name
Possible values:
Configuration Errors
The following table lists messages generated by ETX2 when a configuration error
is detected.
Message Description
License needed by running configuration You attempted to disable the license for a feature that is
configured in the device running configuration.
Wrong password You failed to set the correct password for the device.
Applicable Products
This feature is applicable to all ETX2 products.
Note If you are accessing ETX2 via SSH, the banner is printed between the user name
prompt and the password prompt.
You can display the banners configured for ETX2 by navigating to the device level
and entering info. For example:
ETX-2# info
version "3.01A14" sw "5.9.1(0.08)"
configure
echo "System Configuration"
# System Configuration
system
login-message 'Authorized Users Only'
announcement 'Successful Login!'
exit
The configured banners are displayed before and after login, as shown below.
Authorized Users Only
user>su
password>****
Successful Login!
ETX-2#
Notes • The banner must contain only printable ASCII characters (0x20–0x7E), <Enter>
(0x0D), <Line Feed> (0x0A), and <Tab> (0x09)
• The banner can contain up to 2,000 characters.
• The command is not saved in the configuration file and cannot be invoked
from a configuration file.
• The message cannot be sent while the running configuration is being saved.
To send a message:
1. Navigate to admin.
2. Execute send <message>.
where message is a character string up to 2000 characters long.
Confirmation is requested to send the message:
Send message? [yes/no]
3. Enter yes to confirm sending the message.
The device outputs the following:
***
*** Message from <terminal name> to all terminals:
***
<message>
Where <terminal name> is either tty or vty#.
Applicable Products
This feature is applicable to all ETX2 products.
Benefits
Allowing users to send messages to other users simplifies on-site operation.
Example
This example displays sending a message to other users.
ETX-2>admin# send Reminder: System rebooting at 21:00
Send message? [yes/no] _ yes
***
*** Message from vty1 to all terminals:
***
Reminder: System rebooting at 21:00
Configuration Errors
The following table lists the message generated by ETX2 when a configuration
error is detected.
Message Description
Message may not exceed 2000 You entered a message longer than 2000 characters.
characters
10.9 Reset
ETX2 supports the following types of reset:
• Reset to factory defaults
• Reset to user defaults
• Overall reset (restart) of the device
• Reset x86 card of PMC-enabled devices
Note You can request that the active software pack be confirmed after the next reboot
of ETX2. Refer to the description of installing software in the Software Upgrade
chapter for details.
Applicable Products
This feature is applicable to all ETX2 products, with the exception that reset of
the x86 card is applicable only to ETX205A with PMC option.
To reset ETX2 to factory defaults and revert the device to its prior-to-shipment
state:
1. At the admin# prompt enter:
factory-default-all
A confirmation message is displayed:
The device will delete its entire database and reboot.
Are you sure? [yes/no]
2. Enter yes to confirm the reset to factory defaults with configuration and
counter reset.
The configuration and counter reset explained above is performed, the
unit resets, and after it completes its startup the factory defaults are
loaded. If a startup-config confirm request was active, it is canceled.
Note Rebooting ETX205A with PMC also reboots the x86 card.
To restart ETX2:
1. At the admin# prompt enter:
reboot
A confirmation message is displayed:
Device will reboot. Are you sure? [yes/no]
2. Enter yes to confirm the reset.
The unit restarts.
Note You can reset the x86 card from the x86 screen only (chassis ve-module).
Applicable Products
This feature is applicable to all ETX2 products.
Benefits
You can view or save in a file general device status and statistics.
Factory Defaults
By default, the show tech-support command is predefined with the following
commands in order:
• show configure system system-date
• show configure system device-information
• show configure system memory-details
• show configure system buffers
• show configure system summary-inventory
• show file sw-pack
• show file copy
• show configure port summary
• show configure service
• show configure flows summary details
• show configure oam cfm summary
• show configure pwe summary
• show configure system clock domain1 status
• show configure protection erp-summary
• show configure router 1 arp-table
• show configure router 1 routing-table
• show configure management users-details
• show configure reporting active-alarms
Functional Description
When the tech-support command is invoked, its output is displayed on your
terminal, and if specified, stored in a script file called script-result (, which can
afterwards be displayed or downloaded).
For each command, the following is displayed:
• A timestamp – formatted <date> <time> UTC {+|-}<hours>:<minutes>; for
example: 2015-05-35 11:10:09 UTC +02:00
• The executed command
• The command output, including errors and other messages, provided that the
command was invoked with the terminal argument (If the file argument is
invoked, the command output is stored in a file instead of being displayed on
the CLI terminal.)
Unlike other commands, the output is sent to the screen continuously, without
pausing after each page.
The CLI prompt does not return until all commands included in the script are
executed, or you stop the execution.
The terminal inactivity timer does not decrease while the script is being executed,
so the terminal remains open even if it takes a long time.
The script-result file is automatically cleared each time the show tech-support
command is invoked.
Applicable Products
This feature is applicable to all ETX-2 products.
Benefits
This test requires a single CLI command to perform a simple connectivity check
across Layer-2 service paths, without the need for configuration of a full TWAMP
controller and responder.
Functional Description
Layer-2 Ether-Access devices have the ability to initiate a connectivity test, and
also respond to in-service ping requests sent over Layer-2 services to a
configured IP address.
The in-service ICMP Echo ping test pings the Layer-2 EVC of the device from the
flow level. The in-service ping includes a mechanism to enable performing a
connectivity test across the flow inside the device, by configuring ICMP packets’
entry-point to the flow, either at the flow ingress or egress. The in-service ping
runs independently of working routers.
The in-service test requires that the devices be activated in two modes:
ETX-2
Ping VRF
TWAMP
Router
Inte rfa ce
Ping
ETX-2
Ping VRF
Router
Inte rfa ce
Bridge
Port
Ping
ETH ETH
Port Bridge Port
Note In PtP mode, a service (flows) with corresponding classification must exist on the
requested ingress port prior to in-service ping-response commands generation;
it is optional to configure an opposite matching flow. In the case that an
opposite matching flow does not exist, the service ping works in “down scope“
(default) without any warning.
Note In PtP mode, a service (flows) with corresponding classification must exist on the
requested ingress port prior to in-service ping commands generation; it is
optional to configure an opposite matching flow. In the case that an opposite
matching flow does not exist, the service ping works in “down scope“ (default)
without any warning.
Note
Invoking no service-ping terminates the command that was initiated in the same
database session or in a different database session (same user or different
user).
local-ip The temporary IP address provisioned on the Valid IP address and subnet
sender/responder for the duration of the test, mask
combined with subnet-mask [0.0.0.0/32|0:0:0:0::0/128]
dst-ip The IP address to which in-service ping request packets Valid IP address
are destined [0.0.0.0|0:0:0:0::0]
next-hop Next hop to use when destination IP is out of the Valid IP address
source subnet [0.0.0.0|0:0:0:0::0]
egress-port Egress port for PtP services (E-Line). The physical (e.g. ethernet, pcs, or logical-
Ethernet port) or logical (e.g. bridge ID) interface from mac
which the ping request/response exits. Valid attribute
only when bridge parameter is not introduced.
vlan Together with egress-interface, defines the flow Possible values: 0–4094
Default: -1 (untagged)
inner-vlan Together with egress-interface, defines the flow Possible values: 0–4094
Default: -1 (untagged)
p-bit The service VLAN priority bit used when encapsulating Possible values: 0–7
the ping packet Default: 0 (untagged)
inner-p-bit The inner-VLAN priority bit used when encapsulating the Possible values: 0–7
ping packet Default: 0 (untagged)
number-of-packets Number of in-service ping request packets for the test Possible values: 1–10000
Default: 5
payload-size Payload size of the in-service ping request packets Possible values: 32–1450
Default: 32
Examples
The following example illustrates configuring in-service ping test over Eth
services. Layer-2 E-Line service is provisioned between device UNI and NNI.
flow ping_E4toE3
classifier v100
ingress-port ethernet 4
egress-port ethernet 3 queue 3 block 0/1
no policer
no shutdown
exit
flow ping_E4toE3
classifier v100
ingress-port ethernet 4
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Parameter or keyword missing The entered service (outer) Configure a service (outer) VLAN that
or wrong VLAN, does not also populate also populates the customer (inner)
the customer (inner) VLAN in VLAN in the command.
the command.
Invalid parameter value; local-ip The next-hop address does Choose local IP and next-hop IP
and next-hop must belong to not belong to the same addresses in the same network.
the same network network as the sender address
(local IP address).
Invalid parameter value; local-ip The destination IP address Make next hop address equal to the
and next-hop must be equal as belongs to the same network local IP address.
dst-ip belongs to the same as the sender, but the next-
network hop address is not equal to
the local IP address.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• Dimensioning differs between the products; this is indicated where relevant.
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.1ag-D8
ITU-T Y.1731
MEF 36
Benefits
Ethernet service providers can monitor their services proactively and guarantee
that customers receive the contracted SLA. Fault monitoring and end-to-end
performance measurement provide tools for monitoring frame delay, frame
delay variation, and frame loss and availability.
Functional Description
OAM enables detection of network faults and measurement of network
performance, as well as distribution of fault-related information. OAM
functionality ensures that network operators comply with QoS guarantees,
detect anomalies before they escalate, and isolate and bypass network defects.
As a result, the operators can offer binding service-level agreements.
Note OAM may trigger control plane or management plane mechanisms; for example,
by activating rerouting or raising alarms. However, such functions are not part of
the OAM itself.
OAM Elements
Maintenance entities (ME) that require management are grouped into ME groups
(MEGs, referred to as Maintenance Associations or MAs). The Ethernet OAM
mechanism monitors connectivity in Maintenance Association (MA) groups, each
identified by a Maintenance Association Identifier (MAID). Each MA consists of
two or more maintenance end points (MEPs). Each MA belongs to a maintenance
domain (MD), and inherits its level from the MD to which it belongs. The MD
levels are used to specify the scope of the MA (provider, operator, customer,
etc). The following entities are used for monitoring:
• Maintenance Domain (MD) – the network or part of the network for which
faults in connectivity can be managed. Each maintenance domain has an MD
level attribute which designates the scope of its monitoring.
• Maintenance Association (MA) – a set of MEPs, each configured with the
same MAID and MD level, established to verify the integrity of a single
service instance.
• Maintenance End Point (MEP) – an actively managed CFM entity. A MEP is
both an endpoint of a single MA, and an endpoint of a separate
Maintenance Entity for each of the other MEPs in the same MA. A MEP
generates and receives CFM connectivity messages and tracks responses.
See full description in Maintenance End Points (MEPs) section below.
• Maintenance Intermediate Points (MIPs) – intermediate entities that are
created in the middle of the domain. See full description in Maintenance
Intermediate Points (MIPs) section below.
• Services – used for performance monitoring of the relevant MEP
• Destination Network Elements (Dest NEs) – provide performance monitoring
for the relevant service
The MAC addresses used in the OAM CFM entities are as follows:
• Down MEPs use the MAC address assigned to the port bound to the MEP.
• Up MEPs use the MAC address assigned to the port to which the relevant
bridge port connects.
• MIPs use the MAC address assigned to the port they are bound to.
OAM Functions
RAD’s carrier Ethernet aggregation and demarcation devices feature
comprehensive hardware-based Ethernet OAM and performance monitoring for
SLA assurance.
ETX-2 provides the OAM (CFM) functions listed below in packet-switched
networks:
• End-to-end Connectivity Fault Management (CFM) per IEEE 802.1ag:
Continuity check (CC)
Non-intrusive loopback
Link trace for fault localization
• End-to-end service and performance monitoring per ITU-T Y.1731
Loss measurement (single-ended)
Delay measurement (two-way).
Note Loss measurement is supported only if the MEP-connected flows have their
statistic counters enabled (PM-enabled).
OAM Connectivity
The figure below shows how the various levels of OAM sessions supported by
RAD equipment allow each entity to monitor the layers under its responsibility
and easily isolate problems. The Maintenance Entities (MEs) are created at
different levels:
• Lowest-level OAM session (subscriber ME) between two subscriber devices
(devices 1 and 8). ETX-2 devices serve as MIPs.
• End-to-end OAM session (EVC ME) between two ETX-2 devices, which serve
as MEPs. ETX-5 devices act as MIPs.
• Segment OAM session (operator service ME) between ETX-2 and the
network side of ETX-5.
• Transport OAM session (tunnel ME) between network ports of two ETX-5
devices.
Subscriber Subscriber
Equipment Operator A NEs Service Provider Operator B NEs Equipment
1 2 3 4 5 6 7 8
Subscriber ME
EVC ME
Ethernet
Operator A Service ME
Operator B Service ME
UNI ME UNI ME
Transport Tunnel ME
ETX-2 ETX-2
ETX-5 Router Router ETX-5
Legend:
Triangle – MEP (Maintenance End Point)
Circle – MIP (Maintenance Intermediary Point)
Down MEP
Down MEPs are supported for either point-to-point (E-Line) or multipoint (E-
LAN) services.
The figure below illustrates a point-to-point service between two ports with the
MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
Rx Flow
Figure 11-4. Point-to-Point Service Between Two Ports; MEP Bound to Port B
The figure below illustrates a multipoint service between port and bridge ports
with the MEP bound to port A. Tx flow in the service is directed to a queue block.
Tx Flow
BP Bridge BP MEP Port A
Rx Flow
The Down MEP is defined over the physical port, inheriting its MAC address. The
Down MEP EVC/location is characterized by:
• Rx flow, whose classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Single outer + single inner VLAN
Single outer VLAN + P-bit + single inner VLAN
Match all.
• Tx flow to a destination queue to forward OAM frames.
Up MEP
Up MEPs reside at bridge ingress and are bound to bridge ports. These MEPs
receive and send CFM PDUs from and to the bridge.
Up MEPs are supported for either point-to-point (E-Line) or multipoint (E-LAN)
services.
E-Line Up MEP
Up MEPs can be used on point-to-point (port-to-port) services. The Up MEP is
bound to an adjacent Ethernet port, inheriting its MAC address; it also faces the
egress port of the service.
The E-Line Up MEP is characterized by:
• Rx flow
• Tx flow
The figure below illustrates a point-to-point service between two ports with the
Up MEP bound to port A.
Tx Flow
Port A MEP
Port B
Rx Flow
E-LAN Up MEP
Up MEPs may reside at bridge ingress and are bound to bridge ports. These MEPs
receive and send CFM PDU from and to the bridge entity. The Up MEPs inherit
their MAC addresses from the corresponding physical ports (egress ports of Tx
flows).
The figure below illustrates a multipoint service between port and bridge ports
with the Up MEP bound to the bridge port.
Rx Flow
BP Bridge BP MEP Port A
Tx Flow
Multipoint Up MEP is defined over the bridge port. The Up MEP is characterized
by:
• Rx flow with a single VLAN classification profile
• Tx flow
Note Service-level and MD-level MIPs cannot be activated simultaneously on the same
MD level. However, you can configure an MD-level MIP and service MIP on two
different MD-levels, in order to get LBM\LBR capabilities on this MIP.
Service-Level MIPs
Service-level MIP (defined under the MD level) responds to those link trace
messages (LTMs) and loopback messages (LBMs) that have their MD level equal
to the MIP MD level.
MIP
LBM/LTM LBM/LTM
Flow X Flow X
LBR/LTR LBR/LTR
MHF MHF
Tx Flow
MHF 2 MHF 1
MIP
(bound to Port B)
Rx Flow
BP Bridge BP Port B
Tx Flow
MHF 2 MHF 1
By default, service-level MIPs are in manual mode, meaning that you create
them manually under the MD level.
Note The ability to create service-level MIPs in automatic mode is maintained for
backward compatibility only. For new deployments, it is recommended to use
service-level MIPs in manual mode only.
MD-Level MIPs
MD-level MIPs are activated per device per MD level (or several MD levels).
When MD-level MIP mode is activated, ETX-2 automatically creates a MIP for
each flow at each physical port, bridge port, and ring port. This includes the
flows that already exist in the system, and the flows that are created after
MD-level MIP mode is activated. Also, ETX-2 automatically creates MIP on each
EVC (VLAN). Each MIP inherits its source MAC address from the adjacent port.
The following figure illustrates device-level MIPs over point-to-point service.
MIP MIP
(bound to Port A) (bound to Port B)
Port A Port B
Measurements
MD-level MIPs respond to those link trace messages (LTMs) that have their MD
level equal to the MIP MD level. They do not respond to LBM. MD-level MIPs do
not interfere with active MAC swap loopbacks on specific flows.
When a valid LTM is received:
• LTR is sent back:
E-Line – always
E-LAN – if a target MAC address in LTM is learned by the bridge
LTM is relayed:
E-Line – always
E-LAN – If a target MAC islearned by the bridge, LTM is relayed to the
port from which the MAC address is learned.
LTR includes:
• Ingress TLV replied with ingress MIP MAC address
• Egress TLV replied with egress MIP MAC address.
MIP
LTM LTM
Flow X Flow X
LTR LTR
MHF MHF
Messaging System
The Ethernet service OAM mechanism uses cyclic messages for availability
verification, fault detection, and performance data collection. The main message
types are detailed below.
Note OAM cyclic messages (CCMs, LBMs, and LTMs) packet priority (P-bit value) is
user-configurable at MEP level.
CC Messages
Continuity Check Messages (CCMs) are sent from the service source to the
destination node at regular periodic intervals. They are used to detect loss of
continuity or incorrect network connections. A CCM is multicast to each MEP in a
MA at each administrative level. CCM status information is available at the MEP
and RMEP levels.
AIS
When a MEP detects a connectivity failure at a physical port, it propagates an
Alarm Indication Signal (AIS) in the direction away from the detected failure to
the next higher level. The AIS is sent over the MEP Rx flow with the level as
configured by the client MD level (default is the MEP level + 1) for the following
trigger events:
• LOC
• LCK
• Rx AIS
The signal is carried in dedicated AIS frames. The transmit interval is configured
per MEP, and can be set to one frame per second (default) or one frame per
minute. The AIS message priority is set per MEP via P-bit (0–7) configuration.
AIS, LCK, LOC
Rx Flow
MEP
Tx Flow
RDI
When a downstream MEP detects a defect condition, such as a receive signal
failure or AIS, it sends a Remote Defect Indication (RDI) upstream in the
opposite direction of its peer MEP or MEPs. This informs the upstream MEPs that
there has been a downstream failure. The Tx RDI is also initiated when a LOC is
detected on at least one of the associated RMEPs.
CCM Interval
CCM interval is user-configurable at the MA level to 3.33 ms, 10 ms, 100 ms, 1s,
1m, 10m.
CCM Multcast DA
CCM multicast destination MAC addresses per 802.1ag definition are presented
in the table below.
01-80-C2-00-00-3y
7 7
6 6
5 5
4 4
3 3
2 2
1 1
01-80-C2-00-00-3y
0 0
Loopback Messages
MEPs send loopback messages (LBMs) to verify connectivity with another MEP or
MIP for a specific MA. Loopback is a ping-like request/reply function. A MEP
sends a loopback request message to another MEP or MIP, which generates a
subsequent LBR (loopback response). LBMs/LBRs are used to verify bidirectional
connectivity.
The LBMs are always marked green. LBM priority uses the CCM priority that is
configurable as a P-bit value at the MEP level. LBM CoS is set according to a P-
bit-to-CoS profile, with up to four such profiles per chassis.
LBMs are generated on demand and sent up to 500 times at a rate of 10 pps.
LTM Priority
The LBMs are always marked green. CCM priority is configurable as a P-bit value
at the MEP level, according to a P-bit-to-CoS profile with up to four such profiles
per chassis.
LTR
Figure 11-14. MEP with LTM Sent from the Port in Point-to-Point Service
In the figure below, the MEP responds with LTR if the target MAC address of the
received LTM is the same as the MEP MAC address (inherited from the port to
which the MEP is bound). LTM is not relayed.
LTM
LTR
Figure 11-15. MEP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP always responds with LTR and relays the LTM.
LTM LTM
Port A Port B
LTR
MIP
Figure 11-16. MIP with LTM Sent from the Port in Point-to-Point Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on the bridge port. The MIP relays the LTM if the
target MAC address of the received LTM has been learned on the bridge port or
has not been learned at all. If the target MAC address has been learned on
another bridge port, the LTM is discarded.
LTM LTM
BP Bridge BP Port A
LTR
MIP
Figure 11-17. MIP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on another bridge port. The MIP relays the LTM
to the bridge port with the target MAC address. If the target MAC is unknown,
the MIP floods the LTM.
LTM LTM
BP Bridge BP Port A
LTR
MIP
Figure 11-18. MIP with LTM Sent from the Port in Multipoint Service
measurement); additionally you can specify that it does not measure CCM
messages.
In the case of color-aware loss measurement, the following statistic
counters are based on green packets only:
Forward/backward Tx/Rx frames
Forward/backward Frame Loss Ratio (FLR)
Forward/backward Availability/Unavailability
• Synthetic – This method measures DM frames. It is recommended when
working with devices that do not count user data frames.
• LMM synthetic – This method measures synthetic frames as well. It is
recommended for working with ETX-201A/202A.
• SLM synthetic – This method measures synthetic SLM/SLR frames.
ETX203AM, ETX203AX, and ETX205A calculate one-way IFDV (frame delay
variation) measurement by dividing the two-way measurement result by two.
ETX220A performs actual one-way IFDV calculation.
Notes • While working in a Bridge application, not learned user data packets, and
multicast and broadcast transmitted frames are counted several times.
• When the delay is 1 second or more the delay counters in the service and
destination NE statistics do not show accurate results.
MEP – CCM
Lower MD-Level:
• Multicast / unicast My-MAC / unicast different MAC
Packet received from Active side –> MEP defect
Cross Connected CCM (mismatch; unexpected MD level): On
Packet received from Passive side –> OAM discarded on port.
Equal MD-Level:
MEP – LB/LT
Lower MD-Level:
• LB/LT multicast / unicast My-MAC / unicast different MAC
Packet received from both sides –> OAM discarded on port
Equal MD-Level:
• Multicast / Unicast My-MAC (LB/LT)
Packet received from Active side –> OK
Packet received from Passive side –> OAM discarded on port
• Unicast different MAC (not My-MAC DA)
LB
Packet received from both sides –> OAM discarded on port
LT
Packet received from Active side –> discarded by CPU; no indication
Packet received from Passive side –> OAM discarded on port
Higher MD-Level:
• Multicast /unicast different MAC
Packet received from both sides –> considered as user data
• Unicast My-MAC (relevant to LB only)
Packet received from both sides –> OAM discarded on port
MEP – LM/DM
Lower MD-Level:
• Multicast / unicast My-MAC / unicast different MAC
Packet received from both sides –> OAM discarded on port
Equal MD-Level:
MIP
Factory Defaults
By default, OAM functionality is disabled. There are no MDs, MAs, or MEPs.
The OAM CFM general parameters have the following default configuration.
alarm-type legacy
multicast-addr 01-80-C2-00-00-30
md-level 3
interface-status-tlv interface-status-tlv
classification vlan 0
ais no ais
bind no bind
ccm-priority 0
classification vlan 0
client-md-level 4
customer-tags-excluded no customer-tags-excluded
direction down
forwarding-method e-line
queue fixed 0
delay-threshold 1000
delay-var-threshold 1000
dmm-interval 1s
lmm-interval 1s
bck-delay-var-bin no bck-delay-var-bin
delay-measurement-bin no delay-measurement-bin
delay-var-measurement-bin no delay-var-measurement-bin
fwd-delay-var-bin no fwd-delay-var-bin
remote mac-address
00-00-00-00-00-00
Note Before deleting any OAM CFM component, verify that it is not used by other
ETX-2 elements, such as ERP.
Defining whether legacy alarm-type { legacy | soam } legacy – OAM alarm names remain the same
alarms or newer alarms as in previous versions.
are used soam – OAM alarm names change as
follows:
• defErrorCCM – MEP level alarm: invalid
CCM received with CCM Interval that has
not yet timed out; replaces mismatch
• defMACstatus – RMEP level alarm: Defect
reported by interface or port status TLV
• defRDICCM – RMEP level alarm: RDI
(remote defect); replaces rdi
• defRemoteCCM – RMEP level alarm: Loss
of continuity (LOC); replaces loc
• defXconCCM – MEP level alarm:
Unexpected CCM received from MAID or
lower MD level; replaces mismatch
Configuring MD-level [no] md-level-mip <md-level-list> See MD-Level MIPs for more details.
MIP
Displaying information show mips Shows all service-level MIPs; not MD-level
on MIPs MIPs.
Displaying OAM CFM show summary See Viewing OAM CFM Information for more
information such as details.
MDs, MAs, MEPs, etc.
Note A maintenance domain can be deleted only if all its MEPs/MIPs are deleted or
disabled.
Specifying the MD level md-level <md-level> The allowed range for md-level is 0–7.
Notes:
• If prestandard OAM protocol is being
used, the only allowed value for the
maintenance domain level is 3.
• When md-level is set to 7, client md-
level, even if configured, becomes
meaningless, as it must have a higher
value than md-level but cannot
exceed 7.
Configuring service-level [no] mip <mipid> This parameter is visible only for manual
MIP MIP creation mode (the default and
recommended mode).
See Configuring Maintenance
Intermediate Points for full configuration
details.
no mip <mip id> deletes the MIP.
Defining service-level MIP mip-policy { explicit | default } This command is available for backward
policy compatibility only, when you select
automatic MIP creation mode (not
recommended).
Specifying the name format name string <md-name-string> • Maximum length of md-name-string is
and name of the name dns <md-name-string> 43 characters.
maintenance domain • Maximum combined length of
name mac-and-uint <md-name-mac>
<md-name-uint> md-name-string and ma-name-string
(maintenance association name) is
no name
48 characters.
• Format mac-and-uint – Specify
md-name-mac as xx-xx-xx-xx-xx-xx,
and md-name-uint as an unsigned
integer decimal number (0–65535).
• If prestandard OAM protocol is being
used, the maintenance domain must
have no name (use command no
name).
Note A maintenance association can be deleted only if all its MEPs/MIPs are deleted or
disabled.
Specifying the interval ccm-interval {3.33ms | 10ms | Note: When ccm-interval is set to 3.33ms, then
between continuity check 100ms | 1s | 10s | 1min | 10min} if you have defined the maximum number of
messages MEPs (255), the interval is not enough time to
activate them with all the corresponding
remote MEPs.
Associating the MA with a classification vlan <vlan-id> Verify that the VLAN is the same as the VLAN
VLAN associated with the MEP.
Note: If a classifier profile is associated with
the MEP, the VLAN should be set to 0.
Configuring MEP for the MA mep <mepid> See Configuring Maintenance Endpoints.
Defining a general MIP policy mip-policy This command is available for backward
for the MA { explicit | default | defer } compatibility only, when you select automatic
MIP creation mode (not recommended).
Specifying the name format name string <ma-name-string> • Maximum length of ma-name-string is
and name of the name primary-vid 45 characters.
maintenance association <ma-name-vid> • Maximum combined length of md name
name uint <ma-name-uint> string and ma name string is 48 characters.
Note For every MEP, a flow must be configured with the same classification as the
MEP, in the direction UNI to NNI. This can be achieved using either of the
following methods:
• Classification method – Configure the MEP classification; the SW automatically
finds and matches the corresponding flows to the MEP according to the
MEP’s configured classification.
• Rx, Tx flows method – Explicitly bind flows on a MEP. The MEP derives its
classification from its bound flows.
Note When changing the MEP classification method, you must delete the MEP and
then create a new MEP.
Defining sending of AIS ais [ interval { 1s | 1min }] When md-level is set to 7, client-md-level,
[priority <priority>] even if configured, becomes meaningless.
In this case, the MEP cannot be defined to
AIS transmission and must be set to no-
ais.
Binding the MEP to an bind ethernet [<slot>/]<port> To remove the MEP from an Ethernet port,
Ethernet port enter no bind.
Binding the MEP to an ETP bind etp <etp-name> To remove the MEP from an ETP port,
port if ETP is used {subscriber | transport} <port-id> enter no bind.
Binding the MEP to a logical bind logical-mac <port-number> To remove the MEP from a logical MAC
MAC port port, enter no bind.
Binding the MEP to PCS bind pcs <port-number> To remove the MEP from a PCS port, enter
port no bind.
Note: Relevant only for the SHSDL module
option.
Binding the MEP to bridge bind bridge-port <bridge-number> The bridge port must not be used by a
port <port-number> flow.
Associating the MEP with a classification vlan <vlan-id> You can associate more than one MEP to
classifier profile or VLAN classification profile <profile-name> the same VLAN if the MEPs belong to MDs
with different levels.
Verify that the VLAN is the same as the
VLAN associated with the MA.
If using a classifier profile, it must be
EVC.cos or VLAN+inner-VLAN.
Specifying that MEP customer-tags-excluded This parameter is visible only for up MEPs,
transmits OAM PDUs with and is relevant to E-line only; it is not
only S-tag, and no C-tag applicable for up MEPs over bridge or ETP.
Defining the MAC address dest-addr-type [ccm {unicast|multicast}] If more than one remote MEP ID has been
type sent in OAM [pm {unicast|multicast}] defined for the MEP and you change the
continuity check messages CCM destination address type from
(CCM) and performance multicast to unicast, all remote MEP IDs
measurement messages are deleted except for the lowest remote
(PM) MEP ID.
If the MAC address type for PM messages
is unicast, then the MAC address for the
transmission of PM messages is
determined by the configuration of the
destination NE. If a remote MAC address is
configured for the destination NE, that
MAC is used. Otherwise if a remote MEP ID
is configured for the destination NE, the
remote MAC address is learned from CCM
messages. See Configuring Destination
NEs for details.
Defining a unicast MAC dest-mac-addr <mac-addr> MAC address is in format xx-xx-xx-xx-xx-xx
address if you defined
unicast MAC address type
for CCM messages with the
dest-addr-type command
Assigning unidirectional or flow uni-direction rx <rx-name> [ Rx flow: Flow with ingress port that is the
bidirectional Rx or Tx flow tx <tx-name>] MEP facing port
to the MEP flow bi-direction <name> Tx flow: Flow with egress port that is MEP
facing port
Up to eight Tx flows and eight Rx flows
can be assigned to the MEP.
Rx/Tx flows cannot be assigned if one of
the following is true:
• VLAN is configured at the MA level.
• VLAN or profile is configured at the
MEP level for the Rx classification.
To delete flow assignment, enter no flow
uni-direction or no flow bi-direction,
respectively.
Defining forwarding forwarding-method { e-line | e-lan } Note: The e-line parameter is not available
method for ETX220A.
Activating CFM loopback lbm See Performing OAM Loopback for details.
(LBM)
Activating linktrace (LTM) linktrace See Performing OAM Link Trace for details.
Defining the queue for the queue fixed <queue-id> Note: The block parameter is not allowed
MEP [block <level-id>/<queue-id>] for up MEPs.
queue queue-mapping
<queue-map-profile-name>
[block <level-id>/<queue-id>]
Defining remote MEP with remote-mep[<rmep1>..<rmep2>,<rmep3> Possible values for remote MEP IDs:
which the MEP ] 1–8191
communicates You can define multiple remote MEP IDs in
one remote-mep command by specifying a
list of values separated by commas (with
no spaces between the values), using .. to
indicate ranges. You can end the
command line with <CR> and then input
another list. Up to 10 elements (where
each element is either a single remote
MEP or a range of multiple remote MEPs
having consecutively numbered IDs) can be
configured in a list.
The MEP ID must be different than the
remote MEP ID(s). You can use multiple
remote-mep commands to define up to
100 remote MEPs for the local MEP (up to
1024 total remote MEPS in ETX220A; up
to 100 in ETX203AX, ETX203AM, and
ETX205A) if standard OAM protocol is
being used for the MD and the destination
address type is multicast, otherwise you
can define only one remote MEP.
Configuring service for the service <serviceid> See Configuring Maintenance Endpoint
MEP Services.
Displaying MEF46 Latching show mef46-ll-status This parameter is visible only for MEF-46
Loopback status enabled (see above).
See Viewing MEF46 Latching Loopback
Status.
Displaying loopback status show lbm-results See Performing OAM Loopback for details.
Displaying linktrace status show linktrace-results See Performing OAM Link Trace for details.
Displaying remote MEP show remote-mep-status { remote-mep-id If a remote MEP was never learned, its
status <remote-mep-id> | all } status is “NEW”. As a result, the following
takes place:
• Dest NE that is configured under this
MEP’s services cannot learn the remote
MAC address and therefore, does not
transmit LMM and DMM.
• “unavailability” is not indicated and
therefore the unavailability counters
are not incremented.
• Available counter increments, as it is
ready for use as soon as the remote
MEP is configured.
Rx Unicast LLMs : 2
Rx Multicast LLMs : 0
Rx Discarded LLMs : 0
Tx LLRs : 2
Tx Autonomous LLRs : 0
Num First Source MAC Address Last Source MAC Address Time Remaining
-----------------------------------------------------------------------------
1 00-20-D2-54-11-92 00:06:43
ETX220A config>oam>cfm>md(1)>ma(1)>mep(2)#
Parameter Description
Displayed
First Source MAC Addre Start of a block of source MACs in incoming frames that are
looped
Last Source MAC Addre End of a block of source MACs in incoming frames that are
looped
MD-Level MIP
You can create MD-level MIPs at the OAM CFM level, as described in this section.
When MD-level MIP mode is activated, ETX-2 provisions a MIP for each flow at
each physical port, bridge port, and ring port, subject to the limitations specified
above in OAM Elements. The MIPs are added for each specified MD level, or MD
level range.
Note
This section is relevan t only for service-level MIPs in the recommended default m anual MI P creation mode (m i p-assign parameter under OAM CFM confi guration is configured as manu al).
To delete a MIP:
• At the config>oam>cfm>md(<mdid>)# prompt enter: no mip <mipid>
The maintenance intermediary point is deleted.
Binding the MIP to an bind ethernet [<slot>/]<port> To unbind the MIP, enter no bind.
Ethernet port, logical MAC bind logical-mac <port-number>
port, or PCS port
bind pcs <port-number>
Displaying MIP status show status Displayed for active MIP only. See Viewing
MIP Status below.
Note Only one service is allowed if the classifier profile associated with the MEP is
according to p-bit.
Each service sets delay and delay variation thresholds. If the thresholds are
exceeded, the service is declared as degraded. You can also define priority of
OAM messages originating from this service.
Associating this service with a classification priority-bit <p-bit> Possible values: 0–7
priority Note: Before changing the
classification, you need to
administratively disable the
service, and then re-enable it
after the change.
Specifying the interval for loss lmm-interval {100ms | 1s | 10s} When changing lmm-interval,
measurement messages, to be you must perform NO LM and
used by all remote NEs defined then LM.
for service
Activating the MEP service no shutdown You can activate a service only
if the corresponding MEP is
active and you have defined at
least one destination NE.
Note: Following no shutdown
of MEP, the following warning
message appears to remind
you to activate relevant MEP
services: “Warning: Relevant
MEP services must be activated
following MEP reactivation.”
Assigning the delay delay-measurement-bin profile <name> The delay measurement bin profiles
measurement bin profile are defined in the conf>oam>cfm
level.
Assigning the delay variation delay-var-measurement-bin The delay measurement bin profiles
measurement bin profile profile <name> are defined in the conf>oam>cfm
level.
Defining the MAC address of remote mac-address <mac> If the MAC address is
the destination NE 00-00-00-00-00-00, the statistic
counters for the destination NE do
not increment.
Displaying the delay show delay-measurement-bins {rt-delay Relevant only if profiles were
measurement bins for delay | rt-delay-var | fw-delay-var | bw-delay- assigned via delay-measurement-bin,
measurements via DMRs var } current delay-var-measurement-bin.
show delay-measurement-bins {rt-delay • rt-delay – Round trip delay
| rt-delay-var | fw-delay-var | bw-delay- • <rt-delay-var> – Round trip delay
var } interval <interval-num> variation
show delay-measurement-bins {rt-delay • <fw-delay-var> – Forward delay
| rt-delay-var | fw-delay-var | bw-delay- variation
var } all
• <bw-delay-var> – Backward delay
variation
• <current> – Current statistics
• <interval> – Interval statistics
• interval-num> – Interval number
[number]
• all – all statistics
Far End Frame Total number of OAM frames lost from local MEP to remote
Loss Ratio MEP, divided by total number of transmitted OAM frames
since the service was activated
Near End Frame Total number of OAM frames lost from remote MEP to local
Loss Ratio MEP, divided by total number of transmitted OAM frames
since the service was activated
For non ratio-based counters (Frames Above Delay and Frames Above Delay
Variation), you have to define a sampling interval in addition to the rising and
falling thresholds. The purpose of the interval is to define a timeline, in seconds,
in which the service OAM data is sampled and compared with the pre-defined
service thresholds. For the ratio-based counters, defining a sampling interval is
not required.
event Specifies the type of event reporting none – The event is not reported.
log – The event is reported via the
event log.
trap –An SNMP trap is sent to
report the event.
logandtrap –The event is reported
via the event log and an SNMP trap.
When a service is first activated, you can view statistics for only the current
interval. The statistics data is shown for the time elapsed since the beginning of
the interval. When the current interval ends, it becomes interval 1 and you can
select it for viewing interval statistics. After each interval ends, you can select it
for viewing interval statistics.
OAM CFM supports checking Availability status within an interval as well as
across intervals. In the case that there are less than n consecutive delta-t small
time intervals at the end of an interval that have changed Availability status
(become Available or Unavailable), the delta-t small time intervals at the
beginning of the next interval are checked to see if there is a total of n
consecutive delta-t small time intervals across the intervals (the end of the
current interval and the beginning of the next interval). If so, the delta-t small
time intervals at the end of the current interval are all considered to have a
changed Availability status (Available or Unavailable).
For example, when Availability is defined for ten one-second intervals, and there
are three SES seconds at the end of the current interval, those seconds are
considered Unavailable only if the first seven seconds of the next interval are
also SES, i.e. ten consecutive SES.
An interval is closed only after the following Availability and Unavailability
counters are updated accordingly, taking into consideration the Availabilty status
change of Delta-t’s in the current interval that are affected by the Availability
status of Delta-t’s in the new interval (see Table 11-6 for a description of the
counters):
• Tx Frames [Forward]
• Tx Frames [Backward]
• Rx Frames [Forward]
• Rx Frames [Backward]
• Unavailable Seconds [Forward]
• Unavailable Seconds [Backward]
• Frame Loss Ratio (%) [Forward]
• Frame Loss Ratio (%) [Backward]
Also, the statistics of the last History interval (i.e. the interval before the
current) can only be viewed n * Delta_t seconds after the current interval has
commenced.
Notes • If RADview is being used to manage ETX-2, then when the interval duration is
changed, it is recommended to clear the statistics of all relevant Dest NEs, in
order to avoid any inconsistencies.
• interval-duration must be configured to a larger value than availability (delta_t
* n) calculation; otherwise, a sanity error occurs.
To display the OAM CFM statistics for a MEP, service, or destination NE:
1. Navigate to the level corresponding to the OAM MEP, service, or destination
NE for which you wish to view the statistics
configure oam cfm maintenance-domain <mdid>
maintenance-association <maid> mep <mepid>
or
configure oam cfm maintenance-domain <mdid>
maintenance-association <maid> mep <mepid> service <serviceid>
or
configure oam cfm maintenance-domain <mdid>
maintenance-association <maid> mep <mepid> service <serviceid> dest-ne
<dest-ne-index>).
The prompt for MEP, service, or destination NE is displayed:
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)#
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)>service(<ser
viceid>)#
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)>service(<ser
viceid>)>
dest-ne(<dest-ne-index>)#
2. Enter all necessary commands according to the tasks listed below.
Note The service for which you wish to view the statistics must be active. If the
service is not active, the commands to view statistics are not recognized.
Viewing running show statistics The statistics are displayed as shown in Viewing Running Statistics;
statistics running see Table 11-6 and Table 11-7.
Viewing statistics show statistics The statistics for the current interval are displayed as shown in
for the current current Viewing Current Statistics; see Table 11-6 and Table 11-7.
interval
Viewing running show statistics The statistics are displayed as shown in Viewing Running Statistics,
statistics, all Viewing Current Statistics, Viewing Interval Statistics; see Table 11-6
statistics for the and Table 11-7.
current interval,
and statistics for
all intervals
Viewing statistics show statistics The statistics for all intervals are displayed as shown in Viewing
for all intervals all-intervals Interval Statistics; see Table 11-6 and Table 11-7.
Clearing the clear-statistics The running statistics for the MEP, service, or destination NE are
statistics for the cleared (the interval and current counters are not cleared).
service or
destination NE
Parameter Description
Parameter Description
Available Seconds [Forward] Number of seconds the remote destination NE is considered available
Note: This counter is displayed only for dest NEs.
Two Way Unavailable Seconds Number of seconds that either the remote destination NE (forward)
and/or local destination NE (backward) are unavailable.
Note: This counter is displayed only for dest NEs current and interval
statistics.
Available Seconds [Backward] Number of seconds the local destination NE is considered available
Note: This counter is displayed only for dest NEs.
Two Way Available Seconds Number of seconds that both the remote destination NE (forward)
and local destination NE (backward) are available.
Note: This counter is displayed only for dest NEs current and interval
statistics.
Two Way Delay (mSec) Round trip frame delay
Two Way IFDV (mSec) Round trip frame delay variation
Current Forward IFDV (mSec) Difference between the current delay value and the previous current
delay value, for forward direction
Note: This counter is displayed only for dest NEs.
Current Backward IFDV (mSec) Difference between the current delay value and the previous current
delay value, for backward direction
Note: This counter is displayed only for dest NEs.
Frames Above Delay Threshold Number of DM frames whose delay value exceeded the configured
delay threshold
Frames Above IFDV Threshold Number of DM frames whose delay variation exceeded the configured
delay variation threshold
Two Way Delay (msec) [Min] Minimum frame delay value received in DM frame
Two Way Delay (mSec) [Average] Average of all frame delay values received in DM frames
Two Way Delay (msec) [Max] Maximum frame delay value received in DM frame
Two Way IFDV (msec) [Min] Minimum difference between the frame delay values received in DM
frames
Two Way IFDV (mSec) [Average] Average difference between the frame delay values received in DM
frames
Two Way IFDV (msec) [Max] Maximum difference between the frame delay values received in DM
frames
Forward IFDV [Min] Minimum difference between the frame delay values received in DM
frames for forward direction
Forward IFDV [Average] Average difference between the frame delay values received in DM
frames for forward direction
Forward IFDV [Max] Maximum difference between the frame delay values received in DM
frames for forward direction
Backward IFDV [Min] Minimum difference between the frame delay values received in DM
frames for backward direction
Backward IFDV [Average] Average difference between the frame delay values received in DM
frames for backward direction
Parameter Description
Backward IFDV [Max] Maximum difference between the frame delay values received in DM
frames for backward direction
Elapsed Time (sec) Time (in seconds) elapsed since the service was activated.
Exception: Following shutdown and then no shutdown of a service,
current statistics of the first interval display in Elapsed Time the time
that is aligned to the wall clock, and not the elapsed time since the
service was activated. Hence, all current statistics calculated using
Elapsed Time are not valid for the first interval following shutdown
and no shutdown.
CCM P-bit P-bit where CCM resides
MD Level MD level munber where CCM resides
CCM Tx frames Number of CCM Tx frames per MEP
RMEP ID The ID of the remote MEP associated with the MEP
CCM Rx frames Number of CCM Rx frames per remote MEP
Parameter Description
Specifying remote MEP by lbm address <mac-address> [repeat • MAC address is in the
MAC address <repeat-num>] [data-tlv-length format <xx-xx-xx-xx-xx-xx>.
<length-val>] • Allowed range of
Specifying remote MEP by lbm remote-mep <mep-id> [repeat repeat-num is 1–500.
MEP ID <repeat-num>] [data-tlv-length • Allowed range of
<length-val>] data-tlv-length is 0–1900.
Sending LBM messages to lbm multicast [repeat <repeat-num>] The only allowed value for
default multicast MAC repeat-num is 1.
address
Specifying remote MEP by MAC linktrace address <mac-address> • MAC address is in the
address [ttl <ttl-value>] format <xx-xx-xx-xx-xx-xx>.
Specifying remote MEP by ID linktrace remote-mep <mep-id> • Allowed range for ttl-value
[ttl <ttl-value>] is 1–64. This parameter
specifies number of hops.
Each unit in the link trace
decrements the TTL until it
reaches 0, which terminates
the link trace.
Examples
#**************************Configure MA
maintenance-association 1
classification vlan 100
#**************************Configure MEP
mep 1
classification vlan 100
bind ethernet 1
queue fixed 1 block 0/1
remote-mep 1..5,7,15..25,54,68,73..75,80,88..99,100,102,120
remote-mep 150,160..164,180
no shutdown
exit all
• Tx flow parameters:
Ingress port=Ethernet port 3, egress port=Ethernet port 1
Classification=VLAN 1
Service name=gold
• MEP parameters:
MD ID=10
MA ID=10
MEP ID=101
Note VLAN classification must not be configured for the MEP, in order to facilitate the
service discovery.
#**************************Configure classifiers
flows
classifier-profile v1 match-any
match vlan 1
exit
classifier-profile v21 match-any
match vlan 21
exit
#**************************Configure Rx flow
flow v21_v1
ingress-port ethernet 1
egress-port ethernet 3 queue 0 block 0/1
classifier v21
pm-collection interval 300
service-name gold
no shutdown
exit
#**************************Configure Tx flow
flow v1_v21
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
classifier v1
pm-collection interval 300
service-name gold
no shutdown
exit all
Direction : Down
Classification Profile : Class_A
CCM Priority : 7
MD Name : MD1
MA Name : MA1
Administrative Status : Up
Test Status : Off
• Destination NE 3
Near End Frame Loss Ratio Log and trap 1e-9 1e-10
In this example, an SNMP trap and an event are generated as notification of the
rising threshold if during an 8-second sample interval, four DMM packets or
more exceed the 10-milliseconds delay threshold of this service. The alarm is
cleared (falling threshold) if ETX-2 detects an 8-second sample interval in which
two or fewer packets cross the thresholds.
A rising or falling threshold event is generated if a specific ratio is exceeded. For
example, an SNMP trap is sent if the far end Frame Loss Ratio (from ETX-2 to
the network) exceed 10^-4, i.e. more than one frame out of 10,000 LMMs sent
for this service are lost.
no shutdown
exit
MD Name : MD1
MD Level : 3
Administrative Status : Up
Running
-----------------------------------------------------------------------------
R-MEP
-----------------------------------------------------------------------------
ID CCM Rx frames
-----------------------------------------------------------------------------
101 1286
102 0
103 0
ETX-2>config>oam>cfm# ma 1 ma 1 mep 1 serv 1
ETX-2>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# show statistics running
Running Counters
-----------------------------------------------------------------------------
Forward Backward
TX Frames : 1548 1548
RX Frames : 1548 1548
Lost Frames : 0 0
Tx Rx
LMMs : 1759 LMRs : 1759
DMMs : 1759 DMRs : 1760
R-MEP
-----------------------------------------------------------------------------
ID CCM Rx frames
-----------------------------------------------------------------------------
101 136
102 0
103 0
ETX-2>config>oam>cfm# ma 1 ma 1 mep 1 serv 1
ETX-2>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# show statistics current
Current
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 1863 1863
Rx Frames : 1863 1863
Lost Frames : 0 0
Frame Loss Ratio (%) : 0.0000 0.0000
R-MEP
-----------------------------------------------------------------------------
ID CCM Rx frames
-----------------------------------------------------------------------------
101 303
102 0
103 0
ETX-2>config>oam>cfm# ma 1 ma 1 mep 1 serv 1
ETX-2>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# show statist interval 1
Interval
-----------------------------------------------------------------------------
Interval : 1
Forward Backward
Tx Frames : 1541 1541
Total Intervals
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Lost Frames : 0 0
Forward Backward
Tx Frames : 899 899
Rx Frames : 899 899
Frames Loss : 0 0
Frame Loss Ratio (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
Available Seconds : 1195 1195
Total Intervals
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Frame Loss Ration (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
Available Seconds : 0 0
• Bin2 used for round trip delay variation measurements, with threshold
ranges (in microseconds (μs)):
0–15,000
15,001–55,000
55,001–105,000
105,001–205,000
205,001–5,000,000
Current
Type : rt Delay
Interval Bin
range Rx DMR
(us)
---------------------------------------------------------------
1 1 0..15000 36
1 2 15001..49000 0
1 3 49001..55000 0
1 4 55001..250000 0
1 5 250001..5000000 0
2 1 0..15000 753
2 2 15001..49000 0
2 3 49001..55000 0
2 4 55001..250000 0
2 5 250001..5000000 0
3 1 0..15000 713
3 2 15001..49000 0
3 3 49001..55000 0
3 4 55001..250000 0
3 5 250001..5000000 0
ETX-2>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)>dest-ne(3)#
show delay-measurement-bins rt-delay-var all
Type : rt Delay Var
Current
---------------------------------------------------------------
Bin range Rx DMR
(us)
---------------------------------------------------------------
1 0..15000 0
2 15001..55000 0
3 55001..105000 0
4 105001..205000 0
5 205001..5000000 0
Interval Bin
range Rx DMR
(us)
---------------------------------------------------------------
1 1 0..15000 36
1 2 15001..55000 0
1 3 55001..105000 0
1 4 105001..205000 0
1 5 205001..5000000 0
2 1 0..15000 753
2 2 15001..55000 0
2 3 55001..105000 0
2 4 105001..205000 0
2 5 205001..5000000 0
3 1 0..15000 713
3 2 15001..55000 0
3 3 55001..105000 0
3 4 105001..205000 0
3 5 205001..5000000 0
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
OAM CFM: A service with the You tried to configure more Check the priority bit classification and
same priority already exists than one service on the same verify that there is no other configured
priority bit. service on it.
OAM CFM: A Maintenance You previously configured Configure the MA with another name
Association with this format and another MA with the same or format.
name already exists configuration.
OAM CFM: A Maintenance You previously configured Configure the MD with another format,
Domain with this format name another MD with the same name, or level.
and level already exists configuration.
OAM CFM: Active MEP cannot You tried to delete or shut Disassociate the flow from the MEP,
work without a flow down a flow that is being used and then delete or shut down the flow.
by a MEP.
OAM CFM: Active MEP requires You did not configure a single Configure at least one remote MEP.
at least 1 remote MEP remote ID on the MEP.
OAM CFM: Active MIP cannot You did not configure a TX or Configure a TX or Rx flow on the
work without a flow Rx flow on the manual manual MIP that you configured.
MIP that you configured.
OAM CFM: Active MIP cannot The Tx or RX flow that you Configure the MIP with an active Tx or
work without an active flow configured on the MIP is not Rx flow.
active.
OAM CFM: AIS cannot be You configured MEP on a Configure MEP on a maintenance
enabled when MD level equals maintenance Domain with Domain other than Level 7.
seven (7) Level 7, and therefore AIS
could not be enabled on it.
OAM CFM: Cannot activate a You tried to activate a Service Configure a Dest NE under Service.
service without a dest-NE that has no Dest NE
configured under it.
OAM CFM: Cannot activate MIP You did not configure a bound Configure a bound port on the manual
without a bound port port on a manual MIP. MIP.
OAM CFM: Cannot change You tried to change Disable Fault CFM entity, and then
parameters when active parameters on an active Fault change parameters.
CFM entity.
OAM CFM: Cannot change pm to You tried to configure a Configure a multicast destination
multicast because there is a multicast destination address address on a Dest NE that does not
destne that counts loss on a Dest NE that has user have user data loss measurements.
data loss measurements.
OAM CFM: Cannot configure You configured a MEP to work Configure only one remote MEP per
destination address type unicast with unicast destination MEP.
and more than one remote MEP address, but also assigned to
it more than one remote MEP.
OAM CFM: Cannot configure ICC It is not legal to configure MD Change MA name to format other ICC.
with MD name name when MA name format
is ICC.
OAM CFM: Cannot delete a You tried to delete a remote Disassociate the remote MEP from the
remote MEP that is being used MEP from MEP configuration, Dest NE and then delete it.
by a dest-ne while this remote MEP is being
used in one of the MEP’s Dest
NEs as remote peer address.
OAM CFM: Cannot delete destne; You tried to delete or shut Wait until RFC2544 test has completed,
it is bound to rfc2544 test. down a Dest NE that is used and then delete or shut down the Dest
on an active RFC2544 test. NE.
OAM CFM: Cannot delete MEP; You tried to delete a MEP Finish using the MEP under the Y.1564
MEP is under Y.1564 test. which is being used in a test, and then delete it.
Y.1564 test.
OAM CFM: Cannot delete or You tried to modify or delete a Remove the Bin profile from the Dest
change measurement profile used Bin profile. NE, and then modify or delete it.
first remove from dest-NE
OAM CFM: Cannot enable loss You tried to configure user Configure Dest NE without a multicast
measurement because pm is in data loss measurements on a address or use another loss
multicast Dest NE with multicast measurement method.
destination address.
OAM CFM: Cannot enable more You enabled more than the Enable up to 600 Rx SLM PPS.
than 600 PPS 600 Rx SLM PPS limit of the
device.
OAM CFM: Cannot enable service You are trying to enable (no Enable the MEP (no shutdown).
while the MEP is not active shutdown) a service of one of
the MEP’s priority bits, while
the MEP is not enabled
(shutdown).
OAM CFM: Cannot have a dest- You tried to configure remote Activate MEP’s CCM or use remote-mac.
NE remote MEP-ID when CCM is MEP Id on the Dest NE while
disabled MEP’s CCM is not active.
OAM CFM: Cannot modify a You tried to change remote Shut down the service, delete the Dest
remote MEP while it is being MEP parameters in MEP NE that uses this remote MEP or
used configuration while the change its configuration to remote
Remote MEP is being. used MAC.
OAM CFM: Cannot resolve this You are using remote MEP ID Use a remote MEP ID only of remote
remote MEP MAC address for loopback or linktrace MEP MAC address that was learned by
transmission, but the remote the CCM.
MEP MAC address was not
learned by the CCM yet.
OAM CFM: Cannot send more You sent more than one Send only one LB message to multicast
than one LB to multicast loopback message to the same address.
address multicast destination address
of the MEP. All relevant remote
MEPs should answer – one LBR
from every remote MEP.
OAM CFM: Cannot shutdown You tried to disable a MEP Finish using the MEP under the Y.1564
MEP; MEP is under Y.1564 test. which is being used in a test, and then disable it.
Y.1564 test.
OAM CFM: Classification: Conflict You previoulsy configured Configure the MEP with a different
with another MEP classification another MEP with the same classification.
parameters.
OAM CFM: Classification: Inner You tried to configure a MEP Configure the MEP with a supported
VLAN range is not supported with a non-supported flow flow classification.
classification.
OAM CFM: Classification: You tried to configure a MEP Configure the MEP with a supported
Unsupported criteria with a non-supported flow flow classification.
classification.
OAM CFM: Classification: VID=0 You configured an Illegal VLAN Configure a VLAN with ID other than 0
is invalid on a MEP. on the MEP.
OAM CFM: Client MD level must You tried to configure a client Configure client MD level higher than
be higher than MD level Maintenance Domain Level MD level.
(MDL) lower than or equal to
the MDL.
OAM CFM: Conflict between You configured a destination Select a valid destination MAC address.
OAM destination MAC address MAC address that conflicts
and device MAC address with the device’s MAC address.
OAM CFM: Deactivate service You did not deactivate service Deactivate service, and then erase last
before erasing last dest-NE before erasing last active Dest active Dest NE under it.
NE under it.
OAM CFM: dest-NE out of range You configured Dest NE ID out Confiugre a Dest NE ID between 1 and
the range 1..255. 255.
OAM CFM: EVC.COS: Illegal You did not configure Local Configure Local MEP Id.
remote MEP configuration MEP Id (can only occur via
SNMP).
OAM CFM: EVC.COS: More than 1 You tried to configure two Configure only one MEP on the same
MEP on the same MA is only MEPs on the same MA. MA or use vlan.p_bit classification for
allowed when all classifications all MEPs on MA.
are VLAN + pBit
OAM CFM: EVC.COS: Priority bit You did not configure EVC.cos Configure the EVC.cos MEP’s flow
doesn't match classifier MEP’s flow classification to classification to match the MEP’s
match the MEP’s configured configured priority.
priority.
OAM CFM: EVC.COS: Two MEPs You tried to configure two Configure two MEPs on the same MA
on the same MA must use MEPs on the same MA with with different priorities.
classifiers with same VLAN and same priority.
different priorities
OAM CFM: Event type must be You tried to configure for Configure an event for the Fault CFM
different than none unavailability, a Fault CFM frame report entity.
frame report entity that has
no event.
OAM CFM: Exceeded number of You tried to define more than Define only up to 100 fault CFM
entries in alarmTable 100 fault CFM entities. entities.
OAM CFM: Falling On Fault CFM entity, you Configure a lower limit for alarm falling,
alarm_threshold must be less configured a lower limit for which is lower than the higher limit of
than rising alarm_threshold alarm falling, which is higher alarm rising.
than the higher limit of alarm
rising.
OAM CFM: FPGA supports up to You tried to configure Bin Configure Bin profile limit which is up
1000000 uSec (1 second) profile limit which is higher to 1 second.
threshold than 1 second.
OAM CFM: Illegal MAC address You configured the MAC Configure a valid MAC address.
address with all zeroes or all
ones.
OAM CFM: Illegal queue block You did not configure a queue Configure a queue block on the MEP.
block on the MEP.
OAM CFM: Illegal value CFM entity was configured Configure CFM entity with legal indices.
with illegal or out of range
indices (for example, loopback
on an active CFM loopback).
OAM CFM: Invalid falling You configured the falling Configure the falling threshold
threshold threshold to less than one-of- between one-of-thousand and 1000
thousand or higher than 1000 one-of-thousand. Make sure that the
one-of-thousand. Or you falling threshold value is lower than the
configured the falling rising threshold.
threshold to a higher value
than the rising threshold.
OAM CFM: Invalid forwarding You configured E-LAN Configure another forwarding method.
method for MEP with direction forwarding method on a Down
set to down MEP.
OAM CFM: Invalid rising You configured the rising Configure the rising threshold between
threshold threshold to less than one-of- one-of-thousand and 1000 one-of-
thousand or higher than 1000 thousand. Make sure that the rising
one-of-thousand. Or you threshold value is higher than the
configured the rising threshold falling threshold.
to a lower value than the
falling threshold.
OAM CFM: Invalid time interval You tried to configure a fault Configure an interval between 1 and
CFM interval which is shorter 60 seconds.
than 1 second or longer than
60 seconds.
OAM CFM: Lmm and dmm You configured lmm-synthetic Configure one second on both lmm and
intervals must be equal if lmm- while in the service level, but dmm.
synthetic was selected you also set lmm or dmm
intervals to be different than 1
second.
OAM CFM: Local MEP-ID and You assigned the same ID to a Configure the remote MEP and local
remote MEP-ID are equal remote MEP and local MEP. MEP with different IDs.
OAM CFM: MA and MEP VLAN You configured a classification Configure a classification VLAN on the
don't match VLAN on MA level that does MA level to match the configured
not match the configured classification VLAN on the MEP level.
classification VLAN on the MEP
level.
OAM CFM: MA name max length You configured an MA name in Configure an MA name in ICC format up
is 13 characters when format is ICC format more than 13 to 13 characters long.
ICC characters long.
OAM CFM: MA-ID size exceeds You defined an MD or MA Define an MD or MA name that is not
limit name length that is longer longer than the maximum allowed
than the maximum allowed length.
length.
OAM CFM: Max allowed dest-NEs You tried to add more than Configure up to the allowed number of
in active services already allowed maximum Dest NEs. Dest NEs.
reached
OAM CFM: Max allowed number You already configured the Configure up to the allowed number
of remote MEPs reached maximum allowed number of remote MEPs per device.
remote MEPs on the device.
OAM CFM: MD level out of range You configured an MD level Configure an MD level between 0 and
that is smaller than 0 or bigger 7.
than 7 (can happen only via
SNMP).
OAM CFM: MEP direction is not You bound the MEP to the Bind a MEP of the correct direction to a
correct for port type wrong port. For example: You port.
bound a Down MEP to a Bridge
port or an UP MEP to an SVI.
OAM CFM: MEP must be active You tried to send LBM or LTM Activate MEP, and then send LBm or
for this action on a non-active MEP. LTM.
OAM CFM: MEP out of range You configured a MEP ID Configure a MEP ID between 1 and
outside the range 1..8191 8191.
OAM CFM: Name cannot be You did not configure an MD Configure a name for MD or MA.
empty or MA name.
OAM CFM: Name length too long You configured an illegal MD or Configure an MD/MA name up to 43
MA name length (more than characters.
43 characters).
OAM CFM: NE remote MEP-ID or You tried to define Dest NE Define a Dest NE that has different
MAC address conflicts with that has same indices as an indices than an existing Dest NE.
another NE on the current existing Dest NE.
service
OAM CFM: No port is bound to You tried to activate a MEP Bind a port to the MEP.
MEP with no bounded port.
OAM CFM: Only 10 TX flows per You tried to configure more Configure up to 10 Tx flows.
MEP are allowed than 10 Tx flows on a MEP.
OAM CFM: Only one destne can You tried to configure more Configure only one Dest NE on a
be configured if loss user data than one Dest NE on a service service with User Data Loss
was selected with User Data Loss measurement method.
measurement method.
OAM CFM: Only one RX flow per You tried to configure more Configure only one Rx flow on the MEP.
MEP is allowed than one Rx flow on a MEP.
OAM CFM: Please make sure you You configured a MEP to work When MEP is shutdown, configure a
configure a unicast type and with unicast destination valid unicast address as destination
MAC address when MEP is address, but did not configure address.
shutdown a valid unicast address as
destination address.
OAM CFM: Port is occupied with You tried to send loopback or Send loopback or linktrace only when
another action linktrace while there is another no other loopback or linktrace
active loopback or linktrace respectively, is active.
respectively.
OAM CFM: Port level MEP: Only You tried to configure more Configure only one MEP on an
one allowed per port than one MEP on an untagged untagged port.
port.
OAM CFM: Priority out of range You configured a Priority that Configure a Priority between 0 and 7.
is smaller than 0 or bigger
than 7 (can happen only via
SNMP).
OAM CFM: Profile must have You tried to use a flow with Use a flow with only one VLAN
only one entry multiple VLANs matching matching classification.
classification.
OAM CFM: Profile was not found You used a wrong or non- Use a correct or existing profile.
existing profile.
OAM CFM: Remote MEP doesn't You tried to configure a Configure the remote MEP ID at the
exist remote MEP Id at the Dest NE, MEP as Remote.
as remote peer address, but
this Remote MEP Id is not
configured at the MEP as
Remote.
OAM CFM: Remote MEP ID You tried to configure a Configure the remote MEP with an ID
cannot be equal to local MEP ID remote MEP with the same ID that is different than the MEP ID.
as the MEP itself.
OAM CFM: rfc2544 test is in You tried to change the status Wait until RFC2544 test terminates,
progress; cannot enable service of a service that one of its and then change the service’s status.
Dest NEs is used on an active
RFC2544 test.
OAM CFM: Service out of range You configured a service ID Configure a service ID between 1 and
outside the range 1..8 8.
OAM CFM: The Rx and Tx flows You configured Rx and Tx Configure Rx and Tx flows to start and
must be in opposite directions. flows so that they do not start end on opposite Ingress and Egress
and end on opposite Ingress ports.
and Egress ports.
OAM CFM: The Rx flow must You configured manual MIP, so Configure the Rx flow’s Ingress port to
originate from the bound port. that Rx flow’s Ingress port is be equal to the MIP’s bound port.
not equal to the MIP’s bound
port.
OAM CFM: There is no MEP with You tried to create an entry in Connect the flow to a MEP that already
those indices the MepFlow table and to exists.
connect between a flow and a
MEP that does not exist (can
only occur via SNMP).
OAM CFM: VID out of range You configured a VLAN ID Configure a VLAN ID between 1 and
outside the range 1..4094 4094.
OAM CFM: When using untagged You tried to configure a MEP Configure a MEP with EVC.cos
or EVC.COS MEP classification with EVC.cos classification and classification and Service Id equal to 1.
only service index 1 is permitted Service Id other than 1.
OAM CFM: MEF-46 should have You tried to configure MEF-46 Configure MEF-46 on a MEP that is
Tx/Rx flow classification on a MEP that is configured configured with Rx and Tx flows.
with a classifier profile or
VLAN.
This section covers the monitoring of the Ethernet links using OAM EFM (OAM
Ethernet at the First Mile). ETX-2 can act as the active or passive side in an IEEE
802.3-2005 application.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
Standards
IEEE 802.3-2005
Benefits
Ethernet OAM (EFM) provides remote management and fault indication for the
Ethernet links. Remote link failure can be detected via OAM (EFM).
Functional Description
The OAM (EFM) discovery process allows a local data terminating entity (DTE) to
detect Ethernet OAM capabilities on a remote DTE. Once Ethernet OAM support
is detected, both ends of the link exchange state and configuration information,
such as mode, PDU size, loopback support, etc. If both DTEs are satisfied with
the settings, OAM is enabled on the link. However, the loss of a link or a failure
to receive OAMPDUs for five seconds may cause the discovery process to
restart.
DTEs may either be in active or passive mode. DTEs in active mode initiate the
ETH-OAM (EFM) communications and can issue queries and commands to a
remote device. DTEs in passive mode generally wait for the peer device to
initiate OAM communications and respond to commands and queries, but do not
initiate them.
A flag in the OAMPDU allows an OAM entity to convey the failure condition Link
Fault to its peer. Link Fault refers to the loss of signal detected by the receiver;
A Link Fault report is sent once per second with the Information OAMPDU.
Factory Defaults
By default, OAM EFM is not enabled for Ethernet/logical MAC/PCS ports.
You can configure OAM EFM for Ethernet/logical MAC/PCS ports. When link OAM
(EFM) is enabled for a port, you can view its status by displaying the port status
(show status). You can also display the OAM (EFM) parameters and OAM (EFM)
statistics.
Enabling link OAM (EFM) efm descriptor <1–2> The EFM descriptor must exist
before you can assign it to a port
Note: In order for link OAM (EFM)
to function properly, the relevant
Ethernet port must be associated
with an L2CP profile that
specifies peer action for MAC
0x02.
Displaying link OAM (EFM) show oam-efm Note: Relevant only for
parameters Ethernet/PCS ports, if link OAM
(EFM) is enabled.
Displaying link OAM (EFM) show oam-efm-statistics Note: Relevant only for
statistics Ethernet/PCS ports, if link OAM
(EFM) is enabled.
Examples
To enable active link OAM (EFM) for ETX203AM Ethernet port 1/1:
#************** Configure L2CP profile for OAM EFM
exit all
configure port l2cp-profile mac2peer
mac 0x02 peer
exit all
To display the link OAM (EFM) status for Ethernet port 1/1
ETX-2>config>port>eth(1/1)# show oam-efm
Administrative Status : Enabled
Operational Status : Link Fault
Loopback Status : Off
Information
---------------------------------------------------------------
Local Remote
Mode : Active --
MAC Address : 00-20-D2-30-CC-9D --
Unidirectional : Not Supported --
Vars Retrieval : Supported --
Link Events : Supported --
Loopback : Supported --
PDU Size : 1518 --
Vendor OUI : 0x0020D2 --
11.4 TWAMP
ETX-2 provides a low-scale (150 sessions) OAM TWAMP Light mechanism for
measurement of one-way and two-way metrics between Layer-2 or Layer-3
network elements.
ETX205A with the PMC option provides a high-scale (3000 sessions) TWAMP
mechanism for measurement of the IP performance of Layer-3 networks at all
locations, without the need for a special performance management system.
Applicable Products
This feature is applicable to all ETX-2 products, with the following conditions:
• PCS port is relevant to ETX203AM with an SHDSL or VDSL2 module, and
ETX203AX with embedded SHDSL ports.
• <slot> is relevant to ETX203AM and ETX220A.
• Full TWAMP, UDP test, and RADM are relevant for ETX205A with the PMC
option.
Standards
RFC 5357 – A Two-Way Active Measurement Protocol (TWAMP)
RFC 2330 – Framework for IP Performance Metrics
RFC 2681 – A Round-trip Delay Metric for IPPM
RFC 4656 – A One-way Active Measurement Protocol (OWAMP)
RFC 5481 – Packet Delay Variation Applicability Statement
RFC 4737 – Packet Reordering Metrics
RFC 5560 – A One-Way Packet Duplication Metric
ITU-T Y.1540 – Internet protocol data communication service – IP packet
transfer and availability performance parameters
ITU-T Y.1541 – Network performance objectives for IP-based services
ITU-T Y.1543 – Measurements in IP networks for inter-domain performance
assessment
Benefits
OAM TWAMP measures the IP performance of Layer-2 or 3 networks at all
locations, without the need for a special performance management system. Its
ICMP Echo service is useful for probing and general debugging, such as path
continuity and integrity verification.
PMC (in ETX205A) is a powerful application for ensuring SLA parameters in
Layer-3 networks, by testing thousands of Layer-3 services simultaneously.
Functional Description
OAM TWAMP
ETX-2 supports low-scale (150 sessions @10 pps) OAM TWAMP, in the following
scale:
• Up to 15 Layer-3 controllers (Router interfaces of HW Router)
• Up to a total of seven Layer-2 controllers (RI over Bridge or RI over L2
probe)
• Up to three Layer-2 controllers over L2 probe
• Up to 15 peers per device are supported for TWAMP controllers.
• Multiple TWAMP sessions (up to 150) can be supported over a single Layer-2
service / TWAMP controller.
ETX-2 TWAMP controllers and responders can operate in the following modes:
• Layer-2 E-Line (pont-to-point) service – L2 probe configuration. The TWAMP
controller/responder is associated with a router interface and bound to an
Ethernet/logical MAC/PCS port and flow.
PMC TWAMP
ETX205A with PMC provides TWAMP controllers and responders with higher
limits than ETX-2 TWAMP for measurement of the IP performance of your
Layer-3 network at all locations.
ETX205A with PMC supports TWAMP with the following capabilities:
• TWAMP Light
• Full TWAMP, including TWAMP Control protocol
• ICMP echo
• UDP echo
• Responder Agnostic Delay Measurement (RADM) – one-way measurement
without local/remote node TOD (NTP) lock
TWAMP Light
Note You can activate TWAMP Light on any ETX-2 device, as well as on PMC in
ETX205A.
Session-Sender Session-Reflector
TWAMP Test
In addition to viewing the metrics in the test reports, you can also view them via
a network management system portal, such as the RADview Performance
Management portal, if collection of PM statistics for the OAM TWAMP
component is enabled (via pm-collection command in the reporting level). See
Performance Management below for details.
Full TWAMP
Note You can configure Full TWAMP only on the PMC in ETX205A.
TWAMP Test
Vendor Vendor
Specific Specific
TWAMP Control
TWAMP Control Layered over TCP; used to initiate, start, and stop
measurement sessions.
TWAMP Test Layered over UDP; used to exchange test packets between
two measurement nodes.
1 Configure router interfaces for management and TWAMP. TWAMP generator in PMC
6 Configure management and data flows, taking into account the ETX-2
VLANs used in the PMC TWAMP generator.
2. The source and destination UDP port of the outgoing TWAMP test packets
for the requested sessions are conveyed to the server.
3. The client monitors whether the test session has been accepted by the
server. If it has been rejected, the client raises an event.
Note
This test can be run on any ETX-2 device, as well as on PMC in ETX205A.
ETX-2 supports the two-way (round trip) ICMP Echo test, a member of the
TWAMP tests. It is a useful tool for testing and debugging path continuity and
integrity verification.
The test, supported for both IPv4 and IPv6, is based on ICMP/ICMPv6 Echo
request/reply packets. The ICMP Echo test is defined per peer towards a specific
responder, which can be any device or workstation with standard IPv4/IPv6 stack
that responds to standard ICMP/ICMPv6 Echo request packets. The ICMP peer can
generate multiple ICMP Echo test sessions to the same responder; these tests
differ in ICMP identifier, and possibly in packet length and DSCP. The ICMP peer
can generate ICMP Echo tests in continuous and non-continuous modes.
You do not configure peer parameters for the ICMP Echo test. The calculation
mode is not configurable; it is automatically set to default (round-trip). The
responder sequence number is also set to its default (off).
ICMP Echo test is performed as follows:
1. ICMP Echo IPv4/IPv6 test generates test packets based on IPv4/IPv6 ICMP
Echo request standard packets.
2. ICMP Echo builds test packets with:
Test session identifier
Controller’s transmit sequence number
Controller’s transmit timestamp
3. Controller identifies received packet according to ICMP identifier (represents
test session).
4. Packet’s round trip delay is calculated according to received and transmitted
timestamps.
5. Loss, duplicate, and reorder are calculated according to sequence number.
6. Metrics are calculated for roll-up window, current interval, and report interval
(as defined for TWAMP).
7. Metrics are collected, according to PM collection mechanism (as defined for
TWAMP).
8. ICMP Echo test events and alarms are generated as TWAMP events and
alarms with the same definitions.
Delay result (na/pass/fail)
DV result (na/pass/fail)
Loss result (na/pass/fail)
UDP Echo is a client-server service, defined at the UDP port level, which uses
user packets for its measurements. As routers process pings at a lower priority
than actual user packets and sometimes even block them, UDP Echo’s method of
measuring packet transmission is more accurate than ICMP Echo, which uses
pings for its measurements, and may delay or discard ICMP Echo requests in a
manner that skews the measurement results.
UDP Echo packets traverse the same intermediate nodes and logical queuing
paths as the user data traffic of the same class of service. The class of service is
dictated by DSCP code bit settings, etc. or other network operator specific
criteria.
UDP Echo is performed as follows:
1. Once the peer of IPPM type udp-echo is activated, the UDP client (sender)
commences sending periodic UDP packets (udp-echo-request) to the UDP
Note The TWAMP controller and responder can be configured with UDP Echo as its
IPPM type; however, UDP Echo can only be tested vs. third party equipment.
RADM
MOS On Demand
Factory Defaults
By default, no controllers or responders are configured.
Configuring TWAMP
You can configure low-scale (150 sessions) TWAMP in an ETX-2 device, as well
as high-scale (3,000 sessions) TWAMP in the PMC of an ETX205A device.
Configuring Controllers
To configure a TWAMP Light controller of an ETX-2 device:
1. Navigate to configure oam twamp.
The config>oam>twamp# prompt is displayed.
2. Enter controller <name> [<number>] [light] [l2-probe]
Note The parameter l2-probe specifies that the controller is working in mode Layer-2
E-Line service (see Functional Description).
Binding controller to a port bind ethernet <port-index> Can bind controller to a port, only if
bind logical-mac <port-number> controller is in layer-2 probe mode.
bind pcs <port-number> Typing no bind deletes definition of
TWAMP ingress and egress port.
Note: It is only possible to bind a PMC
responder to an Ethernet port
(relevant for PMC in ETX205A).
Defining peer entity peer <ip-address> twamp-light | twamp (Full TWAMP, which includes
(corresponding to responder), icmp-echo | twamp | udp-echo TWAMP Light and TWAMP control)
to run TWAMP test sessions and udp-echo options are only
relevant for configuration of PMC in
ETX205A.
See Running Test Sessions Via
Controller Peers.
Associating controller with vlan-tag vlan <vlan> [p-bit <p-bit>] Can associate controller with VLAN
VLAN [inner-vlan <inner-vlan>] only if controller is in layer-2 probe
[inner-p-bit <inner-p-bit>] mode.
Possible values for vlan, inner-vlan:
0-4095, 0xFFFFFFFF (i.e. not
applicable)
Possible values for p-bit, inner p-bit:
0-7
Typing no vlan deletes VLANs for L2
service definition in L2 probe mode.
Note: This parameter is not relevant
for configuration of PMC in ETX205A.
Defining the TCP port number tcp-port Possible values: 862 (default)
for the TWAMP control session 1024–65535
Note: This parameter is available only
for ETX205A with PMC when the
peer test session is TWAMP.
Note On the PMC, before activating a TWAMP session (RTT or RADM), verify that the
NTP client on board has moved into LOCKED state.
Activating all configured test activate duration <minutes> The tests run for the specified amount
sessions in one-time mode of time.
Type no activate to deactivate the
one-time (non-continuous) command.
Possible values for minutes: 1-10080
Activating all configured test activate continuous The tests run until they are stopped.
sessions in continuous mode Type no activate to deactivate the
continuous command.
Defining the type of calculation-mode { round-trip | one-way | round-trip: TWAMP controller peer
calculation for the TWAMP one-way-radm}} calculates standard TWAMP metrics
metrics and partial one-way metrics:
• Two-way metrics – availability, loss,
delay, PDV (packet delay variation),
IPDV (inter-packet delay variation)
• Partial one-way metrics – IPDV,
duplicate packets, reordered
packets, fragmented packets (no
one-way delay or PDV metrics)
• One-way loss and availability
one-way: TWAMP controller peer
calculates one-way metrics:
• One-way metrics – delay, PDV,
IPDV, duplicate packets, reordered
packets, fragmented packets
• One-way loss and availability
one-way-radm: For configuration of
PMC on ETX205A. Same as enabled
KPI one-way calculation when
responder and/or controller are not
ToD locked to an external reference,
such as NTP.
The TWAMP controller peer calculates
responder agnostic one-way metrics.
Notes:
• This parameter is masked when
using ICMP Echo protocol, as its
value is always round-trip (the
default).
• This parameter can be changed
only if there is no active test
session.
• You can set one-way mode only if
both the controller and responder
are ToD locked.
• One-way loss and availability is
available only if responder is
configured to transmit an
independent sequence number
(tx-seq-num enabled), and
controller is configured accordingly
(responder-seq-num enabled).
• One-way delay and PDV metrics are
available only if tx-extended-info
has been enabled in responder, and
it sent indication that its ToD (Time
of Day) is synchronized; the metrics
are accurate only if the controller
ToD is also synchronized.
• The fragmented packet count in
the forward direction (controller to
responder) is available only if tx-
extended-info has been enabled in
the responder, and it sent
indication of fragmentation.
Configuring test session test-session <number> The UDP and DSCP can be used to
[name <name-string>] distinguish between test sessions.
[udp-port <udp-port-number>] UDP port number: 1–65535
[test-profile <profile-name>]
Test profile name: Up to 32 characters
[dscp <dscp-number>]
DSCP number: 0–63 (default: 63)
Notes:
• The udp-port parameter is masked
when using the ICMP Echo protocol.
• The udp-port parameter is optional,
when onfiguring PMC peer with
TWAMP test session in ETX205A
with PMC.
Viewing test report show report <name> all See Viewing TWAMP Reports.
show report <name> current
show report <name> interval
<interval-num>
Configuring delay variation delay-variation-event-type {pdv | ipdv} pdv – Packet delay variation metric
event type to define whether ipdv – Inter-packet delay variation
the PDV or IPDV metric is metric
used for the delay threshold
See RFC 5481 for details on these
metrics.
Defining test session loss- loss-ratio-threshold <ppm> This parameter is available only for
ratio-threshold in ppm configuration of PMC in ETX205A with
(packet per million) PMC.
Possible values: 1000–10000 ppm
Default: 1000 ppm
Defining test profile packet transmit-rate <pps> Note: In layer-2 probe mode, 150 pps
transmit rate in PPS is possible only if the test packet
payload length is not greater than 170
bytes.
Configuring Responders
This section describes how to create a TWAMP responder entity.
To configure a TWAMP Light responder of an ETX-2 device:
1. Navigate to configure oam twamp.
The config>oam>twamp# prompt is displayed.
2. To configure the TWAMP Light responder, enter:
responder <name> [<number>] [light] [l2-probe]
Note The parameter l2-probe specifies that the responder is working in mode Layer-2
E-Line service (see Functional Description).
3. Enter all necessary commands according to the tasks listed in the table
below.
Binding responder to a port bind ethernet <port-index> Can bind responder to a port, only if
bind logical-mac <port-number> responder is in layer-2 probe mode.
bind pcs <port-number> Typing no bind deletes definition of
TWAMP ingress and egress port.
Note: It is only possible to bind a PMC
responder to an Ethernet port
(relevant for ETX205A with PMC).
Associating responder with a router-entity <number> The parameter <number> is the router
router that contains a number, in which a router interface
suitable router interface must be configured with the same IP
address as local-ip-address.
Possible values:
0 (default) – no router entity
1-Maximum number of router entities
Associating responder with vlan-tag vlan <vlan> [p-bit <p-bit>] Can associate responder with VLAN
VLAN [inner-vlan <inner-vlan>] only if responder is in layer-2 probe
[inner-p-bit <inner-p-bit>] mode.
Possible values for vlan, inner-vlan:
0-4095
Possible values for p-bit, inner p-bit: 0-
7
Typing no vlan deletes VLANs for L2
service definition in L2 probe mode.
The p-bit in the transmitted frame can
be either configured (fixed, default
option) or copied from received frame.
Note: This parameter is not relevant
for configuration of PMC in ETX205A.
Defining TCP port number for tcp-port Relevant for PMC configuration in
the TWAMP control session. ETX205A.
Possible values: 862 (default)
1024–65535
Peer test sessions show status in level config oam twamp controller peer
status
Counter Description
Loss Packets Fwd Number of packets lost in forward direction, calculated by Tx Packets Fwd –
Rx valid count
Loss Packets Back Number of packets lost in backward direction, calculated by Tx Packets Back –
Rx valid count
Counter Description
Loss Ratio Fwd Loss Packets Fwd divided by Tx Packets Fwd, converted to a percentage
Loss Ratio Back Loss Packets Back divided by Tx Packets Back, converted to a percentage
Availability Count Fwd (sec) Number of available seconds in forward direction. A (forward) minute is declared
as unavailable if it has more than 75% packet loss in forward direction,
therefore it is available if packet loss in forward direction is 25% or less. When a
minute is declared unavailable, the delay, delay variation, loss measurements,
and their derived metrics are ignored for that minute.
Availability Count Back (sec) Number of available seconds in backward direction. A (backward) minute is
declared as unavailable if it has more than 75% packet loss in backward
direction therefore it is available if packet loss in backward direction is 25% or
less. When a minute is declared unavailable, the delay, delay variation, loss
measurements, and their derived metrics are ignored for that minute.
Duplicate Packets Fwd Number of duplicate packets in forward direction. A packet is considered
duplicate (forward) if its controller sequence number or controller Tx timestamp
matches that of a previously received packet in forward direction.
Duplicate Packets Back Number of duplicate packets in backward direction. A packet is considered
duplicate (backward) if its responder Tx timestamp matches that of a previously
received packet in backward direction.
Duplicate Ratio Fwd Duplicate Packets Fwd divided by Tx Packets Fwd, converted to a percentage
Duplicate Ratio Back Duplicate Packets Back divided by Tx Packets Back, converted to a percentage
Reordered Packets Fwd Number of reordered packets in forward direction. A packet is considered
reordered (forward) if its controller sequence number or controller Tx timestamp
is smaller than that of a previously received packet in forward direction.
Reordered Packets Back Number of reordered packets in backward direction. A packet is considered
reordered (backward) if its responder sequence number is smaller than that of a
previously received packet in backward direction.
Reordered Ratio Fwd Reordered Packets Fwd divided by Tx Packets Fwd, converted to a percentage
Reordered Ratio Back Reordered Packets Back divided by Tx Packets Back, converted to a percentage
Fragmented Packets Fwd Number of fragmented packets in forward direction. When the TWAMP
responder receives a fragmented packet, when it reflects it to the controller, the
responder sends indication of fragmentation, if tx-extended-info was enabled.
When this indication is received, the controller increments the Fragmented
Packets Fwd counter.
Fragmented Packets Back Number of fragmented packets in backward direction. When the TWAMP
controller recognizes a fragmented packet, it increments the Fragmented
Packets Back counter.
Delay-Fwd Threshold Crossing Number of packets in forward direction with delay larger than the delay
Count threshold configured for the corresponding test profile
Delay-Back Threshold Number of packets in backward direction with delay larger than the delay
Crossing Count threshold configured for the corresponding test profile
Counter Description
PDV-Fwd Max (ms) Maximum of PDV (Packet Delay Variation) values in forward direction. Packet
Delay Variation is calculated according to ITU-T Y.1540, by subtracting the
minimum delay from the 99.9% percentile of the delay values
PDV-Fwd Average (ms) Average of PDV (Packet Delay Variation) values in forward direction, calculated
by subtracting Delay-Fwd Min from Delay-Fwd Average
PDV-Back Max (ms) Maximum of PDV (Packet Delay Variation) values in backward direction
PDV-Back Average (ms) Average of PDV (Packet Delay Variation) values in backward direction
IPDV-Fwd Max (ms) Maximum of IPDV (Inter Packet Delay Variation) values in forward direction. Inter
Packet Delay Variation is calculated according to RFC 5481, from the variations
of the delays between valid packets.
IPDV-Fwd Average (ms) Average of IPDV (Inter Packet Delay Variation) values in forward direction
IPDV-Back Max (ms) Maximum of IPDV (Inter Packet Delay Variation) values in backward direction
IPDV-Back Average (ms) Average of IPDV (Inter Packet Delay Variation) values in backward direction
Examples
flow E3toE1
classifier v100
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
no policer
no shutdown
exit
exit
No policer
• Test session:
Profile with payload length 150, and loss timeout 1 second
UDP port 999
DSCP 0
exit all
#*********Configure SVI for TWAMP
configure
port svi 2 twamp
no shutdown
exit
exit
flow E3toE1
classifier v100
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
no policer
no shutdown
exit
exit
exit
port 3 no shutdown
vlan 1
exit all
flow BP2toE4_1
classifier v1
ingress-port bridge-port 1 2
egress-port ethernet 4/1 block 0/1
no policer
no shutdown
exit
flow SVI2toBP3
classifier all
ingress-port svi 2
egress-port bridge-port 1 3
vlan-tag push vlan 1 p-bit fixed 0
no policer
no shutdown
exit
exit
flow BP1to E1
classifier v1
ingress-port bridge-port 1 1
egress-port ethernet 1 block 0/1
no policer
no shutdown
exit
flow BP2to E3
classifier v1
ingress-port bridge-port 1 2
egress-port ethernet 3 block 0/1
no policer
no shutdown
exit
flow SVI2toBP3
classifier all
ingress-port svi 2
egress-port bridge-port 1 3
vlan-tag push vlan 1 p-bit fixed 0
no policer
no shutdown
exit
exit
Note This example assumes for the routers in the controller and responder:
• In the controller, the next hop to reach the 22.22.22.0/24 subnet is
12.12.12.2
• In the responder, the next hop to reach the 12.12.12.0/24 subnet is
22.22.22.2
flow SVI2toE1
classifier untagged
ingress-port svi 2
egress-port ethernet 1 queue 0 block 0/1
no policer
no shutdown
exit
exit
address 22.22.22.1/24
address 22:22:22::1/64
bind svi 2
no shutdown
exit
static-route 12.12.12.0/24 address 22.22.22.2
exit
flow SVI2toE1
classifier untagged
ingress-port svi 2
egress-port ethernet 1 queue 0 block 0/1
no policer
no shutdown
exit
exit
x86
Eth1 Eth2
Internal Internal
Port 6 Port 5 ETX-205A
Push/Pop
Bridge 1 SVI 1
VLAN 4094
Push/Pop
VLAN 4094
NNI Port 1
ETX-205A
MNG Traffic
VLAN 4094
exit all
flow eth1_bp1_untagged
classifier untagged
ingress-port ethernet 1
egress-port bridge-port 1 1
vlan-tag push vlan 4094 p-bit fixed 0
no policer
reverse-direction block 0/1
no shutdown
exit
flow int_eth6_bp6_v4094
classifier v4094
ingress-port int-ethernet 6
egress-port bridge-port 1 6
no policer
reverse-direction block 0/1
no shutdown
exit
flow svi1_bp9_all
classifier all
ingress-port svi 1
egress-port bridge-port 1 9
no policer
vlan-tag push vlan 4094 p-bit fixed 0
reverse-direction
no shutdown
exit
Notes • The ETX-2 internal Ethernet port 6 is connected to Ethernet port 1 on the
x.86 card.
• Configure the x86 card by accessing the x86 remote terminal via command
configure chassis ve-module remote-terminal (refer to Remote Terminal in
the Management and Security chapter).
mtu 2000
bind ethernet 1
vlan 101
no shutdown
exit
static-route 33.33.116.0/24 address 11.11.101.5
exit all
server 3
address 172.17.172.65
no shutdown
exit all
flow Eth1_Int6_101
classifier v101
ingress-port ethernet 1
egress-port int-ethernet 6 queue 0 block 0/1
no policer
no shutdown
exit
flow Int6_Eth1_101
classifier v101
ingress-port int-ethernet 6
egress-port ethernet 1 queue 0 block 0/1
no policer
no shutdown
exit all
Controller Test Name Dir IP Size Loss Delay PDV IPDV Result
DSCP
Ratio Max Max Max
(bytes) (ms) (ms) (ms)
----------------------------------------------------------------------------
1 fwd 22 1280 2.0E-2 0.658 0.065 0.048 Fail
1 bck 22 1280 0 0.263 0.014 0.011 Pass
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Cannot modify; TWAMP Tried modifying the bound Shut down the controller and then
controller is active port definition while controller modify the bound port definition.
was active (status was not
‘shutdown’).
Cannot modify; TWAMP Tried modifying the bound Wait for the active test to terminate
controller has active test port definition while controller and then modify the bound port
had an active test. definition.
Cannot delete; TWAMP controller Tried removing the bound port Shut down the controller and then
is active while controller was active remove the bound port.
(status was not ‘shutdown’).
Tried removing the VLAN Shut down the controller and then
definition while controller was remove the VLAN definition.
active (status was not
‘shutdown’).
Cannot delete; TWAMP controller Tried removing the bound port Wait for the active test to terminate
has active test while controller had an active and then remove the bound port.
test.
Tried removing the VLAN Wait for the active test to terminate
definition while controller had and then remove the VLAN definition.
an active test.
Cannot activate; router entity Tried activating controller Define router entity and local IP
and local ip address must be when router entity and/or local address, and then activate controller.
defined IP address were not defined.
Cannot activate; router entity, In l2-probe mode, tried Define router entity, local IP address,
local ip address and port must activating controller when and port, and then activate controller.
be defined router entity, local IP address,
and/or port were not defined.
Cannot delete; peer has active Tried deleting peer entity, Wait for active test to terminate, and
test while there was an active test. then delete peer entity.
Cannot create; name already in Tried giving a test session a Give test session a unique name.
use name that already exists under
peer context.
Cannot activate; controller not Tried activating peer test Wait for controller to be ready, and
ready sessions when controller then activate peer test sessions.
status was ‘idle’ (not ready).
Cannot activate; peer has active Tried activating peer test Wait for active tests to terminate, and
test sessions while there were then activate peer test sessions.
active tests.
Cannot delete; TWAMP Tried removing active Shut down the responder and then
responder is active responder (status ‘idle’ or delete it.
‘ready’).
Tried deleting the bound port Shut down the responder and then
definition while responder was delete the bound port definition.
active (status ‘idle’ or ‘ready’).
Tried removing VLAN definition Shut down the responderer and then
while responder was active remove the VLAN definition.
(status ‘idle’ or ‘ready’).
Cannot modify; TWAMP Tried modifying the bound Shut down the responder and then
responder is active port definition while responder modify the bound port definition.
was active (status ‘idle’ or
‘ready’).
Applicable Products
This feature is applicable to all ETX-2 products, except for capacity differences
between products that are specified where relevant.
Standards
ITU-T Y.1564
Benefits
The Y.1564 testing methodology allows service providers to have a standard way
of measuring the performance of IP transport services. The tests are performed
per multiple traffic streams simultaneously, confirming policing per EVC or
EVC.CoS.
Factory Defaults
By default, there are no L3 SAT entities configured in ETX-2.
When a peer profile is created, it has the following default configuration.
bw-steps 25 50 75 100
configuration-duration 100
performance-duration 120
policing-test policing-test
report-type no-clock-sync
udp-port 53248
availability-threshold 9990
delay-threshold 200000
delay-variation-threshold 100000
ip-size 256
loss-ratio-threshold 1000
dscp 0
router-entity 1
router-entity 1
udp-port 53248
Functional Description
L3 SAT testing has the following objectives:
• Validate that the IP transport service is correctly configured.
• Validate the quality of the services as delivered to the end user.
L3 SAT tests can be performed over Layer-3 networks, or as a Layer-3 service
over a Layer-2 network.
Test Phases
The methodology has a service configuration test phase followed by a service
performance test phase; the service configuration test is short in order to
prevent wasted time caused by failed service performance tests. The test
flowchart below illustrates the two phases.
Enter test
parameters
Start test
Pass
Service
performance
test
Pass
Test completed
Configuration Test
The configuration test validates that services are configured as intended before
proceeding to the service performance test. The following are performed:
• Preliminary (common for all test sessions):
Verify connectivity – If the connectivity subtest fails, the configuration
test fails and the L3 SAT to the relevant peer is stopped. Otherwise, the
detected responder type is recorded and shown in the test report.
Determine the path MTU – If the MTU subtest fails, the configuration
test fails and the L3 SAT to the relevant peer is stopped. Otherwise, the
discovered MTU is recorded and shown in the test report.
Note The preliminary tests are always performed, even if the configuration phase is
not included in the scope of the test.
size at a time. The bandwidth subtest is successful if the subtest results are
within the configured Service Acceptance Criteria (SAC) limits.
If a bandwidth subtest fails for a particular packet size, the testing for that
packet size continues and all remaining bandwidth subtests are performed.
If packet sizes larger than the discovered MTU were configured for the test
session, the bandwidth subtest is considered failed for these packet sizes; it is
not performed for packet sizes larger than the MTU.
A test session is declared successful only if the results for all tested packet sizes
are within SAC limits.
The configuration test is declared successful if the results for all the test
sessions are successful.
Performance Test
The performance test validates the quality of the services over a
user-configurable period of time, as follows:
• Traffic is generated for all services at the configured bandwidth level.
• For all the test sessions, test packets are sent simultaneously at 100% of
the bandwidth configured per test session.
• Per test session, the duration of the performance test is evenly divided
between the different packet sizes, e.g. per test session, each packet size is
transmitted for an equal amount of time.
The performance test is declared successful if the results are within SAC limits.
Test Elements
L3 SAT includes the following elements:
Peers Used to run TWAMP test sessions. One or more peers can
be configured per generator with IP address(es)
corresponding to responder(s).
Test Sessions One or more test sessions can be configured per peer.
Responders Receive test and OAM frames from generator, and transmit
responses to generator. Responders can be the following
types:
IP loop – filters incoming traffic by destination IP address,
and loops it back while performing MAC address swap and
IP address swap
UDP loop – filters incoming traffic by destination IP address
and UDP port, and loops it back while performing MAC
address swap, IP address , and UDP port swap
Loop and timestamp – filters incoming traffic by
destination IP address and UDP port and performs IP loop
for loss measurement packets, UDP loop with timestamp
for delay measurement packets
Note
Responders can be ETX-2 devices or third-party devices. Third-party responders
can be only IP loop or UDP loop types. Only ETX-2 can be a loop and timestamp
responder, and only an ETX-2 responder can provide one-way metrics.
c. Configure and activate L3 SAT generator and relevant peers and test
sessions.
Configuring Generators
To configure L3 SAT generators:
1. Navigate to configure test l3sat.
The config>test>l3sat# prompt is displayed.
2. Enter:
generator <name> [l2-probe]
Note The optional parameter l2-probe is used to specify Layer-3 over Layer-2
operation. The default without the parameter is Layer-3 service.
Associating generator with vlan-tag <vlan> p-bit fixed <p-bit> • <vlan> – Outer VLAN tag of test
VLAN, if the generator is [inner-vlan <inner-vlan>] packets
working in layer-2 probe mode [inner-p-bit <inner-p-bit>] • <p-bit> – Outer VLAN priority of
vlan-tag <vlan> p-bit marking test packets
<dscp-to-pbit-profile> [inner-vlan • <inner-vlan> – Inner VLAN tag of
<inner-vlan>] [inner-p-bit <inner-p-bit>] test packets
• <inner-p-bit> – Inner VLAN priority
of test packets
• <dscp-to-pbit-profile> – Marking
profile used to mark outer VLAN
priority of test packets
Configuring Peers
To configure L3 SAT peers:
1. Navigate to configure test l3sat generator <name>.
The config>test>l3sat>generator(<name>)# prompt is displayed.
2. Enter:
peer <ip-address>
The prompt config>test>l3sat>generator(<name>)> peer(<ip-address>)#
is displayed.
3. Enter all necessary commands according to the tasks listed below.
Assigning a test session test-session <name> session-profile Multiple test sessions can be
<profile-name> bw <kbps> defined in the peer.
[dscp <number>] bw – rate of the test session
traffic in Kbps
dscp – priority value for the
test session traffic
Displaying results and show report <test-name> Available only if peer was
measurements for a specific test activated
Defining the duration of the configuration-duration <seconds> Possible values: 60–300 seconds
configuration phase for each
test session
Setting the scope of the test: scope [configuration] [performance] You can enter the command
configuration test, performance with one or both parameters.
test, or both
Defining test packet size ip-size [64] [128] [256] [512] [1024] • You can specify up to four
[1280] [1500] [mtu] [custom <size>] packet sizes.
• Range for custom <size>:
52–2094
Configuring Responders
To configure L3 SAT responders:
1. Navigate to configure test l3sat.
The config>test>l3sat# prompt is displayed.
2. Enter:
responder <name> [l2-probe]
Note The optional parameter l2-probe s used to specify Layer-3 over Layer-2
operation. The default without the parameter is Layer-3 service.
Associating responder with a router-entity <number> The parameter <number> is the router
router that contains a number, in which a router interface
suitable router interface must be configured with the same IP
address as local-ip-address.
Associating responder with vlan-tag <vlan> p-bit fixed <p-bit> • <vlan> – Outer VLAN tag of test
VLAN, if the responder is [inner-vlan <inner-vlan>] packets
working in layer-2 probe [inner-p-bit <inner-p-bit>] • <p-bit> – Outer VLAN priority of
mode vlan-tag <vlan> p-bit marking test packets
<dscp-to-pbit-profile> [inner-vlan • <inner-vlan> – Inner VLAN tag of
<inner-vlan>] [inner-p-bit <inner-p-bit>] test packets
• <inner-p-bit> – Inner VLAN priority
of test packets
• <dscp-to-pbit-profile> – Marking
profile used to mark outer VLAN
priority of test packets
Note
Elapsed Time includes the time it has so far taken to perform the steps,
including the inter-step wait time.
prompt, enter:
show summary-report
ETX-2>config>test>l3sat>generator(gen3)>peer(50.50.50.101)# show summary-report
End Points
Generator Address : 50.50.50.100
Responder Address : 50.50.50.101
Responder Type : Loop & Timestamp
MTU (bytes) : 1500
Test
Scope : Configuration + Performance
Peer Profile Name : peer1
Start Date & Time : 2014-12-04 13:28:10
End Date & Time : 2014-12-04 13:31:23
Total Duration : 193
Overall Result : Failed
Test
Scope : Configuration + Performance
Peer Profile Name : peer1
Report Type : No Clock Sync
BW (Mbps) : 1.000
DSCP : 3
IP Sizes (bytes) : 128, 512, 750
Session Profile Name : session3
Start Date & Time : 2014-12-04 13:33:55
End Date & Time : 2014-12-04 13:42:08
Total Duration : 493
Overall Result : Failed
Configuration Phase
-----------------------------------------------------------------------------
Duration (sec) : 100
Configuration Result : Passed
Step Load
-----------------------------------------------------------------------------
Parameter Step#1 Step#2 Step#3 Step#4 Thr
---------------- -------- -------- -------- -------- --------
Tx Rate (Mbps) 0.249 0.500 0.749 1.001
IR - mean (Mbps) 0.249 0.499 0.750 1.001
PL - count 1 0 0 1
PLR 6.0E-4 0 0 1.0E-4 1.000E-3
PTD - min (ms) 4.075 4.073 4.062 4.077
PTD - mean (ms) 4.142 4.137 4.132 4.132 200.000
PTD - max (ms) 4.248 4.268 4.267 4.265
PTD - std (ms) 0.032 0.040 0.041 0.042
PDV - mean (ms) 0.067 0.064 0.070 0.070 0.150
PDV - max (ms) 0.173 0.195 0.205 0.188
IPDV-Fwd - mean (ms) 0.023 0.039 0.032 0.030
IPDV-Fwd - max (ms) 0.139 0.087 0.103 0.102
IPDV-Bck - mean (ms) 0.020 0.023 0.017 0.020
IPDV-Bck - max (ms) 0.057 0.075 0.063 0.112
---------------- -------- -------- -------- -------- --------
Result Passed Passed Passed Passed
Policing
-----------------------------------------------------------------------------
Parameter Policing Thr
---------------- -------- --------
Tx Rate (Mbps)
IR - mean (Mbps)
PL - count
PLR 0 1.000E-3
PTD - min (ms)
PTD - mean (ms) 200.000
PTD - max (ms)
PTD - std (ms)
PDV - mean (ms) 0.150
PDV - max (ms)
IPDV-Fwd - mean (ms)
IPDV-Fwd - max (ms)
IPDV-Bck - mean (ms)
IPDV-Bck - max (ms)
---------------- -------- --------
Result
Step Load
-----------------------------------------------------------------------------
Parameter Step#1 Step#2 Step#3 Step#4 Thr
---------------- -------- -------- -------- -------- --------
Tx Rate (Mbps) 0.250 0.498 0.749 0.997
IR - mean (Mbps) 0.250 0.497 0.750 0.997
PL - count 0 0 0 0
PLR 0 0 0 0 1.000E-3
PTD - min (ms) 4.780 4.753 4.764 4.769
PTD - mean (ms) 4.864 4.856 4.872 4.872 200.000
PTD - max (ms) 5.190 5.225 5.164 5.250
PTD - std (ms) 0.060 0.080 0.093 0.077
PDV - mean (ms) 0.084 0.103 0.108 0.108 0.150
PDV - max (ms) 0.410 0.472 0.400 0.481
IPDV-Fwd - mean (ms) 0.038 0.031 0.051 0.050
IPDV-Fwd - max (ms) 0.296 0.133 0.330 0.295
IPDV-Bck - mean (ms) 0.032 0.057 0.067 0.039
IPDV-Bck - max (ms) 0.314 0.394 0.315 0.138
---------------- -------- -------- -------- -------- --------
Result Passed Passed Passed Passed
Policing
-----------------------------------------------------------------------------
Parameter Policing Thr
---------------- -------- --------
Tx Rate (Mbps)
IR - mean (Mbps)
PL - count
PLR 0 1.000E-3
PTD - min (ms)
PTD - mean (ms) 200.000
PTD - max (ms)
PTD - std (ms)
PDV - mean (ms) 0.150
PDV - max (ms)
IPDV-Fwd - mean (ms)
IPDV-Fwd - max (ms)
IPDV-Bck - mean (ms)
IPDV-Bck - max (ms)
---------------- -------- --------
Result
Step Load
-----------------------------------------------------------------------------
Parameter Step#1 Step#2 Step#3 Step#4 Thr
---------------- -------- -------- -------- -------- --------
Tx Rate (Mbps) 0.250 0.498 0.748 0.999
IR - mean (Mbps) 0.250 0.498 0.748 0.998
PL - count 0 0 0 1
PLR 0 0 0 9.0E-4 1.000E-3
PTD - min (ms) 5.233 5.249 5.198 5.233
PTD - mean (ms) 5.296 5.297 5.318 5.318 200.000
PTD - max (ms) 5.577 5.357 5.731 5.757
PTD - std (ms) 0.052 0.025 0.099 0.102
PDV - mean (ms) 0.063 0.048 0.120 0.120 0.150
PDV - max (ms) 0.344 0.108 0.533 0.524
IPDV-Fwd - mean (ms) 0.028 0.021 0.064 0.058
IPDV-Fwd - max (ms) 0.079 0.064 0.470 0.488
IPDV-Bck - mean (ms) 0.024 0.013 0.039 0.046
IPDV-Bck - max (ms) 0.313 0.048 0.224 0.416
Policing
-----------------------------------------------------------------------------
Parameter Policing Thr
---------------- -------- --------
Tx Rate (Mbps)
IR - mean (Mbps)
PL - count
PLR 0 1.000E-3
PTD - min (ms)
PTD - mean (ms) 200.000
PTD - max (ms)
PTD - std (ms)
PDV - mean (ms) 0.150
PDV - max (ms)
IPDV-Fwd - mean (ms)
IPDV-Fwd - max (ms)
IPDV-Bck - mean (ms)
IPDV-Bck - max (ms)
---------------- -------- --------
Result
Performance Phase
-----------------------------------------------------------------------------
Duration (min) : 5
Configuration Result : Failed
Parameter IP Size #1 IP Size #2 IP Size #3 IP Size #4 Thr
128 bytes 512 bytes 750 bytes 0 bytes
---------------- -------- -------- -------- -------- --------
Tx Rate (Mbps) 0.999 0.997 0.998
IR - mean (Mbps) 0.999 0.997 0.998
PL - count 0 0 0
PLR 0 0 0 0 1.000E-3
UAS - count 0 0 0
Availability (%) 100.00 100.00 100.00 99.90
PTD - min (ms) 4.046 4.764 5.187
PTD - mean (ms) 4.171 4.899 5.401 5.401 200.000
PTD - max (ms) 4.444 5.337 5.875
PTD - std (ms) 0.064 0.112 0.158
PDV - mean (ms) 0.125 0.135 0.214 0.214 0.150
PDV - max (ms) 0.398 0.573 0.688
IPDV-Fwd - mean (ms) 0.049 0.077 0.110
IPDV-Fwd - max (ms) 0.234 0.399 0.593
IPDV-Bck - mean (ms) 0.037 0.047 0.097
IPDV-Bck - max (ms) 0.165 0.358 0.543
PD-Fwd - count 0 0 0
PDR-Fwd 0 0 0 0
PD-Bck - count 0 0 0
PDR-Bck 0 0 0 0
PR-Fwd - count 0 0 0
PRR-Fwd 0 0 0 0
PR-Bck - count 0 0 0
PRR-Bck 0 0 0 0
---------------- -------- -------- -------- -------- --------
Information Rate (IR) Number of received test packets times test packet Ethernet frame
length (in bits), divided by the elapsed time (in seconds)
Note: The test packet Ethernet frame length starts with the first
MAC address bit, and ends with the last FCS bit.
Packet loss (PL) Number of lost test packets. A test packet is considered lost in the
following cases:
• Test packet was not received back at the generator, or was
received with a round-trip delay of over two seconds.
• Report type parameter is clock-sync and the responder type is
loop and timestamp, and test packet was received with a
forward and/or backward delay over one second.
Packet loss ratio (PLR) Number of lost packets divided by the number of transmitted
packets
Round-trip packet transfer Minimum round-trip PTD. The round-trip PTD is calculated from the ×
delay (PTD) – min test packet embedded timestamps. A round-trip PTD over two
seconds is ignored, as the packet is considered lost.
One-way packet transfer delay Minimum forward PTD. The forward PTD is calculated from the test ×
(PTD), forward – min packet embedded timestamps. A forward PTD over one second is
ignored, as the packet is considered lost.
Note: The one-way PTD measurements are valid only when there is
TOD synchronization between the generator device and the
responder device, and accurate TOD synchronization is feasible only
with a responder of type loop and timestamp.
One-way packet transfer delay Minimum backward PTD. The backward PTD is calculated from the ×
(PTD), backward – min test packet embedded timestamps. A backward PTD over one
second is ignored, as the packet is considered lost.
Round-trip delay variation (PDV) Average round-trip PDV. The round-trip PDV is calculated according ×
– mean to ITU-T Y.1540, by subtracting the minimum PTD from the 99.9%
percentile of the PTD values.
One-way inter-packet delay Average forward IPDV. IPDV is calculated according to RFC 3393,
variation (IPDV) ), forward – from the variations of the delays between valid packets.
mean Note: Appears in report only if responder type is loop and
timestamp.
One-way inter-packet delay Average backward IPDV. IPDV is calculated according to RFC 3393,
variation (IPDV) ), backward – from the variations of the delays between valid packets.
mean Note: Appears in report only if responder type is loop and
timestamp.
One-way Packet Duplication PDR (forward) is calculated as PD (forward) divided by the number ×
Ratio (PDR), forward of received valid packets, converted to a percentage.
One-way Packets Reordered PRR (forward) is calculated as PR (forward) divided by the number ×
Ratio (PRR), forward of received valid packets, converted to a percentage.
Examples
flow E3toE1
classifier v100
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit
exit
• Test sessions:
Session1:
Packet sizes 128, 512, and 750
Bandwidth 10000
DSCP 11
Session2:
Default packet size (256)
Bandwidth 5000
DSCP 12
exit all
#*********Configure SVI type TWAMP
configure
port svi 2 twamp
no shutdown
exit
exit
flow E3toE1
classifier v100
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit
exit
peer-profile peer1
performance-duration custom 5
exit
Layer-3
This example illustrates configuring L3 SAT in Layer-3 mode:
• Generator is ETX203AX or ETX205A with IP address = 20.20.20.101
• Responder is ETX203AX or ETX205A with IP address = 20.20.20.20
exit
classifier-profile all match-any
match all
exit
#********* Configure flows between Eth port 3 & SVI 2
flow E3toSVI2
ingress-port ethernet 3
egress-port svi 2 queue 0
classifier v12
vlan-tag pop vlan
no shutdown
exit
flow SVI2toE3
ingress-port svi 2
egress-port ethernet 3 queue 0 block 0/1
classifier all
vlan-tag push vlan 12 p-bit fixed 0
no shutdown
exit
exit
Session2:
Default packet size (256)
Bandwidth 5000
DSCP 12
exit all
#*********Configure SVI for L3 SAT
configure
port
svi 2 twamp
no shutdown
exit
exit
flow SVI2toE3
ingress-port svi 2
egress-port ethernet 3 queue 0 block 0/1
classifier all
vlan-tag push vlan 12 p-bit fixed 0
no shutdown
exit
exit
performance-duration custom 5
exit
#*********Configure L3 SAT session profiles
session-profile session1
ip-size 512 custom 700
exit
session-profile session2
exit
Throughput test Detect the maximum frame rate without lost frames.
Packet loss test Detect the point at which frame loss does not occur.
Note
You can run the RFC-2544 tests up to 1 GbE at a time.
Applicable Products
This feature is applicable to all ETX-2 products.
Standards
RFC-2544, Benchmarking Methodology for Carrier Ethernet Networks
Benefits
You can evaluate the performance of network devices to provide performance
metrics of the Ethernet network and validate the SLA.
Functional Description
RFC-2544 testing uses OAM CFM messages such as Loopback (LB), Loss
Measurements (LM), and Delay Measurements (DM) frames. Therefore,
end-to-end OAM CFM is necessary for the testing. User data can’t be
transmitted via associated OAM service data/flows while an RFC-2544 test is
running.
In a bidirectional throughput test, the local ETX-2 generates LBM + data TLV
messages towards the far-end device, which responds with LBR messages. The
local ETX-2 calculates the round trip throughput.
In a unidirectional throughput test, the local ETX-2 generates 1DM messages
towards the far-end device, which verifies the frames and calculates
unidirectional throughput. The convergence algorithm is based on a binary
search using LMM and LMR messages.
The packet loss test is performed as follows for all selected frame sizes:
• Transmit x frames at a rate of 100% throughput.
• Calculate frame loss with the formula: (tx - rx) / 100 * tx
• Decrease rate by 10% and repeat the test until two trials result in no frame
loss.
The latency test is performed as follows:
• Transmit DMM frames at throughput rate for 10 seconds.
• Calculate the latency using DMM and DMR frames that are transmitted after
1 second.
• The test result is the average of the number of iterations per frame size (up
to 5 minutes per frame size).
• Applicable for round-trip mode
Note If the remote MEP status is NEW, ETX-2 does not launch the RFC-2544 test,
unless the relevant dest NE is configured with the remote MAC address.
Factory Defaults
By default, no profiles or tests are defined.
When you create a test profile, it is configured by default as shown below.
ETX-2# config test rfc2544
ETX-2>config>test>rfc2544# profile-name Testprf
ETX-2>config>test>rfc2544>profile-nam(Testprf)$ inf d
frame-size 64
pattern all-ones
tlv-type data
test-direction bidirectional
frames-number-in-attempt 200000
frame-loss-tolerance 20
throughput-measurement-accuracy 100000
number-of-trials 1
no learning-frames
Performing Tests
In order to perform RFC-2544 tests, you must configure:
• Bidirectional data flows that are administratively enabled. If one of the flows
is associated with the test, its egress port and queue block must be identical
to the associated port and queue block of the MEP to which the test is
bound.
• MEP and Destination NE
• RFC-2544 profile – Template to create test runs. You can configure up to
eight test profiles.
• RFC-2544 test – Associated with RFC-2544 profile. Up to eight tests can use
the same test profile. In one RFC-2544 test, you can perform one or more of
the three test types.
If you are performing more than one type of test, they are performed in the
following order:
• Throughput
• Packet loss
• Latency – Up to 20 latency test attempts are performed in the remaining
time, according to the configured maximum test duration (each attempt
requires 15 seconds).
Configuring frame loss tolerance 1/1 frame-loss-tolerance <frames> Defines the success criteria for
(one to one) the throughput test.
Each throughput attempt is
defined as a success only if the
amount of lost packets is less
than or equal to the number of
frames configured for frame-
loss-tolerance.
Success in a throughput
attempt sets the next attempt
to a higher rate, while a failure
in an attempt sets the next
attempt to a lower rate.
Configuring frame sizes for the test frame-size [64] [128] [256] [512] [1024] [1280] You can specify one or more
[1518] [1700] [1900] [2000] [custom <custom>] standard frame sizes, as well as
a custom frame size (64–2000).
Configuring the number of trials for number-of-trials <value> Possible values: 1–3
the test
Activating the test activate date <dd-mm-yyyy> <hh:mm:ss> Type no activate to stop the
activate recurring <hours> test.
Associating test with flow in order to associated-flow <name> Flow must be active and its
retrieve bandwidth profile and QoS egress port and queue block
information. must be identical to the
associated port and queue
block of the MEP to which the
test is bound.
Binding to destination NE bind oam-cfm md <md-id> ma <ma-id> mep <mep-id> There must be bidirectional
service <service-id> dest-ne <dest-ne-id> flows using the same
classification and port
associated with the MEP.
Configuring maximum rate for test max-rate <bps> [convention {line-rate | data-rate}] max-rate – The maximum rate
[compensation <compensation>] applies to throughput and loss
tests.
convention – Determines
whether the interpacket gap is
included in test result
calculations:
line-rate – Interpacket gap is
included.
data-rate – Interpacket gap is
not included.
compensation – Allowed range
is 0–63. The compensation
value is added to frame size, to
allow for Layer-1 overhead in
the network.
Note: It is not necessary to
configure the maximum rate if
associated-flow is used to
associate the test with a flow
that has a policer profile, as in
that case the maximum rate is
derived from the flow policer
profile.
Configuring maximum duration of max-test-duration <minutes> Possible values: 0, or 2–60
test The value 0 indicates no limit;
the test runs until it completes.
If a value from 2–60 is
configured, the test is stopped
when the configured maximum
duration has elapsed, whether
or not all the configured test
types have completed.
Displaying number of lost frames for show attempt-lost-frames See Viewing Lost Frames Per
each test attempt Test Attempt.
Displaying test report show report all See Viewing Test Report.
show report iteration <iteration-number>
Examples
Test Parameters
-----------------------------------------------------------------------------
Bind: MD : 1 MA : 1
MEP : 1
P-Bit : 0 VLAN : 200
Max Rate (bps) : 1000000000
Convention : Data Rate Compensation : 0
Frames in Burst : 200000
Pattern : All Ones
Frame Type : Data
Search Resolution : 1 Tolerance : 5
Learning Frames: : 0 Frequency :
Direction : Bidirectional
Flow Parameters
-----------------------------------------------------------------------------
Flow Name : test_flow1
Fixed Queue : 0 Mapping Profile :
Policer Name : test_policer
CIR (Kbps) : 9984 EIR (Kbps) : 0
Throughput Report
-----------------------------------------------------------------------------
Trial : 1
Status : Success Duration : <00:00:00:49>
Frame Size Theoretical Max Throughput Throughput Success
(FPS) (FPS) (Mbps) (%)
-----------------------------------------------------------------------------
64 1953125 1490312 763.040 76
256 488281 453309 928.379 92
1400 97656 96173 984.812 98
Throughput Report
-----------------------------------------------------------------------------
Trial : 2
Status : Success Duration : <00:00:00:52>
Frame Size Theoretical Max Throughput Throughput Success
(FPS) (FPS) (Mbps) (%)
-----------------------------------------------------------------------------
64 1953125 1490312 763.040 76
256 488281 453309 928.379 92
1400 97656 96173 984.812 98
Loss Report
-----------------------------------------------------------------------------
Trial : 1
Frame Size : 64
Theoretical Max (FPS) : 1953125
-----------------------------------------------------------------------------
100 98
90 100
80 100
Loss Report
-----------------------------------------------------------------------------
Trial : 2
Frame Size : 64
Theoretical Max (FPS) : 1953125
Latency Report
-----------------------------------------------------------------------------
Trial : 1
256 1
1400 1
Latency Report
-----------------------------------------------------------------------------
Trial : 2
ETX-2>config>test>rfc2544>test(1)$
Test Parameters
-----------------------------------------------------------------------------
Bind: MD : 1 MA : 1 MEP
: 1
P-Bit : 0 VLAN : 100
Max Rate (bps) : 100000
Convention : Data Rate Compensation : 0
Frames in Burst : 100000 Pattern : All
Ones Frame Type : Data
Search Resolution : 10000 Tolerance : 50
Learning Frames : 0 Frequency :
Direction : Bidirectional
Counter Description
Counter Description
Max Rate (bps) The maximum rate at which the test starts
Frame Type The frame type (TLV) used in the transmitted packets:
Data or Test
Tolerance The number of packets that can be lost without declaring Fail
Learning Frames Indicates whether some frames are transmitted before the test
starts, in order to enable the network learning
Frequency Indicates whether learning frames are transmitted once per test or
once per trial
Parameter Description
Displayed
Parameter Description
Displayed
Trial : 1
Counter Description
Start Time The time of day that the test started (hh:mm:ss)
11.7 Syslog
ETX-2 uses the Syslog protocol to generate event notification messages and
transport them over IP networks to Syslog servers.
Applicable Products
This feature is applicable to all ETX-2 products.
Standards
RFC 3164, RFC 5674
Benefits
Syslog protocol collects heterogeneous data into a single data repository. It
provides system administrators with a single point of management for collecting,
distributing, and processing audit data. Syslog standardizes log file formats,
making it easier to examine log data with various standard tools. Data logging
can be used for:
• Long-term auditing
• Intrusion detection
• Tracking user and administrator activity
• Product operation management
Functional Description
When an alarm or event occurs, if it is not masked for logging, it is saved in the
log file. The Syslog protocol provides an instrument for generating and
transporting event notification messages from ETX-2 logs to servers across IP
networks.
Optionally, you can enable Syslog servers to also log accounting commands.
You can log these events on remote Syslog servers, or locally (i.e. on the
device), in which case you configure a local Syslog server with IP address
127.0.0.1 (see Local Syslog Accounting below).
Note The password that you enter when creating a new user (configure management
login-user <name> password <password>, or when copying a file (file copy
<source-file-url> <destination-file-url> sftp://<username>:<password>) is
masked in Syslog under CLI command accounting. The password entered appears
in the Syslog command-log as asterisks (*), thus providing protection from
sniffers.
PSN
ETX-203AX
Syslog
Server
ETX-203AM
Elements
Typical Syslog topology includes message senders (clients) and message
receivers (servers). ETX-2 supports Syslog client functionality. It can send
messages to up to five Syslog servers. The receiver displays, stores, or forwards
logged information. The standard designates two types of receivers:
Transport Protocol
Usually, Syslog uses UDP port 514 for its transport, but devices and servers can
be defined to use any port for communication.
Message Format
The length of a Syslog message is 1024 bytes or less. It contains the following
information:
• Facility and severity (see below)
• Timestamp – local time of the device when it sent the message
• Hostname – IP address of the device that sent the message
• Message content – tag and message content.
Tag:
For an alarm or event – Tag is the source of the alarm/event, which
is a string combining source type and source ID (such as system, Eth
1, E1 1/1).
For an accounting command – Tag is CMD_ACCT.
Message content – a colon : followed by:
For an alarm or event – the alarm/event description, as sent in SNMP
traps.
Note Alarms and events masked for logging are not sent to Syslog regardless of the
severity.
4 Warning Event
You can configure local Syslog accounting by configuring a local Syslog server
with IP address 127.0.0.1, and using the regular Syslog commands (except port,
which is irrelevant).
Accounting messages are saved in the accounting-log file in the same format
used when sending them to external Syslog servers.
The accounting-log file has the following features:
• The file has two partitions. When both partitions become full, the partition
with the older records is cleared.
• The file can be cleared of its records, but not deleted.
• The file is not affected by device reboot, as it is saved in permanent
memory.
• The file can be uploaded using the copy command, but cannot be
downloaded.
You can display the accounting-log file using the show accounting-log command
(see Viewing the Syslog Local Accounting Log), or clear it using the clear-
accounting-log command (see Clearing the Syslog Local Accounting Log).
Factory Defaults
By default, Syslog operation is disabled. When enabled, the default parameters
are as follows:
Syslog device
facility local1
port 514
severity-level informational
shutdown shutdown
Syslog server
address 0.0.0.0
port 514
accounting no accounting
shutdown shutdown
Defining Syslog device UDP port for port <udp-port-number> Possible values: 1–65535
communication Port configuration is allowed
only if a Syslog device is
administratively disabled.
Defining severity level severity-level { emergency | alert | The log messages that contain
critical | error | warning | notice | severity level above or equal to
informational | debug} the specified level are
transmitted.
• emergency – emergency
messages
• alert – critical alarms
• critical – major alarms
• error – minor alarms
• warning – events
• notice – cleared alarms,
accounting messages
• informational –
informational messages
• debug – debug messages
Enabling Syslog accounting (i.e. logging) [no] accounting commands To disable command logging,
of command entries enter no accounting.
Note: Currently, only commands
accounting is available.
Defining Syslog server UDP port for port <udp-port-number> Possible values: 1–65535
communication Note: For local Syslog
accounting (server 127.0.0.1),
the Syslog port is not open to
packets entering from out of
the device. In this case, port
command is not available.
Parameter Description
Configuration Errors
The following table lists messages generated by ETX-2 when a configuration
error is detected.
Message Description
Syslog Port is out of range Selected UDP port value is out of allowed range (1–65535).
Port is illegal or Device Port is already in Selected UDP port is already in use.
use
Message Description
Parameter cannot be changed if Logging Device/server UDP port or server IP address cannot be changed
Status/Server Access is enabled while Syslog server is enabled.
Example
• Syslog device
Facility: local2
UDP port: 155
Severity level: major
• Syslog server
Server IP address: 178.16.173.152
UDP port: 155
exit all
configure system
syslog device
facility local2
port 155
severity-level major
no shutdown
exit
syslog server 1
address 178.16.173.152
port 155
no shutdown
save
exit all
Applicable Products
This feature is applicable to all ETX-2 products, except for capacity differences
between products that are specified where relevant.
Y.1564 over LAG is relevant for ETX220A only.
Standards
ITU-T Y.1564
Benefits
The Y.1564 testing methodology allows service providers to have a standard way
of measuring the performance of Ethernet-based services. The tests are
performed per multiple traffic streams simultaneously, confirming policing per
EVC or EVC.CoS.
Factory Defaults
By default, Ethernet service activation testing functionality is disabled.
When a Y.1564 test profile is added, it has the following default settings:
auto-cos-completion no auto-cos-completion
ethernet-type 0x22e8
direction bidirectional
color-aware color-aware
traffic-policing traffic-policing
cir-steps s1-percent – 25
s2-percent – 50
s3-percent – 75
s4-percent – 100
configuration-duration 60 Seconds
rate-convention data-rate
responder-type y1564
user-traffic-blocked user-traffic-blocked
Functional Description
To assure quality of service (QoS), providers must properly configure their
networks to define how the traffic is prioritized in the network. This is
SLAs
The service-level agreement (SLA) is a binding contract between a service
provider and a customer, which guarantees the minimum performance that is
assured for the services provided.
Customer traffic is classified into three traffic classes, and each is assigned a
specific color: green for committed traffic, yellow for excess traffic, and red for
discarded traffic.
Policing
ETX-2 can set different traffic policing parameters. When a policer is activated, it
monitors the incoming frames and determines their color mode (CM). If CM is set
to color aware, ETX-2 monitors incoming frames and assigns them the relative
color (green or yellow) based on the frame header matching the policer setting
and current information rate.
Notes • When the Y.1564 test is configured as bidirectional, it may fail if the policer
profiles for the directions generator->responder and responder->generator
are different. For instance, the test could fail if a policer profile is defined for
the Rx and Tx flows in the generator, and the bandwidth of the ingress
policer is lower than that of the egress policer.
• You should configure a non-default policer profile for the Tx flow, and
configure no profile for the Rx flow.
• If multiple Tx flows are attached to the same MEP in the responder, any
policer profile attached to the Tx flows is not used in the responder egress
direction (back towards the generator).
• The Y.1564 generator discovers the test rate per service or service.CoS
policer, even when the policer is not an aggregate policer.
When LAG exists on the network path, Y.1564 is limited in its ability to test the
full path SLA of the EVC. To overcome this limitation, ETX220A supports
changing the source MAC address (SA) in each transmitted frame (instead of the
default, where the SA of the test frame is automatically inherited from the port
that the associated MEP is bound to), so that the frames pass through all the
links in the network LAG.
In the Y.1564 test profile, you can select this operation mode, by setting a block
of 32 consecutive MACs as SA. The SAs of generated test frames are then
cyclically selected from the block of 32 consecutive MAC addresses. By default,
0x0020D2000100 is the first MAC address in the block of MACs used as SA in
test frames. However, you have the option of setting another first address,
provided it is a multiple of 32.
When the hashing function of the network LAG is set to SA+DA MAC, the Y.1564
frames pass through all the links of the LAG, enabling testing the SLA of the
different links.
L2
Network ETX-220A
Router
Y.1564 Standard
The ITU-T Y.1564 testing methodology ensures that quality is maintained across
networks with multiple streams and different policing parameters. Service
providers use the SAC (Service Acceptance Criteria) information which is normally
based on a subset of the users SLA to set pass/fail parameters.
There are two main objectives:
• To validate that each Ethernet-based service is correctly configured
• To validate the quality of the services as delivered to the end user
The test flowchart below illustrates the test phases.
Enter test
parameters
Start test
Pass
Service
performance
test
Pass
Test completed
Configuration Test
The configuration test validates that services are configured as intended before
proceeding to the service performance test. Each service is tested individually
and the information rate (IR), Frame Transfer Delay (FTD), Frame Delay Variation
(FDV), and Frame Loss Ratio (FLR) are measured simultaneously. The test is
declared successful if the information rate and frame counters are within the
Service Acceptance Criteria (SAC).
The configuration test consists of the following procedures (mandatory to
implement and optional to perform):
• CIR (simple or stepped)
• EIR (color-blind)
• Traffic policing (color-blind); can be disabled
In addition, the configuration test consists of the following burst test
procedures (optional to implement):
• CBS (color-aware or color-blind)
• EBS (color-aware or color-blind)
The CBS and EBS burst sub-tests can be disabled (the default) or enabled. These
tests cannot coexist with another configuration test; if they do, a sanity error
occurs. However, they can coexist with other running performance tests.
A burst sub-test (CBS, EBS) consists of at least one transmission cycle. If
needed, the actual duration of a burst sub-test is automatically extended i.e. by
increasing the total duration of the configuration test.
Performance Test
The performance test validates the quality of the services over a
user-configurable period of time (one minute to five days). Traffic is generated
for all services at configured CIR levels; all Ethernet performance parameters are
measured simultaneously. The bandwidth test is performed according to the
bandwidth profile of a policer assigned to the associated flow, or a policer
assigned to the test.
Note • If there are two bandwidth profiles (flow and test), the test bandwidth
profile is used.
• OAM relevant packets are calculated as part of the test bandwidth.
Test Elements
The Y.1564 test is an intrusive procedure that includes two main elements:
• Generator – an entity that initiates the test, sends out the test and OAM
frames, receives responses from the responder, processes the resulting
measurements and displays test reports. In the case of a MEF46 LL
responder, the generator executes the Latching Loopback (LL) controller
functionality.
• Responder – an entity that receives the test and OAM frames from the
generator, and transmits a response to the generator. The responder can be
of the following types:
Regular responder – adds time stamps to the OAM frames that it returns
to the generator
MAC swap responder – does not add time stamps to the OAM frames
that it returns to the generator
MEF46 Latching Loopback responder – Upon receiving LLM from the
generator, replies with LLRs. OAM frames are not looped back.
While performing/running the Y.1564 test, the responder does not transmit
PM packets.
The test operation can be configured as unidirectional or bidirectional (the
default). When bidirectional, service performance is measured on the frames
that make a round trip (generator > receiver > generator).
PSN
Forward
Backward
Generator Responder
Capacity
ETX-2 supports up to 8/64 simultaneous Y.1564 tests, with:
• Up to eight generators for ETX203AX, ETX203AM, and ETX205A, and up to
64 for ETX220A; one MEP per generator
• Up to 20 responders for ETX203AX, ETX203AM, and ETX205A, and up to
64 for ETX220A
The 8/64 generators and 20/64 responders can be activated over EVC, EVC.CoS,
or a combination of EVC and EVC.CoS. The Y.1564 generator is limited to two
VLANs.
The rate of the Y.1564 traffic for a single generator/responder or several
generators/responders running in parallel, cannot exceed 1 Gbps for ETX203AM,
ETX203AX or ETX205A; 10 Gbps for ETX220A (in the case of ports that
support 10 Gbps).
The test requires that the corresponding ingress and egress flows (or a
bidirectional flow) be preconfigured at both ends.
Test Cases
The Y.1564 test supports two cases:
Internal MEP case Supported for E-Line, E-LAN, and E-Tree services over PTP
or Bridge, in which MEPs are not preconfigured
Service MEP case Full support over point-to-point and E-LAN services, where
Down or Up MEPs are preconfigured
Key=crs_mac
Generator Responder
Test
ETH Internal ETH ETH Automatic ETH
Frames
Port Up MEP ACL Port Port Block of User Port
Service Traffic
MAC Swap
Loopback
ETX-2 ETX-2
Figure 11-30. Y.1546 Test - Internal MEP Case (E-Line Services over PTP)
On all Flows to a
Bridge-port
Generator Responder
Test
ETH Internal ETH ETH Automatic ETH
Frames B
Port Up MEP ACL Port Port Block of User Port
Service Traffic
MAC Swap
Loopback
ETX-2 ETX-2
Figure 11-31. Y.1546 Test - Internal MEP Case (E-Line Services over Bridge)
Note When running the Y.1564 test in a device, without configuring the OAM (Internal
MEP case), configure the destination MAC address on the generator to the
responder NNI MAC, as per the device used.
The Y.1564 test for the Internal MEP case is performed as follows:
1. At the generator side, a unique MAC is configured.
2. At the generator side, an internal up MEP is automatically created.
3. At the generator side, the source transmits test frames at data rate
(different rates are used during different steps of the test) toward the
configured MAC.
4. DMM and LMM frames, transmitted periodically by the MEP at the generator
side, are interleaved with the test data.
5. At the responder side, the same unique MAC as used in the generator is
configured.
6. The responder loops back only frames with a destination MAC equal to the
configured MAC. If egress-port is a bridge-port, loop and ACL on all ingress
flows to a bridge-port.
7. At the generator receive side, an ACL forwards only frames whose source
MAC equals to the configured MAC.
8. When the generator receives the looped DMM and LMM frames, it
“responds” by sending DMR and LMR frames, respectively.
9. The responder loops back also the DMRs and LMRs.
10. Round-trip loss is measured by the sum of the LMR frame count and the
local count at the generator ingress.
11. Round-trip delay is measured by the DMR frame timestamps divided by two.
Note If a Y.1564 test is running over an ERP or ETP, any protection switchover causes
the test to fail.
Y.1564 test is supported over E-LAN in the presence of user traffic in the
following cases:
• E-LAN service is newly installed.
• E-LAN service is already installed and running on E-LAN nodes, and you add
a new node to the service. In this case, you can run the non-intrusive
Y.1564 test on the new node without disrupting (blocking) the traffic on the
other nodes.
For the Service MEP case, the MA of the service MEPs used by the test, must be
manually configured. The CoS on which the test is performed can optionally be
configured with a single value or several values from 0 to 7; the default ‘all CoS’
indicates that all the preconfigured EVC.CoS will be tested. The MEPs and flows
on which the test is performed are automatically learned from the configured
MA and CoS.
Generator Responder
Test
Frames Test Frames,
DMMs, LMMs
Policer
PSN
Policer
Ethernet Down Ethernet Ethernet Down Ethernet
Looped Test Frames,
Port MEP Port Port MEP Port
DMRs, LMRs
Figure 11-32. Full Y.1564 Traffic Path for EVC with Single CoS (Down MEP)
Generator Responder
Test Test
ETH Down ETH ETH Down ETH
Frames B B Frames
Port MEP Port Port MEP Port
Service Service
ETX-2 ETX-2
Note The responder can be configured to inject the test frames into the policer or
bypass it.
Policer
PSN
Policer
Ethernet Down Ethernet Ethernet Ethernet
Port MEP Port Port Port
Note In the case of a MAC swap loopback responder, the DMR timestamps include the
time spent by the packet in the responder, therefore the round-trip delay
measurements are less accurate.
3. Upon receiving the LLM, the responder identifies the port, VLAN tags, and
source MAC address of the generator.
4. The Responder returns an LLR.
5. If a reply is received, the Generator sends an LL Activate Request.
Down MEP
Depending on the specific implementation, a single MEP per EVC, or a separate
MEP per single or multiple EVC.CoS is required to provision the test. In all cases,
the service is supported with ‘regular’ and aggregate policer. In case of a single
MEP, the Rx flow classification can be VLAN or Outer VLAN. In case of multiple
MEPs, all the MEPs must belong to the same MA, and the Rx flow classification
can only be VLAN + p-bit.
Up MEP
For multipoint-to-multipoint (E-LAN) services, the Y.1564 testing is performed
over an Up MEP, for either a single Cos (EVC) or multi CoS (EVC) service. The
testing frames are transmitted into the bridge, and the VLAN tag value of the
test traffic is defined by the Rx flow classification. In both cases, the service is
supported with ‘regular’ and aggregate policer.
Generator
Test
Frames
BP
Tx Flow
Policer
BP Bridge BP
Rx Flow
Ethernet
Up MEP SVI
Port
Test Procedures
This section describes Y.1564 test procedures and success criteria.
rate
1.1CBS
PHY
CIR
Note If (8 × CBS/CIR) > 90 msec, the transmission off period should be floor(9 ×
CBS/CIR) instead of 100 msec.
• Second generator (G2) should inject a burst of length 110% CBS at maximum
rate every 300 msec.
Note If (8f × CBS/CIR) > 90 msec, the burst should be transmitted every floor (9 ×
CBS/CIR) + 200 msec instead of every 300 msec.
Preparation:
• Set EIR = 0 and EBS = 0 for the duration of the test.
• Stop DMM transmission for the duration of the test.
• Transmit LMM once at the beginning of the test (when the generators are
off) and once at the end of the test (when the generators are off).
Procedure:
• G1 transmits green C frames at CIR.
C = ceiling (200 msec × CIR/bitsInFrame)
where
bitsInFrame = the size of the test frame in bits
• G2 transmits green B frames at maximum rate (1G or 10G).
B = ceiling (1.1 × CBS/frameLength)
where
frameLength = the size of the test frame in bytes
• The number of CIR/burst cycles actually performed during the test, are
counted.
Success criteria:
• For color-aware test – 0.99 × number of cycles × (C + N) × (1-FLR) ≤ number
of green frames
• For color-blind test – 0.99 × number of cycles × (C + N) × (1-FLR) ≤ total
number of frames
C = number of frames at CIR per cycle, defined above
N = number of frames in CBS w/o excess = floor (CBS/frameLength)
Where:
frameLength = the size of the test frame in bytes
rate
1.1EBS
PHY
CIR
• First generator (G1) should transmit at CIR for ~200 msec, turn off for
100 msec, and start over.
Note If (8 × EBS/EIR) > 270 msec, the transmission off period should be floor (9 ×
EBS/EIR) – 200 msec instead of 100 msec.
Note If (8 × EBS/EIR) > 270 msec, the burst should be transmitted every floor(9 ×
EBS/EIR) instead of every 300 msec.
Preparation:
• Stop DMM transmission for the duration of the test.
• Transmit LMM once at the beginning of the test (when the generators are
off) and once at the end of the test (when the generators are off).
Procedure:
• G1 transmits green C frames at CIR.
C = ceiling (200 msec × CIR/bitsInFrame)
where
bitsInFrame = test frame size in bits
• G2 transmits yellow B frames at maximum rate (1G or 10G).
B = ceiling (1.1 × EBS/frameLength)
where
frameLength = test frame size in bytes
• The number of CIR/burst cycles actually performed during the test, are
counted.
Success criteria:
0.99 × number of cycles × C × (1-FLR) ≤ total number of frames
C = ceiling (200 msec × CIR/bitsInFrame)
N = number of frames in CBS w/o excess = floor (CBS/frameLength)
rate
1.1(CBS+EBS)
PHY
CIR+EIR
Preparation:
• Stop DMM transmission for the duration of the test.
• Transmit LMM once at the beginning of the test (when the generators are
off) and once at the end of the test (when the generators are off).
Procedure:
• G1 transmits E frames at (CIR+EIR).
E = ceiling (200 msec × (CIR+EIR)/bitsInFrame)
where
bitsInFrame = test frame size in bits
• G2 transmits B frames at maximum rate (1G or 10G).
B = ceiling (1.1 × (CBS+EBS)/frameLength)
where
frameLength = test frame size in bytes
• The number of EIR/burst cycles actually performed during the test, are
counted.
Success criteria:
0.99 × number of cycles × (C + N) × (1-FLR) ≤ total number of frames
C = ceiling (200 msec × CIR/bitsInFrame)
Performance Test
Transmission rate is equal to CIR.
Success criteria – FLR, FTD, FDV, and Availability are within SAC limits.
Note For the Y.1564 test – Service MEP case, in devices with OAM MEP configured
with MEF46 Latching Loopback, there is no need to add a Y.1564 responder.
Note The DMM frame size in the Y.1564 test is set according to the frame size
configured for the test profile, rather than according to the dest NE
data-tlv-length configuration.
Specifying whether to include or burst-tests [cbs] [ebs] You can enter the command
exclude the CBS and EBS sub- with one or both parameters.
tests (burst tests) in the To specify not to include any
configuration phase burst tests in the configuration
phase, enter: no burst-tests.
Defining test frame size frame-size {64 | 128 | 256 | 512 | Range for custom bytes:
1024 | 1280 | 1518 | custom <bytes>} ETX220A: 64–9,600 (jumbo
frames)
All other devices: 64–2000
Setting the source MAC address multiple-sa-mac Relevant for ETX220A only.
in test frames multiple-sa-mac base The source MAC addresses of
(for Y.1564 over LAG) <first-mac-address> generated test frames are
no multiple-sa-mac cyclically selected from a block
of 32 consecutive MAC
addresses beginning at default
address 0x0020D2000100 or
at configured base address.
base - the start of a block of
MACs to be used as the source
address in test frames.
Must be a multiple of 32.
Example: multiple-sa-mac base
0x000012345600
Setting the one-way service one-way-thresholds flr <ppm> ftd flr – unidirectional Frame Loss
acceptance criteria <μs> fdv <μs> availability Ratio, measured in 1E-6 units
<percent/100> ftd – unidirectional Frame
Transfer Delay, measured in
microseconds
fdv – unidirectional Frame
Delay Variation, measured in
microseconds
availability – unidirectional
availability, measured in
hundredths of percent units
Possible values: 0-100000
(for example, use value 8930 in
order to define 89.3%)
Creating, modifying, or deleting p-bit <0..7> The P-bit test profile allows
a Y.1564 test P-bit profile configuring separate frame
sizes and thresholds for
specific P-bits. The rest of the
P-bits are tested using the
general profile.
See P-bit configuration details
below.
Type no p-bit <0..7> to delete
a specific test P-bit profile.
Defining the convention of the rate-convention <data-rate | The convention of the rate
rate measurements in the line-rate> measurements section in the
Y.1564 test report Y.1564 test report is
determined by the option that
you select:
• data rate – section title is IR
[Mbps].
• line rate – section title is
ULR [Mbps].
Note: Configuring
rate-convention only changes
the title in the generated
Y.1564 test report according to
your selection (IR for data-rate;
ULR for line-rate). It does not
change the values of the
measurements in the report.
Therefore, after changing
rate-convention in the profile,
you must run the Y.1564 test
again to display the
measurements in the newly
selected rate-convention.
Defining the type of responder responder-type {y1564 | mac-swap | See Operation section.
that receives the test and OAM mef46-ll}
frames from the generator in
the Y.1564 test: regular
responder, MEF46 Latching
Loopback responder, or MAC
swap responder.
Setting the round-trip service round-trip-thresholds flr <ppm> ftd flr – bidirectional Frame Loss
acceptance criteria <μs> fdv <μs> availability <availability> Ratio, measured in 1E-6 units
ftd – bidirectional Frame
Transfer Delay, measured in
microseconds
fdv – bidirectional Frame Delay
Variation, measured in
microseconds
availability – bidirectional
availability, measured in
hundredths of percent units
(for example, use value 8930 in
order to define 89.3%)
Setting the scope of the test: scope [configuration] [performance] You can enter the command
configuration test, performance with one or both parameters
test, or both To specify with no scope
parameters, enter: no scope
The following P-bit test profile parameters can be configured at the p-bit level in
the config>test>y1564>profile(profile-name)>p-bit<value># prompt.
Defining test frame size frame-size {64 | 128 | 256 | 512 | Range for custom bytes:
1024 | 1280 | 1518 | custom <bytes>} ETX220A: 64–9,600 (jumbo
frames)
All other devices: 64–2000
Setting the one-way service one-way-thresholds flr <ppm> ftd flr – service acceptance criteria
acceptance criteria <μs> fdv <μs> availability <availability> for unidirectional Frame Loss
Ratio, measured in 1E-6 units
ftd – service acceptance
criteria for unidirectional Frame
Transfer Delay, measured in
microseconds
fdv – service acceptance
criteria for unidirectional Frame
Delay Variation, measured in
microseconds
availability – service acceptance
criteria for unidirectional
availability, measured in
hundredths of percent units
(for example, use value 8930 in
order to define 89.3%)
Setting the round-trip service round-trip-thresholds flr <ppm> ftd flr – service acceptance criteria
acceptance criteria <μs> fdv <μs> availability <availability> for bidirectional Frame Loss
Ratio, measured in 1E-6 units
ftd – service acceptance
criteria for bidirectional Frame
Transfer Delay, measured in
microseconds
fdv – service acceptance
criteria for bidirectional Frame
Delay Variation, measured in
microseconds
availability – service acceptance
criteria for bidirectional
availability, measured in
hundredths of percent units
(for example, use value 8930 in
order to define 89.3%)
Note For the Y.1564 test - Service MEP case, in devices with OAM MEP configured with
MEF46 Latching Loopback, there is no need to add a Y.1564 responder.
Defining the service to be tested bind <md <id> ma <id> [p-bit <0..7>] md – the maintenance domain
no bind <md <id> ma <id> to which the service belongs
(1–65535)
ma – the maintenance
association to which the
service belongs (1–65535)
p-bit – the specific P-bits to be
tested, or all preconfigured
P-bits if none are specified
no bind md <id> ma <id>
removes responder association
with the service.
When enabling
auto-cos-completion, it is
mandatory to explicitly
configure the normally optional
p-bit command.
Defining the service to be tested bind flow <flow-name> Mutual exclusion with the other
no bind flow <flow-name> bind formats.
flow – the multi-CoS flow that
carries the service OR a single-
CoS flow that is part of the
service.
Possible values: Variable length
string, up to 32 characters.
A corresponding flow must
already exist in the RAD flow
table.
no bind removes responder
association with the service.
Defining the service to be tested bind service <service-name> Mutual exclusion with the other
{ethernet} <port-index> bind formats
bind service <service-name> {lag | pcs service – the name of the
| logical-mac | svi} <port-number> tested service. A flow
bind service <service-name> corresponding to service name,
bridge-port <bridge-number> port must already exist in the
<port-number> RAD flow table.
Setting the local MAC address local-mac mac <mac-address> Note: Command available only
used for the multipoint test no local-mac when responder is bound to a
flow.
mac – the MAC address that
the responder uses for E-LAN
and E-Tree tests
Default value: 0x000000
Setting the destination MAC destination mac <mac-address> mac – a configurable MAC
address or remote MEP number destination remote-mep <rmep-id> address that identifies the
generator side
Note: When there is more than
one generator on a certain
E-LAN service, each generator
has a unique remote MAC.
remote-mep – identifier of a
remote MEP at the generator
side, towards which the test is
conducted.
Possible values: 0–8191
Note: You can disassociate the
destination remote MEP from
the responder by entering
destination remote-mep 0 (and
not no destination).
Displaying the Y.1564 test show status See Viewing Test Status
status (Responder Side)
Parameter Description
MEP Identifier of the MEP that is associated with the responder and
specific P-bit
Possible values: 1–8191
Service Identifier of the service that is associated with the responder and
specific P-bit
Possible values: 1–8 or —
Defining the service to be tested bind md <id> ma <id> [p-bit <0..7>] md – maintenance domain to
no bind md <id> ma <id> which the service belongs (1–
65535)
ma – maintenance association
to which the service belongs
(1–65535)
p-bit – specific P-bits to be
tested, or all preconfigured
P-bits if none are specified
no bind md <id> ma <id>
removes generator association
with the service.
When enabling
auto-cos-completion, it is
mandatory to explicitly
configure the normally optional
p-bit command.
Defining the service to be tested bind flow <flow-name> [multi-cos] Mutual exclusion with the other
[p-bit <0..7>] bind formats; if the optional
no bind flow <flow-name> multi-cos attribute does not
exist, several bind commands
with different flow names can
be configured.
flow – the multi-CoS flow that
carries the service OR a single-
CoS flow that is part of the
service. A corresponding flow
must already exist in the RAD
flow table.
Possible values: Variable length
string, up to 32 characters
multi-cos – indicates that the
specified flow name is a
multi-CoS flow
p-bit – specific P-bits to be
tested, or all preconfigured
P-bits if none are specified
Valid only together with the
optional multi-cos attribute.
For each specified P-bit, a
corresponding CoS (rank) must
already exist in the envelope
policer of the multi-CoS flow.
no bind removes generator
association with the service.
Defining the service to be tested bind service <service-name> Mutual exclusion with the other
{ethernet} <port-index> bind formats
[p-bit [<0..7>]] service – the name of the
bind service <service-name> {lag | pcs tested service. A flow
| logical-mac | svi} <port-number> corresponding to service name,
[p-bit [<0..7>]] port must already exist in the
bind service <service-name> RAD flow table.
bridge-port <bridge-number> Possible values: Variable length
<port-number> [p-bit [<0..7>]] string, up to 32 characters
bind service <service-name> ethernet, lag, pcs, logical-mac,
etp <etp-name> {subscriber|transport} svi, bridge-port, etp subscriber,
<port-number> [p-bit <p-bit>] etp transport – the port over
no bind service <service-name> which the service is tested
p-bit – the specific P-bits to be
tested, or all preconfigured
P-bits if none are specified.
For each specified P-bit, a
corresponding flow must
already exist in the RAD flow
table.
no bind removes generator
association with the service.
Setting the destination MAC destination mac <mac-address> mac – a configurable MAC
address or remote MEP number destination remote-mep <rmep-id> address that identifies the
responder side
Note: When there is more than
one responder on a certain E-
LAN service, each reponder has
a unique remote MAC.
remote-mep – identifier of a
remote MEP at the responder
side, towards which the test is
conducted
Possible values: 0-8191
Note: Destination remote MEP
can be disassociated from the
generator by entering
destination remote-mep 0 (and
not no destination).
Assigning policer to test policer <p-bit> bandwidth If a policer is defined for the
[cir <cir-value>] [cbs <cbs-value>] test, then the test is
[eir <eir-value>] [ebs <ebs-value>] performed according to the
[compensation <compensation-value>] test policer, rather than
policer <p-bit> profile according to the associated
<policer-profile-name> flow policer.
p-bit – CoS to which the
configuration applies
Possible values: 0..7
cir – committed information
rate
cbs – committed burst size
eir – excessive information rate
ebs – excessive burst size
compensation – extra bytes
added to frame size to take
into account Layer-1 overhead
(preamble and IFG) in the
network and the overhead for
the added VLAN header.
Possible values: 0..63
profile – an optional
predefined policer profile to be
used in the test
Note: The option to define a
test policer is useful if there is
no flow policer, or the flow
policer has different limits than
you wish to use for the test.
Displaying the status of the show mef46-ll-status See Viewing MEF46 Latching
MEF46 Latching Loopback Loopback Generator Status..
generator
Displaying the Y.1564 test show status See Viewing Test Status
status (Generator Side).
Displaying the test results and show report <summary | detailed> See Viewing Test Results.
measurements
The status screen appears. For information on the test status values,
see Table 11-21.
ETX205A>config>test>y1564>generator(1)# show mef46-ll-status
Tx LLMs : 3
Rx LLRs : 3
Rx Autonomous LLRs : 0
ETX205A >config>test>y1564>generator(1)#
Parameter Description
Displayed
Unrecognized TLV Indicates whether one or more of the included TLVs were not
recognized
Possible values: No, Yes
Associated EVC
---------------------------------------------------------------
Inner VLAN : --- Outer VLAN : 20
Parameter Description
Displayed
Parameter Description
Displayed
BWP in use Origin of the associated bandwidth profile for the EVc.CoS
Possible values: Test, Flow
Displayed when Status is other than Idle
Note In detailed test report, in case a step is Not Applicable, all step parameters
display value --- and not 0.
Summary
-----------------------------------------------------------------------------
Scope : Configuration+Performance
Profile Name : 1
CIR Test
-----------------------------------------------------------------------------
Step#1 Failed FLR 25.0 0.0 1.0E+00 0.004 0.0
Step#2 Failed FLR 50.0 0.0 1.0E+00 0.004 0.0
Step#3 Failed FLR 75.0 0.0 1.0E+00 0.004 0.0
Step#4 Failed FLR 100.0 0.0 1.0E+00 0.004 0.0
EIR Test
-----------------------------------------------------------------------------
Failed IR 101.0 0.0 1.0E+00 0.004 0.0
CBS Test
-----------------------------------------------------------------------------
Passed
EBS Test
-----------------------------------------------------------------------------
Passed
IR (Mbps)
-----------------------------------------------------------------------------
P-bit IR FLR FTD FDV Avail
(ms) (ms) (%)
-----------------------------------------------------------------------------
0 0.0 0.0E+00 0.0 0.0 1.66
Counter Description
Start Date & Time Date and time at the last test activation
End Date & Time Date and time when the last test ended (regardless of the end
result passed/failed/aborted)
Overall Result Possible values: Not Applicable, Passed, Failed, User Aborted,
System Aborted
P-bit
Result Result of the last configuration test for the specific P-bit and if it
failed, the reason for failure
Possible Result values: Not Applicable, Passed, Failed, User Aborted,
System Aborted
Possible reasons for failure: CIR, EIR, Policing, and/or CBS test
Test Name of the sub-test: CIR Test, EIR Test, Traffic Policing Test, CBS
Test, EBS Test
Reason for failure If sub-test failed, shows the reason(s) for failure.
Possible reasons for failure:
• CIR Test – FLR, FTD, or FDV
• EIR Test – IR
• Traffic Policing Test – IR
• CBS Test – Burst size
• EBS Test – Burst size
Counter Description
Reason for failure If sub-test failed, displays the reason for failure: FLR, FTD, or FDV
Summary
-----------------------------------------------------------------------------
Scope : Configuration+Performance
Profile Name : 1
Start Date & Time : 2017-05-21 13:04:44
End Date & Time : 2017-05-21 13:05:05
Total Duration : 00:00:21
Overall Result : Failed
CIR Test
-----------------------------------------------------------------------------
Parameter Step#1 Step#2 Step#3 Step#4 Thr
---------------- -------- -------- -------- -------- ----
Tx Rate (Mbps) 25.0 --- 75.0 100.0
IR - Min (Mbps) 0.0 --- 0.0 0.0
IR - Mean (Mbps) 0.0 --- 0.0 0.0
IR - Max (Mbps) 0.0 --- 0.0 0.0
Tx Count 6101 --- 18301 24391
Rx Count 0 --- 0 0
FL Count 6101 --- 18301 24391
FLR 1.0E+00 --- 1.0E+00 1.0E+00 3.0E-04
FTD - Min (ms) 0.004 --- 0.004 0.004
FTD - Mean (ms) 0.004 --- 0.004 0.004 26.000
FTD - Max (ms) 0.004 --- 0.004 0.004
FTD - Std (ms) 0.0 --- 0.0 0.0
FDV - Mean (ms) 0.0 --- 0.0 0.0 11.000
FDV - Max (ms) 0.0 --- 0.0 0.0
---------------- -------- -------- -------- -------- ----
Result Failed Not Applicable Failed Failed
EIR Test & Traffic Policing Test
-----------------------------------------------------------------------------
EIR Policing Thr
---------------- -------- -------- --------
Tx Rate (Mbps) 101.0 126.0
IR - Min (Mbps) 0.0 0.0
IR - Mean (Mbps) 0.0 0.0 0.0 - 10.128
IR - Max (Mbps) 0.0 0.0
Tx Count 24633 0
Rx Count 0 0
FL Count 24633 0
FLR 1.0E+00 0.0E+00
FTD - Min (ms) 0.004 0.0
FTD - Mean (ms) 0.004 0.0
FTD - Max (ms) 0.004 0.0
FTD - Std (ms) 0.0 0.0
FDV - Mean (ms) 0.0 0.0
FDV - Max (ms) 0.0 0.0
---------------- -------- -------- --------
Result Failed Failed
Burst Tests
-----------------------------------------------------------------------------
Parameter CBS EBS
--------------------------------- -------- --------
Number of Cycles 24 24
Frames per Cycle 70 140
Minimum Expected Frames 105881 105730
Actual Received Frames 106733 159260
--------------------------------- -------- --------
Result Passed Passed
IR (Mbps)
-----------------------------------------------------------------------------
P-bit Min Mean Max
-----------------------------------------------------------------------------
0 0.0 0.0 0.0
FL
-----------------------------------------------------------------------------
P-bit Count FLR Thr
-----------------------------------------------------------------------------
0 0 0.0E+00 3.0E-04
FTD (ms)
-----------------------------------------------------------------------------
P-bit Min Max Std Mean Thr
(ms) (ms) (ms) (ms)
-----------------------------------------------------------------------------
0 0.0 0.0 0.0 0.0 26.000
FDV (ms)
-----------------------------------------------------------------------------
P-bit Max Mean Thr
(ms) (ms)
-----------------------------------------------------------------------------
0 0.0 0.0 11.000
Availability
-----------------------------------------------------------------------------
P-bit UAS % Thr (%)
-----------------------------------------------------------------------------
0 59 1.66 99.90
Counter Description
Tx Rate (Mbps) The transmission rate to which the generator is configured in the
subtest
Counter Description
FTD – Std (ms) The calculated standard deviation of the Frame Transfer Delay
Availability Thr The Availability service acceptance criteria for the reported P-bit
Burst Tests
Frames per Cycle The number of frames in a single burst transmission cycle
Actual Received The actual total number of frames received during the sub-test
Frames
Examples
This example shows how to create a Y.1564 test generator over a MEP located
between two Ethernet ports and bound to one of them. The Y.1564 test
(Service MEP case) is run over an OAM (CFM) service defined on P-bit 0. The test
in this example is run on a network port, but Y.1564 tests can also be run on
user ports.
Generator
Test
Frames
Flow 1 P-bit 0
Policer
Flow 2
************************Defining_Policer_Profile*****************************
exit all
config qos policer-profile v10 bandwidth cir 100000 cbs 10000 eir 10000 ebs
5000
#*********************************End****************************************
************************Defining_Classifier_Profile**************************
config flows classifier-profile vlan10 match-any
match vlan 10
exit all
#*********************************End****************************************
******************************Adding_Flows***********************************
configure flows flow v10_1to4
classifier vlan10
no policer
ingress-port ethernet 1
egress-port ethernet 4 queue 0 block 0/1
no shutdown
exit all
service 1
classification priority-bit 0
delay-threshold 100000
delay-var-threshold 10000
lmm-interval 100ms
dmm-interval 100ms
dest-ne 1
remote mep 2
loss single-ended
delay two-way
exit
no shutdown
exit all
#*********************************End****************************************
#*******************Configuring_Y.1564_Test_Profile_and_Generator************
config test y1564
profile 1
ethernet-type 0x22e8
frame-size 512
one-way-thresholds flr 100 ftd 13000 fdv 8000 availability 9990
round-trip-thresholds flr 200 ftd 26000 fdv 11000 availability 9990
scope configuration performance
direction bidirectional
color-blind
traffic-policing
cir-steps s1 25 s2 50 s3 75 s4 100
configuration-duration 60
performance-duration custom 1
rate-convention data-rate
exit
generator 1
test-profile 1
bind md 1 ma 1 p-bit 0
activate
exit all
save
#*********************************End****************************************
The following example shows the configuration of the Y.1564 test (Service MEP
case) over E-LAN service. Note that the node in the target device must be
explicitly configured with the remote MEP number.
bind md 1 ma 1
destination remote-mep 1
The following example shows the configuration of both the generator and
responder when the Y.1564 test runs in a device without configuring the OAM
(Internal MEP case). In this case, both generator and responder are bound to a
flow (and not to an MA or MD). Also, the destination MAC address on the
generator is configured to the responder NNI MAC.
#generator :
configure
qos
policer-profile "CIR10M-EIR20M"
bandwidth cir 9984 cbs 64000 eir 19968 ebs
64000
exit
exit
flows
classifier-profile "v100" match-any
match vlan 100
exit
classifier-profile "v1502-p3" match-any
match vlan 1502 p-bit 3
exit
flow "gd-dn"
classifier "v1502-p3"
no policer
vlan-tag pop vlan
ingress-port ethernet 4/1
egress-port ethernet 3/1 queue 1 block 0/1
no shutdown
exit
flow "gd-up"
classifier "v100"
policer profile "CIR10M-EIR20M"
vlan-tag push vlan 1502 p-bit fixed 3
ingress-port ethernet 3/1
egress-port ethernet 4/1 queue 0 block 0/1
no shutdown
exit
exit
exit
configure
test
echo "Configure Y1564"
# Configure Y1564
y1564
echo "Y1564 - Profile Configuration"
# Y1564 - Profile Configuration
profile "2"
performance-duration custom 1
exit
echo "Y1564 - Generator Configuration"
# Y1564 - Generator Configuration
generator "Generator1"
test-profile "2"
bind flow "gd-up"
Destination 00-20-D2-EE-1B-B7
exit
exit
exit
exit
#responder
configure
qos
policer-profile "CIR10M-EIR20M"
bandwidth cir 9984 cbs 64000 eir 19968 ebs
64000
exit
exit
flows
classifier-profile "v100" match-any
match vlan 100
exit
classifier-profile "v1502-p3" match-any
match vlan 1502 p-bit 3
exit
flow "gd-dn"
classifier "v1502-p3"
no policer
vlan-tag pop vlan
ingress-port ethernet 4/1
egress-port ethernet 3/1 queue 1 block 0/1
no shutdown
exit
flow "gd-up"
classifier "v100"
policer profile "CIR10M-EIR20M"
vlan-tag push vlan 1502 p-bit fixed 3
ingress-port ethernet 3/1
egress-port ethernet 4/1 queue 0 block 0/1
no shutdown
exit
exit
exit
configure
test
echo "Configure Y1564"
# Configure Y1564
y1564
echo "Y1564 - Profile Configuration"
# Y1564 - Profile Configuration
profile "2"
exit
echo "Y1564 - Responder Configuration"
# Y1564 - Responder Configuration
responder "Responder1"
test-profile "2"
bind flow "gd-up"
exit
exit
exit
The following example shows the configuration of the policer under the Y.1564
generator.
Configuration Errors
Table 11-24 lists the messages generated by ETX-2 when a configuration error is
detected.
Message Description
Illegal frame size value Invalid test frame size for Y.1564 profile
Illegal threshold value Invalid round-trip service acceptance criteria for Y.1564 profile
Illegal traffic policing value Invalid traffic policer for Y.1564 profile
Illegal CIR step value Invalid CIR step for Y.1564 profile
Illegal configuration duration value Invalid duration of the configuration test for Y.1564 profile
Illegal performance duration value Invalid duration of the performance test for Y.1564 profile
Illegal rate convention value Invalid rate measurement convention for Y.1564 profile
Illegal P-bit value Invalid P-bit value for Y.1564 profile or generator
Y.1564 profile does not exist (SNMP only) The configured Y.1564 test profile does not exist.
Max number of active generators has The maximum number of Y.1564 generators (eight; 64 for
been exceeded ETX220A) has been reached and no additional generators can
be added.
Max number of active responders has The maximum number of Y.1564 responders (20; 64 for
been exceeded ETX220A) has been reached and no additional responders can
be added.
Entity cannot be added. Table entries You tried to define a 65th profile, generator, or responder.
have reached maximum.
Message Description
Y.1564 profile has not been attached No Y.1564 profile has been attached to generator or responder.
MEP or service have not been found MEP or OAM service within selected MD/MA does not exist.
MEPs have different destination MAC Y.1564 Generator works opposite one remote only. In EVC.cos,
address the MEPs under the MA are opposite several remotes, and
therefore the test does not work.
The device didn't learn the remote's No CCM was received from the remote MEP and its MAC address
mac-address. was not learned. This is relevant only if remote-mep is
configured on the DestNE.
MEPs have different source MAC All MEPs under the same MA must be bound to the same port.
addresses
MEPs have different classification types MEPs within selected MD/MA have different classification types.
MEPs have different VLANs MEPs within selected MD/MA have different VLANs.
MEPs have different inner VLANs MEPs within selected MD/MA have different inner VLANs.
MEP or service are not active MEP or OAM service within selected MD/MA has not been
activated yet.
OAM CFM: Max number of remote MEP The maximum number of remote MEP elements in a line has
elements in a line has been exceeded. been reached and no additional MEP elements can be added.
OAM CFM: Max allowed number of Adding MEPs to previously configured MEPs exceeds the allowed
<512/1024> remote MEPs has been maximum number of remote MEP elements that can be
reached. configured (512/1024).
I/O flow with matching CoS has not been The Y.1564 test mechanism failed to identify a MEP Tx flow with a
found P-bit, matching testing criteria.
Generator can test only one P-bit If there is only one Tx flow with the non-envelope Policer, only
one P-bit can be tested.
Applicable Products
This feature is applicable to all ETX-2 products and to PMC in ETX205A, with the
following conditions:
• PCS ports are relevant only to ETX203AM.
• When <slot>/ is shown before a port number, it is relevant only to
ETX203AM and ETX220A.
• Scripts containing port numbers may have to be edited according to the
product port numbering.
Benefits
The PM data is useful for analyzing ETX-2 service quality. The flexible statistics
collection allows only the necessary data to be collected.
Functional Description
PM statistics collection is configured for the device, entity type, and specific
entities. PM statistics are collected for the following types of entities:
• Ethernet ports
• Flows
• OAM TWAMP sessions
• OAM CFM services
• OAM CFM destination NEs
• System parameters: memory usage and CPU utilization
Notes • PM statistics collection is performed only if it is enabled for the entire device,
regardless of whether it is enabled for any entity
• PM statistics are not collected for entities that are administratively disabled.
ending with the interval that has the lowest frequency. If ETX-2 has not finished
collecting the statistics for an interval when the scheduled time for another
interval arrives, the following action is taken according to whether the new
interval is the next interval, or an interval with higher frequency:
• If it is the next interval, then the next interval is canceled, and a PM record
indicating the cancellation is inserted in the PM data.
• If it is an interval with higher frequency, then ETX-2 collects the higher
frequency interval statistics and then resumes collecting the lower frequency
interval statistics. The PM data is retrieved from ETX-2 by RADview via TFTP
or SFTP. After PM data is retrieved, ETX-2 deletes the file and opens a new
one for further data.
Factory Defaults
Enabling PM statistics oam > cfm > md(<md-id>) > pm-collection PM collection can be
collection for a specific ma(<ma-id>) > mep(<mep- { interval <seconds> | enabled at a defined
OAM CFM service id>) > service(<service-id>) on-interval-close } interval or before an
interval expires.
Type no pm-collection to
disable PM statistics
collection for the service.
Enabling PM statistics oam > cfm > md(<md-id>) > pm-collection PM collection can be
collection for a specific ma(<ma-id>) > mep(<mep- { interval <seconds> | enabled at a defined
OAM CFM destination id>) > service(<service-id>) > on-interval-close } interval or before an
NE dest-ne(<dest-ne-index>) interval expires.
Type no pm-collection to
disable PM statistics
collection for the
destination NE.
Note
PM statistics are collected for entities for which PM statistics collection is
specifically enabled in the entity level via pm-collection, even if PM statistics
collection for the entity type is disabled.
To view the performance management configuration for the device and for
entity types:
1. Navigate to configure reporting.
2. Enter info detail | include pm to view PM-related commands in the
configuration.
Examples
To enable PM for all relevant entities in ETX-2:
• PM statistics collection enabled for device
• PM statistics collection enabled for all relevant entities, every five minutes.
exit all
configure reporting
#**** Enable PM in device
pm
#**** Enable PM for Eth ports, collection interval=5 min
pm-collection eth interval 300
#**** Enable PM for flows, collection interval=5 min
pm-collection flow interval 300
#**** Enable PM for OAM CFM services, collection interval=5 min
pm-collection oam-cfm-service interval 300
#**** Enable PM for OAM CFM dest NEs, collection interval=5 min
pm-collection dest-ne interval 300
exit all
save
#**** Configure PM statistics collection interval for Eth port 0/3, to 1 min
configure port ethernet 0/3
pm-collection interval 60
exit all
save
Configuration Errors
Table 11-25 lists the messages displayed by ETX-2 when a configuration error is
detected.
Message Description
Invalid interval; must divide evenly into The pm-collection command was entered with an interval value
3600 that does not divide evenly into 3600.
Cannot execute; too many different Attempt was made to configure more intervals than the
intervals supported maximum.
LEDs
A red LED is usually an indication of a problem. Check the port that is associated
with the LED to further investigate the problem. Refer to the Operation chapter
for a description of the unit LEDs.
Statistic Counters
Statistic counters provide information on possible abnormal behavior and
failures. You can collect statistics on the following:
• Ethernet ports
• E1/T1 ports, if applicable
• SHDSL ports, if applicable
• VDSL ports, if applicable
• Flows
• RADIUS server
• OAM CFM
For further information, refer to the relevant sections in Chapters 6 –10 and the
relevant sections in the troubleshooting chart.
You can clear the statistics for Ethernet ports, flows, and OAM services.
Statistics clearing is globally enabled by default. Once statistics are cleared from
an interval, the interval becomes “not valid”.
Alarms and events can be written to the alarm and event history log. In addition
to the history log containing alarms and events, the device maintains statistics
for alarms and events in a brief log. Alarms can also be written to the active
alarm table. An SNMP trap can be sent to management stations as the result of
an alarm/event. Additionally, you can configure alarms and events to pop up on
the serial CLI terminal.
Alarms and events have the following properties:
Alarms and events can be masked per source type, source ID, or minimum
severity. When an alarm/event is masked, it is not written to the history log, and
any corresponding traps are not sent to management stations, regardless of
masking in the SNMP manager configuration. When an alarm/event is not
masked, any corresponding traps are sent only to management stations for
which the traps are not masked in the SNMP manager configuration.
Alarm Soaking
ETX-2 supports alarm soaking. This means that the device does not raise an
alarm immediately upon detecting an abnormal condition (i.e. defect); only after
the abnormal condition has occurred uninterrupted for a certain amount of time
(called the rising soaking time). Similarly, the alarm is cleared only after the
abnormal condition is resolved and remains resolved for a certain amount of
time (called the falling soaking time or clear time). In this way, alarm soaking
prevents fleeting alarms, i.e. alarms that rise and fall multiple times in a short
period. Instead of sending a flood of alarms to RADview, only one initial alarm is
sent, and the final clear alarm is sent only upon stabilization of the link.
The device supports alarm soaking, provided the following requirements are met:
• The device supports configurable alarm rising and falling soaking times, as
follows:
• When a defect occurs, the device must wait the rising soaking time (either
configured or dictated by a standard) before raising the alarm. An alarm is
raised only if the defect exists for the entire soaking time. If the defect is
cleared and reoccurs, the rising soaking timer must be rearmed.
• When a condition that caused an alarm is resolved, the device must wait the
falling soaking time (either configured or dictated by a standard) before
clearing the alarm. Only if the condition stays resolved for the entire soaking
time, the alarm is cleared. If the defect reoccurs, the soaking timer must be
rearmed.
Note All traps are maskable, by masking the corresponding alarm/event via the
alarm-source-attribute / alarm-source-type—attribute commands, or by masking
the corresponding alarm per severity via the mask-minimum-severity command.
Configuring alarm input alarm-input <port-number> [active {high | low | If you set alarm-input to active
off}] [description <description>] state, configure alarm input’s
activation mode to one of the
following:
• high – active alarm input
indicated by high voltage
• low – active alarm input
indicated by low voltage
• off – active alarm input
disabled
In description, enter a
description of the alarm
generated by the alarm-input.
This description is saved in the
log and sent with snmp traps
when the alarm occurs.
Configuring alarm rising soaking-time interval [rising rising-msec] clear rising, falling: 0–10,000 ms
and falling soaking times [falling falling-msec] Default:
rising – 2500 ms
falling – 10000 ms
Note: The configured soaking
times apply only for entities for
which there is no standard
dictating a different behavior. If
there is such a standard (e.g.
for SDH/SONET and DS1), the
standard must be followed.
Notes • Entries with source type card are relevant only for ETX203AM with SHDSL or
VDSL module.
• Entries with source type pcs or shdsl are relevant for ETX203AM with SHDSL
or VDSL module , and ETX203AX with embedded SHDSL ports.
• Entries with source type e1t1 are relevant for ETX203AM with E1/T1 module,
and ETX205A with E1/T1 ports.
• Entries with source type ptp-recovered or ptp-recovered-master are relevant
only for ETX205A or ETX220A with PTP ordering options.
• Entries with source type clock-domain, clock-domain-source, or station-clock
are relevant only for ETX205A and ETX220A with timing ordering options.
11.12 Troubleshooting
This section contains a general troubleshooting chart that lists possible failures
and provides workarounds.
Use this chart to identify the cause of a problem that may arise during
operation. For detailed description of the LED indicators functions, refer to the
Operation and Maintenance chapter.
To correct the reported problem, perform the suggested corrective actions. If a
problem cannot be resolved by performing the suggested action, please contact
your RAD distributor.
The unit is “dead” No power • Verify that both ends of the power
(POWER LED is off) cable are properly connected.
The unit is unreachable Incorrect management settings • Using a local serial connection, enable
the relevant management access type
by entering telnet, snmp, and/or ssh at
the config>mngmnt>access prompt.
• View the list of enabled management
access types and settings by entering
info detail at the config>mngmnt
prompt
• Verify that a router interface has been
configured with management access
set to allow all, assigned an IP address,
and bound to an administratively
enabled SVI.
• Verify that management flows have
been set up to/from the SVI, and that
the flows are enabled.
Physical link fails to Link may be administratively • Administratively enable the link.
respond disabled. • In case of Ethernet links, make sure
that the autonegotiation, speed, and
duplex modes match the configured
values on the access switch/router.
Ethernet LINK LED Ethernet cable problem • Check the Ethernet cable to see
is off whether a cross or straight cable is
needed.
• Check/replace Ethernet cable.
• Verify that the range is within the
limits.
• Check the port by connecting the
remote end of the cable to a different
switch.
• Send the unit for repair.
To ping an IP host:
In any level, start pinging the host, specifying its IP address (IPv4 or IPv6)
and optionally the number of packets to send, payload size (in bytes), and
router entity number:
ping <ip-address> [number-of-packets <packets>] [payload-size <bytes>]
[router-entity <number>]
If the remote host answers, ETX-2 displays the ping results including the round
trip delay, rounded as in the following table.
: :
: :
Example
ETX-2# ping 10.10.10.10
To trace a route:
• In any level, start the trace route and specify the IP address (IPv4 or IPv6) of
the host to which you intend to trace route:
trace-route <1.1.1.1–255.255.255.255>
Note You can define only two software packs simultaneously. Although the CLI allows
you to name the SW packs sw-pack-1 through sw-pack-4, it is recommended to
name them sw-pack-1 and sw-pack-2.
You can designate any of the software packs as active. The non-active software
pack serves as a backup that can be used if the active software becomes
corrupted.
The information in this chapter includes the following:
• Software packs that can be loaded into each device
• Detailed conditions required for the upgrade
• Any impact the upgrade may have on the system
• Description of downloading options
Application software can be downloaded to ETX2 via SFTP/TFTP with the copy
command, or via XMODEM, FTP, or TFTP, from the Boot screen.
The downloaded software pack can be installed as the active software via the
admin software install command, or from the Boot screen.
Note Software upgrade relates to upgrading from the product’s previous version to
current version. To upgrade from an older version, you may not be able to
upgrade directly to the latest version, but may be required to upgrade one
version at a time. Refer to the relevant User Manual for upgrade instructions.
12.2 Impact
During the software upgrade process, service is disrupted.
12.3 Prerequisites
SFTP/FTP/TFTP Prerequisites
Prior to upgrading via SFTP/FTP/TFTP, verify that you have the following:
• Operational ETX2 unit with valid IP parameters configured
• Connection to a PC with an SFTP/FTP/TFTP server application and a valid IP
address
• Software image file stored on the PC. The image file (and exact name) can be
obtained from the local RAD business partner from whom the device was
purchased.
XMODEM Prerequisites
Prior to upgrading via XMODEM, verify that you have the following:
• Operational ETX2 unit
• Connection to a PC via a terminal emulation program
• Software image file stored on the PC. The image file (and exact name) can be
obtained from the local RAD business partner from whom the device was
purchased.
Software Packs
Each ETX2 software download can contain two sw-packs from the available
options listed in the following table.
Note As ETX220A is available with more than one chassis type, take special care to
download the software versions suitable to the chassis type.
ETX2_x.x.x(x.x)_sw-pack_203am_f2.bin User ports can sync on Fast only; device has only two
queue blocks.
ETX2_x.x.x(x.x)_sw-pack_203am_g2.bin User ports can sync on Giga only; device has only two
queue blocks.
ETX2_x.x.x(x.x)_sw-pack_203ng_f2.bin User ports can sync on Fast only; device has only two
queue blocks.
ETX2_x.x.x(x.x)_sw-pack_203ng_g2.bin User ports can sync on Giga only; device has only two
queue blocks.
Note Old PMC software (with TWAMP Light only) cannot be upgraded to new PMC
software (with Full TWAMP, TWAMP Light, ICMP Echo, and UDP Echo). Upgrades
are available only after the new PMC has been installed.
Pinging the PC
Check the integrity of the communication link between ETX2 and the PC by
pinging the PC from ETX2.
TFTP file transfers are carried out through port 69. Make sure that the firewall
you are using on the server allows communication through this port (refer to the
Administration chapter for details).
Note Configure the connection timeout of the TFTP server to be more than 30 seconds
to prevent an automatic disconnection during the backup partition deletion
(about 25 seconds).
Note Choose an index that is not being used by the active software, or by a software
pack that you do not want to overwrite.
Note
ETX220A, which has several SW builds, automatically handles mismatch of a
downloaded SW version. After the new software release file has finished
downloading, the device automatically checks that the downloaded software
version matches the device. If not, the device reboots and reverts to the previous
version.
Note The file startup-config must exist before you can install software with creation of
a restore point.
Next time ETX2 reboots and loads new software, it starts a confirmation
timer. See the following procedure for more details on the confirmation.
Notes • If startup-config does not exist, you must install the software pack without
creating a restore point.
• As a defective startup-config can cause a loss of connection, it is not
recommended to install software and change startup-config at the same time.
However, if you must do both at the same time, first install the software and
only after verifying it, make the needed configuration changes (or vice versa).
Note While the confirmation timer is running, ETX2 does not allow any commands that
change its configuration.
Caution The Boot screen procedures are recommended only for use by authorized
personnel, because it provides many additional options that are intended for use
only by technical support personnel.
The following software downloading options are available from the Boot screen:
• Downloading using the XMODEM protocol. This is usually performed by
downloading from a PC directly connected to the CONTROL DCE port of the
unit.
• Downloading using FTP/TFTP. This is usually performed by downloading from
a remote location that provides an IP communication path to an Ethernet port
of ETX2.
Note If you miss the timing, ETX2 performs a regular reboot process (this process
starts with Loading/un-compressing sw-pack-<n> and ends with the login
screen).
System Boot
baud rate b Transmission bit rate (in kbps): 9600, 19200, or 115200
10. See the following sections for instructions on downloading via XMODEM, FTP,
or TFTP.
Using FTP
Use the following procedure to download software release 6.5 to ETX2 via FTP.
Notes • The <index> parameter corresponds to the software pack number to which to
copy the image file.
• If you have set the file name in the boot parameters, you do not need to
specify <FileName>.
Using TFTP
Use the following procedure to download software release 6.5 to ETX2 via TFTP.
Notes • The <index> parameter corresponds to the software pack number to which to
copy the image file
• If you have set the file name in the boot parameters, you do not need to
specify <FileName>.
Using XMODEM
Use the following procedure to download software release 6.5 to ETX2 via
XMODEM.
Note The <index> parameter corresponds to the software pack number to which to
copy the image file.
4. Start the transfer in accordance with the program you are using. For example,
if you are using the Windows HyperTerminal utility:
Select Transfer in the HyperTerminal menu bar, and then select Send File
on the Transfer menu.
The Send File window is displayed:
Select the prescribed ETX2 software file name (you may use the
Browse function to find it).
In the Protocol field, select Xmodem.
When ready, press Send in the Send File window.
You can now monitor the progress of the downloading in the Send File
window.
When the downloading process has successfully completed, a sequence
of messages similar to the following is displayed:
Ethernet Private Line (EPL) is implemented using a point-to-point EVC. All service
frames at the UNI are mapped to a single EVC.
The data traffic flow in the application behaves as follows (from left to the right):
1. PC transmits untagged packets, traffic enters ETX205A User port #3.
2. ETX205A adds VLAN ID 10 towards the network.
3. ETX-5 accepts only traffic with VLAN 10 in port 1/10 and forwards the
packets to port 1/20 in the same I/O card.
4. ETX203AX accepts only traffic tagged with VLAN 10, removes the VLAN, and
forwards the untagged packets to PC.
Device Quantity
ETX205A 1
ETX203AX 1
ETX-5 1
PC with application such as Ostinato that can 1
simulate traffic, and three network cards for
following:
• Management (one network card)
• Connect to simulate traffic (two network
cards)
Classifier profile that accepts only traffic tagged with VLAN ID 10 (data
traffic entering ETX205A from the network)
Flow named 1t3 from network port #1 to user port #3, using the above
profile, and removing the SP-VLAN
exit all
#*********** Create classifier profiles
configure flows
classifier-profile untagged match-any
match untagged
exit
flow 1t3
classifier v10
ingress-port ethernet 1
egress-port ethernet 3 queue 0 block 0/1
vlan-tag pop vlan
no shutdown
exit all
save
ethernet 1/20
queue-group profile q_group_2_level_default
no shutdown
exit
sag 1/2
queue-group profile q_group_SAG_2_level_default
exit all
flow sap_20
classifier all
ingress-port sap 1/1/2
egress-port eth 1/20 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit
flow 20_sap
classifier v10
ingress-port ethernet 1/20
egress-port sap 1/2/2 queue-map-profile QueueMapDefaultProfile block 0/1
no shutdown
exit
Rx Statistics
-----------------------------------------------------------------------------
Total
Packets : 20000
Bytes : 20000000
Drop Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 197941 197941000
Green : 197941 197941000
Yellow : 0 0
Red : 0 0
Yellow/Red : 0 0
Drop Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 243 1947758 1800000
Green(Rate) : 243 1947758 1800000
Yellow(Rate) : 0 0 0
Red(Rate) : 0 0 0
Yellow/Red(Rate) : 0 0 0
Tx Statistics
-----------------------------------------------------------------------------
Packets Bytes
Total : 197941 197941000
Green : 197941 197941000
Yellow : 0 0
Tx Rate
-----------------------------------------------------------------------------
pps L1 (bps) L2(bps)
Total(Rate) : 243 1947758 1800000
Green(Rate) : 243 1947758 1800000
Yellow(Rate) : 0 0 0
Peak Measurement
-----------------------------------------------------------------------------
L1 Min. L2 Min L1 Max L2 Max.
Tx Bit Rate [bps] : 0 0 1300 1252
Drop Bit Rate [bps]: 0 0 13000 121203
1 A+ B+
2 A- B-
3 B+ A+
4 C+ D+
5 C- D-
6 B- A-
7 D+ C+
8 D- C-
Note This section is relevant for ETX203AM ordered with a 4 or 8 port E1/T1 module,
ETX203AX with a built-in E1 port, and ETX205A with 4 or 8 built-in E1/T1 ports.
The E1/T1 connectors are wired as follows, according to the device type:
• ETX203AM with Ethernet Uplink E1/T1 module having four or eight E1/T1
ports – The E1/T1 ports terminate in four RJ-45 connectors. In module with
four E1/T1 ports, each connector provides one port; in module with eight
E1/T1 ports, each connector provides two ports. Table A-2 and Table A-3 list
the pin assignments for four and eight E1/T1 ports, respectively. In the case
of eight E1/T1 ports, you can use RAD cable CBL-E1-SPLT to connect
ETX203AM to the E1/T1 equipment.
• ETX203AX-E1 – A single E1 terminates with a single RJ-45 connector.
Table A-2 lists the pin assignments.
Table A-2. E1/T1 Connector Pinout – One E1/T1 Port per Connector (for
ETX203AX-E1, ETX203AM with 4-port E1/T1 module, ETX205A with 4 or 8 built-
in E1/T1 ports)
1 RX Ring Input
2 RX Tip Input
3 NC NC
4 TX Ring Output
5 TX Tip Output
6 NC NC
7 NC NC
8 NC NC
Table A-3. E1/T1 Connector Pinout – Two E1/T1 Ports per Connector (ETX203AM
with 8-port E1/T1 module)
1 RX Ring Input NC NC
2 RX Tip Input NC NC
3 NC NC TX Ring Output
4 TX Ring Output NC NC
5 TX Tip Output NC NC
6 NC NC TX Tip Output
7 NC NC RX Ring Input
8 NC NC RX Tip Input
Note
Do not connect wires to the NC pins.
1, 2, 3 N.A. –
4 GND Ground
7, 8 N.A. –
Note This section is relevant only for ETX205A or ETX220A if a timing option was
ordered.
3 – Not connected
6, 7, 8 – Not connected
Note This section is relevant for ETX203AM with an SHDSL module, or ETX203AX with
embedded SHDSL ports. One 8-pin RJ-45 connector is used for the 4-wire
ordering option, and two 8-pin RJ-45 connectors are used for the 8-wire ordering
option. Each pin is wired as in the table below.
Pin Function
1 NC
2 NC
3 Loop 2
4 Loop 1
5 Loop 1
6 Loop 2
7 NC
8 NC
Note This section is relevant only for ETX203AM with VDSL module.
The VDSL AIO electrical interface is made up of two 8-pin RJ-45 connectors – one
connector for Loop 1 and Loop 2; the other for Loop 3 and Loop 4. Each
connector is wired in accordance with Table A-8.
Pin Function
1 NC
2 NC
3 Loop 2 / Loop 4
4 Loop 1 / Loop 3
5 Loop 1 / Loop 3
6 Loop 2 / Loop 4
7 NC
8 NC
Note This section is relevant only for ETX205A or ETX220A if a PTP option was
ordered.
Pin Function
1 Option, NC
2 Option, NC
3 Tx/Rx 1PPS -
4 GND
5 GND
6 Tx/Rx 1PPS +
7 Tx/Rx TOD -
8 Tx/Rx TOD +
B.1 Introduction
This document describes basic tests to verify ETX-2 functionality for the following
features:
• Basic functionality (connectivity, passing traffic without errors)
• Protection (link protection, LAG )
• OAM (CFM)
• RFC-2544
• Device reset
Note All tests should pass if the following procedures are performed precisely.
Unit under test (UUT) Setup in Figure B-1: ETX203AM, ETX203AX, or 6 (at least two
ETX205A ETX203AM
devices, with
SHDSL 4-wire
network module
and SHDSL 8-wire
network module,
respectively)
EFM
Passive
EFM 1
2
1 3 Active 3
1 1 3 UUT-3
2 4 5
LAG/LACP Protection EFM
3 5 2 2 4 6
Passive
4 6 UUT-1 Switch UUT-2 EFM 2 7
1
Network Active 8
VID 51 3
Tester OOB Network
UUT-4
Tester
NMS
Figure B-1. Test Setup – Basic with DSLAM (ETX203AM, ETX203AX, or ETX205A)
Notes • UUT-1 through UUT-4: ETX203AM with GbE network module, ETX203AX, or
ETX205A
• UUT-5: ETX203AM with SHDSL 4-wire network module
• UUT-6: ETX203AM with SHDSL 8-wire network module
3 4
Network
Tester
[0/]3 [0/]4
Node, 1/3 1/4 Node,
east west
[1/]1 [1/]2
NMS 4/1 4/2
UUT-2
Node,
east Switch Node,
Main data path east
[1/]1 [1/]1
[0/]3 4/1 [0/]3
4/1 5
1 2/9 1/1
2 [0/]4 [1/]2 [0/]4 6
2/10 [1/]2 1/2
UUT-1 4/2 4/2 UUT-3
Network Network
Protection data path Node,
Tester RPL, Tester
west
west
Neighbor, Node,
west east
[1/]2 [1/]1
4/2 4/1
[0/]3 UUT-4 [0/]4
1/1 1/2
7 8
Network
Tester
Figure B-2. Test Setup – Ring (ETX203AM with GbE network module, ETX203AX, ETX205A, or
ETX220A)
Note The following applies when there is more than port number in a box:
• The top number is relevant for the following UUTs:
• ETX203AM (slot number in brackets applicable)
• ETX203AX (slot number in brackets not applicable)
• ETX205A (slot number in brackets not applicable)
• The bottom number is relevant for ETX220A.
Note In Table B-2, the slot number [0/] or [1/] is applicable only if the UUT is
ETX203AM.
Note The following applies when there is more than port number in a table cell:
• The top number is relevant for the following UUTs:
• ETX203AM (slot number in brackets applicable)
• ETX203AX (slot number in brackets not applicable)
• ETX205A (slot number in brackets not applicable)
• The bottom number is relevant for ETX220A.
Configuring Devices
This section presents the device configurations. The data such as VLAN IDs, IP
addresses, etc. were randomly selected for test purposes, and can be changed to
suit your particular configuration.
UUT-1
UUT-2
UUT-3
UUT-4
UUT-1
UUT-2
UUT-3
UUT-4
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
1 Ping the UUTs to verify network connectivity. The UUTs reply to ping.
2 Open Telnet and SSH sessions to the UUTs. Telnet and SSH sessions are established successfully.
3 Initiate SNMP management session from RADview Devices reply to ping and appear on RADview map.
NMS and verify management connectivity to all
devices.
4 Display UUT inventory (via config system show The inventory display is correct for the following:
summary-inventory). • Ports
• Fans
• Power supplies
• Software version
• MAC address
5 If the UUT is ETX203AM, check the card status. The card status shows the correct type of network module that
is installed, e.g.:
UUT-5>config>slot(1)# show status
Actual Type : SHDSL 4W
Provisioned Type : SHDSL 4W
Administrative Status : Up
Operational Status : Up
Status Details : OK
6 Run Ethernet traffic for at least 15 minutes as The traffic passes without errors or packet loss.
follows, according to the test setup:
• Test setup in Figure B-1: From Network Tester
port 1 and port 5, send packets with frame
size 1518 bytes, VLAN 4040, at 98% line rate.
• Test setup in Figure B-2: From Network Tester
port 1, send packets with VLAN 1002 & inner
VLAN 102; from Network Tester port 7, send
packets with VLAN 102.
7 To test SHDSL traffic, send from both traffic The traffic passes without errors or packet loss.
generators for at least 15 minutes: Untagged
frames with frame size 1500 bytes, rate 10 Mbps
between UUT-5 port 3 and UUT-6 port 3.
8 Set up SNTP servers and ping them The servers reply to ping.
9 Check date and time status in UUTs. The date and time is according to the SNTP server.
10 Verify status of all MEPs. Verify that all MEPs are OK, e.g.:
• Operational status is OK.
• No defects are displayed.
• Remote MEP address matches the remote device MAC
address.
11 Clear alarm logs in all devices. Logs are empty with no active alarms.
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
Notes The term [<slot>/] has the following meaning, according to the UUT:
• ETX203AX or ETX205A – empty, e.g. [<slot>/]1 = 1
• ETX203AM –1/ (must have a GbE network module)
• ETX220A –4/
1 In UUT-1, check the ERP status. The ERP status in UUT-1 indicates:
• East port: [<slot>/]1
• West port: [<slot>/]2
• RPL link: West
• Ring state: Idle
• East port status: Forward
• West port status: Block R-APS and Data
• Local SF source: OK
• Local SF source: OK
2 Test ring with reversion to active link: In • Traffic packets are not lost during the five minutes that it takes
UUT-1, disconnect port eth [<slot>/]1, start for the ring to reroute traffic.
Ethernet traffic, and then reconnect • During the first five minutes, the ERP status in UUT-1 indicates
port eth [<slot>/]1. that the West port status has changed to Forward:
East port: [<slot>/]1
West port: [<slot>/]2
RPL link: West
Ring state: Pending
East port status: Block R-APS and Data
West port status: Forward
Local SF source: OK
Local SF source: OK
4 Test ring with nonreversion to active link: In The ERP is set to not revert back to the active link when the failure is
UUT-1, enter no revertive in the level config cleared.
protection erp 1 major .
5 In UUT-1, disconnect and then reconnect • Traffic packets are not lost.
port eth [<slot>/]1. • The ERP status in UUT-1 indicates that the West port status has
changed to Forward:
East port: [<slot>/]1
West port: [<slot>/]2
RPL link: West
Ring state: Pending
East port status: Block R-APS and Data
West port status: Forward
Local SF source: OK
Local SF source: OK
7 In UUT-1, disconnect and then reconnect • Traffic packets are not lost.
port eth [<slot>/]2. • The ERP status in UUT-1 indicates that the East port status has
changed to Forward:
East port: [<slot>/]1
West port: [<slot>/]2
RPL link: West
Ring state: Pending
East port status: Forward
West port status: Block R-APS and Data
Local SF source: OK
Local SF source: OK
9 Configure the ring with reversion to active link: The ERP is set to revert back to the active link when the failure is
In UUT-1, enter revertive in the level config cleared.
protection erp 1 major.
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
1 Run Ethernet traffic between Network Tester In UUT-1, verify the following:
port 1 and Network Tester port 5: For • Ethernet traffic is running with no errors or packet loss.
example, send:
• UUT-1 replies to ping.
• From Network Tester port 1: Frames with
• Telnet session to UUT-1 can be established.
VLAN 301, at rate 9 Mbps
• MEPs 12–18 have operational status set to OK.
• From Network Tester port 1: Frames with
VLAN 541
• From Network Tester port 5: Frames with
VLAN 4001, at rate 9 Mbps)
2 In UUT-1, disconnect/reconnect the ports in • No errors are detected in data transmission after switchover.
the LAG. • UUT-1 replies to ping.
• Telnet session to UUT-1 can be established.
• MEP’s 12–18 have operational status set to OK.
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
1 Run Ethernet traffic between Network Tester In UUT-2, verify the following:
port 1 and Network Tester port 5: For • Ethernet traffic is running with no errors or packet loss.
example, send:
• UUT-2 replies to ping.
• From Network Tester port 1: Frames with
• Telnet session to UUT-2 can be established.
VLAN 301, at rate 9 Mbps
• MEPs 12–18 have operational status set to OK.
• From Network Tester port 5: Frames with
VLAN 4001, at rate 9 Mbps)
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
1 To verify MEP Status when remote MEP is According to the test setup:
down, do the following, according to the test • Test setup in Figure B-1:
setup:
In UUT-1, display MEP 12 status and verify that operational
• Test setup in Figure B-1: In UUT-2 set status has changed to fail and then to RDI.
MEP 16 to administratively disabled (via
Verify that the loss of continuity has been indicated in the
command shutdown).
alarm log, as well as at the NMS, for: MD 3 MA 2 MEP 12
• Test setup in Figure B-2: In UUT-2 set R.MEP 16.
MEP 1 to administratively disabled (via
• Test setup in Figure B-2:
command shutdown).
In UUT-1, display MEP 1001 status and verify that operational
status has changed to fail and then to RDI.
Verify that the loss of continuity has been indicated in the
alarm log, as well as at the NMS, for: MD 1 MA 1 MEP 1001
R.MEP 1.
2 To verify MEP Status when remote MEP returns According to the test setup:
to up, do the following, according to the test • Test setup in Figure B-1:
setup:
In UUT-1, display MEP 12 status and verify that operational
• Test setup in Figure B-1: In UUT-2 set status has returned to OK.
MEP 16 to administratively enabled (via
Verify that the alarm for loss of continuity was cleared in the
command no shutdown).
alarm log, as well as at the NMS.
• Test setup in Figure B-2: In UUT-2 set
• Test setup in Figure B-2:
MEP 1 to administratively enabled (via
command no shutdown). In UUT-1, display MEP 1001 status and verify that operational
status has returned to OK.
Verify that the alarm for loss of continuity was cleared in the
alarm log, as well as at the NMS.
3 Run OAM link trace between the various pairs Link trace is successful.
of MEPs and their corresponding remote MEPs.
5 To verify service statistics for the test setup in In UUT-1 MEP 1 verify that for service 1 statistics:
Figure B-1, do the following: • Far end Tx and Rx Frames=Network Tester port 1 total Tx frames
• In UUT-1 MEP 1 clear the statistics for • Near end Tx and Rx Frames=Network Tester port 5 total Tx frames
service 1 and Dest-NE 1.
• Far end lost frames=0
• Run Ethernet traffic for at least 15 minutes
• Near end lost frames=0
from Network Tester port 1 and port 5:
Packets with frame size 1518 bytes, VLAN
4040, at 98% line rate
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
2 Check the test status (via command show The command output shows that the test is in progress; after about
status). four minutes, the command output shows that the test has
completed.
3 Display the test results (via command show Verify that that measured results match the expected results:
summary). • Success column displays approximately 14%
• Throughput (FPS) column displays a value such that the result of
[FPS × Frame Size × 8] is approximately 30 Mbps.
Estimated Duration
The estimated duration of this test is one hour.
Test Procedure
3 Verify that traffic is running through all relevant Traffic is running without errors or packet loss.
ports.
5 Upload the device configuration file, and compare The uploaded configuration files before and after the reboot are
it to the configuration file uploaded before the the same.
reboot.
C.1 Overview
Note This appendix is applicable only to devices that contain an SEC/EEC clock module
(ETX205A and ETX220A).
Timing loop
This is a network condition where a slave clock providing synchronization
becomes locked to its own timing signal. It is generally created when the slave
clock timing information is looped back to its own input, either directly or via
other network equipments. Timing loops should be prevented in networks by
careful network design.
QL_minimum
QL_minimum is a user configurable parameter used in the squelching of clock
output signals. If the QL of the signal used to derive the output falls below
QL_minimum then the output is squelched (cut-off or set to AIS).
Clock-Source Quality-Level
The clock-source quality-level of a SEC or SASE is defined as the grade of clock to
which it is ultimately traceable; i.e. the grade-of-clock to which it is synchronized
directly or indirectly via a chain of SECs, and SASEs however long this chain of
clocks is. For example, the clock-source quality-level may be a Primary Reference
Clock complying with Recommendation G.811, or it may be a Slave Clock in
holdover-mode, complying with Recommendation G.812, or a Recommendation
G.813 or G.8262 Clock in holdover or free-run.
The clock-source quality-level is essentially, therefore, an indication only of the
long-term accuracy of the NE Clock.
Station Clock
This is a node clock as defined in Recommendation G.810.
The functional definitions are given in Recommendation G.783.
The symbols and diagrammatic conventions are given in Recommendation G.783.
Squelch
An action that cuts-off (i.e. shuts down) an output signal. For some signals
(e.g. 2 Mbit/s) squelching may be realized by means of inserting AIS, instead of
shutting down the signal.
C.3 Abbreviations
This appendix uses the following abbreviations:
AIS Alarm Indication Signal
BITS Building Integrated Timing Supply
CI Characteristic Information
CK Clock signal (Timing information)
CLR Clear
CS Clock Source (Timing information)
CSid Clock Source identifier
DNU Do Not Use
DUS Don't Use for Sync
ESF Extended Super Frame
ESMC Ethernet Synchronization messaging Channel
ESSM Ethernet Synchronization Status Messages
FSw Forced Switch
HO Hold Off time
HO HoldOver mode
ID IDentifier
LO Lockout
LO Locked mode
LOS Loss Of Signal
LSB Least Significant Bit
MSB Most Significant Bit
MSw Manual Switch
NE Network Element
NSUPP Not supported
PDH Plesiochronous Digital Hierarchy
PRC Primary Reference Clock
PRS Primary Reference Source
QL Quality Level
SASE Stand Alone Synchronization Equipment
SDH Synchronous Digital Hierarchy
SEC Synchronous Equipment Clock
SF Signal Fail
SMC SONET Minimum Clock
SQLCH Squelch
SSF Server Signal Fail
The CSM control SW runs all the G.781 based attributes such as the clock
selection algorithms, external user commands etc. It receives and transmits
Quality Level (QL) and Server Signal Fail (SSF) information from/to the relevant
data and external clock ports. It is also responsible for correctly configuring the
SEC/EEC according to the relevant standards and user preferences (e.g. G.8262
option I…).
Clock Domains
The CSM module supports one clock domain (one primary long-term frequency
source) only. In products that require to support multiple clock domains (e.g. to
support multiple service providers, each having its own primary long-term
frequency source), multiple instances of the CSM module are required.
The clock domain ID shall be configured by the user using the following CLI
command:
configure >system>clock> domain <id> // <id> - domain number
1
For more information regarding the terms in brackets see ITU-T
G.703/G.704/G.781.
STM-N
The STM-N transport signals carry (in addition to the payload) reference timing
information and an indication of the quality level of the source generating this
timing information, via the Synchronization Status Message (SSM) as defined in
Recommendation G.707.
2 Mbit/s (E1)
The 2 Mbit/s transport signals may carry (in addition to the payload) reference
timing information.
The 2 Mbit/s timing reference signals (without payload) carry reference timing
information to specific synchronization ports.
Both signals can carry an indication of the quality level of the source generating
the timing information via the SSM as specified in Recommendation G.704.
2 MHz (T12)
Synchronization can be carried through 2 MHz signals to specific synchronization
ports (so called station clock ports). This signal does not carry an indication of
the quality level of the source generating the timing information.
Both signals can carry an indication of the quality level of the source generating
the timing information via the SSM transported within the 1544 kbit/s signal's
Extended Super Frame (ESF) Data Link (DL) as specified in Recommendation
G.704.
Notes • Equipment developed prior to this first revision of the Recommendation may
not be able to carry reference timing information and/or support SSM via its
802.3 interfaces
• The equipment can have both nonsynchronous and synchronous 802.3
interfaces as defined in G.8264. Nonsynchronous 802.3 interfaces are
excluded from the synchronization distribution process
The relevant synchronization input/output ports (type and ID) that are to take
part in the clock selection process are user configured using the following CLI
command:
configure >system>clock>domain (id)#[no] source <src-id> {type}
[<id>] [{port type} <port-index>]
// type - {domain <domain-id>| rx-port {port-type}
<port-index>| station <station-id> | recovered
<recovered-id>}.
// rx-port {port-type} - E1, T1, Ethernet, SDH/SONET.
Note
For further details regarding the specific CLI structure, refer to Chapter 4
The following clock source quality levels are defined in the CSM synchronization
selection process of Option II network corresponding to Second generation.
QL-PRS PRS traceable (Recommendation G.811)
QL-STU Synchronized – Traceability Unknown
QL-ST2 Traceable to Stratum 2 (Recommendation G.812, Type II)
QL-TNC Traceable to Transit Node Clock (Recommendation G.812, Type V)
QL-ST3E Traceable to Stratum 3E (Recommendation G.812, Type III)
QL-ST3 Traceable to Stratum 3 (Recommendation G.812, Type IV)
QL-SMC Traceable to SONET Clock Self Timed (Recommendation G.813 or
G.8262, Option II)
QL-ST4 Traceable to Stratum 4 Freerun (only applicable to 1.5 Mbit/s
signals)
QL-PROV Provisionable by the Network Operator
QL-DUS This signal should not be used for synchronization.
Note Squelching (signal cutoff) is applicable only for 2.048 MHz (T12) clock interfaces.
In case 2.048 Kb/s (E1) or 1.544 Kb/s (T1) are used, upon a ‘squelching’ event
the interface would start transmitting AIS.
QL-PRC highest
QL-SSU-A |
QL-SSU-B |
QL-SEC |
QL-DNU |
Note
The quality levels QL-INVx, QL-FAILED, QL-UNC and QL-NSUPP are internal QLs
inside the NE and are never generated at an output port.
QL-PRS highest
QL-STU |
QL-ST2 |
QL-ST3 |
QL-SMC |
QL-ST4 |
QL-DUS |
Note
The quality levels QL-INVx, QL-FAILED, QL-UNC and QL-NSUPP are internal QLs
inside the NE and are never generated at an output port.
The quality level QL-PROV is provisionable by the network operator and may take
different order positions. The default position for QL-PROV is as shown in
Table C-2.
Note The implementation in RAD CSM always assumes this default position for
QL-PROV.
QL-UNK highest
QL-SEC |
Note
The quality levels QL-INVx, QL-FAILED, QL-UNC and QL-NSUPP are internal QLs
inside the NE and are never generated at an output port.
Note Valid SSM synchronization sources can also be overwritten using the ‘Force QL’
procedure.
In RAD CSM, when working in QL-enabled mode, the user must configure (‘force’)
a specific QL level for all the ingress synchronization interfaces (assigned sync
sources) that does not support SSM (outputting the default QL-NSUPP).
A synchronization source issuing signal fail (SSF) cannot be QL overwritten by
user configuration (QL_FAILED is always distributed to the selection algorithm).
• Code 0010 (Quality PRC) means that the source of the trail is a PRC clock
(Recommendation G.811).
• Code 0100 (Quality SSU-A), means that the source of the trail is a Type I or V
SSU clock as defined in Recommendation G.812.
• Code 1000 (Quality SSU-B), means that the source of the trail is a Type VI
SSU clock (Recommendation G.812).
• Code 1011 (Quality SEC), means that the source of the trail is a SEC clock
(Recommendation G.813 or G.8262, Option I).
• Code 1111 (quality DNU), means that the signal carrying this SSM shall not be
used for synchronization because a timing loop situation could result if it is
used.
• Code 7CFFH (Quality ST3E) means that the source of the trail is a Stratum 3E
clock (Recommendation G.812, Type III).
• Code 10FFH (Quality ST3) means that the source of the trail is a Stratum 3
clock (Recommendation G.812, Type IV).
• Code 22FFH (Quality SMC) means that the source of the trail is a
SONET/Ethernet self-timed clock (Recommendation G.813 or G.8262, Option
II).
• Code 28FFH (Quality ST4) means that the source of the trail is a Stratum 4
clock.
• Code 40FFH (Quality PROV) is provisionable by the network operator.
• Code 30FFH (Quality DUS) means that the signal carrying this SSM shall not be
used for synchronization because a timing loop situation could result if it is
used.
Note SSM disable for an Ethernet port causes it to stop transmitting ESMC frames.
Table C-4. Quality Level Set and Coding in Synchronization Status Message in Option I
Synchronization Networks
– disabled 1111
Table C-5. Quality Level Set and Coding in Synchronization Status Message in Option II
Synchronization Networks
SSM SSM
coding [MSB..LS coding [MSB..LS
B] in STM-N B] in 1544
signal kbit/s signal
(BINARY) with ESF (HEX)
Table C-6. Quality Level Set and Coding in Synchronization Status Message in Option III
Synchronization Networks
QL-UNK 0000
QL-SEC 1011
0000 QL-INV0
0001 QL-INV1
0010 QL-PRC
0011 QL-INV3
0100 QL-SSU-A
0101 QL-INV5
0110 QL-INV6
0111 QL-INV7
1000 QL-SSU-B
1001 QL-INV9
1010 QL-INV10
1011 QL-SEC
1100 QL-INV12
1101 QL-INV13
1110 QL-INV14
1111 QL-DNU
Table C-8. Interpretation of Synchronization Status Message Codes in STM N Signals in Option II
Synchronization Networks
0000 QL-STU
0001 QL-PRS
0010 QL-INV2
0011 QL-INV3
0100 QL-TNC
0101 QL-INV5
0110 QL-INV6
0111 QL-ST2
1000 QL-INV8
1001 QL-INV9
1010 QL-ST3
1011 QL-INV11
1100 QL-SMC
1101 QL-ST3E
1110 QL-PROV
1111 QL-DUS
Table C-9. Interpretation of Synchronization Status Message Codes in 1544 kbit/s Signals in Option
II Synchronization Networks
Table C-10. Interpretation of Synchronization Status Message Codes in Option III Synchronization
Networks
0000 QL-UNK
0001 QL-INV1
0010 QL-INV2
0011 QL-INV3
0100 QL-INV4
0101 QL-INV5
0110 QL-INV6
0111 QL-INV7
1000 QL-INV8
1001 QL-INV9
1010 QL-INV10
1011 QL-SEC
1100 QL-INV12
1101 QL-INV13
1110 QL-INV14
1111s QL-INV15
Note
Interworking between Option I and II, Option I and III and Option II and III
synchronization networks is not defined.
Signal Fail
RAD CSM supports three levels (or sources) of signal fail triggering:
1. Signal fail for a synchronization source is activated in case of defects
detected in the transport layers. In addition an unconnected synchronization
signal has also signal fail active in order to allow correct processing in the QL
disabled mode.
2. Inclusion of specific synchronization failures conditions based on dedicated
detection mechanism embedded within the SEC/EEC device are also
supported. More specifically, RAD’s SEC/EEC implementation is capable of
detecting a large frequency deviation, beyond a pre-configured threshold, as
well as lack of activity on each one of the assigned synchronization sources.
Those alarm indications are also used to issue a Server Signal Fail (SSF) signal
towards the CSM.
An SSF signal is issued by the SEC/EEC HW in the following cases:
Activity alarm (leaky bucket mechanism). The configuration of the activity
detector is fixed and preconfigured for all RAD products.
10,000 ppm coarse frequency monitoring (fixed for all RAD products).
User configured HARD limit frequency monitoring. The user can configure
a HARD frequency limit within the range of ±3.81 ppm to ±60.96 ppm in
0.01 ppm steps using the following CLI command:
configure >system>clock>domain (id)># max-frequency-deviation
<value>
3. Synchronous Ethernet ports that fail to receive a valid ESMC message
immediately for a period of 5 seconds, issue a signal fail indication.
In order to avoid reactions on short pulses or intermittent signal fail information,
the signal fail information is passed through a hold-off and wait-to-restore
processes before it is considered by the selection process.
In QL enabled mode the QL of a synchronization source with active signal fail is
set to QL-FAILED. The selection process reacted to this QL value instead of the
signal fail signal in this mode.
When it comes to the user failure indications for a specific clock source, the
priority of presenting the specific SSF event cause is as follows:
1. A problem reported by the PHY (physical-fail)
2. Violation of the HARD frequency limit (monitoring-fail)
3. Lack of ESMC messages reception (if the interface is an Ethernet one) (esmc-
fail)
In other words, a violation of the HARD frequency limit would mask a concurrent
ESMC messages timeout indication. A problem reported from the PHY would mask
both concurrent HARD frequency violation and ESMC messages timeout
indications.
It should be stressed again that only the user indication would be masked, not
the actual failure signal (SSF). Moreover, new versions of CSM support
dedicated/independent user indications for each cause.
Hold-Off Time
The hold-off time ensures that short activation of signal fail is not passed to the
selection process.
In QL-disabled mode signal fail is active for the hold-off time before it is passed
to the selection process.
In QL-enabled mode a QL value of QL-FAILED exists for the hold-off time before it
is passed to the selection process. In the mean time the previous QL value is
passed to the selection process.
Note Other QL values than QL-FAILED are passed to the selection process immediately.
Separate hold-off timers are used for each input to a selection process
(nominated source). The hold-off time is user configured within the range of 300
ms to 1800 ms using the following CLI command:
configure >system>clock>domain (id)> source (src-id)# hold-off
<seconds>
Wait-to-Restore Time
The wait to restore time ensures that a previous failed synchronization source is
only again considered as available by the selection process if it is fault free for a
certain time.
In QL-disabled mode after deactivation of signal fail, it remains false for the wait
to restore time before signal fail false is passed to the selection process. In the
meantime, signal fail true is passed to the selection process.
In QL-enabled mode after a change of the quality level from QL-FAILED to any
other value, the quality value QL-FAILED is maintained for the wait to restore
time before the new QL value is passed to the selection process. In the
meantime, the quality level QL-FAILED is passed to the selection process.
Separate wait to restore timers are used for each input to a selection process
(nominated source).
The wait to restore time is user configurable (user configuration) in the range of
0 to 12 minutes in steps of 1 minute for all inputs of the selection process in
common using the following CLI command. The default value is 5 minutes.
configure >system>clock>domain (id)> source (src-id)#
wait-to-restore <seconds>
Each wait to restore timer can be cleared with a separate (user) Clear command
using the CLI command shown below. If a wait to restore timer is cleared the new
QL value (in QL-enabled mode), or signal fail value (in QL-disabled mode), is
immediately passed to the selection process.
configure >system>clock>domain (id)> source (src-id)#
wait-to-restore-clear //command
A new WTR state status was added to the source/show status command to
give the user more clarity regarding the current ‘WTR state’ of each
synchronization source.
configure >system>clock>domain (id)> source (src-id)# show status
.
.
.
WTR State : { Inactive | Running }
1 highest
2 |
3 |
: |
K lowest
Notes • The priority value is not ordered numerically. The following relation is present:
"1" > "2" > "3" > .. >"K"
• The assigning of equal priorities to synchronization sources, in order to allow
for non-revertive operation, does not allow for a predefined initialization state
of known synchronization configuration following failure of a higher priority
source.
The CSM synchronization source ports priority is configured by the user using the
following CLI command:
configure >system>clock>domain (id)> source (src-id)#no
priority <num> ock-
// If no option is chosen, then this source is not taken to the
selection process
External Commands
Several external commands are available to the user via the product’s
management level (e.g. for maintenance purposes). These commands are
independent and have different impact on the selection processes.
The activation and deactivation of external commands associated with the
synchronization selection process are defined below. Furthermore, only one of
these external commands is active at a time as per the selection process.
Clear Command
A clear (CLR) command clears the forced switch and manual switch commands.
Note A forced switch command to a synchronization source #p, which is in the SF state
or has a QL of DNU in QL enabled mode, results in the network element entering
holdover.
A new Force switch state status was added to the domain/show status
command to give the user more clarity regarding the current ‘Force switch’ state
of the clock domain.
configure >system>clock>domain (id) # show status
.
.
.
Force Switch: {InActive | Active}
The Manual switch state status is available under the domain/show status
command to give the user more clarity regarding the current ‘Manual switch’
state of the clock domain.
configure >system>clock>domain (id) # show status
.
.
.
Manual Switch: {InActive | Active}
To switch the CSM back into QL-enabled mode the following CLI command should
be used. Through this CLI command the user also configures the QL_minimum
level used for the T4 ‘squelching’ mechanism.
configure >system>clock>domain (id)# quality min-level {level}
QL-enabled Mode
In QL-enabled mode the following parameters contribute to the selection
process:
• Quality Level
• Signal fail via QL_FAILED
• Priority
• External commands
If no overriding external commands are active, the algorithm selects the reference
with the highest quality level, which is not experiencing a signal fail condition. If
multiple inputs have the same highest quality level, the input with the highest
priority is selected. For the case that multiple inputs have the same highest
priority and quality level, the current existing selected reference is maintained if it
belongs to this group, otherwise an arbitrary reference from this group is
selected.
If no input could be selected, the CSM moves the SEC/EEC to holdover state while
distributing the internal oscillator QL level towards the output synchronization
interfaces (T4 immediately moves to ‘squelch’ mode).
QL-disabled Mode
In QL-disabled mode the following parameters contribute to the selection
process:
• Signal fail
• Priority
• External commands
If no overriding external commands are active, the algorithm selects the reference
with the highest priority which is not experiencing a signal fail condition. For the
case that multiple inputs have the same highest priority, the current existing
selected reference is maintained if it belongs to this group, otherwise an arbitrary
reference from this group is selected.
If no input could be selected, the CSM moves the SEC/EEC to holdover state (T4
immediately moves to ‘squelch’ mode).
techniques should be used within network elements and SASEs that might open
the potential loop. Some of these are described hereafter that affect the
synchronization distribution functionality within a product.
T1530620-99
Figure C-3. RAD CSM Automatic DNU Generation Towards NE with SEC/EEC Timing
The clock source identifier CSid has been introduced to support the above feature
as shown in Figure C-3. To each transport and station clock input port a unique
CSid is assigned. This ID is processed in the CSM together with the clock and
quality level of the port. The CSid of the selected source for the SEC/EEC is
distributed to all output ports. If a transport output port receives the same CSid
as its associated input port the outgoing is set to DNU.
input port uses, in this case, the remote CSid (from the station clock output) as
CSid for the clock signal to the selection process (RI_CS = CI_CS) instead of its
own CSid (MI_CSid). This results in DNU insertion in the traffic output port
associated with the traffic input port used as source for the station clock (see
Figure C-4). If the station clock output is squelched or set to AIS, the remote CSid
is replaced by the own CSid (MI_CSid) and the automatic DNU insertion in the
traffic output port associated with the traffic input port used as source for the
station clock is removed (see Figure C-5).
SASE
station clock
active ports
RI_CS=1
output
MI_CSid=5
input
NEy
NEx NEz
CI_CS=1 CI_CS=1
MI_CSid=1 MI_CSid=3
SSM=0010 CI_CS=1 CI_CS=3
input input
T1530660-99
Figure C-4. Automatic DNU Generation in RAD CSM with SASE/BITS Timing (SSM/QL not Supported)
SASE
station clock
squelched/AIS
ports
RI_CS=none
output
MI_CSid=5
input
NEy
NEx NEz
CI_CS=1 CI_CS=5
MI_CSid=1 MI_CSid=3
SSM=1011 CI_CS=1 CI_CS=3
input input
T1530670-99
Figure C-5. Removal of Automatic DNU Generation in RAD CSM with SASE/BITS Timing (SSM/QL not
Supported)
Delay Times
The following delay times are respected by the CSM module:
1. Holdover message delay THM – This delay applies when the CSM (SEC/EEC)
switches to holdover because of loss of signal of the input reference and lack
of any other available reference. When this event occurs, the CSM (and
SEC/EEC) goes immediately into holdover but changes the output SSM to the
holdover code after a delay which has been defined to be between 500 ms
and 2000 ms.
2. Non-switching message delay TNSM – This delay applies when the QL of the
selected synchronization source changes but no switchover to another source
is performed by the CSM. The outgoing SSM follows this change at the input
within a time defined to be less than 200 ms.
3. Switching message delay TSM – This delay applies when a new synchronization
source is selected by the CSM. The output SSM change, if any, is done after a
delay that has been defined to be between 180 ms and 500 ms.
ESMC Support
If the interface type of the clock is Ethernet, that the CSM supports ESSM
(Ethernet SSM) messages transmission and reception for this port as per ITU-T
Recommendation G.8264.
Note 1: Bit 7 is the most significant bit of Byte 21. Bit7 to bit 4 (bits 7:4) represent the four bit version
number for the ESMC.
Note 2: The three least significant bits (bits 2:0) are reserved.
ESSM is sent with the slow protocol multicast MAC address (01 80 C2 00 00 02),
slow protocol Ethernet type (8809) and a specific sub type (0x0A). The OUI, ITU
subtype and version field values are shown in Table C-12. The E bit designates
the event that is the QL value changed. The R symbol designates the reserved
field.
The payload of the PDU contains one TLV 2 defined by the standard QL TLV. The
format of this TLV is given in Table C-13.
1 8 bits Type:0x01
Note 1: Bit 7 of Octet 4is the most significant bit. The least significant nibble, bit 3 to bit 0
(bits 3:0) contain the four bit SSM code.
The codes to be used for Synchronous Ethernet SSM are: EEC1=1011 and
EEC2=1010 as defined in ITU-T Recommendation G.8264.
2
Future ESMC applications may require additional TLVs.
In Auto operational mode, the selection between the clock states is done
automatically depending on the quality and availability of the incoming reference
signal and the selected QL mode.
When in Auto operational mode, a ‘forced holdover’ command would force the
CSM to move into the Holdover operational mode (Holdover state) regardless of
the current clock state.
In QL-enabled mode, the Locked state is automatically selected if the incoming
reference is not in the signal fail state (SSF = false) and the quality level of the
incoming reference is better or equal to the configured QL_minimum level.
The Holdover state is automatically selected without delay when the incoming
reference goes into the signal fail state (SSF = true) or the quality level of the
incoming signal is lower than the configured QL_minimum level. The Holdover
state is left when both the signal fail clears (SSF = false) and the quality level of
the incoming signal is equal or better than the configured QL_minimum level.
In QL-disabled mode the Locked state is automatically selected if the incoming
reference is not in the signal fail state (SSF = false). The Holdover state is
automatically selected when the incoming reference goes into the signal fail state
(SSF = true).
The CSM state can be forced by the user using the following CLI command:
configure >system>clock>domain (id)# mode { auto | free-run |
holdover } //default auto
Note For detailed information regarding the CSM CLI, refer to Chapter 4.
configure
system
clock
domain
- master
- fallback
-source
station
The Master and Fallback Clocks are kept for the backward compatibility with the
existing old projects, in order to have just one Clock XML file. TBD
QL Minimum:
configure >system>clock>domain (id)# no quality
configure >system>clock>domain (id)# quality min-level {level}
// level – {lprc, ssu-a, ssu-b, sec, dnu } // option I
// {prs, stu, st2, tnc, st3e, st3, smc, st4, dus} // option II
// {unk, sec} // option III.
HW inputs monitoring:
configure >system>clock>domain (id)># max-frequency-deviation <value>
// value in units of 0.01 ppm in the range of 381-6096 (3.81 ppm to 60.96 ppm).
// the value configured here is effective for all HW inputs.
// the default value is 1524.
Operational mode:
Synchronization of T4 on T0:
configure >system>clock>domain (id)# [no] force-t4-as-t0 //project dependent
Note
This command causes T4 clock output to be fed by DPLL T0 and to be locked on
the same source as T0.
External commands:
configure >system>clock>domain (id)# force < source-id >
configure >system>clock>domain (id)# manual < source-id >
configure >system>clock>domain (id)# clear
Notes
• Command force never becomes inactive; even if the input is in SSF state only
clear deactivates it
• Command manual becomes inactive if the input is SSF or QL changed
• Command clear deactivates all commands; it returns to auto mode and cancels
force and manual.
System Clock: {source id} {quality} {state} // state has values: holdover, free-run
and locked.
Station-out Clock: {source id} {state} // state has values locked or unlocked
Force Switch: {InActive | Active}
Manual Switch: {InActive | Active}
configure >system>clock>domain (id)> source (src-id)# show status
Status: { ok, physical-fail, monitoring-fail, esmc-fail }
Tx quality: {ql }
Rx quality: {ql }
ESMC state: { locked | unlocked } // masked if disabled
WTR State : { Inactive | Running }
Notes
• Tx and Rx quality and ESMC state are visible only for quality enabled mode.
• ESMC state is visible only for Ethernet port type.
• Tx quality is visible only if Tx SSM is enabled for this port.
1 1
3 3
2 2
101.6 mm (4 in)
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com
www.rad.com