Cisco Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Cisco Upgrading the Cisco ONS 15454 SDH to Release 9.2.1

 

 

Retour à l'accueil, cliquez ici

Upgrading the Cisco ONS 15454 SDH to Release 9.2.1

 

Downloads

 

 

Voir également :

[TXT]

 Cisco-Telephones-IP-..> 01-Jun-2013 10:28  2.4M  

[TXT]

 Cisco-UCS-C200-Serve..> 01-Jun-2013 10:27  2.6M  

[TXT]

 Cisco-ONS-15454-DWDM..> 01-Jun-2013 10:27  4.8M  

[TXT]

 Cisco-ONS-15454-Refe..> 01-Jun-2013 10:26  3.0M  

[TXT]

 Cisco-Unified-IP-Pho..> 01-Jun-2013 08:01  2.3M  

[TXT]

 Cisco-Meraki-Cloud-C..> 01-Jun-2013 07:55  2.3M  

[TXT]

 Cisco-IPSec-Negotiat..> 01-Jun-2013 07:52  2.1M  

[TXT]

 Cisco-ASA-5500.htm      01-Jun-2013 07:45  2.1M  

[TXT]

 CiscoSecurityApplian..> 01-Jun-2013 07:35  2.0M  

[TXT]

 Cisco-Manuel-du-tele..> 03-Apr-2013 15:45  2.0M  

[TXT]

 Cisco-836-Router-and..> 03-Apr-2013 15:38  1.6M  

[TXT]

 Cisco-837-Router-and..> 03-Apr-2013 15:38  1.6M  

[TXT]

 Cisco-Manuel-du-tele..> 03-Apr-2013 15:37  1.8M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 10:04  4.1M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 09:44  3.5M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 09:40  3.0M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 09:34  2.9M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 09:29  2.7M  

[TXT]

 Cisco-ASR-9000-Serie..> 04-Sep-2012 09:24  3.7M  

[TXT]

 CiscoPrimeNetworkCon..> 04-Sep-2012 09:17  3.0M  

[TXT]

 XML-Schema-Object-Do..> 03-Sep-2012 18:55  2.1M  

[TXT]

 XML-Schema-Object-Do..> 03-Sep-2012 18:35  4.9M  

[TXT]

 Cisco-IOS-XR-XML-API..> 03-Sep-2012 18:29  4.7M  

[TXT]

 Cisco-ASR-9000-Serie..> 03-Sep-2012 17:25  5.0M  

[TXT]

 Cisco-ASR-9000-Serie..> 03-Sep-2012 17:20  5.7M  

[TXT]

 Cisco-ASR-9000-Serie..> 03-Sep-2012 17:15  5.9M  

[TXT]

 Cisco-IOS-XR-Carrier..> 03-Sep-2012 17:10  4.5M  

[TXT]

 Cisco-ASR-9000-Serie..> 03-Sep-2012 17:07  4.3M  

[TXT]

 Cisco-Introduction-t..> 03-Sep-2012 16:57  4.2M  

[TXT]

 Cisco-Security-Appli..> 03-Sep-2012 16:54  4.2M  

[TXT]

 liendocumentationcis..> 28-Jan-2012 10:29  5.2K  

[TXT]

 white_paper_c11-4621..> 28-Jan-2012 10:24   55K  

[TXT]

 cisco.htm               26-Jan-2012 17:35  1.5M  

[TXT]

 liendocumentationcis..> 26-Jan-2012 17:32  5.2K  

[TXT]

 liensdocumentationci..> 26-Jan-2012 17:31  5.0K  

[TXT]

 CiscoASA5500.htm        01-Jan-2012 22:26  3.3M  

[TXT]

 ciscoVPNClientAdmini..> 01-Jan-2012 12:56  223K  

[TXT]

 Cisco7600SeriesRoute..> 01-Jan-2012 12:51  2.7M 
Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 This document explains how to upgrade Cisco ONS 15454 SDH Cisco Transport Controller (CTC), using the advanced Timing, Communications, and Control (TCC2) or advanced Timing, Communications, and Control Plus (TCC2P),Timing Communications ControlThree (TCC3),Transport Node Controller (TNC), or Transport Shelf Controller (TSC) card. To understand the supported software upgrade paths, refer to the Software Upgrade Compatibility, on page 2. Note The TSC and TNC cards are the control cards installed on ONS 15454 M2 and ONS 15454 M6 shelves. • Software Upgrade Compatibility, page 2 • Errorless Upgrades and Exceptions, page 4 • Document Procedures, page 6 • NTP-U487 Preparing to Upgrade to a New Release, page 7 • NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, page 11 • NTP-U489 Upgrade the Cisco ONS 15454 SDH Software , page 12 • NTP-U490 Install Public-Key Security Certificate, page 22 • NTP-U491 Restore the Previous Software Load and Database, page 23 • NTP-U492 Upgrade the TCC2/TCC2P Card to the TCC3 Card, page 27 • NTP-U510 Upgrade the TSC Card to the TNC Card, page 29 • NTP-U493 Upgrade to the ONS 15454 Software Using TL1, page 30 • Related Documentation, page 36 • Obtaining Documentation and Submitting a Service Request, page 37 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 1Software Upgrade Compatibility This table describes the possible upgrade paths supported from Releases 4.1.x, 4.5.x, 4.6.x, 4.7.x, 5.0.x, 6.0.x, 6.2.x, 7.0.x, 7.2.x, 8.0.x, 8.5.x, 9.0.x, 9.1.x, 9.2 to Release 9.2.1 in the MSPP (Multiservice Provisioning Platform) platform. Releases 8.6.1, 8.5.x, 9.0.1, 9.1.0, 9.2.0, 9.2.0.3 can be upgraded to Release 9.2.1 in Cisco ONS 15454 SDH MSPP. Note Table 1: Supported Software Upgrades for the Cisco ONS 15454 SDH MSPP Release Upgrade Options 4.5.x2 , 4.6.x2 , 4.7.x2 , 5.0.x2 , 6.0.x2 , 6.2.x2 , 7.0.x2 , 7.2.x2 , 8.0.x2 , 8.5.x2 4.1x1 4.6.x2 , 4.7.x2 , 5.0.x2 , 6.0.x2 , 6.2.x2 , 7.0.x2 , 7.2.x2 4.5.x 4.7.x2 , 5.0.x2 , 6.0.x2 , 6.2.x2 , 7.0.x2 , 7.2.x2 4.6.x 5.0.x2 , 6.0.x2 , 6.2.x2 , 7.0.x2 , 7.2.x2 4.7.x 6.0.x2 , 6.2.x2 , 7.0.x2 , 7.2.x2 , 8.0.x2 , 8.5.x2 5.0.x , 9.1 6.2.x2 , 7.0.x2 , 7.2.x2 , 8.0.x2 , 8.5.x2 6.0.x 7.2.x2 , 8.0.x2 , 8.5.x2 6.2.x , 9.0.x, 9.1, 9.2 7.2.x2 , 8.0.x2 , 8.5.x2 7.0.x , 9.0.x, 9.1, 9.2, 9.2.1 5 8.0.x2 , 8.5.x2 7.2.x , 9.0.x, 9.1 9.2 8.5.x2 8.0.x , 9.0.x, 9.1, 9.2 8.5.x2 , 9.0.x4 , 9.14,5 , 9.25 8.5.x , 9.2.1 3 9.0.x 9.0.x, 9.1, 9.2, 9.2.1 9.1.x 9.1.x, 9.2, 9.2.1 9.2.0 9.2.1 6 1 Before upgrading from R4.1.x or later, make sure that the TCC2P cards are installed. 2 Support is limited because Cisco has either announced End-of-Life of the release, or the version you are upgrading to is a non-preferred release. 3 R8.5.4 and R8.6.1 can be upgraded to R9.2.1.5. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 2 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Software Upgrade Compatibility4 ForE1 payload,R8.5.4 toR9.0 orR9.1 upgrade is notsupported.Also, during an upgrade fromR8.5.4 toR9.0 orR9.1,theE1 traffic islost and can be recovered by applying and releasing terminal or facility loopback on the E1 ports that carries traffic. 5 Not supported for R8.5.1 release. 6 R7.0.4 and R 9.2.0 can be upgraded to R9.2.1.4. This table describes the possible upgrade paths supported from Releases 4.1.x, 4.5.x, 4.6.x, 4.7.x, 5.0.x, 6.0.x, 6.2.x, 7.0.x, 7.2.x, 8.0.x, 8.5.x, 9.0.x, 9.1.x, 9.2 to Releases 9.2.1 inMSTP (MultiserviceTransport Platform). Releases 8.6.1, 8.5.x, 9.0.1, 9.0.0, 9.1.0, 9.2.0, 9.2.0.2, 9.2.0.3 can be upgraded to Release 9.2.1 in CiscoONS 15454 SDH MSTP. Release 9.2.0, 9.2.0.2, and 9.2.0.3 can be upgraded to Release 9.2.1 in Cisco ONS 15454 SDH M2 and Cisco ONS 15454 M6 SDH MSTP. Table 2: Supported Software Upgrades for the Cisco ONS 15454 SDH MSTP Release Upgrade Options 4.5.x8 , 4.6.x8 , 4.7.x8 , 5.0.x8 , 6.0.x8 , 6.2.x8 , 7.0.x8 , 7.2.x8 , 8.0.x8 , 8.5.x8 4.1x7 4.6.x8 , 4.7.x8 , 5.0.x8 , 6.0.x8 , 6.2.x8 , 7.0.x8 , 7.2.x8 4.5.x 4.7.x8 , 5.0.x8 , 6.0.x8 , 6.2.x8 , 7.0.x8 , 7.2.x8 4.6.x9 5.0.x8 , 6.0.x8 , 6.2.x8 , 7.0.x8 , 7.2.x8 4.7.x 6.0.x8 , 6.2.x8 , 7.0.x8 , 7.2.x8 , 8.0.x8 , 8.5.x8 5.0.x , 9.1, 9.2 6.2.x8 , 7.0.x8 , 7.2.x8 , 8.0.x8 , 8.5.x8 6.0.x 7.2.x8 , 8.0.x8 , 8.5.x8 6.2.x , 9.0.x, 9.1, 9.2 7.2.x8 , 8.0.x8 , 8.5.x8,10 , 9.0.x10 , 9.1.x10 , 9.210 , 9.2.110,11 7.0.x 8.0.x8 , 8.5.x8 7.2.x , 9.0.x, 9.2, 9.2.1 8.5.x8 8.0.x , 9.0.x, 9.1, 9.2 8.5.x8 , 9.0.x, 9.112 , 9.212 8.5.x , 9.2.1 9.0.x 9.0.x, 9.1, 9.2, 9.2.1 9.1.x 9.1.x, 9.2, 9.2.1 9.2.x 9.2.1 7 Before upgrading from R4.1.x or later, make sure that the TCC2P cards are installed. 8 Support is limited because Cisco has either announced End-of-Life of the release, or the version you are upgrading to is a non-preferred release. 9 If a direct upgrade from R4.6.x to R8.0.0 or later is performed on ONS 15454 nodes containing TXP and MXP cards, CTC does not display the cards in card view. Therefore, when upgrading from R4.6.x to R8.0.0 and later, a step upgrade to R7.0.7 is recommended before upgrading to R8.0 and later. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 3 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Software Upgrade Compatibility10 To upgrade a multi-shelf node from R7.0.0 or R7.0.1 to R8.5.x, R9.0.x, R9.1.x, R9.2, or R9.2.1 perform a step upgrade to R8.0.0 before upgrading to the destination version. R7.0.2 through R7.0.5 can be upgraded directly to R8.5.x, R9.0.x, R9.1.x, R9.2, or R9.2.1. 11 To upgrade a multi-shelf node from R7.0.6 to R9.2.1, perform a two step upgrade to R8.00 or R8.51 and then to R9.2.1. 12 Upgrade is not supported for R8.5.1. All other 8.5.x releases are supported. Errorless Upgrades and Exceptions This section describes important information to be aware of before you begin the upgrade process: • When a node installed with GE_XP, GE_XPE, 10GE_XP, or 10GE_XPE cards configured with REP or LACP is upgraded, traffic loss may occur. This traffic loss is due to reconvergence when the cards soft reset during the upgrade process. • The MXP_MR_2.5 and MXPP_MR_2.5 cards automatically download a new field-programmable gate array (FPGA) image during an upgrade from a software release prior to R7.0 to R9.2.1.x.The upgrades forDWDMconfigurations are expected to be errorlesswith the following exceptionsif nodes are running MXP_MR_2.5 and MXPP_MR_2.5 cards: • If Y-cable protection is not provisioned, the data path incurs a traffic hit of up to 10 seconds or less. • IfY-cable protection is provisioned on cardsrunningFiber Channel (FC) payloads,traffic switches away from the card downloading the new FPGA causing the FC link to be reinitialized. • If Y-cable protection is provisioned on cards running Gigabit Ethernet (GE) payloads, there is no traffic interruption. • During R7.x and R8.x upgrades to later releases, user data channel (UDC) traffic passing through the OSC-CSM and OSCM cards incur a traffic hit for a few milliseconds. • During an upgrade from R 8.5.x, R 9.0, or R 9.1 to R 9.2.x or later releases, a loss of Gigabit Ethernet traffic of up to one second is incurred. This traffic loss occurs when auto-negotiation is disabled on the far end of the ADM-10G card. If the node has a path protection circuit, a path protection switchover occurs. To avoid this switchover during an upgrade, perform the path protection lockout procedure before upgrading the software. Note, however, this procedure does not help avoid hits in the flow of traffic. • During a revert procedure, if Gigabit Ethernet traffic is not flowing or GFP alarms are present on an ADM-10G card, hard-reset the ADM-10G card to ensure smooth traffic flow. • In R9.2.1.x, the CE-1000-4 card incurs a traffic hit of 30 seconds during activation and FPGA card upgrade. The upgraded CE-1000-4 card also incurs a traffic hit of 110 seconds if the software is subsequently reverted, because the FPGA is downgraded during the revert. When upgrading from R5.0 to R6.0 or later in enhanced card mode on nodes running an FC_MR-4 card, ahitlesssoftwareupgrade isnotpossible.Thisisbecause theFPGA mustbeupgradedtosupportdifferential delay in enhanced mode. However, the upgrade is hitless in the line rate mode. Note The following tables are define where errorless upgrades or exceptions can occur. The following table applies to nodes equipped with XC-VXC-10G cards Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 4 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Errorless Upgrades and ExceptionsCard Type Expected Traffic Effect E3 Errorless E1-42 Errorless DS31 Errorless STMn Errorless MRC-12 Errorless ML-Series Ethernet Traffic hits 3 to 8 minutes (approximately) G-Series Ethernet Errorless (except as noted) E-Series and CE-SeriesEthernet Errorless The following table applies to nodes equipped with XC-VXL-10G or XC-VXL-2.5G cards Card Type Expected Traffic Effect E3 Errorless E1-42 Errorless DS31 Errorless STMn Errorless MRC-12 Errorless ML-Series Ethernet Traffic hits 3 to 8 minutes (approximately) G-Series Ethernet Errorless (except as noted) E-Series and CE-Series Ethernet Errorless The following table applies to nodes equipped with XC10G cards. Table 3: XC10G Card Type Expected Traffic Effect E3 Errorless STM1E Errorless E1-42 Errorless Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 5 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Errorless Upgrades and ExceptionsCard Type Expected Traffic Effect STMn Errorless E-Series Ethernet Traffic hits 3 to 8 minutes (approximately) ML-Series Ethernet Traffic hits 3 to 8 minutes (approximately) G-Series Ethernet Errorless (except as noted) Document Procedures Procedures in this document must be performed in consecutive order unless noted otherwise. Ensure that the procedure is completed for each node in a given network. If you are new to upgrading the ONS 15454 SDH, make a printed copy of this document and use it as a checklist. Each non-trouble procedure (NTP) is a list of steps designed to accomplish a specific procedure. Follow the steps untilthe procedure is complete. If you need more detailed instructions, refer to the detail-level procedure (DLP) specified in the procedure steps. Throughout this guide, NTPs are referred as “procedures” and DLPs as “tasks.” Every reference to a procedure includes its NTP number, and every reference to a task includes its DLP number. The DLP (task) supplies additional task details to support the NTP. The DLP lists numbered steps that lead you through completion of a task. Some steps require that equipment indications be checked for verification. When a proper response is not obtained, a trouble clearing reference is provided. This section lists the document procedures (NTPs). Turn to a procedure for applicable tasks (DLPs). 1 NTP-U487 Preparing to Upgrade to a New Release, on page 7—This procedure contains critical information and tasks that you must read and complete before beginning the upgrade process. 2 NTP-U488 BackUp the CiscoONS15454SDHSoftwareDatabase, on page 11—Complete the database backup to ensure that you have preserved your node and network provisioning in the event that you need to restore them. 3 NTP-U489 Upgrade the Cisco ONS 15454 SDH Software , on page 12—Complete this procedure to complete the upgrade. 4 NTP-U490 Install Public-Key Security Certificate, on page 22— Complete this procedure to be able to run the ONS 15454 Software. 5 NTP-U491 Restore the Previous Software Load and Database, on page 23— Complete this procedure if you want to return to the previous software load you were running before activating the new release. 6 NTP-U493Upgrade to theONS 15454 SoftwareUsingTL1, on page 30— Complete this procedure only if you want to upgrade to a new release using Transaction Language (TL1). Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 6 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Document ProceduresNTP-U487 Preparing to Upgrade to a New Release This procedure provides critical information checks and tasks you must complete before beginning an upgrade to R9.2.1.x. Purpose Tools/Equipment Cisco ONS 15454 SDH nodes "DLP-G46Log into CTC" in the "ConnectthePC andLog into theGUI" document. Prerequisite Procedures Required/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser Procedure Step 1 Before you begin, make sure that information related to your site, for example, date, street address, site phone number, and dialup number are stored in a safe and accessible location. The data will be useful during and after the upgrade. Step 2 Read the release notes of the release you are upgrading to. Visit http://www.cisco.com/en/US/products/hw/ optical/ps2006/prod_release_notes_list.html to download the release notes. Disable APC before upgrading from R7.0.x to R8.0.x or later and enable it after the upgrade is complete. Note Step 3 Complete the task, DLP-U544 Verify CTC Workstation Requirements, on page 7. Step 4 Complete the task, DLP-U545 Verify Common Control Cards, on page 9. Step 5 When you have completed the tasks for this section, proceed with the procedure, NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11. Stop. You have completed this procedure. DLP-U544 Verify CTC Workstation Requirements This task lists PC or UNIX workstation hardware and software requirements. Perform this task before upgrading the workstation to run the software. Purpose Tools/Equipment PC or UNIX workstation Prerequisite Procedures None Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 7 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U487 Preparing to Upgrade to a New ReleaseRequired/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser Procedure Step 1 Ensure that your workstation meets the following requirements: Area Requirements Notes Pentium III/IV or a faster processor — UltraSPARC-III or faster processor for UNIX workstation Processor (PC only) RAM 384 MB/1 GB RAM or more — Minimum of 190/250 MB of — available disc space Hard drive • Releases prior to R8.5.x are not supported on Windows Vista or Windows 7 Use the latest patch or service pack released by the OS vendor. Check with the vendor for the latest patch or service pack. Note • Releases prior to R9.2.1 are not supported on Apple Mac OS X PC. CTC cannot be launched on a Mac OS-X PC using a browser. Use the CTC cache installer to launch CTC on a MAC OS-X PC. The CTC cache installer prepopulates the CTC cache with the required jar files. Either of the following: • Windows: ◦Windows 98 ◦Windows NT 4.0 ( with SP 6a) ◦Windows 2000 Professional ◦Windows Server 2003 ◦Windows Server 2008 ◦Windows XP Professional ◦Windows Vista ◦Windows 7 • UNIX workstation ◦Solaris Version 8 ◦Solaris Version 9 ◦Solaris Version 10 • Apple Mac OS X Operating System Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 8 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U544 Verify CTC Workstation RequirementsArea Requirements Notes You can check the JRE version in your browser window after entering the node IP address in the URL window under Java Version. Tip For important information about CTC backward compatibility affected by your choice of JRE version, see the Readme.txt or Readme.html file on the software CD. Note To install JRE 1.6, the Java Policy file, or the online help, see the installation instructionsin the Cisco ONS 15454 DWDM Configuration Guide. Note Java Plug-in 1.4.2 Java Plug-in 5.0 JRE 1.6 Java Plug-in 1.6 Java Policy file Java Runtime Environment Either of the following: — • Windows ◦Internet Explorer 6.x ◦Internet Explorer 7.x ◦Internet Explorer 8.x ◦Netscape 7.x • UNIX Workstation ◦Mozilla 1.7 ◦Netscape 7.x • Apple Mac OS X ◦Safari Web browser Step 2 Return to your originating procedure (NTP). DLP-U545 Verify Common Control Cards This task lists card-slot requirements of common control cards , and cross connect cards (XC-VXL-10G, XC-VXL-2.5G, XC-VXC-10G, XC10G cards ) in a node. Purpose Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 9 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U545 Verify Common Control CardsTools/Equipment PC or UNIX workstation with CTC installed Prerequisite Procedures Install the TCC2, TCC2P, TCC3, TNC, or TSC control cards. Required/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser The TCC2P card is an enhanced version of the TCC2 card and includes enhancements such as Ethernet security features and 64K composite clock BITS timing. The TCC3 card is an enhanced version of the TCC2P card and includes enhancements such as increased memory size and compact flash space. Note Note TCC2P or TCC3 cards act as TCC2 cards in releases prior to Software R6.0. Note The TNC and TSC controller cards are installed on the ONS 15454 M2 and ONS 15454 M6 shelves. TheTCC2 card fails to bootwhen it is added as a standby card to a node containing an activeTCC2P card configured in the secure mode. Caution Dense wavelength division multiplexing (DWDM) nodes need only control cards installed during the upgrade. Note Procedure Step 1 Make sure that the control cards and cross connect cards are installed in the appropriate slots on all the nodes in the network and on both the slots as indicated in the following section: • ONS 15454 SDH shelf - ◦TCC2, TCC2P or TCC3 cards are in Slots 7 and 11 ◦XC-VXL-10G, XC-VXL-2.5G, XC-VXC-10G, XC10G cards are in Slots 8 and 10 • ONS 15454 M6 shelf —TNC or TSC card in Slots 1 and 8 • ONS 15454 M2 shelf—TNC or TSC card is in Slot 1 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 10 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U545 Verify Common Control CardsStep 2 Repeat Step 1 for every node in the network. Step 3 Return to your originating procedure (NTP). NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database This procedure retains all configuration data for your network before performing the upgrade. Purpose Tools/Equipment PC or UNIX workstation • "DLP-G46Log into CTC" in the "Connect the PC andLog into the GUI" document. • NTP-U487 Preparing to Upgrade to a New Release, on page 7 Prerequisite Procedures Required/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser Note (MS-SPRing nodes only) The database must be backed up when using an MS-SPRing. Procedure Step 1 In the node view, click the Maintenance>Database tabs. Step 2 In the database pane, click the Backup button. The Database Backup dialog box is displayed. Step 3 Click Browse. Navigate to the local PC directory or network directory and type a database name using the IP address of the node to upgrade (such as database15454SDH010107.db) in the File Name field and click OK. To overwrite an existing file, click Yes. Step 4 When the backup is complete, click OK. Step 5 Repeat Steps 1 through 5 for each node in the network. Step 6 (Optional) It is recommended that you manually log critical information by either writing it down, printing screens, or by exporting the data to an appropriate format, as applicable. Use the following table to determine the information that should be logged. Information Record Data Here IP address of the node Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 11 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U488 Back Up the Cisco ONS 15454 SDH Software DatabaseInformation Record Data Here Node name Timing settings DCC13 connections—list all optical ports with active DCCs User IDs of all users, including at least one Superuser Inventory—A print screen of the Inventory window Active TCC2/TCC2P/TCC3 card Slot 7 or Slot 11 Active XC-VXL-10G, XC-VXL-2.5G, XC10G, or XC-VXC-10G Slot 8 or Slot 10 card Active TNC/TSC (Cisco ONS 15454 M6) cards Slot 1 and Slot 8 Active TNC/TSC (Cisco ONS 15454 M2) card Slot 1 Network information—Aprint screen of the Provisioning tab in the network view Current configuration (MS-SPRing, linear, etc.)— A print screen, as needed List all protection groups in the system—A print screen of the Protection group window List alarms—A print screen of the Alarm window List circuits—A print screen of the Circuit window 13 DCC=data communications channel Stop. You have completed this procedure. NTP-U489 Upgrade the Cisco ONS 15454 SDH Software This procedure upgrades the CTC software to R9.2.1.x and must be performed on all nodes, or groups of nodes to be upgraded. Purpose Tools/Equipment PC or UNIX workstation Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 12 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U489 Upgrade the Cisco ONS 15454 SDH SoftwareNTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 Prerequisite Procedures Required/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser Caution Do not perform maintenance or provisioning activities during the activation task. During a parallel upgrade,when end-to-end circuitsin anML-Seriesresilient packet ring (RPR) are present across multiple nodes, traffic resumes only after all the nodes in these circuits complete activation Note Several alarms are raised during the upgrade due to software incompatibility.However. these alarms clear after the upgrade is complete. Note Several alarms are raised on the ML-Series cards since they undergo a hard reboot during the upgrade (cold restart is rarely used). These alarms clear after the upgrade is complete. On the ML-Series port the LOA, TPTFAIL, and VCG DOWN alarms are raised. On the paths traversed by the ML-Series circuits the SD-P, SF-P, and PDI-P alarms are raised. Note During the upgrade of R8.0 or R8.5.x to a later release, if path protection circuits of type UPSR_DRI or 2waydcwas createdonanADM-10Gcard, anyexistingsoftwareprovisioningonthe cardislost.Therefore, make sure that these path protection circuit types are not present before you upgrade to a later release. Note The ADM-10G card does not support adding drops to existing Synchronous Transport Signal (STS) circuits. Therefore, when upgrading from R8.0 to a later release, delete any STS circuits with multiple drops on the ADM-10G card. Note When upgrading to R9.0 or later, the TCC2P or TCC3 cards undergo hard reboot. During this period, the standby TCC2P or TCC3 card displays the “NP” state. This is expected behavior and has no impact on the system functionality. Note Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 13 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U489 Upgrade the Cisco ONS 15454 SDH SoftwareProcedure Step 1 Insert the Cisco ONS 15454 SDH Software CD into the workstation CD-ROM drive (or otherwise acquire access to the software) to begin the upgrade process. Inserting the software CD activates the CTC Java Setup Wizard. Use the setup wizard to install the components or click Cancel to continue with the upgrade. Note Step 2 (MS-SPRing nodes only) The database must be backed up prior to locking the MS-SPRing. See NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure for details. Step 3 (MS-SPRing nodes only) Complete the DLP-U547 Perform a MS-SPRing Lockout, on page 16 task. Step 4 Complete the DLP-U546 Download the ONS 15454 SDH Software, on page 15 task for all nodes to be upgraded. Step 5 Complete the DLP-U548 Activate the New Cisco ONS 15454 SDH Software, on page 17 task for all nodes to be upgraded. Only one node can be activated at a time. During a parallel upgrade, activate another node as soon as the controller cards reboot successfully. To perform parallel upgrade remotely, wait five minutes for the controller cards to reboot completely. Note Step 6 Complete the DLP-U549 Delete Cached JAR Files, on page 20 task, as necessary. If the Cisco ONS 15454 SDH software is downloaded again after a version is activated, a revert to the previous version cannot be performed. Caution Step 7 (Optional) If you wish to ensure that a software revert to the previous software release is no longer possible, complete the DLP-U546 Download the ONS 15454 SDH Software, on page 15 task or all nodes, or groups of nodes you are upgrading a second time. Step 8 Complete the DLP-U550 Remove the MS-SPRingLockout, on page 21 task for all MS-SPRing nodes in the network. Leave the MS-SPRing in the lockout state until you have finished activating all nodes. Note Step 9 For MS-SPRing nodes only, complete the DLP-U551 Set the Date and Time, on page 22 task for nodes that are not using Simple Network Time Protocol (SNTP). Step 10 If you need to return to the software and database you had before activating Software R9.2.1.x, proceed with the NTP-U491 Restore the Previous Software Load and Database, on page 23 procedure. When you upgrade a TCC2 card to a TCC2P, the SFTWDOWN alarm can be raised and cleared more thanoncebefore the softwaredownloadis complete.For example,whenyouremove the standby TCC2 card in Slot 11 and replace it with a TCC2P card, the SFTWDOWN alarm occurs within moments of this replacement. It can briefly clear and then occur again before the alarm is finally cleared at the end of the upgrade process. Note When you upgrade a TCC2P card to a TCC3, the SFTWDOWN alarm can be raised and cleared more thanoncebefore the softwaredownloadis complete.For example,whenyouremove the standby TCC2P card in Slot 11 and replace it with a TCC3 card, the SFTWDOWN alarm occurs within moments of this replacement. It can briefly clear and then occur again before the alarm is finally cleared at the end of the upgrade process Note Step 11 To back up the Software R9.2.1.x database for the working software load, see NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure in order to preserve the database for the current release. After the upgrade is complete, the date and time in CTC is reset. Stop. You have completed this procedure. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 14 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U489 Upgrade the Cisco ONS 15454 SDH SoftwareDLP-U546 Download the ONS 15454 SDH Software This task downloads R9.2.1.x software to the ONS 15454 SDH nodes prior to activation. Purpose Tools/Equipment PC or UNIX workstation NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 Prerequisite Procedures Required/As Needed Required Onsite/Remote Onsite or remote Security Level Maintenance user or higher The TCC2/TCC2P/TCC3/TNC/TSC cardcontainsflash memorywithtwopartitions—workingandprotect (backup). An upgrade downloads the software to the protect (backup) partition of the flash memory on both the standby and active TCC2/TCC2P/TCC3/TNC/TSC cards. This download is not traffic affecting because the active software continues to run in the primary RAM location. The software can therefore be downloaded at any time. Note To download and upgrade the software usingTL1,see theNTP-U493Upgrade to theONS15454Software Using TL1, on page 30 procedure. Note Procedure Step 1 From CTC View menu, choose Go to Network View. Step 2 Make sure that the alarm filter is turned off. To do so, complete the following: a) Click the Filter tool located at the lower-left side of the window. The Alarm Filter dialog box appears. b) Click to select any check box that is not selected in the Show Severity section of the General tab. Step 3 Resolve any outstanding alarms. To view alarms for all the nodes in the network, click the Alarms tab. The SWFTDWN alarm is raised on the standby and active TCC2, TCC2P, TCC3, TNC, or TSC cards during software download. The alarms clears as soon as the download is complete. Note Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 15 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U546 Download the ONS 15454 SDH SoftwareStep 4 From the CTC View menu, choose Go to Home View to go to the node view. Step 5 Click the Maintenance> Software tabs. Step 6 Click the Download button. The Download Selection dialog box appears. Step 7 Locate the software files on the ONS 15454 SDH software CD or on your hard drive. Step 8 To open the Cisco ONS 15454 SDH folder, choose the file with the PKG extension and click Open. Step 9 From the list of compatible nodes, select the nodes where the software must be downloaded. Itisrecommendedthatsimultaneoussoftwaredownloadsonthe sectiondata communications channel (SDCC) be limited to eight nodes at a time, using the central node to complete the download. If more than eight concurrent software downloads are selected at a time, it is placed in a queue. Note Step 10 Click OK. The Download Status column monitors the progress of the download. Step 11 Return to your originating procedure (NTP). DLP-U547 Perform a MS-SPRing Lockout This task performs a MS-SPRing lockout. If you have MS-SPRing provisioned, you must perform this task before beginning the upgrade. Purpose Tools/Equipment PC or UNIX workstation NTP-U488 BackUp the CiscoONS 15454 SDHSoftwareDatabase, on page 11 Prerequisite Procedures Required/As Needed Required for MS-SPRing only Onsite/Remote Onsite or remote Security Level Maintenance user or higher (MS-SPRingnodesonly)Thedatabase mustbebackedupprior tolockingtheMS-SPRing.SeeNTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure for details. Note During the activation,MS-SPRing spans are not protected.You must leave theMS-SPRing in the lockout state until you have finished activating all nodes in the ring. Ensure that the lockout is removed after activation. Note Note To prevent ring or span switching, perform the lockout on both the east and west spans of each node. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 16 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U547 Perform a MS-SPRing LockoutProcedure Step 1 In node view, click the Maintenance tab, then click the MS-SPRing button. Step 2 For each of the MS-SPRing trunk (span) cards (STM-4, STM-16, STM-64, MRC-2.5G-12 ,MRC-12, STM64-XFP), perform the following steps: a) Next to the trunk card row, click the East Switch column to show the shortcut menu. b) From the menu options, choose Lockout Protect. c) Click the Apply button. d) In the same row, click the West Switch column to show the shortcut menu. e) From the menu options, choose Lockout Protect. f) Click the Apply button. Ignore any Default K alarms that occur on the protect VC4 time slots during this lockout period. Note Certain MS-SPRing-related alarms might be raised following activation of the first node in the ring. The followingalarms,if raised, arenormal, andshouldnot cause concern.Theyclearuponcompletion of the upgrade, after all nodes have been activated. Note • MSSP-OOSYNC (MN) • RING-MISMATCH (MJ) • APSCDFLTK (MN) • MSSP-RESYNC (NA) Step 3 Return to your originating procedure (NTP). DLP-U548 Activate the New Cisco ONS 15454 SDH Software Purpose This task activates the software on each node in the network. Tools/Equipment PC or UNIX workstation DLP-U546 Download the ONS 15454 SDH Software, on page 15 DLP-U547 Perform a MS-SPRing Lockout, on page 16 (if required) Prerequisite Procedures Required/As Needed Required Onsite/Remote Onsite or remote Security Level Superuser Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 17 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U548 Activate the New Cisco ONS 15454 SDH SoftwareIt is recommended that the first node that is activated be connected via LAN. This ensures that the new CTC JAR files download to the workstation as quickly as possible. If a node is provisioned to have no LAN access, the value is overridden in the case of node isolation. Additionally, if the node is not reachable, the LAN access is turned on. It is recommended that you avoid node isolation. Note G-Series cards (G1000-4 and G1K-4) purchased prior to R7.2 incur a traffic hit of 2 to 3 minutes per card during activation and FPGA card upgrade. When the software is reverted, the upgraded cards incur a traffic hit of 2 to 3 minutes since the FPGA is also downgraded. Caution Procedure Step 1 If CTC is not already started, start CTC. Step 2 Record the IP address of the node. The IP address can be obtained either on the LCD or on the upper left corner of the CTC window. Step 3 Make sure that the alarm filter is turned off. To do so, complete the following: a) Click the Filter tool at the lower-left side of the window. The Alarm Filter dialog box appears. b) Click to select any check box that is not selected in the Show Severity section of the General tab. Make sure that all cards that are part of a 1+1 or Y-cable protection group must be active on the working card of the protection group and no protection switches are occurring. Step 4 Ensure that traffic carrying protect cards are in a standby state. To do so, complete the following: a) In the node view, click Maintenance > Protection tabs. b) Select each protection group listed and viewthe active orstandby status of each card in theSelectedGroup area. Step 5 In shelf view, click the Maintenance > Software tabs. Step 6 Verify that the version in the Protect Version column is R9.2.1.x. Step 7 Click the Activate button. The Activate dialog box displays a warning message. Step 8 Click Yes to proceed with the activation. An Activation Successful message indicates that the software is successfully activated. Step 9 Click OK. The connection between CTC and the node is lost and CTC displays the Network view. Step 10 After activating the node, the software upgrade reboot occurs as follows: • All the common control cards (TCC2, TCC2P, TCC3, TNC, or TSC) in the node reboot beginning with the standby card.As soon as the standby card reboots, it signals the active card to reset as a standby card and the standby card transitions to active. • While the secondcommoncontrol cardreboots,the standbycross-connect cardbeginsrebooting, followed by the active cross-connect card. • The E-Series Ethernet cards reset simultaneously. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 18 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U548 Activate the New Cisco ONS 15454 SDH Software• Protect cardsin theY-cable protection group boot next,in the order thatthe protection groupwas created. • Next,the traffic cards,G-SeriesEthernet cards, CE-SeriesEthernet cards, andML-SeriesEthernet cards boot consecutively, in ascending order of slot number with the exception of E1-42 protect cards. E1-42 cards reset before any peer working cards.. • The SYSBOOT alarm is raised as soon as the common control cards and cross-connect card reset. This alarm clears when all the cards reset. The activation process can take up to 30 minutes, depending on the number of cards installed in the node. After the common control cards finish resetting and all associated alarms clear, you can safely proceed to the next step. (If you are upgrading remotely and cannot see the nodes, wait for 5 minutes for the process to complete, then check to ensure that related alarms have cleared before proceeding.) During the software upgrade, a reset alarm is raised on all the cards. When upgrading from Release 6.0, 6.1, 6.2, 6.2.x, 7.0, 7.0.x, 7.2, or 7.2.x to 8.0, a MANRESET alarm is raised on standby TCC cards and anAUTORESETalarm in allthe other cards.However, from R8.0,theMANRESETalarm is not raised and the AUTORESET alarm is raised on all the cards. Note Step 11 In CTC, choose File > Exit. Step 12 Start CTC again. Step 13 Click the Setting button in the CTC launcher window. The CTC launcher settings dialog box appears. Step 14 Click the Delete Cache button in the Cache tab. A warning message is displayed. Step 15 Click Yes to proceed with the cache deletion. Step 16 Click OK to close the CTC launcher settings dialog box. Step 17 (Optional) Run the CacheLoader pre-caching utility.This logs you into CTC at a faster pace after an upgrade. However, you must log into nodes running releases prior to Software R4.6. If you do not plan to run the pre-caching utility, it is recommended that the first node you activate be a LAN-connected node. This ensures that the new CTC JAR files download to your workstation as quickly as possible. Note Perform the following steps to run the Cache Loader. a) Load the Software CD into your CD-ROM drive. If the directory of the CD does not open automatically, open it. b) Double-click the setup.exe file to run the Installation Wizard. The CTC Installation Wizard dialog box appears. c) Click the Next button. The Setup Options dialog box appears. d) Choose Custom, and click the Next button. The Custom Options dialog box appears. e) Click to select Cisco Transport Controller, and CTC JAR files (deselect any other preselected options) and click the Next button. A confirmation dialog box appears. f) Click the Next button again. The CTC Cache Loader pre-caches the JAR files to your workstation, displaying a progress status box. g) When the utility finishes, click OK, and in the wizard, click Finish. Step 18 Click the Launch CTC button. The new CTC applet loads. The login window is displayed. Step 19 Type the user name and password and click Login. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 19 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U548 Activate the New Cisco ONS 15454 SDH SoftwareCompleteSteps 11 through 19 only after upgrading the first node in a network.Thisis because cached files must be removed from your workstation only once. For the remaining nodes, you will still be disconnected and moved to the network view during the node reboot. After the reboot is complete, CTC restores connectivity to the node. Note Step 20 Return to your originating procedure (NTP). DLP-U549 Delete Cached JAR Files Purpose This task deletes cached JAR files. Tools/Equipment PC or UNIX workstation Prerequisite Procedures None Required/As Needed You need to complete this task after you activate the first network node. Onsite/Remote Onsite or remote Security Level Maintenance user or higher Whenever the CTC software is upgraded or reverted, make sure that the browser and hard drive cache files are cleared. Note Procedure Step 1 Delete cached files from your browser directory. In Netscape: a) Select Edit > Preferences. Click the Advanced tab and click the Cache button. b) Click the Clear Memory Cache button, and click OK. c) Click the Clear Disk Cache button, and click OK twice. In Microsoft Internet Explorer: a) Select Tools > Internet Options. The Internet Options dialog box appears. b) Click the General tab, and then click the Delete Files button. c) Select the Delete all offline content check box. d) Click OK twice. Step 2 Close the browser. Cached JAR files cannot be deleted from the hard drive untilthe browser is closed.Other applications that use JAR files must also be closed. Note Step 3 On Windows systems, delete cached files from your workstation in this location: Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 20 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U549 Delete Cached JAR FilesC:\Documents and Settings\username\Application Data\Cisco\CTC Step 4 Reopen the browser. You should now be able to connect to CTC. Step 5 Return to your originating procedure (NTP). DLP-U550 Remove the MS-SPRing Lockout Thistaskremoves aMS-SPRinglockout. Release the span lockouts on all MS-SPRing nodes after the new software load is activated on all nodes. Purpose Tools/Equipment PC or UNIX workstation DLP-U548Activate theNewCiscoONS15454SDH Software, on page 17 Prerequisite Procedures Required/As Needed Required for MS-SPRing Onsite/Remote Onsite or remote Security Level Maintenance Procedure Step 1 In CTC node view, click the Maintenance tab, then click the MS-SPRing button. Step 2 For each of the MS-SPRing trunk (span) cards (STM-4, STM-16, STM-64, ,MRC-2.5G-12 ,MRC-12, STM64-XFP), perform the following steps: a) Next to the trunk card row, click the West Switch column to show the shortcut menu. b) From the shortcut menu, click Clear. When removing a lockout, be sure to apply your changes each time you choose the Clear option. If you try to select Clear for more than one lockout at a time, you risk traffic loss on the first ring switch. Note c) In the same row, click the East Switch column to show the shortcut menu. d) From the shortcut menu, click Clear. Step 3 Repeat this task as many times as necessary to remove all MS-SPRing span lockouts on the upgrade nodes. Step 4 Return to your originating procedure (NTP). Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 21 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U550 Remove the MS-SPRing LockoutDLP-U551 Set the Date and Time This task sets the date and time. If you are not using SNTP, the upgrade procedure can cause theDate/Time setting to change.Perform thistask to reset the date and time at each node. Purpose Tools/Equipment PC or UNIX workstation Prerequisite Procedures None Required/As Needed As needed Onsite/Remote Onsite or remote Security Level Superuser Note If you are using SNTP, this task is not applicable. Procedure Step 1 In CTC node view, click the Provisioning > General tabs. Step 2 Set the correct date and time. Click Apply . Step 3 Repeat Steps 1 and 2 on all the remaining nodes. Step 4 Return to your originating procedure (NTP). NTP-U490 Install Public-Key Security Certificate This procedure installs the ITU Recommendation X.509 public-key security certificate.The public-key certificate is required to run Software R4.1 or later. Purpose Tools/Equipment None Thisprocedure isperformedwhenlogginginto CTC. You cannot perform it at any other time. Prerequisite Procedures This procedure is required to run ONS 15454 Software R4.1 or later. Required/As Needed Onsite/Remote Onsite or remote Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 22 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U551 Set the Date and TimeSecurity Level Provisioning or higher Procedure Step 1 Log into CTC. Step 2 If the Java Plug-in Security Warning dialog box appears, choose one of the following options: • Grant This Session—Installs the public-key certificate on the PC only for the current session. After the session ends, the certificate is deleted. This dialog box appears at the next login into ONS 15454 SDH. • Deny—Denies permission to install the certificate. If this option is chosen, login into the ONS 15454 SDH. is denied. • Grant always—Installs the public-key certificate and does not delete it after the session is over. It is recommended to use this option. • View Certificate—The public-key security certificate is displayed. After the completion of the security certificate dialog boxes, the web browser displays information about the Java and system environments. If this is the first login, a CTC downloading message appears while CTC files are downloaded to the computer.The process can take several minutes,if itisthe firsttime.After the download, the CTC Login dialog box appears. Step 3 Returntothe software anddatabaseyouhadbefore activatingthe9.2.1.xsoftware,proceedwiththeNTP-U491 Restore the Previous Software Load and Database, on page 23 procedure. Stop. You have completed this procedure. NTP-U491 Restore the Previous Software Load and Database This procedure returnsto the software and database provisioning thatwas present before 9.2.1.x was activated. The software load and database cannot be restored to the previous version if the software on both the working and protect cards were upgraded to 9.2.1.x. Purpose Tools/Equipment PC or UNIX workstation "DLP-G46 Log into CTC" in the "Connect the PC and Log into the GUI" document. NTP-U487 Preparing to Upgrade to a New Release, on page 7 NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 NTP-U489 Upgrade the Cisco ONS 15454 SDH Software , on page 12 PrerequisiteProcedures Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 23 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U491 Restore the Previous Software Load and DatabaseRequired/As Needed As needed Onsite/Remote Onsite or remote Security Level Superuser Tasks to revert to a previous load are not part of the upgrade, and are provided here as a convenience to those wishing to perform a revert after an upgrade. If you have successfully performed all necessary procedures up to this point, you have finished the software upgrade. Note If a node is set to secure, dual-IP mode, the database information is overwritten with this configuration and cannot be reverted to single-IP repeater mode. Caution The defaults database files (db files) used to restore the basic configuration on a single non-multishelf node are shipped along with the standard 9.2.1.x software release package. For a multishelf set-up, the multishelf configuration must be unprovisioned to restore the basic configuration using the defaults database file.Also,the database backup from a multishelfsystem can be used to restore the same multishelf system. Note Procedure Step 1 (MS-SPRing nodes only) The database must be backed up prior to locking the MS-SPRing. See NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure for details. Step 2 (MS-SPRing nodes only) Complete the DLP-U547 Perform a MS-SPRing Lockout, on page 16 task. Step 3 Complete the DLP-U552 Revert to Protect Load, on page 24 task. Step 4 (MS-SPRing nodes only) Complete the DLP-U550 Remove the MS-SPRing Lockout, on page 21 task. Step 5 If the software revertto your previous release failed to restore the database, complete theDLP-U553Manually Restore the Database, on page 26 task. Stop. You have completed this procedure. DLP-U552 Revert to Protect Load This task reverts to the software you were running prior to the last activation. You cannot revert backwardsto a previous version of the protect load if the software on both the working and protect sides is Software R9.2.1.x. Purpose Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 24 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U552 Revert to Protect LoadTools/Equipment PC or UNIX workstation NTP-U487 Preparing to Upgrade to a New Release, on page 7 NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 NTP-U489 Upgrade the Cisco ONS 15454 SDH Software , on page 12 DLP-U547 Perform a MS-SPRing Lockout, on page 16 Prerequisite Procedures Required/As Needed Required for revert Onsite/Remote Onsite or remote Security Level Superuser To perform a supported (non-service-affecting) revert from 9.2.1.x, the release you want to revert to must havebeenworkingatthe timeyouactivatedtothe currentsoftwareversiononthatnode.Also, a supported revert automatically restores the node configuration at the time of the previous activation. The exception to this is when you have downloaded 9.2.1.x a second time, ensuring that no revert to a previous load can take place. In this case, the revert occurs, but is not traffic-affecting and does not change the database. Note Ensure that all cards that are part of a protection group (1+1 or Y-cable) are active on the working card of that protection group and that no protection switches are occurring. To ensure that traffic carrying protect cards are in a standby state, in the node view click the Maintenance tab, and view the Protect column for each of the listed protection groups. View the active/standby status of each card in the Maintenance tab. Note Procedure Step 1 From the node view, click the Maintenance tab, then click the Software button. Step 2 Verify that the protect software displays the release you upgraded from. Step 3 Click the Revert button. Revert activates the protect software and restores the database from the previous load. A dialog box asks you to confirm the choice. Any FPGA downgrades during the revert process may affect traffic. Configuration changes made after activation are lost when you revert. Note Step 4 Click OK. This begins the revert process and drops the connection to the node. Step 5 Wait until the software revert completes before continuing. The system reboot may take up to 30 minutes to complete. Note Step 6 Wait one minute before reverting another node. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 25 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U552 Revert to Protect LoadStep 7 After reverting all the nodes in the network, restart the browser and log back into the last node that was reverted. This uploads the appropriate CTC applet to your workstation. Step 8 Perform the DLP-U549 Delete Cached JAR Files, on page 20 task. Step 9 Return to your originating procedure (NTP). DLP-U553 Manually Restore the Database This task manually restores the database. Use this task if you were unable to perform a revert successfully and need to restore the database. Purpose Tools/Equipment PC or UNIX workstation DLP-U552 Revert to Protect Load, on page 24 DLP-U550 Remove the MS-SPRing Lockout, on page 21 (if required) Prerequisite Procedures Required/As Needed As needed Onsite/Remote Onsite or remote Security Level Superuser Caution Do not perform these steps unless the software revert failed. Caution This process is service affecting and should be performed during a maintenance window. Procedure Step 1 In CTC node view, click the Maintenance tab, then click the Database button. Step 2 Click the Restore button. The Open dialog box appears. Step 3 Select the previously saved database file and click the Open button. The database is restored and the TCC2/TCC2P/TCC3/TNC/TSC cards reboot. Step 4 When the TCC2/TCC2P/TCC3/TNC/TSC cards have finished rebooting, log into CTC and verify that the database is restored. Wait one minute before restoring the next node. Step 5 Repeat Steps 1 to 4 for each node in the network. You have now completed the manual database restore. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 26 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 DLP-U553 Manually Restore the DatabaseWhen the complete database is restored, the node does not report an event regarding the IP change; the node reboots and configures the new IP from the database. If the IP address being restored is not in the CTC network IP addressing scheme, you might lose visibility of the node.To resolve this, you must launch CTC with the IP mentioned in the table against the database backup. Refer to the table, “Manually RecordedData” intheNTP-U488 BackUpthe CiscoONS15454SDHSoftwareDatabase, on page 11 procedure for more information. Note Step 6 Return to your originating procedure (NTP). NTP-U492 Upgrade the TCC2/TCC2P Card to the TCC3 Card This procedure upgrades the TCC2/TCC2P card to theTCC3 card.TheTCC3 card supportsONS15454 SDHR9.2.1.x.TheTCC2/TCC2Pcardis compatible with ONS 15454 SDH , as well as earlier software versions. Purpose Tools/Equipment Two TCC3 cards Prerequisite Procedures None Required/As Needed As needed Onsite/Remote Onsite Security Level Maintenance or higher Downgradeproceduresfrom TCC3cardstoTCC2P/TCC2cards arenotsupported.LogintotheTechnical Support Website at http://www.cisco.com/cisco/web/support/index.html for more information or call Cisco TAC (1 800 553-2447). Note Procedure Step 1 Log into CTC. For detailed instructions, refer to the Cisco ONS 15454 SDH Procedure Guide. Step 2 VerifythattheLANwiresonthebackplane are installedproperly.TheTCC3carddoesnot autodetect miswired LANconnections. If aLANconnection is miswired, aLANConnectionPolarity Reversed condition appears. For information on installing LAN wires, refer to the Cisco ONS 15454 SDH Procedure Guide. Step 3 Verify that the node you are upgrading has ONS 15454 SDH R9.2.1.x installed. The software version is displayed in the upper left corner of the window. Step 4 Complete the NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure before beginning the upgrade. Step 5 Physically replace the standby TCC2/TCC2P card on the ONS 15454 SDH with a TCC3 card. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 27 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U492 Upgrade the TCC2/TCC2P Card to the TCC3 Carda) Check the LED on the faceplate. The ACT/STBY LED on the faceplate of the TCC2/TCC2P/TCC3 card indicateswhether the card is in active or standby mode.AgreenACT/STBYLEDindicates an active card and an amber light indicates a standby card. b) Open the standby TCC2/TCC2P card ejectors. c) Slide the card out of the slot. This raises the IMPROPRMVL alarm, which clears when the upgrade is complete. d) Open the ejectors on the TCC3 card to be installed. e) Slide the TCC3 card into the slot along the guide rails. f) Close the ejectors. g) In CTC node view, Ldg (loading) appears on the newly installed TCC3. The MEA (card mismatch) alarm appears because CTC recognizes a mismatch between TCC card types. Disregard this alarm; it clears by the end of the procedure. Note It takes approximately 10 minutes for the active TCC2/TCC2P card to copy the system software and database to the newly installed TCC3 card. During this operation, the LEDs on the TCC3 card flash Fail and then the active/standby LED flashes. When the transfer completes, the TCC3 card reboots and goes into standby mode after approximately three minutes. Do not remove the card from the shelf during a database transfer. Note If your active TCC2/TCC2P card resets during the upgrade before the new TCC3 card is in full standby mode, remove the new TCC3 card immediately. Caution Step 6 When the newly installed TCC3 card is in standby, right-click the active TCC2/TCC2P card in CTC. Step 7 From the pull-down menu, click Reset Card. Wait for the TCC2/TCC2P card to reboot. The ONS 15454 SDH switches the standby TCC3 card to active mode. The TCC2/TCC2P card verifies that it has the same database as the TCC3 card and then switches to standby. Step 8 Verifythatthe remainingTCC2/TCC2Pcardisnowinstandby mode (theACT/STBYLEDchangestoamber). Step 9 Physically replace the remaining TCC2/TCC2P card with the second TCC3 card. a) Open the TCC2/TCC2P card ejectors. b) Slide the card out of the slot. This raises the IMPROPRMVL alarm, which clears when the upgrade is complete. c) Open the ejectors on the TCC3 card. d) Slide the TCC3 card into the slot along the guide rails. e) Close the ejectors. When a newly installed TCC3 card has a different version of the ONS 15454 SDH software installed from the version running on the activeTCC3 card,the newly installedTCC3 card automatically copies the software version running on the activeTCC3 card.You do not need to do anything in this situation. However,loading theTCC3 card does not boot up in the normal manner. When the card isfirstinserted, the red FAIL LED stays on for a short period. The FAIL LED then blinks normally and all LEDs go dark.After loadingthenewsoftware for approximately10 minutes,theTCC3cardbecomesthe standby card and the amber LED is illuminated. Tip Step 10 If power-related alarms occur after the second TCC3 card is installed, check the voltage on the backplane. Refer to the Cisco ONS 15454 SDH Troubleshooting Guide for information on clearing alarms. Stop. You have completed this procedure. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 28 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U492 Upgrade the TCC2/TCC2P Card to the TCC3 CardNTP-U510 Upgrade the TSC Card to the TNC Card This procedure upgrades the TSC card to the TNC card on the Cisco ONS 15454 M6 shelf. Purpose Tools/Equipment Two TNC cards "DLP-G46 Log into CTC" in the "Connect the PC and Log into the GUI" document. Prerequisite Procedures Required/As Needed As needed Onsite/Remote Onsite Security Level Maintenance or higher Procedure Step 1 Verify that the LAN wires on the RJ-45 LAN port are installed properly. The TNC card does not autodetect miswiredLANconnections. If aLANconnection is miswired, aLANConnectionPolarity Reversed condition appears. For information on installing LAN wires, refer to the Cisco ONS 15454 Procedure Guide. Step 2 Verify that the node you are upgrading has ONS 15454 M6 Software installed. The software version is displayed in the upper left corner of the window. Step 3 Complete the NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 procedure before beginning the upgrade. Step 4 Physically replace the standby TSC card with a TNC card. a) Check the LED on the faceplate. The ACT/STBY LED on the faceplate of the TNC/TSC card indicates whether the card is in active or standby mode. A green ACT/STBY LED indicates an active card and an amber light indicates a standby card. b) Open the ejectors on the standby TSC card. c) Slide the card out of the slot. This raises the IMPROPRMVL alarm, which clears when the upgrade is complete. d) Right-click the slot from which the TSC card was ejected out. e) Click Delete Card to delete TSC from CTC. If the TSC card is not deleted from the CTC shelf view before inserting the TNC card, the MEA (card mismatch) alarm appears on that slot. Note f) Open the ejectors on the TNC card to be installed. g) Slide the TNC card into the slot along the guide rails. h) Close the ejectors. i) In CTC node view, Ldg (loading) appears on the newly installed TNC card. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 29 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U510 Upgrade the TSC Card to the TNC CardIt takes approximately 10 minutes for the active TSC card to copy the system software and database to the newly installed TNC card. During this operation, the LEDs on the TNC card flash Fail and then the active/standby LED flashes. When the transfer completes, the TNC card reboots and goes into standby mode after approximately three minutes. Do not remove the card from the shelf during a database transfer. Note Ifyour activeTSC cardresetsduringtheupgradebefore thenewTNC cardisinfullstandby mode, remove the new TNC card immediately. Caution Step 5 When the newly installed TNC card is in standby, right-click the active TSC card in CTC. Step 6 From the pull-down menu, click Reset Card. Wait for the TSC card to reboot. The standby TNC card is switched to active mode. The TSC card verifies that it has the same database as the TNC card and then switches to standby. Step 7 Verify that the remaining TSC card is now in standby mode (the ACT/STBY LED changes to amber). Step 8 Physically replace the remaining TSC card with the second TNC card. a) Open the ejectors on the TSC card. b) Slide the card out of the slot. This raises the IMPROPRMVL alarm, which clears when the upgrade is complete. c) Right-click the slot from which the TSC card was ejected out. d) Click Delete Card to delete TSC from CTC. If the TSC card is not deleted from the CTC shelf view before inserting the TNC card, the MEA (card mismatch) alarm appears on that slot. e) Open the ejectors on the TNC card. f) Slide the TNC card into the slot along the guide rails. g) Close the ejectors. The second TNC card boots up. The second TNC card must also copy the database. Do not remove the card from the shelf during a database transfer. Step 9 If power-related alarms occur after the second TNC card is installed, check the voltage on the RJ-45 LAN port. Refer to the Cisco ONS 15454 Troubleshooting Guide for information on clearing the alarms. Stop. You have completed this procedure. NTP-U493 Upgrade to the ONS 15454 Software Using TL1 This procedure upgrades the ONS 15454 SDH software to R9.2.1.x using TL1 rather than CTC. Purpose Tools/Equipment PC or UNIX workstation NTP-U487 Preparing to Upgrade to a New Release, on page 7 NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 Prerequisite Procedures Required/As Needed Optional Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 30 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1Onsite/Remote Onsite or remote Security Level Superuser This procedure assumes you are upgrading using TL1 Release 6.x and later. TL1 commands used prior to activation to Release 6.x vary in syntax depending on the ONS 15454 release that you are actually upgrading from. To ensure that your syntax for each command is correct, see the TL1 syntax in the Cisco ONSSDH15454TL1 CommandGuide foryourparticular releasewhenissuingthe followingcommands: Note • ACT-USER • COPY-RFILE • REPT EVT FXFR • OPR-PROTNSW- • RTRV-COND-ALL • RTRV-ALM-ALL • RLS-PROTNSW- To download the software usingTL1, an FTP server or a terminal emulation program likeHyperTerminal must be running on the workstation. Note The download (COPY-RFILE) command is different when downloading software to a gateway network element (GNE) or an end network element (ENE) under the following conditions: Note • FTP is being used. • Server is set up with a login and password of FTPUSER1 and FTPUSERPASSWORD1. • FTP server has an IP address of 10.1.1.1. • FTP server is running on the standard FTP port. • Software package is called "15454SDH-0xxx-xxxx-xxxx.pkg". When upgrading from R8.0 and later, if the path protection circuits of type UPSR_DRI or 2waydc is created on the ADM-10G card, software provisioning is lost. Ensure that there are no path protection circuits of typeUPSR_DRI or 2waydc created on theADM-10Gcard before upgrading to the latest release. Note The GNE and ENE commands are as follows: • When downloading software to a GNE, use a command similar to: Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 31 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1COPY-RFILE:NODENAME:RFILE-PKG:CTAG::TYPE=SWDL, SRC=“ftp://FTPUSER1:FTPUSERPASSWORD1@10.1.1.1/15454-03xx-A04K-1405.pkg”; • When downloading software to an ENE, use a command similar to: COPY-RFILE:NODENAME:RFILE-PKG:CTAG::TYPE=SWDL, SRC=“ftp://FTPUSER1:FTPUSERPASSWORD1@10.111.11.1:2361@90.90.90.90/15454-03xx-A04K-1405.pkg”; The ":2361" after the FTP server IP address 10.111.11.1 denotes port 21 on the server. The software PKG file in the preceding example is located in the home directory of the FTP server. If the software PKG file is not in the home directory on the FTP server, insert the directory path where the software PKG resides between the last IP address and the PKG file in the command line. An example is shown here. COPY-RFILE:NODENAME:RFILE-PKG:CTAG::TYPE=SWDL, SRC=“ftp://FTPUSER1:FTPUSERPASSWORD1@10.1.1.1:21@90.90.90.90/CISCO/SOFTWARE/15454-03xx-A04K-1405.pkg”; Procedure Step 1 To use TL1 commands, set up an FTP session or use HyperTerminal or a similar terminal emulation package to establish a session with the ONS 15454 SDH node. Step 2 Type the IP address for the node, using port 3083 or 2361. The terminal emulation interface displays a warning message and a command prompt (usually >). You can enter TL1 commands at this prompt. Step 3 Type the ACT-USER (Activate User) command in the TL1 request window to open a TL1 session: ACT-USER:[]::::; where: • is the target identifier (optional). • is the Operation Support System (OSS) profile user ID (required). • is the correlation tag that correlates command and response messages (required). • is the password identifier (required). For example, in the TL1 command: ACT-USER::CISCO99:100::PASSWORD; ACT-USER is the activation command, CISCO99 is the user ID, 100 is the correlation tag (used to correlate commands to command responses), and PASSWORDis the password associatedwith the user ID. A response message containing the CTAG that you specified indicates the completion status of the command. Step 4 Repeat Step 2 for each node to be upgraded. Step 5 Select the IP address for the node, using port 3083 or 2361. Step 6 Type the COPY-RFILE command in the TL1 window or, if you are using HyperTerminal, click Transfer > Receive File, and use the associated dialog box to select a file to receive. The COPY-RFILE command downloads a newsoftware package from the location specified by theFTPURLinto the inactive flash partition residing on the controller card. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 32 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1COPY-RFILE:[]::::TYPE=,[SRC=],[DEST=],[OVWRT=],[FTTD=]; where: • is the target identifier (optional). • is the source AID (required). • is the correlation tag that correlates command and response messages (required). • is the file transfer protocol (required). • specifies the source of the file to be transferred (required). • is the destination of the file to be transferred (required). • is overwrite. If is yes, then files should be overwritten. If is no, then file transfers will fail if the file already exists at the destination (required). • is the URL format (required). Step 7 Repeat Step 6 for all nodes to be upgraded. Step 8 Look for the REPT EVT FXFR message in the TL1 window. REPT EVT FXFR is an autonomous message used to report the start, completion, and completed percentage status of the software download. REPT EVT FXFR also reports any failure during the software upgrade, including invalid package, invalid path, invalid user ID/password, and loss of network connection. The format of the message is: REPT EVT FXFR SID DATE TIME A ATAG REPT EVT FXFR ",,[],[]" ; where: • indicates the transferred file path name and is a string. • indicates the file transferred status: Start, IP (in progress), or COMPLD. • indicates the file transferred result: success or failure. FXFR_RSLT is optional (the FXFR_RSLT is only sent when the FXFR_STATUS is COMPLD). • indicates the percentage transfer complete and is optional (the BYTES_XFRD is only sent when the FXFR_STATUS is IP or COMPLD). Step 9 Complete “NTP-U487 Preparing to Upgrade to a New Release, on page 7” procedure on page 8 for each node to be upgraded. Step 10 Complete NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 for each node to be upgraded. Step 11 Lock each MS-SPRing span on all the nodes being upgraded using the following command: OPR-PROTNSW-:[]::::,[][:]; where: • is the target identifier (optional). Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 33 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1• is the Access IDentifier that indicates the facility in the node to which the switch request is directed. • is the correlation tag that correlates command and response messages (optional). • is the switch command that is to be initiated on the paths. • is the MS-SPRing switch type. • is the direction of transmission in which switching is to be made and is relative to the SDH line or path identified by the AID. The default value is RCV and should be changed to BTH. Some nodes might have more than one MS-SPRing. If this is the case, all MS-SPRing spans on all nodes being upgraded must be locked.Nodes that are not being upgraded do not requireMS-SPRing spanslockouts.You must be aware of each span thatis part of aMS-SPRing to make sure all necessary spans are locked. Note Note Ignore anyDefaultKalarmsthatoccurontheprotectVC time slotsduringthe lockout. SomeMS-SPRing-related alarms may be raised following activation of the first node in the ring.The following alarms, if raised, are normal, and should not cause concern. They clear upon completion of theupgrade, after allnodeshavebeenactivated:MS-SPRing-OOSYNC (MN); RING-MISMATCH (MJ); APSCDFLTK (MN); MS-SPRing-RESYNC (NA). Note Step 12 Verify that all necessary MS-SPRing spans on each node being upgraded have been locked out using the following command: RTRV-PROTNSW-:[]::[::::]; where: • is the target identifier (optional) • isthe accessidentifier thatindicatesthe facility in the node towhich the switch requestis directed (must not be null) (required). • is the correlation tag that correlates command and response messages (optional). Step 13 Verify that there are no outstanding alarms or conditions on each node using the following commands: RTRV-PROTNSW-:[]::[::::]; where: • is the target identifier (optional) • isthe accessidentifier thatindicatesthe facility in the node towhich the switch requestis directed (must not be null) (required). • is the type of condition to be retrieved. A null value is equivalent to ALL. RTRV-ALM-ALL:[]:[]:::[],[],[][,,,]; where: • is the target identifier • is the Access IDentifier that indicates the facility in the node to which the switch request is directed (must not be null). • is the correlation tag that correlates command and response messages (optional). • is a notification code. A null value is equivalent to ALL. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 34 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1• is the type of alarm condition. A null value is equivalent to ALL. • is the effect on service caused by the alarm condition. A null value is equivalent to ALL. Resolve all issues before proceeding. You can activate only one node at a time. However, in a parallel upgrade you can begin activation of the next node as soon as the controller cards for the current node have rebooted successfully. If youwish to perform a parallel upgrade remotely,wait five minutesfor the controller cardsto complete the reboot. Note Step 14 Starting at the node farthest from the GNE, type the APPLY command to activate the system software. APPLY:[]::[::]; where: • is the target identifier (optional). • is the correlation tag that correlates command and response messages. • indicates a memory switch action during the software upgrade.MEM_SW_TYPE is ACT for activate. MEM_SW_TYPE is CANC to cancel the activation. If the command is successful, the appropriate flash is selected and the TCC2/TCC2P/TCC3/TNC/TSC card reboots. The following occurs: • Each card in the node reboots, beginning with the standby TCC2/TCC2P/TCC3/TNC/TSC card. When the standby TCC2/TCC2P/TCC3/TNC/TSC card reboots, it signals to the active TCC2/TCC2P/TCC3/TNC/TSC card that it is ready to take over. When the active TCC2/TCC2P/TCC3/TNC/TSC receives this signal, it resets itself, and the standby TCC2/TCC2P/TCC3/TNC/TSC takes over and transitions to active. The pre-upgrade version of the TCC2/TCC2P/TCC3/TNC/TSC card is now the standby TCC2/TCC2P/TCC3/TNC/TSC. • While the second TCC2/TCC2P/TCC3/TNC/TSC is rebooting, the stand by cross-connect card (SONET/SDH only) reboots, and then the active cross-connect card (SONET only) reboots. • Next, the E-Series Ethernet cards reset simultaneously. • Any cards in Y-cable protection groups boot next, one at a time (protect card first), in order of first creation (refer to the CTC protection group list for order of first creation). • Next,the traffic cards,G-SeriesEthernet cards, CE-SeriesEthernet cards, andML-SeriesEthernet cards boot consecutively, in ascending order of slot number, first standby, then working, for each card pair, with the exception that E1-42 protect cards will always be reset before any of their peer working cards. • A system reboot (SYSBOOT) alarm is raised while activation is in progress (following the TCC2/TCC2P/TCC3/TNC/TSC and cross-connect card resets). When all cards have reset, this alarm clears. The complete activation process can take up to 30 minutes, depending on how many cards are installed. After the common control cards finish resetting and all associated alarms clear, you can safely proceed to the next step. (If you are upgrading remotely and cannot see the nodes, wait for 5 minutes for the process to complete, then check to ensure that related alarms have cleared before proceeding.) Repeat this step for each node thatwill be upgraded, moving from the furthest node from theGNEtoward theGNEitself,which should be activated last. Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 35 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 NTP-U493 Upgrade to the ONS 15454 Software Using TL1You might have to log in to each node again to activate the software. Note Step 15 After all nodes have been activated, log in using CTC or Telnet and verify there are no outstanding alarms. Step 16 Remove all MS-SPRing lockouts using the following TL1 command: RLS-PROTNSW-:[]::[::]; where: • is the target identifier (optional) • isthe accessidentifier thatindicatesthe facility in the node towhich the switch requestis directed (must not be null) (required). • is the correlation tag that correlates command and response messages (optional). • is the direction of transmission (transmit or receive). The possible values are: ◦RCV—Receive direction only (default) ◦TRMT—Transmit direction only ◦BTH—Both transmit and receive directions For example: RLS-PROTNSW-OC48:PETALUMA:FAC-6-1:209::BTH; Step 17 To back up the database for the working software load, see NTP-U488 Back Up the Cisco ONS 15454 SDH Software Database, on page 11 in order to preserve the database for the current software. Stop. You have completed this procedure. Related Documentation Use this document in conjunction with the following publications: • Release notes: http://www.cisco.com/en/US/products/hw/optical/ps2006/prod_release_notes_list.html • TL1 command guides: http://www.cisco.com/en/US/products/hw/optical/ps2006/prod_command_reference_list.html • Reference guides: http://www.cisco.com/en/US/products/hw/optical/ps2006/prod_technical_reference_list.html • Procedure guides: http://www.cisco.com/en/US/products/hw/optical/ps2006/prod_installation_guides_list.html • Configuration guides: http://www.cisco.com/en/US/products/hw/optical/ps2006/products_installation_and_configuration_ guides_list.html • Troubleshooting guides: Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 36 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Related Documentationhttp://www.cisco.com/en/US/products/hw/optical/ps2006/prod_troubleshooting_guides_list.html Obtaining Documentation and Submitting a Service Request For informationonobtainingdocumentation,submittinga service request, andgatheringadditionalinformation, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 OL-23756-01 37 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Obtaining Documentation and Submitting a Service Request Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 38 OL-23756-01 Upgrading the Cisco ONS 15454 SDH to Release 9.2.1 Obtaining Documentation and Submitting a Service Request Cisco Small Business Pro Téléphones IP SPA 500 Modèles 501G, 502G, 504G, 508G et 509G GUIDE DE L'UTILISATEUR Cisco Small Business Pro Téléphones IP SPA 500 Modèles 501G, 502G, 504G, 508G et 509G© 2011 Cisco Systems, Inc. Tous droits réservés. OL-24293-01 Cisco et le logo Cisco sont des marques déposées de Cisco Systems, Inc. et/ou de ses filiales aux États-Unis et dans d'autres pays. Vous trouverez une liste des marques commerciales de Cisco sur la page Web www.cisco.com/go/trademarks. Les autres marques commerciales mentionnées dans les présentes sont la propriété de leurs détenteurs respectifs. L'utilisation du terme « partenaire » n'implique pas de relation de partenariat entre Cisco et toute autre entreprise. (1005R)Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 3 Table des matières Chapitre 1 : Pour commencer 8 À propos de ce document 8 Présentation des téléphones IP Cisco Small Business Pro 10 Présentation des lignes et des boutons du téléphone 11 Composants du téléphone 11 Boutons de fonction 14 Utilisation des raccourcis clavier 17 Console de réception Cisco SPA 500S 18 Entretien du téléphone 19 Chapitre 2 : Installation du téléphone 20 Avant de commencer 21 Connexions du téléphone 22 Connexion du combiné 22 Installation du support (facultatif) 23 Fixation du téléphone au mur (facultatif) 24 Réglage de la patte d'accrochage du combiné 28 Connexion à l'alimentation 29 Connexion du téléphone au réseau 30 Connexion du téléphone à un réseau sans fil 30 Connexion d'un PC au téléphone (facultatif) 31 Connexion de casques filaires et sans fil (facultatif) 31 Vérification du démarrage du téléphone 32 Mise à niveau du microprogramme du téléphone 33 Identification de la version actuelle du microprogramme 33 Téléchargement du microprogramme 34 Obtention de l'adresse IP du téléphone 34 Installation du microprogramme 35Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 4 Table des matières Chapitre 3 : Utilisation des fonctions de base du téléphone 36 Utilisation du matériel et des accessoires du téléphone 37 Utilisation du haut-parleur 37 Utilisation du casque avec le téléphone IP 37 Basculement entre le combiné, le casque et le haut-parleur pendant un appel 37 Envoi de données audio au haut-parleur du téléphone 37 Choix du périphérique audio préféré 38 Réglage du volume de l'appel et mode Muet 39 Réglage du volume de l’appel 39 Réglage du volume de la sonnerie 39 Utilisation du mode Muet 39 Émission ou réception d’un appel 39 Utilisation de l’assistance à la numérotation 40 Mise en attente d’un appel 41 Reprise d’un appel 41 Fin d’un appel 41 Transfert d’appel 41 Transfert accompagné 42 Transfert direct 42 Transfert d’un appel en attente vers un appel actif 43 Recomposition d’un numéro 43 Affichage et rappel des appels manqués 44 Activation et désactivation du raccourci des appels manqués 45 Renvoi d'appel 45 Renvoi de tous les appels 46 Renvoi d'appel lorsque votre téléphone est occupé 46 Renvoi des appels manqués 47 Attente avant le renvoi d’appel si pas de réponse 48 Arrêt du renvoi d'appel 48Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 5 Table des matières Configuration de la fonction Ne pas déranger 48 Activation de la fonction Ne pas déranger 49 Désactivation de la fonction Ne pas déranger 49 Activation et désactivation de la fonction d'appel en attente 50 Prise d’appel 51 Parcage d'un appel 51 Conférence téléphonique à trois 53 Mise en place d'une conférence entre un appel en attente et un appel actif 54 Utilisation des répertoires téléphoniques 54 Utilisation du répertoire personnel 55 Utilisation du répertoire d’entreprise 56 Utilisation des listes de l'historique des appels 57 Consultation des listes de l’historique des appels 57 Appel à partir des listes de l’historique des appels 58 Suppression d’un numéro d’une liste d’historique des appels 58 Enregistrement d’un numéro d’une liste d’historique des appels dans votre répertoire 58 Définition ou modification d’un mot de passe de téléphone 59 Accès à la messagerie vocale 59 Chapitre 4 : Utilisation des fonctionnalités avancées du téléphone 61 Configuration des fonctions de confidentialité et de sécurité 62 Blocage de l’ID de l’appelant 62 Blocage des appels anonymes 62 Utilisation de l'appel sécurisé 63 Activation de l’assistance à la numérotation 64 Création de numérotations rapides 65 Création de numérotations rapides sur des boutons de ligne disponibles 65 Création de numérotations rapides numériques 66 Utilisation de la numérotation rapide 66 Utilisation de la fonction de radiomessagerie 67Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 6 Table des matières Appel d'un autre téléphone par radiomessagerie 67 Appel d'un groupe de téléphones par radiomessagerie 67 Configuration de la réponse automatique 67 Contrôle d’un autre téléphone et accès à celui-ci depuis votre téléphone 68 Personnalisation de l’écran LCD 68 Modification du contraste de l’écran LCD 69 Modification des paramètres de rétroéclairage de l'écran 69 Configuration de l’économiseur d’écran du téléphone 70 Activation de l’économiseur d’écran 71 Utilisation des sonneries 71 Modification de la sonnerie 72 Configuration de la date et de l’heure du téléphone 72 Réglage de la date et de l’heure du téléphone 72 Utilisation des codes étoile 73 Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G 75 Procédures avancées destinées au personnel de l’assistance technique 78 Redémarrage du téléphone 79 Chapitre 5 : Utilisation de l'interface Web 80 Connexion à l'interface Web 81 Configuration de la fonction Ne pas déranger 82 Configuration du renvoi d'appel 82 Configuration de la fonction d'appel en attente 83 Blocage de l'ID de l'appelant 84 Blocage des appels anonymes 84 Utilisation du répertoire personnel 85 Consultation des listes de l'historique des appels 85 Création de numérotations rapides 86Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 7 Table des matières Acceptation de messages texte 86 Réglage du volume audio 87 Modification du contraste de l'écran LCD 88 Configuration de l'économiseur d'écran du téléphone 88 Chapitre 6 : Utilisation de la console de réception Cisco SPA 500S 90 Connexion de la console de réception Cisco SPA 500S au téléphone IP 91 Connexion d'une seule console Cisco SPA 500S 92 Connexion d'une deuxième console Cisco SPA 500S 96 Configuration de la console Cisco SPA 500S 98 Utilisation de la console Cisco SPA 500S 99 Contrôle de la console Cisco SPA 500S 99 Annexe A : Pour en savoir plus 1001 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 8 Pour commencer Ce chapitre présente le document et apporte des informations de base sur le téléphone IP Cisco Small Business Pro. Il comprend les sections suivantes : • À propos de ce document, page 8 • Présentation des téléphones IP Cisco Small Business Pro, page 10 • Présentation des lignes et des boutons du téléphone, page 11 À propos de ce document Ce guide décrit les tâches et les concepts relatifs à l'utilisation et à la configuration du téléphone IP Cisco Small Business Pro. REMARQUE Les fonctionnalités du téléphone IP Cisco Small Business Pro varient selon le type de système de contrôle des appels que vous utilisez. Ce document explique comment utiliser les téléphones IP Cisco Small Business Pro avec un système de téléphonie SIP, tel que le système vocal Cisco SPA 9000 ou un système Broadsoft ou Asterisk. Si vous utilisez le téléphone IP Cisco Small Business Pro avec un système Cisco Unified Communications 500, reportez-vous au Cisco Unified Communications Manager Express for Cisco Small Business Pro IP Phone SPA 50X (SPCP) User Guide.Pour commencer À propos de ce document Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 9 1 Organisation Ce tableau décrit le contenu de chaque chapitre de ce document. Titre Description Chapitre 1 Pour commencer Description de ce guide et présentation des téléphones IP Cisco Small Business Pro. Chapitre 2 Installation du téléphone Instructions de connexion et d'installation du téléphone. Chapitre 3 Utilisation des fonctions de base du téléphone Description des opérations de base (émettre et recevoir un appel, transférer un appel, configurer le renvoi d'appel, prendre un appel, etc.). Chapitre 4 Utilisation des fonctionnalités avancées du téléphone Description des opérations avancées (configurer les fonctions de confidentialité et de sécurité, les numérotations rapides, les contacts et la sonnerie, etc.). Chapitre 5 Utilisation de l'interface Web Connexion à l'interface utilisateur Web du téléphone et utilisation de l'interface. Chapitre 6 Utilisation de la console de réception Cisco SPA 500S Utilisation de la console Cisco SPA 500S. Annexe A Pour en savoir plus Liste de documents connexes et liens d'accès.Pour commencer Présentation des téléphones IP Cisco Small Business Pro Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 10 1 Présentation des téléphones IP Cisco Small Business Pro Les téléphones IP Cisco Small Business sont des téléphones VoIP (Voice over Internet Protocol, Voix sur IP) dotés de nombreuses fonctionnalités permettant de communiquer vocalement sur un réseau IP. Ces téléphones offrent des fonctionnalités traditionnelles, comme le renvoi d'appel, la recomposition d'un numéro, la numérotation rapide, le transfert d'appel, la conférence téléphonique et l'accès à la messagerie vocale. Les appels peuvent être émis ou reçus à l'aide d'un combiné, d'un casque ou d'un haut-parleur. Les téléphones IP proposent également des fonctionnalités spéciales qui ne sont pas disponibles sur des téléphones traditionnels. Les téléphones IP Cisco Small Business Pro sont dotés de ports Ethernet qui vous permettent de les relier au réseau informatique. Ils possèdent également des ports Ethernet supplémentaires qui vous permettent de connecter un ordinateur au réseau par le biais du téléphone IP. À la différence des téléphones traditionnels, les téléphones IP Cisco Small Business Pro nécessitent une source d'alimentation distincte. Vous pouvez alimenter les téléphones en les connectant à un commutateur qui fournit une alimentation électrique par câble Ethernet (POE, Power over Ethernet) ou en utilisant un adaptateur secteur PA100 en option. Le tableau suivant répertorie les téléphones IP Cisco Small Business Pro traités dans ce document et leurs fonctionnalités respectives : SPA 501G SPA 502G SPA 504G SPA 508G SPA 509G Écran Étiquettes papier LCD monochrome 128 x 64 rétroéclairé Lignes 8 1 4 8 12 Touches de fonction 4 fixes (rappel, annulation, conférence et transfert) 4 dynamiques Bouton de navigation Aucun Bouton de navigation quadridirectionnelPour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 11 1 Présentation des lignes et des boutons du téléphone Reportez-vous au graphique et au tableau ci-après pour identifier les éléments du téléphone. Composants du téléphone Figure 1 Composants du téléphone Le modèle Cisco SPA 509G est représenté sur la photo précédente pour illustrer les fonctionnalités du téléphone IP Cisco Small Business Pro. Les autres modèles possèdent des fonctionnalités différentes. Reportez-vous à la section « Présentation des téléphones IP Cisco Small Business Pro » à la page 10.Pour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 12 1 Les objets numérotés sur la photo sont expliqués dans le tableau suivant. N° Fonctionnalité du téléphone Description 1 Combiné Décrochez-le pour passer un appel ou répondre à un appel. 2 Voyant de message en attente Émet une lumière rouge continue quand vous avez un nouveau message vocal. Émet une lumière rouge clignotante lors d'un appel entrant. 3 Écran LCD Affiche la date et l'heure, le nom de la station téléphonique, les postes et les options des touches de fonction. (Non disponible sur le modèle Cisco SPA 501G.) 4 Touches de ligne Indiquent l'état des lignes téléphoniques. (Non disponibles sur le modèle Cisco SPA 502G.) Couleur des touches : Vert : la ligne est inactive. Rouge (lumière continue) : la ligne est active ou en cours d'utilisation. Rouge (lumière clignotante) : la ligne est en attente. Orange : la ligne n'est pas enregistrée (inutilisable). L’administrateur du système téléphonique peut également programmer ces touches pour effectuer des fonctions telles que la numérotation abrégée, la prise d’appel ou la surveillance d’un poste.Pour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 13 1 5 Boutons de fonction Appuyez sur un bouton de fonction pour effectuer l'action indiquée sur l'écran LCD. Remarque : le modèle Cisco SPA 501G possède les quatre boutons suivants. Recomp. : compose le dernier numéro appelé. Annuler : annule une action (par exemple un transfert). Conférence : au cours d'un appel, appuyez sur ce bouton pour établir une conférence téléphonique et composer un autre numéro. Lorsque le deuxième interlocuteur répond, appuyez de nouveau sur Conference pour établir la conférence. Transfert : transfère un appel. Reportez-vous à la section « Transfert d’appel » à la page 41. 6 Bouton de navigation Appuyez sur une flèche pour faire défiler vers la gauche, la droite, le haut ou le bas les éléments affichés sur l'écran LCD. (Non disponible sur le modèle Cisco SPA 501G.) 7 Bouton Messages Appuyez sur ce bouton pour accéder à la messagerie vocale (celle-ci doit être configurée par l'administrateur du système téléphonique). 8 Bouton Attente Appuyez sur ce bouton pour mettre un appel en attente. N° Fonctionnalité du téléphone DescriptionPour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 14 1 Boutons de fonction Les boutons de fonction et les intitulés sur l'écran varient selon le modèle du téléphone et la configuration du système téléphonique. (Les boutons de fonction ne sont pas disponibles sur le modèle Cisco SPA 501G.) Appuyez sur la flèche droite ou la flèche gauche du bouton de navigation pour afficher d'autres boutons de fonction. 9 Bouton Configuration Appuyez sur ce bouton pour accéder à un menu vous permettant de configurer des fonctionnalités et vos préférences (par exemple, le répertoire téléphonique et les numérotations rapides), d'accéder à l'historique des appels et de définir des fonctions (telles que le renvoi d'appel). Pour le modèle Cisco SPA 501G, ce bouton donne accès au menu Interactive Voice Response, qui vous permet d'effectuer des tâches telles que l'obtention de l'adresse IP du téléphone. Pour obtenir plus d'informations, reportez-vous aux guides de l'utilisateur sur le site Cisco.com. (Voir la liste des liens à la fin de ce document.) 10 Bouton Muet Appuyez sur ce bouton pour mettre le téléphone en mode muet ou annuler ce mode. Quand le téléphone est en mode muet, le bouton émet une lumière rouge. S'il clignote, cela signifie que la connexion réseau est introuvable. 11 Bouton Volume Appuyez sur + pour augmenter le volume et sur- pour diminuer le volume du combiné, du casque, du hautparleur (lorsque le combiné est décroché) ou le volume de la sonnerie (lorsque le combiné est raccroché). 12 Bouton Casque Appuyez sur ce bouton pour activer ou désactiver le casque. Lorsque le casque est activé, le bouton émet une lumière verte. 13 Bouton Haut-parleur Appuyez sur ce bouton pour activer ou désactiver le haut-parleur. Lorsque le haut-parleur est activé, le bouton émet une lumière verte. 14 Clavier Permet de composer des numéros de téléphone, d'entrer des lettres et de sélectionner des options du menu. N° Fonctionnalité du téléphone DescriptionPour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 15 1 Vous trouverez ci-après une liste partielle des boutons de fonction qui peuvent être disponibles sur le téléphone. Ces boutons de fonction peuvent ne pas figurer sur votre téléphone, ou il est possible que celui-ci comporte d'autres boutons qui ne sont pas répertoriés ici. Par exemple, l’administrateur du système téléphonique peut aussi configurer des boutons de fonction personnalisés sur votre téléphone, comme des boutons de numérotation rapide vers le numéro d’une entreprise ou des boutons permettant d’accéder à un programme spécialisé qui s’exécute sur votre téléphone. Pour obtenir plus d'informations, contactez l’administrateur du système téléphonique. Bouton Fonction << ou >> Permet de se déplacer vers la gauche ou vers la droite dans une entrée, sans supprimer les caractères. actif Active l'économiseur d'écran. ajout Permet d'ajouter une entrée. annul Permet d'annuler toutes les modifications apportées, si vous appuyez dessus avant ok ou enreg. bis Permet d'afficher la liste des numéros récemment composés. comp Permet de composer un numéro. conf Permet d'établir une conférence téléphonique. confLx Permet d'établir une conférence entre les lignes actives du téléphone. dar Permet de composer le numéro du dernier appel reçu. décGr Permet de répondre à un appel qui sonne sur un poste en identifiant le numéro de ce poste. décro Permet de répondre à un appel qui sonne sur un autre poste en entrant le numéro de ce poste. déparq Permet de reprendre un appel parqué. éditer Permet d'ouvrir un élément pour modifier des chiffres ou des lettres, ou activer ou désactiver une fonctionnalité. enreg Permet d'enregistrer vos modifications. ignorer Permet d'ignorer un appel entrant.Pour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 16 1 manq Permet d'afficher la liste des appels manqués. npd Ne pas déranger ; permet de couper la sonnerie du téléphone. -npd Permet de rétablir la sonnerie du téléphone. o/n Permet d'entrer dans un sous-menu et de basculer entre Oui et Non pour activer ou désactiver une option. parq Permet de mettre un appel en attente au numéro de parcage désigné. Si vous le reprenez ou que l'appelant se déconnecte, l'appel n'est plus parqué. Cette option doit être configurée par l'administrateur du système téléphonique. phold Permet de mettre un appel en attente sur une ligne partagée active. renvoi Permet de renvoyer tous les appels à destination de votre téléphone à un numéro spécifié. rép Permet d'accéder aux répertoires téléphoniques. reprnd Permet de reprendre un appel en attente. -Rvap Désactive le renvoi d'appel. sélect Permet de sélectionner l'élément en surbrillance sur l'écran LCD. starcode Permet d'entrer un code étoile. Reportez-vous à « Utilisation des codes étoile » à la page 73. supCar Permet de supprimer le chiffre ou la lettre en dernière position. suppr Permet de supprimer un élément entier (par exemple, un numéro de la liste de l'historique des appels). tranLx Permet de transférer une ligne active sur le téléphone à un numéro appelé. transf Permet de transférer un appel. tranSi Permet d'effectuer un transfert d'appel direct (transfert d'un appel sans parler à l'interlocuteur auquel vous transférez l'appel). Bouton FonctionPour commencer Présentation des lignes et des boutons du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 17 1 Utilisation des raccourcis clavier Lorsque vous utilisez les menus du téléphone, vous pouvez utiliser le clavier pour entrer le numéro indiqué à côté de l'élément du menu ou du sous-menu sur l'écran LCD. (Ne s'applique pas au modèle Cisco SPA 501G.) Par exemple, pour obtenir votre adresse IP sur le modèle SPA 504G, appuyez sur le bouton Configuration et composez le 9. L'adresse IP s'affiche sur l'écran Réseau. REMARQUE Les menus et les options varient selon le modèle du téléphone.Pour commencer Console de réception Cisco SPA 500S Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 18 1 Console de réception Cisco SPA 500S La console de réception Cisco SPA 500S pour les téléphones IP Cisco Small Business Pro est dotée de 32 boutons et 32 DEL programmables 3 couleurs (rouge, vert, orange) et prend en charge le tableau de voyants d'occupation Broadsoft et le contrôle des lignes Asterisk. La console Cisco SPA 500S se fixe au téléphone IP avec le bras de fixation fourni (non représenté). Elle est alimentée directement par le téléphone IP et ne nécessite pas d'alimentation séparée. Vous pouvez relier deux unités Cisco SPA 500S à un même téléphone IP, ce qui vous donne la possibilité de contrôler 64 lignes distinctes au total. Pour obtenir plus d'informations sur la console Cisco SPA 500S, reportez-vous au Chapitre 6, « Utilisation de la console de réception Cisco SPA 500S ».Pour commencer Entretien du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 19 1 Entretien du téléphone Les téléphones IP Cisco Small Business Pro sont des appareils électroniques qui ne doivent pas faire l'objet d'une exposition excessive à la chaleur, au soleil, au froid ou à l'eau. Pour nettoyer le téléphone, utilisez une serviette en papier ou en tissu légèrement imbibée d'eau. Veillez à ne pas pulvériser de solution de nettoyage directement sur l'appareil ni à la verser dessus.2 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 20 Installation du téléphone Ce chapitre explique comment installer le téléphone IP Cisco Small Business Pro et le connecter au réseau. Il comprend les sections suivantes : • Avant de commencer, page 21 • Connexions du téléphone, page 22 • Connexion du combiné, page 22 • Installation du support (facultatif), page 23 • Fixation du téléphone au mur (facultatif), page 24 • Connexion à l'alimentation, page 29 • Connexion du téléphone au réseau, page 30 • Connexion d'un PC au téléphone (facultatif), page 31 • Connexion de casques filaires et sans fil (facultatif), page 31 • Vérification du démarrage du téléphone, page 32 • Mise à niveau du microprogramme du téléphone, page 33Installation du téléphone Avant de commencer Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 21 2 Avant de commencer Avant d'installer et de connecter le téléphone, contactez l'administrateur système (le cas échéant) pour vous assurer que le téléphone peut être installé dans votre réseau, prenez connaissance des consignes de sécurité, et vérifiez que vous avez en votre possession tous les éléments du téléphone et l'ensemble de la documentation. REMARQUE Le port RJ-11 « AUX » est réservé à la connexion à la console de réception Cisco SPA 500S qui fonctionne avec les téléphones IP. Il ne doit pas être utilisé comme port de ligne téléphonique. ! AVERTISSEMENT N'insérez pas de cordon de ligne téléphonique dans le port « AUX ».Installation du téléphone Connexions du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 22 2 Connexions du téléphone La photo suivante illustre la connexion des différents éléments du téléphone. Figure 1 Connexions du téléphone Connexion du combiné ÉTAPE 1 Retournez le téléphone afin d'accéder aux ports situés à l'arrière de l'unité. ! AVERTISSEMENT N'insérez pas de cordon de ligne téléphonique dans le port auxiliaire. ÉTAPE 2 Insérez l'extrémité la plus longue du cordon téléphonique dans le port du combiné situé sur le téléphone (indiqué par un symbole en forme de téléphone). ÉTAPE 3 (Facultatif) Faites passer le cordon téléphonique dans le canal de passage du câble. ÉTAPE 4 Insérez l'autre extrémité du cordon téléphonique dans le port situé en bas du combiné (non illustré).Installation du téléphone Installation du support (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 23 2 Installation du support (facultatif) REMARQUE Ne fixez pas le support pour bureau si vous voulez monter le téléphone au mur. Si vous désirez utiliser une console de réception Cisco SPA 500S, fixez la console avant le support pour bureau. ÉTAPE 1 Connectez le support pour téléphone en alignant les pattes situées sur le support avec les orifices du téléphone. ÉTAPE 2 Enclenchez les pattes du bas dans les orifices inférieurs du téléphone, puis appuyez légèrement sur le support. Les pattes du haut doivent s'enclencher facilement dans les orifices supérieurs du support. Ne forcez pas.Installation du téléphone Fixation du téléphone au mur (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 24 2 Fixation du téléphone au mur (facultatif) Pour monter le téléphone au mur, vous devez vous procurer le kit de support mural MB100. Figure 2 Kit de support mural MB100Installation du téléphone Fixation du téléphone au mur (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 25 2 ÉTAPE 1 Pour fixer le support de montage, alignez les deux goupilles du support de montage avec les orifices dans la base du téléphone. ÉTAPE 2 Orientez le support de montage de manière à ce que le port Ethernet et le port du combiné du téléphone soient accessibles après l'installation. ÉTAPE 3 Appuyez sur le support de montage pour l'introduire dans la base du téléphone. Faites glisser le support de montage vers le haut pour l'emboîter.Installation du téléphone Fixation du téléphone au mur (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 26 2 ÉTAPE 4 (Facultatif) Si une prise Wi-Fi ou PoE est installée, placez-la dans le bac.Installation du téléphone Fixation du téléphone au mur (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 27 2 Branchez les câbles Ethernet et d'alimentation.Installation du téléphone Fixation du téléphone au mur (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 28 2 ÉTAPE 5 Accrochez le support à des vis fixées au mur. Réglage de la patte d'accrochage du combiné Si vous montez le téléphone sur une surface verticale, vous devez tourner la patte d'accrochage du combiné située sur le téléphone de sorte que le combiné ne tombe pas du téléphone lorsque vous le placez sur son support. ÉTAPE 1 Appuyez sur le loquet. ÉTAPE 2 Faites glisser la patte d'accrochage vers le haut jusqu'à ce qu'elle se détache du téléphone.Installation du téléphone Connexion à l'alimentation Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 29 2 ÉTAPE 3 Faites tourner la patte de 180° et réinsérez-la dans la base du téléphone. La patte attrape désormais la fente dans le combiné lorsque vous placez ce dernier sur son support. Connexion à l'alimentation Si vous utilisez une source d'alimentation externe, insérez une extrémité du cordon d'alimentation dans une prise murale et l'autre extrémité dans le port d'alimentation situé sur le téléphone. Installation du téléphone Connexion du téléphone au réseau Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 30 2 Connexion du téléphone au réseau Si vous utilisez une connexion Ethernet : ÉTAPE 1 Insérez une extrémité du câble Ethernet dans le port réseau du téléphone (indiqué par « SW »). ÉTAPE 2 Insérez l'autre extrémité du câble Ethernet dans le périphérique approprié sur le réseau, par exemple un commutateur réseau. Connexion du téléphone à un réseau sans fil Vous pouvez utiliser le pont sans fil G Cisco WBP54G pour adaptateurs de téléphone afin de connecter le téléphone IP à un réseau G sans fil au lieu d'utiliser le réseau local câblé. REMARQUE Cette procédure nécessite l'adaptateur secteur Cisco PA100 pour téléphonie IP du système vocal SPA 9000 en option pour alimenter le pont WBP54G. Pour connecter le téléphone au pont Cisco WBP54G : ÉTAPE 1 Configurez le pont Cisco WBP54G à l'aide de l'assistant d'installation. Reportezvous aux instructions du Wireless-G Bridge for Phone Adapters Quick Installation Guide, disponible sur le site cisco.com. Reportez-vous à Annexe A, « Pour en savoir plus », pour obtenir la liste des documents et des emplacements. ÉTAPE 2 Au cours du processus de l'assistant d'installation, connectez le câble réseau Ethernet du pont WBP54G à l'arrière de la base du téléphone IP dans la fente indiquée par « SW ». Reportez-vous au graphique « Connexions du téléphone ». ÉTAPE 3 Connectez le câble d'alimentation du pont WBP54G au port d'alimentation sur la base du téléphone IP. ÉTAPE 4 Branchez l'adaptateur secteur du téléphone IP sur le port d'alimentation du pont WBP54G. ÉTAPE 5 Branchez l'autre extrémité de l'adaptateur secteur du téléphone IP sur une prise murale.Installation du téléphone Connexion d'un PC au téléphone (facultatif) Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 31 2 Connexion d'un PC au téléphone (facultatif) Pour connecter un PC au téléphone (facultatif) : ÉTAPE 1 Pour fournir l'accès réseau à un PC, connectez une extrémité d'un câble Ethernet supplémentaire (non fourni) au port PC à l'arrière du téléphone. Reportez-vous au graphique « Connexions du téléphone ». ÉTAPE 2 Connectez l'autre extrémité du câble Ethernet au port réseau du PC. Connexion de casques filaires et sans fil (facultatif) Les téléphones IP prennent en charge les casques de différents fabricants. Pour connaître les derniers modèles pris en charge, contactez votre revendeur. Vous trouverez des informations supplémentaires sur les sites Web des fabricants : www.plantronics.com www.jabra.com Le processus de connexion peut varier selon la marque et le type de casque. Pour obtenir plus d'informations, reportez-vous à la documentation fournie avec le casque. En général, pour connecter un casque : • Casque sans fil : reliez le cordon téléphonique du casque au port téléphonique à l'arrière du téléphone IP. • Casque filaire : connectez la prise de 2,5 mm du casque au port casque situé sur le côté droit du téléphone IP, comme illustré ci-dessous :Installation du téléphone Vérification du démarrage du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 32 2 Vérification du démarrage du téléphone Une fois que vous avez branché le téléphone au secteur et que vous l'avez relié au réseau, le téléphone exécute une séquence de démarrage. Pendant cette opération, les téléphones à écran affichent le logo Cisco et le message « Initialisation du réseau ». Tous les voyants du téléphone clignotent. Une fois que le téléphone est correctement connecté au réseau, celui-ci reçoit une configuration de base, et les touches de ligne téléphonique doivent émettre une lumière verte (sur les modèles dotés de telles touches). Sur les modèles dotés d'un écran, le téléphone affiche le menu standard du téléphone. La date, le nom et le numéro du téléphone apparaissent sur la première ligne de l'écran LCD. En bas de l'écran LCD, les touches de fonction sont affichées au-dessus des boutons de fonction associés. Sur les modèles sans écran, comme le téléphone Cisco SPA 501G, les boutons de ligne doivent émettre une lumière verte et une tonalité doit se faire entendre lorsque vous décrochez le combiné ou lorsque vous appuyez sur le bouton du haut-parleur.Installation du téléphone Mise à niveau du microprogramme du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 33 2 Si le téléphone ne démarre pas, vérifiez l'installation et les connexions. Si elles sont correctes, débranchez et rebranchez le téléphone. Si vous ne voyez toujours rien à l’écran, contactez l’administrateur du système téléphonique ou le fournisseur de services téléphoniques Internet. Mise à niveau du microprogramme du téléphone Un microprogramme est préinstallé dans le téléphone. Des versions plus récentes de ce microprogramme ont cependant pu être développées en vue de fournir des fonctionnalités supplémentaires et de résoudre des problèmes liés au téléphone. Pour optimiser les performances de votre téléphone, vous devrez peut-être le mettre à niveau vers la dernière version du microprogramme. ! AVERTISSEMENT Si vous utilisez le téléphone avec un système de service de téléphonie Internet, consultez votre fournisseur d'accès avant de procéder à cette mise à niveau. Il est possible qu'il exécute une mise à niveau automatique et que vous n'ayez pas besoin d'intervenir. Pour mettre à niveau le microprogramme de votre téléphone, effectuez l'une des opérations suivantes : • Téléchargez le microprogramme sur le site Web de Cisco et installez-le à partir de votre ordinateur. Les instructions sont détaillées dans la section suivante. • Procédez à la mise à niveau à l'aide de l'assistant d'installation du système vocal Cisco SPA 9000 (si votre téléphone se trouve sur le réseau d'un système vocal Cisco SPA 9000). Reportez-vous au Cisco SPA 9000 Voice System Setup Wizard User Guide. Identification de la version actuelle du microprogramme Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Accédez à Infos produit et appuyez sur sélect. ÉTAPE 3 Accédez à Version logicielle. Le numéro de version du microprogramme s'affiche.Installation du téléphone Mise à niveau du microprogramme du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 34 2 Cisco SPA 501G : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Entrez 150 et appuyez sur #. La version du microprogramme s'affiche. Téléchargement du microprogramme Accédez au site www.tools.cisco.com/support/downloads et entrez le numéro du modèle dans le champ de recherche de logiciel. Enregistrez le microprogramme sur le bureau de l'ordinateur. Obtention de l'adresse IP du téléphone Avant de procéder à la mise à niveau, vous devez obtenir l'adresse IP du téléphone. Pour obtenir l'adresse IP : Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Accédez à Réseau, puis appuyez sur sélect. ÉTAPE 3 Accédez à IP actuelle. Il s'agit de l'adresse IP du téléphone. SPA 501G : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Entrez 110 et appuyez sur #. L'adresse IP s'affiche.Installation du téléphone Mise à niveau du microprogramme du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 35 2 Installation du microprogramme ÉTAPE 1 Procédez à l'extraction du microprogramme sur votre ordinateur. REMARQUE Si vous utilisez une connexion VPN, vous devrez peut-être vous déconnecter avant de poursuivre pour que l'ordinateur puisse communiquer directement avec le téléphone pour la mise à niveau. ÉTAPE 2 Lancez le fichier exécutable de mise à niveau du microprogramme (en doublecliquant sur upg-spa504-6-2-0.exe, par exemple). ÉTAPE 3 Lisez le message concernant la mise à niveau et votre fournisseur d'accès, puis cliquez sur Continue. ÉTAPE 4 Entrez l'adresse IP du téléphone et vérifiez l'adresse de l'ordinateur. ÉTAPE 5 Cliquez sur OK. Des informations relatives aux éléments logiciels et matériels actuels du téléphone s'affichent. ÉTAPE 6 Cliquez sur Upgrade pour lancer la mise à niveau. REMARQUE Attendez que la mise à niveau soit terminée (que les voyants ne clignotent plus) pour débrancher le téléphone. ÉTAPE 7 Cliquez sur OK pour quitter le message d'état de la mise à niveau.3 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 36 Utilisation des fonctions de base du téléphone Ce chapitre fournit des instructions sur l’utilisation des fonctions de base du téléphone. Il comprend les sections suivantes : • Utilisation du matériel et des accessoires du téléphone, page 37 • Réglage du volume de l'appel et mode Muet, page 39 • Émission ou réception d’un appel, page 39 • Mise en attente d’un appel, page 41 • Reprise d’un appel, page 41 • Fin d’un appel, page 41 • Transfert d’appel, page 41 • Recomposition d’un numéro, page 43 • Affichage et rappel des appels manqués, page 44 • Activation et désactivation du raccourci des appels manqués, page 45 • Renvoi d'appel, page 45 • Configuration de la fonction Ne pas déranger, page 48 • Activation et désactivation de la fonction d'appel en attente, page 50 • Prise d’appel, page 51 • Parcage d'un appel, page 51 • Conférence téléphonique à trois, page 53 • Utilisation des répertoires téléphoniques, page 54 • Utilisation des listes de l'historique des appels, page 57 • Définition ou modification d’un mot de passe de téléphone, page 59 • Accès à la messagerie vocale, page 59Utilisation des fonctions de base du téléphone Utilisation du matériel et des accessoires du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 37 3 Utilisation du matériel et des accessoires du téléphone Utilisation du haut-parleur Pour utiliser le haut-parleur, appuyez sur le bouton Haut-parleur (le combiné peut être raccroché ou décroché). Utilisation du casque avec le téléphone IP Installez le casque comme décrit dans la section « Connexion de casques filaires et sans fil (facultatif) » à la page 31. REMARQUE Les étapes à suivre pour utiliser le casque avec le téléphone IP peuvent varier. Pour obtenir plus d'informations, reportez-vous à la documentation fournie avec le casque. Pour utiliser un casque filaire, appuyez sur le bouton Casque du téléphone et composez le numéro à appeler, ou appuyez sur le bouton du casque pour répondre à un appel. Pour utiliser un casque sans fil, décrochez le combiné avant de passer ou de recevoir un appel par le biais du casque. Basculement entre le combiné, le casque et le haut-parleur pendant un appel Tous ces périphériques audio peuvent être utilisés pendant un appel. Vous ne pouvez utiliser qu’un seul périphérique à la fois. Vous pouvez raccrocher le combiné si vous utilisez la fonction haut-parleur ou casque. Si vous passez de la fonction combiné à la fonction haut-parleur, assurezvous que le voyant correspondant est bien allumé avant de raccrocher le combiné. Toutefois, si vous passez de la fonction combiné à la fonction casque sans fil, ne raccrochez pas le combiné sous peine de couper l'appel. Envoi de données audio au haut-parleur du téléphone Cette option permet d’envoyer des données audio au haut-parleur lorsque le combiné est décroché.Utilisation des fonctions de base du téléphone Utilisation du matériel et des accessoires du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 38 3 REMARQUE Ceci ne s'applique pas au modèle Cisco SPA 501G. ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Envoyer signal audio au haut-parleur > Modif. ÉTAPE 4 Appuyez sur o/n pour activer ou désactiver la fonction. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur Enreg.. Choix du périphérique audio préféré Cette option désigne le casque ou le haut-parleur comme périphérique audio préféré lorsque le combiné n’est pas utilisé. REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Pour choisir le périphérique audio préféré : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Périphérique audio préféré et appuyez sur Modif. ÉTAPE 4 Appuyez sur Option pour afficher les options disponibles. Lorsque l'option souhaitée s'affiche, appuyez sur ok. ÉTAPE 5 Appuyez sur Enreg..Utilisation des fonctions de base du téléphone Réglage du volume de l'appel et mode Muet Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 39 3 Réglage du volume de l'appel et mode Muet Vous pouvez également modifier le réglage du volume d’appel depuis votre ordinateur à l’aide de l’interface Web du téléphone IP. Reportez-vous à la section « Réglage du volume audio » à la page 87. Réglage du volume de l’appel Pour régler le volume du combiné ou du haut-parleur, décrochez le combiné ou appuyez sur le bouton Haut-parleur. Appuyez sur + sur le bouton Volume pour augmenter le volume ou sur - pour le diminuer. Appuyez sur Enreg. (excepté sur le modèle Cisco SPA 501G). Réglage du volume de la sonnerie Pour régler le volume de la sonnerie, raccrochez le combiné et désactivez le bouton du haut-parleur, puis appuyez sur le bouton Volume. Appuyez sur Enreg. (excepté sur le modèle Cisco SPA 501G). Utilisation du mode Muet Pour désactiver le son du microphone du téléphone, du haut-parleur ou du microphone du casque, appuyez sur le bouton Muet sur le téléphone. Le bouton émet une lumière rouge. Appuyez de nouveau sur le bouton Muet pour rétablir le son. Si aucun périphérique audio n’est allumé, la touche Muet n’a aucun effet. Lorsque vous passez du haut-parleur au combiné, le mode Muet est automatiquement désactivé. Émission ou réception d’un appel REMARQUE Vous devrez peut-être composer un ou plusieurs numéros pour accéder à une ligne extérieure. Posez la question à l'administrateur du système téléphonique.Utilisation des fonctions de base du téléphone Émission ou réception d’un appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 40 3 Pour émettre ou répondre à un appel, effectuez l’une des opérations suivantes : • Décrochez le combiné. • Appuyez sur le bouton Haut-parleur. • Appuyez sur le bouton Casque. • Appuyez sur un bouton de ligne vert (pour passer un appel) ou émettant une lumière rouge clignotante (pour répondre à un appel). (Ne s'applique pas au modèle Cisco SPA 502G.) Si vous êtes en train de recevoir un appel et qu'un autre appel arrive, appuyez sur le bouton de la ligne émettant une lumière rouge clignotante ou appuyez sur le bouton Attente pour mettre le premier appel en attente et répondre à l'appel entrant. Pour reprendre le premier appel, appuyez sur le bouton de la ligne correspondant à l'appel ou sélectionnez-le à l'aide de la flèche montante ou descendante du bouton de navigation, puis appuyez sur la touche de fonction Reprend (Cisco SPA 502G). Utilisation de l’assistance à la numérotation Si l'assistance à la numérotation est activée lors de l’émission d’un appel, les numéros correspondant aux derniers appels passés ou reçus s’affichent à l’écran lorsque vous commencez à composer votre numéro. REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Pour choisir un des numéros affichés : ÉTAPE 1 Utilisez le bouton de navigation pour faire défiler l’affichage et mettre un numéro en surbrillance sur l’écran LCD. ÉTAPE 2 Appuyez sur Compos pour passer l'appel. Pour obtenir plus d'informations sur l'activation de cette fonction, reportez-vous à « Activation de l’assistance à la numérotation » à la page 64.Utilisation des fonctions de base du téléphone Mise en attente d’un appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 41 3 Mise en attente d’un appel Pour mettre un appel en attente, appuyez sur le bouton Attente. L'interlocuteur peut alors entendre une série de signaux sonores ou de la musique pour lui indiquer que l'appel est en attente. Un seul appel peut être actif à la fois. Le bouton Attente permet de mettre en attente l'appel actif. Reprise d’un appel Pour reprendre l’appel, appuyez sur le bouton de la ligne émettant une lumière rouge clignotante pour l’appel. (Sur le modèle Cisco SPA 502G, appuyez sur la touche de fonction Reprend.) Fin d’un appel Pour terminer un appel : • Si vous utilisez le combiné, raccrochez. • Si vous utilisez le haut-parleur, appuyez sur le bouton Haut-parleur. • Si vous utilisez le casque, appuyez sur le bouton Casque (filaire) ou raccrochez le combiné (sans fil). Transfert d’appel Vous pouvez effectuer les types de transferts suivants : • Transfert accompagné : vous appelez la personne à laquelle vous transférez l'appel et : - vous effectuez le transfert pendant que le téléphone sonne ; - vous attendez que la personne réponde pour transférer l’appel. • Transfert direct : vous effectuez le transfert sans parler à l’interlocuteur auquel vous transférez l’appel.Utilisation des fonctions de base du téléphone Transfert d’appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 42 3 Transfert accompagné Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : ÉTAPE 1 Lors d’un appel actif, appuyez sur transf. L’appel est mis en attente et une nouvelle ligne est ouverte pour composer le numéro. ÉTAPE 2 Effectuez l’une des opérations suivantes : • Entrez le numéro auquel vous souhaitez transférer l'appel, puis appuyez sur comp ou attendez quelques secondes. • Appuyez sur rép et choisissez un numéro dans le répertoire personnel ou sélectionnez Nouvelle entrée et appuyez sur comp. Si vous raccrochez avant que le deuxième appel ne sonne, le transfert échoue et le premier appel est déconnecté. En cas d'erreur de composition, utilisez la touche delChar, effacer ou annul (non applicable au Cisco SPA 502G) pour modifier le numéro avant de transférer l'appel. ÉTAPE 3 Appuyez sur transf pendant la sonnerie ou à tout moment lorsque votre interlocuteur a répondu. Cisco SPA 501G : ÉTAPE 1 Au cours d'un appel actif, appuyez sur le bouton Transfert. ÉTAPE 2 Entrez le numéro auquel vous voulez transférer l’appel. ÉTAPE 3 Lorsque vous entendez la sonnerie ou que votre interlocuteur a répondu, appuyez à nouveau sur le bouton Transfert. Transfert direct Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : ÉTAPE 1 Pendant un appel actif, appuyez sur la touche de fonction tranSi. ÉTAPE 2 Entrez le numéro auquel vous souhaitez transférer l'appel et appuyez sur comp. L’appel est transféré et aucune autre intervention de votre part n’est nécessaire.Utilisation des fonctions de base du téléphone Recomposition d’un numéro Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 43 3 Transfert d’un appel en attente vers un appel actif REMARQUE Ceci ne s'applique pas au modèle Cisco SPA 501G. Si vous avez un appel en attente et un appel actif, vous pouvez transférer l’un de ces appels vers l’autre pour mettre en relation les deux interlocuteurs. (Il ne s’agit pas d’une conférence téléphonique, car vous quittez l’appel après le transfert.) Lorsque vous avez un appel actif et un ou plusieurs appels en attente, appuyez sur la touche de fonction tranLx. • Si vous avez uniquement un appel en attente, il est transféré à l’interlocuteur actif et vous êtes déconnecté. • Si vous avez plusieurs appels en attente, choisissez celui à transférer en appuyant sur le bouton de ligne correspondant. Recomposition d’un numéro Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : Pour rappeler le dernier numéro appelé, appuyez deux fois sur la touche de fonction bis. Pour rappeler un autre numéro : ÉTAPE 1 Appuyez sur la touche de fonction bis et sélectionnez le numéro souhaité. ÉTAPE 2 (Facultatif) Appuyez sur éditer pour sélectionner un numéro et le modifier (par exemple, pour ajouter un indicatif téléphonique). Une fois que vous avez terminé, appuyez sur ok. ÉTAPE 3 Décrochez le combiné ou appuyez sur comp pour composer automatiquement le numéro sélectionné. Cisco SPA 501G : Pour rappeler le dernier numéro, appuyez sur le bouton Bis. Utilisation des fonctions de base du téléphone Affichage et rappel des appels manqués Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 44 3 Affichage et rappel des appels manqués L'écran LCD du téléphone IP vous indique si vous avez reçu un appel auquel vous n'avez pas répondu. REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Pour rappeler un appel manqué : • Si l’écran LCD indique un appel manqué, appuyez sur la touche de fonction dar pour revenir au dernier appel manqué. Appuyez sur la touche de fonction manq pour afficher la liste des appels manqués, sélectionnez un appel et appuyez sur comp. • Si l'écran LCD n'affiche aucun appel manqué, vous pouvez rappeler un numéro à partir de la liste des appels manqués : a. Appuyez sur le bouton Configuration. b. Sélectionnez Historique des appels. c. Sélectionnez Appels manqués. d. Choisissez l'appel à rappeler et appuyez sur comp. REMARQUE Si l’appel provient d’un numéro interurbain, vous devrez peut-être modifier l’appel avant de pouvoir rappeler le numéro. Appuyez sur la touche de fonction éditer pour modifier l’appel et effectuez votre modification à l’aide des boutons de fonction et du clavier. Pour afficher la liste des appels manqués : • Si l’écran LCD affiche un appel manqué, appuyez sur la touche de fonction manq pour afficher la liste des appels manqués. • Si l’écran LCD n’affiche pas d’appel manqué : a. Appuyez sur le bouton Configuration. b. Sélectionnez Historique des appels. c. Sélectionnez Appels manqués.Utilisation des fonctions de base du téléphone Activation et désactivation du raccourci des appels manqués Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 45 3 Activation et désactivation du raccourci des appels manqués Cette option permet d’activer ou de désactiver les touches de fonction dar et manq qui s’affichent sur l’écran du téléphone IP en cas d’appel manqué. REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Pour accéder à cette option : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Racc. appel manqué et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n pour activer ou désactiver la fonction. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur Enreg.. Renvoi d'appel Vous pouvez renvoyer tous les appels, les appels reçus lorsque le téléphone est occupé ou les appels manqués. Vous pouvez également définir les options de renvoi à partir de votre ordinateur à l'aide de l'interface Web du téléphone IP (reportez-vous à la section « Configuration du renvoi d'appel » à la page 82). REMARQUE Pour le modèle Cisco SPA 501G, vous pouvez utiliser uniquement l'interface Web du téléphone IP ou des codes étoile pour définir des renvois d'appels. Les codes étoile appropriés sont indiqués dans les instructions ci-dessous.Utilisation des fonctions de base du téléphone Renvoi d'appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 46 3 Renvoi de tous les appels À l'aide de la touche de fonction renvoi : ÉTAPE 1 Appuyez sur la touche de fonction renvoi. ÉTAPE 2 Entrez le numéro vers lequel vous voulez renvoyer tous les appels ; par exemple votre boîte vocale, un autre poste ou une ligne extérieure. Si vous renvoyez les appels vers une ligne extérieure, veillez à utiliser les codes d’accès et les indicatifs requis. ÉTAPE 3 Appuyez sur comp. L'écran LCD affiche les appels renvoyés. À l’aide du code étoile : Appuyez sur *72 et entrez le numéro vers lequel vous souhaitez renvoyer tous les appels. À l’aide du bouton Configuration : ÉTAPE 1 Appuyez sur le bouton Configuration et sélectionnez Transfert d'appels > Renvoi de tous les appels. ÉTAPE 2 Appuyez sur éditer. ÉTAPE 3 Entrez le numéro vers lequel vous voulez renvoyer tous les appels ; par exemple votre boîte vocale, un autre poste ou une ligne extérieure. Si vous renvoyez les appels vers une ligne extérieure, veillez à utiliser les codes d’accès et les indicatifs requis. ÉTAPE 4 Appuyez sur OK. ÉTAPE 5 Appuyez sur Enreg.. Renvoi d'appel lorsque votre téléphone est occupé À l’aide du code étoile : Appuyez sur *90 et entrez le numéro vers lequel vous souhaitez renvoyer les appels.Utilisation des fonctions de base du téléphone Renvoi d'appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 47 3 À l’aide du bouton Configuration : ÉTAPE 1 Appuyez sur le bouton Configuration et sélectionnez Transfert d'appels > Renvoi si numéro occupé. ÉTAPE 2 Appuyez sur la touche de fonction éditer. ÉTAPE 3 Entrez le numéro vers lequel vous souhaitez renvoyer tous les appels (par exemple, un autre poste ou une ligne extérieure). En cas de renvoi vers une ligne extérieure, veillez à utiliser les codes d’accès et les indicatifs requis. Pour entrer « vm » (connexion à la messagerie vocale si l’administrateur du système téléphonique a configuré cette fonction), appuyez sur le bouton de navigation droit, puis sur la touche de fonction alpha et tapez les lettres à l’aide du clavier. Appuyez sur le bouton de navigation gauche. ÉTAPE 4 Appuyez sur OK. ÉTAPE 5 Appuyez sur Enreg.. Renvoi des appels manqués À l’aide du code étoile : Appuyez sur *92 et entrez le numéro vers lequel vous souhaitez renvoyer les appels. À l’aide du bouton Configuration : ÉTAPE 1 Dans l'écran Transfert d'appels, vérifiez que l'option Renvoi si pas de réponse s'affiche en surbrillance et appuyez sur la touche de fonction éditer. ÉTAPE 2 Entrez « vm » pour la messagerie vocale ou le numéro vers lequel les appels doivent être renvoyés (par exemple, un autre poste ou une liste extérieure). Si vous renvoyez les appels vers une ligne extérieure, veillez à utiliser les codes d’accès et les indicatifs requis. ÉTAPE 3 Appuyez sur OK. ÉTAPE 4 Appuyez sur Enreg..Utilisation des fonctions de base du téléphone Configuration de la fonction Ne pas déranger Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 48 3 Attente avant le renvoi d’appel si pas de réponse ÉTAPE 1 Dans l'écran Transfert d'appels, vérifiez que l'option Renvoi si pas de réponse après un moment défini s'affiche en surbrillance et appuyez sur la touche de fonction éditer. ÉTAPE 2 Entrez la période d’attente en secondes pour les appels manqués. ÉTAPE 3 Appuyez sur OK. ÉTAPE 4 Appuyez sur Enreg.. Arrêt du renvoi d'appel Pour arrêter le renvoi d’appel, appuyez sur la touche de fonction -Rvap. Pour arrêter le renvoi, vous pouvez également appuyer sur le bouton Configuration et sélectionner Transfert d'appels > éditer. Appuyez sur effacer, puis sur ok. Appuyez sur Enreg.. À l’aide de codes étoile : • Entrez *73 pour désactiver le renvoi d’appel. • Entrez *91 pour désactiver le renvoi d’appel si occupé. • Entrez *93 pour désactiver le renvoi d’appel si pas de réponse. Configuration de la fonction Ne pas déranger La fonctionnalité Ne pas déranger vous permet de couper la sonnerie du téléphone en cas d'appel entrant. Si la messagerie vocale est configurée, tous les appels entrants sont immédiatement dirigés vers la messagerie. Sinon, l’appelant entend un signal ou un message indiquant que la ligne est occupée. Vous pouvez également définir la fonction Ne pas déranger à partir de votre ordinateur à l'aide de l'interface Web du téléphone IP (reportez-vous à la section « Configuration de la fonction Ne pas déranger » à la page 82).Utilisation des fonctions de base du téléphone Configuration de la fonction Ne pas déranger Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 49 3 REMARQUE Pour le modèle Cisco SPA 501G, vous pouvez définir la fonction Ne pas déranger uniquement à l'aide de l'interface Web du téléphone IP ou du code étoile. Activation de la fonction Ne pas déranger À l’aide de la touche de fonction npd : Pour activer la fonction Ne pas déranger, appuyez sur la touche de fonction npd. L'écran LCD indique que la fonction Ne pas déranger est activée sur le téléphone. À l’aide du bouton Configuration : Vous pouvez également accéder à la fonction Ne pas déranger en procédant comme suit : ÉTAPE 1 Appuyez sur le bouton Configuration et sélectionnez Préférences > Ne pas déranger. ÉTAPE 2 Appuyez sur la touche de fonction éditer. ÉTAPE 3 Appuyez sur o/n pour sélectionner o, puis sur ok. ÉTAPE 4 Appuyez sur Enreg.. À l’aide du code étoile : Entrez *78 pour activer la fonction Ne pas déranger. Désactivation de la fonction Ne pas déranger À l’aide de la touche de fonction -npd : Pour désactiver la fonction Do Not Disturb, appuyez sur la touche de fonction -npd. À l’aide du bouton Configuration : Pour désactiver la fonction Ne pas déranger, vous pouvez également appuyer sur le bouton Configuration et sélectionner Préférences > Ne pas déranger. À l’aide du code étoile : Entrez *79 pour désactiver la fonction Ne pas déranger.Utilisation des fonctions de base du téléphone Activation et désactivation de la fonction d'appel en attente Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 50 3 Activation et désactivation de la fonction d'appel en attente La fonction d'appel en attente vous informe pendant un appel qu'un deuxième appel est en cours en faisant sonner votre téléphone et en affichant un message d'état. Si vous désactivez cette fonction, les appels entrants ne sonnent pas sur votre téléphone si vous êtes déjà en ligne et l’appelant entend un signal ou un message indiquant que la ligne est occupée. Vous pouvez également activer et désactiver la fonction d'appel en attente à partir de votre ordinateur à l'aide de l'interface Web du téléphone IP. Reportez-vous à la section « Configuration de la fonction d'appel en attente » à la page 83. REMARQUE Pour le modèle Cisco SPA 501G, vous pouvez configurer la fonction d'appel en attente uniquement à l'aide de l'interface Web du téléphone IP ou d'un code étoile. À l’aide du bouton Configuration : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Appel en attente et appuyez sur éditer. ÉTAPE 4 Appuyez sur la touche de fonction o/n pour activer ou désactiver la fonction. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur Enreg.. À l’aide du code étoile : • Entrez *56 pour activer la fonction d'appel en attente. • Entrez *71 avant de composer un numéro pour activer la fonction pour cet appel. • Entrez *57 pour désactiver la fonction d'appel en attente. • Entrez *72 avant de composer un numéro pour désactiver la fonction pour cet appel.Utilisation des fonctions de base du téléphone Prise d’appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 51 3 Prise d’appel Vous pouvez prendre un appel qui sonne sur un autre poste. En fonction de la configuration du réseau téléphonique, vous pouvez prendre un appel dans les situations suivantes : • Prendre un appel qui sonne sur un poste dans votre groupe à l’aide de la touche de fonction décGr. (Non disponible sur le modèle Cisco SPA 501G.) • Prendre un appel qui sonne sur un poste spécifique à l’aide de la touche de fonction décro. (Non disponible sur le modèle Cisco SPA 501G.) • Prendre un appel qui sonne sur un poste configuré sur l’un des boutons de ligne du téléphone. Nécessite l’intervention de l’administrateur du système téléphonique. (Non disponible sur le modèle Cisco SPA 502G.) Pour prendre un appel qui sonne sur un poste dans votre groupe : ÉTAPE 1 Appuyez sur la touche de fonction décGr. Le téléphone affiche toutes les stations du groupe qui sonnent. Appuyez sur comp pour afficher la liste des appels. ÉTAPE 2 Choisissez l'appel que vous voulez prendre et appuyez sur comp. Pour prendre un appel qui sonne sur un poste spécifique : ÉTAPE 1 Appuyez sur la touche de fonction décro. ÉTAPE 2 Entrez le numéro de poste du téléphone dont vous voulez prendre l’appel, puis appuyez sur comp. ÉTAPE 3 Appuyez une nouvelle fois sur comp. Pour prendre un appel qui sonne sur un poste configuré sur l’un des boutons de ligne du téléphone, appuyez sur le bouton de la ligne qui clignote. Parcage d'un appel Vous pouvez « parquer » un appel sur une ligne spécifique pour qu'un autre employé de votre société puisse prendre l'appel. L'appel est actif jusqu'à ce qu'il soit retiré de la file d'attente ou que l'interlocuteur raccroche.Utilisation des fonctions de base du téléphone Parcage d'un appel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 52 3 REMARQUE Non disponible sur le modèle Cisco SPA 501G. Pour parquer un appel : ÉTAPE 1 Lorsque vous avez un appel actif, appuyez sur la touche de fonction parq. ÉTAPE 2 Entrez un numéro pour identifier la ligne de mise en file d’attente et appuyez sur comp. Le numéro de la ligne de parcage ne correspond pas à un véritable numéro de poste et vous pouvez opter pour n’importe quel numéro simple à mémoriser (100, par exemple). L'appel est ensuite parqué sur cette ligne et l'appelant entend une musique ou des messages d'attente. ÉTAPE 3 Vous ou un autre utilisateur devez ensuite retirer l’appel de la file d’attente. Pour cela, vous pouvez utiliser la touche de fonction déparq (si vous connaissez le numéro de la ligne) ou afficher la liste des appels parqués et retirer cet appel de la liste. Pour retirer l’appel de la file d’attente si vous connaissez le numéro de la ligne : ÉTAPE 1 Appuyez sur la touche de fonction déparq. ÉTAPE 2 Entrez le numéro de la ligne de parcage (par exemple, le numéro entré à l’étape 2 de la procédure de parcage d'un appel). ÉTAPE 3 Appuyez sur comp. L’appel est pris sur votre téléphone. Pour afficher la liste des appels parqués (et retirer des appels de cette liste) : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Etat de la file d'attente. ÉTAPE 3 Choisissez l’appel parqué que vous souhaitez récupérer et appuyez sur déparq.Utilisation des fonctions de base du téléphone Conférence téléphonique à trois Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 53 3 Conférence téléphonique à trois Pour établir une conférence téléphonique, vous pouvez procéder comme suit : • Appeler les deux numéros et appuyer sur la touche de fonction conf. • Établir une conférence entre un appel actif et un appel en attente à l'aide de la touche de fonction confLX (non disponible sur le modèle Cisco SPA 501G) Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : Pour établir une conférence téléphonique : ÉTAPE 1 Appuyez sur la touche de fonction conf pendant un appel actif. Le premier appel est mis en attente, une deuxième ligne est ouverte et une tonalité se fait entendre. ÉTAPE 2 Composez le numéro de téléphone de la deuxième personne. ÉTAPE 3 Appuyez une nouvelle fois sur la touche de fonction conf. Les trois interlocuteurs sont alors connectés à la conférence téléphonique. Lorsque vous raccrochez, les deux autres interlocuteurs sont déconnectés. Cisco SPA 501G : ÉTAPE 1 Appuyez sur le bouton Conférence pendant un appel actif. Le premier appel est mis en attente, une deuxième ligne est ouverte et une tonalité se fait entendre. ÉTAPE 2 Composez le numéro de téléphone de la deuxième personne. ÉTAPE 3 Appuyez une nouvelle fois sur le bouton Conférence. Les trois interlocuteurs sont alors connectés à la conférence téléphonique. Lorsque vous raccrochez, les deux autres interlocuteurs sont déconnectés.Utilisation des fonctions de base du téléphone Utilisation des répertoires téléphoniques Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 54 3 Mise en place d'une conférence entre un appel en attente et un appel actif REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Si vous avez un appel en attente et un appel actif, vous pouvez établir une conférence entre l’appel actif, l’appel en attente et vous-même. Lorsque vous avez un appel actif et un ou plusieurs appels en attente, appuyez sur la touche de fonction confLx. • Si vous avez un seul appel en attente, la conférence est établie entre les deux appels et vous. • Si vous avez plusieurs appels en attente, choisissez celui qui doit participer à la conférence en appuyant sur le bouton de ligne correspondant. Utilisation des répertoires téléphoniques Les téléphones IP proposent plusieurs types de répertoires téléphoniques en fonction du modèle du téléphone et de la configuration effectuée par l’administrateur système. En règle générale, les téléphones fournissent les types de répertoires suivants : • Répertoire personnel : pour le stockage et la consultation des numéros couramment composés. Vous pouvez également composer les numéros à partir du répertoire. • Répertoire d’entreprise : liste des numéros de téléphone et des postes de la société. Selon la configuration du réseau téléphonique, vous pouvez avoir accès aux répertoires suivants : - Répertoire d'entreprise (LVS) - Répertoire LDAP REMARQUE (Non disponible sur le modèle Cisco SPA 501G.)Utilisation des fonctions de base du téléphone Utilisation des répertoires téléphoniques Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 55 3 Utilisation du répertoire personnel Pour accéder au répertoire personnel, appuyez sur la touche de fonction rép ou sur le bouton Configuration et sélectionnez Répertoire. Vous pouvez également consulter et modifier le répertoire à partir de votre ordinateur à l’aide de l’interface Web du téléphone IP. Reportez-vous à la section « Utilisation du répertoire personnel » à la page 85. Pour ajouter une nouvelle entrée au répertoire : ÉTAPE 1 Dans l’écran Répertoire, sélectionnez Nouvelle entrée et appuyez sur la touche de fonction ajout. ÉTAPE 2 Utilisez le clavier pour saisir le nom de l’entrée du répertoire. Appuyez à plusieurs reprises sur une touche chiffrée pour afficher une autre lettre correspondant à ce chiffre. Par exemple, pour entrer Mary, appuyez une fois sur le 6 et relâchez (M), une fois sur le 2 et relâchez (A), trois fois rapides sur le 7 et relâchez (R) et trois fois rapides sur le 9 et relâchez (Y). Utilisez les touches de fonction supCar pour supprimer des lettres, <<< et >>> pour vous déplacer d'un caractère vers la gauche ou la droite, et effacer pour effacer la totalité du nom. Lorsque le nom est entré, accédez au champ Numéro à l’aide du bouton de navigation. ÉTAPE 3 Entrez le numéro de téléphone, y compris les chiffres à composer pour accéder à une ligne extérieure et l’indicatif approprié si nécessaire. ÉTAPE 4 (Facultatif) Pour changer le type de sonnerie de l’appelant : a. Appuyez sur la touche de fonction option. b. Parcourez les différents types de sonneries. c. Appuyez sur la touche de fonction Jouer pour écouter la sonnerie sélectionnée ou sélect pour affecter cette sonnerie à la personne dont vous ajoutez le numéro au répertoire. ÉTAPE 5 Appuyez sur enreg pour enregistrer l'entrée.Utilisation des fonctions de base du téléphone Utilisation des répertoires téléphoniques Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 56 3 Utilisation du répertoire d’entreprise REMARQUE Selon votre fournisseur de services téléphoniques Internet ou la configuration du réseau de l’entreprise, il est possible que vous ne disposiez d’aucun répertoire d’entreprise. Pour utiliser le répertoire d’entreprise : ÉTAPE 1 Appuyez sur la touche de fonction rép ou bien appuyez sur le bouton Configuration et sélectionnez Répertoirey. ÉTAPE 2 Sélectionnez Nouvelle entrée. ÉTAPE 3 Sélectionnez une entrée et appuyez sur la touche de fonction comp. Appuyez sur annul pour quitter. Pour utiliser le répertoire LDAP : ÉTAPE 1 Appuyez sur la touche de fonction rép ou bien appuyez sur le bouton Configuration et sélectionnez Répertoires. ÉTAPE 2 Accédez à Nom de répertoire LDAP et appuyez sur Sélect. REMARQUE Le nom du répertoire est configuré par l’administrateur du système téléphonique et peut varier. ÉTAPE 3 Renseignez les champs et appuyez sur recher.. ÉTAPE 4 Dans les résultats, appuyez sur Compos pour composer le numéro ou sélectionnez l'une des autres options disponibles.Utilisation des fonctions de base du téléphone Utilisation des listes de l'historique des appels Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 57 3 Utilisation des listes de l'historique des appels Vous pouvez également consulter les listes de l’historique des appels à partir de votre ordinateur à l’aide de l’interface Web du téléphone IP. Reportez-vous à la section « Consultation des listes de l'historique des appels » à la page 85. REMARQUE L'interface Web permet également de consulter les listes de l'historique des appels pour le Cisco SPA 501G. Consultation des listes de l’historique des appels Pour consulter les listes de l’historique des appels : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Historique des appels. ÉTAPE 3 Sélectionnez la liste à afficher. Les listes de l’historique des appels suivantes sont disponibles : • Liste de rappel : affiche les 60 derniers numéros composés depuis le téléphone. • Appels pris : affiche l’identifiant des appelants des 60 derniers appels auxquels vous avez répondu. • Appels manqués : affiche les 60 derniers appels manqués.Utilisation des fonctions de base du téléphone Utilisation des listes de l'historique des appels Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 58 3 Appel à partir des listes de l’historique des appels Pour composer un numéro à partir d'une liste de l'historique des appels : ÉTAPE 1 Sélectionnez l’appel. ÉTAPE 2 Appuyez sur comp. REMARQUE Si l’appel provient d’un numéro interurbain, vous pouvez être amené à modifier le numéro avant de pouvoir le composer. Appuyez sur la touche de fonction Modif pour modifier l'appel et effectuez votre modification à l'aide des boutons de fonction et du clavier. Suppression d’un numéro d’une liste d’historique des appels ÉTAPE 1 Sélectionnez un appel dans la liste des rappels, des appels reçus ou des appels manqués. ÉTAPE 2 Appuyez sur suppre. ÉTAPE 3 Appuyez sur OK. Enregistrement d’un numéro d’une liste d’historique des appels dans votre répertoire ÉTAPE 1 Sélectionnez un appel dans la liste des rappels, des appels reçus ou des appels manqués. ÉTAPE 2 À l'aide du bouton de navigation, déplacez-vous vers la droite pour accéder à d'autres boutons de fonction et appuyez sur enreg. ÉTAPE 3 Modifiez les informations si nécessaire et appuyez une nouvelle fois sur enreg. L’entrée est ajoutée à votre répertoire.Utilisation des fonctions de base du téléphone Définition ou modification d’un mot de passe de téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 59 3 Définition ou modification d’un mot de passe de téléphone Vous pouvez définir ou modifier le mot de passe de votre téléphone pour empêcher toute utilisation non autorisée. Pour définir un mot de passe pour le téléphone : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Définir le mot de passe. ÉTAPE 3 Entrez un mot de passe numérique. Entrez une deuxième fois le même mot de passe. ÉTAPE 4 Appuyez sur enreg. Accès à la messagerie vocale Pour accéder à la messagerie vocale, appuyez sur le bouton Messages du téléphone. L'administrateur système doit configurer votre téléphone avec le numéro de messagerie vocale approprié pour que vous accédiez automatiquement à votre système de messagerie vocale en appuyant sur le bouton Messages. Pour modifier le numéro de votre messagerie vocale (par exemple, si votre téléphone ne fait pas partie d’un système vocal Cisco SPA 9000 et si vous disposez d’une messagerie vocale externe), procédez comme suit : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Accédez à la Messagerie vocale et appuyez sur sélect. ÉTAPE 3 Entrez le numéro à composer pour la messagerie vocale. Pour un système vocal Cisco SPA 9000, il s'agit normalement de « vmm ». Pour un système externe, entrez le numéro de téléphone, y compris les numéros à composer pour accéder à une ligne extérieure.Utilisation des fonctions de base du téléphone Accès à la messagerie vocale Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 60 3 CONSEIL Pour effacer le contenu du champ, appuyez sur effacer. Pour entrer des lettres, appuyez sur le bouton de navigation droit pour faire défiler l'affichage, puis appuyez sur la touche de fonction alpha. ÉTAPE 4 Appuyez sur enreg.4 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 61 Utilisation des fonctionnalités avancées du téléphone Ce chapitre explique comment configurer les fonctionnalités avancées du téléphone IP. Il comprend les sections suivantes : • Configuration des fonctions de confidentialité et de sécurité, page 62 • Création de numérotations rapides, page 65 • Utilisation de la numérotation rapide, page 66 • Utilisation de la fonction de radiomessagerie, page 67 • Contrôle d’un autre téléphone et accès à celui-ci depuis votre téléphone, page 68 • Personnalisation de l’écran LCD, page 68 • Utilisation des sonneries, page 71 • Configuration de la date et de l’heure du téléphone, page 72 • Utilisation des codes étoile, page 73 • Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G, page 75 • Procédures avancées destinées au personnel de l’assistance technique, page 78Utilisation des fonctionnalités avancées du téléphone Configuration des fonctions de confidentialité et de sécurité Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 62 4 Configuration des fonctions de confidentialité et de sécurité Vous pouvez également configurer ces fonctions à l’aide de votre ordinateur ou de l’interface Web du téléphone IP. Reportez-vous aux sections « Blocage de l'ID de l'appelant » à la page 84 et « Blocage des appels anonymes » à la page 84. REMARQUE Pour le modèle Cisco SPA 501G, vous devez configurer ces fonctions à l'aide de l'interface Web du téléphone IP ou de codes étoile (voir ci-dessous). Blocage de l’ID de l’appelant Vous pouvez bloquer l’ID de l’appelant sur votre téléphone afin que la personne que vous appelez ne puisse pas voir votre numéro de téléphone. À l’aide du bouton Configuration : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Bloque l'identification de l'appelant et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n et choisissez oui. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg. À l’aide du code étoile : Appuyez sur *67 avant de composer le numéro. (Appuyez sur *68 pour désactiver le blocage.) Blocage des appels anonymes Le blocage des appels anonymes refuse les appels dont l’ID de l’appelant est inconnu (par exemple, si un appelant a configuré son téléphone pour que son ID d’appelant n’apparaisse pas, l’appel est considéré comme anonyme). L’appelant entend un signal ou un message indiquant que la ligne est occupée.Utilisation des fonctionnalités avancées du téléphone Configuration des fonctions de confidentialité et de sécurité Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 63 4 À l’aide du bouton Configuration : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Bloquer les appels anonymes et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n et choisissez oui. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg. À l’aide du code étoile : Appuyez sur *77. Vous devez appuyer sur *87 pour désactiver le rejet des appels anonymes. Utilisation de l'appel sécurisé La fonction d'appel sécurisé permet de crypter l'appel actif pour éviter les écoutes. Avant d'activer la fonction d'appel sécurisé, vérifiez auprès de votre opérateur si elle est disponible. À l'aide du bouton Configuration (ne s'applique pas au modèle Cisco SPA 501G) : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 SélectionnezAppel sécurisé et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n et choisissez oui. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg. Lorsque vous composez un numéro, vous entendez une tonalité avant l’appel.Utilisation des fonctionnalités avancées du téléphone Activation de l’assistance à la numérotation Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 64 4 À l’aide de codes étoile : • *16 active la fonction d'appel sécurisé pour tous les appels. • *18 active la fonction d'appel sécurisé pour un seul appel. Pour désactiver la fonction d'appel sécurisé : • *16 désactive la fonction d'appel sécurisé pour tous les appels. • *18 désactive la fonction d'appel sécurisé pour un seul appel. Activation de l’assistance à la numérotation Si vous activez l’assistance à la numérotation, lorsque vous passez des appels, l’écran LCD affiche les numéros correspondants du répertoire et des listes d’historique des appels. REMARQUE Cette fonction n'est pas disponible sur le modèle Cisco SPA 501G. Pour activer l’assistance à la numérotation : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Préférences de numérotation et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n et choisissez oui. ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg. Si l'assistance à la numérotation est activée lorsque vous passez des appels, utilisez le bouton de navigation pour parcourir la liste des numéros sur l'écran LCD, sélectionnez un numéro, puis appuyez sur comp pour le composer. Utilisation des fonctionnalités avancées du téléphone Création de numérotations rapides Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 65 4 Création de numérotations rapides Vous pouvez configurer différents types de numérotations rapides : • Vous pouvez affecter un bouton de ligne disponible sur votre téléphone à la numérotation rapide. • Selon la configuration des postes et le nombre de boutons de ligne du téléphone, vous pouvez définir jusqu'à 7 numérotations rapides sur les boutons de ligne. • Si une numérotation rapide est affectée à un numéro, ce numéro est composé automatiquement lorsque vous appuyez sur la touche correspondante. Vous pouvez définir jusqu'à 8 numérotations rapides de ce type. Il peut s’agir d’un numéro de téléphone, d’une adresse IP ou d’une URL. Vous pouvez créer et modifier des numérotations rapides au moyen de votre ordinateur et de l’interface Web pour téléphone IP. Reportez-vous à la section « Création de numérotations rapides » à la page 86. REMARQUE Pour le modèle Cisco SPA 501G, créez les numérotations rapides à l'aide de l'interface Web du téléphone IP. Création de numérotations rapides sur des boutons de ligne disponibles ÉTAPE 1 Appuyez sur un bouton de ligne inutilisé et maintenez-le enfoncé pendant trois secondes. La fenêtre Définir numérot. abrégée s’affiche. ÉTAPE 2 Entrez le nom de la numérotation rapide. ÉTAPE 3 Appuyez sur la touche Flèche descendante pour accéder au champ de saisie du numéro de téléphone. Entrez le numéro de téléphone et appuyez sur Enreg.. ÉTAPE 4 Une fois créée, la numérotation rapide s'affiche en regard du bouton de ligne. Appuyez sur ce bouton pour utiliser la numérotation rapide.Utilisation des fonctionnalités avancées du téléphone Utilisation de la numérotation rapide Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 66 4 REMARQUE Pour les modèles Cisco SPA 501G et Cisco SPA 502G, l'administrateur du système téléphonique peut utiliser l'interface Web pour affecter des numérotations rapides aux boutons de ligne disponibles. Cette fonction administrative est accessible à partir des pages Admin > Configuration avancée. Création de numérotations rapides numériques ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Numérotation rapide. ÉTAPE 3 Pour créer une nouvelle numérotation rapide, faites défiler pour sélectionner une numérotation rapide inutilisée (marquée Not Assigned) Pour modifier une numérotation rapide existante, sélectionnez-la. ÉTAPE 4 Appuyez sur éditer. ÉTAPE 5 Entrez le numéro à affecter à la numérotation rapide et appuyez sur ok. Utilisation de la numérotation rapide Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : Pour appeler l'un des numéros de numérotation rapide que vous avez configurés, effectuez l'une des opérations suivantes : • Prenez une ligne et appuyez à l'aide du clavier sur le numéro correspondant à la numérotation rapide, puis appuyez sur Compos. • Appuyez sur le bouton Configuration, sélectionnez Numérotation rapide, choisissez le numéro et appuyez sur Compos. Cisco SPA 504G, SPA508G, SPA509G : Appuyez sur le bouton de ligne inutilisé configuré pour la numérotation rapide. Cisco SPA 501G : Sur le clavier, appuyez sur le numéro correspondant à la numérotation rapide et attendez quelques secondes.Utilisation des fonctionnalités avancées du téléphone Utilisation de la fonction de radiomessagerie Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 67 4 Utilisation de la fonction de radiomessagerie Le téléphone IP peut répondre automatiquement à des contacts provenant d'autres téléphones IP Cisco du système vocal Cisco SPA 9000. Lorsque votre téléphone reçoit un appel par radiomessagerie, il émet une série de signaux sonores et la communication audio bilatérale est établie avec le téléphone de l’appelant. Vous n'êtes pas obligé d'accepter ce type d'appel. REMARQUE Pour utiliser cette fonctionnalité, votre téléphone doit appartenir au réseau d'un système vocal Cisco SPA 9000. Appel d'un autre téléphone par radiomessagerie Pour appeler un autre téléphone par radiomessagerie, composez le *96 et le poste du téléphone concerné. Si le téléphone que vous appelez par radiomessagerie n'est pas configuré pour y répondre automatiquement, l'appel sonne comme un appel vocal standard. Appel d'un groupe de téléphones par radiomessagerie L'administrateur de votre système téléphonique peut configurer un groupe de téléphones que vous pouvez appeler simultanément par radiomessagerie. Chaque groupe de radiomessagerie est associé à un numéro. Votre administrateur doit vous indiquer les numéros des groupes configurés. Pour appeler un groupe par radiomessagerie, composez le *96 et le numéro du groupe. Configuration de la réponse automatique Pour configurer votre téléphone pour qu'il réponde aux appels par radiomessagerie : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Page Réponse automatique et appuyez sur éditer. ÉTAPE 4 Appuyez sur o/n et choisissez oui.Utilisation des fonctionnalités avancées du téléphone Contrôle d’un autre téléphone et accès à celui-ci depuis votre téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 68 4 ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg. Contrôle d’un autre téléphone et accès à celui-ci depuis votre téléphone L'administrateur système peut configurer votre téléphone de sorte que vous puissiez contrôler le téléphone d'un autre utilisateur depuis votre téléphone. Si cette fonctionnalité est configurée, certains boutons de ligne de votre téléphone sont assignés pour afficher l’état des téléphones d’autres utilisateurs. Par exemple, si la ligne 4 est configurée pour afficher la ligne de Laurent, la couleur des DEL indique l'état de cette ligne : • Vert : la ligne est inactive. • Rouge (lumière continue) : la ligne est active ou en cours d’utilisation. • Rouge (lumière clignotante) : la ligne sonne. • Orange (lumière continue) : la ligne n’est pas enregistrée (inutilisable). • Orange (lumière clignotante) : la ligne n’est pas configurée correctement. Par ailleurs, si l'administrateur système a configuré cette fonctionnalité, vous pouvez appuyer sur ce même bouton de ligne (4) pour appeler le poste de Laurent ou prendre un appel sonnant sur son poste. REMARQUE Ne s'applique pas au modèle Cisco SPA 502G. Personnalisation de l’écran LCD REMARQUE Non disponible sur le modèle Cisco SPA 501G. Vous pouvez personnaliser l’écran LCD de plusieurs manières.Utilisation des fonctionnalités avancées du téléphone Personnalisation de l’écran LCD Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 69 4 Modification du contraste de l’écran LCD Vous pouvez également modifier le contraste de l’écran LCD à partir de votre ordinateur à l’aide de l’interface Web du téléphone IP. Reportez-vous à la section « Modification du contraste de l'écran LCD » à la page 88. Pour régler le contraste de l’écran LCD : ÉTAPE 1 Appuyez sur le bouton Configuration, accédez à LCD Contrast, sélectionnez cette option et appuyez sur le bouton sélect. ÉTAPE 2 Utilisez le bouton de navigation pour régler le contraste de l’écran. Appuyez sur le bouton de navigation gauche pour diminuer le contraste et sur le bouton de navigation droit pour l’augmenter. ÉTAPE 3 Appuyez sur enreg. Modification des paramètres de rétroéclairage de l'écran Le rétroéclairage de l'écran est automatiquement désactivé après une période donnée. Vous pouvez modifier cette période pour prolonger la durée du rétroéclairage ou pour que ce dernier soit toujours activé. ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Préférences. ÉTAPE 3 Sélectionnez Délai rétroéclairage et appuyez sur éditer. ÉTAPE 4 Appuyez sur Option pour sélectionner le réglage souhaité : • 10 secondes • 20 secondes • 30 secondes • always on ÉTAPE 5 Appuyez sur OK. ÉTAPE 6 Appuyez sur enreg.Utilisation des fonctionnalités avancées du téléphone Personnalisation de l’écran LCD Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 70 4 Configuration de l’économiseur d’écran du téléphone Vous pouvez activer l’économiseur d’écran du téléphone et préciser son apparence et la période d’inactivité au bout de laquelle il doit s’afficher. Certaines options peuvent être configurées à partir de votre ordinateur à l’aide de l’interface Web du téléphone IP. Reportez-vous à la section « Configuration de l'économiseur d'écran du téléphone » à la page 88. Pour configurer l’économiseur d’écran : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Mode économiseur d'écran. Pour activer l’économiseur d’écran : ÉTAPE 1 Dans Mode économiseur d'écran, sélectionnez Activer économ. écran et appuyez sur éditer. ÉTAPE 2 Appuyez sur o/n et choisissez oui. ÉTAPE 3 Appuyez sur OK. ÉTAPE 4 Appuyez sur enreg. Pour indiquer le délai avant l’activation de l’économiseur d’écran lorsque le téléphone est inactif : ÉTAPE 1 Dans Mode économiseur d'écran, sélectionnez Délai d'attente économiseur d'écran et appuyez sur éditer. ÉTAPE 2 Entrez le délai en secondes avant le démarrage de l'économiseur d'écran. ÉTAPE 3 Appuyez sur OK. ÉTAPE 4 Appuyez sur enreg.Utilisation des fonctionnalités avancées du téléphone Utilisation des sonneries Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 71 4 Pour modifier l’image de l’économiseur d’écran : ÉTAPE 1 Dans Mode économiseur d'écran, sélectionnez Icône économiseur d'écran et appuyez sur éditer. ÉTAPE 2 Appuyez sur option à plusieurs reprises pour faire défiler les options disponibles et sélectionner celle qui vous convient. Les options sont les suivantes : • Image de fond : affiche l’image de fond du téléphone. • DuréeStation : affiche l’ID de la station et l’heure sur l’image. • Verrou : affiche un verrou sur l’image. • Téléphone : affiche un téléphone sur l’image. • Date/Heure : affiche la date et l’heure sur l’image. ÉTAPE 3 Appuyez sur OK. ÉTAPE 4 Appuyez sur enreg. Activation de l’économiseur d’écran Pour activer immédiatement l’économiseur d’écran du téléphone : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Accédez à Mode économiseur d'écran et appuyez sur activ. (L’activation immédiate de l’économiseur d’écran n’est disponible que si la fonctionnalité correspondante est activée.) Utilisation des sonneries REMARQUE Non disponible sur le modèle Cisco SPA 501G. Chaque poste du téléphone peut avoir une sonnerie différente. Vous pouvez également créer vos propres sonneries.Utilisation des fonctionnalités avancées du téléphone Configuration de la date et de l’heure du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 72 4 Modification de la sonnerie Pour modifier une sonnerie : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Sonnerie. ÉTAPE 3 Sélectionnez le poste pour lequel vous souhaitez définir une sonnerie et appuyez sur changer. ÉTAPE 4 Faites défiler les sonneries et appuyez sur Jouer pour écouter la sonnerie en surbrillance. Appuyez sur sélect pour attribuer la sonnerie en surbrillance au poste. Configuration de la date et de l’heure du téléphone Réglage de la date et de l’heure du téléphone La date et l’heure de votre téléphone sont généralement définies par le serveur proxy SIP ou le serveur NTP. Cependant, vous pouvez procéder comme suit pour les modifier : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Sélectionnez Heure/date. ÉTAPE 3 Saisissez la date au format jj*mm*aa (elle s’affiche sous la forme j/m). ÉTAPE 4 Saisissez l’heure au format hh*mm*ss (elle s’affiche sous la forme h:mm). ÉTAPE 5 Si l'heure ne s'affiche pas correctement au format am (a) ou pm (p), vous pouvez l'ajuster à l'aide de l'option de décalage. Pour passer de a.m. à p.m., saisissez *12*00*00. Pour passer de p.m. à a.m., saisissez #12*00*00. ÉTAPE 6 Appuyez sur enreg. Vous pouvez définir une seule de ces options, si nécessaire.Utilisation des fonctionnalités avancées du téléphone Utilisation des codes étoile Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 73 4 Utilisation des codes étoile Le téléphone IP peut prendre en charge plusieurs codes étoile pour accéder à des services supplémentaires du téléphone. Vous devez saisir ces codes, qui commencent avec un astérisque (*), avant de composer un numéro de téléphone et d’accéder à ces services. Par exemple, pour bloquer l’ID de l’appelant (code étoile 67), vous devez composer le *67, puis le numéro de téléphone de votre correspondant. La liste des codes étoile courants est présentée ci-dessous. Il est possible que certains codes ne soient pas disponibles ; consultez votre administrateur système pour en savoir plus. Code Définition 16 Active la fonction d'appel sécurisé pour tous les appels.* Reportez-vous à Utilisation de l'appel sécurisé, page 63. 17 Désactive la fonction d'appel sécurisé pour tous les appels.* Reportez-vous à Utilisation de l'appel sécurisé, page 63. 18 Active la fonction d'appel sécurisé pour un seul appel.* Reportez-vous à Utilisation de l'appel sécurisé, page 63. 19 Désactive la fonction d'appel sécurisé pour un seul appel.* Reportez-vous à Utilisation de l'appel sécurisé, page 63. 36 Permet de prendre un appel qui sonne sur un autre poste.* Reportez-vous à Prise d’appel, page 51. 37 Permet de prendre un appel de groupe.* Reportez-vous à Prise d’appel, page 51. 38 Permet de parquer un appel.* Reportez-vous à Parcage d'un appel, page 51. 39 Permet de retirer un appel de la file d'attente.* Reportez-vous Parcage d'un appel, page 51. 56 Active la fonction d'appel en attente. Reportez-vous à Activation et désactivation de la fonction d'appel en attente, page 50. 57 Désactive la fonction d'appel en attente. Reportez-vous à Activation et désactivation de la fonction d'appel en attente, page 50.Utilisation des fonctionnalités avancées du téléphone Utilisation des codes étoile Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 74 4 66 Active la fonction de rappel. Le téléphone IP compose régulièrement un numéro occupé jusqu’à ce que l’appel sonne ou que le correspondant décroche, puis vous informe que l’appel est effectué. 67 Bloque l’ID de l’appelant. Reportez-vous à Blocage de l’ID de l’appelant, page 62. 68 Débloque l’ID de l’appelant. Reportez-vous à Blocage de l’ID de l’appelant, page 62. 69 Appelle le dernier numéro composé sur le téléphone. 70 Désactive la fonction d'appel en attente pour un seul appel. Reportez-vous à Activation et désactivation de la fonction d'appel en attente, page 50. 71 Active la fonction d'appel en attente pour un seul appel. Reportez-vous à Activation et désactivation de la fonction d'appel en attente, page 50. 72 Active le renvoi de tous les appels. Reportez-vous à Renvoi d'appel, page 45. 73 Désactive le renvoi de tous les appels. Reportez-vous à Renvoi d'appel, page 45. 77 Active le blocage des appels anonymes. Reportez-vous à Blocage des appels anonymes, page 62. 78 Active la fonctionnalité Ne pas déranger. Reportez-vous à Configuration de la fonction Ne pas déranger, page 48. 79 Désactive la fonctionnalité Ne pas déranger. Reportez-vous à Configuration de la fonction Ne pas déranger, page 48. 86 Désactive le rappel. 87 Désactive le blocage des appels anonymes. Reportez-vous à Blocage des appels anonymes, page 62. 90 Active le renvoi d'appel lorsque la ligne est occupée. Reportez-vous à Renvoi d'appel, page 45. 91 Désactive le renvoi d'appel lorsque la ligne est occupée. Reportez-vous à Renvoi d'appel, page 45. 92 Active le renvoi des appels manqués. Reportez-vous à Renvoi d'appel, page 45. Code DéfinitionUtilisation des fonctionnalités avancées du téléphone Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 75 4 *Votre téléphone IP doit appartenir au réseau d'un système vocal Cisco SPA 9000. **Le poste contacté doit appartenir au réseau d'un système vocal Cisco SPA 9000. Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G Le modèle Cisco SPA 501G propose un menu Interactive Voice Response. Vous pouvez entrer des options et recevoir des informations sur le téléphone et sur son utilisation. Pour accéder au menu IVR : ÉTAPE 1 Appuyez sur le bouton Configuration. Entrez l'option IVR en appuyant sur les chiffres correspondant à l'option souhaitée, puis appuyez sur #. Certains menus nécessitent la saisie d’informations ou de numéros supplémentaires. Les options fréquemment utilisées sont répertoriées dans le tableau suivant : 93 Désactive le renvoi des appels manqués. Reportez-vous à Renvoi d'appel, page 45. 96 Appelle un poste par radiomessagerie.** Reportez-vous à Utilisation de la fonction de radiomessagerie, page 67. 98 Effectue un transfert direct. Transfert d’appel, page 41. Code Définition Numéro Option 100 Indique si le protocole DHCP est activé. 110 Affiche l’adresse IP du téléphone. 120 Affiche le masque de réseau du téléphone. 130 Affiche l’adresse de la passerelle. 140 Affiche l’adresse MAC (matérielle) du téléphone.Utilisation des fonctionnalités avancées du téléphone Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 76 4 150 Affiche la version du logiciel du téléphone. 160 Affiche l’adresse du serveur DNS principal. 170 Affiche le port HTTP d’écoute du serveur Web (par défaut le 80). 180 Affiche l’adresse de multidiffusions IP (utilisée pour la communication du système Cisco SPA 9000 avec le téléphone IP). 220 Affiche la méthode de contrôle des appels (SIP ou SPCP). 221 Définit le contrôle des appels (entrez la valeur correspondant à la méthode choisie et appuyez sur #) : • 0 : SIP • 1 : SPCP Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. 73738 Rétablit les paramètres et éléments logiciels par défaut du téléphone. Appuyez sur 1 pour confirmer ou sur * pour quitter. Si vous optez pour la réinitialisation, raccrochez le combiné pour quitter et lancer le processus de restauration. 87778 Rétablit les paramètres utilisateur par défaut du téléphone (supprime tous les paramètres utilisateur tels que les numérotations rapides). Appuyez sur 1 pour confirmer ou sur * pour quitter. Si vous optez pour la réinitialisation, raccrochez le combiné pour quitter et lancer le processus de restauration. 732668 Redémarre le téléphone. Appuyez sur #, puis raccrochez le combiné pour réamorcer le téléphone. 111 Définit une adresse IP statique. Entrez l'adresse (utilisez « * » pour entrer la valeur « . »), puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. REMARQUE Le protocole DHCP doit être désactivé pour l'utilisation de cette option. Si ce n'est pas le cas, un message d'erreur s'affiche. Numéro OptionUtilisation des fonctionnalités avancées du téléphone Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 77 4 121 Définit un masque de réseau. Entrez l'adresse (utilisez « * » pour entrer la valeur « . »), puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. REMARQUE Le protocole DHCP doit être désactivé pour l'utilisation de cette option. Si ce n'est pas le cas, un message d'erreur s'affiche. 131 Définit une passerelle. Entrez l'adresse (utilisez « * » pour entrer la valeur « . »), puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. REMARQUE Le protocole DHCP doit être désactivé pour l'utilisation de cette option. Si ce n'est pas le cas, un message d'erreur s'affiche. 161 Définit l'adresse du serveur DNS principal. Entrez l'adresse (utilisez « * » pour entrer la valeur « . »), puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. 181 Définit l'adresse de multidiffusion IP (utilisée pour la communication du système Cisco SPA 9000 avec le téléphone IP). Entrez l'adresse (utilisez « * » pour entrer la valeur « . »), puis appuyez sur #. Pour enregistrer, appuyez sur1. Pour vérifier la valeur saisie, appuyez sur 2. Pour entrer une nouvelle valeur, appuyez sur 3. Pour quitter, appuyez sur *. 7932 Active ou désactive le serveur Web. Appuyez sur 1 pour activer l'accès ou sur 0 pour le désactiver, puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. 723646 Active ou désactive l'accès administrateur sur l'interface Web. Appuyez sur 1 pour activer l'accès ou sur 0 pour le désactiver, puis appuyez sur #. Appuyez sur 1 pour enregistrer, sur 2 pour vérifier la valeur, sur 3 pour entrer une nouvelle valeur et sur * pour quitter. Numéro OptionUtilisation des fonctionnalités avancées du téléphone Procédures avancées destinées au personnel de l’assistance technique Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 78 4 Procédures avancées destinées au personnel de l’assistance technique ! AVERTISSEMENT Ces menus permettent de configurer le téléphone et le réseau téléphonique, et de résoudre les problèmes associés. Modifiez ces réglages et exécutez ces procédures uniquement si l'administrateur du système téléphonique vous y invite. Pour accéder aux menus avancés des modèles Cisco SPA 502G, SPA 504G, SPA 508G et SPA 509G, procédez comme suit. Pour le modèle Cisco SPA 501G, une grande partie de ces options est accessible à partir du système de réponse vocale interactif. Reportez-vous à la section « Utilisation du menu Interactive Voice Response sur le modèle Cisco SPA 501G » à la page 75. ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Vous avez le choix entre les options suivantes : • Réseau : ce paramètre permet de configurer et de dépanner le réseau. Vous ne devez modifier ces paramètres que si votre administrateur vous y invite car ces opérations peuvent modifier sérieusement les fonctions de votre téléphone. • Infos produit : ce paramètre affiche le nom du produit, le numéro de série, la version du logiciel, la version matérielle, l’adresse MAC et le certificat client. • Etat : ce paramètre affiche l’état du téléphone, le poste et les boutons de ligne. • Redémarrage : reportez-vous à Redémarrage du téléphone, page 79. • Redémarrage : redémarre le téléphone. • Paramètres d'usine par défaut : rétablit les paramètres d’usine du téléphone. ! AVERTISSEMENT Si vous choisissez Paramètres d'usine par défaut, le téléphone retrouvera ses paramètres d’usine d’origine et tous les paramètres actuels seront effacés, y compris le répertoire et les fichiers journaux des appels. Il est également possible que le numéro de poste du téléphone soit modifié.Utilisation des fonctionnalités avancées du téléphone Procédures avancées destinées au personnel de l’assistance technique Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 79 4 • Réinit personnalisée : rétablit les derniers profils de personnalisation du téléphone. • Langue : modifie la langue du téléphone (en fonction de la disponibilité et de la configuration réalisée par l’administrateur système). Redémarrage du téléphone Ce paramètre permet de configurer et de dépanner le réseau. Vous ne devez le modifier que si l'administrateur du système téléphonique vous y invite, car ces opérations peuvent affecter le fonctionnement de votre téléphone. Pour redémarrer le téléphone : Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509 : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Accédez à Redémarrage et appuyez sur sélect. ÉTAPE 3 Appuyez sur OK. Cisco SPA 501G : ÉTAPE 1 Appuyez sur le bouton Configuration. ÉTAPE 2 Dans le menu du système de réponse vocale interactif, entrez 732668 et appuyez sur #. ÉTAPE 3 Raccrochez le combiné pour lancer le redémarrage.5 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 80 Utilisation de l'interface Web L'interface Web du téléphone IP Cisco IP vous permet de configurer certaines fonctionnalités de votre téléphone à l'aide d'un navigateur Web. Ce chapitre contient les sections suivantes : • Connexion à l'interface Web, page 81 • Configuration de la fonction Ne pas déranger, page 82 • Configuration du renvoi d'appel, page 82 • Configuration de la fonction d'appel en attente, page 83 • Blocage de l'ID de l'appelant, page 84 • Blocage des appels anonymes, page 84 • Utilisation du répertoire personnel, page 85 • Consultation des listes de l'historique des appels, page 85 • Création de numérotations rapides, page 86 • Acceptation de messages texte, page 86 • Réglage du volume audio, page 87 • Modification du contraste de l'écran LCD, page 88 • Configuration de l'économiseur d'écran du téléphone, page 88Utilisation de l'interface Web Connexion à l'interface Web Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 81 5 Connexion à l'interface Web ÉTAPE 1 Obtenez l'adresse IP du téléphone : Cisco SPA 502G, SPA 504G, SPA 508G, SPA 509G : a. Appuyez sur le bouton Configuration. b. Accédez à Réseau, puis appuyez sur sélect. c. Accédez à IP actuelle. Il s'agit de l'adresse IP de votre téléphone. Cisco SPA 501G : a. Appuyez sur le bouton Configuration. b. Entrez 110 et appuyez sur #. L'adresse IP s'affiche. ÉTAPE 2 Ouvrez Internet Explorer sur votre ordinateur. ÉTAPE 3 Entrez l'adresse IP dans la barre d'outils du navigateur. L'interface Web comporte quatre onglets principaux : • Voice : contient des informations sur le téléphone et notamment les sousonglets suivants : - Info : contient des informations sur le système et le téléphone (lecture seule). - System : permet de configurer un mot de passe et des paramètres réseau. - Phone : permet d'activer l'économiseur d'écran. - User : contient les paramètres relatifs au renvoi d'appel, aux numérotations rapides, aux appels en attente, à la fonction de confidentialité et à l'audio. • Call History : affiche la liste des appels reçus et émis sur le téléphone. • Personal Directory : contient le carnet d'adresses personnel. • Attendant Console Status : fournit des informations sur les consoles Cisco SPA 500S, le cas échéant.Utilisation de l'interface Web Configuration de la fonction Ne pas déranger Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 82 5 Configuration de la fonction Ne pas déranger La fonctionnalité Ne pas déranger vous permet de couper la sonnerie du téléphone en cas d'appel entrant. Si la messagerie vocale est configurée, tous les appels entrants sont immédiatement dirigés vers la messagerie. Sinon, l'appelant entend un signal ou un message indiquant que la ligne est occupée. Pour activer la fonctionnalité Ne pas déranger : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, localisez le champ Do Not Disturb. ÉTAPE 4 Sélectionnez Yes pour activer la fonctionnalité Do Not Disturb. ÉTAPE 5 Au bas de la page, cliquez sur Submit All Changes. REMARQUE Vous pouvez désactiver la fonctionnalité Do Not Disturb à partir du téléphone ou de l’interface Web. Configuration du renvoi d'appel ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User.Utilisation de l'interface Web Configuration de la fonction d'appel en attente Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 83 5 ÉTAPE 3 Dans Call Forward, vous pouvez configurer les champs suivants : • CFWD All Dest : renvoie tous les appels vers le numéro indiqué. • CFWD Busy Dest : renvoie tous les appels vers un autre numéro lorsque le téléphone est occupé. Entrez le numéro vers lequel les appels doivent être renvoyés. • CFWD No Ans Dest : renvoie les appels vers un autre numéro en l'absence de réponse. Entrez le numéro vers lequel les appels doivent être renvoyés. • CFWD No Ans Delay : délai d'attente en secondes avant le renvoi des appels en l'absence de réponse sur votre téléphone. Entrez le délai en secondes. ÉTAPE 4 Au bas de la page, cliquez sur Submit All Changes. Configuration de la fonction d'appel en attente La fonction d'appel en attente vous informe pendant un appel qu'un deuxième appel est en cours en faisant sonner votre téléphone et en affichant un message d'état. Si vous désactivez cette fonction, les appels entrants ne sonnent pas sur votre téléphone si vous êtes déjà en ligne et l'appelant entend un signal ou un message indiquant que la ligne est occupée. Pour activer ou désactiver la fonction d'appel en attente : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, localisez le champ CW Setting. ÉTAPE 4 Sélectionnez yes ou no pour activer ou désactiver la fonction. ÉTAPE 5 Au bas de la page, cliquez sur Submit All Changes. Utilisation de l'interface Web Blocage de l'ID de l'appelant Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 84 5 Blocage de l'ID de l'appelant Vous pouvez bloquer l'ID de l'appelant sur votre téléphone afin que la personne que vous appelez ne puisse pas voir votre numéro de téléphone. Pour bloquer l'ID de l'appelant : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, localisez le champ Block CID Setting. ÉTAPE 4 Sélectionnez yes ou no pour activer ou désactiver la fonction. ÉTAPE 5 Au bas de la page, cliquez sur Submit All Changes. Blocage des appels anonymes Le blocage des appels anonymes refuse les appels dont l'ID de l'appelant est inconnu. Par exemple, si un appelant a configuré son téléphone pour que son ID n'apparaisse pas, l'appel est considéré comme anonyme. L'appelant entend un signal ou un message indiquant que la ligne est occupée. Pour bloquer les appels anonymes : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, localisez le champ Block ANC Setting. ÉTAPE 4 Sélectionnez yes ou no pour activer ou désactiver la fonction. ÉTAPE 5 Au bas de la page, cliquez sur Submit All Changes. Utilisation de l'interface Web Utilisation du répertoire personnel Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 85 5 Utilisation du répertoire personnel Le téléphone IP contient un répertoire dans lequel vous pouvez enregistrer et consulter les numéros que vous composez fréquemment. Vous pouvez composer les numéros directement depuis le répertoire, qui s'affiche sur l'écran du téléphone. REMARQUE Ceci ne s'applique pas au modèle Cisco SPA 501G. Pour consulter et modifier le répertoire personnel : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Cliquez sur l'onglet Personal Directory. Une fenêtre affiche les listes du répertoire personnel du téléphone. Pour créer une entrée dans le répertoire : ÉTAPE 1 Sélectionnez la ligne et entrez les informations au format suivant : n=Marketing;p=5045551212 où n indique le nom de l'entrée et p le numéro de téléphone (avec l'indicatif). ÉTAPE 2 Au bas de la page, cliquez sur Submit All Changes. Consultation des listes de l'historique des appels Pour afficher les listes de l'historique des appels : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Cliquez sur l'onglet Call History. Une fenêtre affiche les listes de l'historique des appels du téléphone. Ces fonctions comprennent : • Placed : affiche les 60 derniers numéros composés depuis le téléphone. • Answered : affiche l'identité des appelants des 60 derniers appels auxquels vous avez répondu.Utilisation de l'interface Web Création de numérotations rapides Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 86 5 • Missed : affiche les 60 derniers appels manqués. Cliquez sur l'onglet de chaque liste pour afficher la liste. Création de numérotations rapides Vous pouvez configurer jusqu'à 8 numérotations rapides pour les touches numérotées. Il peut s'agir d'un numéro de téléphone, d'une adresse IP ou d'une URL. Pour créer ou modifier une numérotation rapide numérique : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Speed Dial, entrez les numéros de numérotation rapide à créer ou à modifier. ÉTAPE 4 Cliquez sur Submit All Changes. Acceptation de messages texte Votre téléphone peut accepter des messages texte provenant d'autres téléphones IP ou services. Pour accepter des messages texte d'autres téléphones IP : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, définissez le champ Text Message sur yes. ÉTAPE 4 Cliquez sur Submit All Changes. Utilisation de l'interface Web Réglage du volume audio Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 87 5 Pour accepter des messages texte d'un tiers : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Supplementary Services, définissez le champ Text Message from 3d Party sur yes. ÉTAPE 4 Cliquez sur Submit All Changes. Réglage du volume audio ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. Dans Audio Volume, vous pouvez régler les paramètres suivants : • Volume de la sonnerie • Volume du haut-parleur • Volume du combiné • Volume du casque Entrez une valeur comprise entre1 et 10, 1 correspondant au volume le plus bas. ÉTAPE 3 Cliquez sur Submit All Changes.Utilisation de l'interface Web Modification du contraste de l'écran LCD Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 88 5 Modification du contraste de l'écran LCD REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet User. ÉTAPE 3 Dans Audio Volume, vous pouvez régler le volume audio en saisissant une valeur comprise entre1 et 10, 1 correspondant au volume le plus bas. ÉTAPE 4 Cliquez sur Submit All Changes. Configuration de l'économiseur d'écran du téléphone REMARQUE Ne s'applique pas au modèle Cisco SPA 501G. Pour configurer l'économiseur d'écran du téléphone : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Dans l'onglet Voice, cliquez sur le sous-onglet Phone. Dans General, vous pouvez configurer les options suivantes : • Screen Saver Enable : permet d'activer et de désactiver l'économiseur d'écran. • Screen Saver Wait : permet de définir le délai d'attente en secondes avant le démarrage de l'économiseur d'écran lorsque le téléphone est inactif. • Icône Screen Saver : définit le type d'affichage : - Une image de fond. - L'heure de la station au centre de l'écran.Utilisation de l'interface Web Configuration de l'économiseur d'écran du téléphone Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 89 5 - Une icône représentant un verrou qui se déplace sur l'écran. Lorsque le téléphone est verrouillé, le message « Press any key to unlock your phone » défile dans la ligne d'état. - Une icône représentant un téléphone qui se déplace sur l'écran. - La date et l'heure de la station au centre de l'écran. ÉTAPE 3 Cliquez sur Submit All Changes.6 Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 90 Utilisation de la console de réception Cisco SPA 500S Ce chapitre explique comment installer et utiliser la console de réception Cisco SPA 500S avec le téléphone IP. Figure 1 Console de réception Cisco SPA 500SUtilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 91 6 La console de réception Cisco SPA 500S pour les téléphones IP Cisco SPA 500 est dotée de 32 boutons et 32 DEL programmables 3 couleurs (rouge, vert, orange) et prend en charge le tableau de voyants d’occupation Broadsoft et le contrôle des lignes Asterisk. La console Cisco SPA 500S se fixe au téléphone IP avec le bras de fixation fourni. Elle est alimentée directement par le téléphone IP et ne nécessite pas d'alimentation séparée. Vous pouvez relier deux unités Cisco SPA 500S à un même téléphone IP, ce qui vous donne la possibilité de contrôler 64 lignes distinctes au total. Connexion de la console de réception Cisco SPA 500S au téléphone IP Pour connecter la console de réception Cisco SPA 500S au téléphone IP, munissez-vous des éléments suivants : • Console de réception Cisco SPA 500S • Bras de fixation • Deux (2) vis de fixation • Câble d'interconnexion auxiliaire • SupportUtilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 92 6 Connexion d'une seule console Cisco SPA 500S ÉTAPE 1 Retournez le téléphone IP et la console Cisco SPA 500S. ÉTAPE 2 Alignez le trou de vis dans le téléphone IP avec l'un des trous sur le bras de fixation. ÉTAPE 3 Insérez les tiges situées sur le bras de fixation dans les trous correspondants sur le téléphone IP.Utilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 93 6 ÉTAPE 4 Fixez le bras de fixation au téléphone IP à l'aide de la vis du bras de fixation. ÉTAPE 5 Alignez le trou de vis droit dans la console Cisco SPA 500S avec le trou inutilisé sur le bras de fixation. ÉTAPE 6 Insérez les tiges situées sur le bras de fixation dans les trous correspondants sur la console Cisco SPA 500S.Utilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 94 6 ÉTAPE 7 Fixez le bras de fixation à la console Cisco SPA 500S à l'aide de la vis du bras de fixation. ! AVERTISSEMENT Ne branchez pas de câble téléphonique sur le port AUX. Utilisez uniquement le câble auxiliaire fourni avec la console Cisco SPA 500S. ÉTAPE 8 Localisez le port AUX IN à l'arrière de la console Cisco SPA 500S. Connectez l'une des extrémités du câble auxiliaire à ce port. ÉTAPE 9 Localisez le port AUX à l'arrière du téléphone IP. Connectez l'autre extrémité du câble auxiliaire à ce port. La console Cisco SPA 500S est alimentée par le câble auxiliaire relié au téléphone IP ; aucune source d'alimentation supplémentaire n'est requise.Utilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 95 6 ÉTAPE 10 Faites passer le câble auxiliaire dans le canal de passage du câble de la console Cisco SPA 500S. ÉTAPE 11 Fixez le support de bureau approprié à chaque unité.Utilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 96 6 Connexion d'une deuxième console Cisco SPA 500S Vous pouvez connecter deux consoles de réception Cisco SPA 500S à un téléphone IP Cisco SPA 500. Les instructions de cette section vous permettent de connecter une deuxième console Cisco SPA 500S. Si vous n'avez pas l'intention de connecter une deuxième console Cisco SPA 500S, passez à « Configuration de la console Cisco SPA 500S » à la page 98. ÉTAPE 1 Fixez la première console Cisco SPA 500S au téléphone IP et connectez le câble auxiliaire comme décrit dans la section « Connexion de la console de réception Cisco SPA 500S au téléphone IP » à la page 91. ÉTAPE 2 Alignez le trou de vis gauche dans la première console Cisco SPA 500S avec l'un des trous du bras de fixation. ÉTAPE 3 Insérez les tiges situées sur le bras de fixation dans les trous correspondants sur la console Cisco SPA 500S. ÉTAPE 4 Fixez le bras de fixation à la première console Cisco SPA 500S à l'aide de la vis du bras de fixation. ÉTAPE 5 Insérez les tiges situées sur le bras de fixation dans les trous correspondants sur la console Cisco SPA 500S. Utilisation de la console de réception Cisco SPA 500S Connexion de la console de réception Cisco SPA 500S au téléphone IP Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 97 6 ÉTAPE 6 Fixez le bras de fixation à la deuxième console Cisco SPA 500S à l'aide de la vis du bras de fixation. ! AVERTISSEMENT Ne branchez pas de câble téléphonique sur le port AUX. Utilisez uniquement le câble auxiliaire fourni avec la console Cisco SPA 500S. ÉTAPE 7 Localisez le port AUX OUT à l'arrière de la première console Cisco SPA 500S. Connectez l'une des extrémités du câble auxiliaire à ce port. ÉTAPE 8 Localisez le port AUX IN à l'arrière de la deuxième console Cisco SPA 500S. Connectez l'autre extrémité du câble auxiliaire à ce port. ÉTAPE 9 Faites passer le câble auxiliaire dans le canal de passage du câble. La console Cisco SPA 500S est alimentée par le câble auxiliaire relié au téléphone IP ; aucune source d'alimentation supplémentaire n'est requise. ÉTAPE 10 Fixez les supports de bureau appropriés à chaque unité.Utilisation de la console de réception Cisco SPA 500S Configuration de la console Cisco SPA 500S Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 98 6 Configuration de la console Cisco SPA 500S Vous pouvez configurer la console Cisco SPA 500S pour vous permettre d'accéder facilement à d'autres lignes téléphoniques du système. Par exemple, vous pouvez configurer les boutons de la console Cisco SPA 500S pour contrôler un autre poste, composer rapidement un numéro, transférer des appels vers un autre poste, etc. REMARQUE Les options disponibles sur la console Cisco SPA 500S dépendent de la configuration du système téléphonique. Il est possible que votre système téléphonique ne propose pas toutes les fonctionnalités mentionnées dans ce document. La configuration de la console Cisco SPA 500S et l'attribution des boutons de ligne sont effectuées par l'administrateur système et ne sont pas décrites dans ce document. Pour configurer la console Cisco SPA 500S : • Si la console Cisco SPA 500S et le téléphone IP associé font partie d'un système vocal Cisco SPA 9000, nous vous recommandons d'utiliser l'assistant d'installation de ce système. Les instructions d’utilisation de l’assistant sont disponibles dans le document System Configuration Using the SPA 9000 Setup Wizard sur le site Cisco.com. Reportez-vous à l'Annexe A, « Pour en savoir plus » pour obtenir le lien vers ce document. • Pour configurer manuellement la console Cisco SPA 500S à l'aide de l'interface utilisateur Web du téléphone IP associé, consultez le document Cisco SPA 500 Series and Wireless IP Phone Administration Guide sur le site Cisco.com. Reportez-vous à l'Annexe A, « Pour en savoir plus » pour obtenir le lien vers ce document. • Si vous utilisez la console Cisco SPA 500S et le téléphone IP associé avec un serveur Broadsoft ou Asterisk, consultez le document Cisco SPA 500 Series and Wireless IP Phone Administration Guide sur le site Cisco.com. Reportez-vous à l'Annexe A, « Pour en savoir plus » pour obtenir le lien vers ce document.Utilisation de la console de réception Cisco SPA 500S Utilisation de la console Cisco SPA 500S Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 99 6 Utilisation de la console Cisco SPA 500S Les fonctions des boutons Cisco SPA 500S peuvent varier selon la configuration. Cependant, vous pouvez en général : • Contrôler un poste en examinant sa couleur. La couleur de la DEL d’un bouton de ligne donne des indications sur la ligne : - Vert : la ligne est inactive. - Rouge (fixe) : la ligne est en cours d'utilisation. - Rouge (clignotant) : la ligne sonne. - Orange (fixe) : la ligne n'est pas enregistrée ; la connexion du téléphone pose problème. - Orange (clignotant) : la ligne n'est pas configurée correctement. - Éteinte : la ligne n'est pas configurée. • Transférer un appel actif en appuyant sur le bouton de ligne sur la console Cisco SPA 500S. (Le bouton de ligne doit être configuré en tant que numérotation rapide pour le numéro vers lequel vous transférez l'appel.) • Composer un poste configuré en appuyant sur le bouton de ligne vert sur la console Cisco SPA 500S. • Prendre un appel qui sonne sur le poste en appuyant sur le bouton de ligne rouge clignotant. Contrôle de la console Cisco SPA 500S Pour afficher l'état de la console Cisco SPA 500S : ÉTAPE 1 Connectez-vous à l'interface Web. ÉTAPE 2 Cliquez sur l'onglet Att Console Status.A Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 100 Pour en savoir plus Cisco propose une vaste gamme de ressources pour vous aider à tirer pleinement parti du Téléphone IP Cisco Small Business. Ressources sur les produits Assistance technique Communauté d'assistance Cisco Small Business www.cisco.com/go/smallbizsupport Assistance technique et documentation en ligne (identifiant de connexion obligatoire) www.cisco.com/support Coordonnées de l'assistance téléphonique www.cisco.com/en/US/support/ tsd_cisco_small_business_support_center_conta cts.html Téléchargement de logiciels (identifiant de connexion obligatoire) Accédez à tools.cisco.com/support/downloads, puis entrez le numéro du modèle dans le champ Software Search. Documentation sur les produits Téléphone IP www.cisco.com/en/US/products/ps10499/ tsd_products_support_series_home.html Accessoires http://cisco.com/en/US/products/ps10042/ tsd_products_support_series_home.html Système vocal Cisco SPA 9000 www.cisco.com/en/US/products/ps10030/ tsd_products_support_series_home.html Cisco Unified Communicatio ns 500 pour les petites entreprises www.cisco.com/en/US/products/ps7293/ tsd_products_support_series_home.htmlPour en savoir plus Guide de l'utilisateur du téléphone IP Cisco Small Business Pro SPA 50X (SIP) 101 A Liste de documents Reportez-vous aux documents suivants (disponibles en cliquant sur les URL répertoriées ci-dessus) pour obtenir plus d'informations sur votre produit. • Guide de démarrage du téléphone IP modèle 50X Cisco Small Business Pro : installation et configuration initiale du téléphone IP Cisco. • Cisco WBP54G Wireless-G Bridge for Phone Adapters User Guide : installation et utilisation du pont sans fil WBP54G avec le téléphone IP Cisco. • Cisco Small Business Pro SPA 500 Series and WIP310 IP Phone Administration Guide : administration et configuration avancée du téléphone IP Cisco. • Cisco SPA 9000 Voice System Administration Guide : administration et configuration du système vocal Cisco SPA 9000. • Cisco SPA 9000 Voice System Using Setup Wizard Installation and Configuration Guide : installation du système vocal Cisco SPA 9000 à l'aide de l'assistant d'installation. • Cisco SPA 9000 Voice System Web-UI Based Product Installation and Configuration Guide : installation du système vocal Cisco SPA 9000 à l'aide de l'interface utilisateur Web. Cisco Small Business Site Cisco Partner Central pour les PME (identifiant partenaire obligatoire) www.cisco.com/web/partners/sell/smb Accueil Cisco Small Business www.cisco.com/smb Marketplace www.cisco.com/go/marketplace Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual Product and Documentation Release 7.0 Last Updated: August 2012 Text Part Number: 78-17234-01THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television communications at your own expense. You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures: • Turn the television or radio antenna until the interference stops. • Move the equipment to one side or the other of the television or radio. • Move the equipment farther away from the television or radio. • Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits controlled by different circuit breakers or fuses.) Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco ONS 15310-CL and Cisco ONS 15310-MA Release Manual, Release 7.0 Copyright © 2004–2012 Cisco Systems, Inc. All rights reserved.iii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 CONTENTS About this Manual xxi Revision History xxi Document Objectives xxii Audience xxii Document Organization xxiii Related Documentation xxiv Document Conventions xxiv Obtaining Optical Networking Information xxxi Where to Find Safety and Warning Information xxxi Cisco Optical Networking Product Documentation CD-ROM xxxi Obtaining Documentation and Submitting a Service Request xxxi CHAPTER 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1-1 1.1 Installation Overview 1-1 1.2 Rack Installation 1-2 1.2.1 Mounting Bracket 1-3 1.2.2 Mounting a Single Node 1-5 1.2.3 Mounting Multiple Nodes 1-5 1.3 Power and Ground Description 1-5 1.4 Cable Description and Installation 1-5 1.4.1 Cabling Types 1-6 1.4.2 Fiber Cable Installation 1-6 1.4.3 Coaxial Cable Installation 1-6 1.4.4 DS-1 Cable Installation 1-7 1.4.5 Alarm Cable Installation 1-7 1.4.6 BITS Cable Installation 1-8 1.4.7 UDC Cable Installation 1-8 1.5 Fans 1-9 1.6 Cards and Slots 1-9 CHAPTER 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2-1 2.1 Installation Overview 2-1 2.2 Rack Installation 2-2Contents iv Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 2.2.1 Mounting Brackets 2-3 2.2.2 Mounting a Single Node 2-4 2.2.3 Mounting Multiple Nodes 2-5 2.3 Electrical Interface Assemblies 2-5 2.4 Front Door 2-6 2.5 Power and Ground Description 2-7 2.6 Cable Description and Installation 2-10 2.6.1 Cabling Types 2-10 2.6.2 Fiber Cable Installation 2-12 2.6.3 Coaxial Cable Installation 2-13 2.6.4 DS-1 Cable Installation 2-13 2.6.5 Alarm Cable Installation 2-17 2.6.6 BITS Cable Installation 2-18 2.6.7 UDC Cable Installation 2-19 2.7 Cable Routing and Management 2-19 2.7.1 Standard Cable Management Bracket 2-19 2.7.2 Extended Cable Management Bracket 2-20 2.8 Fan-Tray Assembly 2-21 2.8.1 Fan Speed and Power Requirements 2-22 2.8.2 Fan Failure 2-22 2.8.3 Air Filter 2-22 2.9 Cards and Slots 2-22 CHAPTER 3 Card Reference 3-1 3.1 Card Summary and Compatibility 3-1 3.1.1 Card Summary 3-3 3.1.2 Card Compatibility 3-4 3.2 15310-CL-CTX Card 3-5 3.2.1 Features 3-6 3.2.2 Synchronization and Timing 3-7 3.2.3 System Cross-Connect 3-7 3.2.4 15310-CL-CTX Optical Interfaces 3-7 3.2.5 Communication and Control 3-7 3.2.6 Electrical Interface (BBE and WBE) 3-8 3.2.7 15310-CL-CTX Card-Level Indicators 3-8 3.3 CTX2500 Card 3-8 3.3.1 System Cross-Connect 3-9 3.3.2 CTX2500 Card Side Switches 3-9Contents v Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 3.3.3 CTX2500 Optical Interfaces 3-10 3.3.4 CTX2500 Card-Level Indicators 3-10 3.3.5 CTX2500 Port-Level Indicators 3-10 3.4 CE-100T-8 Card 3-10 3.4.1 CE-100T-8 Card-Level Indicators 3-13 3.4.2 CE-100T-8 Port-Level Indicators 3-13 3.5 ML-100T-8 Card 3-14 3.5.1 ML-100T-8 Card Description 3-14 3.5.2 ML-Series Cisco IOS CLI Console Port 3-15 3.5.3 ML-100T-8 Card-Level Indicators 3-17 3.5.4 ML-100T-8 Port-Level Indicators 3-17 3.6 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards 3-18 3.6.1 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card-Level Indicators 3-19 3.7 Filler Cards 3-19 3.8 SFP Modules 3-20 3.8.1 Compatibility by Card 3-21 3.8.2 SFP Description 3-22 3.8.3 PPM Provisioning 3-23 CHAPTER 4 Card Protection 4-1 4.1 Overview 4-1 4.2 ONS 15310-CL Port Protection 4-2 4.2.1 1+1 Optical Port Protection 4-2 4.2.2 Unprotected Ports 4-2 4.3 ONS 15310-MA Card and Port Protection 4-2 4.3.1 .1:1 Electrical Card Protection 4-2 4.3.2 .1+1 Optical Port Protection 4-4 4.3.3 .CTX2500 Card Equipment Protection 4-5 4.4 Automatic Protection Switching 4-5 4.5 External Switching Commands 4-6 CHAPTER 5 Cisco Transport Controller Operation 5-1 5.1 CTC Software Delivery Methods 5-1 5.1.1 CTC Software Installed on the 15310-CL-CTX or CTX2500 Card 5-1 5.1.2 CTC Software Installed on the PC or UNIX Workstation 5-2 5.2 CTC Installation Overview 5-3 5.3 PC and UNIX Workstation Requirements 5-3 5.4 ONS 15310-CL and ONS 15310-MA Connection 5-5Contents vi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 5.5 CTC Window 5-6 5.5.1 Node View 5-6 5.5.1.1 CTC Card Colors 5-6 5.5.1.2 Node View Card Shortcuts 5-8 5.5.1.3 Node View Tabs 5-8 5.5.2 Network View 5-9 5.5.2.1 CTC Node Colors 5-9 5.5.2.2 Network View Tabs 5-10 5.5.2.3 DCC Links 5-10 5.5.2.4 Link Consolidation 5-10 5.5.3 Card View 5-11 5.5.4 Print and Export CTC Data 5-13 5.6 Common Control Card Reset 5-14 5.7 Traffic Card Reset 5-14 5.8 Database Backup 5-14 5.9 Software Revert 5-15 CHAPTER 6 Security 6-1 6.1 Users IDs and Security Levels 6-1 6.2 User Privileges and Policies 6-2 6.2.1 User Privileges by CTC Action 6-2 6.2.2 Security Policies 6-5 6.2.2.1 Superuser Privileges for Provisioning Users 6-5 6.2.2.2 Idle User Timeout 6-6 6.2.2.3 User Password, Login, and Access Policies 6-6 6.3 Audit Trail 6-6 6.3.1 Audit Trail Log Entries 6-7 6.3.2 Audit Trail Capacities 6-7 6.4 RADIUS Security 6-7 6.4.1 RADIUS Authentication 6-8 6.4.2 Shared Secrets 6-8 CHAPTER 7 Timing 7-1 7.1 Timing Parameters 7-1 7.2 Network Timing 7-2 7.3 Synchronization Status Messaging 7-3Contents vii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 CHAPTER 8 Circuits and Tunnels 8-1 8.1 Overview 8-1 8.2 Circuit Properties 8-2 8.2.1 Circuit Status 8-3 8.2.2 Circuit States 8-4 8.2.3 Circuit Protection Types 8-5 8.2.4 Circuit Information in the Edit Circuits Window 8-5 8.3 VT1.5 Bandwidth 8-7 8.4 VT Tunnels and Aggregation Points 8-8 8.5 DCC Tunnels 8-8 8.5.1 Traditional DCC Tunnels 8-8 8.5.2 IP-Encapsulated Tunnels 8-9 8.6 Virtual Concatenated Circuits 8-9 8.6.1 VCAT Circuit States 8-10 8.6.2 VCAT Member Routing 8-10 8.6.3 Link Capacity Adjustment 8-11 8.6.4 VCAT Circuit Size 8-12 8.7 Section and Path Trace 8-13 8.8 Bridge and Roll 8-13 8.8.1 Rolls Window 8-13 8.8.2 Roll Status 8-15 8.8.3 Single and Dual Rolls 8-15 8.8.4 Two-Circuit Bridge and Roll 8-18 8.8.5 Protected Circuits 8-18 8.9 Merged Circuits 8-18 8.10 Reconfigured Circuits 8-19 8.11 Server Trails 8-20 CHAPTER 9 SONET Topologies and Upgrades 9-1 9.1 Path Protection Dual-Ring Interconnect for the ONS 15310-MA 9-1 9.2 Terminal Point-to-Point and Linear ADM Configurations 9-2 9.3 Interoperability 9-3 9.3.1 Subtending Rings 9-3 9.3.2 Linear Connections 9-5 9.4 Path-Protected Mesh Networks 9-6 9.5 Four Node Configurations 9-8 9.6 OC-N Speed Upgrades 9-8Contents viii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 9.6.1 Span Upgrade Wizard 9-9 9.6.2 Manual Span Upgrades 9-9 CHAPTER 10 Management Network Connectivity 10-1 10.1 IP Networking Overview 10-2 10.2 IP Addressing Scenarios 10-2 10.2.1 Scenario 1: CTC and ONS 15310-CL or ONS 15310-MA Nodes on the Same Subnet 10-3 10.2.2 Scenario 2: CTC and ONS 15310-CL or ONS 15310-MA Nodes Connected to a Router 10-3 10.2.3 Scenario 3: Using Proxy ARP to Enable an ONS 15310-CL or ONS 15310-MA Gateway 10-4 10.2.4 Scenario 4: Default Gateway on CTC Computer 10-6 10.2.5 Scenario 5: Using Static Routes to Connect to LANs 10-7 10.2.6 Scenario 6: Using OSPF 10-9 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server 10-11 10.3 Provisionable Patchcords 10-16 10.4 Routing Table 10-17 10.5 External Firewalls 10-18 10.6 Open GNE 10-20 10.7 TCP/IP and OSI Networking 10-22 10.7.1 Point-to-Point Protocol 10-23 10.7.2 Link Access Protocol on the D Channel 10-24 10.7.3 OSI Connectionless Network Service 10-24 10.7.4 OSI Routing 10-27 10.7.4.1 End System-to-Intermediate System Protocol 10-28 10.7.4.2 Intermediate System-to-Intermediate System Protocol 10-28 10.7.5 TARP 10-29 10.7.5.1 TARP Processing 10-30 10.7.5.2 TARP Loop Detection Buffer 10-31 10.7.5.3 Manual TARP Adjacencies 10-32 10.7.5.4 Manual TID to NSAP Provisioning 10-32 10.7.6 OSI Virtual Routers 10-32 10.7.7 IP-over-CLNS Tunnels 10-33 10.7.7.1 Provisioning IP-over-CLNS Tunnels 10-34 10.7.7.2 IP Over CLNS Tunnel Scenario 1: ONS Node to Other Vendor GNE 10-34 10.7.7.3 IP-Over-CLNS Tunnel Scenario 2: ONS Node to Router 10-35 10.7.7.4 IP-Over-CLNS Tunnel Scenario 3: ONS Node to Router Across an OSI DCN 10-37 10.7.8 Provisioning OSI in CTC 10-39 CHAPTER 11 Alarm Monitoring and Management 11-1 11.1 Overview 11-1Contents ix Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 11.2 Viewing Alarms 11-1 11.2.1 Viewing Alarms With Each Node’s Time Zone 11-4 11.2.2 Controlling Alarm Display 11-4 11.2.3 Filtering Alarms 11-4 11.2.4 Viewing Alarm-Affected Circuits 11-5 11.2.5 Conditions Tab 11-5 11.2.6 Controlling the Conditions Display 11-6 11.2.6.1 Retrieving and Displaying Conditions 11-6 11.2.6.2 Conditions Column Descriptions 11-6 11.2.6.3 Filtering Conditions 11-7 11.2.7 Viewing History 11-7 11.2.7.1 History Column Descriptions 11-8 11.2.7.2 Retrieving and Displaying Alarm and Condition History 11-8 11.2.8 Alarm History and Log Buffer Capacities 11-9 11.3 Alarm Severities 11-9 11.4 Alarm Profiles 11-10 11.4.1 Creating and Modifying Alarm Profiles 11-10 11.4.2 Alarm Profile Buttons 11-11 11.4.3 Alarm Profile Editing 11-11 11.4.4 Alarm Severity Options 11-11 11.4.5 Row Display Options 11-12 11.4.6 Applying Alarm Profiles 11-12 11.5 Alarm Suppression 11-13 11.5.1 Alarms Suppressed for Maintenance 11-13 11.5.2 Alarms Suppressed by User Command 11-14 11.6 External Alarms and Controls 11-14 11.6.1 External Alarm Input 11-14 11.6.2 External Control Output 11-15 CHAPTER 12 Performance Monitoring 12-1 12.1 Threshold Performance Monitoring 12-2 12.2 Intermediate-Path Performance Monitoring 12-3 12.3 Pointer Justification Count Performance Monitoring 12-3 12.4 Performance Monitoring Parameter Definitions 12-4 12.5 Performance Monitoring for Electrical Ports 12-10 12.5.1 DS-1 Port Performance Monitoring Parameters 12-10 12.5.2 DS-3 Port Performance Monitoring Parameters 12-12 12.5.3 EC-1 Port Performance Monitoring Parameters 12-13Contents x Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 12.6 Performance Monitoring for Ethernet Cards 12-15 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters 12-15 12.6.1.1 CE-100T-8 and ML-100T-8 Card Ether Ports Statistics Window 12-15 12.6.1.2 CE-100T-8 and ML-100T-8 Card Ether Ports Utilization Window 12-17 12.6.1.3 CE-100T-8 and ML-100T-8 Card Ether Ports History Window 12-18 12.6.1.4 CE-100T-8 and ML-100T-8 Card POS Ports Statistics Parameters 12-18 12.6.1.5 CE-100T-8 and ML-100T-8 Card POS Ports Utilization Window 12-20 12.6.1.6 CE-100T-8 and ML-100T-8 Card POS Ports History Window 12-20 12.7 Performance Monitoring for Optical Ports 12-20 12.7.1 OC-3 Port Performance Monitoring Parameters 12-20 12.7.2 OC-12 Port Performance Monitoring Parameters 12-22 12.7.3 OC-48 Port Performance Monitoring Parameters for ONS 15310-MA 12-24 CHAPTER 13 SNMP 13-1 13.1 SNMP Overview 13-1 13.2 SNMP Basic Components 13-2 13.3 SNMP Proxy Support Over Firewalls 13-3 13.4 SNMP Version Support 13-4 13.5 SNMP Management Information Bases 13-4 13.6 SNMP Traps 13-6 13.7 SNMP Community Names 13-8 13.8 SNMP Remote Network Monitoring 13-8 13.8.1 Ethernet Statistics Group 13-8 13.8.2 History Control Group 13-8 13.8.3 Ethernet History Group 13-8 13.8.4 Alarm Group 13-9 13.8.5 Event Group 13-9 13.9 CE-100T-8 and ML-100T-8 RMON MIBs 13-9 APPENDIX A Specifications A-1 A.1 Cisco ONS 15310-CL Shelf Specifications A-1 A.1.1 Bandwidth A-1 A.1.2 Expansion Slot A-1 A.1.3 Internal Cards A-1 A.1.4 15310-CL-CTX A-2 A.1.5 Configurations A-3 A.1.6 Cisco Transport Controller A-3 A.1.7 TL1 Craft Interface A-3Contents xi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 A.1.8 LEDs A-3 A.1.9 Alarm Interface A-4 A.1.10 DS1 Interface A-4 A.1.11 DS3/EC1 Interface A-4 A.1.12 Nonvolatile Memory A-4 A.1.13 BITS Interface A-5 A.1.14 Push Buttons A-5 A.1.15 System Timing A-5 A.1.16 Power Specifications A-5 A.1.17 Environmental Specifications A-6 A.1.18 Shelf Dimensions A-6 A.2 Cisco ONS 15310-MA Shelf Specifications A-6 A.2.1 Alarm Interface A-6 A.2.2 UDC Interface A-6 A.2.3 Cisco Transport Controller LAN Interface A-7 A.2.4 TL1 Craft Interface A-7 A.2.5 Configurations A-7 A.2.6 LEDs A-7 A.2.7 Push Buttons A-8 A.2.8 BITS Interface A-8 A.2.9 System Timing A-8 A.2.10 Power Specifications A-8 A.2.11 Environmental Specifications A-9 A.2.12 Fan-Tray Assembly Specifications A-9 A.2.13 Shelf Dimensions A-9 A.3 Card Specifications A-10 A.3.1 CTX2500 Card A-10 A.3.2 Nonvolatile Memory A-11 A.3.3 CE-100T-8 and ML-100T-8 Cards A-11 A.3.4 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards A-12 A.3.5 Filler Cards A-14 A.4 SFP Specifications A-15 APPENDIX B Administrative and Service States B-1 B.1 Service States B-1 B.2 Administrative States B-2 B.3 Service State Transitions B-3 B.3.1 Card Service State Transitions B-3 B.3.2 Port and Cross-Connect Service State Transitions B-5Contents xii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 APPENDIX C Network Element Defaults C-1 C.1 Network Element Defaults Description C-1 C.2 ONS 15310-CL Card Default Settings C-2 C.2.1 Configuration Defaults C-2 C.2.2 Threshold Defaults C-3 C.2.3 Defaults by Card C-4 C.2.3.1 15310-CL-CTX Card Default Settings C-4 C.2.3.2 Ethernet Card Default Settings C-20 C.3 Cisco ONS 15310-CL Node Default Settings C-20 C.3.1 Time Zones C-26 C.4 CTC Default Settings C-29 C.5 ONS 15310-MA Card Default Settings C-30 C.5.1 Configuration Defaults C-30 C.5.2 Threshold Defaults C-31 C.5.3 Defaults by Card C-31 CTX2500 Card Default Settings C-32 DS1-28/DS3-EC1-3 Card Default Settings C-48 DS1-84/DS3-EC1-3 Card Default Settings C-56 C.5.3.1 Ethernet Card Default Settings C-64 C.6 Cisco ONS 15310-MA Node Default Settings C-64 I NDEXFIGURES xiii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Figure 1-1 ONS 15310-CL Shelf Assembly Dimensions 1-3 Figure 1-2 Mounting Brackets (19-Inch Orientation) 1-4 Figure 1-3 Mounting Brackets (23-Inch Orientation) 1-4 Figure 1-4 Pins 1 and 8 on the RJ-45 Connector 1-7 Figure 1-5 Installing an Ethernet Card 1-10 Figure 2-1 ONS 15310-MA Shelf Assembly Dimensions 2-3 Figure 2-2 Mounting a Single ONS 15310-MA in a Rack 2-4 Figure 2-3 High-Density EIA Connectors 2-6 Figure 2-4 ONS 15310-MA Door Ground Strap 2-7 Figure 2-5 Ground Holes on the Bottom of the ONS 15310-MA Shelf Assembly 2-8 Figure 2-6 Ground Holes on the Left and Right Sides of the ONS 15310-MA Shelf Assembly 2-9 Figure 2-7 ACS Cable T015654 2-11 Figure 2-8 Shelf Assembly with Fiber Guide Installed 2-12 Figure 2-9 BNC Insertion and Removal Tool 2-13 Figure 2-10 Installing the Standard Cable Management Bracket 2-20 Figure 2-11 Installing the Extended Cable Management Bracket 2-21 Figure 2-12 Installing a Card in an ONS 15310-MA 2-23 Figure 3-1 ONS 15310-CL with Expansion Card Being Inserted 3-2 Figure 3-2 ONS 15310-MA with Cards Installed 3-3 Figure 3-3 ONS 15310-CL Front Panel 3-5 Figure 3-4 15310-CL-CTX Block Diagram 3-6 Figure 3-5 CTX2500 Faceplate and Block Diagram 3-9 Figure 3-6 CE-100T-8 Faceplate and Block Diagram 3-12 Figure 3-7 Console Cable Adapter 3-15 Figure 3-8 ML-100T-8 Card Faceplate and Block Diagram 3-16 Figure 3-9 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card Faceplates and Block Diagram 3-18 Figure 3-10 Filler Card 3-19 Figure 3-11 CTX2500 Filler Card 3-20 Figure 3-12 Mylar Tab SFP 3-23 Figure 3-13 Actuator/Button SFP 3-23 Figure 3-14 Bail Clasp SFP 3-23Figures xiv Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Figure 4-1 ONS 15310-MA Chassis Card Layout 4-3 Figure 5-1 CTC Software Versions in an ONS 15310-CL (Node View) 5-2 Figure 5-2 Terminal Loopback Indicator 5-8 Figure 5-3 Facility Loopback Indicator 5-8 Figure 5-4 CTC Card View in an ONS 15310-CL Showing an ML-100T-8 Card 5-12 Figure 7-1 ONS 15310-CL and ONS 15310-MA Timing Example 7-2 Figure 8-1 Terminal Loopback in the Edit Circuits Window 8-7 Figure 8-2 VCAT Common Fiber Routing 8-10 Figure 8-3 VCAT Split Fiber Routing 8-11 Figure 8-4 Rolls Window 8-14 Figure 8-5 Single Source Roll 8-16 Figure 8-6 Single Destination Roll 8-16 Figure 8-7 Single Roll from One Circuit to Another Circuit (Destination Changes) 8-16 Figure 8-8 Single Roll from One Circuit to Another Circuit (Source Changes) 8-17 Figure 8-9 Dual Roll to Reroute a Link 8-17 Figure 8-10 Dual Roll to Reroute to a Different Node 8-18 Figure 9-1 ONS 15310-CL Linear ADM Configuration 9-2 Figure 9-2 ONS 15310-MA Linear ADM Configuration 9-3 Figure 9-3 ONS 15454 with Two ONS 15310-CL Nodes Subtending Path Protections 9-3 Figure 9-4 ONS 15310-MA with Two Subtending Path Protection Configurations 9-4 Figure 9-5 ONS 15310-CL Ring Subtended from an ONS 15454 Ring 9-4 Figure 9-6 ONS 15310-MA Ring Subtended from an ONS 15454 Ring 9-5 Figure 9-7 Linear or Path Protection Connection Between ONS 15454 and ONS 15310 or ONS 15310-MA Nodes 9-5 Figure 9-8 Path-Protected Mesh Network for ONS 15310-CL Nodes 9-6 Figure 9-9 Path-Protected Mesh Network for ONS 15310-MA Nodes 9-7 Figure 9-10 Virtual Ring for ONS 15310-MAs 9-8 Figure 10-1 Scenario 1: CTC and ONS 15310-CL or ONS 15310-MA Nodes on the Same Subnet 10-3 Figure 10-2 Scenario 2: CTC and ONS 15310-CL or ONS 15310-MA Nodes Connected to Router 10-4 Figure 10-3 Scenario 3: Using Proxy ARP 10-5 Figure 10-4 Scenario 3: Using Proxy ARP with Static Routing 10-6 Figure 10-5 Scenario 4: Default Gateway on a CTC Computer 10-7 Figure 10-6 Scenario 5: Static Route with One CTC Computer Used as a Destination 10-8 Figure 10-7 Scenario 5: Static Route with Multiple LAN Destinations 10-9 Figure 10-8 Scenario 6: OSPF Enabled 10-10 Figure 10-9 Scenario 6: OSPF Not Enabled 10-11Figures xv Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Figure 10-10 ONS 15310-CL or ONS 15310-MA Proxy Server with GNE and ENEs on the Same Subnet 10-13 Figure 10-11 Scenario 7: Proxy Server with GNE and ENEs on Different Subnets 10-14 Figure 10-12 Scenario 7: Proxy Server with ENEs on Multiple Rings 10-15 Figure 10-13 Proxy and Firewall Tunnels for Foreign Terminations 10-21 Figure 10-14 Foreign Node Connection to an ENE Ethernet Port 10-22 Figure 10-15 ISO-DCC NSAP Address 10-26 Figure 10-16 Level 1 and Level 2 OSI Routing 10-28 Figure 10-17 Manual TARP Adjacencies 10-32 Figure 10-18 IP-over-CLNS Tunnel Flow 10-33 Figure 10-19 IP Over CLNS Tunnel Scenario 1: ONS NE to Other Vender GNE 10-35 Figure 10-20 IP-Over-CLNS Tunnel Scenario 2: ONS Node to Router 10-37 Figure 10-21 IP-Over-CLNS Tunnel Scenario 3: ONS Node to Router Across an OSI DCN 10-38 Figure 11-1 ONS 15310-MA Select Affected Circuits Option 11-5 Figure 11-2 Alarm Profile for a 15310-MA CTX2500 Card 11-13 Figure 12-1 TCAs Displayed in CTC 12-2 Figure 12-2 Monitored Signal Types for the DS-1 Ports 12-11 Figure 12-3 PM Parameter Read Points on the DS-1 Ports 12-11 Figure 12-4 Monitored Signal Types for the DS-3 Ports 12-12 Figure 12-5 PM Parameter Read Points on the DS-3 Ports 12-13 Figure 12-6 Monitored Signal Types for the EC-1 Port 12-14 Figure 12-7 PM Read Points on the EC-1 Port 12-14 Figure 12-8 Monitored Signal Types for the OC-3 Port 12-21 Figure 12-9 PM Parameter Read Points on the OC-3 Port 12-21 Figure 12-10 Monitored Signal Types for the OC-12 Ports 12-22 Figure 12-11 PM Parameter Read Points on the OC-12 Ports 12-23 Figure 12-12 Monitored Signal Types for the OC-48 Ports 12-24 Figure 12-13 PM Parameter Read Points on the OC-48 Ports 12-25 Figure 13-1 Basic Network Managed by SNMP 13-2 Figure 13-2 SNMP Agent Gathering Data from a MIB and Sending Traps to the Manager 13-3 Figure 13-3 Example of the Primary SNMP Components 13-3Figures xvi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0TABLES xvii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Table 1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual Chapters i-xxiii Table 1-1 Alarm Pin Assignments 1-7 Table 1-2 BITS Cable Pin Assignments 1-8 Table 1-3 UDC Cable Pin Assignments 1-8 Table 1-4 Port Line Rates, Connector Types, and Locations 1-10 Table 2-1 DS-1 Cables 2-11 Table 2-2 Champ Connector Pin Assignments—Side-A EIA, Connectors J8 and J9; Side-B EIA, Connectors J21 and J22 2-13 Table 2-3 Champ Connector Pin Assignments—Side-A EIA, Connectors J10 and J11; Side-B EIA, Connectors J23 and J24 2-15 Table 2-4 Champ Connector Pin Assignments—Side-A EIA, Connectors J12 and J13; Side-B EIA, Connectors J25 and J26 2-16 Table 2-5 Default Alarm Pin Assignments—Inputs 2-17 Table 2-6 Default Alarm Pin Assignments—Outputs 2-17 Table 2-7 BITS Cable Pin Assignments 2-18 Table 2-8 UDC Cable Pin Assignments 2-19 Table 2-9 Port Line Rates, Connector Types, and Locations 2-23 Table 3-1 ONS 15310-CL and ONS 15310-MA Cards and Descriptions 3-3 Table 3-2 ONS 15310-CL and ONS 15310-MA Software Release Compatibility Per Card 3-4 Table 3-3 15310-CL-CTX Card-Level Indicators 3-8 Table 3-4 CTX2500 Card-Level Indicators 3-10 Table 3-5 CE-100T-8 Card-Level Indicators 3-13 Table 3-6 CE-100T-8 Port-Level Indicators 3-14 Table 3-7 ML-100T-8 Card-Level Indicators 3-17 Table 3-8 ML-100T-8 Port-Level Indicators 3-17 Table 3-9 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card-Level Indicators 3-19 Table 3-10 SFP Card Compatibility 3-21 Table 5-1 CTC Computer Requirements 5-4 Table 5-2 ONS 15310-CL and ONS 15310-MA Connection Methods 5-5 Table 5-3 Node View Card and Slot Colors 5-6 Table 5-4 Node View Card Port Colors and Service States 5-7 Table 5-5 Node View Card Statuses 5-8Tables xviii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Table 5-6 Node View Tabs and Subtabs 5-8 Table 5-7 Node Colors Indicating Status in Network View 5-9 Table 5-8 Network View Tabs and Subtabs 5-10 Table 5-9 Link Icons 5-10 Table 5-10 Card View Tabs and Subtabs 5-12 Table 6-1 ONS 15310-CL and ONS 15310-MA Security Levels—Node View 6-2 Table 6-2 ONS 15310-CL and ONS 15310-MA Security Levels—Network View 6-4 Table 6-3 Default User Idle Times 6-6 Table 7-1 SSM Generation 1 Message Set 7-3 Table 7-2 SSM Generation 2 Message Set 7-3 Table 8-1 ONS 15310-CL and ONS 15310-MA Circuit Status 8-3 Table 8-2 Circuit Protection Types 8-5 Table 8-3 Port State Color Indicators 8-6 Table 8-4 DCC Tunnels 8-9 Table 8-5 ONS 15310-CL Card VCAT Circuit Rates and Members 8-12 Table 8-6 ONS 15310-CL VCAT Card Capabilities 8-12 Table 8-7 ONS 15310-CL and ONS 15310-MA Cards/Ports Capable of J1/J2 Path Trace 8-13 Table 8-8 Roll Statuses 8-15 Table 10-1 General P Troubleshooting Checklist 10-2 Table 10-2 ONS 15310-CL or ONS 15310-MA GNE and ENE Settings 10-13 Table 10-3 Proxy Server Firewall Filtering Rules 10-15 Table 10-4 Proxy Server Firewall Filtering Rules When the Packet is Addressed to the ONS 15310-CL or ONS 15310-MA 10-16 Table 10-5 Client and Trunk Card Combinations in Provisionable Patchcords 10-17 Table 10-6 Sample Routing Table Entries 10-17 Table 10-7 Ports Used by the 15310-CL-CTX or CTX2500 10-19 Table 10-8 TCP/IP and OSI Protocols 10-23 Table 10-9 NSAP Fields 10-25 Table 10-10 TARP PDU Fields 10-29 Table 10-11 TARP PDU Types 10-30 Table 10-12 TARP Timers 10-31 Table 10-13 TARP Processing Flow 10-31 Table 10-14 IP Over CLNS Tunnel Cisco IOS Commands 10-34 Table 10-15 OSI Actions from the CTC Node View Provisioning Tab 10-39 Table 10-16 OSI Actions from the CTC Maintenance Tab 10-39 Table 11-1 Alarms Column Descriptions 11-2Tables xix Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Table 11-2 Color Codes for Alarm and Condition Severities 11-3 Table 11-3 STS and Alarm Object Identification 11-3 Table 11-4 Alarm Display 11-4 Table 11-5 Conditions Display 11-6 Table 11-6 Conditions Column Description 11-6 Table 11-7 History Column Description 11-8 Table 11-8 Alarm Profile Buttons 11-11 Table 11-9 Alarm Profile Editing Options 11-11 Table 12-1 Electrical Ports that Report RX Direction for TCAs 12-3 Table 12-2 Performance Monitoring Parameters 12-4 Table 12-3 PM Parameters for DS-1 Ports 12-12 Table 12-4 Parameters for DS-3 Ports 12-13 Table 12-5 EC-1 Port PM Parameters 12-15 Table 12-6 CE-100T-8 and ML-100T-8 Ether Ports Statistics Parameters 12-16 Table 12-7 maxBaseRate for STS Circuits 12-18 Table 12-8 Ethernet History Statistics per Time Interval 12-18 Table 12-9 CE-100T-8 and ML-100T-8 POS Ports Parameters for HDLC Mode 12-18 Table 12-10 CE-100T-8 and ML-100T-8 POS Ports Parameters for GFP-F Mode 12-19 Table 12-11 OC-3 Port PM Parameters 12-22 Table 12-12 OC12 Port PM Parameters 12-23 Table 12-13 OC48 Port PM Parameters 12-25 Table 13-1 SNMP Message Types 13-4 Table 13-2 IETF Standard MIBs Implemented in the ONS 15454, ONS 15327, ONS 15310-CL and ONS 15310-MA SNMP Agent 13-5 Table 13-3 ONS Proprietary MIBs 13-5 Table 13-4 SNMPv2 Trap Variable Bindings 13-6 Table 13-5 Traps Supported in the ONS 15310-CL and ONS 15310-MA 13-7 Table A-1 LED Description A-4 Table A-2 LED Description A-8 Table A-3 SFP Specifications—ONS 15310-CL and ONS 15310-MA A-15 Table A-4 SFP Specifications—ONS 15310-MA Only A-15 Table A-5 Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-CL and ONS 15310-MA A-15 Table A-6 Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-MA Only A-16 Table B-1 ONS 15310-CL and ONS 15310-MA Service State Primary States and Primary State Qualifiers B-1 Table B-2 ONS 15310-CL and and ONS 15310-MA Secondary States B-2 Table B-3 ONS 15310-CL and ONS 15310-MA Administrative States B-3Tables xx Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Table B-4 ONS 15310-CL and ONS 15310-MA Card Service State Transitions B-3 Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions B-6 Table C-1 15310-CL-CTX Card Default Settings C-4 Table C-2 Ethernet Card Default Settings C-20 Table C-3 Cisco ONS 15310-CL Node Default Settings C-21 Table C-4 Time Zones C-26 Table C-5 CTC Default Settings C-29 Table C-6 CTX2500 Card Default Settings C-32 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings C-48 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings C-56 Table C-9 ONS 15310-MA Node Default Settings C-65xxi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This section explains the objectives, intended audience, and organization of this publication and describes the conventions that convey instructions and other information. This section provides the following information: • Revision History • Document Objectives • Audience • Document Organization • Related Documentation • Document Conventions • Obtaining Optical Networking Information • Obtaining Documentation and Submitting a Service Request Revision History Date Notes April 2007 • Revision History Table added for the first time. • Corrected product part numbers for the UBIC-V and UBIC-H DS3 cables. • Added server trail information in the Virtual Concatenated Circuits section in Chapter 8. • Updated About this Guide chapter. September 2007 Added a new rule for creation of protection groups under section “1:1 Electrical Card Protection” in the “Card Protection” chapter.xxii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Document Objectives The Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual provides hardware and software reference information for Cisco ONS 15310 nodes and networks. Use this manual in conjunction with the appropriate publications listed in the Related Documentation section. Audience To use this publication, you should be familiar with Cisco or equivalent optical transmission hardware and cabling, telecommunications hardware and cabling, electronic circuitry and wiring practices, and preferably have experience as a telecommunications technician. October 2008 • Updated alarm information in External Alarms and Controls section in Alarm Monitoring and Management chapter. • Added a note in Card Default Settings and Node Default Settings section of Appendix C, Network Element Defaults. • Updated section Cabling Types in Chapter 2 with ACS Cable T015654 model and table for compatible DS-1 cables available from Lorom Indrustrial Co., LTD. • Added a note in Table A-8, Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-MA Only of Appendix A, Specifications. March 2009 • Updated section External Alarms and Controls in Chapter 11, Alarm Monitoring and Management. December 2009 • Updated Figure 2.7, “ACS Cable T015654” in Chapter 2, “Cisco ONS 15310-MA Shelf Assembly Hardware”. April 2010 • Updated the section “SNMP Overview” in the chapter “SNMP”. July 2010 • Updated the section “CE-100T-8 and ML-100T-8 Cards” in the appendix “Specifications”. July 2011 Added a note in the “PC and UNIX Workstation Requirements” section of Chapter, “Cisco Transport Controller Operation”. March 2012 Updated the sections “15310-CL-CTX” and “CTX2500 Card” in the appendix “Specifications”. August 2012 The full length book-PDF was generated. Date Notesxxiii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Document Organization Table 1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual Chapters Title Summary Chapter 1, “Cisco ONS 15310-CL Shelf Assembly Hardware” Includes descriptions of the rack, power and ground, cables, fans, and slots on the ONS 15310-CL. Chapter 2, “Cisco ONS 15310-MA Shelf Assembly Hardware” Includes descriptions of the rack, power and ground, cables, electrical interface assemblies (EIAs), fan-tray assembly (FTA), and slots on the ONS 15310-MA. Chapter 3, “Card Reference” Includes descriptions of all cards in the ONS 15310-CL and 15310-MA. Chapter 4, “Card Protection” Includes electrical and optical card protection methods. Chapter 5, “Cisco Transport Controller Operation” Includes information about CTC installation, the CTC window, computer requirements, software versions, and database reset and revert. Chapter 6, “Security” Includes information for user set up, security privileges, security policies, audit trail, and RADIUS authentication. Chapter 7, “Timing” Includes node and network timing information. Chapter 8, “Circuits and Tunnels” Includes STS and VT, bidirectional and unidirectional, revertive and nonrevertive, electrical and optical, multiple and path trace circuit information, as well as data communications channel (DCC) tunnels. Chapter 9, “SONET Topologies and Upgrades” Includes the SONET configurations used by the ONS 15310-CL and ONS 15310-MA; including path protection configurations, linear add/drop multiplexers (ADMs), subtending rings, and optical bus configurations, as well as information about upgrading optical speeds within any configuration. Chapter 10, “Management Network Connectivity” Includes IP addressing scenarios and information about provisionable patchcords, the IP routing table, external firewalls, open gateway network element (GNE) networks, and OSI protocols. Chapter 11, “Alarm Monitoring and Management” Includes CTC alarm management information. Chapter 12, “Performance Monitoring” Includes performance-monitoring parameters for each ONS 15310-CL and ONS 15310-MA card. Chapter 13, “SNMP” Describes Simple Network Management Protocol (SNMP) as implemented by the ONS 15310-CL and ONS 15310-MA.xxiv Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Related Documentation Use the Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual in conjunction with the following referenced publications: • Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide Provides installation, turn up, test, and maintenance procedures. • Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide Provides alarm descriptions and troubleshooting procedures, general troubleshooting procedures, error messages, performance monitoring parameters, and SNMP information. • Cisco ONS SONET TL1 Command Guide Provides a full TL1 command and autonomous message set including parameters, AIDs, conditions and modifiers for the Cisco ONS 15454, ONS 15327, ONS 15600, ONS 15310-CL, and Cisco ONS 15310-MA systems. • Cisco ONS SONET TL1 Reference Guide Provides general information, procedures, and errors for TL1 in theCisco ONS 15454, ONS 15327, ONS 15600, ONS 15310-CL, and Cisco ONS 15310-MA systems. • Cisco ONS 15310-CL and Cisco ONS 15310-MA Ethernet Card Software Feature and Configuration Guide Provides software feature and operation information for Ethernet cards in the Cisco ONS 15310-CL and Cisco ONS 15310-MA. • Release Notes for the Cisco ONS 15310-CL Release 7.0 Provides caveats, closed issues, and new features and functionality information. • Release Notes for the Cisco ONS 15310-MA Release 7.0 Provides caveats, closed issues, and new features and functionality information. For an update on End-of-Life and End-of-Sale notices, refer to http://www.cisco.com/en/US/products/hw/optical/ps2001/prod_eol_notices_list.html. Document Conventions This publication uses the following conventions: Appendix A, “Specifications” Includes shelf assembly and card specifications for the ONS 15310-CL and ONS 15310-MA. Appendix B, “Administrative and Service States” Describes card, port, and cross-connect service states. Appendix C, “Network Element Defaults” Lists card, node, and CTC-level network element (NE) defaults. Table 1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual Chapters Title Summaryxxv Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the document. Caution Means reader be careful. In this situation, the user might do something that could result in equipment damage or loss of data. Convention Application boldface Commands and keywords in body text. italic Command input that is supplied by the user. [ ] Keywords or arguments that appear within square brackets are optional. { x | x | x } A choice of keywords (represented by x) appears in braces separated by vertical bars. The user must select one. Ctrl The control key. For example, where Ctrl + D is written, hold down the Control key while pressing the D key. screen font Examples of information displayed on the screen. boldface screen font Examples of information that the user must enter. < > Command parameters that must be replaced by module-specific codes.xxvi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Warning IMPORTANT SAFETY INSTRUCTIONS This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device. Statement 1071 SAVE THESE INSTRUCTIONS Waarschuwing BELANGRIJKE VEILIGHEIDSINSTRUCTIES Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van de standaard praktijken om ongelukken te voorkomen. Gebruik het nummer van de verklaring onderaan de waarschuwing als u een vertaling van de waarschuwing die bij het apparaat wordt geleverd, wilt raadplegen. BEWAAR DEZE INSTRUCTIES Varoitus TÄRKEITÄ TURVALLISUUSOHJEITA Tämä varoitusmerkki merkitsee vaaraa. Tilanne voi aiheuttaa ruumiillisia vammoja. Ennen kuin käsittelet laitteistoa, huomioi sähköpiirien käsittelemiseen liittyvät riskit ja tutustu onnettomuuksien yleisiin ehkäisytapoihin. Turvallisuusvaroitusten käännökset löytyvät laitteen mukana toimitettujen käännettyjen turvallisuusvaroitusten joukosta varoitusten lopussa näkyvien lausuntonumeroiden avulla. SÄILYTÄ NÄMÄ OHJEET Attention IMPORTANTES INFORMATIONS DE SÉCURITÉ Ce symbole d'avertissement indique un danger. Vous vous trouvez dans une situation pouvant entraîner des blessures ou des dommages corporels. Avant de travailler sur un équipement, soyez conscient des dangers liés aux circuits électriques et familiarisez-vous avec les procédures couramment utilisées pour éviter les accidents. Pour prendre connaissance des traductions des avertissements figurant dans les consignes de sécurité traduites qui accompagnent cet appareil, référez-vous au numéro de l'instruction situé à la fin de chaque avertissement. CONSERVEZ CES INFORMATIONS Warnung WICHTIGE SICHERHEITSHINWEISE Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu Verletzungen führen kann. Machen Sie sich vor der Arbeit mit Geräten mit den Gefahren elektrischer Schaltungen und den üblichen Verfahren zur Vorbeugung vor Unfällen vertraut. Suchen Sie mit der am Ende jeder Warnung angegebenen Anweisungsnummer nach der jeweiligen Übersetzung in den übersetzten Sicherheitshinweisen, die zusammen mit diesem Gerät ausgeliefert wurden. BEWAHREN SIE DIESE HINWEISE GUT AUF.xxvii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Avvertenza IMPORTANTI ISTRUZIONI SULLA SICUREZZA Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle persone. Prima di intervenire su qualsiasi apparecchiatura, occorre essere al corrente dei pericoli relativi ai circuiti elettrici e conoscere le procedure standard per la prevenzione di incidenti. Utilizzare il numero di istruzione presente alla fine di ciascuna avvertenza per individuare le traduzioni delle avvertenze riportate in questo documento. CONSERVARE QUESTE ISTRUZIONI Advarsel VIKTIGE SIKKERHETSINSTRUKSJONER Dette advarselssymbolet betyr fare. Du er i en situasjon som kan føre til skade på person. Før du begynner å arbeide med noe av utstyret, må du være oppmerksom på farene forbundet med elektriske kretser, og kjenne til standardprosedyrer for å forhindre ulykker. Bruk nummeret i slutten av hver advarsel for å finne oversettelsen i de oversatte sikkerhetsadvarslene som fulgte med denne enheten. TA VARE PÅ DISSE INSTRUKSJONENE Aviso INSTRUÇÕES IMPORTANTES DE SEGURANÇA Este símbolo de aviso significa perigo. Você está em uma situação que poderá ser causadora de lesões corporais. Antes de iniciar a utilização de qualquer equipamento, tenha conhecimento dos perigos envolvidos no manuseio de circuitos elétricos e familiarize-se com as práticas habituais de prevenção de acidentes. Utilize o número da instrução fornecido ao final de cada aviso para localizar sua tradução nos avisos de segurança traduzidos que acompanham este dispositivo. GUARDE ESTAS INSTRUÇÕES ¡Advertencia! INSTRUCCIONES IMPORTANTES DE SEGURIDAD Este símbolo de aviso indica peligro. Existe riesgo para su integridad física. Antes de manipular cualquier equipo, considere los riesgos de la corriente eléctrica y familiarícese con los procedimientos estándar de prevención de accidentes. Al final de cada advertencia encontrará el número que le ayudará a encontrar el texto traducido en el apartado de traducciones que acompaña a este dispositivo. GUARDE ESTAS INSTRUCCIONES Varning! VIKTIGA SÄKERHETSANVISNINGAR Denna varningssignal signalerar fara. Du befinner dig i en situation som kan leda till personskada. Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och känna till vanliga förfaranden för att förebygga olyckor. Använd det nummer som finns i slutet av varje varning för att hitta dess översättning i de översatta säkerhetsvarningar som medföljer denna anordning. SPARA DESSA ANVISNINGARxxviii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manualxxix Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Aviso INSTRUÇÕES IMPORTANTES DE SEGURANÇA Este símbolo de aviso significa perigo. Você se encontra em uma situação em que há risco de lesões corporais. Antes de trabalhar com qualquer equipamento, esteja ciente dos riscos que envolvem os circuitos elétricos e familiarize-se com as práticas padrão de prevenção de acidentes. Use o número da declaração fornecido ao final de cada aviso para localizar sua tradução nos avisos de segurança traduzidos que acompanham o dispositivo. GUARDE ESTAS INSTRUÇÕES Advarsel VIGTIGE SIKKERHEDSANVISNINGER Dette advarselssymbol betyder fare. Du befinder dig i en situation med risiko for legemesbeskadigelse. Før du begynder arbejde på udstyr, skal du være opmærksom på de involverede risici, der er ved elektriske kredsløb, og du skal sætte dig ind i standardprocedurer til undgåelse af ulykker. Brug erklæringsnummeret efter hver advarsel for at finde oversættelsen i de oversatte advarsler, der fulgte med denne enhed. GEM DISSE ANVISNINGERxxx Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manualxxxi Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this Manual Obtaining Optical Networking Information This section contains information that is specific to optical networking products. For information that pertains to all of Cisco, refer to the Obtaining Documentation and Submitting a Service Request section. Where to Find Safety and Warning Information For safety and warning information, refer to the Cisco Optical Transport Products Safety and Compliance Information document that accompanied the product. This publication describes the international agency compliance and safety information for the Cisco ONS 15310 system. It also includes translations of the safety warnings that appear in the ONS 15310 system documentation. Cisco Optical Networking Product Documentation CD-ROM Optical networking-related documentation, including Cisco ONS 15xxx product documentation, is available in a CD-ROM package that ships with your product. The Optical Networking Product Documentation CD-ROM is updated periodically and may be more current than printed documentation. Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0xxxii Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 About this ManualCHAPTER 1-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 1 Cisco ONS 15310-CL Shelf Assembly Hardware This chapter provides a description of Cisco ONS 15310-CL shelf hardware. Instructions for installing equipment are provided in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 1.1 Installation Overview, page 1-1 • 1.2 Rack Installation, page 1-2 • 1.3 Power and Ground Description, page 1-5 • 1.4 Cable Description and Installation, page 1-5 • 1.5 Fans, page 1-9 • 1.6 Cards and Slots, page 1-9 Note The Cisco ONS 15310-CL assembly is intended for use with telecommunications equipment only. Note The ONS 15310-CL is designed to comply with Telcordia GR-1089-CORE Type 2 and Type 4. Install and operate the ONS 15310-CL only in environments that do not expose wiring or cabling to the outside plant. Acceptable applications include Central Office Environments (COEs), Electronic Equipment Enclosures (EEEs), Controlled Environment Vaults (CEVs), huts, and Customer Premise Environments (CPEs). 1.1 Installation Overview You can mount the ONS 15310-CL in a 19- or 23-inch (482.6 or 584.2 mm) rack or it can be placed on a flat surface using the installed rubber feet. When installed in a rack, reversible mounting brackets should be used on each side of the shelf. The shelf assembly weighs 11.5 pounds (5.22 kg) without a card installed and 12.5 pounds (5.67 kg) with all hardware installed. The ONS 15310-CL is powered using –48 VDC or 100/240 VAC power. AC power terminals are accessible on the front panel and the DC power connection is accessible on the rear of the shelf assembly. CRIT, MAJ, MIN, and REM alarm LEDs are visible on the front of the node and indicate whether a Critical, Major, Minor, or Remote alarm is present anywhere on the ONS 15310-CL. Ethernet cards, small form-factor pluggables (SFPs), cables, and ports are accessible through the front of the shelf assembly only. 1-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.2 Rack Installation When installed in an equipment rack, the ONS 15310-CL assembly is typically connected to a fuse and alarm panel that provides centralized alarm connection points and distributed power for the ONS 15310-CL. Fuse and alarm panels are third-party equipment and are not described in this documentation. If you are unsure about the requirements or specifications for a fuse and alarm panel, consult the documentation for that product. Note In this chapter, the terms “ONS 15310-CL” and “shelf assembly” are used interchangeably. In the installation context, these terms have the same meaning. Otherwise, shelf assembly refers to the physical steel enclosure that holds cards and connects power, and ONS 15310-CL refers to the entire system, both hardware and software. Install the ONS 15310-CL in compliance with your local and national electrical codes: • United States: National Fire Protection Association (NFPA) 70; United States National Electrical Code • Canada: Canadian Electrical Code, Part I, CSA C22.1 • Other countries: If local and national electrical codes, are not available, refer to IEC 364, Part 1 through Part 7 Detailed compliance and safety information is provided in the Cisco Optical Transport Products Safety and Compliance Information document that ships with the Cisco ONS 15310-CL. 1.2 Rack Installation The ONS 15310-CL is easily mounted in a 19- or 23-inch (482.6 or 584.2 mm) equipment rack. The shelf assembly can be mounted so that it projects five inches from the front of the rack. It mounts in both EIA-standard and Telcordia-standard racks. The shelf assembly is a total of 17.25 inches (438.2 mm) wide. The ONS 15310-CL measures 1.75 inches high, 19 or 23 inches wide (depending on which brackets are installed), and 15 inches deep (44.4 x 482.6 or 584.2 x 381 mm). Figure 1-1 shows the dimensions of the ONS 15310-CL shelf assembly.1-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.2.1 Mounting Bracket Figure 1-1 ONS 15310-CL Shelf Assembly Dimensions 1.2.1 Mounting Bracket Caution Use only the fastening hardware provided with the ONS 15310-CL to prevent loosening, deterioration, and electromechanical corrosion of the hardware and joined material. Caution When mounting the ONS 15310-CL in a frame with a non-conductive coating (such as paint, lacquer, or enamel) use either the thread-forming screws provided with the ONS 15310-CL shipping kit or remove the coating from the threads to ensure electrical continuity. The shelf assembly comes with two mounting brackets, one for use with a 19-inch (482.6 mm) or 23-inch (584.2 mm) rack. Figure 1-2 shows the mounting bracket orientation for a 19-inch rack. Front View 17.25 in. (438.2 mm) Side View 13.0 in. (330.2 mm) Top View 17.25 in. (438.2 mm) 1.75 in. (44.4 mm) 13.0 in. (330.2 mm) 19.0 or 23.0 in. (482.6 or 584.2 mm) 19.0 or 23.0 in. (482.6 or 584.2 mm) 1248981-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.2.1 Mounting Bracket Figure 1-2 Mounting Brackets (19-Inch Orientation) Figure 1-3 shows the mounting bracket orientations for a 23-inch rack. The brackets are installed in the same mounting holes for both rack sizes. Figure 1-3 Mounting Brackets (23-Inch Orientation) 124942 1249431-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.2.2 Mounting a Single Node 1.2.2 Mounting a Single Node Mounting the ONS 15310-CL in a rack requires a minimum of 1.75 inches of vertical rack space (plus 1 inch [25.4 mm] for air flow). To ensure that the mounting is secure, use two #12-24 mounting screws for each side of the shelf assembly. 1.2.3 Mounting Multiple Nodes Most standard seven-foot (2.1 m) racks can hold numerous ONS 15310-CL nodes and a fuse and alarm panel. 1.3 Power and Ground Description This section describes how to connect the ONS 15310-CL shelf assembly to the power supply. For detailed procedures, refer to the “Install the Cisco ONS 15310-CL” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Terminate the chassis ground on the rear of the shelf assembly to either the office ground or rack ground before you install the power. Use the grounding lug to attach the #6 AWG ground cable to the shelf assembly according to local site practice. Ground one cable to ground the shelf assembly. Terminate the other end of the rack ground cable to ground according to local site practice. If the system loses power or the 15310-CL-CTX card is reset, you must reset the ONS 15310-CL clock unless the node has been previously provisioned to use Simple Network Time Protocol (SNTP) to update the clock over the LAN. Caution Always use the supplied ESD wristband when working with a powered ONS 15310-CL. Plug the wristband cable into the ESD jack located to the left of the expansion slot. Warning A readily accessible two-poled disconnect device must be incorporated in the fixed wiring. Statement 1022 The ONS 15310-CL can be ordered with either AC or DC power capability. The DC power option provides redundant –48 VDC power terminals on the rear of the chassis. The terminals are labeled A and B and are located at each end of the shelf assembly. The ONS 15310-CL AC power connector is located at the bottom right on the front of the chassis. The power cables are provided with the ship kit. To install redundant power feeds, use four power cables and one ground cable. For a single power feed, only two power cables and one ground cable are required. Use #14 AWG power cables and a #6 AWG ground cable and, to ensure circuit overcurrent protection, use a conductor with low impedance. However, the conductor must have the capability to safely conduct any fault current that might be imposed. Do not use aluminum conductors. 1.4 Cable Description and Installation This section describes fiber-optic, DS-3/EC-1 (coaxial), DS-1 (96-pin LFH), UDC, and twisted-pair cables. 1-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.4.1 Cabling Types 1.4.1 Cabling Types The following types of cables are used with the ONS 15310-CL: • Optical cables: The OC-3/12 signals operate over fiber spans via small form-factor pluggable (SFP) optics, including intermediate-reach (IR), and long-reach (LR) SFPs. Specification references can be found for the interface in ITU G.957 and GR-253. See “1.4.2 Fiber Cable Installation” section on page 1-6 for more information. Make sure the fiber cables do not bend excessively; maintaining a proper bend radius prevents damage to the optical cable. • Coaxial cables: Coaxial cables connect to the electrical ports using MiniBNC cable connectors. Coaxial cables carry DS-3/EC-1 traffic to and from the ONS 15310-CL. The ONS 15310-CL supports up to three transmit and three receive coaxial connectors on each shelf assembly. Note Cisco recommends you use Cisco-orderable MiniBNC cables to ensure interoperability between the cables and Trompeter MiniBNC connectors on the ONS 15310-CL. • LFH cables: A 96-pin LFH cable provides access to a maximum of 21 DS-1s. See the “1.4.4 DS-1 Cable Installation” section on page 1-7 for more information about the DS-1 cables and connectors. • RJ-45 cables: RJ-45 cables connect to the alarm, LAN, CRAFT, UDC, and timing (BITS) ports. Shielded Twisted-pair (STP) #22 or #24 AWG wire is required for the CRAFT, and UDC ports. Unshielded Twisted-pair is sufficient for the alarm, LAN, and timing ports. 1.4.2 Fiber Cable Installation To install fiber-optic cables on the ONS 15310-CL, a fiber cable with an LC connector must be connected to the SFPs installed in the SFP port on the ONS 15310-CL. The left side connector on the SFP is the transmit port and the right side connector is the receive port. Cisco recommends that you label the transmit and receive ports and the working and protection fibers at each end of the fiber span to avoid confusion with cables that are similar in appearance. Caution You must provide some type of strain relief for the cables, using either the tie-bars specifically designed for the ONS 15310-CL or a site-specific solution. Note Clean all fiber connectors thoroughly. Dust particles can degrade performance. Put caps on any fiber connectors that you do not use. 1.4.3 Coaxial Cable Installation For DS-3/EC-1 traffic the ONS 15310-CL uses coaxial cables and connectors. Cisco recommends connecting a 735A coaxial cable to a patch panel. Use a compatible straight male BNC connector to connect the cable to the DS-3/EC-1 ports. The DS-3/EC-1 cables should be terminated with MiniBNC connectors on the ONS 15310-CL side and BNC connectors on the client side. The electromagnetic compatibility (EMC) performance of the node depends on good-quality DS-3/EC-1 coaxial cables, such as Shuner Type G 03233 D, or the equivalent.1-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.4.4 DS-1 Cable Installation 1.4.4 DS-1 Cable Installation The ONS 15310-CL uses 96-pin LFH connector cabling for DS-1 connections. 1.4.5 Alarm Cable Installation The alarm cables attach to the front of the 15310-CL using an RJ-45 connector that plugs into the ALARM port. The other end of the cable plugs into the alarm-collection equipment. Terminate this end of the cable according to local site practice. The pins on the ALARM port correspond to the three external alarm inputs and the two external alarm outputs (controls) that you can define using Cisco Transport Controller (CTC). Table 1-1 lists the input alarm pinouts and the corresponding alarm function numbers assigned to each port. Figure 1-4 shows RJ-45 pin numbering. Figure 1-4 Pins 1 and 8 on the RJ-45 Connector For more information about external alarms and controls, see the “11.6 External Alarms and Controls” section on page 11-14. Table 1-1 Alarm Pin Assignments RJ-45 Pin Number Function 1 Alarm Contact 1+ 2 Alarm Contact 1– 3 Alarm Contact 2+ 4 Alarm Contact 2– 5 Alarm Input 1 6 Alarm Input 2 7 Alarm Input 3 8 Alarm Input Common 49564 Pin 1 Pin 81-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.4.6 BITS Cable Installation 1.4.6 BITS Cable Installation The building integrated timing supply (BITS) cables attach to the ONS 15310-CL using BITS clock cable and twisted-pair #22 or #24 unshielded AWG wire terminated with an RJ-45 connector that plugs into the BITS port. The other end of the cable plugs into the BITS clock. Terminate this end of the cable according to local site practice. The 15310-CL has one BITS input and one BITS output. The BITS inputs and outputs have corresponding pins on the RJ-45 BITS ports. When connecting BITS cable to the ONS 15310-CL, see Table 1-2 for the BITS cable pin assignments. For more information about connecting BITS timing to the ONS 15310-CL, refer to Chapter 7, “Timing.”. Note Refer to Telcordia SR-NWT-002224 for rules about how to provision timing references. 1.4.7 UDC Cable Installation The 64K/RS-232 user data channel (UDC) interface provides E1, E2, F1, and F2 byte input and output. When connecting UDC cable to the ONS 15310-CL, see Table 1-3 for the UDC cable pin assignments. Shielded Twisted-pair (STP) #22 or #24 AWG wire is required for the UDC ports. . Table 1-2 BITS Cable Pin Assignments RJ-45 Pin Number Function 1 BITS Output+ 2 BITS Output– 3 BITS Input+ 4 — 5 — 6 BITS Input– 7 — 8 — Table 1-3 UDC Cable Pin Assignments Pin Number Function (RS-232 Mode) Function (64K Mode) 1 NC TX+ 2 DTR TX– 3 TXD RX+ 4 GND GND 5 GND GND 6 RXC RX–1-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.5 Fans 1.5 Fans The ONS 15310-CL has five fans permanently mounted to the inside of the chassis. The fans are not removable. 1.6 Cards and Slots Caution Always use the supplied ESD wristband when working with a powered ONS 15310-CL. Plug the wristband cable into the ESD jack located to the left of the expansion slot. The ONS 15310-CL provides one expansion slot that can accommodate one of two Ethernet cards, the CE-100T-8 card or the ML-100T-8 card. These cards have electrical plugs at the back that plug into electrical connectors on the shelf assembly backplane. When the ejectors are fully closed, the card plugs into the assembly backplane. Refer to Chapter 3, “Card Reference” for more information about ONS 15310-CL cards. 7 NC NC 8 NC NC Table 1-3 UDC Cable Pin Assignments (continued) Pin Number Function (RS-232 Mode) Function (64K Mode)1-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 1 Cisco ONS 15310-CL Shelf Assembly Hardware 1.6 Cards and Slots Figure 1-5 shows card installation for the ONS 15310-CL. Figure 1-5 Installing an Ethernet Card Note DS-1 and DS-3/EC-1 interfaces are not intended for direct connection to the network. These interfaces should be connected to the network via a CSU/DSU that has the proper certification. Table 1-4 lists the number of ports, line rates, connector options, and connector locations for ONS 15310-CL electrical, Ethernet, and optical interfaces. 124657 Table 1-4 Port Line Rates, Connector Types, and Locations Interface Ports Line Rate per Port Connector Type Connector Location DS-1 21 1.544 Mbps 96-pin LFH Front of the 15310-CL DS-3 3 44.736 Mbps 75-ohm MiniBNC Front of the 15310-CL EC-1 3 51.84 Mbps 75-ohm MiniBNC Front of the 15310-CL OC-3/OC-12 2 155.52 Mbps (STS-3) 622.08 Mbps (STS-12) LC Front of the 15310-CL CE-100T-8 8 10/100 Mbps RJ-45 CE-100T-8 card faceplate (expansion slot) ML-100T-8 8 10/1000 Mbps RJ-45 ML-100T-8 card faceplate (expansion slot)CHAPTER 2-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 2 Cisco ONS 15310-MA Shelf Assembly Hardware This chapter provides a description of Cisco ONS 15310-MA shelf hardware. Instructions for installing equipment are provided in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 2.1 Installation Overview, page 2-1 • 2.2 Rack Installation, page 2-2 • 2.3 Electrical Interface Assemblies, page 2-5 • 2.4 Front Door, page 2-6 • 2.5 Power and Ground Description, page 2-7 • 2.6 Cable Description and Installation, page 2-10 • 2.7 Cable Routing and Management, page 2-19 • 2.8 Fan-Tray Assembly, page 2-21 • 2.9 Cards and Slots, page 2-22 Note The Cisco ONS 15310-MA assembly is intended for use with telecommunications equipment only. Note The ONS 15310-MA is designed to comply with Telcordia GR-1089-CORE Type 2 and Type 4. Acceptable applications include Central Office Environments (COEs), Electronic Equipment Enclosures (EEEs), Controlled Environment Vaults (CEVs), huts, and Customer Premise Environments (CPEs). 2.1 Installation Overview You can mount the ONS 15310-MA in a 19-inch (482.6 mm) or 23-inch (584.2 mm) rack. The ONS 15310-MA is powered using –48 VDC power. DC power connections are accessed from the rear of the shelf assembly. ONS 15310-MA Ethernet and optical ports are accessible at the front of the shelf assembly, and electrical connections (DS-1, DS-3/EC-1) are accessible at the rear of the shelf assembly through electrical interface assemblies (EIAs).2-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.2 Rack Installation When installed in an equipment rack, the ONS 15310-MA assembly is typically connected to a fuse and alarm panel that provides centralized alarm connection points and distributed power for the ONS 15310-MA. Fuse and alarm panels are third-party equipment and are not described in this documentation. If you are unsure about the requirements or specifications for a fuse and alarm panel, consult the documentation for that product. Note In this chapter, the terms “ONS 15310-MA” and “shelf assembly” are used interchangeably. In the installation context, these terms have the same meaning. Otherwise, shelf assembly refers to the physical steel enclosure that holds cards and connects power, and ONS 15310-MA refers to the entire system, both hardware and software. Install the ONS 15310-MA in compliance with your local and national electrical codes: • United States: National Fire Protection Association (NFPA) 70; United States National Electrical Code • Canada: Canadian Electrical Code, Part I, CSA C22.1 • Other countries: If local and national electrical codes, are not available, refer to IEC 364, Part 1 through Part 7 Detailed compliance and safety information is provided in the Cisco Optical Transport Products Safety and Compliance Information document that ships with the Cisco ONS 15310-MA. 2.2 Rack Installation The ONS 15310-MA is easily mounted in a 19-inch (482.6 mm) or 23-inch (584.2 mm) equipment rack. The shelf assembly can be mounted so that it projects five inches from the front of the rack. It mounts in both EIA-standard and Telcordia-standard racks. A single shelf assembly is 10.67 inches (27.1 mm) wide and occupies 6 RUs (10.5 in. [267.6 mm]) in a rack when installed with a standard cable management bracket. If an extended cable management bracket is installed below the shelf assembly, an additional RU is occupied, for a total of 7 RUs (12.25 in. [311.1 mm]). Two shelf assemblies can be installed side-by-side in a single 23-inch rack; see the “2.2.3 Mounting Multiple Nodes” section on page 2-5 for more information. The ONS 15310-MA measures 10.44 inches (26.51 cm) high, 10.67 inches (27.10 cm) wide, and 12 inches (20.48 cm) deep. Figure 2-1 shows the dimensions of the ONS 15310-MA shelf assembly.2-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.2.1 Mounting Brackets Figure 2-1 ONS 15310-MA Shelf Assembly Dimensions 2.2.1 Mounting Brackets Caution Use only the fastening hardware provided with the ONS 15310-MA to prevent loosening, deterioration, and electromechanical corrosion of the hardware and joined material. Caution When mounting the ONS 15310-MA in a frame with a nonconductive coating (such as paint, lacquer, or enamel) use either the thread-forming screws provided with the ONS 15310-MA shipping kit or remove the coating from the threads to ensure electrical continuity. The shelf assembly ships with mounting brackets suitable for use with 19-inch (482.6mm) and 23-inch (584.2 mm) racks. 12 inches (20.48 cm) deep 10.44 inches (26.51 cm) high 10.67 inches (27.10 cm) wide 1446882-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.2.2 Mounting a Single Node 2.2.2 Mounting a Single Node Mounting the ONS 15310-MA in a rack requires a minimum of 10.5 inches of vertical rack space. To ensure that the mounting is secure, use four #12-24 mounting screws for each side of the shelf assembly. If the larger cable router is used, 12.5 inches of rack space is required. Figure 2-2 shows a single ONS 15310-MA being mounted in a rack, using a universal bracket. Figure 2-2 Mounting a Single ONS 15310-MA in a Rack 1447052-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.2.3 Mounting Multiple Nodes 2.2.3 Mounting Multiple Nodes Most standard seven-foot (2.1 m) racks can hold numerous ONS 15310-MA nodes and a fuse and alarm panel. Two shelf assemblies can be installed side-by-side in a single 23-inch rack, using a special mounting bracket. You can install both ONS 15310-MA shelves in the 23-inch rack at one time, or you can mount a second shelf assembly next to a shelf assembly that has already been installed. Refer to the “Install the Cisco ONS 15310-MA” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for more information. 2.3 Electrical Interface Assemblies High-density EIAs are attached to the ONS 15310-MA shelf assembly backplane to provide up to 168 transmit and receive DS-1 connections through six Champ connectors per side (A and B) or six transmit and receive DS-3/EC-1 connections through six BNC connectors per side. The EIAs are designed to support DS-1, DS-3, and EC-1 signals. The appropriate cable assembly is required depending on the type of signal. Note The HD expansion connectors on the high-density EIA are not supported in Software Release 7.0.x and earlier. You can install EIAs on one or both sides of the ONS 15310-MA. As you face the rear of the shelf assembly, the right side is the A side (15310-EIA-HD-A) and the left side is the B side (15310-EIA-HD-B). Figure 2-3 shows the J connectors on the A- and B-side high-density EIAs installed on the ONS 15310-MA.2-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.4 Front Door Figure 2-3 High-Density EIA Connectors To install the EIA on the rear of the shelf assembly, you must first remove the standard sheet metal covers. The EIAs use the same screw holes as the standard sheet metal covers, but they use three holes for panhead screws and two holes for jack screws. When installed with the standard door and cabling on the backplane, the ONS 15310-MA shelf measures approximately 13.7 inches (34.8 cm) deep when fully populated with backplane cables. 2.4 Front Door The ONS 15310-MA is orderable with a front door. You must install the ground strap on the door after you install the door (Figure 2-4). 151584 DS1 OUT J8 DS1 IN J9 DS1 OUT J10 DS1 IN J11 DS1 OUT J12 DS1 IN J13 J20-HD DS3 1 3 2 J6-ALM INPUT PWR A J15-IN J16-OUT J17-IN J14-OUT J18-OUT J19-IN PID VID S/N BAR CODE CLEI CODE P/N COO -48VDC RTN DS1 OUT J21 DS1 IN J22 DS1 OUT J23 DS1 IN J24 DS1 OUT J25 DS1 IN J26 J33-HD DS3 1 2 3 PWR B J1-LAN J29-OUT J30-IN J31-OUT J27-OUT J28-IN J32-IN PID VID S/N CLEI CODE BAR CODE P/N COO RTN -48VDC J2-CRFT J3-UDC J4-BITS1 J5-BITS2 J7-ALM OUT2-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.5 Power and Ground Description Figure 2-4 ONS 15310-MA Door Ground Strap 2.5 Power and Ground Description This section describes how to connect the ONS 15310-MA shelf assembly to the power supply. For detailed procedures, refer to the “Install the Cisco ONS 15310-MA” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Terminate the chassis ground (located on both sides of the rear of the shelf assembly or at the bottom of the shelf assembly) to either the office ground or rack ground before you install the power. Use the grounding lug to attach the #6 AWG ground cable to the #10-32 mount ground lug on the shelf assembly according to local site practice. Ground one cable to ground the shelf assembly. Terminate the other end of the rack ground cable to ground according to local site practice. Figure 2-5 shows the grounding holes on the bottom of the ONS 15310-MA. 1447062-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.5 Power and Ground Description Figure 2-5 Ground Holes on the Bottom of the ONS 15310-MA Shelf Assembly Figure 2-6 show the grounding holes on the sides of the ONS 15310-MA. 144707 Ground holes2-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.5 Power and Ground Description Figure 2-6 Ground Holes on the Left and Right Sides of the ONS 15310-MA Shelf Assembly Caution Always use the supplied ESD wristband when working with a powered ONS 15310-MA. Plug the wristband cable into either ESD jack, located on the far left and right slots of the shelf assembly. Note Use an external disconnect for service purposes and install it according to local site practice. Ground holes 144708 Ground holes2-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6 Cable Description and Installation The ONS 15310-MA DC power provides redundant –48 VDC power terminals on the rear of the chassis. The terminals are labeled A and B and are located at each end of the shelf assembly. To install redundant power feeds, use four power cables and one ground cable. For a single power feed, only two power cables and one ground cable are required. Use #12 AWG power cables and a #6 AWG ground cable and, to ensure circuit overcurrent protection, use a conductor with low impedance. The conductor must have the capability to safely conduct any fault current that might be imposed. Do not use aluminum conductors. Caution If the system loses power or the CTX2500 card is reset, you must reset the ONS 15310-MA clock unless the node has been previously provisioned to use Simple Network Time Protocol (SNTP). SNTP updates the clock over the LAN. 2.6 Cable Description and Installation This section describes fiber-optic, DS-3/EC-1 (coaxial), DS-1 (64-pin Champ), UDC, and twisted-pair cables. 2.6.1 Cabling Types The following types of cables are used with the ONS 15310-MA: • Optical cables: The OC-3/12/48 signals operate over fiber spans through SFP optics, including intermediate-reach (IR) and long-reach (LR) SFPs. Specification references can be found for the interface in ITU G.957 and Telcordia GR-253. See the “2.6.2 Fiber Cable Installation” section on page 2-12 for more information. Make sure the fiber cables do not bend excessively; maintaining a proper bend radius prevents damage to the optical cable. • DS-1 cables: DS-1 cables (shielded, twisted-pair) connect to the electrical ports at the rear of the shelf assembly using Champ cable connectors. DS-1 cables carry DS-1 traffic to and from the ONS 15310-MA. The ONS 15310-MA supports up to three transmit and three receive Champ-64 connectors on each side of the shelf assembly, for a maximum of 84 DS-1 signals per side of the shelf. A compatible DS-1 cable is available from Atlanta Cable Sales, Inc. Atlanta Cable Sales, Inc. 495 Horizon Drive, Suite 200 Suwanee, GA 30024 1-800-241-9881, Ext. 4014 http://www.acssolutions.com The ACS part number and description are: T015654-Length. Cable assembly with the cable exit at 1 & 33. This cable solution offers two screw points on the cable head for attachment, see Figure 2-7 on page 2-11, and is equivalent in characteristics to the defacto 1161A rated cable. 2-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.1 Cabling Types Figure 2-7 ACS Cable T015654 Refer to Table 2-1 for compatible DS-1 cables available from Lorom Indrustrial Co., LTD. Lorom Industrial Co., LTD. 15th Floor, Room 2, Number 78, Sec 2 AN-HO Road Taipei, Taiwan Phone: 886-2-2706-6037 Fax: 886-2-2704-6396 • Coaxial cables: Coaxial cables connect to the electrical ports using BNC cable connectors. Coaxial cables carry DS-3/EC-1 traffic to and from the ONS 15310-MA. The ONS 15310-MA supports up to three transmit and three receive coaxial connectors on each shelf assembly. • RJ-45 cables: RJ-45 cables connect to the LAN, CRAFT, and UDC ports. An unshielded twisted-pair (STP) #22 or #24 AWG wire is required for the CRAFT and UDC ports. Unshielded twisted-pair is sufficient for the alarm, LAN, and timing ports. 10/100-Mbps RJ-45 Ethernet cables are used to connect the CE-100T-8 and ML-100T-8 cards. • Alarm and timing (BITS) cables: The Alarm In port requires a shielded cable terminated with a DB-37 connector; Alarm Out requires a shielded cable terminated with a DB-25 connector; and the building integrated timing supply (BITS) ports require DB-9 connectors. 240751 1 33 32 & 64 1 & 33 Front view Top view of hood 64 position male Telco connector Main label 1/8” clear heatshrink covering screw P1 label 32 64 Table 2-1 DS-1 Cables ACS Part Numbers Length Description PCAM90SPA0PC001 25 feet Connector-Wire Wrap, DSX PCAM90SPA1OC001 50 feet Connector-Wire Wrap, DSX PCAM90SPA3MC001 100 feet Connector-Wire Wrap, DSX PCAM90SPA7IC001 200 feet Connector-Wire Wrap, DSX2-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.2 Fiber Cable Installation 2.6.2 Fiber Cable Installation To install fiber-optic cables on the ONS 15310-MA, a fiber cable with an LC connector must be connected to an SFP. SFPs are installed in the SFP port on the ONS 15310-MA. Each LC connector contains the transmit (Tx) and receive (Rx) signal for that port. Cisco recommends that you label the transmit and receive ports and the working and protection fibers at each end of the fiber span to avoid confusion with cables that are similar in appearance. You can route fiber cables through the optional fiber guide, installed at the bottom of the shelf assembly (Figure 2-8). Figure 2-8 Shelf Assembly with Fiber Guide Installed Caution You must provide some type of strain relief for the cables, using either a tie-bar or other site-specific solution. 144704 Fiber guide2-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.3 Coaxial Cable Installation Note Clean all fiber connectors thoroughly. Dust particles can degrade performance. Put caps on any fiber connectors that you do not use. 2.6.3 Coaxial Cable Installation For DS-3/EC-1 traffic, the ONS 15310-MA uses coaxial cables and connectors. Cisco recommends connecting a 735A coaxial cable to a patch panel. Use a compatible male BNC connector to connect the cable to the DS-3/EC-1 ports. The DS-3/EC-1 cables should be terminated with BNC connectors on the ONS 15310-MA side and BNC connectors on the client side. Due to the minimal space between BNC connectors and DS-1 connectors, you might require a special tool for inserting and removing BNC EIAs (Figure 2-9). Figure 2-9 BNC Insertion and Removal Tool This tool can be obtained with P/N 227-T1000 from: Amphenol USA (www.amphenol.com) One Kennedy Drive Danbury, CT 06810 Phone: 203 743-9272 Fax: 203 796-2032 This tool can be obtained with P/N RT-1L from: Trompeter Electronics Inc. (www.trompeter.com) 31186 La Baya Drive Westlake Village, CA 91362-4047 Phone: 800 982-2629 Fax: 818 706-1040 2.6.4 DS-1 Cable Installation The ONS 15310-MA uses 64-pin Champ connector cabling for DS-1 connections. Table 2-2 lists the Champ connector pin assignments and the corresponding EIA connector mapping for connectors J8 and J9 on the EIA installed on the A side, and connectors J21 and J22 on the EIA installed on the B side. 44552 Table 2-2 Champ Connector Pin Assignments—Side-A EIA, Connectors J8 and J9; Side-B EIA, Connectors J21 and J22 Signal Pin Signal Pin Ring Port 1 1 Tip Port 1 33 Ring Port 2 2 Tip Port 2 34 Ring Port 3 3 Tip Port 3 35 Ring Port 4 4 Tip Port 4 362-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.4 DS-1 Cable Installation Table 2-3 lists the Champ connector pin assignments and the corresponding EIA connector mapping for connectors J10 and J11 on the EIA installed on the A side, and connectors J23 and J24 on the EIA installed on the B side. Ring Port 5 5 Tip Port 5 37 Ring Port 6 6 Tip Port 6 38 Ring Port 7 7 Tip Port 7 39 Ring Port 8 8 Tip Port 8 40 Ring Port 9 9 Tip Port 9 41 Ring Port 10 10 Tip Port 10 42 Ring Port 11 11 Tip Port 11 43 Ring Port 12 12 Tip Port 12 44 Ring Port 13 13 Tip Port 13 45 Ring Port 14 14 Tip Port 14 46 Ring Port 15 15 Tip Port 15 47 Ring Port 16 16 Tip Port 16 48 Ring Port 17 17 Tip Port 17 49 Ring Port 18 18 Tip Port 18 50 Ring Port 19 19 Tip Port 19 51 Ring Port 20 20 Tip Port 20 52 Ring Port 21 21 Tip Port 21 53 Ring Port 22 22 Tip Port 22 54 Ring Port 23 23 Tip Port 23 55 Ring Port 24 24 Tip Port 24 56 Ring Port 25 25 Tip Port 25 57 Ring Port 26 26 Tip Port 26 58 Ring Port 27 27 Tip Port 27 59 Ring Port 28 28 Tip Port 28 60 Unused 29 Unused 61 Unused 30 Unused 62 Unused 31 Unused 63 Unused 32 Unused 64 Table 2-2 Champ Connector Pin Assignments—Side-A EIA, Connectors J8 and J9; Side-B EIA, Connectors J21 and J22 (continued) Signal Pin Signal Pin2-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.4 DS-1 Cable Installation Table 2-4 lists the Champ connector pin assignments and the corresponding EIA mapping for connectors J12 and J13 on the A-side EIA, and connectors J25 and J26 on the B-side EIA. Table 2-3 Champ Connector Pin Assignments—Side-A EIA, Connectors J10 and J11; Side-B EIA, Connectors J23 and J24 Signal Pin Signal Pin Ring Port 29 1 Tip Port 29 33 Ring Port 30 2 Tip Port 30 34 Ring Port 31 3 Tip Port 31 35 Ring Port 32 4 Tip Port 32 36 Ring Port 33 5 Tip Port 33 37 Ring Port 34 6 Tip Port 34 38 Ring Port 35 7 Tip Port 35 39 Ring Port 36 8 Tip Port 36 40 Ring Port 37 9 Tip Port 37 41 Ring Port 38 10 Tip Port 38 42 Ring Port 39 11 Tip Port 39 43 Ring Port 40 12 Tip Port 40 44 Ring Port 41 13 Tip Port 41 45 Ring Port 42 14 Tip Port 42 46 Ring Port 43 15 Tip Port 43 47 Ring Port 44 16 Tip Port 44 48 Ring Port 45 17 Tip Port 45 49 Ring Port 46 18 Tip Port 46 50 Ring Port 47 19 Tip Port 47 51 Ring Port 48 20 Tip Port 48 52 Ring Port 49 21 Tip Port 49 53 Ring Port 50 22 Tip Port 50 54 Ring Port 51 23 Tip Port 51 55 Ring Port 52 24 Tip Port 52 56 Ring Port 53 25 Tip Port 53 57 Ring Port 54 26 Tip Port 54 58 Ring Port 55 27 Tip Port 55 59 Ring Port 56 28 Tip Port 56 60 Unused 29 Unused 61 Unused 30 Unused 62 Unused 31 Unused 63 Unused 32 Unused 642-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.4 DS-1 Cable Installation Table 2-4 Champ Connector Pin Assignments—Side-A EIA, Connectors J12 and J13; Side-B EIA, Connectors J25 and J26 Signal Pin Signal Pin Ring Port 57 1 Tip Port 57 33 Ring Port 58 2 Tip Port 58 34 Ring Port 59 3 Tip Port 59 35 Ring Port 60 4 Tip Port 60 36 Ring Port 61 5 Tip Port 61 37 Ring Port 62 6 Tip Port 62 38 Ring Port 63 7 Tip Port 63 39 Ring Port 64 8 Tip Port 64 40 Ring Port 65 9 Tip Port 65 41 Ring Port 66 10 Tip Port 66 42 Ring Port 67 11 Tip Port 67 43 Ring Port 68 12 Tip Port 68 44 Ring Port 69 13 Tip Port 69 45 Ring Port 70 14 Tip Port 70 46 Ring Port 71 15 Tip Port 71 47 Ring Port 72 16 Tip Port 72 48 Ring Port 73 17 Tip Port 73 49 Ring Port 74 18 Tip Port 74 50 Ring Port 75 19 Tip Port 75 51 Ring Port 76 20 Tip Port 76 52 Ring Port 77 21 Tip Port 77 53 Ring Port 78 22 Tip Port 78 54 Ring Port 79 23 Tip Port 79 55 Ring Port 80 24 Tip Port 80 56 Ring Port 81 25 Tip Port 81 57 Ring Port 82 26 Tip Port 82 58 Ring Port 83 27 Tip Port 83 59 Ring Port 84 28 Tip Port 84 60 Unused 29 Unused 61 Unused 30 Unused 62 Unused 31 Unused 63 Unused 32 Unused 642-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.5 Alarm Cable Installation 2.6.5 Alarm Cable Installation The alarm cables attach to the rear of the ONS 15310-MA at the ALARM In and ALARM Out ports. The other ends of the cables plug into the alarm-collection equipment. Terminate the ends of these cables according to local site practice. The pins on the ALARM In and ALARM Out ports correspond to the 32 external alarm inputs and the 8 external alarm outputs (controls) that you can define using Cisco Transport Controller (CTC). Table 2-5 shows the default input alarm pinouts and the corresponding alarm numbers assigned to each port. Refer to this table when connecting alarm cables to the ONS 15310-MA. Table 2-6 shows the default output alarm pinouts and the corresponding alarm numbers assigned to each port. Refer to this table when connecting alarm cables to the ONS 15310-MA. Table 2-5 Default Alarm Pin Assignments—Inputs DB-37 Pin Number Function DB-37 Pin Number Function 1 Alarm 1 20 Alarm 18 2 Alarm 2 21 Alarm 19 3 Alarm 3 22 Alarm 20 4 Alarm 4 23 Alarm 21 5 Alarm 5 24 Alarm 22 6 Alarm 6 25 Alarm 23 7 Alarm 7 26 Alarm 24 8 Alarm 8 27 Common 17–24 9 Common 1–8 28 Alarm 25 10 Alarm 9 29 Alarm 26 11 Alarm 10 30 Alarm 27 12 Alarm 11 31 Alarm 28 13 Alarm 12 32 Alarm 29 14 Alarm 13 33 Alarm 30 15 Alarm 14 34 Alarm 31 16 Alarm 15 35 Alarm 32 17 Alarm 16 36 Common 25–32 18 Common 9–16 37 N/C 19 Alarm 17 — — Table 2-6 Default Alarm Pin Assignments—Outputs DB-25 Pin Number Function DB-25 Pin Number Function 1 Out 1+ 14 Out 2+ 2 Out 1– 15 Out 2– 3 — 16 Out 3+ 4 — 17 Out 3–2-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.6 BITS Cable Installation For more information about external alarms and controls, see the “11.6 External Alarms and Controls” section on page 11-14. 2.6.6 BITS Cable Installation The BITS clock cable (terminated with a DB-9 connector) attaches to the BITS port on the ONS 15310-MA. The other end of the cable plugs into the BITS clock. Terminate this end of the cable according to local site practice. The 15310-MA has one BITS input and one BITS output. The BITS inputs and outputs have corresponding pins on the DB-9 BITS ports. When connecting BITS cable to the ONS 15310-MA, see Table 2-7 for the BITS cable pin assignments. For more information about connecting BITS timing to the ONS 15310-MA, refer to Chapter 7, “Timing.” 5 — 18 Out 4+ 6 — 19 Out 4– 7 — 20 Out 5+ 8 — 21 Out 5– 9 — 22 Out 6+ 10 — 23 Out 6– 11 — 24 Out 7+ 12 Out 8+ 25 Out 7– 13 Out 8– — — Table 2-6 Default Alarm Pin Assignments—Outputs (continued) DB-25 Pin Number Function DB-25 Pin Number Function Table 2-7 BITS Cable Pin Assignments DB-9 Pin Number Function 1 BITS Output+ 2 BITS Output– 3 — 4 — 5 — 6 BITS Input+ 7 BITS Input– 8 — 9 —2-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.6.7 UDC Cable Installation Note Refer to Telcordia SR-NWT-002224 for rules about how to provision timing references. 2.6.7 UDC Cable Installation The 64K, EIA/TIA-232 user data channel (UDC) interface provides F1 and F2 byte input and output. When connecting the UDC cable to the ONS 15310-MA, see Table 2-8 for the UDC cable pin assignments. Unshielded twisted-pair #22 or #24 AWG wire is required for the UDC ports. 2.7 Cable Routing and Management Two types of cable management brackets are available for the ONS 15310-MA shelf assembly: the standard bracket, which ships with the ONS 15310-MA ship kit, and the extended bracket, which ships as a separate orderable part. You can install either bracket under the shelf assembly. 2.7.1 Standard Cable Management Bracket The standard cable management bracket has one area in the rear that can be used for routing cables. Fiber-optic cable can be routed through the rear trough of the bracket. Ethernet cables can be passed through the front of the bracket to be bundled and secured using tie-wraps or other site-specific materials. Figure 2-10 shows the installation of the standard cable management bracket. Table 2-8 UDC Cable Pin Assignments RJ-45 Pin Number RS-232/64K Mode 1 TX + 2 TX – 3 RX + 4 — 5 — 6 RX – 7 — 8 —2-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.7.2 Extended Cable Management Bracket Figure 2-10 Installing the Standard Cable Management Bracket 2.7.2 Extended Cable Management Bracket The extended cable management bracket has two areas that can be used for routing cables, one in the front and one in the rear. Fiber-optic cables can be routed through the smaller front trough, and Ethernet cables can be routed through the larger rear trough. 1515772-21 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.8 Fan-Tray Assembly Figure 2-11 shows the installation of the extended cable management bracket. Figure 2-11 Installing the Extended Cable Management Bracket 2.8 Fan-Tray Assembly The fan-tray assembly is located at the top of the ONS 15310-MA shelf assembly, under the air filter, rear exhaust, and air inlet. The fan tray is a removable drawer that holds four fans and the fan-control circuitry for the ONS 15310-MA. After you install the fan tray, you should only need to access it if a fan failure occurs. 1515782-22 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.8.1 Fan Speed and Power Requirements The front of the fan-tray assembly has CRIT, MAJ, and MIN alarm LEDs that illuminate if a Critical, Major, or Minor alarm is present anywhere on the ONS 15310-MA assembly. 2.8.1 Fan Speed and Power Requirements Fan speed is controlled by temperature sensors on the CTX2500 card. The sensors measure the input air temperature at the fan-tray assembly. Fan speed options are low, medium, and high. 2.8.2 Fan Failure If one or more fans fail on the fan-tray assembly, replace the entire assembly. You cannot replace individual fans. The red Fan Fail LED on the front of the fan tray illuminates when one or more fans fail. For fan-tray replacement instructions, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. The red Fan Fail LED is unlit after you install a working fan tray. 2.8.3 Air Filter The ONS 15310-MA contains a reusable air filter (15310-MA-FTF) that is installed above the fan-tray assembly. The reusable filter is made of a gray, open-cell, polyurethane foam that is specially coated to provide fire and fungi resistance. Spare filters should be kept in stock. Caution Do not operate an ONS 15310-MA without the mandatory fan-tray air filter. 2.9 Cards and Slots Caution Always use the supplied ESD wristband when working with a powered ONS 15310-MA. Plug the wristband cable into either ESD jack, located on the far left and right slots of the shelf assembly. The ONS 15310-MA has six card slots. Slots 3 and 4 are dedicated to the common-control (CTX2500) cards. Slots 1, 2, 5, and 6 can accommodate the following traffic cards: • Ethernet: CE-100T-8 card, ML-100T-8 card • Electrical: DS1-28/DS3-EC1-3 card, DS1-84/DS3-EC1-3 card These cards have plugs at the rear of the card. When the ejectors are fully closed, the card plugs into the assembly backplane. When no card is installed in a card slot, a filler card should be installed. Use a CTX2500 filler card in empty CTX2500 slots (Slots 3 and 4), and an expansion filler card in empty traffic card slots (Slots 1, 2, 5, and 6). Refer to Chapter 3, “Card Reference” for more information about ONS 15310-MA cards.2-23 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.9 Cards and Slots Figure 2-12 shows card installation for the ONS 15310-MA. Figure 2-12 Installing a Card in an ONS 15310-MA Table 2-9 lists the number of ports, line rates, connector options, and connector locations for ONS 15310-MA electrical, Ethernet, and optical interfaces. 144703 Table 2-9 Port Line Rates, Connector Types, and Locations Interface Ports Line Rate per Port Connector Type Connector Location DS-1 28/84 1.544 Mbps Champ Rear of the 15310-MA shelf assembly DS-3 3 44.736 Mbps BNC Rear of the 15310-MA shelf assembly EC-1 3 51.84 Mbps BNC Rear of the 15310-MA shelf assembly OC-3/OC-12/OC-48 2 155.52 Mbps (STS-3) 622.08 Mbps (STS-12) LC CTX2500 card faceplate Ethernet (CE-100T-8 card)1 1. The CE-100T-8 card with PID 15310-CE-100T-8 is not compatible with the ONS 15310-MA, only the ONS 15310-CL. The 15310-P-CE-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. 8 10/100 Mbps RJ-45 CE-100T-8 card faceplate Ethernet (ML-100T-8 card)2 2. The ML-100T-8 card with PID 15310-ML-100T-8 is not compatible with the ONS 15310-MA, only the ONS 15310-CL. The 15310-P-ML-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. 8 10/1000 Mbps RJ-45 ML-100T-8 card faceplate 2-24 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 2 Cisco ONS 15310-MA Shelf Assembly Hardware 2.9 Cards and SlotsCHAPTER 3-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 3 Card Reference This chapter describes the Cisco ONS 15310-CL and Cisco ONS 15310-MA cards. It includes descriptions and block diagrams for each card. For specifications, see Appendix A, “Specifications.”For card installation and turn-up procedures, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 3.1 Card Summary and Compatibility, page 3-1 • 3.2 15310-CL-CTX Card, page 3-5 • 3.3 CTX2500 Card, page 3-8 • 3.4 CE-100T-8 Card, page 3-10 • 3.5 ML-100T-8 Card, page 3-14 • 3.6 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards, page 3-18 • 3.7 Filler Cards, page 3-19 • 3.8 SFP Modules, page 3-20 Note The I-Temp symbol is located on the faceplate of an I-Temp compliant card. A card without this symbol is C-Temp compliant. 3.1 Card Summary and Compatibility The Cisco ONS 15310-CL uses a common-control card (the 15310-CL-CTX), an interconnect card, a connector expansion card, and a traffic expansion card (either the CE-100T-8 or ML-100T-8 Ethernet card). The 15310-CL-CTX card provides optical and electrical connections for the ONS 15310-CL. The Cisco ONS 15310-MA uses a common-control card (the CTX2500) and a combination of Ethernet cards (CE-100T-8 and ML-100T-8) and electrical cards (DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3). The CTX2500 card provides optical connections for the ONS 15310-MA. This section provides a card summary. Figure 3-1 shows the ONS 15310-CL with an expansion card being inserted. 3-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.1 Card Summary and Compatibility Figure 3-1 ONS 15310-CL with Expansion Card Being Inserted Figure 3-2 shows the ONS 15310-MA fully populated with cards. Expansion Card 15310_CTX-CL Card 131593 Front Panel3-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.1.1 Card Summary Figure 3-2 ONS 15310-MA with Cards Installed 3.1.1 Card Summary Table 3-1 ONS 15310-CL and ONS 15310-MA Cards and Descriptions Card Compatible Platform(s) Description For Additional Information... 15310-CL-CTX CL only The 15310-CL-CTX card serves as the common control and central switching element for the ONS 15310-CL. See the “3.2 15310-CL-CTX Card” section on page 3-5. CTX2500 MA only The CTX2500 card serves as the common control and central switching element for the ONS 15310-MA. See the “3.3 CTX2500 Card” section on page 3-8. CE-100T-8 MA and CL The CE-100T-8 card provides eight RJ-45 10/100-Mbps Ethernet ports. See the “3.4 CE-100T-8 Card” section on page 3-10. ML-100T-8 MA and CL The ML-100T-8 Ethernet card provides eight ports of 10/100 Ethernet-encapsulated traffic into SONET/SDH STS-3/STM-1 payloads. See the “3.5 ML-100T-8 Card” section on page 3-14. 1446893-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.1.2 Card Compatibility 3.1.2 Card Compatibility Table 3-2 lists CTC software release compatibility for each ONS 15310-CL and ONS 15310-MA card. In the table, “Yes” means that the card is compatible with the listed software release. . DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 MA only The DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards provide 28 and 84 Telcordia-compliant DS-1 ports, respectively, as well as three DS-3/EC-1 ports. See the “3.6 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards” section on page 3-18. Filler Card (Traffic Slot) MA and CL The FILLER card is used to fill unused traffic card slots in the ONS 15310-CL and ONS 15310-MA shelves. The Cisco Transport Controller (CTC) graphical user interface (GUI) detects the filler card. See the “3.7 Filler Cards” section on page 3-19. Filler Card (CTX2500 Slot) MA only The CTX FILLER card is used to fill unused CTX2500 card slots in the ONS 15310-MA shelf. CTC detects the filler card. See the “3.7 Filler Cards” section on page 3-19. SFP Modules MA and CL Small Form-factor Pluggables (SFPs) are integrated fiber-optic transceivers that provide high-speed serial links from a port or slot to the network. See the “3.8 SFP Modules” section on page 3-20 Table 3-1 ONS 15310-CL and ONS 15310-MA Cards and Descriptions (continued) Card Compatible Platform(s) Description For Additional Information... Table 3-2 ONS 15310-CL and ONS 15310-MA Software Release Compatibility Per Card Card R5.0 R6.0 R7.0 15310-CL-CTX (ONS 15310-CL Only) Yes Yes Yes CTX2500 (ONS 15310-MA Only) No No Yes CE-100T-8 Card1 1. The CE-100T-8 card with product ID (PID) 15310-CE-100T-8 is not compatible with the ONS 15310-MA. 15310-P-CE-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. Yes Yes Yes ML-100T-8 Card2 2. The ML-100T-8 card with PID 15310-ML-100T-8 is not compatible with the ONS 15310-MA shelf assembly. 15310-P-ML-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. Yes Yes Yes DS1-28/DS3-3 (ONS 15310-MA Only) No No Yes DS1-84/DS3-3 (ONS 15310-MA Only) No No Yes FILLER Card Yes Yes Yes CTX FILLER Card (ONS 15310-MA Only) No No Yes3-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.2 15310-CL-CTX Card 3.2 15310-CL-CTX Card This section describes the features and functions of the ONS 15310-CL Common Control, Timing, Cross-Connect Customer-Located (15310-CL-CTX) card. The 15310-CL-CTX card is an internal, nonremovable card residing in the ONS 15310-CL platform. It operates in a nonredundant configuration and performs system initialization, provisioning, alarm reporting, maintenance, diagnostics, IP address detection/resolution, SONET data communications channel (DCC) termination, system fault detection, and cross-connect maintenance and management for the ONS 15310-CL. The card also provides the circuitry for the DS-1, DS-3/EC-1, and OC-3/OC-12 interfaces and ensures that the system maintains timing with SMC stability. The 15310-CL-CTX card connects to an expansion card (CE-100T-8 or ML-100T-8) through a mechanical interconnect card within the ONS 15310-CL chassis that is similar to a backplane in appearance. The ONS 15310-CL provides a front chassis opening that accepts either a filler card, a CE-100T-8 plug-in card, or an ML-100T-8 plug-in card. When a card is plugged in, it connects to the 15310-CL-CTX card through the interconnect card. The 15310-CL-CTX has three sets of ports: • Wideband electrical (WBE) ports • Broadband electrical (BBE) ports • Optical pluggable port module (PPM) ports; PPM is the graphical user interface term for SFPs See the “3.2.6 Electrical Interface (BBE and WBE)” section on page 3-8 and the “3.2.4 15310-CL-CTX Optical Interfaces” section on page 3-7 for more information. The 15310-CL-CTX card does not have a faceplate because it is located inside the chassis; however, the 15310-CL-CTX LED indicators and connectors are located on the ONS 15310-CL front panel (Figure 3-3). Figure 3-3 ONS 15310-CL Front Panel FAIL ALARM PWR SYNC EXPANSION LAMP TEST SYSTEM RESET Tx Rx 1 LAN BITS CRAFT ALARM UDC DS1 (1-21) Tx Rx 2 Tx Rx 1 100-240V~ 50-60Hz 2A DS3/ EC1 Tx Rx 2 DS3/ EC1 Tx Rx 3 DS3/ EC1 CLASS 1 LASER CLEI BARCODE 1246463-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.2.1 Features Figure 3-4 shows a functional block diagram of the 15310-CL-CTX card. Figure 3-4 15310-CL-CTX Block Diagram 3.2.1 Features The 15310-CL-CTX card has the following features: • Support for a maximum of 21 bidirectional DS-1 and three DS-3/EC-1 ports • Support for two SFP/LC optical interfaces for OC-3/OC-12 • 10/100BaseT LAN interface for CTC software • 57.6-K maximum baud rate EIA/TIA-232 craft interface for Transaction Language One (TL1) • Configurable alarm inputs and outputs (three input alarms and two alarm output contacts) 155M STS-XC LINE / SECTION TERMINATION POINTER PROCESSOR SFP OC3/12 SFP OC3/12 REFERENCE MONITOR + SELECTION MUX 19.44M SYSTEM PLL WITH HOLDOVER TCXO 20ppm CLOCK Line Section Termination VT-XC TU-XC IDE INTERFACE Compact BOOT FLASH Flash Card Memory Processor BITS LIU + FRAMER 1.544M / 2.048M ALARM Input/Contact CRAFT RS232 LAN 10/100M UDC 64K/ RS232 Interface NON-ISOLATED DC-DC CONVERTERS 3.3V 2.5V ETC BITS Cross Connect SONET Traffic STS48 (SXC-9) PDH Mapper T1/E1 LIUs T3/E3/ STS1 LIU 21 T1 3 T3/EC1 ETHERNET Expansion slot Front Panel Interface FAN Controller Overhead Bus 19.44M SYSTEM PLL PDH CLOCKS SONET CLOCKS PDH SUBSYSTEM CLOCK GEN 155M XC PLL USER DATA CHANNEL RS232 FANS CLOCK SUBSYSTEM PROCESSOR COMPLEX Front Panel Interface LEDs POWER SUBSYSTEM Expansion Port Timing Subsystem 1246503-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.2.2 Synchronization and Timing • One building integrated timing supply (BITS) input and one BITS output • User data channel (UDC) connector for synchronous 64-Kbps or asynchronous EIA/TIA-232 communication • Free-running SMC clock accurate to 20 ppm • Timing reference to external BITS, optical links, or DS-1/EC-1 ports • Retime any DS-1/EC-1 port, or use the ports as a timing source • Nonblocking high-order STS1 cross-connect • STS-48 worth of low-order cross-connect • STS-24 worth of low-order VT1.5 cross-connect 3.2.2 Synchronization and Timing This synchronization and timing subsystem is responsible for monitoring and selecting reference clocks in the node. A free-running SMC clock, accurate to 20 ppm, is available for internal synchronization in the event that no synchronization timing source is available. The 15310-CL-CTX card is normally synchronized from the optical link. 3.2.3 System Cross-Connect This subsystem is responsible for the set up and maintenance of cross-connections within the system. It supports STS-Nc, STS-1, and VT1.5 cross-connect capability in SONET mode. 3.2.4 15310-CL-CTX Optical Interfaces The optical subsystem provides two SFP optical transceivers for two OC-3/OC-12 SONET-compliant interfaces. SFPs attach to the ONS 15310-CL front panel via two SFP (PPM) slots. Each slot can contain a single-rate (OC-3 or OC-12) or multirate (OC-3 and OC-12) PPM. Note PPM is the graphical user interface term for SFPs. Single-rate PPMs are autoprovisioned when they are installed, but multirate PPMs must be provisioned. This behavior can be controlled by NE defaults. To provision, edit, or delete PPM ports, refer to the “Change Port Settings” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. For more information about PPMs, see the “3.8 SFP Modules” section on page 3-20. 3.2.5 Communication and Control This subsystem is responsible for overall control of the system, such as system initialization, provisioning, alarm reporting, maintenance, diagnostics, intercard communication, DCC termination, and system fault detection.3-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.2.6 Electrical Interface (BBE and WBE) 3.2.6 Electrical Interface (BBE and WBE) This subsystem supports Telcordia GR-499 compliant, 1.544-Mbps (DS-1) and 44.736-Mbps (DS-3/EC-1) interfaces. Performance monitoring (PM) is provided by means of this interface to allow validation of signal quality. There are three DS-3 or EC-1 (BBE) ports located on the ONS 15310-CL front panel. BBE ports are automatically provisioned as DS-3 ports via network element (NE) defaults, but can be provisioned as EC-1 ports. See Appendix C, “Network Element Defaults Description” for more information. BBE ports support provisioning, configuration, creation, and deletion via CTC. Any outgoing DS-1 signal can be retimed to eliminate accumulated jitter and wander at the point of egress from a synchronous network. Any incoming DS-1 signal from the transport element can also be used as timing source. There are 21 DS-1 (WBE) ports available at the LFH 96-pin connector on the ONS 15310-CL front panel. WBE ports are automatically provisioned and cannot be deleted or changed. 3.2.7 15310-CL-CTX Card-Level Indicators The 15310-CL-CTX card is responsible for operating the LED indicators on the ONS 15310-CL front panel. The panel has four card-level LEDs, described in Table 3-3. 3.3 CTX2500 Card The CTX2500 card, for use with the ONS 15310-MA, is a fully nonblocking cross-connect card that operates in either a simplex or duplex (redundant) configuration. It performs system initialization, provisioning, alarm reporting, maintenance, diagnostics, IP address detection/resolution, SONET DCC termination, system fault detection, and cross-connect maintenance and management for the ONS 15310-MA. The card also provides the circuitry for the OC-3/OC-12/OC-48 interfaces, and ensures that the system maintains timing with SMC stability. Caution If the system loses power or the CTX2500 card is reset, you must reset the ONS 15310-MA clock unless the node has been previously provisioned to use Simple Network Time Protocol (SNTP) to update the clock over the LAN. Table 3-3 15310-CL-CTX Card-Level Indicators Card-Level LEDs Description FAIL LED (Red) The red FAIL LED indicates that the card processor is not ready or that a catastrophic software failure occurred on the 15310-CL-CTX card. As part of the boot sequence, the FAIL LED turns on and flashes until the software deems the card operational. ALARM LED (Red/Amber) The ALARM LED is red for Critical and Major alarm conditions. It is amber for Minor alarm conditions. PWR LED (Green/Amber) The PWR LED is green if AC power is connected and operating or if both DC power sources are connected and operating. The LED is amber if only one DC power source is connected and operating. SYNC LED (Green/Amber/Red) The SYNC LED is green if the 15310-CL-CTX card detects both a primary and secondary clock reference. It is amber if the card detects only a single clock reference. The LED is RED if the card detects no clock reference.3-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.3.1 System Cross-Connect Figure 3-5 shows the CTX2500 card faceplate and block diagram. Figure 3-5 CTX2500 Faceplate and Block Diagram 3.3.1 System Cross-Connect The CTX2500 card provides 576 x 576 STS-1 level cross-connections and 2688 x 2688 VT1.5s. 3.3.2 CTX2500 Card Side Switches The CTX2500 supports errorless side switches (less than a 50-ms impact to any traffic) when the switch is initiated through software, through either a soft-reset or a software upgrade where there is no FPGA or firmware upgrade. A side switch means switching from a CTX2500 on one side of the shelf to the redundant CTX2500 on the other side of the shelf. 145768 ASIC I2C LED RJ45 FP CRAFT RJ45 FP ENET Backplane Connectors STS1 XC TU XC VT XC OCN I/F TIMING MOD SCL I/F ATA I/F CPU I/F Front Panel PLL VXCO OCXO LIU FPGA CPLD ENWT SW DC/DC XPT SW XPT SW SFP1 SFP1 XPT and SFP Control/Status From Nile2 CPLD Compact FLASH FLASH DDR SDRAM FPGA BUS FANOUT PROCESSOR TEMP SFP1/2 IDPROM REFCLK_IN REFCLK_OUT3-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.3.3 CTX2500 Optical Interfaces 3.3.3 CTX2500 Optical Interfaces There are two PPM (SFP) slots on the CTX2500 faceplate to provide optical interfaces. (PPM is the graphical user interface term for SFP.) Each slot can contain a one-port PPM. Cisco-qualified PPMs can be single-rate (OC-3, OC-12, or OC-48) or multirate (OC-3/OC-12). Single-rate PPMs are autoprovisioned when they are installed, but multirate PPMs must be provisioned. This behavior can be controlled by NE defaults. Note To provision, edit, or delete PPM ports, refer to the “Change Port Settings” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. For more information about PPM/SFP hardware, see the “3.8 SFP Modules” section on page 3-20. 3.3.4 CTX2500 Card-Level Indicators The CTX2500 card has four card-level LEDs, described in Table 3-3. 3.3.5 CTX2500 Port-Level Indicators Two bicolor LEDs show the status per port (Ports 1 and 2). The port LED is green if the port is available to carry traffic and is provisioned as in-service. The port LED is red if there is a signal failure or loss of signal on the port. 3.4 CE-100T-8 Card This section describes the features and functions of the Layer 1 Ethernet card, the CE-100T-8. This card is compatible with both the ONS 15310-CL and the ONS 15310-MA. Note The CE-100T-8 card with PID 15310-CE-100T-8 is not compatible with the ONS 15310-MA. The 15310-P-CE-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. If you install a 15310-CE-100T-8 in an ONS 15310-MA shelf assembly, you will receive a mismatched equipment alarm (MEA). You can view the PID under the node view Inventory tab in CTC. Table 3-4 CTX2500 Card-Level Indicators Card-Level LEDs Description FAIL LED (Red) The red FAIL LED indicates that the card processor is not ready or that a catastrophic software failure occurred on the card. As part of the boot sequence, the FAIL LED turns on and flashes until the software deems the card operational. ACT/STBY LED (Green/Amber) The ACT/STBY LED is green if the card is the active CTX2500 card. It is amber if the card is the standby card. SYNC LED (Green/Amber) The SYNC LED is green if the CTX2500 card detects both a primary and secondary clock reference. It is amber if the card detects only a single clock reference. 3-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.4 CE-100T-8 Card The CE-100T-8 card maps 8-port 10/100-Mbps Ethernet-encapsulated traffic into SONET payloads, making use of low-order (VT1.5) virtual concatenation (VCAT), high-order (STS-1, STS-3c) VCAT, generic framing procedure (GFP), and Point-to-Point Protocol/high-level data link control (PPP/HDLC) framing protocols. It also supports the link capacity adjustment scheme (LCAS), which allows hitless dynamic adjustment of SONET link bandwidth. The CE-100T-8 card provides eight RJ-45 10/100-Mbps Ethernet ports on the faceplate of the card. An inactive RJ-11 console port is also on the faceplate. The circuit types supported are: • STS-1 and STS-3c CCAT • STS-1-Nv VCAT (N = 1–3) • STS-1-Nv LCAS (N = 1–3) • STS-1-2v software LCAS (SW-LCAS) (compatible with ML-Series cards only) • VT1.5-Nv VCAT (N = 1–64) • VT1.5-Nv LCAS (N = 1–64) Each 10/100 Ethernet port can be mapped to a SONET channel in increments of VT1.5 or STS-1 granularity. There are eight backend packet-over-SONET (POS) ports (VCAT groups [VCGs]) available on the ML-100T-8 card. Additionally, the CE-100T-8 card supports packet processing, classification, quality of service (QoS)-based queuing, and traffic scheduling.3-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.4 CE-100T-8 Card Figure 3-6 shows the CE-100T-8 card faceplate and block diagram. Figure 3-6 CE-100T-8 Faceplate and Block Diagram The following paragraphs describe the general functions of the CE-100T-8 card and relate it to the block diagram in Figure 3-6. In the ingress direction (Ethernet-to-SONET), an octal PHY, which performs all of the physical layer interface functions for 10/100-Mbps Ethernet, sends the frame to the packet processor for queuing in the respective packet buffer memory. The packet processor performs packet processing, packet switching, and classification. The Ethernet frames are then passed over SMII channels to the POS mappers, where Ethernet traffic is terminated and is encapsulated using the PPP/HDLC or GFP framing protocols. The encapsulation method is selected on a per-port basis. The encapsulated Ethernet frames are then mapped into a configurable number of VCAT low-order and high-order payloads, such as VT1.5 synchronous payload envelope (SPE), STS-1 SPE, or a contiguous concatenated (CCAT) payload such as STS-3c SPE. Up to 64 VT1.5 SPEs or three STS-1 SPEs can be virtually concatenated. The SPE from each POS mapper (up to STS-3) carrying encapsulated Ethernet frames are passed onto the multiplexer/demultiplexer (mux/demux) next, where the STS-3 frames from both POS mappers are multiplexed to form an STS-12 frame for transport over the SONET network by means of the Bridging Transmission Convergence (BTC-48) application-specific integrated circuit (ASIC). CE-100T-8 Console ACTIVE FAIL LINK 1 ACT LINK 2 ACT LINK 3 ACT LINK 4 ACT LINK 5 ACT LINK 7 ACT LINK 6 ACT LINK 8 ACT Packet Processor (QoS and Queuing) SMII SMII 8 x RJ45 8 STS12 STS-3 STS-3 BTC48 Octal 8 PHY POS Mapper and VCAT/ LCAS Engine POS Mapper and VCAT/ LCAS Engine Mux/ Demux B a c k p l a n e 8 SMII 7 SMII SMII to MII Adapter MII Intercard Ethernet Links PHY CPU Complex 1345903-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.4.1 CE-100T-8 Card-Level Indicators Note Although the STS-3 frames are multiplexed into an STS-12 frame, the frame carries at most an STS-6 payload, leaving half of the STS-12 bandwidth free. In the egress direction (SONET-to-Ethernet), the mux/demux extracts the first and second STS-3 SPEs from the STS-12 frame it receives from the BTC-48 before sending them to the POS mappers. The STS-3 SONET SPE carrying GFP or PPP/HDLC encapsulated Ethernet frames are then extracted and buffered in the external memory of the POS mappers. This memory is used for providing alignment and differential delay compensation for the received low/high order virtual concatenated payloads. When alignment and delay compensation are complete, the Ethernet frames are decapsulated with one of the framing protocols (GFP or PPP/HDLC). Decapsulated Ethernet frames are then passed onto the packet processor for QoS queuing and traffic scheduling. The network processor switches the frame to one of the corresponding PHY channels and then onto the Ethernet port for transmission to the external clients. With regard to QoS, the VLAN class-of-service (CoS) threshold (value 0 to 7, default 7) and the IP type-of-service (ToS) threshold (value 0 to 255, default 255) on incoming Ethernet packets are both available for priority queuing. These thresholds are provisionable through CTC, TL1, and Cisco Transport Manager (CTM). CoS takes precedence over ToS unless the CoS threshold is set to the default of 7. This threshold value does not prioritize any packets based on CoS, so ToS is used. The value configured is a threshold and any value greater than that value is set as a priority. For example, if a CoS of 5 is set as the threshold, only CoS values of 6 and 7 would be set to priority. 3.4.1 CE-100T-8 Card-Level Indicators The CE-100T-8 card faceplate has two card-level LED indicators, described in Table 3-5. 3.4.2 CE-100T-8 Port-Level Indicators The CE-100T-8 card has two LEDs embedded into each of the eight Ethernet-port RJ-45 connectors. The LEDs are described in Table 3-6. Table 3-5 CE-100T-8 Card-Level Indicators Card-Level LEDs Description SF LED (Red) The red FAIL LED indicates that the card processor is not ready or that a catastrophic software failure occurred on the CE-100T-8 card. As part of the boot sequence, the FAIL LED blinks until the software deems the card operational, then it turns off. ACT LED (Green) The ACT LED provides the operational status of the CE-100T-8. When the ACT LED is green, it indicates that the CE-100T-8 card is active and the software is operational; otherwise, it is off.3-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.5 ML-100T-8 Card 3.5 ML-100T-8 Card This section describes the features and functions of the Layer 2 10/100 Ethernet card, the ML-100T-8. The card is compatible with both the ONS 15310-CL and the ONS 15310-MA. Note The ML-100T-8 card with PID 15310-ML-100T-8 is not compatible with the ONS 15310-MA. 15310-P-ML-100T-8 is compatible with both the ONS 15310-MA and ONS 15310-CL shelf assemblies. If you install a 15310-ML-100T-8 in an ONS 15310-MA shelf assembly, you will receive a mismatched equipment alarm (MEA). You can view the PID under the node view Inventory tab in CTC. 3.5.1 ML-100T-8 Card Description The ML-100T-8 card maps eight ports of 10/100 Ethernet encapsulated traffic into SONET STS-3 payloads. The card is compatible with high-order STS-1 VCAT and the GFP and PPP/HDLC framing protocols. It also supports LCAS, which allows hitless dynamic adjustment of SONET/SDH link bandwidth. Each 10/100 Ethernet port can be mapped to a SONET channel in increments of STS-1 granularity. The ML-100T-8 card provides a switched operating mode, with eight subscriber interfaces and two virtual POS (VCG) interfaces mapped through the cross-connect for transport with other services between network elements (NEs). The circuit types supported are: • STS-1 • STS-1-Nv VCAT (N=1–2) • STS-1-Nv LCAS (N=1–2) • STS-1-2v SW-LCAS Additionally, the ML-100T-8 card supports packet processing, classification, QoS-based queuing, traffic scheduling, and packet multiplexing services for Layer 2/3. Table 3-6 CE-100T-8 Port-Level Indicators Port-Level Indicators Description ACT LED (Amber) A steady amber LED indicates a link is detected, but there is an issue inhibiting traffic. A blinking amber LED means traffic is flowing. LINK LED (Green) A steady green LED indicates that a link is detected, but there is no traffic. A blinking green LED flashes at a rate proportional to the level of traffic being received and transmitted over the port. Both ACT and LINK LED OFF Unlit green and amber LEDs indicate no traffic.3-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.5.2 ML-Series Cisco IOS CLI Console Port 3.5.2 ML-Series Cisco IOS CLI Console Port The ML-Series card has an RJ-11 serial console port on the card faceplate labeled Console. It enables communication from the serial port of a PC or workstation running terminal emulation software to the Cisco IOS command line interface (CLI) on a specific ML-Series card. Due to space limitations on the ML-Series card faceplate, the console port is an RJ-11 modular jack instead of the more common RJ-45 modular jack. Cisco supplies an RJ-11 to RJ-45 console cable adapter with each ML-Series card. After connecting the adapter, the console port functions like the standard Cisco RJ-45 console port. Figure 3-7 shows the RJ-11-to-RJ-45 console cable adapter. Figure 3-7 Console Cable Adapter 789703-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.5.2 ML-Series Cisco IOS CLI Console Port Figure 3-8 shows the ML-100T-8 card faceplate and block diagram. Figure 3-8 ML-100T-8 Card Faceplate and Block Diagram The following paragraphs describe the general functions of the ML-100T-8 card and relate to the block diagram in Figure 3-8. In the ingress direction (Ethernet-to-SONET), Ethernet frames first enter from a physical Ethernet port to one of the corresponding channels of the octal PHY, which performs all of the physical layer interface functions for 10/100 Ethernet. The PHY sends the Ethernet frame to the packet processor by means of the SMII interfaces for queuing in the respective packet buffer memory. The packet processor performs packet processing, packet switching, and classification. The Ethernet frames are then passed on to the POS mappers through the SMII interfaces. The POS mappers terminate the 10/100-Mbps Ethernet traffic. The Ethernet frames are extracted and buffered in POS mapper external memory. Ethernet frames are encapsulated using one of the framing protocols (PPP/HDLC or GFP), selected on a per-port basis. The encapsulated Ethernet frames are mapped into a configurable number of STS-1 or VCAT high-order payloads (STS-1-1v or STS-1-2v). The SPE from each POS mapper (up to STS-3) carrying encapsulated Ethernet frames are next passed onto the mux/demux, where the STS-3 frames from both POS mappers are multiplexed to form an STS-12 frame for transport over the SONET network by means of the BTC-48 ASIC. 134591 ML-100T-8 Console ACTIVE FAIL LINK 0 ACT LINK 1 ACT LINK 2 ACT LINK 3 ACT LINK 4 ACT LINK 6 ACT LINK 5 ACT LINK 7 ACT Packet Buffer 1.5MB Control Mem 0.5MB nP3400 SMII SMII 8 x RJ45 4 32MB eMDM STS12 STS-3 STS-3 60x Part of eMDM FPGA 1 MII 77MHz 155MHz 19.44MHz FCC3 MPC8270 FCC1 FCC2 MII MII Payload SCL CPLD BTC48 8 6 SMII 8 4 BMC5228 Octal PHY Option 2 SDRAM 8 MB Ethermap #2 SDRAM 8MB Ethermap #1 eMDM FPGA B a c k p l a n e Intercard Ethernet Links INTEL LXT973 PHY Flash 8MB SDRAM 128MB Option 13-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.5.3 ML-100T-8 Card-Level Indicators Note Although the STS-3 frames are multiplexed into an STS-12 frame, the frame carries at most an STS-6 payload, leaving half of the STS-12 bandwidth free. In the egress direction (SONET-to-Ethernet), the mux/demux extracts the first and second STS-3 SPEs from the STS-12 frame it receives from the BTC-48 before sending it to the POS mapper. The STS-3 SONET SPEs carrying GFP or PPP/HDLC encapsulated Ethernet frames are then extracted and buffered in the POS mapper external memory. This memory is used for providing alignment and differential delay compensation for the received high-order VCAT payloads. After alignment and delay compensation have been done, the Ethernet frames are decapsulated with one of the framing protocols (GFP or PPP/HDLC). Decapsulated Ethernet frames are then passed onto the network processor for QoS queuing, traffic scheduling, packet switching, and multiplexing. The network processor switches the frame to one of the corresponding PHY channels and then onto the Ethernet port for transmission to the external clients. 3.5.3 ML-100T-8 Card-Level Indicators The ML-100T-8 card faceplate has two card-level LED indicators, described in Table 3-7. 3.5.4 ML-100T-8 Port-Level Indicators The ML-100T-8 card has two LEDs embedded into each of the eight Ethernet port RJ-45 connectors. The LEDs are described in Table 3-8. Table 3-7 ML-100T-8 Card-Level Indicators Card-Level LEDs Description SF LED (Red) The red FAIL LED indicates that the card processor is not ready or that a catastrophic software failure occurred on the CE-100T-8 card. As part of the boot sequence, the FAIL LED blinks until the software deems the card operational, then it turns off. ACT LED (Green) The ACT LED provides the operational status of the ML-100T-8. When the ACT LED is green, it indicates that the ML-100T-8 card is active and the software is operational; otherwise, it is off. Table 3-8 ML-100T-8 Port-Level Indicators Port-Level Indicators Description ACT LED (Amber) A steady amber LED indicates a link is detected, but there is an issue inhibiting traffic. A blinking amber LED means traffic is flowing. LINK LED (Green) A steady green LED indicates that a link is detected, but there is no traffic. A blinking green LED flashes at a rate proportional to the level of traffic being received and transmitted over the port. Both ACT and LINK LED OFF Unlit LEDs indicate no traffic.3-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.6 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards 3.6 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards Note For hardware specifications, see the “A.3.4 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards” section on page A-12. The ONS 15310-MA DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards provide 28 or 84 Telcordia-compliant, GR-499 DS-1 ports per card, respectively, and three DS-3/EC-1 ports. Each DS-1 port operates at 1.544 Mbps. Each DS-3/EC-1 port operates at 44.736 Mbps over a single 75-ohm 728 A or equivalent coaxial span. These cards can operate as a working or protect card in 1:1 protection schemes. In addition, the DS1-28/DS3-EC1-3 card provides retiming, so that any outgoing DS-1 signal can be retimed to eliminate accumulated jitter and wander at the point of egress from a synchronous network. Any incoming DS-1 signal from the transport element can also be used as a timing source. The DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards can be installed in Slots 1, 2, 5, and 6. Card installed in Slots 1 and 2 correspond with the electrical interface assembly (EIA) installed on Side A at the rear of the shelf assembly, and cards in Slots 5 and 6 correspond with the EIA installed on Side B. See the “4.3.1 .1:1 Electrical Card Protection” section on page 4-2 for information about electrical card protection and supported shelf configurations. Figure 3-9 shows the DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 card faceplates and block diagram. Figure 3-9 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card Faceplates and Block Diagram DS1-28 DS3-EC1-3 DS1-84 DS3-EC1-3 8270 CPU Flash 4Mx16 DDR 16Mx1 6 x2 Address/ Data Buffers ITURI FPGA PSOC Power Supply Monitor Voltages 48V->3.3V Power Sequence 3.3V->1.5V, 1.8V, 2.5V, 2.5V Power Shutdown 2.5V->1.2V, 1.25V Clocks/ PLL T1& T3/EC1 Mapper Octal T1 LIUs x11 Temp Sensor DS3/EC1 XFMR & Relays Headers JTAG PLD Mictorsx4 DIRK FPGA ENET BP DS3/EC1 LIU 144710 FAIL ACT/ STBY DS1 SF DS3 SF FAIL ACT/ STBY DS1 SF DS3 SF3-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.6.1 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card-Level Indicators 3.6.1 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card-Level Indicators The DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards have three card-level LED indicators (Table 3-9). 3.7 Filler Cards If a card slot is left empty, a filler card must be installed in the slot. The filler card serves three functions: it prevents exposure to hazardous voltages and currents inside the chassis, it eliminates electromagnetic interference (EMI) that might disrupt other equipment, and it directs the flow of cooling air through the chassis. Caution Do not operate the ONS 15310-CL or ONS 15310-MA system unless a card is plugged into each card slot. The blank card is a printed circuit board (PCB) with a blank faceplate and two rear connectors that plug into receptacles at the back of the slot. CTC detects when a filler card is plugged in and displays it in node view. Figure 3-10 shows the filler card faceplate. This card is used in the ONS 15310-CL expansion slot and ONS 15310-MA traffic card slots. Figure 3-10 Filler Card Caution Do not attempt to install the FILLER card in a CTX2500 card slot (Slots 3 and 4) on the 15310-MA shelf assembly. Only a CTX FILLER card should be installed in the CTX2500 slot. Table 3-9 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Card-Level Indicators Card-Level Indicators Description Red FAIL LED Indicates that the card processor is not ready. This LED is on during reset. The FAIL LED flashes during the boot process. Replace the card if the red FAIL LED persists in flashing. ACT/STBY LED Green (Active) Amber (Standby) When the ACT/STBY LED is green, the card is operational and ready to carry traffic. When the ACT/STBY LED is amber, the card is operational and in standby (protect) mode. Amber DS1 and DS3 SF LEDs Indicates a signal failure or condition such as LOS or LOF on one or more card ports. 1316693-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.8 SFP Modules Figure 3-11 shows the CTX2500 filler card faceplate for the ONS 15310-MA. Figure 3-11 CTX2500 Filler Card Caution Do not attempt to install the CTX FILLER card in a traffic card slot (Slots 1, 2, 5, and 6 in the ONS 15310-MA, and the expansion card slot in the ONS 15310-CL). Only 15310-EXP-FILLER cards should be installed in the traffic card slots. 3.8 SFP Modules This section describes the small-form factor pluggables (SFPs) that can be used with the 15310-CL-CTX and CTX2500 cards to provide optical interfaces. The 15310-CL-CTX card does not have a faceplate because it is located inside the chassis; therefore, the two SFP slots are located on the ONS 15310-CL faceplate, just to the left of the LAN connector (see Figure 3-3 on page 3-5). The SFP slots for the ONS 15310-MA are located at the bottom of the CTX2500 card. Ethernet and electrical cards do not use SFPs. 1457693-21 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.8.1 Compatibility by Card 3.8.1 Compatibility by Card Table 3-10 lists the SFPs compatible with the 15310-CL-CTX and CTX2500 cards. For more information about SFPs, see the “A.4 SFP Specifications” section on page A-15. Caution Only use SFPs certified for use in Cisco Optical Networking Systems (ONSs). The qualified Cisco SFP top assembly numbers (TANs) are provided in Table 3-10. Table 3-10 SFP Card Compatibility Card Compatible SFP (Cisco Product ID) Cisco Top Assembly Number (TAN) 15310-CL-CTX (ONS 15310-CL) and CTX2500 (ONS 15310-MA) ONS-SI-155-L1 ONS-SI-155-L2 ONS-SI-155-I1 ONS-SI-622-L1 ONS-SI-622-L2 ONS-SI-622-I1 10-1957-01 10-1937-01 10-1938-01 10-1958-01 10-1936-01 10-1956-01 CTX2500 (ONS 15310-MA) only ONS-SI-2G-I1 ONS-SI-2G-L1 ONS-SI-2G-S1 ONS-SI-2G-L2 ONS-SE-155-1470 ONS-SE-155-1490 ONS-SE-155-1510 ONS-SE-155-1530 ONS-SE-155-1550 ONS-SE-155-1570 10-1993-01 10-2102-01 10-1992-01 10-1990-01 10-1996-01 10-1998-01 10-1999-01 10-2000-01 10-2001-01 10-2002-01 ONS-SE-155-1590 ONS-SE-155-1610 ONS-SE-622-1470 ONS-SE-622-1490 ONS-SE-622-1510 ONS-SE-622-1530 ONS-SE-622-1550 ONS-SE-622-1570 ONS-SE-622-1590 ONS-SE-622-1610 10-2003-01 10-1997-01 10-2004-01 10-2005-01 10-2006-01 10-2007-01 10-2008-01 10-2009-01 10-2010-01 10-2011-01 ONS-SC-2G-30.3 ONS-SC-2G-31.1 ONS-SC-2G-31.9 ONS-SC-2G-32.6 ONS-SC-2G-34.2 ONS-SC-2G-35.0 ONS-SC-2G-35.8 ONS-SC-2G-36.6 ONS-SC-2G-38.1 ONS-SC-2G-38.9 10-2155-01 10-2156-01 10-2157-01 10-2158-01 10-2159-01 10-2160-01 10-2161-01 10-2162-01 10-2163-01 10-2164-013-22 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.8.2 SFP Description 3.8.2 SFP Description SFPs are integrated fiber-optic transceivers that provide high-speed serial links from a port or slot to the network. Various latching mechanisms can be utilized on the SFPs. There is no correlation between the type of latch to the model type (such as SX or LX/LH) or technology type (such as Gigabit Ethernet). See the label on the SFP for the technology type and model. One type of latch available is a mylar tab, shown in Figure 3-12. A second type of latch is an actuator/button (Figure 3-13), and a third type is a bail clasp (Figure 3-14). SFP dimensions are: • Height 0.03 in. (8.5 mm) • Width 0.53 in. (13.4 mm) • Depth 2.22 in. (56.5 mm) SFP temperature ranges are: • COM—Commercial operating temperature range –5 to 70 degrees C (23 to 158 degrees F) • EXT—Extended operating temperature range –5 to 85 degrees C (23 to 185 degrees F) • IND—Industrial operating temperature range –40 to 85 degrees C (–40 to 85 degrees F) CTX2500 (ONS 15310-MA) only (continued) ONS-SC-2G-39.7 ONS-SC-2G-40.5 ONS-SC-2G-42.1 ONS-SC-2G-42.9 ONS-SC-2G-43.7 ONS-SC-2G-44.5 ONS-SC-2G-46.1 ONS-SC-2G-46.9 ONS-SC-2G-47.7 ONS-SC-2G-48.5 10-2165-01 10-2185-01 10-2166-01 10-2167-01 10-2168-01 10-2169-01 10-2170-01 10-2171-01 10-2172-01 10-2173-01 ONS-SC-2G-50.1 ONS-SC-2G-50.9 ONS-SC-2G-51.7 ONS-SC-2G-52.5 ONS-SC-2G-54.1 ONS-SC-2G-54.9 ONS-SC-2G-55.7 ONS-SC-2G-56.5 ONS-SC-2G-58.1 ONS-SC-2G-58.9 ONS-SC-2G-59.7 ONS-SC-2G-60.6 10-2186-01 10-2174-01 10-2175-01 10-2176-01 10-2177-01 10-2178-01 10-2179-01 10-2180-01 10-2181-01 10-2182-01 10-2183-01 10-2184-01 Table 3-10 SFP Card Compatibility (continued) Card Compatible SFP (Cisco Product ID) Cisco Top Assembly Number (TAN)3-23 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.8.3 PPM Provisioning Figure 3-12 Mylar Tab SFP Figure 3-13 Actuator/Button SFP Figure 3-14 Bail Clasp SFP 3.8.3 PPM Provisioning SFPs are known as pluggable port modules (PPMs) in CTC. PPMs provide OC-3 and OC-12 line rates for the ONS 15310-CL and they provide OC-3, OC-12, and OC-48 line rates for the ONS 15310-MA. See the “3.2.4 15310-CL-CTX Optical Interfaces” section on page 3-7 and the “3.3.3 CTX2500 Optical Interfaces” section on page 3-10 for more information. To provision PPMs, including provisioning or changing the optical line rate, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 63065 63066 630673-24 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 3 Card Reference 3.8.3 PPM ProvisioningCHAPTER 4-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 4 Card Protection Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This chapter describes the card and port protection configurations for the Cisco ONS 15310-CL and Cisco ONS 15310-MA. To provision protection, refer to the “Turn Up a Node” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 4.1 Overview, page 4-1 • 4.2 ONS 15310-CL Port Protection, page 4-2 • 4.3 ONS 15310-MA Card and Port Protection, page 4-2 • 4.4 Automatic Protection Switching, page 4-5 • 4.5 External Switching Commands, page 4-6 4.1 Overview The Cisco ONS 15310-CL has a single common control card (15310-CTX-CL), so no redundant common-control protection is available. The only card protection available is 1+1 optical protection through the two optical ports. The ONS 15310-CL does not provide electrical interface protection (1:1 and 1:N). The optical ports on the 15310-CTX-CL card are provided through Small Form-factor Pluggables (SFPs), which are referred to as pluggable port modules (PPMs) in Cisco Transport Controller (CTC), the ONS 15310-CL software interface. See the “3.2.4 15310-CL-CTX Optical Interfaces” section on page 3-7 for more information. The Cisco ONS 15310-MA has a pair of common control cards (CTX2500), each with two optical ports, and up to four electrical cards (DS1-28/DS3-EC1-3 or DS1-84/DS3-EC1-3). 1:1 protection groups are supported for like pairs of electrical cards, and 1+1 protection groups can be set up between two optical ports on the same CTX2500 card or between the optical ports on two separate CTX2500 cards. Optimized 1+1 protection can be set up by provisioning optical ports as Synchronous Digital Hierarchy (SDH) ports. Due to the support of a pair of CTX2500 common control cards, the CTX2500 card is also 1:1 protected. The 15310-MA can also function in a single CTX2500 configuration mode. 4-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 4 Card Protection 4.2 ONS 15310-CL Port Protection 4.2 ONS15310-CL Port Protection This section describes the port protection methods for the ONS 15310-CL. 4.2.1 1+1 Optical Port Protection When you set up 1+1 optical protection for the ONS 15310-CL, the working optical port on one ONS 15310-CL node is paired with a working optical port on other ONS 15310-CL nodes in a 1+1 protection group. Similarly, the protect optical port on one ONS 15310-CL node is paired with protect optical ports on other ONS 15310-CL nodes in a 1+1 protection group. The data rate and port type of the protect port must match that of the working port. Because the ONS 15310-CL has only two optical ports, they must always be in the same protection group. The rates of the two ports must be the same, either OC-3 or OC-12. 1+1 span protection can be either revertive or nonrevertive. With nonrevertive 1+1 protection, when a failure occurs and the signal switches from the working port to the protect port, the signal stays switched until it is manually switched back. Revertive 1+1 protection automatically switches the signal back to the working port when the working port comes back online after the wait-to-restore (WTR) time has elapsed. To provision 1+1 protection, refer to the “Turn Up a Node” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 4.2.2 Unprotected Ports An unprotected port is not included in a protection scheme; therefore, a port failure or a signal error results in lost data. Because no bandwidth lies in reserve for protection, unprotected schemes maximize the available ONS 15310-CL bandwidth. Unprotected is the default protection type. 4.3 ONS15310-MA Card and Port Protection This section describes the card and port protection methods for the ONS 15310-MA. 4.3.1 .1:1 Electrical Card Protection The ONS 15310-MA chassis accommodates two types of electrical cards, the DS1-28/DS3-EC1-3 andDS1-84/DS3-EC1-3, and one type of common-control card, the CTX2500. Figure 4-1 illustrates one possible chassis configuration, with two CTX2500 cards and two pairs of DS1-84/DS3-EC1-3 cards. The following examples show a few of the several possible ONS 15310-MA chassis configurations: • No electrical cards at all. This is the case if you choose to install Ethernet cards, such as the CE-100T-8 or ML-100T-8, instead of electrical cards. The Ethernet cards cannot be used to form a protection group. • Unprotected electrical cards. This is the case if, instead of a pair of electrical cards in Slots 1 and 2 or 5 and 6, you install only a single electrical card in Slots 1, 2, 5, or 6. A filler card or Ethernet card must be installed in a slot where an input/output (I/O) card is missing.4-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 4 Card Protection 4.3.1 .1:1 Electrical Card Protection • A single CTX2500 card. In this case, a filler card must be installed in a slot where a CTX2500 card is missing. • A mix of electrical cards. A DS1-28/DS3-EC1-3 card can protect an adjacent DS1-28/DS3-EC1-3 card, a DS1-84/DS3-EC1-3 card can protect an adjacent DS1-84/DS3-EC1-3 card, and a DS1-84/DS3-EC1-3 card can protect an adjacent DS1-28/DS3-EC1-3 card. However, a DS1-28/DS3-EC1-3 card cannot protect an adjacent DS1-84/DS3-EC1-3 card. Figure 4-1 ONS 15310-MA Chassis Card Layout The configuration of the backplane connectors creates two sets of paired (adjacent) expansion slots for electrical cards. Slots 1 and 2 are a pair and Slots 5 and 6 are a pair. When two electrical cards are plugged into either of the card-slot pairs, the ONS 15310-MA automatically creates a 1:1 protection group for the two cards, if possible. If a protection group cannot be created (see the rules for protection group creation later in this section), one of the cards will be marked as UNKNOWN with the state as MISMATCH in CTC, because the ONS 15310-MA cannot support two unprotected electrical cards in the 1–2 or 5–6 card slot pairs. The 1:1 automatic protection group is created when the second electrical card in a pair is either plugged in or is preprovisioned. Unprotected is the default state for the first electrical card plugged into (or preprovisioned) in either the Slot 1-to-2 or Slot 5-to-6 card slot pairs. When the second card is plugged in or preprovisioned, the protection group is created, if possible. 1446894-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 4 Card Protection 4.3.2 .1+1 Optical Port Protection When protection groups are created, the following rules must be noted: 1. The protection group will be automatically created if possible. If the node cannot create the protection group automatically, then the second card to be plugged in or preprovisioned will be shown as UNKNOWN with the state as MISMATCH in CTC. 2. If possible, the ONS 15310-MA designates the cards in Slots 1 and 5 as working. If Slot 1 or 5 cannot be working (due to violation of one of the other rules), then Slot 2 or 6 will be the working slot. 3. Cards can protect like cards. In addition, a DS1-84/DS3-EC1-3 card can protect a DS1-28/DS3-EC1-3 card. However, a DS1-28/DS3-EC1-3 card cannot protect a DS1-84/DS3-EC1-3 card. 4. If the first card to be provisioned has existing circuits or is in use as a timing source when the second card is provisioned, then the first card must become the working card and cannot become the protect card. 5. The timing source will not switch to a protect card, when a soft reset is executed on the card that is used as a timing source. 6. Automatic protection groups default to nonrevertive. The protection group can be edited to turn on reversion and set a revert time. The protection group can also be edited to change the protection group name. The following scenario does not result in the creation of a protection group because rules are violated: 1. Plug a DS1-84/DS3-EC1-3 card into Slot 1 and provision a circuit on it. 2. Plug a DS1-28/DS3-EC1-3 card into Slot 2. The DS1-84/DS3-EC1-3 card needs to be the working card, because it has a circuit on it (see Rule 4). However, the DS1-28/DS3-EC1-3 card cannot protect the DS1-84/DS3-EC1-3 card (see Rule 3), so no protection group is formed. The following scenario also does not result in the creation of a protection group because rules are violated: 1. Plug a DS1-28/DS3-EC1-3 card into Slot 1 and enable the retiming option on it. 2. Plug a DS1-84/DS3-EC1-3 card into Slot 2. Because the DS1-84/DS3-EC1-3 card does not support retiming, it cannot become a protection card for the DS1-28/DS3-EC1-3 card, so no protection group is formed. The following scenario results in the creation of a protection group because no rules are violated: 1. Plug a DS1-28/DS3-EC1-3card into Slot 1 and provision a circuit on it. 2. Plug a DS1-84/DS3-EC1-3 card into Slot 2. A protection group is automatically formed, with the DS1-28/DS3-EC1-3 card operating as the working card, and the DS1-84/DS3-EC1-3 card operating as the protection card. Automatic protection groups cannot be created or deleted by users. A protection group is automatically deleted when the protect card is deleted. 4.3.2 .1+1 Optical Port Protection With two CTX2500 cards installed, four optical ports are available (two on each card). A 1+1 protection group can be created between any two pairs of optical ports with matched port rates. 4-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 4 Card Protection 4.3.3 .CTX2500 Card Equipment Protection A protection group can be created using two ports on the same CTX2500 card or between ports on adjacent CTX2500 cards. You can also create a 1+1 protection group on each card for a total of two protection groups. In this case, working and protection ports are provisioned on Slot 3 and working and protection ports are provisioned on Slot 4 (the same card can have both working and protect ports on it). The CTX2500 card supports optimized 1+1 protection groups.Optimized 1+1 protection is mainly used in networks that have linear 1+1 bidirectional protection schemes and it requires that optical ports are provisioned to SDH.Optimized 1+1 is a line-level protection scheme that includes two lines: working and protect. One of the two lines assumes the role of the primary channel, from which traffic is selected, and the other port assumes the role of the secondary channel, which protects the primary channel. Traffic switches from the primary to the secondary channel based on either an external switching command or line conditions. After the line condition or the external switching command that was responsible for a switch clears, the roles of the two sides are reversed. 4.3.3 .CTX2500 Card Equipment Protection The ONS15310MA supports a single and dual CTX2500 card configuration. In the dual configuration, with two CTX2500 cards inserted in slot 3 and slot4, the CTX2500 card is also protected. One of the cards becomes the active card and the other becomes the standby card. Soft resets executed in the dual CTX2500 card configuration as well as in the single CTX2500 card configuration are errorless. Software upgrades in the single and dual configurations are also errorless. In the dual configuration, there is a switchover from active CTX2500 card to standby CTX2500 card during the soft reset of the active CTX2500 card. After the soft reset or software upgrade, the old standby CTX2500 card becomes the new active CTX2500 card. The old active CTX2500 card becomes the standby CTX2500 card. The CTX2500 card is equipment protected in a dual CTX2500 card configuration. Any reset occurring on the active CTX2500 card that is triggered due to a watchdog failure or an equipment failure causes a switchover of the CTX2500 card, causing the old standby card to become the active card. If there are any path protection or 1+1 protected ports configured with the protection ports across the two CTX2500 cards, there will be a protection switch such that the port on the new active CTX2500 card becomes the active port for 1+1 or the selector through that port will be the active selector for path protection. Note • Any unprotected port on the old CTX2500 card that is reset may undergo a traffic loss when the CTX2500 comes back up. • If protection exists between two optical ports on the same CTX2500 card and if the CTX2500 card goes through a reset, the traffic may be affected when the CTX2500 card comes back up. The two items above do not apply for a user-initiated soft reset or software upgrade. These resets are errorless 4.4 Automatic Protection Switching Unidirectional switching allows traffic on the transmit and receive optical fibers to switch independently. 4-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 4 Card Protection 4.5 External Switching Commands With nonrevertive 1+1 protection, automatic protection switching (APS) switches a signal after a failure from the working port to the protect port and the signal stays switched to the protect port until it is manually switched back. Revertive switching automatically switches the signal back to the working port when the working port comes back online. 1+1 protection is unidirectional and nonrevertive by default; revertive switching is easily provisioned using CTC. Traffic over a 1+1 APS link is errorless during a soft reboot or a software upgrade for ONS 15310-CL nodes regardless of whether the 1+1 APS protection is active. 4.5 External Switching Commands The external switching commands on the ONS 15310-CL and ONS 15310-MA are Manual, Force, and Lock Out. A Manual switch will switch traffic if the path has an error rate less than the signal degrade (SD). A Force switch will switch traffic even if the path has SD or signal fail (SF) conditions. A Force switch has a higher priority than a Manual switch. In 1+1 mode, however, if there is an SF condition on the protect line, the SF condition has a higher priority than Force, and Force cannot override the SF condition to make a switch to the protect line. Lockouts can only be applied to a protect port (in 1+1 configurations) and prevent traffic from switching to the protect port under any circumstance. Lockouts have the highest priority. In a 1+1 configuration you can also apply a lock-on to the working port. A working port with a lock-on applied cannot switch traffic to the protect port in the protection group (pair).CHAPTER 5-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 5 Cisco Transport Controller Operation This chapter describes Cisco Transport Controller (CTC), the Cisco ONS 15310-CL and Cisco ONS 15310-MA software interface. For CTC set up and login information, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 5.1 CTC Software Delivery Methods, page 5-1 • 5.2 CTC Installation Overview, page 5-3 • 5.3 PC and UNIX Workstation Requirements, page 5-3 • 5.4 ONS 15310-CL and ONS 15310-MA Connection, page 5-5 • 5.5 CTC Window, page 5-6 • 5.6 Common Control Card Reset, page 5-14 • 5.7 Traffic Card Reset, page 5-14 • 5.8 Database Backup, page 5-14 • 5.9 Software Revert, page 5-15 5.1 CTC Software Delivery Methods ONS 15310-CL and ONS 15310-MA provisioning and administration is performed using CTC software. CTC is a Java application that is stored on the 15310-CL-CTX card in the ONS 15310-CL or on the CTX2500 card in the ONS 15310-MA. CTC is downloaded to your workstation the first time you log into a ONS 15310-CL or ONS 15310-MA with a new software release. 5.1.1 CTC Software Installed on the 15310-CL-CTX or CTX2500 Card CTC software is preloaded on the 15310-CL-CTX and CTX2500 cards; therefore, you do not need to install software. You can view the software versions that are installed on an ONS 15310-CL or ONS 15310-MA by selecting the Maintenance > Software tabs in node view (Figure 5-1). Select the tabs in network view to view the software versions installed on all the network nodes. 5-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.1.2 CTC Software Installed on the PC or UNIX Workstation Figure 5-1 CTC Software Versions in an ONS 15310-CL (Node View) 5.1.2 CTC Software Installed on the PC or UNIX Workstation CTC software Java Archive (JAR) files are installed on your computer using one of the following methods: • The JAR files are downloaded from the 15310-CL-CTX card or CTX2500 card and installed on your computer automatically the first time you connect to an ONS 15310-CL or ONS 15310-MA. Downloading the CTC software files at login ensures that your computer has the same CTC software version as the ONS 15310-CL or ONS 15310-MA you are accessing. The CTC JAR files are stored in the temporary directory designated by your computer operating system. You can use the Delete CTC Cache button to remove files. If the files are deleted, they are downloaded the next time you connect to an ONS node. Downloading the CTC JAR files may take 1-2 minutes, or 45-50 minutes, depending on the bandwidth of the connection between your workstation and the ONS 15310-CL or ONS 15310-MA. JAR files downloaded from a modem or a data communication channel (DCC) network link will require more time than JAR files downloaded over a LAN connection. • You can install the JAR files on your computer using the CTC setup wizard provided on the CTC software CD. If you install the JAR files with the setup wizard you do not need to wait for the files to download the first time you log into the node. In addition, you can manage ONS 15310-CL or ONS 15310-MA nodes that are added to networks with ONS nodes running older software releases. After you install the JAR files, you can log into an ONS 15454 running an earlier software release and manage the ONS 15310-CL or ONS 15310-MA nodes. However, if you use the Delete CTC Cache function, you must reinstall the JAR files from the software CD. During network topology discovery, CTC polls each node in the network to determine which one contains the most recent version of the CTC software. If CTC discovers a node in the network that has a more recent version of CTC than the version you are currently running, CTC generates a message 5-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.2 CTC Installation Overview stating that a later version of CTC has been found in the network and offers to install the CTC software upgrade JAR files. If you have network discovery disabled, CTC will not seek more recent versions of the software. Unreachable nodes are not included in the upgrade discovery. Note Upgrading the CTC software will overwrite your existing software. You must restart CTC after the upgrade is complete. 5.2 CTC Installation Overview To connect to an ONS 15310-CL or ONS 15310-MA using CTC, enter the ONS 15310-CL or ONS 15310-MA IP address in the URL field of t Navigator or Microsoft Internet Explorer. After connecting to an ONS 15310-CL or ONS 15310-MA, the following events occur automatically: 1. The CTC launcher applet downloads from the 15310-CL-CTX card or CTX2500 card to your computer. 2. The launcher determines whether your computer has a CTC release matching the release on the 15310-CL-CTX card or CTX2500 card. 3. If the computer does not have CTC installed, or if the installed release is older than the 15310-CL-CTX card or CTX2500 card version, the launcher downloads the CTC program files from the card. 4. The launcher starts CTC. The CTC session is separate from the web browser session, so the web browser is no longer needed. 5. You should always log into nodes having the latest software release unless you run the CTC setup wizard and install the ONS 15310-CL or ONS 15310-MA JAR client software files on your computer. If the JAR files are installed on your computer, you can log into ONS 15454s running Release 4.1 or later o manage ONS 15310-CL or ONS 15310-MA nodes that are connected by DCCs to the ONS 15454s. Each ONS 15310-CL or ONS 15310-MA can handle up to five concurrent CTC sessions. CTC performance can vary, depending on the volume of activity in each session, network bandwidth, and 15310-CL-CTX/CTX2500 card load. Note You can also use TL1 commands to communicate with the ONS 15310-CL or ONS 15310-MA through VT100 terminals and VT100 emulation software, or you can Telnet to an ONS 15310-CL or ONS 15310-MA using TL1 port 3083. Refer to the Cisco ONS SONET TL1 Command Guide for a comprehensive list of TL1 commands. 5.3 PC and UNIX Workstation Requirements To use CTC, your computer must have a web browser with the correct Java Runtime Environment (JRE) installed for the software release in use. The correct JRE and Java plug-in for each CTC software release are included on the Cisco ONS 15310-CL and Cisco ONS 15310-MA software CDs. Table 5-1 lists the requirements for PCs and UNIX workstations.5-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.3 PC and UNIX Workstation Requirements Note To avoid network performance issues, Cisco recommends managing a maximum of 50 nodes concurrently with CTC. The 50 nodes can be on a single DCC or split across multiple DCCs. Cisco does not recommend running multiple CTC sessions when managing two or more large networks. To manage more than 50 nodes, Cisco recommends using Cisco Transport Manager (CTM). If you do use CTC to manage more than 50 nodes, you can improve performance by adjusting the heap size; see the “General Troubleshooting” chapter of the Table 5-1 CTC Computer Requirements Area Requirements Notes Processor Pentium III 700 MHz, UltraSPARC, or equivalent 700 Mhz is the recommended processor speed. You can use computers with a lower processor speed; however, you might experience longer response times and slower performance. RAM 384 MB RAM recommended, 512 MB RAM optimum Cisco recommends using 512 MB RAM for networks with 25 nodes or more to avoid longer response times and slower performance. Hard drive 20 GB hard drive with 50 MB of space available — Operating System • PC: Windows 98, Windows NT 4.0 with Service Pack 6a, Windows 2000 with Service Pack 3, or Windows XP with Service Pack 1 • Workstation: Solaris versions 8 or 9 — Java Runtime Environment JRE 1.4.2 or 5.0 JRE 1.4.2 is installed by the CTC Installation Wizard included on the Cisco ONS 15310-CL software CD and the Cisco ONS 15310-MA software CD. JRE 1.4.2 and JRE 5.0 provide enhancements to CTC performance, especially for large networks with numerous circuits. Web browser • PC: Internet Explorer 6.x, Netscape 7.x • UNIX Workstation: Mozilla 1.7, Netscape 7.x For the PC, use JRE 1.4.2 or 5.0 with any supported web browser. Cisco recommends that you use Internet Explorer 6.0. Internet Explorer 6.x is available at the following site: http://www.microsoft.com Cable User-supplied Cat-5 straight-through cable with RJ-45 connectors on each end to connect the computer to the ONS 15310-CL or ONS 15310-MA directly or though a LAN —5-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.4 ONS 15310-CL and ONS 15310-MA Connection Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. You can also create login node groups; see the “Connect the PC and Log Into the GUI” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 5.4 ONS 15310-CL and ONS 15310-MA Connection Table 5-2 lists the connection options and requirements for connecting a PC to the ONS 15310-CL or ONS 15310-MA node. Table 5-2 ONS 15310-CL and ONS 15310-MA Connection Methods Method Description Requirements Local craft Refers to onsite network connections between the CTC computer and the ONS 15310-CL/ONS 15310-MA using one of the following: • The RJ-45 (LAN) port on the front of the ONS 15310-CL • The RJ-45 (LAN) port on the ONS 15310-MA CTX2500 card faceplate • A hub or switch to which the ONS 15310-CL or ONS 15310-MA is connected If you do not use Dynamic Host Configuration Protocol (DHCP), you must change the computer IP address, subnet mask, and default router, or use automatic host detection. Corporate LAN Refers to a connection to the ONS 15310-CL or ONS 15310-MA through a corporate or network operations center (NOC) LAN. • The ONS 15310-CL or ONS 15310-MA must be provisioned for LAN connectivity, including IP address, subnet mask, default gateway. • The ONS 15310-CL or ONS 15310-MA must be physically connected to the corporate LAN. • The CTC computer must be connected to the corporate LAN that has connectivity to the ONS 15310-CL or ONS 15310-MA.5-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5 CTC Window 5.5 CTC Window The CTC window appears after you log into an ONS 15310-CL or ONS 15310-MA. The CTC window includes a menu bar, toolbar, and a top and bottom pane. The top pane provides status information about the selected objects and a graphic of the current view. The bottom pane provides tabs and subtabs to view ONS 15310-CL or ONS 15310-MA information and perform provisioning and maintenance. The CTC window provides three views: network, node, and card. 5.5.1 Node View Node view is the first view that appears after you log into an ONS 15310-CL or ONS 15310-MA. The login node is the first node shown, and it is the “home view” for the session. Node view allows you to view and manage one node. The status area shows the node name; IP address; session boot date and time; number of Critical (CR), Major (MJ), and Minor (MN) alarms; the name of the current logged-in user; the security level of the user; the software version; and the network element default setup. 5.5.1.1 CTC Card Colors The graphic area of the CTC window depicts the shelf assembly. The colors of the cards in the graphic reflect the real-time status of the physical card and slot (Table 5-3). TL1 Refers to a connection to the ONS 15310-CL or ONS 15310-MA using TL1 rather than CTC. TL1 sessions can be started from CTC, or you can use a TL1 terminal. The physical connection can be a craft connection, corporate LAN, or a TL1 terminal. Refer to the Cisco ONS SONET TL1 Reference Guide. — Remote Refers to a connection made to the ONS 15310-CL or ONS 15310-MA using a modem. • A modem must be connected to the ONS 15310-CL or ONS 15310-MA. • The modem must be provisioned for the ONS 15310-CL or ONS 15310-MA. To run CTC, the modem must be provisioned for Ethernet access. Table 5-2 ONS 15310-CL and ONS 15310-MA Connection Methods (continued) Method Description Requirements Table 5-3 Node View Card and Slot Colors Card and Slot Color Status Gray Slot is not provisioned; no card is installed. Violet Slot is provisioned; no card is installed. White Slot is provisioned; a functioning card is installed. Yellow Slot is provisioned; a Minor alarm condition exists.5-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.1 Node View The port color in both card and node view indicates the port service state. Table 5-4 lists the port colors and their service states. For more information about port service states, see Appendix B, “Administrative and Service States.” Orange Slot is provisioned; a Major alarm condition exists. Red Slot is provisioned; a Critical alarm exists. Table 5-3 Node View Card and Slot Colors (continued) Card and Slot Color Status Table 5-4 Node View Card Port Colors and Service States Port Color Service State Description Cyan (blue) OOS-MA,LPBK (Out-of-Service and Management, Loopback) Port is in a loopback state. On the card in node view, a line between ports indicates that the port is in terminal or facility loopback (see Figure 5-2 on page 5-8 and Figure 5-3 on page 5-8). Traffic is carried and alarm reporting is suppressed. Raised fault conditions, whether or not their alarms are reported, can be retrieved on the CTC Conditions tab or by using the TL1 RTRV-COND command. Cyan (blue) OOS-MA,MT (Out-of-Service and Management, Maintenance) Port is out-of-service for maintenance. Traffic is carried and loopbacks are allowed. Alarm reporting is suppressed. Raised fault conditions, whether or not their alarms are reported, can be retrieved on the CTC Conditions tab or by using the TL1 RTRV-COND command. Use OOS-MA,MT for testing or to suppress alarms temporarily. Change the state to IS-NR, OOS-MA,DSBLD, or OOS-AU,AINS when testing is complete. Gray OOS-MA,DSBLD (Out-of-Service and Management, Disabled) The port is out-of-service and unable to carry traffic. Loopbacks are not allowed in this service state. Green IS-NR (In-Service and Normal) The port is fully operational and performing as provisioned. The port transmits a signal and displays alarms; loopbacks are not allowed. Violet OOS-AU,AINS (Out-of-Service and Autonomous, Automatic In-Service) The port is out-of-service, but traffic is carried. Alarm reporting is suppressed. The node monitors the ports for an error-free signal. After an error-free signal is detected, the port stays in OOS-AU,AINS state for the duration of the soak period. After the soak period ends, the port service state changes to IS-NR. Raised fault conditions, whether or not their alarms are reported, can be retrieved on the CTC Conditions tab or by using the TL1 RTRV-COND command. The AINS port will automatically transition to IS-NR when a signal is received for the length of time provisioned in the soak field.5-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.1 Node View Figure 5-2 Terminal Loopback Indicator Figure 5-3 Facility Loopback Indicator Table 5-5 lists the card statuses. 5.5.1.2 Node View Card Shortcuts If you move your mouse over cards in the graphic, popups display additional information about the card including the card type; card status (active or standby); the type of alarm, such as Critical, Major, and Minor (if any); and the alarm profile used by the card. Right-click a card to reveal a shortcut menu, which you can use to open, reset, or delete the card. Right-click a card slot to preprovision it before installing the card. 5.5.1.3 Node View Tabs Table 5-6 lists the tabs and subtabs available in the node view. Table 5-5 Node View Card Statuses Card Status Description Stby Card is in standby. Act Card is active. NP Card is not present. Mis Card is mismatched. Ldg Card is resetting. Table 5-6 Node View Tabs and Subtabs Tab Description Subtabs Alarms Lists current alarms (CR, MJ, MN) for the node and updates them in real time. — Conditions Displays a list of standing conditions on the node. — History Provides a history of node alarms including date, type, and severity of each alarm. The Session subtab displays alarms and events for the current session. The Node subtab displays alarms and events retrieved from a fixed-size log on the node. Session, Node Circuits Creates, deletes, edits, and maps circuits. Circuits, Rolls5-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.2 Network View 5.5.2 Network View Network view allows you to view and manage ONS 15310-CL or ONS 15310-MA nodes that have DCC connections to the node that you logged into and any login node groups you have selected. Nodes with DCC connections to the login node will not appear if you selected Disable Network Discovery on the Login dialog box. The graphic area displays a background image with colored ONS 15310-CL or ONS 15310-MA icons. A Superuser can set up the logical network view feature, which enables each user to see the same network view. Selecting a node or span in the graphic area displays information about the node and span in the status area. The icon colors indicate the node status (Table 5-7). 5.5.2.1 CTC Node Colors The color of a node in network view indicates the node alarm status. Table 5-7 lists the node colors shown in network view. Provisioning Provisions the ONS 15310-CL node. General, Network, OSI, Protection, Security, SNMP, Comm Channels, Timing, Alarm Profiles, Defaults Inventory Provides inventory information (part number, serial number, Common Language Equipment Identification [CLEI] codes) for cards installed in the node. Allows you to delete and reset cards, and to change card service state. For more information on card service states, see Appendix B, “Administrative and Service States.” — Maintenance Performs maintenance tasks for the node. Database, OSI, Protection, Software, Cross-Connect, Overhead XConnect, Diagnostic, Timing, Audit, RIP Routing Table, Routing Table, Table 5-6 Node View Tabs and Subtabs (continued) Tab Description Subtabs Table 5-7 Node Colors Indicating Status in Network View Color Alarm Status Green No alarms Yellow Minor alarms Orange Major alarms Red Critical alarms Gray with Unknown# Node initializing for the first time (CTC displays Unknown# because CTC has not yet discovered the name of the node)5-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.2 Network View 5.5.2.2 Network View Tabs Table 5-8 lists the tabs and subtabs available in the network view. 5.5.2.3 DCC Links The lines between nodes in the network view indicate DCC connections between the nodes. Active DCC connections appear as green/solid or green/dashed. Solid means circuits can be routed through the link, and dashed means circuits cannot be routed through the link. A gray link is in a fail state. 5.5.2.4 Link Consolidation CTC provides the ability to consolidate the DCC, general communications channel (GCC), optical transport section (OTS), provisionable patchcord (PPC), and server trail links shown in the network view into a more streamlined view. Link consolidation allows you to condense multiple inter-nodal links into a single link. The link consolidation sorts links by class, meaning that, for example, all DCC links are consolidated together. You can access individual links within consolidated links using the right-click shortcut menu. Each link has an associated icon (Table 5-9). Table 5-8 Network View Tabs and Subtabs Tab Description Subtabs Alarms Lists current alarms (CR, MJ, MN) for the network and updates them in real time. — Conditions Displays a list of standing conditions on the network. — History Provides a history of network alarms including date, type, and severity of each alarm. — Circuits Creates, deletes, edits, filters, and searches for network circuits. Circuits, Rolls Provisioning Provision security, alarm profiles, BLSRs, and overhead circuits. Security, Alarm Profiles, BLSR, Overhead Circuits, Provisionable Patchcords (PPC) Maintenance Displays the type of equipment and the status of each node in the network; displays working and protect software versions, and allows software to be downloaded. Software Table 5-9 Link Icons Icon Description DCC icon GCC icon5-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.3 Card View Note Link consolidation is only available on non-detailed maps. Non-detailed maps display nodes in icon form instead of detailed form, meaning the nodes appear as rectangles with ports on the sides. Refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for more information about consolidated links. 5.5.3 Card View Card view provides information about individual ONS 15310-CL or ONS 15310-MA cards. Use this view to perform card-specific maintenance and provisioning (Figure 5-4). A graphic showing the ports on the card appears in the graphic area. The status area provides the node name, slot, number of alarms, card type, equipment type, and either the card status (active or standby), card service state if the card is present, or port service state (Table 5-4 on page 5-7). The information that appears and the actions you can perform depend on the card. OTS icon PPC icon Server Trail icon Table 5-9 Link Icons Icon Description5-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.3 Card View Figure 5-4 CTC Card View in an ONS 15310-CL Showing an ML-100T-8 Card Table 5-10 shows the tabs and subtabs available in card view. The subtabs, fields, and information shown under each tab depend on the card type selected. Table 5-10 Card View Tabs and Subtabs Tab Description Subtabs Alarms Lists current alarms (CR, MJ, MN) for the card and updates them in real-time. — Conditions Displays a list of standing conditions on the card. — History Provides a history of card alarms including date, object, port, and severity of each alarm. Session (displays alarms and events for the current session), Card (displays alarms and events retrieved from a fixed-size log on the card) Circuits Creates, deletes, edits, and search circuits, and completes rolls. Circuits, Rolls5-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.5.4 Print and Export CTC Data 5.5.4 Print and Export CTC Data You can use the File > Print or File > Export options to print or export CTC provisioning information for record keeping or troubleshooting. The functions can be performed in card, node, or network views. The File > Print function sends the data to a local or network printer. File > Export exports the data to a file where it can be imported into other computer applications, such as spreadsheets and database management programs. Whether you choose to print or export data, you can choose from the following options: • Entire frame—Prints or exports the entire CTC window including the graphical view of the card, node, or network. This option is available for all windows. Provisioning Provisions a card. 15310-CL-CTX card and 15310-MA electrical cards: Wideband Ports, Broadband Ports, DS1 (subtabs include Line, Line Thresholds, Elect Path Thresholds, and SONET Thresholds); DS3 (subtabs include Line, Line Thresholds, Elect Path Thresholds, and SONET Thresholds); EC1 (subtabs include Line, SONET Thresholds, and SONET STS) 15310-CL-CTX card and CTX2500 card: Optical (subtabs include Line, SONET Thresholds, SONET STS, and Optics Thresholds); Pluggable Port Modules; External Alarms; External Controls, and Alarm Profiles. Ethernet cards (subtabs depend on the card type): Ether Ports, POS Ports, Ether VLAN, Ether Card, Ether Thresholds, Alarm Profiles Maintenance Performs maintenance tasks for the card. 15310-CL-CTX card and 15310-MA electrical cards: DS1 (subtabs include Loopback, Protection, Path Trace AINS Soak); DS3 (subtabs include Loopback, Protection, Path Trace AINS Soak); EC1(subtabs include Loopback, Protection, Path Trace AINS Soak) 15310-CL-CTX card and CTX2500 card: Optical (subtabs include Loopback, ALS, Protection, Path Trace AINS Soak); External Alarms; External Controls; and Virtual Wires Ethernet cards: Path Trace, Loopback, Bandwidth Performance Performs performance monitoring for the card. 15310-CL-CTX card and CTX2500 card: DS1, DS3, EC1, Optical Ethernet cards (subtabs depend on the card type): Ether Ports, POS Ports Table 5-10 Card View Tabs and Subtabs (continued) Tab Description Subtabs5-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.6 Common Control Card Reset • Tabbed view—Prints or exports the lower half of the CTC window containing tabs and data. The printout includes the selected tab (on top) and the data shown in the tab window. For example, if you print the History window tabbed view, you print only history items appearing in the window. This option is available for all windows. • Table Contents—Prints CTC data in table format without graphical representations of shelves, cards, or tabs. This option does not apply to all windows; refer to the print task in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for specifics. • The Table Contents option prints all the data contained in a table with the same column headings. For example, if you print the History window Table Contents view, you print all data included in the table whether or not items appear in the window. 5.6 Common Control Card Reset You can reset the common control card for the ONS 15310-CL (the 15310-CL-CTX card) or the ONS 15310-MA (the CTX2500 card) by using the hard-reset or soft-reset commands in CTC. A soft reset reboots the 15310-CL-CTX or CTX2500 card and reloads the operating system and the application software. A hard reset temporarily removes power from the 15310-CL-CTX card and CTX2500 card and clears all buffer memory. Before you hard-reset a card, put the card in standby mode by completing a soft-reset. From the node view, select a card and right-click to open a menu with the hard-reset and soft-reset commands. Soft resets do not impact traffic, but hard resets are service affecting. A card must be in the Out-of-Service and Management, Maintenance (OOS-MA,MT) service state before you can perform a hard reset. 5.7 Traffic Card Reset You can reset the CE-100T-8, ML-100T-8, DS1-28/DS3-EC1-3, and DS1-28/DS3-EC1-3 cards by using the hard-reset or soft-reset commands in CTC. A soft reset reboots the card and reloads the operating system and the application software. A hard reset temporarily removes power from the card and clears all buffer memory. From the node view, select a card and right-click to open a menu with the hard-reset and soft-reset commands. A card must be in the Out-of-Service and Management, Maintenance (OOS-MA,MT) service state before you can perform a hard reset. 5.8 Database Backup You can store a back-up version of the database on the workstation running CTC. This operation should be part of a regular ONS 15310-CL and ONS 15310-MA maintenance program performed at approximately weekly intervals and should also be completed when preparing an ONS 15310-CL or ONS 15310-MA for a pending natural disaster, such as a flood. Note The following parameters are not backed up and restored: node name, IP address, mask and gateway, and Internet Inter-ORB Protocol (IIOP) port. If you change the node name and then restore a backed up database with a different node name, the circuits will map to the new node name. Cisco recommends keeping a record of the old and new node names.5-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.9 Software Revert 5.9 Software Revert When you click the Activate button after a software upgrade, the 15310-CL-CTX or CTX2500 copies the current working database and saves it in a reserved location in the 15310-CL-CTX or CTX2500 flash memory. If you later need to revert to the original working software load from the protect software load, the saved database installs automatically. You do not need to restore the database manually or recreate circuits. The revert feature is useful if a maintenance window closes while you are upgrading CTC software. You can revert to the standby software load without losing traffic. When the next maintenance window opens, complete the upgrade and activate the new software load. Circuits that were created and provisioning that was performed after a software load is activated (upgraded to a higher release) do not reinstate with a revert. The database configuration at the time of activation is reinstated after a revert. This does not apply to maintenance reverts (for example 7.0.1 to 7.0.0), because maintenance releases use the same database.5-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 5 Cisco Transport Controller Operation 5.9 Software RevertCHAPTER 6-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 6 Security This chapter provides information about Cisco ONS 15310-CL and Cisco ONS 15310-MA user security. To provision security, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 6.1 Users IDs and Security Levels, page 6-1 • 6.2 User Privileges and Policies, page 6-2 • 6.3 Audit Trail, page 6-6 • 6.4 RADIUS Security, page 6-7 6.1 Users IDs and Security Levels A CISCO15 user ID is provided with the ONS 15310-CL and ONS 15310-MA for use with initial login. Use this ID to set up other ONS 15310-CL and ONS 15310-MA user IDs. (For instructions, see the “Turn Up a Node” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide.) Note Cisco Transport Controller (CTC) does not display the CISCO15 user ID when you log in. An ONS 15310-CL and ONS 15310-MA node can support up to 500 user IDs. Each CTC or Transaction Language 1 (TL1) user ID can be assigned one of the following security levels: • Retrieve—Users can retrieve and view CTC information but cannot set or modify parameters. • Maintenance—Users can access only the ONS 15310-CL and ONS 15310-MA maintenance options. • Provisioning—Users can access provisioning and maintenance options. • Superuser—Users can perform all of the functions of the other security levels as well as set names, passwords, and security levels for other users. By default, multiple concurrent user ID sessions are permitted on the node; that is, multiple users can log into a node using the same user ID. However, you can provision the node to allow only a single login per user ID and prevent concurrent logins for all users. See Table 6-3 on page 6-6 for idle user timeout information for each security level. 6-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.2 User Privileges and Policies 6.2 User Privileges and Policies This section lists user privileges for each CTC action and describes the security policies available to Superusers. 6.2.1 User Privileges by CTC Action Table 6-1 shows the actions that each user privilege level can perform in node view. Table 6-1 ONS 15310-CL and ONS 15310-MA Security Levels—Node View CTC Tab Subtab [Subtab]: Actions Retrieve Maintenance Provisioning Superuser Alarms — Synchronize/Filter/Delete Cleared Alarms XX X X Conditions — Retrieve/Filter X X X X History Session Filter X X X X Shelf Retrieve/Filter X X X X Circuits Circuits Create/Edit/Delete — — X X Filter/Search X X X X Rolls Complete/Force Valid Signal/Finish —— X X Provisioning General Edit — — Partial1 X Network General: Edit — — — X Static Routing: Create/Edit/ Delete —— X X OSPF: Create/Edit/Delete — — X X RIP: Create/Edit/Delete — — X X Proxy: Create/Edit/Delete — — — X Firewall: Create/Edit/Delete — — — X OSI Main Setup: Edit — — — X TARP: Config: Edit — — X X TARP: Static TDC: Add/Edit/Delete —— X X TARP: MAT: Add/Edit/Delete — — X X Routers: Setup: Edit — — — X Routers: Subnets: Edit/Enable/Disable —— X X Tunnels: Create/Edit/Delete — — X X Protection Create/Delete/Edit — — X X6-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.2.1 User Privileges by CTC Action Provisioning (continued) Security Users: Create/Delete/Clear Security Intrusion Alarm —— — X Users: Change Same user Same user Same user All users Active Logins: View/Logout/ Retrieve Last Activity Time —— — X Policy: Edit/View — — — X Access: Edit/View — — — X RADIUS Server: Create/Edit/Delete/Move Up/ Move Down/View —— — X Legal Disclaimer: Edit — — — X SNMP Create/Edit/Delete — — X X Browse trap destinations X X X X Comm Channels SDCC: Create/Edit/Delete — — X X LDCC: Create/Edit/Delete — — X X PPC: Create/Edit/Delete — — X X Timing General/BITS Facilities: Edit — — X X Orderwire Enable Buzzer — — X X Alarm Extenders External Alarms: Edit — — X X External Controls: Edit — — X X Alarm Profiles Alarm Behavior: Edit — — X X Alarm Profile Editor: Store/Delete2 —— X X Alarm Profile Editor: New/Load/Compare/Available/ Usage XX X X Defaults Edit/Import — — — X Reset/Export X X X X Inventory — Delete — — X X Hard Reset/Soft Reset — X X X Maintenance Database Backup — X X X Restore — — — X Network Routing Table: Retrieve X X X X RIP Routing Table: Retrieve X X X X Table 6-1 ONS 15310-CL and ONS 15310-MA Security Levels—Node View (continued) CTC Tab Subtab [Subtab]: Actions Retrieve Maintenance Provisioning Superuser6-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.2.1 User Privileges by CTC Action Table 6-2 shows the actions that each user privilege level can perform in network view. Maintenance (continued) OSI IS-IS RIB: Refresh X X X X ES-IS RIB: Refresh X X X X TDC: TID to NSAP/Flush Dynamic Entries —X X X TDC: Refresh X X X X Protection Switch/Lock out/ Lock-on/Clear/ Unlock —X X X Software Download — X X X Activate/Revert — — — X Cross-Connect Resource Usage: Delete — — X X Resource Usage: Refresh X X X X Overhead XConnect View X X X X Alarm Extenders External Alarms: View X X X X External Controls: View X X X X Virtual Wires: View/Retrieve X X X X Diagnostic Retrieve Tech Support Log — — X X Lamp Test — X X X Timing Source: Edit — X X X Report: View/Refresh X X X X Audit Retrieve — — — X Archive — — X X Test Access View X X X X 1. Provisioner user cannot change node name, contact, location, or Virtual Tributary alarm indication signal (AIS-V) insertion on STS-1 signal degrade (SD) parameters. 2. The action buttons in the subtab are active for all users, but the actions can be completely performed only by the users with the required security levels. Table 6-1 ONS 15310-CL and ONS 15310-MA Security Levels—Node View (continued) CTC Tab Subtab [Subtab]: Actions Retrieve Maintenance Provisioning Superuser Table 6-2 ONS 15310-CL and ONS 15310-MA Security Levels—Network View CTC Tab Subtab [Subtab]: Actions Retrieve Maintenance Provisioning Superuser Alarms — Synchronize/Filter/Delete cleared alarms XX X X Conditions — Retrieve/Filter X X X X History — Filter X X X X6-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.2.2 Security Policies 6.2.2 Security Policies Users with the Superuser security privilege can provision security policies on the ONS 15310-CL and ONS 15310-MA. These security policies include idle user timeouts, password changes, password aging, and user lockout parameters. In addition, a Superuser can access the ONS 15310-CL and ONS 15310-MA through the LAN port on the front of the node. 6.2.2.1 Superuser Privileges for Provisioning Users Superusers can grant permission to Provisioning users to perform a set of tasks. The tasks include retrieving an audit log, restoring a database, clearing performance monitoring (PM) parameters, and activating and reverting software loads. These privileges, except the PM clearing privilege, can only be granted using CTC network element (NE) defaults. See Appendix C, “Network Element Defaults” for more information. To grant the PM clearing privilege using CTC, click the Provisioning > Security > Access tabs. For more information about setting up Superuser privileges, refer to the “Change Node Settings” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Circuits Circuits Create/Edit/Delete — — X X Filter/Search X X X X Rolls Complete/ Force Valid Signal/ Finish —— X X Provisioning Security Users: Create/Delete/Clear Security Intrusion Alarm —— — X Users: Change Same User Same User Same User All Users Active logins: Logout/Retrieve Last Activity Time —— — X Policy: Change — — — X Alarm Profiles Store/Delete1 —— X X New/Load/Compare/Available/ Usage XX X X BLSR Create/Delete/Edit/Upgrade — — X X Overhead Circuits Create/Delete/Edit/Merge — — X X Search X X X X Provisionable Patchcords (PPC) Create/Edit/Delete — — X X Server Trails Create/Edit/Delete — — X X Maintenance Software Download/Cancel — X X X Diagnostic OSPF Node Information: Retrieve/Clear XX X X 1. The action buttons in the subtab are active for all users, but the actions can be completely performed only by the users assigned with the required security levels. Table 6-2 ONS 15310-CL and ONS 15310-MA Security Levels—Network View (continued) CTC Tab Subtab [Subtab]: Actions Retrieve Maintenance Provisioning Superuser6-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.3 Audit Trail 6.2.2.2 Idle User Timeout Each ONS 15310-CL and ONS 15310-MA CTC or TL1 user can be idle during his or her login session for a specified amount of time before the CTC window is locked. A lockout prevents unauthorized users from making changes. Higher-level users have shorter default idle periods and lower-level users have longer or unlimited default idle periods, as shown in Table 6-3. The user idle period can be modified by a Superuser; refer to the “Change Node Settings” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for instructions. 6.2.2.3 User Password, Login, and Access Policies Superusers can view real-time lists of users who are logged in via CTC or TL1 for each node. Superusers can also provision the following password, login, and node access policies: • Password expirations and reuse—Superusers can specify when users must change their passwords and how frequently passwords can be reused. • Login attempts and locking out users—Superusers can specify the maximum number of times that a user can unsuccessfully attempt to log in before being locked out of CTC. Superusers can also provision the length of time before the lockout is removed. • Disabling users—Superusers can provision the length of time before inactive user IDs are disabled. • Node access and user sessions—Superusers can limit the number of CTC sessions one user can have, and they can prohibit access to the ONS 15310-CL and ONS 15310-MA using the LAN connection. • Secure shell—Superusers can select secure shell (SSH) instead of Telnet at the CTC Provisioning > Security > Access tab. SSH is a terminal-remote host Internet protocol that uses encrypted links. It provides authentication and secure communication over channels that are not secure. Port 22 is the default port and cannot be changed. 6.3 Audit Trail The ONS 15310-CL and ONS 15310-MA maintain a GR-839-CORE-compliant audit trail log that resides on the 15310-CL-CTX and CTX2500 cards respectively. Audit trails are useful for maintaining security, recovering lost transactions, and tracing user activities. The audit trail log shows who has accessed the node and what operations were performed during a given period of time. The log includes authorized Cisco support logins and logouts using the operating system command line interface (CLI), CTC, and TL1; the log also includes FTP actions, circuit creation/deletion, and user/system generated actions. Event monitoring is also recorded in the audit log. An event is defined as a change in status of an element within the network. External events, internal events, attribute changes, and software upload/download activities are recorded in the audit trail. Table 6-3 Default User Idle Times Security Level Idle Time Superuser 15 minutes Provisioning 30 minutes Maintenance 60 minutes Retrieve Unlimited6-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.3.1 Audit Trail Log Entries To view the audit trail log, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Users can access the audit trail logs from any management interface (CTC, Cisco Transport Manager [CTM], or TL1). The audit trail is stored in persistent memory and is not corrupted by processor switches or upgrades. Note The ONS 15310-CL and ONS 15310-MA do not support a real-time clock with battery backup. Therefore, when you reset 15310-CL-CTX and CTX2500 cards, the audit log is reset to 1970 until you set the date and time again. 6.3.1 Audit Trail Log Entries Audit trail records capture various types of activities. Individual audit entries contain some or all of the following information: • User—Name of the user performing the action • Host—Host from where the activity is logged • Device ID—IP address of the device involved in the activity • Application—Name of the application involved in the activity • Task—Name of the task involved in the activity (view a dialog box, apply configuration, and so on) • Connection Mode—The service used to connect to the node (for example, Telnet, console, or Simple Network Management Protocol [SNMP]) • Category—Type of change: Hardware, Software, or Configuration • Status—Status of the user action: Read, Initial, Successful, Timeout, or Failed • Time—Time of change • Message Type—Denotes whether the event succeeded or failed • Message Details—A description of the change 6.3.2 Audit Trail Capacities The ONS 15310-CL and ONS 15310-MA is able to store 640 log entries.When this limit is reached, the oldest entries are overwritten with new events. When the log server is 80 percent full, an AUD-LOG-LOW condition is raised and logged. When the log server reaches the maximum capacity of 640 entries and begins overwriting records that were not archived, an AUD-LOG-LOSS condition is raised and logged. This event indicates that audit trail records have been lost. Until you off-load the file, this event will not occur a second time regardless of the amount of entries that are overwritten by incoming data. To export the audit trail log, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 6.4 RADIUS Security Users with Superuser security privileges can configure nodes to use Remote Authentication Dial In User Service (RADIUS) authentication. Cisco Systems uses a strategy known as authentication, authorization, and accounting (AAA) for enabling, verifying, and tracking the actions of remote users. 6-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.4.1 RADIUS Authentication 6.4.1 RADIUS Authentication RADIUS is a system of distributed security that secures remote access to networks and network services against unauthorized access. RADIUS contains three components: • A protocol with a frame format that utilizes User Datagram Protocol (UDP)/IP • A server • A client The server runs on a central computer, typically at a customer site, while the clients reside in the dial-up access servers and can be distributed throughout the network. ONS 15310-CL and ONS 15310-MA nodes operate as clients of the RADIUS server. The client is responsible for passing user information to designated RADIUS servers, and then acting on the response that is returned. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information necessary for the client to deliver service to the user. The RADIUS servers can act as proxy clients to other kinds of authentication servers. Transactions between the RADIUS client and server are authenticated through the use of a shared secret, which is never sent over the network. In addition, any user passwords are sent encrypted between the client and RADIUS server. This prevents someone monitoring an unsecured network from determine a user's password. Refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide to implement RADIUS authentication. 6.4.2 Shared Secrets A shared secret is a text string that serves as a password between: • A RADIUS client and a RADIUS server • A RADIUS client and a RADIUS proxy • A RADIUS proxy and a RADIUS server For a configuration that uses a RADIUS client, a RADIUS proxy, and a RADIUS server, the shared secret that is used between the RADIUS client and the RADIUS proxy can be different from the shared secret used between the RADIUS proxy and the RADIUS server. Shared secrets are used to: • Verify that RADIUS messages, with the exception of the Access-Request message, are sent by a RADIUS-enabled device that is configured with the same shared secret. • Verify that the RADIUS message has not been modified in transit (message integrity). • Encrypt some RADIUS attributes, such as User-Password and Tunnel-Password. When creating and using a shared secret: • Use the same case-sensitive shared secret on both RADIUS devices. • Use a different shared secret for each RADIUS server-RADIUS client pair. • Generate a random sequence at least 22 characters long to ensure a random shared secret. • Use any standard alphanumeric and special characters. • Use a shared secret of up to 128 characters in length. To protect your server and your RADIUS clients from brute force attacks, use long shared secrets (more than 22 characters). • Make the shared secret a random sequence from each of the following three categories: letters (upper or lower case), numbers, and punctuation. 6-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 6 Security 6.4.2 Shared Secrets • Change the shared secret often to protect your server and your RADIUS clients from dictionary attacks. An example of a strong shared secret is 8d#>9fq4bV)H7%a3-zE13sW$hIa32M#m Timing > Report tabs show current timing information for an ONS 15310-CL and ONS 15310-MA, including the timing mode, clock state and status, switch type, and reference data. Caution Mixed timing allows you to select both external and line timing sources. However, Cisco does not recommend its use because it can create timing loops. Use mixed timing mode with caution. 7.2 Network Timing Figure 7-1 shows an example of an ONS 15310-CL and ONS 15310-MA network timing setup. Node 1 is set to external timing. One reference is set to BITS, the two references are set to internal. The BITS output pins on the CTX cards of Node 3 provide timing to outside equipment, such as a digital access line multiplexer. Figure 7-1 ONS 15310-CL and ONS 15310-MA Timing Example Node 4 Timing Line Ref 1: Slot 4 Ref 2: Slot 3 Ref 3: Internal (ST3) Node 2 Timing Line Ref 1: Slot 3 Ref 2: Slot 4 Ref 3: Internal (ST3) Node 1 Timing External Ref 1: BITS Ref 2: Internal Ref 3: Internal (ST3) Node 3 Timing Line Ref 1: Slot 3 Ref 2: Slot 4 Ref 3: Internal (ST3) BITS out BITS source Third party equipment Slot 3 Slot 3 Slot 3 Slot 3 Slot 4 Slot 4 Slot 4 Slot 4 1248937-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 7 Timing 7.3 Synchronization Status Messaging 7.3 Synchronization Status Messaging Synchronization status messaging (SSM) is a SONET protocol that communicates information about the quality of the timing source. SSM messages are carried on the S1 byte of the SONET line layer. They enable SONET devices to automatically select the highest quality timing reference and to avoid timing loops. SSM messages are either Generation 1 or Generation 2. Generation 1 is the first and most widely deployed SSM message set. Generation 2 is a newer version. If you enable SSM for the ONS 15310-CL and ONS 15310-MA, consult your timing reference documentation to determine which message set to use. Table 7-1 and Table 7-2 show the Generation 1 and Generation 2 message sets. Table 7-1 SSM Generation 1 Message Set Message Quality Description PRS 1 Primary reference source—Stratum 1 STU 2 Synchronization traceability unknown ST2 3 Stratum 2 ST3 4 Stratum 3 SMC 5 SONET minimum clock ST4 6 Stratum 4 DUS 7 Do not use for timing synchronization RES Reserved; quality level set by user Table 7-2 SSM Generation 2 Message Set Message Quality Description PRS 1 Primary reference source—Stratum 1 STU 2 Synchronization traceability unknown ST2 3 Stratum 2 TNC 4 Transit node clock ST3E 5 Stratum 3E ST3 6 Stratum 3 SMC 7 SONET minimum clock ST4 8 Stratum 4 DUS 9 Do not use for timing synchronization RES Reserved; quality level set by user7-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 7 Timing 7.3 Synchronization Status MessagingCHAPTER 8-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 8 Circuits and Tunnels Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This chapter explains Cisco ONS 15310-CL and Cisco ONS 15310-MA synchronous transport signal (STS) and Virtual Tributary (VT) circuits and VT and data communications channel (DCC) tunnels. To provision circuits and tunnels, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 8.1 Overview, page 8-1 • 8.2 Circuit Properties, page 8-2 • 8.3 VT1.5 Bandwidth, page 8-7 • 8.4 VT Tunnels and Aggregation Points, page 8-8 • 8.5 DCC Tunnels, page 8-8 • 8.6 Virtual Concatenated Circuits, page 8-9 • 8.7 Section and Path Trace, page 8-13 • 8.8 Bridge and Roll, page 8-13 • 8.9 Merged Circuits, page 8-18 • 8.10 Reconfigured Circuits, page 8-19 • 8.11 Server Trails, page 8-20 8.1 Overview You can create circuits across and within ONS 15310-CL and ONS 15310-MA nodes and assign different attributes to circuits. For example, you can: • Create one-way, two-way (bidirectional), or broadcast circuits. • Assign user-defined names to circuits. • Assign different circuit sizes. 8-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.2 Circuit Properties • Automatically or manually route circuits. • Automatically create multiple circuits with autoranging. VT tunnels do not use autoranging. • Provide full protection to the circuit path. • Provide only protected sources and destinations for circuits. • Define a secondary circuit source or destination that allows you to interoperate an ONS 15310-CL or an ONS 15310-MA path protection with third-party equipment path protection configurations. • Set path protection circuits as revertive or nonrevertive. For the ONS 15310-CL and ONS 15310-MA CE-100T-8 or ML-100T-8 cards, you can provision circuits either before or after the cards are installed if the slots are provisioned. For the 15310-CL-CTX and the 15310-MA CTX2500 card, you must preprovision the small form-factor pluggables (SFPs) (called pluggable port modules [PPMs] in CTC) before you can create an optical circuit. However, circuits do not carry traffic until the cards and SFPs are installed and the ports are In-Service and Normal (IS-NR); Out-of-Service and Autonomous, Automatic In-Service (OO-AU,AINS); or Out-of-Service and Management, Maintenance (OOS-MA,MT). 8.2 Circuit Properties You can view information about circuits in the ONS 15310-CL and ONS 15310-MA Circuits window, which appears in network, node, and card view. The Circuits window shows the following information: • Name—The name of the circuit. The circuit name can be manually assigned or automatically generated. • Type—The circuit types are: STS (STS circuit), VT (VT circuit), VTT (VT tunnel), VAP (VT aggregation point), STS-V (STS virtual concatenated [VCAT] circuit), or VT-V (VT VCAT circuit). • Size—The circuit size. VT circuits are 1.5. ONS 15310-CL STS circuits are 1, 3c, 6c, 9c, or 12c. ONS 15310-MA STS circuits are 1, 3c, 6c, 9c, 12c, 24c, and 48c. VCAT circuits are VT1.5-nv or STS-1-nv, where n is the number of members. • Protection—The type of circuit protection. • Direction—The circuit direction, either two-way or one-way. • Status—The circuit status. See the “8.2.1 Circuit Status” section on page 8-3. • Source—The circuit source in the format: node/slot/port “port name”/STS/VT. (Port name appears in quotes.) Node and slot always appear; port “port name”/STS/VT might appear, depending on the source card, circuit type, and whether a name is assigned to the port. If the port uses a pluggable port module (PPM), the port format is PPM-port number, for example, p2-1. If the port is a DS-1, DS-3, or EC-1 port, port type is indicated, for example, pDS1. If the circuit size is a concatenated size (3c, 6c, 9c, 12c), STSs used in the circuit are indicated by an ellipsis, for example, S7..9, (STSs 7, 8, and 9) or S10..12 (STSs 10, 11, and 12). • Destination—The circuit destination in the same format as the circuit source. • # of Spans—The number of internode links that constitute the circuit. Right-clicking the column displays a shortcut menu from which you can choose to show or hide circuit span detail. • State—The circuit state. See the “8.2.2 Circuit States” section on page 8-4. The Filter button allows you to filter the circuits in network, node, or card view based on circuit name, size, type, direction, and other attributes. In addition, you can export the Circuit window data in HTML, comma-separated values (CSV), or tab-separated values (TSV) format using the Export command from the File menu.8-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.2.1 Circuit Status 8.2.1 Circuit Status The circuit statuses that appear in the Circuit window Status column are generated by Cisco Transport Controller (CTC) based on conditions along the circuit path. Table 8-1 shows the statuses that can appear in the Status column. Table 8-1 ONS 15310-CL and ONS 15310-MA Circuit Status Status Definition/Activity CREATING CTC is creating a circuit. DISCOVERED CTC created a circuit. All components are in place and a complete path exists from circuit source to destination. DELETING CTC is deleting a circuit. PARTIAL A CTC-created circuit is missing a cross-connect or network span or a complete path from source to destination(s) does not exist. In CTC, circuits are represented using cross-connects and network spans. If a network span is missing from a circuit, the circuit status is PARTIAL. However, a PARTIAL status does not necessarily mean a circuit traffic failure has occurred, because traffic might flow on a protect path. Network spans are in one of two states: up or down. On CTC circuit and network maps, up spans appear as green lines, and down spans appear as gray lines. If a failure occurs on a network span during a CTC session, the span remains on the network map but its color changes to gray to indicate that the span is down. If you restart your CTC session while the failure is active, the new CTC session cannot discover the span and its span line does not appear on the network map. Subsequently, circuits routed on a network span that goes down appear as DISCOVERED during the current CTC session, but appear as PARTIAL to users who log in after the span failure. DISCOVERED_TL1 A TL1-created circuit or a TL1-like CTC-created circuit is complete. A complete path from source to destinations exists. PARTIAL_TL1 A TL1-created circuit or a TL1-like CTC-created circuit is missing a cross-connect or circuit span (network link), and a complete path from source to destinations does not exist. CONVERSION_PENDING An existing circuit in a topology upgrade is set to this status. The circuit returns to the DISCOVERED status when the topology upgrade is complete. For more information about in-service topology upgrades, see Chapter 9, “SONET Topologies and Upgrades.” PENDING_MERGE Any new circuits created to represent an alternate path in a topology upgrade are set to this status to indicate that the circuit is temporary. These circuits can be deleted if a topology upgrade fails. For more information about in-service topology upgrades, see Chapter 9, “SONET Topologies and Upgrades.” DROP_PENDING A circuit is set to this status when a new circuit drop is being added.8-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.2.2 Circuit States 8.2.2 Circuit States The circuit service state is an aggregate of the cross-connect states within the circuit. • If all cross-connects in a circuit are in the IS-NR service state, the circuit service state is In-Service (IS). • If all cross-connects in a circuit are in an Out-of-Service (OOS) service state, such as OOS-MA,MT; Out-of-Service and Autonomous, Automatic In-Service (OOS-AU,AINS); or Out-of-Service and Management, Disabled (OOS-MA,DSBLD), the circuit service state is OOS. • PARTIAL is appended to the OOS circuit service state when circuit cross-connect states are mixed and not all states are IS-NR. The OOS-PARTIAL state can occur during automatic or manual transitions between states. OOS-PARTIAL can appear during a manual transition caused by an abnormal event such as a CTC crash or communication error, or if one of the cross-connects could not be changed. Refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide for troubleshooting procedures. You can assign a state to circuit cross-connects at two points: • During circuit creation, you can set the state on the Create Circuit wizard. • After circuit creation, you can change a circuit state in the Edit Circuit window or from the Tools > Circuits > Set Circuit State menu. Note After you have created an initial circuit in a CTC session, the subsequent circuit states default to the circuit state of the initial circuit, regardless of which nodes in the network the circuits traverse or the node.ckt.state default setting. During circuit creation, you can apply a service state to the drop ports in a circuit; however, CTC does not apply a requested state other than IS-NR to drop ports if: • The port is a timing source. • The port is provisioned for orderwire or tunnel orderwire. • The port is provisioned as a DCC or DCC tunnel. • The port supports 1+1. Circuits do not use the soak timer, but ports do. The soak period is the amount of time that the port remains in the OOS-AU,AINS service state after a signal is continuously received. When the cross-connects in a circuit are in the OOS-AU,AINS service state, the ONS 15310-CL and ONS 15310-MA monitor the cross-connects for an error-free signal. It changes the state of the circuit from OOS to IS or to OOS-PARTIAL as each cross-connect assigned to the circuit path is completed. This allows you to provision a circuit using TL1, verify its path continuity, and prepare the port to go into service when it receives an error-free signal for the time specified in the port soak timer. Two common examples of state changes you see when provisioning circuits using CTC are: • When assigning the IS,AINS administrative state to cross-connects in VT1.5 circuits and VT tunnels, the source and destination ports on the VT1.5 circuits remain in the OOS-AU,AINS service state until an alarm-free signal is received for the duration of the soak timer. When the soak timer expires and an alarm-free signal is found, the VT1.5 source port and destination port service states change to IS-NR and the circuit service state becomes IS. 8-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.2.3 Circuit Protection Types • When assigning the IS,AINS administrative state to cross-connects in STS circuits, the circuit source and destination ports transition to the OOS-AU,AINS service state. When an alarm-free signal is received, the source and destination ports remain OOS-AU,AINS for the duration of the soak timer. After the port soak timer expires, STS source and destination ports change to IS-NR and the circuit service state to IS. To find the remaining port soak time, choose the Maintenance > AINS Soak tabs in card view and click the Retrieve button. If the port is in the OOS-AU,AINS service state and has a good signal, the Time Until IS column shows the soak count down status. If the port is OOS-AU,AINS and has a bad signal, the Time Until IS column indicates that the signal is bad. You must click the Retrieve button to obtain the latest time value. For more information about port and cross-connect service states, see Appendix B, “Administrative and Service States.” 8.2.3 Circuit Protection Types The Protection column on the Circuit window shows the card (line) and SONET topology (path) protection used for the entire circuit path. Table 8-2 shows the protection type indicators that you see in this column. 8.2.4 Circuit Information in the Edit Circuits Window You can edit a selected circuit using the Edit button on the Circuits window. The tabs that appear depend on the circuit chosen: • General—Displays general circuit information and allows you to edit the circuit name. • Monitors—Displays possible monitor sources and allows you to create a monitor circuit. • Path Protection Selectors—Allows you to change path protection selectors. • Path Protection Switch Counts—Allows you to change path protection switch protection paths. • State—Allows you to edit cross-connect service states. • Merge—Allows you to merge aligned circuits. For more information, see the “8.9 Merged Circuits” section on page 8-18. Table 8-2 Circuit Protection Types Protection Type Description 1+1 The circuit is protected by a 1+1 protection group. N/A A circuit with connections on the same node is not protected. Protected The circuit is protected by diverse SONET topologies, for example, a path protection and 1+1. Unknown A circuit has a source and destination on different nodes and communication is down between the nodes. This protection type appears if not all circuit components are known. Unprot (black) A circuit with a source and destination on different nodes is not protected. Unprot (red) A circuit created as a fully protected circuit is no longer protected due to a system change, such as removal of a 1+1 protection group. Path Protection The circuit is protected by a path protection.8-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.2.4 Circuit Information in the Edit Circuits Window Using the Export command from the File menu, you can export data from the Path Protection Selectors, Path Protection Switch Counts, State, and Merge tabs in HTML, comma-separated values (CSV), or tab-separated values (TSV) format. The Show Detailed Map checkbox in the Edit Circuit window updates the graphical view of the circuit to show more detailed routing information, such as: • Circuit direction (unidirectional/bidirectional) • The nodes, STSs, and VTs through which the circuit passes including slots and port numbers • The circuit source and destination points • Open Shortest Path First (OSPF) area IDs • Link protection (path protection, unprotected, 1+1) and bandwidth (OC-N) Alarms and states can also be viewed on the circuit map, including: • Alarm states of nodes on the circuit route • Number of alarms on each node, organized by severity • Port service states on the circuit route • Alarm state/color of most severe alarm on port • Loopbacks • Path trace states • Path selectors states By default, the working path on the detailed circuit map is indicated by a green bidirectional arrow, and the protect path is indicated by a purple bidirectional arrow. Source and destination ports are shown as circles with an S and D. Port states are indicated by colors, shown in Table 8-3. Notations within or next to the squares or selector pentagons on each node indicate switches and other conditions. For example: • F = Force switch • M = Manual switch • L = Lockout switch • Arrow = Facility (outward) or terminal (inward) loopback (Figure 8-1) Table 8-3 Port State Color Indicators Port Color State Green IS-NR Gray OOS-MA,DSBLD Purple OOS-AU,AINS Light blue OOS-MA,MT8-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.3 VT1.5 Bandwidth Figure 8-1 Terminal Loopback in the Edit Circuits Window Move the mouse cursor over nodes, ports, and spans to see tooltips with information including the number of alarms on a node (organized by severity), a port’s service state, and the protection topology. Right-click a node, port, or span on the detailed circuit map to initiate certain circuit actions: • Right-click a unidirectional circuit destination node to add a drop to the circuit. • Right-click a port containing a path-trace-capable card to initiate the path trace. • Right-click a path protection span to change the state of the path selectors in the path protection circuit. 8.3 VT1.5 Bandwidth The 15310-CL-CTX card performs port-to-port time-division multiplexing (TDM). Because VT1.5 multiplexing is STS-based, understanding how VT1.5 circuits use the 15310-CL-CTX VT matrix resources is necessary to avoid unexpected depletion of VT matrix capacity. The key VT matrix principles are as follows: • The VT matrix has 24 logical STS ports. All VT1.5 multiplexing is achieved through these logical STS ports. • Because each logical STS termination on the VT matrix can carry 28 VT1.5s, the VT matrix capacity is 672 VT 1.5s (24 times 28). 8-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.4 VT Tunnels and Aggregation Points The 15310-CL-CTX card can map up to 24 STSs for VT1.5 traffic. Because one STS can carry 28 VT1.5s, the 15310-CL-CTX card can terminate up to 672 VT1.5s or 336 VT1.5 cross-connects. However, to terminate 336 VT1.5 cross-connects, each STS mapped for VT1.5 traffic must carry 28 VT1.5 circuits. If you assign each VT1.5 circuit to a different STS, the 15310-CL-CTX card VT1.5 cross-connect capacity is reached after you create 12 VT1.5 circuits. The CTX2500 in the ONS 15310-MA also performs port-to-port time-division multiplexing (TDM). The VT matrix for the CTX2500 has 96 logical STS ports. All VT1.5 multiplexing is achieved through these logical STS ports. Although the CTX2500 can support up to 2688 VT1.5 cross-connects and 1344 bidirectional VT circuits, the maximum number of VTs that can be provisioned for Software Release 7.0 is 2128 VT cross-connects and 1064 bidirectional VT circuits. 8.4 VT Tunnels and Aggregation Points To maximize VT1.5 cross-connect resources, you can tunnel VT1.5 circuits through ONS 15310-CL and ONS 15310-MA nodes. VT1.5 tunnels do not use VT matrix capacity at pass-through nodes, thereby freeing the cross-connect resources for other VT1.5 circuits. VT aggregation points (VAPs) allow you to provision circuits from multiple VT1.5 sources to a single STS destination. Like circuits, a VAP has a source and a destination. The source is the STS grooming end, the node where the VT1.5 circuits are aggregated into a single STS. The VAP STS must be an OC-N port. VT matrix resources are not used on the VAP source node, which is the key advantage of VAPs. The VAP destination is the node where the VT1.5 circuits originate. Circuits can originate on any ONS 15310-CL or ONS 15310-MA card or port. 8.5 DCC Tunnels Each SONET frame provides four DCCs for network element (NE) Operations, Administration, Maintenance, and Provisioning (OAM&P): one on the SONET Section layer (DCC1) and three on the SONET Line layer (DCC2, DCC3, DCC4). The ONS 15310-CL and ONS 15310-MA use the Section DCC (SDCC) or Line DCC (LDCC) for management and provisioning. When multiple DCC channels exist between two neighboring nodes, the ONS 15310-CL or ONS 15310-MA balances traffic over the existing DCC channels using a load-balancing algorithm. This algorithm chooses a DCC for packet transport by considering packet size and DCC utilization. You can tunnel third-party SONET equipment across ONS 15310-CL or ONS 15310-MA networks using one of two tunneling methods, a traditional DCC tunnel or an IP-encapsulated tunnel. 8.5.1 Traditional DCC Tunnels In traditional DCC tunnels, you can use the three available channels of the LDCC and/or the single channel of the SDCC, when not used for ONS 15310-CL or ONS 15310-MA DCC terminations, to tunnel third-party SONET equipment across ONS networks. A DCC tunnel endpoint is defined by slot, port, and DCC channel. You can connect any of the four available channels to any other available channel. To create a DCC tunnel, you connect the tunnel endpoints from one ONS 15310-CL or ONS 15310-MA optical port to another.8-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.5.2 IP-Encapsulated Tunnels Table 8-4 shows the DCC tunnels that you can create. When you create DCC tunnels, keep the following guidelines in mind: • An optical port used for a DCC termination cannot be used as a DCC tunnel endpoint, and an optical port that is used as a DCC tunnel endpoint cannot be used as a DCC termination. • All DCC tunnel connections are bidirectional. 8.5.2 IP-Encapsulated Tunnels An IP-encapsulated tunnel puts an SDCC in an IP packet at a source node and dynamically routes the packet to a destination node. To compare traditional DCC tunnels with IP-encapsulated tunnels, a traditional DCC tunnel is configured as one dedicated path across a network and does not provide a failure recovery mechanism if the path is down. An IP-encapsulated tunnel is a virtual path, which adds protection when traffic travels between different networks. IP-encapsulated tunneling has the potential to flood the DCC network with traffic, which causes CTC performance to degrade. The data originating from an IP tunnel can be throttled to a user-specified rate, which is a percentage of the total SDCC bandwidth. Each ONS 15310-CL or ONS 15310-MA supports one IP-encapsulated tunnel. You can convert a traditional DCC tunnel to an IP-encapsulated tunnel or an IP-encapsulated tunnel to a traditional DCC tunnel. Only tunnels in the Discovered status can be converted. Caution Converting from one tunnel type to the other is service-affecting. 8.6 Virtual Concatenated Circuits Virtual concatenated (VCAT) circuits, also called VCAT groups (VCGs), transport traffic using noncontiguous TDM time slots, avoiding the bandwidth fragmentation problem that exists with contiguous concatenated (CCAT) circuits. The ONS 15310-CL and ONS 15310-MA cards that support VCAT circuits are the CE-100T-8 and ML-100T-8 cards. In a VCAT circuit, circuit bandwidth is divided into smaller circuits called VCAT members. The individual members act as independent TDM circuits. All VCAT members should be the same size and must originate/terminate at the same end points. To enable end-to-end connectivity in a VCAT circuit that traverses through a third-party network, you must create a server trail between the ports. For more details, refer to the "Create Circuits and VT Tunnels" chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Table 8-4 DCC Tunnels DCC SONET Layer SONET Bytes OC-3, OC-12 DCC1 Section D1 to D3 Yes DCC2 Line D4 to D6 Yes DCC3 Line D7 to D9 Yes DCC4 Line D10 to D12 Yes8-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.6.1 VCAT Circuit States 8.6.1 VCAT Circuit States The state of a VCAT circuit is an aggregate of its member circuits. You can view whether a VCAT member is In Group or Out of Group in the VCAT State column in the Edit Circuits window. • If all member circuits are IS, the VCAT circuit is IS. • If all In Group member circuits are OOS, the VCAT circuit state is OOS. • If no member circuits exist or if all are Out of Group, the state of a VCAT circuit is OOS. • A VCAT circuit is OOS-PARTIAL when In Group member states are mixed and not all member states are IS. 8.6.2 VCAT Member Routing The automatic and manual routing selection applies to the entire VCAT circuit, that is, all members are manually or automatically routed. Bidirectional VCAT circuits are symmetric, which means that the same number of members travel in each direction. With automatic routing, you can specify the constraints for individual members; with manual routing, you can select different spans for different members. Two types of automatic and manual routing are available for VCAT members on CE-100T-8 and ML-100T-8 cards: common fiber routing and split fiber routing. In common fiber routing, all VCAT members travel on the same fibers, which eliminates delay between members. Three protection options are available for common fiber routing: Fully Protected, PCA, and Unprotected. Split fiber routing allows the individual members to be routed on different fibers or each member to have different routing constraints. This mode offers the greatest bandwidth efficiency and also the possibility of differential delay, which is handled by the buffers on the terminating cards or ports. Three protection options are available for split fiber routing: Fully Protected, Unprotected, and DRI. In both common fiber and split fiber routing, each member can use a different protection scheme; however, for common fiber routing, CTC checks the combination to make sure that a valid route exists. If it does not, the user must modify the protection type. In both common fiber and split fiber routing, intermediate nodes treat the VCAT members as normal circuits that are independently routed and protected by the SONET network. At the terminating nodes, these member circuits are multiplexed into a contiguous stream of data. Figure 8-2 shows an example of common fiber routing. Figure 8-2 VCAT Common Fiber Routing Member 1 VCG-2 Member 2 102170 Intermediate NE Member 1 VCG-1 Member 2 Member 1 VCG-2 Member 2 Member 1 VCG-1 Member 2 VCAT Function VCAT Function VCAT Function VCAT Function STS-1 STS-2 STS-3 STS-4 STS-1 STS-2 STS-3 STS-4 CE-100T-8 CE-100T-88-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.6.3 Link Capacity Adjustment Figure 8-3 shows an example of split fiber routing. Figure 8-3 VCAT Split Fiber Routing 8.6.3 Link Capacity Adjustment The CE-100T-8 and ML-100T-8 cards support the Link Capacity Adjustment Scheme (LCAS), which is a signaling protocol that allows dynamic bandwidth adjustment of VCAT circuits. When a member fails, LCAS temporarily removes the failed member from the VCAT circuit for the duration of the failure, leaving the remaining members to carry the traffic. When the failure clears, the member circuit is automatically added back into the VCAT circuit. You can select LCAS during VCAT circuit creation. Note Although LCAS operations are errorless, a SONET error can affect one or more VCAT members. If this occurs, the VCAT Group Degraded (VCG-DEG) alarm is raised. For information about clearing this alarm, refer to the “Alarm Troubleshooting” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. SW-LCAS is a limited form of LCAS that allows the VCAT circuit to adapt to member failures and keep traffic flowing at a reduced bandwidth. SW-LCAS is necessary when interoperating with the ONS 15454 ML-Series cards. SW-LCAS uses legacy SONET failure indicators like path alarm indication signal (AIS-P) and path remote defect indication (RDI-P) to detect member failure. You can select SW-LCAS during VCAT circuit creation. In addition, you can create non-LCAS VCAT circuits, which do not use LCAS or SW-LCAS. While LCAS and SW-LCAS member cross-connects can be in different service states, all In Group non-LCAS members must have cross-connects in the same service state. A non-LCAS circuit can mix Out of Group and In Group members if the In Group members are in the same service state. Non-LCAS members do not support the OOS-MA,OOG service state; to put a non-LCAS member in the Out of Group VCAT state, use OOS-MA,DSBLD. Note Protection switching for LCAS and non-LCAS VCAT circuits might exceed 60 ms. Traffic loss for VT VCAT circuits is approximately two times more than traffic loss for an STS VCAT circuit. You can minimize traffic loss by reducing path differential delay. 124065 VCAT Function Source VCAT at NE Traffic Traffic Virtually Concatenated Group Member #1 Member #2 Member #3 Intermediate NE VCAT Function with Differential Delay Buffer Destination VCAT at NE Intermediate NE Intermediate NE8-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.6.4 VCAT Circuit Size 8.6.4 VCAT Circuit Size Table 8-5 lists supported VCAT circuit rates and the number of members for each card. Use the Members tab in the Edit Circuit window to add or delete members from a VCAT circuit. The capability to add or delete members depends on whether the VCAT circuit is LCAS, SW-LCAS, or non-LCAS: • For VCAT LCAS circuits, you can add or delete members without affecting service. Before deleting a member, Cisco recommends that you put the member in the OOS-MA,OOG service state. • For SW-LCAS circuits used when interoperating with ONS 15454 ML-Series cards, you cannot add or delete members. • For non-LCAS VCAT circuits that use CE-100T-8 cards, adding and deleting members to/from the circuit is possible, but service-affecting. For ML-100T-8 cards, you cannot add or delete members from non-LCAS VCAT circuits without affecting the entire VCAT circuit. Table 8-6 summarizes the VCAT capabilities for the CE-100T-8 and ML-100T-8 cards. Table 8-5 ONS 15310-CL Card VCAT Circuit Rates and Members Card Circuit Rate Number of Members CE-100T-8 1 1. A VCAT circuit with an ONS 15310-CL or ONS 15310-MA CE-100T-8 or ML-100T-8 card as a source or destination and an ONS 15454 ML-Series card as a source or destination can have only two members. VT1.5 1–64 STS-1 1–3 ML-100T-8 1 STS-1 1–2 Table 8-6 ONS 15310-CL VCAT Card Capabilities Card Mode Add a Member Delete a Member Support OOS-MA,OOG CE-100T-8 LCAS Yes Yes Yes SW-LCAS No No No Non-LCAS Yes1 1. For CE-100T-8 cards, you can add or delete members after creating a VCAT circuit with no protection. During the time it takes to add or delete members (from seconds to minutes), the entire VCAT circuit will be unable to carry traffic. Yes1 No ML-100T-8 LCAS Yes Yes Yes SW-LCAS No No No Non-LCAS No No No8-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.7 Section and Path Trace 8.7 Section and Path Trace SONET J0 section and J1 and J2 path trace are repeated, fixed-length strings composed of 16 or 64 consecutive bytes. You can use the strings to monitor interruptions or changes to circuit traffic. For the ONS 15310-MA node, J0 section trace is supported for optical and EC-1 ports on the CTX2500, DS1-84/DS3-3, or DS1-28/DS3-EC1-3 cards. Table 8-7 shows the ONS 15310-CL and ONS 15310-MA cards and/or ports that support J1 and/or J2 path trace. If the string received at a circuit drop port does not match the string that the port expects to receive, an alarm is raised. Two path trace modes are available: • Automatic—The receiving port assumes that the first string it receives is the baseline string. • Manual—The receiving port uses a string that you manually enter as the baseline string. 8.8 Bridge and Roll The CTC Bridge and Roll wizard reroutes live traffic without interrupting service. The bridge process takes traffic from a designated “roll from” facility and establishes a cross-connect to the designated “roll to” facility. When the bridged signal at the receiving end point is verified, the roll process creates a new cross-connect to receive the new signal. When the roll completes, the original cross-connects are released. You can use the bridge and roll feature for maintenance functions such as card or facility replacement, or for load balancing. You can perform a bridge and roll on the following ONS platforms: ONS 15600, ONS 15454, ONS 15454 SDH, ONS 15327, ONS 15310-CL, and ONS 15310-MA. 8.8.1 Rolls Window The Rolls window lists information about a rolled circuit before the roll process is complete. You can access the Rolls window by clicking the Circuits > Rolls tabs in either network or node view. Figure 8-4 shows the Rolls window. Table 8-7 ONS 15310-CL and ONS 15310-MA Cards/Ports Capable of J1/J2 Path Trace Trace Function J1 or J2 Cards/Ports Transmit and receive J1 ONS 15310-CL DS-1 and DS-3 ports ML-100T-8 J1 and J2 CE-100T-8 J2 ONS 15310-MA OC-N, and DS1 ports Receive J1 ONS 15310-CL EC-1, OC-3, and OC-12 ports ONS 15310-MA OC-N, DS1, and DS3 ports 8-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.8.1 Rolls Window Figure 8-4 Rolls Window The Rolls window information includes: • Roll From Circuit—The circuit with connections that will no longer be used when the roll process is complete. • Roll To Circuit—The circuit that will carry the traffic when the roll process is complete. The Roll To Circuit is the same as the Roll From Circuit if a single circuit is involved in a roll. • Roll State—The roll status; see the “8.8.2 Roll Status” section on page 8-15 for information. • Roll Valid Signal—If the Roll Valid Signal status is true, a valid signal was found on the new port. If the Roll Valid Signal status is false, a valid signal was not found. It is not possible to get a true Roll Valid Signal status for a one-way destination roll. • Roll Mode—The mode indicates whether the roll is automatic or manual. CTC implements a roll mode at the circuit level. TL1 implements a roll mode at the cross-connect level. If a single roll is performed, CTC and TL1 behave the same. If a dual roll is performed, the roll mode specified in CTC might be different than the roll mode retrieved in TL1. For example, if you select Automatic, CTC coordinates the two rolls to minimize possible traffic hits by using the Manual mode behind the scenes. When both rolls have a good signal, CTC signals the nodes to complete the roll. – Automatic—When a valid signal is received on the new path, CTC completes the roll on the node automatically. One-way source rolls are always automatic. – Manual—You must complete a manual roll after a valid signal is received. One-way destination rolls are always manual. • Roll Path—The fixed point of the roll object. • Roll From Path— The old path that is being rerouted. • Roll To Path—The new path where the Roll From Path is rerouted. • Complete—Completes a manual roll after a valid signal is received. You can complete a manual roll if it is in a ROLL_PENDING status and you have not yet completed the roll or have not cancelled its sibling roll. • Force Valid Signal—Forces a roll onto the Roll To Circuit destination without a valid signal. If you choose Force Valid Signal, traffic on the circuit that is involved in the roll will be dropped when the roll is completed. • Finish—Completes the circuit processing of both manual and automatic rolls and changes the circuit status from ROLL_PENDING to DISCOVERED. After a roll, the Finish button also removes any cross-connects that are no longer used from the Roll From Circuit field.8-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.8.2 Roll Status • Cancel—Cancels the roll process. When the roll mode is Manual, cancel roll is only allowed before you click the Complete button. When the roll mode is Auto, cancel roll is only allowed before a good signal is detected by the node or before you click the Force Valid Signal button. 8.8.2 Roll Status Table 8-8 lists the roll statuses. You can only reroute circuits that have a DISCOVERED status. (See Table 8-1 on page 8-3 for a list of circuit statuses.) You cannot reroute circuits that are in the ROLL_PENDING status. 8.8.3 Single and Dual Rolls Circuits have an additional layer of roll types: single and dual. A single roll on a circuit is a roll on one of its cross-connects. Use a single roll to: • Change either the source or destination of a selected circuit (Figure 8-5 and Figure 8-6, respectively). • Roll a segment of the circuit onto another chosen circuit (Figure 8-7 on page 8-16). This roll also results in a new destination or a new source. Table 8-8 Roll Statuses State Description ROLL_PENDING The roll is awaiting completion or cancellation. ROLL_COMPLETED The roll is complete. Click the Finish button. ROLL_CANCELLED The roll has been canceled. TL1_ROLL A TL1 roll was initiated. Note If a roll is created using TL1, a CTC user cannot complete or cancel the roll. Also, if a roll is created using CTC, a TL1 user cannot complete or cancel the roll. You must use the same interface to complete or change a roll. INCOMPLETE This state appears when the underlying circuit becomes incomplete. To correct this state, you must fix the underlying circuit problem before the roll state will change. For example, a circuit traveling on Nodes A, B, and C can become INCOMPLETE if Node B is rebooted. The cross connect information is lost on Node B during a reboot. The Roll State on Nodes A and C will change to INCOMPLETE.8-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.8.3 Single and Dual Rolls In Figure 8-5, you can select any available STS on Node 1 for a new source. Figure 8-5 Single Source Roll In Figure 8-6, you can select any available STS on Node 2 for a new destination. Figure 8-6 Single Destination Roll Figure 8-7 shows one circuit rolling onto another circuit at the destination. The new circuit has cross-connects on Node 1, Node 3, and Node 4. CTC deletes the cross-connect on Node 2 after the roll. Figure 8-7 Single Roll from One Circuit to Another Circuit (Destination Changes) 83267 S1 Node 1 S2 Node 2 D Original leg New leg 83266 S Node 1 D2 Node 2 D1 Original leg New leg 78703 S Node 1 D D2 Node 2 Node 3 Node 4 Original leg New leg8-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.8.3 Single and Dual Rolls Figure 8-8 shows one circuit rolling onto another circuit at the source. Figure 8-8 Single Roll from One Circuit to Another Circuit (Source Changes) Note Create a Roll To Circuit before rolling a circuit with the source on Node 3 and the destination on Node 4. A dual roll involves two cross-connects. It allows you to reroute intermediate segments of a circuit, but keep the original source and destination. If the new segments require new cross-connects, use the Bridge and Roll wizard or create a new circuit and then perform a roll. Dual rolls have several constraints: • You must complete or cancel both cross-connects rolled in a dual roll. You cannot complete one roll and cancel the other roll. • When a Roll To circuit is involved in the dual roll, the first roll must roll onto the source of the Roll To circuit and the second roll must roll onto the destination of the Roll To circuit. Figure 8-9 illustrates a dual roll on the same circuit. Figure 8-9 Dual Roll to Reroute a Link 134274 S Node 1 Node 2 D Node 3 Node 4 Original leg New leg S2 83268 S Node 1 Node 2 D Original leg New leg8-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.8.4 Two-Circuit Bridge and Roll Figure 8-10 illustrates a dual roll involving two circuits. Figure 8-10 Dual Roll to Reroute to a Different Node Note If a new segment is created on Nodes 3 and 4 using the Bridge and Roll wizard, the created circuit has the same name as the original circuit with the suffix _ROLL**. The circuit source is on Node 3 and the circuit destination is on Node 4. 8.8.4 Two-Circuit Bridge and Roll When using the bridge and roll feature to reroute traffic using two circuits, the following constraints apply: • DCC must be enabled on the circuits involved in a roll before roll creation. • A maximum of two rolls can exist between any two circuits. • If two rolls are involved between two circuits, both rolls must be on the original circuit. The second circuit should not carry live traffic. The two rolls loop from the second circuit back to the original circuit. The roll mode of the two rolls must be identical (either automatic or manual). • If a single roll exists on a circuit, you must roll the connection onto the source or the destination of the second circuit and not an intermediate node in the circuit. 8.8.5 Protected Circuits CTC allows you to roll the working or protect path regardless of which path is active. You can upgrade an unprotected circuit to a fully protected circuit or downgrade a fully protected circuit to an unprotected circuit with the exception of a path protection circuit. When using bridge and roll on path protection circuits, you can roll the source or destination or both path selectors in a dual roll. However, you cannot roll a single path selector. 8.9 Merged Circuits A circuit merge combines a single selected circuit with one or more circuits. You can merge VT tunnels, VAP circuits, orderwire and user data channel (UDC) overhead circuits, CTC-created traffic circuits, and TL1-created traffic circuits. To merge circuits, you choose a master circuit on the CTC Circuits tab. 83102 S Node 1 Node 2 D Node 3 Node 4 Original leg New leg8-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.10 Reconfigured Circuits Then, you choose the circuits that you want to merge with the master circuit on the Merge tab in the Edit Circuits window. The Merge tab shows only the circuits that are available for merging with the master circuit: • Circuit cross-connects must create a single, contiguous path. • Circuits types must be a compatible. For example, you can combine an STS circuit with a VAP circuit to create a longer VAP circuit, but you cannot combine a VT circuit with an STS circuit. • Circuit directions must be compatible. You can merge a one-way and a two-way circuit, but not two one-way circuits in opposing directions. • Circuit sizes must be identical. • Circuit endpoints must send or receive the same framing format. • The merged circuits must become a DISCOVERED circuit. If all connections from the master circuit and all connections from the merged circuits align to form one complete circuit, the merge is successful. If all connections from the master circuit and some, but not all, connections from the other circuits align to form a single complete circuit, CTC notifies you and gives you the chance to cancel the merge process. If you choose to continue, the aligned connections merge successfully into the master circuit, and the unaligned connections remain in the original circuits. All connections in the completed master circuit use the original master circuit name. All connections from the master circuit and at least one connection from the other selected circuits must be used in the resulting circuit for the merge to succeed. If a merge fails, the master circuit and all other circuits remain unchanged. When the circuit merge completes successfully, the resulting circuit retains the name of the master circuit. 8.10 Reconfigured Circuits You can reconfigure multiple circuits, which is typically necessary when a large number of circuits are in the PARTIAL status. When reconfiguring multiple circuits, the selected circuits can be any combination of DISCOVERED, PARTIAL, DISCOVERED_TL1, or PARTIAL_TL1 circuits. You can reconfigure tunnels, VAP circuits, CTC-created circuits, and TL1-created circuits. The Reconfigure command maintains the names of the original cross-connects. Use the CTC Tools > Circuits > Reconfigure Circuits command to reconfigure selected circuits. During reconfiguration, CTC reassembles all connections of the selected circuits into circuits based on path size, direction, and alignment. Some circuits might merge and others might split into multiple circuits. If the resulting circuit is a valid circuit, it appears as a DISCOVERED circuit. Otherwise, the circuit appears as a PARTIAL or PARTIAL_TL1 circuit. Note PARTIAL tunnel circuits do not split into multiple circuits during reconfiguration.8-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 8 Circuits and Tunnels 8.11 Server Trails 8.11 Server Trails A server trail is a non-DCC link across a third-party network that connects two CTC network domains. A server trail allows circuit provisioning when no DCC is available. You can create server trails between any two optical or DS-3 ports. The end ports on a server trail can be different types. Server trails are not allowed on DCC-enabled ports. The server trail link is bidirectional and can be VT1.5, VT2, STS1, STS-3c, STS-6c, STS-12c, or STS-48c, depending on the port; you cannot upgrade an existing server trail to another size. A server trail link can be one of the following protection types: Preemptible, Unprotected, and Fully Protected. The server trail protection type determines the protection type for any circuits that traverse it. PCA circuits will use server trails with the Preemptible attribute. When creating circuits or VCATs, you can choose a server trail link during manual circuit routing. CTC may also route circuits over server trail links during automatic routing. VCAT common-fiber automatic routing is not supported.CHAPTER 9-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 9 SONET Topologies and Upgrades Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This chapter explains Cisco ONS 15310-CL and Cisco ONS 15310-MA SONET topologies and upgrades. To provision topologies, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 9.1 Path Protection Dual-Ring Interconnect for the ONS 15310-MA, page 9-1 • 9.2 Terminal Point-to-Point and Linear ADM Configurations, page 9-2 • 9.3 Interoperability, page 9-3 • 9.4 Path-Protected Mesh Networks, page 9-6 • 9.5 Four Node Configurations, page 9-8 • 9.6 OC-N Speed Upgrades, page 9-8 9.1 Path Protection Dual-Ring Interconnect for the ONS 15310-MA The path protection dual-ring interconnect topology (path protection DRI) provides an extra level of path protection between interconnected path protection configurations. In DRIs, traffic is dropped and continued at the interconnecting nodes to eliminate single points of failure. Two DRI topologies can be implemented on the Cisco ONS 15310-MA: the traditional DRI uses four Cisco ONS 15310-MAs at the interconnect nodes, and the integrated DRI uses two nodes. To route circuits on the DRI, you must choose the DRI option during circuit provisioning. Circuits with the DRI option enabled will be routed on the DRI path. 9-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.2 Terminal Point-to-Point and Linear ADM Configurations A hold-off timer sets the amount of time before a selector switch occurs. It reduces the likelihood of multiple switches, such as a service selector and a path selector. For example, if a path protection DRI service selector switch does not restore traffic, then the path selector switches after the hold-off time. The path protection DRI hold-off timer default is 100 ms. You can change this setting in the Path Protection Selectors tab of the Edit Circuits window. 9.2 Terminal Point-to-Point and Linear ADM Configurations You can configure ONS 15310-CLs and Cisco ONS 15310-MAs in a terminal point-to-point network (two nodes) or as a line of add/drop multiplexers (ADMs) (3 or more nodes) by configuring the OC-N ports as the working path and a second set as the protect path. Unlike rings, terminal and linear ADMs require that the OC-N port at each node be in 1+1 protection to ensure that a break to the working line is automatically routed to the protect line. Note In a linear ADM configuration, two OC-N ports in 1+1 protection are connected to two OC-N ports in 1+1 protection on a second node. On the second node, two more OC-N ports are connected to a third node. The third node can be connected to a fourth node, and so on, depending on the number of nodes in the linear ADM. The ONS 15310-CL has only two optical ports. This restricts an ONS 15310-CL to being the end node in a linear ADM network since both ports are necessary to create the 1+1 protection group to the neighbor node. The 15310-MA has four optical ports, so it can operate either as a terminal or intermediate node in a linear ADM network. Figure 9-1 shows two ONS 15310-CLs in a linear ADM configuration with an ONS 15454. In this example, working traffic flows from the ONS 15310 Node 1/Slot 2/Port 2-1 to the ONS 15454 Node 2/Slot 5, and from Node 2/Slot 12 to the ONS 15310 Node 3/Slot 2/Port 2-1. You create the protect path by placing Slot 2/Port 2-1 in 1+1 protection with Slot 2/Port 1-1 at Nodes 1 through 3. Figure 9-1 ONS 15310-CL Linear ADM Configuration Figure 9-2 shows three ONS 15310-MAs in a linear ADM configuration. In this example, working traffic flows from Node 1/Slot 3/Port 2-1 to Node 2/Slot 4/Port 2-1, and from Node 2/Slot 3/Port 2-1 to the Node 3/Slot 4/Port 2-1. You create the protect path by placing Slot 3/Port 2-1 in 1+1 protection with Slot 4/Port 2-2 at Nodes 1 through 3. Node 1 Node 2 Node 3 Slot 2 Port 2-1 to Slot 5 Slot 2 Port 1-1 to Slot 6 Working Path Protect Path 124412 Slot 13 to Slot 2 Port 1-1 Slot 12 to Slot 2 Port 2-1 ONS 15454 ONS 15310-CL ONS 15310-CL9-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.3 Interoperability Figure 9-2 ONS 15310-MA Linear ADM Configuration 9.3 Interoperability The ONS 15310-CL supports up to two SONET SDCCs and one path protection per node. The ONS 15310-MA supports up to four SONET SDCCs and two path protection per node. You can install ONS 15310-CL and ONS 15310-MA nodes into a network comprised entirely of ONS 15310 CL or MA nodes or into a network that has a mix of ONS 15310-CL, ONS 15310-MA, ONS 15454, and ONS 15327 nodes. The ONS 15310-CL and ONS 15310-MA nodes interoperate with the ONS 15454 and ONS 15327 nodes in linear or path protection configurations. Because connection procedures for these types of nodes are the same (for example, adding or dropping nodes from a path protection or linear configuration, or creating DCCs), follow the instructions in the “Add and Remove Nodes” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide whenever you make connections between ONS 15310-CL, ONS 15310-MA, ONS 15454, and ONS 15327 nodes. 9.3.1 Subtending Rings Subtending rings reduce the number of nodes and cards required and reduce external shelf-to-shelf cabling. Figure 9-3 shows an ONS 15454 with two subtending rings using ONS 15310-CL nodes. Figure 9-3 ONS 15454 with Two ONS 15310-CL Nodes Subtending Path Protections Figure 9-4 shows an ONS 15310-MA with two subtending rings path protection configurations. Node 1 Node 2 Node 3 Slot 3 Port 2-1 to Slot 4 Port 2-1 Working Path Protect Path 145753 Slot 3 Port 2-1 to Slot 4 Port 2-1 ONS 15310-MA ONS 15310-MA ONS 15310-MA Slot 3 Port 2-2 to Slot 4 Port 2-2 Slot 3 Port 2-2 to Slot 4 Port 2-2 ONS 15454 124459 ONS 15310 ONS 153109-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.3.1 Subtending Rings Figure 9-4 ONS 15310-MA with Two Subtending Path Protection Configurations Figure 9-5 shows a ring of ONS 15310-CL nodes subtended from a ring of ONS 15454 nodes. Figure 9-5 ONS 15310-CL Ring Subtended from an ONS 15454 Ring Figure 9-6 shows a ring of ONS 15310-MA nodes subtended from a ring of ONS 15454 nodes. 145954 ONS 15310-MA ONS 15310-MA ONS 15310-MA ONS 15454 ONS 15454 ONS 15454 ONS 15454 BLSR ONS 15310-CL ONS 15310-CL OC-3 or OC-12 OC-3 or OC-12 1244619-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.3.2 Linear Connections Figure 9-6 ONS 15310-MA Ring Subtended from an ONS 15454 Ring 9.3.2 Linear Connections Figure 9-7 shows a basic linear or path protection connection between ONS 15310-CL and ONS 15454 nodes. Note Please note that Figure 9-7 shows an ONS 15310-CL node, however; the illustration can be applied to both the ONS 15310-CL and ONS 15310-MA nodes. Figure 9-7 Linear or Path Protection Connection Between ONS 15454 and ONS 15310 or ONS 15310-MA Nodes ONS 15454 ONS 15454 ONS 15454 ONS 15454 BLSR ONS 15310-MA ONS 15310-MA OC-3, OC-12, or OC-48 OC-3, OC-12, or OC-48 145955 1+1 Linear (Point-to-Point) ONS 15310 ONS 15454 1244609-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.4 Path-Protected Mesh Networks 9.4 Path-Protected Mesh Networks In addition to single path protection configurations, terminal point-to-point or linear ADMs, you can extend ONS 15310-CL and ONS 15310-MA traffic protection by creating path-protected mesh networks (PPMNs). PPMNs include multiple ONS 15310-CL and ONS 15310-MA SONET topologies and extend the protection provided by a single path protection to the meshed architecture of several interconnecting rings. In a PPMN, circuits travel diverse paths through a network of single or multiple meshed rings. When you create circuits, CTC can automatically route circuits across the PPMN or you can manually route them. You can also choose levels of circuit protection. For example, if you choose full protection, CTC creates an alternate route for the circuit in addition to the main route. The second route follows a unique path through the network between the source and destination and sets up a second set of cross-connections. For example, in Figure 9-8, a circuit is created from the ONS 15454 shown at Node 3 to the ONS 15454 shown at Node 9. CTC determines that the shortest route between the two nodes passes through Node 8 and Node 7, shown by the dotted line, and automatically creates cross-connections at Nodes 3, 8, 7, and 9 to provide the primary circuit path. If full protection is selected, CTC creates a second unique route between Nodes 3 and 9 which, in this example, passes through Nodes 2, 1, and 11. Cross-connections are automatically created at Nodes 3, 2, 1, 11, and 9, shown by the dashed line. If a failure occurs on the primary path, traffic switches to the second circuit path. In this example, Node 9 switches from the traffic coming in from Node 7 to the traffic coming in from Node 11 and service resumes. The switch occurs within 50 ms. Figure 9-8 Path-Protected Mesh Network for ONS 15310-CL Nodes = Primary path = Secondary path Working tr Protect traffic affic Source Node Destination Node 124462 Node 1 Node 11 Node 2 Node 4 Node 5 Node 6 Node 7 Node 10 Node 8 Node 9 Node 39-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.4 Path-Protected Mesh Networks For example, in Figure 9-9, a circuit is created from Node 3 to Node 9. CTC determines that the shortest route between the two nodes passes through Node 8 and Node 7, shown by the dotted line, and automatically creates cross-connections at Nodes 3, 8, 7, and 9 to provide the primary circuit path. If full protection is selected, CTC creates a second unique route between Nodes 3 and 9 which, in this example, passes through Nodes 2, 1, and 11. Cross-connections are automatically created at Nodes 3, 2, 1, 11, and 9, shown by the dashed line. If a failure occurs on the primary path, traffic switches to the second circuit path. In this example, Node 9 switches from the traffic coming in from Node 7 to the traffic coming in from Node 11 and service resumes. The switch occurs within 50 ms. Figure 9-9 Path-Protected Mesh Network for ONS 15310-MA Nodes PPMN also allows spans with different SONET speeds to be mixed together in “virtual rings.” Figure 9-10 shows an ONS 15310-MA with Nodes 1, 2, 3, and 4 in a standard OC-48 ring. Nodes 5, 6, 7, and 8 link to the backbone ring through the OC-12 fiber. The virtual ring formed by Nodes 5, 6, 7, and 8 use both the OC-48 and OC-12 cards. = Primary path = Secondary path Working tr Protect traffic affic Source Node Destination Node 145956 Node 1 Node 11 Node 2 Node 4 Node 5 Node 6 Node 7 Node 10 Node 8 Node 9 Node 39-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.5 Four Node Configurations Figure 9-10 Virtual Ring for ONS 15310-MAs 9.5 Four Node Configurations You can link multiple ONS 15310-CL or ONS 15310-MA nodes using their OC-N ports (also known as creating a fiber-optic bus) to accommodate more access traffic than a single ONS 15310-CL or ONS 15310-MA can support. For example, to drop more than 21 DS-1s or 3 DS-3s (the maximum that can be aggregated in a single ONS 15310-CL node), you can link the nodes but not merge multiple nodes into a single ONS 15310-CL. You can link nodes with OC-N fiber spans as you would link any other two network nodes. The nodes can be grouped in one facility to aggregate more local traffic. 9.6 OC-N Speed Upgrades A span is the optical fiber connection between two ONS 15310-CL or ONS 15310-MA nodes. In a span (optical speed) upgrade, the transmission rate of a span is upgraded from an OC-3 to OC-12 signal (ONS 15310-CL or ONS 15310-MA), from an OC-12 to OC-48 signal (ONS 15310-MA only), or from an OC-3 to OC-48 signal (ONS 15310-MA only), but all other span configuration attributes remain unchanged. With multiple nodes, a span upgrade is a coordinated series of upgrades on all nodes in the ring or protection group. The ONS 15310-CL nodes support the span upgrade wizard if you are upgrading two ONS 15310-CLs with 1+1 protection from OC-3 to OC-12. The ONS 15310-MA nodes support the span upgrade wizard if you are upgrading two ONS 15310-MAs with 1+1 protection from OC-3 to OC-12, OC-12 to OC-48, or OC-3 to OC-48. To perform a span upgrade, the higher-rate pluggable port module (PPM) must replace the lower-rate PPM in the same slot. If you are using a multi-rate PPM, you do not need to physically replace the PPM. All spans in the network must be upgraded. The 1+1 protection configuration of the original lower-rate PPM is retained for the higher-rate PPM. OC-12 OC-48 OC-12 145957 ONS 15310-MA Node 5 ONS 1510-MA Node 1 ONS 15310-MA Node 6 ONS 15310-MA Node 2 ONS 15310-MA Node 4 ONS 15310-MA Node 8 ONS 15310-MA Node 3 ONS 15310-MA Node 79-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.6.1 Span Upgrade Wizard When performing span upgrades, Cisco recommends that you upgrade all spans in a network consecutively and in the same maintenance window. Until all spans are upgraded, mismatched PPM types will be present. If you are upgrading two ONS 15310-CL nodes with 1+1 protection from OC-3 to OC-12, or two ONS 15310-MA nodes with 1+1 protection from OC-3 to OC-12, OC-12 to OC-48, or OC-3 to OC-48, Cisco recommends using the Span Upgrade Wizard to perform span upgrades. Although you can also use the manual span upgrade procedures, the manual procedures are mainly provided as error recovery for the wizard. The Span Upgrade Wizard and the manual span upgrade procedures require at least two technicians (one at each end of the span) who can communicate with each other during the upgrade. Upgrading a span is non-service affecting and will cause no more than three switches, each of which is less than 50 ms in duration. To initiate the span upgrade, right-click the span and choose Span Upgrade. Note Span upgrades do not upgrade SONET topologies (for example, a 1+1 group to a path protection). Refer to the “Convert Network Configurations” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for topology upgrade procedures. 9.6.1 Span Upgrade Wizard The Span Upgrade Wizard automates all steps in the manual 1+1 span upgrade procedure, if you are upgrading two ONS 15310-CL or ONS 15310-MA nodes. The wizard can upgrade both lines of a 1+1 group. The Span Upgrade Wizard requires that spans have DCCs enabled. The Span Upgrade Wizard provides no way to back out of an upgrade. In the case of an error, you must exit the wizard and initiate the manual procedure to either continue with the upgrade or back out of it. To continue with the manual procedure, examine the standing conditions and alarms to identify the stage in which the wizard failure occurred. 9.6.2 Manual Span Upgrades Manual span upgrades are mainly provided as error recovery for the Span Upgrade Wizard, but they can be used to perform span upgrades. You can perform a manual span upgrade on a 1+1 protection group, if you are upgrading two ONS 15310-CL or ONS 15310-MA nodes. Downgrading can be performed to back out of a span upgrade. The procedure for downgrading is the same as upgrading except that you provision a lower-rate PPM (OC-3 for the ONS 15310-CL, or OC-3 or OC12 for the 15310-MA) and install a lower-rate PPM (if you are not using a multi-rate PPM). You cannot downgrade if circuits exist on the STSs that will be removed (the higher STSs).9-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 9 SONET Topologies and Upgrades 9.6.2 Manual Span UpgradesCHAPTER 10-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 10 Management Network Connectivity This chapter provides an overview of Cisco ONS 15310-CL and Cisco ONS 15310-MA data communications network (DCN) connectivity. Cisco Optical Networking System (ONS) network communication is based on IP, including communication between Cisco Transport Controller (CTC) computers and ONS 15310-CL or ONS 15310-MA nodes, and communication among networked ONS 15310-CL or ONS 15310-MA nodes. The chapter provides scenarios showing ONS 15310-CL and ONS 15310-MA nodes in common IP network configurations as well as information about provisionable patchcords, the IP routing table, external firewalls, and open gateway network element (GNE) networks. Although ONS 15310-CL and ONS 15310-MA DCN communication is based on IP, ONS 15310-CL and ONS 15310-MA nodes can be networked to equipment that is based on the Open System Interconnection (OSI) protocol suites. This chapter describes the OSI implementation and provides scenarios that show how the ONS 15310-CL and ONS 15310-MA can be networked within a mixed IP and OSI environment. Chapter topics include: • 10.1 IP Networking Overview, page 10-2 • 10.2 IP Addressing Scenarios, page 10-2 • 10.3 Provisionable Patchcords, page 10-16 • 10.4 Routing Table, page 10-17 • 10.5 External Firewalls, page 10-18 • 10.6 Open GNE, page 10-20 • 10.7 TCP/IP and OSI Networking, page 10-22 Note This chapter does not provide a comprehensive explanation of IP networking concepts and procedures, nor does it provide IP addressing examples to meet all networked scenarios. For networking setup instructions, refer to the “Turn Up a Node” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Note To connect ONS 15310-CL or ONS 15310-MA nodes to an IP network, you must work with a LAN administrator or other individual at your site who has IP networking training and experience. 10-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.1 IP Networking Overview 10.1 IP Networking Overview ONS 15310-CL and ONS 15310-MA nodes can be connected in many different ways within an IP environment: • They can be connected to LANs through direct connections or a router. • IP subnetting can create ONS 15310-CL or ONS 15310-MA login node groups, which allow you to provision non-data communications channel (DCC) connected nodes in a network. • Different IP functions and protocols can be used to achieve specific network goals. For example, Proxy Address Resolution Protocol (ARP) enables one LAN-connected ONS 15310-CL or ONS 15310-MA to serve as a gateway for ONS 15310-CL or ONS 15310-MA nodes that are not connected to the LAN. • You can create static routes to enable connections among multiple Cisco Transport Controller (CTC) sessions with ONS 15310-CL or ONS 15310-MA nodes that reside on the same subnet with multiple CTC sessions. • If ONS 15310-CL or ONS 15310-MA nodes are connected to Open Shortest Path First (OSPF) networks, ONS 15310-CL or ONS 15310-MA network information is automatically communicated across multiple LANs and WANs. • The ONS 15310-CL and ONS 15310-MA proxy server controls the visibility and accessibility between CTC computers and ONS 15310-CL or ONS 15310-MA element nodes. 10.2 IP Addressing Scenarios ONS 15310-CL and ONS 15310-MA IP addressing generally has seven common scenarios or configurations. Use the scenarios as building blocks for more complex network configurations. Table 10-1 provides a general list of items to check when setting up ONS 15310-CL or ONS 15310-MA nodes in IP networks. Table 10-1 General P Troubleshooting Checklist Item What to Check Link integrity Verify that link integrity exists between: • CTC computer and network hub/switch • ONS 15310-CL or ONS 15310-MA nodes (RJ-45 ports labeled LAN) and network hub/switch • Router ports and hub/switch ports Node hub/switch ports Verify connectivity. If connectivity problems occur, set the hub or switch port that is connected to the ONS 15310-CL or ONS 15310-MA to 10 Mbps half-duplex. Ping Ping the node to test connections between computers and ONS 15310-CL or ONS 15310-MA nodes. IP addresses/subnet masks Verify that ONS 15310-CL or ONS 15310-MA IP addresses and subnet masks are set up correctly. Optical connectivity Verify that ONS 15310-CL or ONS 15310-MA optical trunk ports are in service and that a DCC is enabled on each trunk port.10-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.1 Scenario 1: CTC and ONS 15310-CL or ONS 15310-MA Nodes on the Same Subnet 10.2.1 Scenario 1: CTC and ONS 15310-CL or ONS 15310-MA Nodes on the Same Subnet Scenario 1 shows a basic ONS 15310-CL or ONS 15310-MA LAN configuration (Figure 10-1). The ONS 15310-CL or ONS 15310-MA nodes and CTC computer reside on the same subnet. All nodes connect to LAN A and have DCC connections. Figure 10-1 Scenario 1: CTC and ONS 15310-CL or ONS 15310-MA Nodes on the Same Subnet 10.2.2 Scenario 2: CTC and ONS 15310-CL or ONS 15310-MA Nodes Connected to a Router In Scenario 2 the CTC computer resides on a subnet (192.168.1.0) and attaches to LAN A (Figure 10-2). The ONS 15310-CL or ONS 15310-MA nodes reside on a different subnet (192.168.2.0) and attach to LAN B. A router connects LAN A to LAN B. The IP address of router interface A is set to LAN A (192.168.1.1), and the IP address of router interface B is set to LAN B (192.168.2.1). On the CTC computer, the default gateway is set to router interface A. If the LAN uses Dynamic Host Configuration Protocol (DHCP), the default gateway and IP address are assigned automatically. In Figure 10-2, a DHCP server is not available. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = N/A Host Routes = N/A ONS 15310 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #3 IP Address 192.168.1.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN A SONET RING 12469110-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.3 Scenario 3: Using Proxy ARP to Enable an ONS 15310-CL or ONS 15310-MA Gateway Figure 10-2 Scenario 2: CTC and ONS 15310-CL or ONS 15310-MA Nodes Connected to Router 10.2.3 Scenario 3: Using Proxy ARP to Enable an ONS 15310-CL or ONS15310-MA Gateway ARP matches higher-level IP addresses to the physical addresses of the destination host. It uses a lookup table (called ARP cache) to perform the translation. When the address is not found in the ARP cache, a broadcast is sent out on the network with a special format called the ARP request. If one of the machines on the network recognizes its own IP address in the request, it sends an ARP reply back to the requesting host. The reply contains the physical hardware address of the receiving host. The requesting host stores this address in its ARP cache so that all subsequent datagrams (packets) to this destination IP address can be translated to a physical address. Proxy ARP enables one LAN-connected ONS 15310-CL or ONS 15310-MA to respond to the ARP request for ONS 15310-CL or ONS 15310-MA nodes not connected to the LAN. (Proxy ARP requires no user configuration.) For the proxy ARP node to require no user confirmation, the DCC-connected nodes must reside on the same subnet. When a LAN device sends an ARP request to an ONS 15310-CL or ONS 15310-MA that is not connected to the LAN, the gateway ONS 15310-CL or ONS 15310-MA returns its MAC address to the LAN device. The LAN device then sends the datagram for the remote ONS 15310-CL or ONS 15310-MA to the MAC address of the proxy node. The proxy ONS 15310-CL or ONS 15310-MA uses its routing table to forward the datagram to the non-LAN ONS 15310-CL or ONS 15310-MA. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router IP Address of interface “A” to LAN “A” 192.168.1.1 IP Address of interface “B” to LAN “B” 192.168.2.1 Subnet Mask 255.255.255.0 Default Router = N/A Host Routes = N/A ONS 15310 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes = N/A ONS 15310 #2 IP Address 192.168.2.20 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes = N/A ONS 15310 #3 IP Address 192.168.2.30 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes = N/A LAN B LAN A Int "A" Int "B" SONET RING 12469210-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.3 Scenario 3: Using Proxy ARP to Enable an ONS 15310-CL or ONS 15310-MA Gateway Scenario 3 is similar to Scenario 1, but only one ONS 15310-CL or ONS 15310-MA node (#1) connects to the LAN (Figure 10-3). Two ONS 15310-CL or ONS 15310-MA nodes (#2 and #3) connect to Node 1 through the SONET DCC. Because all three nodes are on the same subnet, Proxy ARP enables Node 1 to serve as a gateway for Nodes 2 and 3. Note This scenario assumes all CTC connections are to Node 1. If you connect a laptop to either Node 2 or Node 3, network partitioning occurs, and neither the laptop or the CTC computer is able to see all nodes. If you want laptops to connect directly to end network elements, you need to create static routes (see Scenario 5) or enable the ONS 15310-CL or ONS 15310-MA proxy server (see Scenario 7). Figure 10-3 Scenario 3: Using Proxy ARP You can also use proxy ARP to communicate with hosts attached to the craft Ethernet ports of DCC-connected nodes (Figure 10-4). The node with an attached host must have a static route to the host. Static routes are propagated to all DCC peers using OSPF. The existing proxy ARP node is the gateway for additional hosts. Each node examines its routing table for routes to hosts that are not connected to the DCC network but are within the subnet. The existing proxy server replies to ARP requests for these additional hosts with the node MAC address. The existence of the host route in the routing table ensures that the IP packets addressed to the additional hosts are routed properly. Other than establishing a static route between a node and an additional host, no provisioning is necessary. The following restrictions apply: • Only one node acts as the proxy ARP server for any given additional host. • A node cannot be the proxy ARP server for a host connected to its Ethernet port. In Figure 10-4, Node 1 announces to Node 2 and 3 that it can reach the CTC host. Similarly, Node 3 announces that it can reach the ONS 152xx. The ONS 152xx is shown as an example; any network element can be set up as an additional host. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = N/A ONS 15310 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #3 IP Address 192.168.1.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN A SONET RING 12469310-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.4 Scenario 4: Default Gateway on CTC Computer Figure 10-4 Scenario 3: Using Proxy ARP with Static Routing 10.2.4 Scenario 4: Default Gateway on CTC Computer Scenario 4 is similar to Scenario 3, but ONS 15310-CL or ONS 15310-MA Node 2 and Node 3 reside on different subnets, 192.168.2.0 and 192.168.3.0, respectively (Figure 10-5). Node 1 and the CTC computer are on subnet 192.168.1.0. Proxy ARP is not used because the network includes different subnets. For the CTC computer to communicate with Nodes 2 and 3, Node 1 is entered as the default gateway on the CTC computer. CTC Workstation IP Address 192.168.1.100 Subnet Mark at CTC Workstation 255.255.255.0 Default Gateway = N/A ONS 15310 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = Destination 192.168.1.100 Mask 255.255.255.0 Next Hop 192.168.1.10 ONS 15310 #3 IP Address 192.168.1.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = Destination 192.168.1.31 Mask 255.255.255.255 Next Hop 192.168.1.30 ONS 152xx IP Address 192.168.1.31 Subnet Mask 255.255.255.0 LAN A SONET RING 12468810-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.5 Scenario 5: Using Static Routes to Connect to LANs Figure 10-5 Scenario 4: Default Gateway on a CTC Computer 10.2.5 Scenario 5: Using Static Routes to Connect to LANs Static routes are used for two purposes: • To connect ONS 15310-CL or ONS 15310-MA nodes to CTC sessions on one subnet that are connected by a router to ONS 15310-CL or ONS 15310-MA nodes residing on another subnet. (These static routes are not needed if OSPF is enabled. Scenario 6 shows an OSPF example.) • To enable multiple CTC sessions among ONS 15310-CL or ONS 15310-MA nodes residing on the same subnet. In Figure 10-6, one CTC residing on subnet 192.168.1.0 connects to a router through interface A. (The router is not set up with OSPF.) ONS 15310-CL or ONS 15310-MA nodes residing on different subnets are connected through Node 1 to the router through interface B. Because Nodes 2 and 3 are on different subnets, proxy ARP does not enable Node 1 as a gateway. To connect to CTC computers on LAN A, a static route is created on Node 1. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.10 Host Routes = N/A ONS 15310 #2 IP Address 192.168.2.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #3 IP Address 192.168.3.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN A SONET RING 12469410-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.5 Scenario 5: Using Static Routes to Connect to LANs Figure 10-6 Scenario 5: Static Route with One CTC Computer Used as a Destination The destination and subnet mask entries control access to the ONS 15310-CL or ONS 15310-MA nodes: • If a single CTC computer is connected to a router, enter the complete CTC “host route” IP address as the destination with a subnet mask of 255.255.255.255. • If CTC computers on a subnet are connected to a router, enter the destination subnet (in this example, 192.168.1.0) and a subnet mask of 255.255.255.0. • If all CTC computers are connected to a router, enter a destination of 0.0.0.0 and a subnet mask of 0.0.0.0. Figure 10-7 shows an example. The IP address of router interface B is entered as the next hop, and the cost (number of hops from source to destination) is 2. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router IP Address of interface “A” to LAN A 192.168.1.1 IP Address of interface “B” to LAN B 192.168.2.1 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = Destination 192.168.3.20 Gateway 192.168.2.10 Destination 192.168.4.30 Gateway 192.168.2.10 ONS 15310 #2 IP Address 192.168.3.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes = Destination 192.168.1.100 Mask 255.255.255.255 Next Hop 192.168.2.1 Cost = 2 ONS 15310 #3 IP Address 192.168.4.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN B LAN A Int "A" Int "B" SONET RING 12469510-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.6 Scenario 6: Using OSPF Figure 10-7 Scenario 5: Static Route with Multiple LAN Destinations 10.2.6 Scenario 6: Using OSPF Open Shortest Path First (OSPF) is a link-state Internet routing protocol. Link-state protocols use a “hello protocol” to monitor their links with adjacent routers and to test the status of their links to their neighbors. Link-state protocols advertise their directly connected networks and their active links. Each link state router captures the link state “advertisements” and puts them together to create a topology of the entire network or area. From this database, the router calculates a routing table by constructing a shortest path tree. Routes are recalculated when topology changes occur. The ONS 15310-CL or ONS 15310-MA uses OSPF protocol in internal ONS 15310-CL or ONS 15310-MA networks for node discovery, circuit routing, and node management. You can enable OSPF on the ONS 15310-CL or ONS 15310-MA so that the ONS 15310-CL or ONS 15310-MA topology is CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router #1 IP Address of interface ”A” to LAN “A” 192.168.1.1 IP Address of interface “B” to LAN “B” 192.168.2.1 Subnet Mask 255.255.255.0 ONS 15310 #2 IP Address 192.168.2.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 ONS 15310 #3 IP Address 192.168.2.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN B LAN A Int "A" Int "B" SONET RING Static Routes Destination 0.0.0.0 Mask 0.0.0.0 Next Hop 192.168.2.1 Cost = 2 LAN C LAN D Router #3 Router #2 12489910-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.6 Scenario 6: Using OSPF sent to OSPF routers on a LAN. Advertising the ONS 15310-CL or ONS 15310-MA network topology to LAN routers eliminates the need to enter static routes for ONS 15310-CL or ONS 15310-MA subnetworks manually. OSPF divides networks into smaller regions, called areas. An area is a collection of networked end systems, routers, and transmission facilities organized by traffic patterns. Each OSPF area has a unique ID number, known as the area ID. Every OSPF network has one backbone area called “area 0.” All other OSPF areas must connect to area 0. When you enable an ONS 15310-CL or ONS 15310-MA OSPF topology for advertising to an OSPF network, you must assign an OSPF area ID in decimal format to the network. Coordinate the area ID number assignment with your LAN administrator. All DCC-connected ONS 15310-CL or ONS 15310-MA nodes should be assigned the same OSPF area ID. Figure 10-8 shows a network enabled for OSPF. Figure 10-8 Scenario 6: OSPF Enabled Figure 10-9 shows the same network without OSPF. Static routes must be manually added to the router for CTC computers on LAN A to communicate with Nodes 2 and 3 because these nodes reside on different subnets. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router IP Address of interface “A” to LAN A 192.168.1.1 IP Address of interface “B” to LAN B 192.168.2.1 Subnet Mask 255.255.255.0 ONS 15310 #2 IP Address 192.168.3.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes = N/A ONS 15310 #3 IP Address 192.168.4.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN B LAN A Int "A" Int "B" SONET RING 12469610-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server Figure 10-9 Scenario 6: OSPF Not Enabled 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server The ONS 15310-CL or ONS 15310-MA proxy server is a set of functions that allows you to network ONS 15310-CL or ONS 15310-MA nodes in environments where visibility and accessibility between nodes and CTC computers must be restricted. For example, you can set up a network so that field technicians and network operating center (NOC) personnel can both access the same nodes while preventing the field technicians from accessing the NOC LAN. To do this, one ONS 15310-CL or ONS 15310-MA node is provisioned as a gateway network element (GNE) and the other nodes are provisioned as end network elements (ENEs). The GNE tunnels connections between CTC computers and ENEs, which provides management capability while preventing access for non-ONS 15310-CL or ONS 15310-MA management purposes. CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router IP Address of interface “A” to LAN A 192.168.1.1 IP Address of interface “B” to LAN B 192.168.2.1 Subnet Mask 255.255.255.0 Static Routes = Destination 192.168.3.20 Next Hop 192.168.2.10 Destination 192.168.4.30 Next Hop 192.168.2.10 ONS 15310 #2 IP Address 192.168.3.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A ONS 15310 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.2.1 Static Routes Destination = 192.168.1.100 Mask = 255.255.255.255 Next Hop = 192.168.2.1 Cost = 2 ONS 15310 #3 IP Address 192.168.4.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A LAN B LAN A Int "A" Int "B" SONET RING 12480010-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server The ONS 15310-CL or ONS 15310-MA proxy server performs the following tasks: • Isolates DCC IP traffic from Ethernet (CRAFT port) traffic and accepts packets based on filtering rules. The filtering rules depend on whether the packet arrives at the DCC or CRAFT port Ethernet interface. Table 10-3 on page 10-15 and Table 10-4 on page 10-16 provide the filtering rules. • Processes SNTP (Simple Network Timing Protocol) and NTP (Network Timing Protocol) requests. Element ONS 15310-CL or ONS 15310-MA NEs can derive time-of-day from an SNTP/NTP LAN server through the GNE. • Process SNMPv1 traps. The GNE receives SNMPv1 traps from the ENE and forwards them to all provisioned SNMPv1 trap destinations. The ONS 15310-CL or ONS 15310-MA proxy server is provisioned using the Enable proxy server on port check box on the Provisioning > Network > General tab. If checked, the ONS 15310-CL or ONS 15310-MA serves as a proxy for connections between CTC clients and ONS 15310-CL or ONS 15310-MA nodes that are DCC-connected to the proxy ONS 15310-CL or ONS 15310-MA. The CTC client establishes connections to DCC-connected nodes through the proxy node. The CTC client can connect to nodes that it cannot directly reach from the host on which it runs. If the Enable proxy server on port check box is not checked, the node does not proxy for any CTC clients, although any established proxy connections continue until the CTC client exits. In addition, you can set the proxy server as an ENE or a GNE: Note If you launch CTC against a node through a NAT (Network Address Translation) or PAT (Port Address Translation) router and that node does not have proxy enabled, your CTC session starts and initially appears to be fine. However CTC never receives alarm updates and disconnects and reconnects every two minutes. If the proxy is accidentally disabled, it is still possible to enable the proxy during a reconnect cycle and recover your ability to manage the node, even through a NAT/PAT firewall. • External Network Element (ENE)—If set as an ENE, the ONS 15310-CL or ONS 15310-MA neither installs nor advertises default or static routes. CTC computers can communicate with the node using the craft port, but they cannot communicate directly with any other DCC-connected node. In addition, firewall is enabled, which means that the node prevents IP traffic from being routed between the DCC and the LAN port. The ONS 15310-CL or ONS 15310-MA can communicate with machines connected to the LAN port or connected through the DCC. However, the DCC-connected machines cannot communicate with the LAN-connected machines, and the LAN-connected machines cannot communicate with the DCC-connected machines. A CTC client using the LAN to connect to the firewall-enabled node can use the proxy capability to manage the DCC-connected nodes that would otherwise be unreachable. A CTC client connected to a DCC-connected node can only manage other DCC-connected nodes and the firewall itself. • Gateway Network Element (GNE)—If set as a GNE, the CTC computer is visible to other DCC-connected nodes and firewall is enabled. • Proxy-only—If Proxy-only is selected, CTC cannot communicate with any other DCC-connected ONS 15310-CL or ONS 15310-MA nodes and firewall is not enabled. Figure 10-10 shows an ONS 15310-CL or ONS 15310-MA proxy server implementation. A GNE is connected to a central office LAN and to ENEs. The central office LAN is connected to a NOC LAN, which has CTC computers. The NOC CTC computer and craft technicians must both be able to access the ENEs. However, the craft technicians must be prevented from accessing or seeing the NOC or central office LANs.10-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server In the example, the GNE is assigned an IP address within the central office LAN and is physically connected to the LAN through its LAN port. ENEs are assigned IP addresses that are outside the central office LAN and given private network IP addresses. If the ENEs are collocated, the LAN ports could be connected to a hub. However, the hub should have no other network connections. Figure 10-10 ONS 15310-CL or ONS 15310-MA Proxy Server with GNE and ENEs on the Same Subnet Table 10-2 shows recommended settings for ONS 15310-CL or ONS 15310-MA GNEs and ENEs in the configuration shown in Figure 10-10. Figure 10-11 shows the same proxy server implementation with ONS 15310-CL or ONS 15310-MA ENEs on different subnets. In this example, GNEs and ENEs are provisioned with the settings shown in Table 10-2. NOC CTC station Local CTC station IP 10.10.10.10 NOC LAN 97.1.1.x Interface 0/0 97.1.1.1 Interface 0/1 86.1.1.1 Interface 0/1 192.168.20.1 ONS 15310 GNE IP 192.168.20.20 Default gateway 192.168.20.1 Interface 0/0 86.1.1.3 ONS 15310 ENE ONS 15310 ENE ONS 15310 ENE IP 192.168.20.0/24 Central Office LAN 86.x.x.x 124697 Table 10-2 ONS 15310-CL or ONS 15310-MA GNE and ENE Settings Setting ONS 15310-CL and ONS 15310-MA GNE ONS 15310-CL and ONS 15310-MA ENE OSPF Off Off SNTP Server (if used) SNTP server IP address Set to node GNE IP address SNMP (if used) SNMPv1 trap destinations Set SNMPv1 trap destinations to node GNE10-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server Figure 10-11 Scenario 7: Proxy Server with GNE and ENEs on Different Subnets Figure 10-12 shows the implementation with ONS 15310-CL or ONS 15310-MA ENEs in multiple rings. In this example, GNEs and ENEs are provisioned with the settings shown in Table 10-2. NOC CTC station Local CTC station IP 10.10.10.10 NOC LAN 97.1.1.x Interface 0/0 97.1.1.1 Interface 0/1 86.1.1.1 ONS 15310 GNE IP 86.10.10.100 Default gateway 86.1.1.1 ONS 15310 ENE ONS 15310 ENE ONS 15310 ENE IP 192.168.0.0/24 Central Office LAN 86.x.x.x 12469810-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.2.7 Scenario 7: Provisioning the ONS 15310-CL or ONS 15310-MA Proxy Server Figure 10-12 Scenario 7: Proxy Server with ENEs on Multiple Rings Table 10-3 shows the rules the ONS 15310-CL or ONS 15310-MA follows to filter packets when Enable Firewall is enabled. Table 10-4 shows additional rules that apply if the packet addressed to the ONS 15310-CL or ONS 15310-MA is discarded. Rejected packets are silently discarded. NOC CTC station NOC LAN 97.1.1.x Interface 0/0 97.1.1.1 Interface 0/1 86.1.1.1 Switch ONS 15310 GNE ONS 15310 ENE ONS 15310 ENE IP 192.168.0.0/24 Central Office LAN 86.x.x.x ONS 15310 GNE ONS 15310 ENE Local CTC station IP 10.10.10.10 ONS 15310 ENE ONS 15310 ENE IP 192.0.0.0/24 ONS 15310 ENE 124699 Table 10-3 Proxy Server Firewall Filtering Rules Packets arriving at: Are accepted if the IP destination address is: 15310-CL-CTX or CTX2500 Ethernet interface • The ONS 15310-CL or ONS 15310-MA shelf itself • The ONS 15310-CL or ONS 15310-MA’s subnet broadcast address • Within the 224.0.0.0/8 network (reserved network used for standard multicast messages) • Subnet mask = 255.255.255.255 DCC interface • The ONS 15310-CL or ONS 15310-MA itself • Any destination that is connected through another DCC interface • Within the 224.0.0.0/8 network10-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.3 Provisionable Patchcords If you implement the proxy server, keep the following rules in mind: 1. All DCC-connected ONS 15310-CL or ONS 15310-MA nodes on the same Ethernet segment must have the same Craft Access Only setting. Mixed values produce unpredictable results, and might leave some nodes unreachable through the shared Ethernet segment. 2. All DCC-connected ONS 15310-CL or ONS 15310-MA nodes on the same Ethernet segment must have the same Enable Firewall setting. Mixed values produce unpredictable results. Some nodes might become unreachable. 3. If you check Enable Firewall, always check Enable Proxy. If Enable Proxy is unchecked, CTC is not able to see nodes on the DCC side of the ONS 15310-CL or ONS 15310-MA. 4. If Craft Access Only is checked, check Enable Proxy. If Enable Proxy is not checked, CTC is not able to see nodes on the DCC side of the ONS 15310-CL or ONS 15310-MA. If nodes become unreachable in cases 1, 2, and 3, you can correct the setting with one of the following actions: • Disconnect the craft computer from the unreachable ONS 15310-CL or ONS 15310-MA. Connect to the ONS 15310-CL or ONS 15310-MA through another ONS 15310-CL or ONS 15310-MA in the network that has a DCC connection to the unreachable node. • Disconnect the Ethernet cable from the unreachable ONS 15310-CL or ONS 15310-MA. Connect a CTC computer directly to the ONS 15310-CL or ONS 15310-MA. 10.3 Provisionable Patchcords A provisionable patchcord is a user-provisioned link that is advertised by OSPF throughout the network. Provisionable patchcords, also called virtual links, are needed if an ONS 15310-CL or ONS 15310-MA optical port is connected to an ONS 15454 transponder or muxponder client port provisioned in transparent mode. Provisionable patchcords are required on both ends of a physical link. The provisioning at each end includes a local patchcord ID, slot/port information, remote IP address, and remote patchcord ID. Patchcords appear as dashed lines in CTC network view. Table 10-4 Proxy Server Firewall Filtering Rules When the Packet is Addressed to the ONS 15310-CL or ONS 15310-MA Packets Arrive At Accepts Rejects 15310-CL-CTX or CTX2500 LAN port • All User Datagram Protocol (UDP) packets except those in the Rejected column • UDP packets addressed to the SNMP trap relay port (391) DCC interface • All UDP packets • All TCP packets except those packets addressed to the Telnet and SOCKS proxy server ports • OSPF packets • Internet Control Message Protocol (ICMP) packets • TCP packets addressed to the Telnet port • TCP packets addressed to the proxy server port • All packets other than UDP, TCP, OSPF, ICMP10-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.4 Routing Table Table 10-5 lists the supported combinations for ONS 15310-CL or ONS 15310-MA optical ports and the ONS 15454 transponder/muxponder cards used in a provisionable patchcord. For more information about the ONS 15454 transponder and muxponder cards, refer to the Cisco ONS 15454 DWDM Reference Manual. Optical ports have the following requirements when used in a provisionable patchcord: • An optical port connected to an ONS 15454 transponder/muxponder port requires a section data communications channel (SDCC)/line data communications channel (LDCC) termination. • If the optical port is the protection port in a 1+1 group, the working port must have an SDCC/LDCC termination provisioned. • If a remote end (ONS 15454) of a provisionable patchcord is Y-cable protected, an optical port requires two patchcords. 10.4 Routing Table ONS 15310-CL or ONS 15310-MA routing information appears on the Maintenance > Routing Table tabs. The routing table provides the following information: • Destination—Displays the IP address of the destination network or host. • Mask—Displays the subnet mask used to reach the destination host or network. • Gateway—Displays the IP address of the gateway used to reach the destination network or host. • Usage—Shows the number of times the listed route has been used. • Interface—Shows the ONS 15310-CL or ONS 15310-MA interface used to access the destination. – cpm0—The ONS 15310-CL or ONS 15310-MA Ethernet interface (RJ45 LAN jack) – pdcc0—An SDCC interface, that is, an OC-N trunk port identified as the SDCC termination – lo0—A loopback interface Table 10-6 shows sample routing entries for an ONS 15310-CL or ONS 15310-MA. Table 10-5 Client and Trunk Card Combinations in Provisionable Patchcords ONS 15310-CL and ONS 15310-MA Trunk Ports ONS 15454 Client Cards MXP_2.5G_10G/ TXP_MR_10G TXP(P)_MR_2.5G MXP_2.5G_10E/ TXP_MR_10E OC-3 optical port — Yes — OC-12 optical port — Yes — Table 10-6 Sample Routing Table Entries Entry Destination Mask Gateway Interface 1 0.0.0.0 0.0.0.0 172.20.214.1 cpm0 2 172.20.214.0 255.255.255.0 172.20.214.92 cpm0 3 172.20.214.92 255.255.255.255 127.0.0.1 lo0 4 172.20.214.93 255.255.255.255 0.0.0.0 pdcc0 5 172.20.214.94 255.255.255.255 172.20.214.93 pdcc010-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.5 External Firewalls Entry 1 shows the following: • Destination (0.0.0.0) is the default route entry. All undefined destination network or host entries on this routing table is mapped to the default route entry. • Mask (0.0.0.0) is always 0 for the default route. • Gateway (172.20.214.1) is the default gateway address. All outbound traffic that cannot be found in this routing table or is not on the node’s local subnet is sent to this gateway. • Interface (cpm0) indicates that the ONS 15310-CL or ONS 15310-MA Ethernet interface is used to reach the gateway. Entry 2 shows the following: • Destination (172.20.214.0) is the destination network IP address. • Mask (255.255.255.0) is a 24-bit mask, meaning all addresses within the 172.20.214.0 subnet can be a destination. • Gateway (172.20.214.92) is the gateway address. All outbound traffic belonging to this network is sent to this gateway. • Interface (cpm0) indicates that the ONS 15310-CL or ONS 15310-MA Ethernet interface is used to reach the gateway. Entry 3 shows the following: • Destination (172.20.214.92) is the destination host IP address. • Mask (255.255.255.255) is a 32-bit mask, meaning only the 172.20.214.92 address is a destination. • Gateway (127.0.0.1) is a loopback address. The host directs network traffic to itself using this address. • Interface (lo0) indicates that the local loopback interface is used to reach the gateway. Entry 4 shows the following: • Destination (172.20.214.93) is the destination host IP address. • Mask (255.255.255.255) is a 32-bit mask, meaning only the 172.20.214.93 address is a destination. • Gateway (0.0.0.0) means the destination host is directly attached to the node. • Interface (pdcc0) indicates that a SONET SDCC interface is used to reach the destination host. Entry 5 shows a DCC-connected node that is accessible through a node that is not directly connected: • Destination (172.20.214.94) is the destination host IP address. • Mask (255.255.255.255) is a 32-bit mask, meaning only the 172.20.214.94 address is a destination. • Gateway (172.20.214.93) indicates that the destination host is accessed through a node with IP address 172.20.214.93. • Interface (pdcc0) indicates that a SONET SDCC interface is used to reach the gateway. 10.5 External Firewalls Table 10-7 shows the ports that are used by the 15310-CL-CTX or CTX2500 cards. 10-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.5 External Firewalls The following access control list (ACL) examples show a firewall configuration when the proxy server gateway setting is not enabled. In the example, the CTC workstation address is 192.168.10.10 and the ONS 15310-CL or ONS 15310-MA address is 10.10.10.100. The firewall is attached to the GNE, so the inbound path is CTC to the GNE and the outbound path is from the GNE to CTC. The CTC CORBA Standard constant is 683 and the TCC CORBA Default is TCC Fixed (57790). access-list 100 remark *** Inbound ACL, CTC -> NE *** access-list 100 remark access-list 100 permit tcp host 192.168.10.10 host 10.10.10.100 eq www access-list 100 remark *** allows initial contact with the 15310-CL/15310-MA using http (port 80) *** access-list 100 remark Table 10-7 Ports Used by the 15310-CL-CTX or CTX2500 Port Function Action1 1. D = deny, NA = not applicable, OK = do not deny 0 Never used D 20 FTP D 21 FTP control D 22 SSH (Secure Shell) D 23 Telnet D 80 HTTP D 111 SUNRPC (Sun Remote Procedure Call) NA 161 SNMP traps destinations D 162 SNMP traps destinations D 513 rlogin NA 683 CORBA IIOP OK 1080 Proxy server (socks) D 2001-2017 I/O card Telnet D 2018 DCC processor on active 15310-CL or 15310-MA-CTX D 2361 TL1 D 3082 Raw TL1 D 3083 TL1 D 5001 Bidirectional line switch ring (BLSR) server port D 5002 BLSR client port D 7200 SNMP alarm input port D 9100 EQM port D 9401 TCC boot port D 9999 Flash manager D 10240-12287 Proxy client D 57790 Default TCC listener port OK10-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.6 Open GNE access-list 100 permit tcp host 192.168.10.10 host 10.10.10.100 eq 57790 access-list 100 remark *** allows CTC communication with the 15310-CL/15310-MA GNE (port 57790) *** access-list 100 remark access-list 101 remark access-list 101 permit tcp host 10.10.10.100 host 192.168.10.10 eq 683 access-list 101 remark *** allows alarms etc., from the 15310-CL/15310-MA (random port) to the CTC workstation (port 683) *** access-list 100 remark access-list 101 permit tcp host 10.10.10.100 host 192.168.10.10 established access-list 101 remark *** allows ACKs from the 15310-CL/15310-MA GNE to CTC *** The following ACL examples show a firewall configuration when the proxy server gateway setting is enabled. As with the first example, the CTC workstation address is 192.168.10.10 and the ONS 15310-CL or ONS 15310-MA address is 10.10.10.100. The firewall is attached to the GNE, so the inbound path is CTC to the GNE and the outbound path is from the GNE to CTC. The CTC CORBA Standard constant is 683 and the TCC CORBA Default is TCC Fixed (57790). access-list 100 remark *** Inbound ACL, CTC -> NE *** access-list 100 remark access-list 100 permit tcp host 192.168.10.10 host 10.10.10.100 eq www access-list 100 remark *** allows initial contact with the 15310-CL/15310-MA using http (port 80) *** access-list 100 remark access-list 100 permit tcp host 192.168.10.10 host 10.10.10.100 eq 1080 access-list 100 remark *** allows CTC communication with the 15310-CL/15310-MA GNE proxy server (port 1080) *** access-list 100 remark access-list 100 permit tcp host 192.168.10.10 host 10.10.10.100 established access-list 100 remark *** allows ACKs from CTC to the 15310-CL/15310-MA GNE *** access-list 101 remark *** Outbound ACL, NE -> CTC *** access-list 101 remark access-list 101 permit tcp host 10.10.10.100 eq 1080 host 192.168.10.10 access-list 101 remark *** allows alarms and other communications from the 15310-CL/15310-MA (proxy server) to the CTC workstation (port 683) *** access-list 100 remark access-list 101 permit tcp host 10.10.10.100 host 192.168.10.10 established access-list 101 remark *** allows ACKs from the 15310-CL/15310-MA GNE to CTC *** 10.6 Open GNE The ONS 15310-CL or ONS 15310-MA can communicate with non-ONS nodes that do not support point-to-point protocol (PPP) vendor extensions or OSPF type 10 opaque link-state advertisements (LSA), both of which are necessary for automatic node and link discovery. An open GNE configuration allows the DCC-based network to function as an IP network for non-ONS nodes. To configure an open GNE network, you can provision SDCC and LDCC terminations to include a far-end, non-ONS node using either the default IP address of 0.0.0.0 or a specified IP address. You provision a far-end, non-ONS node by checking the “Far End is Foreign” check box during SDCC and LDCC creation. The default 0.0.0.0 IP address allows the far-end, non-ONS node to provide the IP address; if you set an IP address other than 0.0.0.0, a link is established only if the far-end node identifies itself with that IP address, providing an extra level of security. By default, the proxy server only allows connections to discovered ONS peers and the firewall blocks all IP traffic between the DCC network and LAN. You can, however, provision proxy tunnels to allow up to 12 additional destinations for SOCKS version 5 connections to non-ONS nodes. You can also provision firewall tunnels to allow up to 12 additional destinations for direct IP connectivity between the 10-21 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.6 Open GNE DCC network and LAN. Proxy and firewall tunnels include both a source and destination subnet. The connection must originate within the source subnet and terminate within the destination subnet before either the SOCKS connection or IP packet flow is allowed. To set up proxy and firewall subnets in CTC, use the Provisioning > Network > Proxy and Firewalls subtabs. The availability of proxy and/or firewall tunnels depends on the network access settings of the node: • If the node is configured with the proxy server enabled in GNE or ENE mode, you must set up a proxy tunnel and/or a firewall tunnel. • If the node is configured with the proxy server enabled in proxy-only mode, you can set up proxy tunnels. Firewall tunnels are not allowed. • If the node is configured with the proxy server disabled, neither proxy tunnels or firewall tunnels are allowed. Figure 10-13 shows an example of a foreign node connected to the DCC network. Proxy and firewall tunnels are useful in this example because the GNE would otherwise block IP access between the PC and the foreign node. Figure 10-13 Proxy and Firewall Tunnels for Foreign Terminations Remote CTC 10.10.20.10 10.10.20.0/24 10.10.10.0/24 Interface 0/0 10.10.20.1 Router A Interface 0/1 10.10.10.1 ONS 15310 Gateway NE 10.10.10.100/24 ONS 15310 External NE 10.10.10.250/24 Non-ONS node Foreign NE 130.94.122.199/28 ONS 15310 External NE 10.10.10.150/24 ONS 15310 External NE 10.10.10.200/24 124689 Local/Craft CTC 192.168.20.20 Ethernet SONET10-22 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7 TCP/IP and OSI Networking Figure 10-14 shows a remote node connected to an ENE Ethernet port. Proxy and firewall tunnels are useful in this example because the GNE would otherwise block IP access between the PC and foreign node. This configuration also requires a firewall tunnel on the ENE. Figure 10-14 Foreign Node Connection to an ENE Ethernet Port 10.7 TCP/IP and OSI Networking ONS 15310-CL and ONS 15310-MA DCN communication is based on the TCP/IP protocol suite. However, ONS 15310-CL and ONS 15310-MA nodes can also be networked with equipment that uses the OSI protocol suite. While TCP/IP and OSI protocols are not directly compatible, they do have the same objectives and occupy similar layers of the OSI reference model. Table 10-8 shows the protocols that are involved when TCP/IP-based NEs are networked with OSI-based NEs. Remote CTC 10.10.20.10 10.10.20.0/24 10.10.10.0/24 Interface 0/0 10.10.20.1 Router A Interface 0/1 10.10.10.1 ONS 15310 Gateway NE 10.10.10.100/24 ONS 15310 External NE 10.10.10.250/24 ONS 15310 External NE 10.10.10.150/24 ONS 15310 External NE 10.10.10.200/24 124690 Local/Craft CTC 192.168.20.20 Ethernet SONET Non-ONS node Foreign NE 130.94.122.199/2810-23 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.1 Point-to-Point Protocol 10.7.1 Point-to-Point Protocol Point-to-Point protocol (PPP) is a data link (Layer 2) encapsulation protocol that transports datagrams over point-to-point links. Although PPP was developed to transport IP traffic, it can carry other protocols including the OSI Connectionless Network Protocol (CLNP). PPP components used in the transport of OSI include: • High-level data link control (HDLC)—Performs the datagram encapsulation for transport across point-to-point links. • Link control protocol (LCP)—Establishes, configures, and tests point-to-point connections. CTC automatically enables IP over PPP whenever you create an SDCC or LDCC. The SDCC or LDCC can be provisioned to support OSI over PPP. Table 10-8 TCP/IP and OSI Protocols OSI Model IP Protocols OSI Protocols IP-OSI Tunnels Layer 7 Application • TL1 • FTP • HTTP • Telnet • IIOP • TARP1 1. TARP = TID Address Resolution Protocol • TL1 (over OSI) • FTAM2 • ACSE3 2. FTAM = File Transfer and Access Management 3. ACSE = association-control service element Layer 6 Presentation • PST4 4. PST = Presentation layer Layer 5 Session • Session Layer 4 Transport • TCP • UDP • TP (Transport) Class 4 • IP-over-CLNS5 tunnels 5. CLNS = Connectionless Network Layer Service Layer 3 Network • IP • OSPF • CLNP6 • ES-IS7 • IS-IS8 6. CLNP = Connectionless Network Layer Protocol 7. ES-IS = End System-to-Intermediate System 8. IS-IS = Intermediate System-to-Intermediate System Layer 2 Data link • PPP • PPP • LAP-D9 9. LAP-D = Link Access Protocol on the D Channel Layer 1 Physical DCC, LAN, fiber, electrical DCC, LAN, fiber, electrical10-24 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.2 Link Access Protocol on the D Channel 10.7.2 Link Access Protocol on the D Channel LAP-D is a data link protocol used in the OSI protocol stack. LAP-D is assigned when you provision an ONS 15310-CL or ONS 15310-MA SDCC as OSI-only. Provisionable LAP-D parameters include: • Transfer Service—One of the following transfer services must be assigned: – Acknowledged Information Transfer Service (AITS)—(Default) Does not exchange data until a logical connection between two LAP-D users is established. This service provides reliable data transfer, flow control, and error control mechanisms. – Unacknowledged Information Transfer Service (UITS)—Transfers frames containing user data with no acknowledgement. The service does not guarantee that the data presented by one user will be delivered to another user, nor does it inform the user if the delivery attempt fails. It does not provide any flow control or error control mechanisms. • Mode—LAP-D is set to either Network or User mode. This parameter sets the LAP-D frame command/response (C/R) value, which indicates whether the frame is a command or a response. • Maximum transmission unit (MTU)—The LAP-D N201 parameter sets the maximum number of octets in a LAP-D information frame. The range is 512 to 1500 octets. Note The MTU must be the same size for all NEs on the network. • Transmission Timers—The following LAP-D timers can be provisioned: – The T200 timer sets the timeout period for initiating retries or declaring failures. – The T203 timer provisions the maximum time between frame exchanges, that is, the trigger for transmission of the LAP-D “keep-alive” Receive Ready (RR) frames. Fixed values are assigned to the following LAP-D parameters: • Terminal Endpoint Identifier (TEI)—A fixed value of 0 is assigned. • Service Access Point Identifier (SAPI)—A fixed value of 62 is assigned. • N200 supervisory frame retransmissions—A fixed value of 3 is assigned. 10.7.3 OSI Connectionless Network Service OSI connectionless network service is implemented by using the Connectionless Network Protocol (CLNP) and Connectionless Network Service (CLNS). CLNP and CLNS are described in the ISO 8473 standard. CLNS provides network layer services to the transport layer through CLNP. CLNS does not perform connection setup or termination because paths are determined independently for each packet that is transmitted through a network. CLNS relies on transport layer protocols to perform error detection and correction. CLNP is an OSI network layer protocol that carries upper-layer data and error indications over connectionless links. CLNP provides the interface between the CLNS and upper layers. CLNP performs many of the same services for the transport layer as IP. The CLNP datagram is very similar to the IP datagram. It provides mechanisms for fragmentation (data unit identification, fragment/total length, and offset). Like IP, a checksum computed on the CLNP header verifies that the information used to process the CLNP datagram is transmitted correctly, and a lifetime control mechanism (Time to Live) limits the amount of time a datagram is allowed to remain in the system.10-25 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.3 OSI Connectionless Network Service CLNP uses network service access points (NSAPs) to identify network devices. The CLNP source and destination addresses are NSAPs. In addition, CLNP uses a network element title (NET) to identify a network-entity in an end system (ES) or intermediate system (IS). NETs are allocated from the same name space as NSAP addresses. Whether an address is an NSAP address or a NET depends on the network selector value in the NSAP. The ONS 15310-CL and ONS 15310-MA support the ISO Data Country Code (ISO-DCC) NSAP address format as specified in ISO 8348. The NSAP address is divided into an initial domain part (IDP) and a domain-specific part (DSP). NSAP fields are shown in Table 10-9. NSAP field values are in hexadecimal format. All NSAPs are editable and shorter NSAPs can be used; however, NSAPs for all NEs residing within the same OSI network area usually have the same NSAP format. Table 10-9 NSAP Fields Field Definition Description IDP AFI Authority and format identifier Specifies the NSAP address format. The initial value is 39 for the ISO-DCC address format. IDI Initial domain identifier Specifies the country code. The initial value is 840F, the United States country code padded with an F. DSP DFI DSP format identifier Specifies the DSP format. The initial value is 80, indicating the DSP format follows American National Standards Institute (ANSI) standards. ORG Organization Organization identifier. The initial value is 000000. Reserved Reserved Reserved NSAP field. The Reserved field is normally all zeros (0000). RD Routing domain Defines the routing domain. The initial value is 0000. AREA Area Identifies the OSI routing area to which the node belongs. The initial value is 0000.10-26 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.3 OSI Connectionless Network Service Figure 10-15 shows the default ISO-DCC NSAP address delivered with the ONS 15310-CL/ONS 15310-MA. The System ID is automatically populated with the node’s MAC address. Figure 10-15 ISO-DCC NSAP Address System System identifier The ONS 15310-CL system identifier is set to its IEEE 802.3 MAC address. Each ONS 15310-CL supports one OSI virtual router. SEL Selector The selector field directs the protocol data units (PDUs) to the correct destination using the CLNP network layer service. Selector values supported by the ONS 15310-CL include: • 00—Network Entity Title (NET). Used to exchange PDUs in the ES-IS and IS-IS routing exchange protocols. (See the “10.7.4.1 End System-to-Intermediate System Protocol” section on page 10-28, and the “10.7.4.2 Intermediate System-to-Intermediate System Protocol” section on page 10-28.) • 1D—Selector for Transport Class 4 (and for FTAM and TL1 applications (Telcordia GR-253-CORE standard) • AF—Selector for the TARP protocol (Telcordia GR-253-CORE standard) • 2F—Selector for the GRE IP-over-CLNS tunnel (ITU/RFC standard) • CC—Selector for the Cisco IP-over-CLNS tunnels (Cisco specific) • E0—Selector for the OSI ping application (Cisco specific) NSELs are only advertised when the node is configured as an ES. They are not advertised when a node is configured as an IS. Tunnel NSELs are not advertised until a tunnel is created. Table 10-9 NSAP Fields (continued) Field Definition Description 39.840F.80.000000.0000.0000.0000.xxxxxxxxxxxx.00 131598 AFI IDI ORG Reserved RD Area System ID Authority and Format Identifier SEL NSAP Selector DFI DSP Format Identifier Routing Domain Initial Domain Identifier10-27 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.4 OSI Routing The ONS 15310-CL/ONS 15310-MA main NSAP address is shown on the node view Provisioning > OSI > Main Setup subtab. This address is also the Router 1 primary manual area address, which is viewed and edited on the Provisioning > OSI > Routers subtab. See the “10.7.6 OSI Virtual Routers” section on page 10-32 for information about the OSI router and manual area addresses in CTC. 10.7.4 OSI Routing OSI architecture includes ESs and ISs. The OSI routing scheme includes: • A set of routing protocols that allow ESs and ISs to collect and distribute the information necessary to determine routes. Protocols include the ES-IS and IS-IS protocols. ES-IS routing establishes connectivity among ESs and ISs attached to the same (single) subnetwork. • A routing information base (RIB) containing this information, from which routes between ESs can be computed. The RIB consists of a table of entries that identify a destination (for example, an NSAP), the subnetwork over which packets should be forwarded to reach that destination, and a routing metric. The routing metric communicates characteristics of the route (such as delay properties or expected error rate) that are used to evaluate the suitability of a route compared to another route with different properties, for transporting a particular packet or class of packets. • A routing algorithm, Shortest Path First (SPF), that uses information contained in the RIB to derive routes between ESs. In OSI networking, discovery is based on announcements. An ES uses the ES-IS protocol end system hello (ESH) message to announce its presence to ISs and ESs connected to the same network. Any ES or IS that is listening for ESHs gets a copy. ISs store the NSAP address and the corresponding subnetwork address pair in routing tables. ESs might store the address, or they might wait to be informed by ISs when they need such information. An IS composes intermediate system hello (ISH) messages to announce its configuration information to ISs and ESs that are connected to the same broadcast subnetwork. Like the ESHs, the ISH contains the addressing information for the IS (the NET and the subnetwork point-of-attachment address [SNPA]) and a holding time. ISHs might also communicate a suggested ES configuration time recommending a configuration timer to ESs. The exchange of ISHs is called neighbor greeting or initialization. Each router learns about the other routers with which they share direct connectivity. After the initialization, each router constructs a link-state packet (LSP). The LSP contains a list of the names of the IS’s neighbors and the cost to reach each of the neighbors. Routers then distribute the LSPs to all of the other routers. When all LSPs are propagated to all routers, each router has a complete map of the network topology (in the form of LSPs). Routers use the LSPs and the SPF algorithm to compute routes to every destination in the network. OSI networks are divided into areas and domains. An area is a group of contiguous networks and attached hosts that is designated as an area by a network administrator. A domain is a collection of connected areas. Routing domains provides full connectivity to all ESs within the domains. Routing within the same area is known as Level 1 routing. Routing between two areas is known as Level 2 routing. LSPs that are exchanged within a Level 1 area are called L1 LSPs. LSPs that are exchanged across Level 2 areas are called L2 LSPs. Figure 10-16 shows an example of Level 1 and Level 2 routing. Note The ONS 15310-CL and ONS 15310-MA do not support Level 1/Level 2 routing. Level 1/Level 2 routing is supported by the ONS 15454, ONS 15454 SDH, and the ONS 15600.10-28 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.4 OSI Routing Figure 10-16 Level 1 and Level 2 OSI Routing When you provision an ONS 15310-CL or ONS 15310-MA for a network with NEs that use both the TCP/IP and OSI protocol stacks, you will provision it as one of the following: • End System—The ONS 15310-CL or ONS 15310-MA performs OSI ES functions and relies upon an IS for communication with nodes that reside within its OSI area. • Intermediate System Level 1—The ONS 15310-CL performs OSI IS functions. It communicates with IS and ES nodes that reside within its OSI area. It depends upon an IS L1/L2 node to communicate with IS and ES nodes that reside outside its OSI area. 10.7.4.1 End System-to-Intermediate System Protocol ES-IS is an OSI protocol that defines how ESs (hosts) and ISs (routers) learn about each other. ES-IS configuration information is transmitted at regular intervals through the ES and IS hello messages. The hello messages contain the subnetwork and network layer addresses of the systems that generate them. The ES-IS configuration protocol communicates both OSI network layer addresses and OSI subnetwork addresses. OSI network layer addresses identify either the NSAP, which is the interface between OSI Layer 3 and Layer 4, or the NET, which is the network layer entity in an OSI IS. OSI SNPAs are the points at which an ES or IS is physically attached to a subnetwork. The SNPA address uniquely identifies each system attached to the subnetwork. In an Ethernet network, for example, the SNPA is the 48-bit MAC address. Part of the configuration information transmitted by ES-IS is the NSAP-to-SNPA or NET-to-SNPA mapping. 10.7.4.2 Intermediate System-to-Intermediate System Protocol IS-IS is an OSI link-state hierarchical routing protocol that floods the network with link-state information to build a complete, consistent picture of a network topology. IS-IS distinguishes between Level 1 and Level 2 ISs. Level 1 ISs communicate with other Level 1 ISs in the same area. Level 2 ISs route between Level 1 areas and form an intradomain routing backbone. Level 1 ISs need to know only how to get to the nearest Level 2 IS. The backbone routing protocol can change without impacting the intra-area routing protocol. OSI routing begins when the ESs discover the nearest IS by listening to ISH packets. When an ES wants to send a packet to another ES, it sends the packet to one of the ISs on its directly attached network. The router then looks up the destination address and forwards the packet along the best route. If the destination ES is on the same subnetwork, the local IS knows this from listening to ESHs and forwards Level 2 routing Area 1 IS IS IS IS Area 2 Domain Level 1 routing Level 1 routing ES 131597 ES ES ES10-29 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.5 TARP the packet appropriately. The IS also might provide a redirect (RD) message back to the source to tell it that a more direct route is available. If the destination address is an ES on another subnetwork in the same area, the IS knows the correct route and forwards the packet appropriately. If the destination address is an ES in another area, the Level 1 IS sends the packet to the nearest Level 2 IS. Forwarding through Level 2 ISs continues until the packet reaches a Level 2 IS in the destination area. Within the destination area, the ISs forward the packet along the best path until the destination ES is reached. Link-state update messages help ISs learn about the network topology. Each IS generates an update specifying the ESs and ISs to which it is connected, as well as the associated metrics. The update is then sent to all neighboring ISs, which forward (flood) it to their neighbors, and so on. (Sequence numbers terminate the flood and distinguish old updates from new ones.) Using these updates, each IS can build a complete topology of the network. When the topology changes, new updates are sent. IS-IS uses a single required default metric with a maximum path value of 1024. The metric is arbitrary and typically is assigned by a network administrator. Any single link can have a maximum value of 64, and path links are calculated by summing link values. Maximum metric values were set at these levels to provide the granularity to support various link types while at the same time ensuring that the shortest-path algorithm used for route computation is reasonably efficient. Three optional IS-IS metrics (costs)—delay, expense, and error—are not supported by the ONS 15310-CL or ONS 15310-MA. IS-IS maintains a mapping of the metrics to the quality of service (QoS) option in the CLNP packet header. IS-IS uses the mappings to compute routes through the internetwork. 10.7.5 TARP TARP is used when TL1 target identifiers (TIDs) must be translated to NSAP addresses. The TID-to-NSAP translation occurs by mapping TIDs to the NETs, then deriving NSAPs from the NETs by using the NSAP selector values (see Table 10-9 on page 10-25). TARP uses a selective PDU propagation methodology in conjunction with a distributed database (that resides within the NEs) of TID-to-NET mappings. TARP allows NEs to translate between TID and NET by automatically exchanging mapping information with other NEs. The TARP PDU is carried by the standard CLNP Data PDU. TARP PDU fields are shown in Table 10-10. Table 10-10 TARP PDU Fields Field Abbreviation Size (bytes) Description TARP Lifetime tar-lif 2 The TARP time-to-live in hops. TARP Sequence Number tar-seq 2 The TARP sequence number used for loop detection. Protocol Address Type tar-pro 1 Used to identify the type of protocol address that the TID must be mapped to. The value FE is used to identify the CLNP address type. TARP Type Code tar-tcd 1 The TARP Type Code identifies the TARP type of PDU. Five TARP types, shown in Table 10-11, are defined. TID Target Length tar-tln 1 The number of octets that are in the tar-ttg field. TID Originator Length tar-oln 1 The number of octets that are in the tar-tor field. Protocol Address Length tar-pln 1 The number of octets that are in the tar-por field.10-30 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.5 TARP Table 10-11 shows the TARP PDU types that govern TARP interaction and routing. 10.7.5.1 TARP Processing A TARP data cache (TDC) is created at each NE to facilitate TARP processing. In CTC, the TDC is displayed and managed on the node view Maintenance > OSI > TDC subtab. The TDC subtab contains the following TARP PDU fields: • TID—TID of the originating NE (tar-tor). • NSAP—NSAP of the originating NE. • Type— Indicates whether the TARP PDU was created through the TARP propagation process (dynamic) or manually created (static). Provisionable timers, shown in Table 10-12, control TARP processing. TID of Target tar-ttg n = 0, 1, 2... TID value for the target NE. TID of Originator tar-tor n = 0, 1, 2... TID value of the TARP PDU originator. Protocol Address of Originator tar-por n = 0, 1, 2... Protocol address (for the protocol type identified in the tar-pro field) of the TARP PDU originator. When the tar-pro field is set to FE (hex), tar-por will contain a CLNP address (that is, the NET). Table 10-10 TARP PDU Fields (continued) Field Abbreviation Size (bytes) Description Table 10-11 TARP PDU Types Type Description Procedure 1 Sent when a device has a TID for which it has no matching NSAP. After an NE originates a TARP Type 1 PDU, the PDU is sent to all adjacencies within the NE’s routing area. 2 Sent when a device has a TID for which it has no matching NSAP and no response was received from the Type 1 PDU. After an NE originates a TARP Type 2 PDU, the PDU is sent to all Level 1 and Level 2 neighbors. 3 Sent as a response to Type 1, Type 2, or Type 5 PDUs. After a TARP Request (Type 1 or 2) PDU is received, a TARP Type 3 PDU is sent to the request originator. Type 3 PDUs do not use the TARP propagation procedures. 4 Sent as a notification when a change occurs locally, for example, a TID or NSAP change. It might also be sent when an NE initializes. A Type 4 PDU is a notification of a TID or Protocol Address change at the NE that originates the notification. The PDU is sent to all adjacencies inside and outside the NE’s routing area. 5 Sent when a device needs a TID that corresponds to a specific NSAP. When a Type 5 PDU is sent, the CLNP destination address is known, so the PDU is sent to only that address. Type 5 PDUs do not use the TARP propagation procedures.10-31 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.5 TARP Table 10-13 shows the main TARP processes and the general sequence of events that occurs in each process. 10.7.5.2 TARP Loop Detection Buffer The TARP loop detection buffer (LDB) can be enabled to prevent duplicate TARP PDUs from entering the TDC. When a TARP Type 1, 2, or 4 PDU arrives, TARP checks its LDB for the NET address of the PDU originator match. If no match is found, TARP processes the PDU and assigns a tar-por, tar-seq (sequence) entry for the PDU to the LDB. If the tar-seq is zero, a timer associated with the LDB entry is started using the provisionable LDB entry timer on the node view OSI > TARP > Config tab. If a match exists, the tar-seq is compared to the LDB entry. If the tar-seq is not zero and is less than or equal to the LDB entry, the PDU is discarded. If the tar-seq is greater than the LDB entry, the PDU is processed and the tar-seq field in the LDB entry is updated with the new value. The Cisco ONS 15310-CL and Cisco ONS 15310-MA LDB holds approximately 500 entries. The LDB is flushed periodically based on the time set in the LDB Flush timer on the node view OSI > TARP > Config tabs. Table 10-12 TARP Timers Timer Description Default (seconds) Range (seconds) T1 Waiting for response to TARP Type 1 Request PDU 15 0–3600 T2 Waiting for response to TARP Type 2 Request PDU 25 0–3600 T3 Waiting for response to address resolution request 40 0–3600 T4 Timer starts when T2 expires (used during error recovery) 20 0–3600 Table 10-13 TARP Processing Flow Process General TARP Flow Find a NET that matches a TID 1. TARP checks its TDC for a match. If a match is found, TARP returns the result to the requesting application. 2. If no match is found, a TARP Type 1 PDU is generated and Timer T1 is started. 3. If Timer T1 expires before a match if found, a Type 2 PDU is generated and Timer T2 is started. 4. If Timer T2 expires before a match is found, Timer T4 is started. 5. If Timer T4 expires before a match is found, a Type 2 PDU is generated and Timer T2 is started. Find a TID that matches a NET A Type 5 PDU is generated. Timer T3 is used. However, if the timer expires, no error recovery procedure occurs, and a status message is provided to indicate that the TID cannot be found. Send a notification of TID or protocol address change TARP generates a Type 4 PDU in which the tar-ttg field contains the NE’s TID value that existed prior to the change of TID or protocol address. Confirmation that other NEs successfully received the address change is not sent.10-32 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.6 OSI Virtual Routers 10.7.5.3 Manual TARP Adjacencies TARP adjacencies can be manually provisioned in networks where ONS 15310-CL or ONS 15310-MA nodes must communicate across routers or non-SONET NEs that lack TARP capability. In CTC, manual TARP adjacencies are provisioned on the node view Provisioning > OSI > TARP > MAT (Manual Area Table) subtab. The manual adjacency causes a TARP request to hop through the general router or non-SONET NE, as shown in Figure 10-17. Figure 10-17 Manual TARP Adjacencies 10.7.5.4 Manual TID to NSAP Provisioning TIDs can be manually linked to NSAPs and added to the TDC. Static TDC entries are similar to static routes. For a specific TID, you force a specific NSAP. Resolution requests for that TID always return that NSAP. No TARP network propagation or instantaneous replies are involved. Static entries allow you to forward TL1 commands to NEs that do not support TARP. However, static TDC entries are not dynamically updated, so outdated entries are not removed after the TID or the NSAP changes on the target node. 10.7.6 OSI Virtual Routers The ONS 15310-CL and ONS 15310-MA support one OSI virtual router. The router is provisioned on the Provisioning > OSI > Routers tabs. The router has an editable manual area address and a unique NSAP System ID that is set to the node MAC address. The router can be enabled and connected to different OSI routing areas. The Router 1 manual area address and System ID create the NSAP address assigned to the node’s TID. Router 1 supports OSI TARP and tunneling functions. These include: • TARP data cache • IP-over-CLNS tunnels • LAN subnet 131957 Generic router DCN DCN Manual adjacency10-33 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels In addition to the primary manual area address, you can also create two additional manual area addresses. These manual area addresses can be used to: • Split up an area—Nodes within a given area can accumulate to a point that they are difficult to manage, cause excessive traffic, or threaten to exceed the usable address space for an area. Additional manual area addresses can be assigned so that you can smoothly partition a network into separate areas without disrupting service. • Merge areas—Use transitional area addresses to merge as many as three separate areas into a single area that shares a common area address. • Change to a different address—You might need to change an area address for a particular group of nodes. Use multiple manual area addresses to allow incoming traffic intended for an old area address to continue being routed to associated nodes. 10.7.7 IP-over-CLNS Tunnels IP-over-CLNS tunnels are used to encapsulate IP for transport across OSI NEs. The ONS 15310-CL and ONS 15310-MA supports two tunnel types: • GRE—Generic Routing Encapsulation is a tunneling protocol that encapsulates one network layer for transport across another. GRE tunnels add both a CLNS header and a GRE header to the tunnel frames. GRE tunnels are supported by Cisco routers and some other vendor NEs. • Cisco IP—The Cisco IP tunnel directly encapsulates the IP packet with no intermediate header. Cisco IP is supported by most Cisco routers. Figure 10-18 shows the protocol flow when an IP-over-CLNS tunnel is created through four NEs (A, B, C, and D). The tunnel ends are configured on NEs A and D, which support both IP and OSI. NEs B and C only support OSI, so they only route the OSI packets. Figure 10-18 IP-over-CLNS Tunnel Flow 131956 NE-D SNMP RMON HTTP FTP Telnet UDP IPv4 GRE Tunnel LLC1 LAN CLNP LAPD DCC TCP EMS SNMP RMON HTTP FTP Telnet UDP IPv4 LLC1 LAN TCP NE-A (GNE) IPv4 GRE Tunnel LLC1 LAN CLNP LAPD DCC NE-C CLNP LAPD DCC NE-B CLNP LAPD DCC10-34 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels 10.7.7.1 Provisioning IP-over-CLNS Tunnels IP-over-CLNS tunnels must be carefully planned to prevent nodes from losing visibility or connectivity. Before you begin a tunnel, verify that the tunnel type, either Cisco IP or GRE, is supported by the equipment at the other end. Always verify IP and NSAP addresses. Provisioning of IP-over-CLNS tunnels in CTC is performed on the node view Provisioning > OSI > IP over CLNS Tunnels tab. For procedures, see the “Turn Up a Node” chapter in the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Provisioning IP-over-CLNS tunnels on Cisco routers requires the following prerequisite tasks, as well as other OSI provisioning: • (Required) Enable IS-IS • (Optional) Enable routing for an area on an interface • (Optional) Assign multiple area addresses • (Optional) Configure IS-IS interface parameters • (Optional) Configure miscellaneous IS-IS parameters The Cisco IOS commands used to create IP-over-CLNS tunnels (CTunnels) are shown in Table 10-14. If you are provisioning an IP-over-CLNS tunnel on a Cisco router, always follow procedures provided in the Cisco IOS documentation for the router you are provisioning. For information about ISO CLNS provisioning including IP-over-CLNS tunnels, refer to the “Configuring ISO CLNS” chapter in the Cisco IOS Apollo Domain, Banyon VINES, DECnet, ISO CLNS, and XNS Configuration Guide. 10.7.7.2 IP Over CLNS Tunnel Scenario 1: ONS Node to Other Vendor GNE Figure 10-19 shows an IP-over-CLNS tunnel created from an ONS node to another vendor GNE. The other vendor NE has an IP connection to an IP DCN to which a CTC computer is attached. An OSI-only (LAP-D) SDCC and a GRE tunnel are created between the ONS NE 1 to the other vender GNE. IP-over-CLNS tunnel provisioning on the ONS NE 1: • Destination: 10.10.10.100 (CTC 1) • Mask: 255.255.255.255 for host route (CTC 1 only), or 255.255.255.0 for subnet route (all CTC computers residing on the 10.10.10.0 subnet) • NSAP: 39.840F.80.1111.0000.1111.1111.cccccccccccc.00 (other vendor GNE) • Metric: 110 Table 10-14 IP Over CLNS Tunnel Cisco IOS Commands Step Step Purpose 1 Router (config) # interface ctunnel interface-number Creates a virtual interface to transport IP over a CLNS tunnel and enters interface configuration mode. The interface number must be unique for each CTunnel interface. 2 Router (config-if # ctunnel destination remote-nsap-address Configures the destination parameter for the CTunnel. Specifies the destination NSAP1 address of the CTunnel, where the IP packets are extracted. 3 Router (config-if) # ip address ip-address mask Sets the primary or secondary IP address for an interface.10-35 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels • Tunnel Type: GRE IP-over-CLNS tunnel provisioning on the other vender GNE: • Destination: 10.20.30.30 (ONS NE 1) • Mask: 255.255.255.255 for host route (ONS NE 1 only), or 255.255.255.0 for subnet route (all ONS nodes residing on the 10.30.30.0 subnet) • NSAP: 39.840F.80.1111.0000.1111.1111.dddddddddddd.00 (ONS NE 1) • Metric: 110 • Tunnel Type: GRE Figure 10-19 IP Over CLNS Tunnel Scenario 1: ONS NE to Other Vender GNE 10.7.7.3 IP-Over-CLNS Tunnel Scenario 2: ONS Node to Router Figure 10-20 shows an IP-over-CLNS tunnel from an ONS node to a router. The other vendor NE has an OSI connection to a router on an IP DCN, to which a CTC computer is attached. An OSI-only (LAP-D) SDCC is created between the ONS NE 1 and the other vender GNE. The OSI-over-IP tunnel can be either the Cisco IP tunnel or a GRE tunnel, depending on the tunnel types supported by the router. 134355 CTC 1 10.10.10.100/24 IP DCN IP/OSI Vendor GNE 10.10.30.20/24 39.840F.80. 111111.0000.1111.1111.cccccccccccc.00 ONS NE 1 10.10.30.30/24 39.840F.80. 111111.0000.1111.1111.dddddddddddd.00 Other vendor NE OSI OSI-only DCC (LAPD) GRE tunnel OSI Router 2 Interface 0/0: 10.10.10.10/24 Interface 0/1: 10.10.20.10/24 39.840F.80.111111.0000.1111.1111.aaaaaaaaaaaa.00 Router 1 Interface 0/0: 10.10.20.20/24 Interface 0/1: 10.10.30.10/24 39.840F.80. 111111.0000.1111.1111.bbbbbbbbbbbb.0010-36 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels IP-over-CLNS tunnel provisioning on ONS NE 1: • Destination: 10.10.30.10 (Router 1, Interface 0/1) • Mask: 255.255.255.255 for host route (Router 1 only), or 255.255.255.0 for subnet route (all routers on the same subnet) • NSAP: 39.840F.80.1111.0000.1111.1111.bbbbbbbbbbbb.00 (Router 1) • Metric: 110 • Tunnel Type: Cisco IP CTunnel (IP over CLNS) provisioning on Router 1: ip routing clns routing interface ctunnel 102 ip address 10.10.30.30 255.255.255.0 ctunnel destination 39.840F.80.1111.0000.1111.1111.dddddddddddd.00 interface Ethernet0/1 clns router isis router isis net 39.840F.80.1111.0000.1111.1111.bbbbbbbbbbbb.0010-37 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels Figure 10-20 IP-Over-CLNS Tunnel Scenario 2: ONS Node to Router 10.7.7.4 IP-Over-CLNS Tunnel Scenario 3: ONS Node to Router Across an OSI DCN Figure 10-21 shows an IP-over-CLNS tunnel from an ONS node to a router across an OSI DCN. The other vendor NE has an OSI connection to an IP DCN to which a CTC computer is attached. An OSI-only (LAP-D) SDCC is created between the ONS NE 1 and the other vender GNE. The OSI-over-IP tunnel can be either the Cisco IP tunnel or a GRE tunnel, depending on the tunnel types supported by the router. IP-over-CLNS tunnel provisioning on ONS NE 1: • Destination: Router 2 IP address • Mask: 255.255.255.255 for host route (CTC 1 only), or 255.255.255.0 for subnet route (all CTC computers on the same subnet) • NSAP: Other vender GNE NSAP address • Metric: 110 • Tunnel Type: Cisco IP IP-over-OSI tunnel provisioning on Router 2 (sample Cisco IOS provisioning): 134356 CTC 1 10.10.10.100/24 IP DCN OSI Other vendor GNE Other vendor NE OSI OSI-only DCC (LAPD) GRE or Cisco IP tunnel OSI ONS NE 1 10.10.30.30/24 39.840F.80. 111111.0000.1111.1111.dddddddddddd.00 Router 2 Interface 0/0: 10.10.10.10/24 Interface 0/1: 10.10.20.10/24 39.840F.80.111111.0000.1111.1111.aaaaaaaaaaaa.00 Router 1 Interface 0/0: 10.10.20.20/24 Interface 0/1: 10.10.30.10/24 39.840F.80. 111111.0000.1111.1111.bbbbbbbbbbbb.0010-38 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.7 IP-over-CLNS Tunnels ip routing clns routing interface ctunnel 102 ip address 10.10.30.30 255.255.255.0 ctunnel destination 39.840F.80.1111.0000.1111.1111.dddddddddddd.00 interface Ethernet0/1 clns router isis router isis net 39.840F.80.1111.0000.1111.1111.aaaaaaaaaaaa.00 Figure 10-21 IP-Over-CLNS Tunnel Scenario 3: ONS Node to Router Across an OSI DCN 134357 CTC 1 10.10.10.100/24 OSI DCN OSI IP Other vendor GNE Other vendor NE OSI OSI-only DCC (LAPD) GRE or Cisco IP tunnel OSI ONS NE 1 10.10.30.30/24 39.840F.80. 111111.0000.1111.1111.dddddddddddd.00 Router 2 Interface 0/0: 10.10.10.10/24 Interface 0/1: 10.10.20.10/24 39.840F.80.111111.0000.1111.1111.aaaaaaaaaaaa.00 Router 1 Interface 0/0: 10.10.20.20/24 Interface 0/1: 10.10.30.10/24 39.840F.80. 111111.0000.1111.1111.bbbbbbbbbbbb.0010-39 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.8 Provisioning OSI in CTC 10.7.8 Provisioning OSI in CTC Table 10-15 shows the OSI actions that can be performed in CTC using the node view Provisioning tab. Refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide for OSI procedures and tasks. Table 10-16 shows the OSI actions that can be performed in CTC using the node view Maintenance tab. Table 10-15 OSI Actions from the CTC Node View Provisioning Tab Tab Actions OSI > Main Setup • View and edit Primary Area Address. • Change OSI routing mode. • Change LSP buffers. OSI > TARP > Config Configure the TARP parameters: • PDU L1/L2 propagation and origination. • TARP data cache and loop detection buffer. • LAN storm suppression. • Type 4 PDU on startup. • TARP timers: LDB, T1, T2, T3, T4. OSI > TARP > Static TDC Add and delete static TARP data cache entries. OSI > TARP > MAT Add and delete static manual area table entries. OSI > Routers > Setup • Enable and disable routers. • Add, delete, and edit manual area addresses. OSI > Routers > Subnets Edit SDCC, LDCC, and LAN subnets that are provisioned for OSI. OSI > Tunnels Add, delete, and edit Cisco and IP-over-CLNS tunnels. Comm Channels > SDCC • Add OSI configuration to an SDCC. • Choose the data link layer protocol, PPP or LAP-D. Comm Channels > LDCC • Add OSI configuration to an SDCC. Table 10-16 OSI Actions from the CTC Maintenance Tab Tab Actions OSI > ISIS RIB View the IS-IS routing table. OSI > ESIS RIB View ESs that are attached to ISs. OSI > TDC • View the TARP data cache and identify static and dynamic entries. • Perform TID to NSAP resolutions. • Flush the TDC.10-40 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 10 Management Network Connectivity 10.7.8 Provisioning OSI in CTCCHAPTER 11-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 11 Alarm Monitoring and Management This chapter describes Cisco Transport Controller (CTC) alarm management. To troubleshoot specific alarms, refer to the Cisco ONS 15310-CL and ONS 15310-MA Troubleshooting Guide. Chapter topics include: • 11.1 Overview, page 11-1 • 11.2 Viewing Alarms, page 11-1 • 11.3 Alarm Severities, page 11-9 • 11.4 Alarm Profiles, page 11-10 • 11.5 Alarm Suppression, page 11-13 • 11.6 External Alarms and Controls, page 11-14 11.1 Overview Cisco Transport Controller (CTC) detects and reports SONET alarms generated by the Cisco ONS 15310-CL or ONS 15310-MA and the larger SONET network. You can use CTC to monitor and manage alarms at the card, node, or network level. Default alarm severities conform to the Telcordia GR-474-CORE standard, but you can set alarm severities in customized alarm profiles or suppress CTC alarm reporting. For a detailed description of the standard Telcordia categories employed by Optical Networking System (ONS) nodes, refer to the Cisco ONS 15310-CL and ONS 15310-MA Troubleshooting Guide. Note ONS 15310-CL and ONS 15310-MA alarms can also be monitored and managed through Transaction Language One (TL1) or a network management system (NMS). 11.2 Viewing Alarms You can use the Alarms tab to view card, node, or network-level alarms. The Alarms window shows alarms in conformance with Telcordia GR-474-CORE. This means that if a network problem causes two alarms, such as loss of frame (LOF) and loss of signal (LOS), CTC only shows the LOS alarm in this window because it supersedes LOF. (The LOF alarm can still be retrieved in the Conditions window.) 11-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2 Viewing Alarms The Path Width column in the Alarms and Conditions tabs expands upon alarmed object information contained in the access identifier (AID) string (such as “STS-4-1-3”) by giving the number of synchronous transport signals (STSs) contained in the alarmed path. For example, the Path Width will tell you whether a Critical alarm applies to an STS1 or an STS48c. The column reports the width as a 1, 3, 6, 12, 48, etc. as appropriate, understood to be “STS-N.” Table 11-1 lists the Alarms tab column headings and the information recorded in each column. Table 11-2 lists the color codes for alarm and condition severities. In addition to the severities listed in the table, CTC alarm profiles list inherited (I) and unset (U) severities. Table 11-1 Alarms Column Descriptions Column Information Recorded New Indicates a new alarm. To change this status, click either the Synchronize button or the Delete Cleared Alarms button. Date Date and time of the alarm. Node Shows the name of the node where the condition or alarm occurred. (Visible in network view.) Object TL1 AID for the alarmed object. For an STSmon or VTmon, this is the monitored STS or VT object, which is explained in Table 11-3 on page 11-3. Eqpt Type Card type in this slot (appears only in network and node view). Shelf For DWDM configurations, the shelf where the alarmed object is located. Visible in network view. Slot Slot where the alarm occurred (appears only in network and node view). Port Port where the alarm is raised. For STSTerm and VTTerm, the port refers to the upstream card it is partnered with. Path Width Indicates how many STSs are contained in the alarmed path. This information compliments the alarm object notation, which is explained in Table 11-3 on page 11-3. Sev Severity level: CR (Critical), MJ (Major), MN (Minor), NA (Not-Alarmed), NR (Not-Reported). ST Status: R (raised), C (clear). SA When checked, indicates a service-affecting alarm. Cond The error message/alarm name. These names are alphabetically defined in the “Alarm Troubleshooting” chapter of the Cisco ONS 15310-CL and ONS 15310-MA Troubleshooting Guide. Description Description of the alarm. Num Num (number) is the quantity of alarm messages received and is increments automatically as alarms occur to display the current total of received error messages. (The column is hidden by default; to view it, right-click a column and choose Show Column > Num.) Ref Ref (reference) is a unique identification number assigned to each alarm to reference a specific alarm message that is displayed. (The column is hidden by default; to view it, right-click a column and choose Show Column > Ref.)11-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2 Viewing Alarms In network view, CTC identifies STS and VT alarm objects using a TL1-type AID, as shown in Table 11-3. Table 11-2 Color Codes for Alarm and Condition Severities Color Description Red Raised Critical (CR) alarm Orange Raised Major (MJ) alarm Yellow Raised Minor (MN) alarm Magenta Raised Not-Alarmed (NA) condition Blue Raised Not-Reported (NR) condition White Cleared (C) alarm or condition Table 11-3 STS and Alarm Object Identification STS and VT Alarm Numbering (ONS 15310-CL and ONS 15310-MA) MON Object (Optical) Syntax and Examples OC3/OC12 STS Syntax: STS---- Ranges: STS-{2}-{1-2}-{1}-{1-n} 1 Example: STS-2-1-1-6 1. The maximum number of STSs depends on the rate and size of the STS. OC3/OC12 VT Syntax: VT1------ Ranges: VT1-{2}-{1-2}-{1}-{1-n 1 }-{1-7}-{1-4} Example: VT1-2-1-1-6-1-1 EC1 STS Syntax: STS--- Ranges: STS-{2}-{1-3}-{1-n} 1 Example: STS-2-1-6 EC1 VT Syntax: VT1----- Ranges: VT1-{2}-{1-3}-{1-n} 1 -{1-7}-{1-4} Example: VT1-2-1-6-1-1 TERM Object (Electrical) Syntax and Examples T1 STS Syntax: STS-- Ranges: STS-{2}-{1-n} 1 Example: STS-2-6 T1 VT Syntax: VT1---VT Group>- Ranges: VT1-{2}-{1-n} 1 -{1-7}-{1-3} Example: VT1-2-6-1-1 T3 STS Syntax: STS--- Ranges: STS-{2}-{1-3}-{1-n} 1 Example: STS-2-1-6 T3 VT VT not supported11-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.1 Viewing Alarms With Each Node’s Time Zone 11.2.1 Viewing Alarms With Each Node’s Time Zone By default, alarms and conditions are displayed with the time stamp of the CTC workstation where you are viewing them. But you can set the node to report alarms (and conditions) using the time zone where the node is located by clicking Edit > Preferences, and clicking the Display Events Using Each Node’s Timezone check box. 11.2.2 Controlling Alarm Display You can control the display of the alarms shown in the Alarms window. Table 11-4 shows the actions you can perform in the Alarms window. 11.2.3 Filtering Alarms The alarm display can be filtered to prevent display of alarms with certain severities or alarms that occurred between certain dates and times. You can set the filtering parameters by clicking the Filter button at the bottom-left of the Alarms window. You can turn the filter on or off by clicking the Filter tool at the bottom-right of the window. CTC retains your filter activation setting. For example, if you turn the filter on and then log out, CTC keeps the filter active the next time you log in. Table 11-4 Alarm Display Button/Check box/Tool Action Filter button Allows you to change the display in the Alarms window to show only alarms that meet a certain severity level, occur in a specified time frame, and/or reflect specific conditions. For example, you can set the filter so that only Critical alarms are displayed in the window. If you enable the Filter feature by clicking the Filter tool in one CTC view, such as node view, it is enabled in the others as well (card view and network view). Synchronize button Updates the alarm display. Although CTC displays alarms in real time, the Synchronize button allows you to verify the alarm display. This is particularly useful during provisioning or troubleshooting. Delete Cleared Alarms button Deletes, from the view, alarms that have been cleared. AutoDelete Cleared Alarms check box If checked, CTC automatically deletes cleared alarms. Filter tool Enables or disables alarm filtering in the card, node, or network view. When enabled or disabled, this state applies to other views for that node and for all other nodes in the network. For example, if the Filter tool is enabled in the node (default login) view Alarms window, the network view Alarms window and card view Alarms window also show the tool enabled. All other nodes in the network also show the tool enabled.11-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.4 Viewing Alarm-Affected Circuits 11.2.4 Viewing Alarm-Affected Circuits To view which ONS 15310-CL or ONS 15310-MA circuits are affected by a specific alarm, right-click an alarm in the Alarm window. A shortcut menu appears, as shown in Figure 11-1 (This figure illustrates the ONS 15310-MA, but the ONS 15310-CL behaves similarly.) When you select the Select Affected Circuits option, the Circuits window opens to show the circuits that are affected by the alarm. Figure 11-1 ONS 15310-MA Select Affected Circuits Option 11.2.5 Conditions Tab The Conditions window displays retrieved fault conditions. A condition is a fault or status detected by ONS 15310-CL or ONS 15310-MA hardware or software. When a condition occurs and continues for a minimum period, CTC raises a condition, which is a flag showing that this particular condition currently exists on theONS 15310-CL or ONS 15310-MA. The Conditions window shows all conditions that occur, including those that are superseded. For instance, if a network problem causes two alarms, such as LOF and LOS, CTC shows both the LOF and LOS conditions in this window (even though LOS supersedes LOF). Having all conditions visible can be helpful when troubleshooting the ONS 15310-CL or ONS 15310-MA. If you want to retrieve conditions that obey a root-cause hierarchy (that is, LOS supersedes and replaces LOF), you can exclude the same root causes by checking “Exclude Same Root Cause” check box in the window. Fault conditions include reported alarms and Not-Reported or Not-Alarmed conditions. Refer to the trouble notifications information in the Cisco ONS 15310-CL and ONS 15310-MA Troubleshooting Guide for more information about alarm and condition classifications.11-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.6 Controlling the Conditions Display 11.2.6 Controlling the Conditions Display You can control the display of the conditions on the Conditions window. Table 11-5 shows the actions you can perform in the window. 11.2.6.1 Retrieving and Displaying Conditions The current set of all existing conditions maintained by the alarm manager can be seen when you click the Retrieve button. The set of conditions retrieved is relative to the view. For example, if you click the button while displaying the node view, node-specific conditions appear. If you click the button while displaying the network view, all conditions for the network (including ONS 15310-CL or ONS 15310-MA nodes and other connected nodes) appear, and the card view shows only card-specific conditions. You can also set a node to display conditions using the time zone where the node is located, rather than the time zone of the PC where they are being viewed. See the “11.2.1 Viewing Alarms With Each Node’s Time Zone” section on page 11-4 for more information. 11.2.6.2 Conditions Column Descriptions Table 11-6 lists the Conditions window column headings and the information recorded in each column. Table 11-5 Conditions Display Button Action Retrieve Retrieves the current set of all existing fault conditions, as maintained by the alarm manager, from the ONS 15310-CL or ONS 15310-MA. Filter Allows you to change the Conditions window display to only show the conditions that meet a certain severity level or occur in a specified time. For example, you can set the filter so that only Critical conditions display on the window. There is a Filter tool on the lower-right of the window that allows you to enable or disable the filter feature. Table 11-6 Conditions Column Description Column Information Recorded Date Date and time of the condition. Node Shows the name of the node where the condition or alarm occurred. (Visible in network view.) Object TL1 AID for the condition object. For an STSmon or VTmon, this is the monitored STS or VT object, which is explained in Table 11-3 on page 11-3. Eqpt Type Card type in this slot (appears only in network and node view). Shelf For DWDM configurations, the shelf where the alarmed object is located. Visible in network view.11-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.7 Viewing History 11.2.6.3 Filtering Conditions The condition display can be filtered to prevent the appearance of conditions (including alarms) with certain severities or that occurred between certain dates. You can set the filtering parameters by clicking the Filter button at the bottom-left of the Conditions window. You can turn the filter on or off by clicking the Filter tool at the bottom-right of the window. CTC retains your filter activation setting. For example, if you turn the filter on and then log out, CTC keeps the filter active the next time you log in. 11.2.7 Viewing History The History window displays historic alarm or condition data for the node or for your login session. You can chose to display only alarm history, only events, or both by checking check boxes in the History > Shelf window. You can view network-level alarm and condition history, such as for circuits, for all the nodes visible in network view. At the node level, you can see all port (facility), card, STS, and system-level history entries for that node. For example, protection-switching events or performance-monitoring threshold crossings appear here. If you double-click a card, you can view all port, card, and STS alarm or condition history that directly affects the port. Note In the Preference dialog General tab, the Maximum History Entries value only applies to the Session window. Different views of CTC display different kinds of history: • The History > Session window is shown in network view, node view, and card view. It shows alarms and conditions that occurred during the current user CTC session. • The History > Shelf window is only shown in node view. It shows the alarms and conditions that occurred on the node since CTC software was operated on the node. • The History > Card window is only shown in card view. It shows the alarms and conditions that occurred on the card since CTC software was installed on the node. Slot Slot where the condition occurred (appears only in network and node view). Port Port where the condition occurred. For STSTerm and VTTerm, the port refers to the upstream card it is partnered with. Path Width Width of the signal path Sev1 Severity level: CR (Critical), MJ (Major), MN (Minor), NA (Not-Alarmed), NR (Not-Reported). SA1 Indicates a service-affecting alarm (when checked). Cond The error message/alarm name; these names are alphabetically defined in the Cisco ONS 15310-CL and ONS 15310-MA Troubleshooting Guide. Description Description of the condition. 1. All alarms, their severities, and service-affecting statuses are also displayed in the Condition tab unless you choose to filter the alarm from the display using the Filter button. Table 11-6 Conditions Column Description (continued) Column Information Recorded11-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.7 Viewing History Tip Double-click an alarm in the History window to display the corresponding view. For example, double-clicking a card alarm takes you to card view. In network view, double-clicking a node alarm takes you to node view. If you check the History window Alarms check box, you display the node history of alarms. If you check the Events check box, you display the node history of Not Alarmed and transient events (conditions). If you check both check boxes, you retrieve node history for both. 11.2.7.1 History Column Descriptions Table 11-7 lists the History window column headings and the information recorded in each column. 11.2.7.2 Retrieving and Displaying Alarm and Condition History You can retrieve and view the history of alarms and conditions, as well as transients (passing notifications of processes as they occur) in the CTC history window. The information in this window is specific to the view where it is shown (that is, network history in the network view, node history in the node view, and card history in the card view). Table 11-7 History Column Description Column Information Recorded Num An incrementing count of alarm or condition messages. (The column is hidden by default; to view it, right-click a column and choose Show Column > Num.) Ref The reference number assigned to the alarm or condition. (The column is hidden by default; to view it, right-click a column and choose Show Column > Ref.) Date Date and time of the condition. Node Shows the name of the node where the condition or alarm occurred. (Visible in network view.) Object TL1 AID for the condition object. For an STSmon or VTmon, this is the monitored STS or VT object, which is explained in Table 11-3 on page 11-3. Eqpt Type Card type in this slot (only displays in network view and node view). Shelf For DWDM configurations, the shelf where the alarmed object is located. Visible in network view. Slot Slot where the condition occurred (only displays in network view and node view). Port Port where the condition occurred. For STSTerm and VTTerm, the port refers to the upstream card it is partnered with. Path Width Width of the signal path. Sev Severity level: Critical (CR), Major (MJ), Minor (MN), Not-Alarmed (NA), Not-Reported (NR). ST Status: raised (R), cleared (C), or transient (T). SA A service-affecting alarm (when checked). Description Description of the condition. Cond Condition name.11-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.2.8 Alarm History and Log Buffer Capacities The node and card history views are each divided into two tabs. In node view, when you click the Retrieve button, you can see the history of alarms, conditions, and transients that have occurred on the node in the History > Shelf window, and the history of alarms, conditions, and transients that have occurred on the node during your login session in the History > Session window. In the card-view history window, after you retrieve the card history, you can see the history of alarms, conditions, and transients on the card in the History > Card window, or a history of alarms, conditions, and transients that have occurred during your login session in the History > Session window. You can also filter the severities and occurrence period in these history windows. 11.2.8 Alarm History and Log Buffer Capacities The ONS 15310-CL or ONS 15310-MA alarm history log, stored in the 15310-CL-CTX or CTX2500 RSA memory, contains four categories of alarms. These include: • CR severity alarms • MJ severity alarms • MN severity alarms • the combined group of cleared, Not Alarmed severity, and Not Reported severity alarms Each category can store between 4 and 640 alarm chunks, or entries. In each category, when the upper limit is reached, the oldest entry in the category is deleted. The capacity is not user-provisionable. CTC also has a log buffer, separate from the alarm history log, that pertains to the total number of entries displayed in the Alarms, Conditions, and History windows. The total capacity is provisionable up to 5,000 entries. When the upper limit is reached, the oldest entries are deleted. 11.3 Alarm Severities The ONS 15310-CL and ONS 15310-MA alarm severities follow the Telcordia GR-474-CORE standard, so a condition may be Alarmed at a severity of Critical (CR), Major (MJ), or Minor (MN) with a severity of Not Alarmed (NA) or Not Reported (NR). These severities are reported in the CTC software Alarms, Conditions, and History windows at all levels: network, node, and card. ONS equipment provides a standard profile named “Default” that lists all alarms and conditions with severity settings based on Telcordia GR-253-CORE and other standards, but users can create their own profiles with different settings for some or all conditions and apply these wherever needed. (See the “11.4 Alarm Profiles” section on page 11-10 for more information.) For example, in a custom alarm profile, the default severity of a carrier loss (CARLOSS) alarm on an Ethernet port can be changed from Major to Critical. Critical and Major severities are only used for service-affecting alarms. If a condition is set as Critical or Major by profile, it will raise as a Minor alarm in the following situations: • In a protection group, if the alarm is on a standby entity (side not carrying traffic) • If the alarmed entity has no traffic provisioned on it, so no service is lost Because the alarm might be raised at two different levels, the alarm profile pane shows Critical as “CR / MN” and Major as “MJ / MN.”11-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.4 Alarm Profiles 11.4 Alarm Profiles The alarm profiles feature allows you to change default alarm severities by creating unique alarm profiles for individual ONS 15310-CL or ONS 15310-MA ports, cards, or nodes. A created alarm profile can be applied to any node on the network. Alarm profiles can be saved to a file and imported elsewhere in the network, but the profile must be stored locally on a node before it can be applied to the node, cards, or ports. CTC can store up to ten active alarm profiles at any time to apply to the node. Custom profiles can take eight of these active profile positions. Two other profiles, Default profile and Inherited profile, are reserved by the NE, and cannot be edited. The reserved Default profile contains Telcordia GR-474-CORE severities. The reserved Inherited profile allows port alarm severities to be governed by the card-level severities, or card alarm severities to be determined by the node-level severities. If one or more alarm profiles is stored as files from elsewhere in the network onto the local PC or server hard drive where CTC resides, you can use as many profiles as you can physically store by deleting and replacing them locally in CTC so that only eight are active at any given time. 11.4.1 Creating and Modifying Alarm Profiles Alarm profiles are created in the network view using the Provisioning > Alarm Profiles tabs. A default alarm severity following Telcordia GR-474-CORE standards is preprovisioned for every alarm. After loading the default profile or another profile on the node, you can use the Clone feature to create custom profiles. After the new profile is created, the Alarm Profiles window shows the original profile—frequently Default—and the new profile. Note All default or user-defined severity settings that are Critical (CR) or Major (MJ) are demoted to Minor (MN) in non-service affecting situations as defined in Telcordia GR-474-CORE. Tip To see the full list of profiles including those available for loading or cloning, click the Available button. You must load a profile before you can clone it. Wherever it is applied, the Default alarm profile sets severities to standard Telcordia GR-474-CORE settings. In the Inherited profile, alarms inherit, or copy severity from the next-highest level. For example, a card with an Inherited alarm profile copies the severities used by the node housing the card. If you choose the Inherited profile from the network view, the severities at the lower levels (node and card) are copied from this selection. You do not have to apply a single severity profile to the node, card, and port level alarms. Different profiles can be applied at different levels. For example, you could use the inherited or default profile on a node and on all cards and ports, but apply a custom profile that downgrades an alarm on one particular card. Or you might choose to downgrade an OC-N unequipped path alarm (UNEQ-P) from Critical (CR) to Not Alarmed (NA) on an optical card because this alarm is raised and then clears every time you create a circuit. UNEQ-P alarms for the card with the custom profile would not display on the Alarms tab (but they would still be recorded on the Conditions and History tabs). When you modify severities in an alarm profile: • All Critical (CR) or Major (MJ) default or user-defined severity settings are demoted to Minor (MN) in Non-Service-Affecting (NSA) situations as defined in Telcordia GR-474-CORE. • Default severities are used for all alarms and conditions until you create a new profile and apply it.11-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.4.2 Alarm Profile Buttons 11.4.2 Alarm Profile Buttons The Alarm Profiles window displays six buttons at the bottom. Table 11-8 lists and describes each of the alarm profile buttons and their functions. 11.4.3 Alarm Profile Editing Table 11-9 lists and describes the five profile-editing options available when you right-click an alarm item in the profile column. 11.4.4 Alarm Severity Options To change or assign alarm severity, left-click the alarm severity you want to change in the alarm profile column. Seven severity levels appear for the alarm: • Not-reported (NR) • Not-alarmed (NA) • Minor (MN) • Major (MJ) • Critical (CR) Table 11-8 Alarm Profile Buttons Button Description New Adds a new alarm profile. Load Loads a profile from a node or a file. Store Saves profiles on a node (or nodes) or in a file. Delete Deletes profiles from a node. Compare Displays differences between alarm profiles (for example, individual alarms that are not configured equivalently between profiles). Available Displays all profiles available on each node. Usage Displays all entities (nodes and alarm subjects) present in the network and which profiles contain the alarm. Can be printed. Table 11-9 Alarm Profile Editing Options Button Description Store Saves a profile in a node or in a file. Rename Changes a profile name. Clone Creates a profile that contains the same alarm severity settings as the profile being cloned. Reset Restores a profile to its previous state or to the original state (if it has not yet been applied). Remove Removes a profile from the table editor.11-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.4.5 Row Display Options • Use Default • Inherited (I) Inherited and Use Default severity levels only appear in alarm profiles. They do not appear when you view alarms, history, or conditions. 11.4.5 Row Display Options In the network view, the Alarm Profiles window displays two check boxes at the bottom of the window: • Hide reference values—Highlights alarms with non-default severities by clearing alarm cells with default severities. This check-box is normally greyed out. It becomes active only when more than one profile is listed in the Alarm Profile Editor window. (The check box text changes to “Hide Values matching profile Default” in this case. • Hide identical rows—Hides rows of alarms that contain the same severity for each profile. 11.4.6 Applying Alarm Profiles In CTC node view, the Alarm Behavior window displays alarm profiles for the node. In card view, the Alarm Behavior window displays the alarm profiles for the selected card. Alarm profiles form a hierarchy. A node alarm profile applies to all cards in the node except cards that have their own profiles. A card alarm profile applies to all ports on the card except ports that have their own profiles. At the node level, you can apply profile changes on a card-by-card basis or set a profile for the entire node. At the card view, you can apply profile changes on a port-by-port basis or set alarm profiles for all ports on that card. Figure 11-2 shows an ONS 15310-MA CTX2500 card alarm profile.11-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.5 Alarm Suppression Figure 11-2 Alarm Profile for a 15310-MA CTX2500 Card 11.5 Alarm Suppression The following sections explain alarm suppression features for the ONS 15310-CL and ONS 15310-MA. 11.5.1 Alarms Suppressed for Maintenance When you place a port in OOS,MT administrative state, this raises the alarm suppressed for maintenance (AS-MT) alarm in the Conditions and History windows1 and causes subsequently raised alarms for that port to be suppressed. While the facility is in the OOS,MT state, any alarms or conditions that are raised and suppressed on it (for example, a transmit failure [TRMT] alarm) are reported in the Conditions window and show their normal severity in the Sev column. The suppressed alarms are not shown in the Alarms and History windows. (These windows only show AS-MT). When you place the port back into IS,AINS administrative state, the AS-MT alarm is resolved in all three windows. Suppressed alarms remain raised in the Conditions window until they are cleared. 1. AS-MT can be seen in the Alarms window as well if you have set the Filter dialog box to show NA severity events.11-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.5.2 Alarms Suppressed by User Command 11.5.2 Alarms Suppressed by User Command In the Provisioning > Alarm Profiles > Alarm Behavior tabs, the ONS 15310-CL and ONS 15310-MA have an alarm suppression option that clears raised alarm messages for the node, chassis, one or more slots (cards), or one or more ports. Using this option raises the alarms suppressed by user command, or AS-CMD alarm. The AS-CMD alarm, like the AS-MT alarm, appears in the Conditions, and History1 windows. Suppressed conditions (including alarms) appear only in the Conditions window--showing their normal severity in the Sev column. When the Suppress Alarms check box is unchecked, the AS-CMD alarm is cleared from all three windows. A suppression command applied at a higher level does not supersede a command applied at a lower level. For example, applying a node-level alarm suppression command makes all raised alarms for the node appear to be cleared, but it does not cancel out card-level or port-level suppression. Each of these conditions can exist independently and must be cleared independently. Caution Use alarm suppression with caution. If multiple CTC or TL1 sessions are open, suppressing the alarms in one session suppresses the alarms in all other open sessions. 11.6 External Alarms and Controls External alarm physical connections are made with the ONS 15310-CL or ONS 15310-MA ALARM port. However, the alarms are provisioned using the 15310-CL-CTX or CTX2500 card view for external sensors such as an open door and flood sensors, temperature sensors, and other environmental conditions. External control outputs on the 15310-CL-CTX and CTX2500 cards allow you to drive external visual or audible devices such as bells and lights. They can control other devices such as generators, heaters, and fans. Provision external alarms in the 15310-CL-CTX or CTX2500 card view Provisioning > External Alarms tab and provision controls in the 15310-CL-CTX or CTX2500 card view Provisioning > External Controls tab. Up to 32 alarm contact inputs and 8 alarm contact outputs are available with the 15310-MA-CTX2500 cards. The 15310-CL-CTX cards report 3 alarm inputs and 2 alarm outputs. 11.6.1 External Alarm Input You can provision each alarm input separately. Provisionable characteristics of external alarm inputs include: • Alarm type • Alarm severity (CR, MJ, MN, NA, and NR) • Alarm-trigger setting (open or closed); open means that the normal condition is to have current flowing through the contact, and the alarm is generated when the current stops flowing; closed means that normally no current flows through the contact, and the alarm is generated when current does flow. • Virtual wire associated with the alarm • CTC alarm log description (up to 63 characters)11-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.6.2 External Control Output Note If you provision an external alarm to raise when a contact is open, and you have not attached the alarm cable, the alarm will remain raised until the alarm cable is connected. Note When you provision an external alarm, the alarm object is ENV-IN-nn. The variable nn refers to the external alarm’s number, regardless of the name you assign. 11.6.2 External Control Output You can provision each alarm output separately. Provisionable characteristics of alarm outputs include: • Control type • Trigger type (alarm or virtual wire) • Description for CTC display • Closure setting (manually or by trigger). If you provision the output closure to be triggered, the following characteristics can be used as triggers: – Local NE alarm severity—A chosen alarm severity (for example, Major) and any higher-severity alarm (in this case, Critical) causes output closure – Remote NE alarm severity—Similar to local NE alarm severity trigger setting, but applies to remote alarms – Virtual wire entities—You can provision an alarm that is input to a virtual wire to trigger an external control output11-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 11 Alarm Monitoring and Management 11.6.2 External Control OutputCHAPTER 12-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 12 Performance Monitoring Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. Performance monitoring (PM) parameters are used by service providers to gather, store, threshold, and report performance data for early detection of problems. In this chapter, PM parameters and concepts are defined for electrical cards, Ethernet cards, and optical cards in the Cisco ONS 15310-CL and Cisco ONS 15310-MA. For information about enabling and viewing PM parameters, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Chapter topics include: • 12.1 Threshold Performance Monitoring, page 12-2 • 12.2 Intermediate-Path Performance Monitoring, page 12-3 • 12.3 Pointer Justification Count Performance Monitoring, page 12-3 • 12.4 Performance Monitoring Parameter Definitions, page 12-4 • 12.5 Performance Monitoring for Electrical Ports, page 12-10 • 12.6 Performance Monitoring for Ethernet Cards, page 12-15 • 12.7 Performance Monitoring for Optical Ports, page 12-20 Note For additional information regarding PM parameters, refer to Telcordia’s GR-1230-CORE, GR-499-CORE, and GR-253-CORE documents, the Telcordia GR-820-CORE document titled Generic Digital Transmission Surveillance, and the ANSI T1.231 document entitled Digital Hierarchy - Layer 1 In-Service Digital Transmission Performance Monitoring.12-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.1 Threshold Performance Monitoring 12.1 Threshold Performance Monitoring Thresholds are used to set error levels for each PM parameter. You can program PM parameter threshold ranges from the Provisioning > Line Thresholds tab in card view. For procedures for provisioning card thresholds, such as line, path, and SONET thresholds, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. During the accumulation cycle, if the current value of a PM parameter reaches or exceeds its corresponding threshold value, a threshold crossing alert (TCA) is generated by the node and is sent to CTC. TCAs provide early detection of performance degradation. When a threshold is crossed, the node continues to count the errors during a given accumulation period. If 0 is entered as the threshold value, the PM parameter is disabled. Change the threshold if the default value does not satisfy your error monitoring needs. For example, customers with a critical DS-1 installed for 911 calls must guarantee the best quality of service on the line; therefore, they lower all thresholds so that the slightest error raises a TCA. When TCAs occur, CTC displays them in the Alarms tab. For example, in Figure 12-1, T-UASP-P is shown under the Cond column. The “T-” indicates a threshold crossing alert. For the DS-1 and DS-3/EC-1 electrical ports on the 15310-CL-CTX card and the 15310-MA DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards, RX or TX is appended to the TCA description (see the red circles in Figure 12-1). RX indicates that the TCA is associated with the receive direction, and TX indicates the TCA is associated with the transmit direction. Figure 12-1 TCAs Displayed in CTC For electrical ports, only the receive direction is detected and appended to TCA descriptions. The DS-1 and DS-3/EC-1 ports for which RX is appended to TCA descriptions are shown in Table 12-1.12-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.2 Intermediate-Path Performance Monitoring 12.2 Intermediate-Path Performance Monitoring Intermediate-path performance monitoring (IPPM) allows transparent monitoring of a constituent channel of an incoming transmission signal by a node that does not terminate that channel. You can program IPPM from the Provisioning > Optical > SONET STS tab in card view. Many large ONS 15310-CL and ONS 15310-MA networks only use line terminating equipment (LTE), not path terminating equipment (PTE). Software Release 5.0 and later allows monitoring of near-end PM parameter data on individual STS payloads by enabling IPPM. After enabling IPPM provisioning on the line card, service providers can monitor large amounts of synchronous transport signal (STS) traffic through intermediate nodes, thus making troubleshooting and maintenance activities more efficient. IPPM occurs only on STS paths that have IPPM enabled, and TCAs are raised only for PM parameters on the selected IPPM paths. The monitored IPPM parameters are STS CV-P, STS ES-P, STS SES-P, STS UAS-P, and STS FC-P. Note Far-end IPPM is not supported. However, SONET path PM parameters can be monitored by logging into the far-end node directly. The ONS 15310-CL and ONS 15310-MA perform IPPM by examining the overhead in the monitored path and by reading all of the near-end path PM parameters in the incoming direction of transmission. The IPPM process allows the path signal to pass bidirectionally through the node completely unaltered. The ONS 15310-MA also supports IPPM for SONET Virtual Tributary (VT). For detailed information about specific PM parameters, locate the card name in the following sections and review the appropriate definition. 12.3 Pointer Justification Count Performance Monitoring Pointers are used to compensate for frequency and phase variations. Pointer justification counts indicate timing errors on SONET networks. When a network is out of sync, jitter and wander occurs on the transported signal. Excessive wander can cause terminating equipment to slip. It also causes slips at the synchronous digital hierarchy (SDH) and plesiochronous digital hierarchy (PDH) boundaries. Slips cause different effects in service. Voice service has intermittent audible clicks. Compressed voice technology has short transmission errors or dropped calls. Fax machines lose scanned lines or experience dropped calls. Digital video transmission has distorted pictures or frozen frames. Encryption service loses the encryption key, causing data to be transmitted again. Table 12-1 Electrical Ports that Report RX Direction for TCAs Port Line Path Near End Far End Near End Far End DS-1 YES YES YES YES DS-3 YES — YES YES EC-1 YES YES YES YES12-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions Pointers provide a way to align the phase variations in STS and VT payloads. The STS payload pointer is located in the H1 and H2 bytes of the line overhead. Clocking differences are measured by the offset in bytes from the pointer to the first byte of the STS synchronous payload envelope (SPE), called the J1 byte. Clocking differences that exceed the normal range of 0 to 782 can cause data loss. You can enable positive pointer justification count (PPJC) and negative pointer justification count (NPJC) PM parameters for LTE cards. PPJC is a count of path-detected (PPJC-Pdet) or path-generated (PPJC-Pgen) positive pointer justifications. NPJC is a count of path-detected (NPJC-Pdet) or path-generated (NPJC-Pgen) negative pointer justifications, depending on the specific PM parameter. A consistent pointer justification count indicates clock synchronization problems between nodes. A difference between the counts means that the node transmitting the original pointer justification has timing variations with the node detecting and transmitting this count. Positive pointer adjustments occur when the frame rate of the SPE is too slow in relation to the rate of the STS 1. For pointer justification count definitions, depending on the cards in use, see the “12.7.1 OC-3 Port Performance Monitoring Parameters” section on page 12-20 and the “12.7.2 OC-12 Port Performance Monitoring Parameters” section on page 12-22. In CTC, the count fields for PPJC and NPJC PM parameters appear white and blank unless they are enabled on the Provisioning > Optical > Line tab PJStsMon# drop-down list. 12.4 Performance Monitoring Parameter Definitions Table 12-2 gives a definition for each type of PM parameter found in the ONS 15310-CL and ONS 15310-MA. Table 12-2 Performance Monitoring Parameters Parameter Definition AISS-P Alarm Indication Signal Seconds Path (AISS-P) is a count of one-second intervals containing one or more AIS defects. CV-L Line Code Violations (CV-L) indicates the number of coding violations occurring on the line. This parameter is a count of bipolar violations (BPVs) and excessive zeros (EXZs) occurring over the accumulation period. CV-LFE Far-End Line Coding Violations (CV-LFE) is a count of BIP errors detected by the far-end LTE and reported back to the near-end LTE using the Line Remote Error Indication (REI-L) in the line overhead. For SONET signals at rates below OC-48, up to 8 x n BIP errors per STS-N frame can be indicated using the REI-L indication. For OC-48 signals, up to 255 BIP errors per STS-N frame can be indicated. The current CV-L second register is incremented for each BIP error indicated by the incoming REI-L. CV-P Near-End STS Path Coding Violations (CV-P) is a count of BIP errors detected at the STS path layer (that is, using the B3 byte). Up to eight BIP errors can be detected per frame; each error increments the current CV-P second register. CV-PFE Far-End STS Path Coding Violations (CV-PFE) is a count of BIP errors detected at the STS path layer (that is, using the B3 byte). Up to eight BIP errors can be detected per frame; each error increments the current CV-PFE second register.12-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions CV-S Section Coding Violations (CV-S) is a count of bit interleaved parity (BIP) errors detected at the section-layer (that is, using the B1 byte in the incoming SONET signal). Up to eight section BIP errors can be detected per STS-N frame; each error increments the current CV-S second register. CV-V VT Layer Coding Violations (CV-V) is a count of the BIP errors detected at the VT path layer. Up to two BIP errors can be detected per VT superframe, with each error incrementing the current CV-V second register. CV-VFE Far-End VT Path Coding Violations (CV-VFE) is a count of the number of BIP errors detected by the far-end VT PTE and reported back to the near-end VT PTE using the VT Layer REI (REI-V) in the VT path overhead. Only one BIP error can be indicated per VT superframe using the REI-V bit. The current CV-VFE second register is incremented for each BIP error indicated by the incoming REI-V. ES-L Line Errored Seconds (ES-L) is a count of the seconds containing one or more anomalies (BPV + EXZ) and/or defects (that is, loss of signal) on the line. ES-LFE ES-LFE is a count of the seconds when at least one line-layer BIP error was reported by the far-end LTE or a RDI-L defect was present. ES-P Near-End STS Path Errored Seconds (ES-P) is a count of the seconds when at least one STS path BIP error was detected. An AIS-P defect (or a lower-layer, traffic-related, near-end defect) or an LOP-P defect can also cause an ES-P. ES-PFE Far-End STS Path Errored Seconds (ES-PFE) is a count of the seconds when at least one STS path BIP error was detected. An AIS-P defect (or a lower-layer, traffic-related, far-end defect) or an LOP-P defect can also cause an STS ES-PFE. ES-S Section Errored Seconds (ES-S) is a count of the number of seconds when at least one section-layer BIP error was detected or a severely errored frame (SEF) or loss of signal (LOS) defect was present. ES-V Errored Seconds VT Layer (ES-V) is a count of the seconds when at least one VT Path BIP error was detected. An AIS-V defect (or a lower-layer, traffic-related, near-end defect) or an LOP-V defect can also cause an ES-V. ES-VFE Far-End VT Path Errored Seconds (ES-VFE) is a count of the seconds when at least one VT path BIP error was reported by the far-end VT PTE, or a one-bit RDI-V defect is present. FC-L Line Failure Count (FC-L) is a count of the number of near-end line failure events. A failure event begins when an AIS-L failure is declared or when a lower-layer, traffic-related, near-end failure is declared. This failure event ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period where it begins. Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions FC-LFE FC-LFE is a count of the number of far-end line failure events. A failure event begins when an RFI-L failure is declared, and it ends when the RFI-L failure clears. A failure event that begins in one period and ends in another period is counted only in the period where it began. FC-P Near-End STS Path Failure Counts (FC-P) is a count of the number of near-end STS path failure events. A failure event begins when an AIS-P failure, an LOP-P failure, a UNEQ-P failure, or a TIM-P failure is declared. A failure event also begins if the STS PTE that is monitoring the path supports ERDI-P for that path. The failure event ends when these failures are cleared. FC-PFE Far-End STS Path Failure Counts (FC-PFE) is a count of the number of near-end STS path failure events. A failure event begins when an AIS-P failure, an LOP-P failure, a UNEQ-P failure, or a TIM-P failure is declared. A failure event also begins if the STS PTE that is monitoring the path supports ERDI-P for that path. The failure event ends when these failures are cleared. LBC-HIGH Laser Bias Current—High (LBC-HIGH) is the highest percentage of laser bias current measured. LBC-LOW Laser Bias Current—LOW (LBC-LOW) is the lowest percentage of laser bias current measured. LOSS-L Line Loss of Signal (LOSS-L) is a count of one-second intervals containing one or more LOS defects. NPJC-PDET Negative Pointer Justification Count, STS Path Detected (NPJC-PDET). NPJC-PDET-P Negative Pointer Justification Count, STS Path Detected (NPJC-PDET-P) is a count of the negative pointer justifications detected on a particular path in an incoming SONET signal. NPJC-PGEN-P Negative Pointer Justification Count, STS Path Generated (NPJC-PGEN-P) is a count of the negative pointer justifications generated for a particular path to reconcile the frequency of the SPE with the local clock. OPR-HIGH Optical Power Received—High (OPR-HIGH) is the measure of highest optical power received as a percentage of the nominal OPR. OPR-LOW Optical Power Received—Low (OPR-LOW) is the measure of lowest optical power received as a percentage of the nominal OPR. OPT-HIGH Optical Power Transmitted—High (OPT-HIGH) is the measure of highest optical power transmitted as a percentage of the nominal OPT. OPT-LOW Optical Power Transmitted—Low (OPT-LOW) is the measure of lowest optical power transmitted as a percentage of the nominal OPT. PJC-DIFF-P Pointer Justification Count Difference, STS Path (PJC-DIFF-P) is the absolute value of the difference between the total number of detected pointer justification counts and the total number of generated pointer justification counts. That is, PJC-DIFF-P is equal to (PPJC-PGEN – NPJC-PGEN) – (PPJC-PDET – NPJC-PDET). Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions PJCS-PDET-P Pointer Justification Count Seconds, STS Path Detected (PJCS-PDET-P) is a count of the one-second intervals containing one or more PPJC-PDET or NPJC-PDET. PJCS-PGEN-P Pointer Justification Count Seconds, STS Path Generated (PJCS-PGEN-P) is a count of the one-second intervals containing one or more PPJC-PGEN or NPJC-PGEN. PPJC-PDET Positive Pointer Justification Count, STS Path Detected (PPJC-PDET) is a count of the positive pointer justifications detected on a particular path on an incoming SONET signal. PPJC-PDET-P Positive Pointer Justification Count, STS Path Detected (PPJC-PDET-P) is a count of the positive pointer justifications detected on a particular path in an incoming SONET signal. PPJC-PGEN-P Positive Pointer Justification Count, STS Path Generated (PPJC-PGEN-P) is a count of the positive pointer justifications generated for a particular path to reconcile the frequency of the SPE with the local clock. PSC (1+1) In a 1+1 protection scheme for a working card, Protection Switching Count (PSC) is a count of the number of times service switches from a working card to a protection card plus the number of times service switches back to the working card. For a protection card, PSC is a count of the number of times service switches to a working card from a protection card plus the number of times service switches back to the protection card. The PSC PM is only applicable if revertive line-level protection switching is used. PSC (BLSR) For a protect line in a two-fiber bidirectional line switched ring (BLSR), PSC refers to the number of times a protection switch has occurred either to a particular span's line protection or away from a particular span's line protection. Therefore, if a protection switch occurs on a two-fiber BLSR, the PSC of the protection span to which the traffic is switched will increment, and when the switched traffic returns to its original working span from the protect span, the PSC of the protect span will increment again. PSD Protection Switching Duration (PSD) applies to the length of time, in seconds, that service is carried on another line. For a working line, PSD is a count of the number of seconds that service was carried on the protection line. For the protection line, PSD is a count of the seconds that the line was used to carry service. The PSD PM is only applicable if revertive line-level protection switching is used. Rx AISS-P Receive Path Alarm Indication Signal (Rx AISS-P) means that an AIS occurred on the receive end of the path. This parameter is a count of seconds containing one or more AIS defects. Rx CSS-P Receive Path Controlled Slip Seconds (Rx CSS-P) is a count of seconds during which a controlled slip has occurred. Counts of controlled slips can be accurately made only in the path terminating network element (NE) of the DS-1 signal where the controlled slip takes place. Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions Rx CV-P Receive Path Coding Violation (Rx CV-P) means that a coding violation occurred on the receive end of the path. For DS-1 extended super frame (ESF) paths, this parameter is a count of detected cyclic redundancy check (CRC)-6 errors. For the DS-1 super frame (SF) paths, the Rx CV-P parameter is a count of detected frame-bit errors (FE). Rx ES-P Receive Path Errored Seconds (Rx ES-P) is a count of the seconds containing one or more anomalies and/or defects for paths on the receive end of the signal. For DS1-ESF paths, this parameter is a count of one-second intervals containing one or more CRC-6 errors, one or more convergence sublayer (CS) events, or one or more SEF or AIS defects. For DS-1 SF paths, the Rx ES-P parameter is a count of one-second intervals containing one or more FE events, one or more CS events, or one or more SEF or AIS defects. Rx ESA-P Errored Second Type A is a count of one second intervals with exactly one CRC-6 error and no SEF or AIS defects. Rx ESB-P Errored Second Type B is a count of one second intervals with no less than 2 and no more than 319 CRC-6 errors, no SEF defects, and no AIS defects. Rx SAS-P Receive Path Severely Errored Seconds Frame/Alarm Indication Signal (Rx SAS-P) is a count of one-second intervals containing one or more SEFs or one or more AIS defects on the receive end of the signal. Rx SEFS-P Receive Path Severely Errored Frame-Path (SEFS-P) is a count of one-second performance report message (PRM) intervals containing an SE=1. Rx SES-P Receive Path Severely Errored Seconds (Rx SES-P) is a count of the seconds containing more than a particular quantity of anomalies and/or defects for paths on the receive end of the signal. For the DS1-ESF paths, this parameter is a count of seconds when 320 or more CRC-6 errors or one or more SEF or AIS defects occurred. For DS1-SF paths, SES is a second containing either the occurrence of four FEs or one or more SEF or AIS defects. Rx UAS-P Receive Path Unavailable Seconds (Rx UAS-P) is a count of one-second intervals when the DS-1 path is unavailable on the receive end of the signal. The DS-1 path is unavailable at the onset of 10 consecutive seconds that qualify as SESs, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ps. The ten seconds with no SES-Ps are excluded from unavailable time. SEFS-S Severely Errored Framing Seconds (SEFS-S) is a count of the seconds when an SEF defect was present. An SEF defect is expected to be present during most seconds when an LOS or loss of frame (LOF) defect is present. However, there can be situations when the SEFS-S parameter is only incremented based on the presence of the SEF defect. SES-L Line Severely Errored Seconds (SES-L) is a count of the seconds containing more than a particular quantity of anomalies (BPV + EXZ > 1544) and/or defects on the line. Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.4 Performance Monitoring Parameter Definitions SES-LFE SES-LFE is a count of the seconds when K (see Telcordia GR-253-CORE for values) or more line-layer BIP errors were reported by the far-end LTE or an RDI-L defect was present. SES-P Near-End STS Path Severely Errored Seconds (SES-P) is a count of the seconds when K (2400) or more STS path BIP errors were detected. An AIS-P defect (or a lower-layer, traffic-related, near-end defect) or an LOP-P defect can also cause an SES-P. SES-PFE Far-End STS Path Severely Errored Seconds (SES-PFE) is a count of the seconds when K (2400) or more STS path BIP errors were detected. An AIS-P defect (or a lower-layer, traffic-related, far-end defect) or an LOP-P defect can also cause an SES-PFE. SES-S Section Severely Errored Seconds (SES-S) is a count of the seconds when K (see Telcordia GR-253 for value) or more section-layer BIP errors were detected or an SEF or LOS defect was present. SES-V Severely Errored Seconds VT Layer (SES-V) is a count of seconds when K (600) or more VT Path BIP errors were detected. An AIS-V defect (or a lower-layer, traffic-related, near-end defect) or an LOP-V defect can also cause SES-V. SES-VFE Far-End VT Path Severely Errored Seconds (SES-VFE) is a count of the seconds when K (600) or more VT path BIP errors were reported by the far-end VT PTE or a one-bit RDI-V defect was present. Tx AISS-P Transmit Path Alarm Indication Signal Seconds (Tx AISS-P) means that an alarm indication signal occurred on the transmit end of the path. This parameter is a count of seconds containing one or more AIS defects. Tx CV-P Transmit Path Coding Violation (Tx CV-P) means that a coding violation occurred on the transmit end of the path. For DS-1 ESF paths, this parameter is a count of detected CRC-6 errors. For the DS-1 SF paths, the Tx CV-P parameter is a count of detected FEs. Tx ES-P Transmit Path Errored Seconds (Tx ES-P) is a count of the seconds containing one or more anomalies and/or defects for paths on the transmit end of the signal. For DS-1 ESF paths, this parameter is a count of one-second intervals containing one or more CRC-6 errors, one or more CS events, or one or more SEF or AIS defects. For DS-1 SF paths, the Tx ES-P parameter is a count of one-second intervals containing one or more FE events, one or more CS events, or one or more SEF or AIS defects. Tx SAS-P Transmit Path Severely Errored Seconds Frame/Alarm Indication Signal (Tx SAS-P) is a count of one-second intervals containing one or more SEFs or one or more AIS defects on the transmit end of the signal. Tx SES-P Transmit Path Severely Errored Seconds (Tx SES-P) is a count of the seconds containing more than a particular quantity of anomalies and/or defects for paths on the transmit end of the signal. For the DS-1 ESF paths, this parameter is a count of seconds when 320 or more CRC-6 errors or one or more SEF or AIS defects occurred. For DS-1 SF paths, an SES is a second containing either the occurrence of four FEs or one or more SEF or AIS defects. Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.5 Performance Monitoring for Electrical Ports 12.5 Performance Monitoring for Electrical Ports The following sections define PM parameters for the DS-1 and DS-3 electrical ports. 12.5.1 DS-1 Port Performance Monitoring Parameters Figure 12-2 shows the signal types that support near-end and far-end PM parameters. Tx UAS-P Transmit Path Unavailable Seconds (Tx UAS-P) is a count of one-second intervals when the DS-1 path is unavailable on the transmit end of the signal. The DS-1 path is unavailable at the onset of 10 consecutive seconds that qualify as SESs, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SESs. UAS-L Line Unavailable Seconds (UAS-L) is a count of the seconds when the line is unavailable. A line becomes unavailable when ten consecutive seconds occur that qualify as SES-Ls, and it continues to be unavailable until ten consecutive seconds occur that do not qualify as SES-Ls. UAS-LFE UAS-LFE is a count of the seconds when the line is unavailable at the far end. A line becomes unavailable at the onset of ten consecutive seconds that qualify as SES-LFEs, and continues to be unavailable until the onset of ten consecutive seconds occur s that do not qualify as SES-LFEs. UAS-P Near-End STS Path Unavailable Seconds (UAS-P) is a count of the seconds when the STS path was unavailable. An STS path becomes unavailable when ten consecutive seconds occur that qualify as SES-Ps, and continues to be unavailable until ten consecutive seconds occur that do not qualify as SES-Ps. UAS-PFE Far-End STS Path Unavailable Seconds (UAS-PFE) is a count of the seconds when the STS path was unavailable. An STS path becomes unavailable when ten consecutive seconds occur that qualify as SES-PFEs, and continues to be unavailable until ten consecutive seconds occur that do not qualify as SES-PFEs. UAS-V VT Layer Unavailable Seconds (UAS-V) is a count of the seconds when the VT path was unavailable. A VT path becomes unavailable when ten consecutive seconds occur that qualify as SES-Vs, and it continues to be unavailable until ten consecutive seconds occur that do not qualify as SES-Vs. UAS-VFE Far-End VT Path Unavailable Seconds (UAS-VFE) is a count of the seconds when the VT path is unavailable at the far-end. A VT path is considered unavailable at the onset of ten consecutive seconds that qualify as SES-VFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-VFEs. Table 12-2 Performance Monitoring Parameters (continued) Parameter Definition12-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.5.1 DS-1 Port Performance Monitoring Parameters Figure 12-2 Monitored Signal Types for the DS-1 Ports Note The XX in Figure 12-2 represents all PM parameters listed in Figure 12-3 with the given prefix and/or suffix. Figure 12-3 shows where overhead bytes detected on the application-specific integrated circuits (ASICs) produce PM parameters for the DS-1 ports. Figure 12-3 PM Parameter Read Points on the DS-1 Ports ONS 15310 PTE DS1 OC-N Fiber DS1 Signal DS1 Path (DS1 XX) PMs Near and Far End Supported DS1 Signal ONS 15310 OC-N DS1 VT Path (XX-V) PMs Near and Far End Supported STS Path (STS XX-P) PMs Near and Far End Supported PTE 124439 ONS 15310 DS1 Ports LIU Framer BTC Tx/Rx Cross Connect OC-N DS1 CV-L DS1 ES-L DS1 SES-L DS1 LOSS-L DS1 Rx AISS-P DS1 Rx CV-P DS1 Rx ES-P DS1 Rx SAS-P DS1 Rx SES-P DS1 Rx UAS-P DS1 Tx AISS-P DS1 Tx CV-P DS1 Tx ES-P DS1 Tx SAS-P DS1 Tx SES-P DS1 Tx UAS-P PMs read on LIU DS1 Side VT Level Path Level SONET Side CV-V ES-V SES-V UAS-V STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P STS CV-PFE STS ES-PFE STS FC-PFE STS SES-PFE STS UAS-PFE PMs read on Framer 12444012-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.5.2 DS-3 Port Performance Monitoring Parameters The PM parameters for the DS-1 ports are listed in Table 12-3. Note Under the Provisioning > DS1 > SONET Threshold tab, the 15310-CL-CTX, DS1-28/DS3-EC1-3, and DS1-84/DS3-EC1-3 cards have user-defined thresholds for the DS-1 receive (Rx) path PM parameters. In the SONET Threshold tab they appear as CV, ES, FC, SES, and UAS without the Rx prefix. Note Under the Performance tab, the displayed DS-1 Tx path PM parameter values are based on calculations performed by the card and therefore have no user-defined thresholds. The tab is labeled Elect[rical] Path Threshold. 12.5.2 DS-3 Port Performance Monitoring Parameters Figure 12-4 shows the signal types that support near-end and far-end PM parameters. Figure 12-4 Monitored Signal Types for the DS-3 Ports Note The XX in Figure 12-4 represents all PM parameters listed in Figure 12-5 with the given prefix and/or suffix. Table 12-3 PM Parameters for DS-1 Ports Line (NE) Rx Path (NE) Tx Path (NE) VT Path (NE) STS Path (NE) VT Path (FE) STS Path (FE) CV-L ES-L SES-L LOSS-L AISS-P CV-P ES-P FC-P SAS-P SES-P UAS-P CSS-P ESA-P ESB-P SEFS-P AISS-P CV-P ES-P FC-P SAS-P SES-P UAS-P CV-V ES-V FC-V SES-V UAS-V CV-P ES-P FC-P SES-P UAS-P FC-P CV-VFE ES-VFE SES-VFE UAS-VFE CV-PFE ES-PFE SES-PFE UAS-PFE FC-PFE ONS 15310 PTE DS3 OC-N Fiber DS3 Signal DS3 Path (DS3 XX) PMs Near and Far End Supported DS3 Signal ONS 15310 OC-N DS3 STS Path (STS XX-P) PMs Near and Far End Supported PTE 12444112-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.5.3 EC-1 Port Performance Monitoring Parameters Figure 12-5 shows where overhead bytes detected on the ASICs produce PM parameters for the DS-3 ports. Figure 12-5 PM Parameter Read Points on the DS-3 Ports The PM parameters for the DS-3 ports are listed in Table 12-4. 12.5.3 EC-1 Port Performance Monitoring Parameters Figure 12-6 shows signal types that support near-end and far-end PM parameters. Figure 12-7 shows where overhead bytes detected on the ASICs produce PM parameters for the EC1 port. ONS 15310 DS3 Ports LIU Mux/Demux ASIC BTC ASIC Cross Connect OC-N DS3 Side Path Level SONET Side STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P STS CV-PFE STS ES-PFE STS FC-PFE STS SES-PFE STS UAS-PFE DS3 CV-L DS3 ES-L DS3 SES-L DS3 LOSS-L PMs read on Mux/Demux ASIC PMs read on LIU 124442 Table 12-4 Parameters for DS-3 Ports Line (NE) Path (NE) STS Path (NE) Path (FE)1 1. The C-bit PM parameters (PM parameters that end in “CPP”) are applicable only if the line format is C-bit. STS Path (FE) CV-L ES-L SES-L LOSS-L AISS-P CVP-P ESP-P SASP-P SESP-P UASP-P CVCP-P ESCP-P SASCP-P SESCP-P UASCP-P CV-P ES-P SES-P UAS-P FC-P CVCP-PFE ESCP-PFE SASCP-PFE SESCP-PFE UASCP-PFE CV-PFE ES-PFE SES-PFE UAS-PFE FC-PFE12-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.5.3 EC-1 Port Performance Monitoring Parameters Figure 12-6 Monitored Signal Types for the EC-1 Port Note The XX in Figure 12-6 represents all PM parameters listed in Table 12-5 with the given prefix and/or suffix. Figure 12-7 PM Read Points on the EC-1 Port Table 12-5 lists the PM parameters for the EC-1 ports. 124453 ONS 15310 PTE EC1 OC-N Fiber EC1 Signal EC1 Path (EC1 XX) PMs Near and Far End Supported EC1 Signal ONS 15310 OC-N EC1 STS Path (STS XX-P) PMs Near and Far End Supported PTE 124454 ONS 15310 EC1 LIU Framer BTC Tx/Rx XC10G Card OC-N EC1 Side SONET Side STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P STS CV-PFE STS ES-PFE STS FC-PFE STS SES-PFE STS UAS-PFE CV-S ES-S SES-S SEFS-S CV-L SES-L ES-L UAS-L FC-L PPJC-Pdet NPJC-Pdet PPJC-Pgen NPJC-Pgen PMs read on LIU PMs read on Framer12-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.6 Performance Monitoring for Ethernet Cards 12.6 Performance Monitoring for Ethernet Cards The following sections define PM parameters and definitions for the CE-100T-8 and ML-100T-8 Ethernet cards. 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters CTC provides Ethernet performance information, including line-level parameters, port bandwidth consumption, and historical Ethernet statistics. The CE-100T-8 and ML-100T-8 card Ethernet performance information is divided into Ether Ports and POS Ports tabbed windows within the card view Performance tab window. 12.6.1.1 CE-100T-8 and ML-100T-8 Card Ether Ports Statistics Window The Ether Ports statistics window lists Ethernet parameters at the line level. The Ether Ports Statistics window provides buttons to change the statistical values shown. The Baseline button resets the displayed statistics values to zero. The Refresh button manually refreshes statistics. Auto-Refresh sets a time interval at which automatic refresh occurs. The window also has a Clear button. The Clear button sets the values on the card to zero, but does not reset the CE-100T-8 and ML-100T-8 cards. During each automatic cycle, whether auto-refreshed or manually refreshed (using the Refresh button), statistics are added cumulatively and are not immediately adjusted to equal total received packets until testing ends. To see the final PM count totals, allow a few moments for the PM window statistics to finish testing and update fully. PM counts are also listed in the CE-100T-8 and ML-100T-8 card Performance > History window. Table 12-6 defines the CE-100T-8 and ML-100T-8 card Ether Ports statistics parameters. Table 12-5 EC-1 Port PM Parameters Section (NE) Line (NE) STS Path (NE) Line (FE) STS Path (FE) CV-S ES-S SES-S SEFSCV-L ES-L SES-L UAS-L FC-L CV-P ES-P SES-P UAS-P FC-P PPJC-PDET-P NPJC-PDET-P PPJC-PGEN-P NPJC-PGEN-P PJCS-PDET-P PJCS-PGEN-P PJC-DIFF-P CV-LFE ES-LFE SES-LFE UAS-LFE FC-LFE CV-PFE ES-PFE SES-PFE UAS-PFE FC-PFE12-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters Table 12-6 CE-100T-8 and ML-100T-8 Ether Ports Statistics Parameters Parameter Definition Time Last Cleared A time stamp indicating the last time statistics were reset. Link Status Indicates whether the Ethernet link is receiving a valid Ethernet signal (carrier) from the attached Ethernet device; up means present, and down means not present. iflnOctets The total number of octets received on the interface, including framing octets. txTotalPkts The total number of transmit packets. rxTotalPkts The total number of receive packets. iflnUcastPkts The total number of unicast packets delivered to an appropriate protocol. ifInMulticastPkts Number of multicast frames received error free. ifInBroadcastPkts The number of packets, delivered by this sublayer to a higher (sub)layer, that were addressed to a broadcast address at this sublayer. ifInDiscards The number of inbound packets that were chosen to be discarded even though no errors had been detected to prevent them from being deliverable to a higher-layer protocol. iflnErrors Number of inbound packets discarded because they contain errors. ifOutOctets The total number of transmitted octets, including framing packets. ifOutUcastPkts The total number of unicast packets requested to transmit to a single address. ifOutMulticastPkts Number of multicast frames transmitted error free. ifOutBroadcastPkts The total number of packets that higher-level protocols requested be transmitted, and that were addressed to a broadcast address at this sublayer, including those that were discarded or not sent. dot3statsAlignmentErrors The number of frames with an alignment error, that is, frames with a length that is not an integral number of octets and where the frame cannot pass the frame check sequence (FCS) test. dot3StatsFCSErrors The number of frames with frame check errors, that is, where there is an integral number of octets, but an incorrect FCS. dot3StatsSingleCollisionFrames The number of successfully transmitted frames that had exactly one collision. dot3StatsFrameTooLong The count of frames received on a particular interface that exceed the maximum permitted frame size. etherStatsUndersizePkts The number of packets received with a length less than 64 octets. etherStatsFragments The total number of packets that are not an integral number of octets or have a bad FCS, and that are less than 64 octets long. etherStatsPkts64Octets The total number of packets received (including error packets) that were 64 octets in length. etherStatsPkts65to127Octets The total number of packets received (including error packets) that were 65 to 172 octets in length.12-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters 12.6.1.2 CE-100T-8 and ML-100T-8 Card Ether Ports Utilization Window The Ether Ports Utilization window shows the percentage of Tx and Rx line bandwidth used by the Ethernet ports during consecutive time segments. The Ether Ports Utilization window provides an Interval drop-down list that enables you to set time intervals of 1 minute, 15 minutes, 1 hour, and 1 day. Line utilization for Ethernet ports is calculated with the following formulas: Rx = (inOctets + inPkts * 20) * 8 / 100% interval * maxBaseRate Tx = (outOctets + outPkts * 20) * 8 / 100% interval * maxBaseRate The interval is defined in seconds. The maxBaseRate is defined by raw bits per second in one direction for the Ethernet port (that is, 1 Gbps). The maxBaseRate for CE-100T-8 and ML-100T-8 Ethernet cards is shown in Table 12-7. etherStatsPkts128to255Octets The total number of packets received (including error packets) that were 128 to 255 octets in length. etherStatsPkts256to511Octets The total number of packets received (including error packets) that were 256 to 511 octets in length. etherStatsPkts512to1023Octets The total number of packets received (including error packets) that were 512 to 1023 octets in length. etherStatsPkts1024to1518Octets The total number of packets received (including error packets) that were 1024 to 1518 octets in length. etherStatsBroadcastPkts The total number of good packets received that were directed to the broadcast address. This does not include multicast packets. etherStatsMulticastPkts The total number of good packets received that were directed to a multicast address. This number does not include packets directed to the broadcast. etherStatsOversizePkts The total number of packets received that were longer than 1518 octets (excluding framing bits, but including FCS octets) and were otherwise well formed. etherStatsJabbers The total number of packets longer than 1518 octets that were not an integral number of octets or had a bad FCS. etherStatsOctets The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). etherStatsCollisions The best estimate of the total number of collisions on this segment. etherStatsCRCAlignErrors The total number of packets with a length between 64 and 1518 octets, inclusive, that had a bad FCS or were not an integral number of octets in length. etherStatsDropEvents The total number of events in which packets were dropped by the probe due to lack of resources. This number is not necessarily the number of packets dropped; it is just the number of times this condition has been detected. Table 12-6 CE-100T-8 and ML-100T-8 Ether Ports Statistics Parameters (continued) Parameter Definition12-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters Note Line utilization numbers express the average of ingress and egress traffic as a percentage of capacity. 12.6.1.3 CE-100T-8 and ML-100T-8 Card Ether Ports History Window The Ether Ports History window lists past Ethernet statistics for the previous time intervals. Depending on the selected time interval, the Ether Ports History window displays the statistics for each port for the number of previous time intervals as shown in Table 12-8. The parameters are defined in Table 12-6 on page 12-16. 12.6.1.4 CE-100T-8 and ML-100T-8 Card POS Ports Statistics Parameters In the CE-100T-8 and ML-100T-8 POS Ports window, the parameters that appear depend on the framing mode employed by the cards. The two framing modes for the packet-over-SONET (POS) port on the CE-100T-8 and ML-100T-8 cards are high-level data link control (HDLC) and frame-mapped generic framing procedure (GFP-F). For more information on provisioning a framing mode, refer to Cisco ONS 15310-CL Procedure Guide The POS Ports statistics window lists POS parameters at the line level. Table 12-9 defines the CE-100T-8 and ML-100T-8 card POS ports parameters for HDLC mode. Table 12-7 maxBaseRate for STS Circuits STS maxBaseRate STS-1 51840000 STS-3c 155000000 STS-6c 311000000 STS-12c 622000000 Table 12-8 Ethernet History Statistics per Time Interval Time Interval Number of Intervals Displayed 1 minute 60 previous time intervals 15 minutes 32 previous time intervals 1 hour 24 previous time intervals 1 day (24 hours) 7 previous time intervals Table 12-9 CE-100T-8 and ML-100T-8 POS Ports Parameters for HDLC Mode Parameter Definition Time Last Cleared A time stamp indicating the last time statistics were reset. Link Status Indicates whether the Ethernet link is receiving a valid Ethernet signal (carrier) from the attached Ethernet device; up means present, and down means not present. iflnOctets The total number of octets received on the interface, including framing octets.12-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.6.1 CE-100T-8 and ML-100T-8 Card Ethernet Performance Monitoring Parameters Table 12-10 defines the CE-100T-8 and ML-100T-8 card POS ports parameter for GFP-F mode. txTotalPkts The total number of transmit packets. ifInDiscards The number of inbound packets that were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. iflnErrors Number of inbound packets discarded because they contain errors. ifOutOctets The total number of transmitted octets, including framing packets. rxTotalPkts The total number of receive packets. ifOutOversizePkts Number of packets larger than 1518 bytes sent out into SONET. Packets larger than 1600 bytes do not get transmitted. mediaIndStatsRxFramesBadCRC A count of the received Fibre Channel frames with errored CRCs. hdlcRxAborts Number of received packets aborted before input. ifInPayloadCRCErrors The number of receive data frames with payload CRC errors. ifOutPayloadCRCErrors The number of transmit data frames with payload CRC errors. Table 12-9 CE-100T-8 and ML-100T-8 POS Ports Parameters for HDLC Mode (continued) Parameter Definition Table 12-10 CE-100T-8 and ML-100T-8 POS Ports Parameters for GFP-F Mode Parameter Definition Time Last Cleared A time stamp indicating the last time statistics were reset. Link Status Indicates whether the Ethernet link is receiving a valid Ethernet signal (carrier) from the attached Ethernet device; up means present, and down means not present. iflnOctets The total number of octets received on the interface, including framing octets. txTotalPkts The total number of transmit packets. ifInDiscards The number of inbound packets that were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. iflnErrors Number of inbound packets discarded because they contain errors. ifOutOctets The total number of transmitted octets, including framing packets. rxTotalPkts The total number of receive packets. ifOutOversizePkts Number of packets larger than 1518 bytes sent out into SONET. Packets larger than 1600 bytes do not get transmitted. gfpStatsRxSBitErrors Receive frames with single bit errors (cHEC, tHEC, eHEC). gfpStatsRxMBitErrors Receive frames with multibit errors (cHEC, tHEC, eHEC). gfpStatsRxTypeInvalid Receive frames with invalid type (PTI, EXI, UPI). gfpStatsRxCRCErrors Receive data frames with payload CRC errors. gfpStatsRxCIDInvalid Receive frames with invalid CID.12-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7 Performance Monitoring for Optical Ports 12.6.1.5 CE-100T-8 and ML-100T-8 Card POS Ports Utilization Window The POS Ports Utilization window shows the percentage of Tx and Rx line bandwidth used by the POS ports during consecutive time segments. The POS Ports Utilization window provides an Interval drop-down list that enables you to set time intervals of 1 minute, 15 minutes, 1 hour, and 1 day. Line utilization for POS ports is calculated with the following formulas: Rx = (inOctets * 8) / (interval * maxBaseRate) Tx = (outOctets * 8) / (interval * maxBaseRate) The interval is defined in seconds. The maxBaseRate is defined by raw bits per second in one direction for the Ethernet port (that is, 1 Gbps). Refer to Table 12-7 on page 12-18 for maxBaseRate values for STS circuits. Note Line utilization numbers express the average of ingress and egress traffic as a percentage of capacity. 12.6.1.6 CE-100T-8 and ML-100T-8 Card POS Ports History Window The Ethernet POS Ports History window lists past Ethernet POS Ports statistics for the previous time intervals. Depending on the selected time interval, the History window displays the statistics for each port for the number of previous time intervals as shown in Table 12-8 on page 12-18. The listed parameters are defined in Table 12-6 on page 12-16. 12.7 Performance Monitoring for Optical Ports The following sections list the PM parameters for the OC-3, OC-12 and OC-48 ports. The listed parameters are defined in Table 12-2 on page 12-4. 12.7.1 OC-3 Port Performance Monitoring Parameters Figure 12-8 shows the signal types that support near-end and far-end PM parameters. gfpStatsCSFRaised Number of Rx client management frames with client signal fail indication. ifInPayloadCRCErrors The number of receive data frames with payload CRC errors. ifOutPayloadCRCErrors The number of transmit data frames with payload CRC errors. Table 12-10 CE-100T-8 and ML-100T-8 POS Ports Parameters for GFP-F Mode (continued) Parameter Definition12-21 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.1 OC-3 Port Performance Monitoring Parameters Figure 12-8 Monitored Signal Types for the OC-3 Port Figure 12-9 shows where overhead bytes detected on the ASICs produce PM parameters for the OC-3 port. Figure 12-9 PM Parameter Read Points on the OC-3 Port Note For PM locations relating to protection switch counts, see the Telcordia GR-253-CORE document. The PM parameters for the OC-3 ports are listed in Table 12-11. The listed parameters are defined in Table 12-2 on page 12-4. ONS 15310 PTE OC-3 OC-N Fiber OC-3 Signal OC-3 Signal ONS 15310 OC-N OC-3 STS Path (STS XX-P) PMs Near and Far End Supported PTE 124444 ONS 15310 OC-3 Port Pointer Processors BTC ASIC Cross Connect OC-N CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PPJC-Pdet NPJC-Pdet PPJC-Pgen NPJC-Pgen PJC-DIFF-P PJCS-PDET-P PJCS-PGEN-P Path Level STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P STS CV-PFE STS ES-PFE STS FC-PFE STS SES-PFE STS UAS-PFE PMs read on BTC ASIC PMs read on PMC 12444512-22 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.2 OC-12 Port Performance Monitoring Parameters Note For information about troubleshooting path protection switch counts, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. For information about creating circuits that perform a switch, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 12.7.2 OC-12 Port Performance Monitoring Parameters Figure 12-10 shows the signal types that support near-end and far-end PM parameters. Figure 12-11 shows where overhead bytes detected on the ASICs produce PM parameters for the OC-12 ports. Figure 12-10 Monitored Signal Types for the OC-12 Ports Note PM parameters on the protect STS are not supported for BLSR. The XX in Figure 12-10 represents all PM parameters listed in Figure 12-11 with the given prefix and/or suffix. Table 12-11 OC-3 Port PM Parameters Section (NE) Line (NE) STS Path (NE)1 1. In CTC, the count fields for PPJC and NPJC PM parameters appear white and blank unless they are enabled on the Provisioning > Line tab. See the “12.3 Pointer Justification Count Performance Monitoring” section on page 12-3. Physical (NE) Line (FE) STS Path (FE)2 2. SONET path PM parameters do not count unless IPPM is enabled. For additional information see the “12.2 Intermediate-Path Performance Monitoring” section on page 12-3. CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PSC (1+1) PSD CV-P ES-P SES-P UAS-P FC-P PPJC-PDET-P NPJC-PDET-P PPJC-PGEN-P NPJC-PGEN-P PJCDIFF-P PJCS-PDET-P PJCS-PGEN-P OPT-HIGH OPT-LOW OPR-HIGH OPR-LOW LBC-HIGH LBC-LOW CV-LFE ES-LFE SES-LFE UAS-LFE FC-LFE CV-PFE ES-PFE SES-PFE UAS-PFE FC-PFE ONS 15310 PTE OC12 OC-N Fiber OC-12 Signal OC-12 Signal ONS 15310 OC-N OC12 STS Path (STS XX-P) PMs Near and Far End Supported PTE 12444312-23 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.2 OC-12 Port Performance Monitoring Parameters Figure 12-11 PM Parameter Read Points on the OC-12 Ports Note For PM locations relating to protection switch counts, see the Telcordia GR-1230-CORE document. The PM parameters for the OC-12 ports are listed in Table 12-12. The listed parameters are defined in Table 12-2 on page 12-4. ONS 15310 OC-12 Port Pointer Processors BTC ASIC Cross Connect OC-N CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PPJC-Pdet NPJC-Pdet PPJC-Pgen NPJC-Pgen Path Level STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P PPJC-PDET NPJC-PDET PPJC-PGEN NPJC-PGEN PJC-DIFF-P PJCS-PDET-P PJCS-PGEN-P PMs read on BTC ASIC PMs read on PMC 124446 Table 12-12 OC12 Port PM Parameters Section (NE) Line (NE) STS Path (NE)1 2 1. SONET path PM parameters do not count unless IPPM is enabled. For additional information, see the “12.2 Intermediate-Path Performance Monitoring” section on page 12-3. 2. In CTC, the count fields for PPJC and NPJC PM parameters appear white and blank unless they are enabled on the Provisioning > Line tab. See the “12.3 Pointer Justification Count Performance Monitoring” section on page 12-3. Physical (NE) Line (FE) CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PSC (1+1, 2F BLSR) PSD (2F BLSR) CV-P ES-P SES-P UAS-P FC-P PPJC-PDET-P NPJC-PDET-P PPJC-PGEN-P NPJC-PGEN-P PJCDIFF-P PJCS-PDET-P PJCS-PGEN-P OPT-HIGH OPT-LOW OPR-HIGH OPR-LOW LBC-HIGH LBC-LOW CV-LFE ES-LFE SES-LFE UAS-LFE FC-LFE12-24 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.3 OC-48 Port Performance Monitoring Parameters for ONS 15310-MA Note For information about troubleshooting path protection switch counts, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. For information about creating circuits that perform a switch, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. 12.7.3 OC-48 Port Performance Monitoring Parameters for ONS15310-MA Figure 12-12 shows the signal types that support near-end and far-end PM parameters. Figure 12-13 shows where overhead bytes detected on the ASICs produce PM parameters for the OC-48 ports. Figure 12-12 Monitored Signal Types for the OC-48 Ports Note PM parameters on the protect STS are not supported for BLSR. The XX in Figure 12-12 represents all PM parameters listed in Figure 12-13 with the given prefix and/or suffix. PTE ONS 15310-MA OC-48 OC-N Fiber OC-48 Signal OC-48 Signal ONS 15310-MA OC-N OC-48 STS Path (STS XX-P) and VT Path PMs Near and Far End Supported PTE 15157912-25 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.3 OC-48 Port Performance Monitoring Parameters for ONS 15310-MA Figure 12-13 PM Parameter Read Points on the OC-48 Ports Note For PM locations relating to protection switch counts, see the Telcordia GR-1230-CORE document. The PM parameters for the OC-48 ports are listed in Table 12-13. The listed parameters are defined in Table 12-2 on page 12-4. ONS 15310-MA OC-48 Port Pointer Processors BTC ASIC Cross Connect OC-N CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PPJC-Pdet NPJC-Pdet PPJC-Pgen NPJC-Pgen Path Level STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P PPJC-PDET NPJC-PDET PPJC-PGEN NPJC-PGEN PJC-DIFF-P PJCS-PDET-P PJCS-PGEN-P PMs read on BTC ASIC PMs read on PMC 151580 Table 12-13 OC48 Port PM Parameters Section (NE) Line (NE) STS Path (NE)1 2 1. SONET path PM parameters do not count unless IPPM is enabled. For additional information, see the “12.2 Intermediate-Path Performance Monitoring” section on page 12-3. 2. In CTC, the count fields for PPJC and NPJC PM parameters appear white and blank unless they are enabled on the Provisioning > Line tab. See the “12.3 Pointer Justification Count Performance Monitoring” section on page 12-3. Physical (NE) Line (FE) CV-S ES-S SES-S SEFS-S CV-L ES-L SES-L UAS-L FC-L PSC (1+1, 2F BLSR) PSD (2F BLSR) CV-P ES-P SES-P UAS-P FC-P PPJC-PDET-P NPJC-PDET-P PPJC-PGEN-P NPJC-PGEN-P PJCDIFF-P PJCS-PDET-P PJCS-PGEN-P OPT-HIGH OPT-LOW OPR-HIGH OPR-LOW LBC-HIGH LBC-LOW CV-LFE ES-LFE SES-LFE UAS-LFE FC-LFE12-26 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 12 Performance Monitoring 12.7.3 OC-48 Port Performance Monitoring Parameters for ONS 15310-MA Note For information about troubleshooting path protection switch counts, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Troubleshooting Guide. For information about creating circuits that perform a switch, refer to the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide.CHAPTER 13-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 13 SNMP This chapter explains Simple Network Management Protocol (SNMP) as implemented by the Cisco ONS 15310-CL and ONS 15310-MA. For SNMP set up information, refer to the Cisco ONS 15310-CL and ONS 15310-MA Procedure Guide. Chapter topics include: • 13.1 SNMP Overview, page 13-1 • 13.2 SNMP Basic Components, page 13-2 • 13.3 SNMP Proxy Support Over Firewalls, page 13-3 • 13.4 SNMP Version Support, page 13-4 • 13.5 SNMP Management Information Bases, page 13-4 • 13.6 SNMP Traps, page 13-6 • 13.7 SNMP Community Names, page 13-8 • 13.8 SNMP Remote Network Monitoring, page 13-8 • 13.9 CE-100T-8 and ML-100T-8 RMON MIBs, page 13-9 13.1 SNMP Overview SNMP is an application-layer communication protocol that allows network devices to exchange management information. SNMP enables network administrators to manage network performance, find and solve network problems, and plan network growth. Up to 10 SNMP trap destinations and five concurrent Cisco Transport Controller (CTC) user sessions are allowed per node. The ONS 15310-CL and ONS 15310-MA use SNMP to provide asynchronous event notification to a network management system (NMS). ONS SNMP implementation uses standard Internet Engineering Task Force (IETF) management information bases (MIBs) to convey node-level inventory, fault, and performance management information for generic read-only management of DS-1, DS-3, SONET, and Ethernet technologies. SNMP allows limited management of the ONS 15310-CL and ONS 15310-MA by a generic SNMP manager—for example, HP OpenView Network Node Manager (NNM) or Open Systems Interconnection (OSI) NetExpert. The ONS 15310-CL and ONS 15310-MA support SNMP Version 1 (SNMPv1) and SNMP Version 2c (SNMPv2c). Both versions share many features, but SNMPv2c includes additional protocol operations. This chapter describes both versions and explains how to configure SNMP on the ONS 15310-CL and ONS 15310-MA.13-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.2 SNMP Basic Components Note It is recommended that the SNMP Manager timeout value be set to 60 seconds. Under certain conditions, if this value is lower than the recommended time, the TCC card can reset. However, the response time depends on various parameters such as object being queried, complexity, and number of hops in the node, etc. Note The CERENT-MSDWDM-MIB.mib and CERENT-FC-MIB.mib in the CiscoV2 directory support 64-bit performance monitoring counters. However, the SNMPv1 MIB in the CiscoV1 directory does not contain 64-bit performance monitoring counters, but supports the lower and higher word values of the corresponding 64-bit counter. The other MIB files in the CiscoV1 and CiscoV2 directories are identical in content and differ only in format. Figure 13-1 illustrates a basic network managed by SNMP. Figure 13-1 Basic Network Managed by SNMP 13.2 SNMP Basic Components An SNMP-managed network consists of three primary components: managed devices, agents, and management systems. A managed device is a network node that contains an SNMP agent and resides on an SNMP-managed network. Managed devices collect and store management information and use SNMP to make this information available to management systems that use SNMP. Managed devices include routers, access servers, switches, bridges, hubs, computer hosts, and network elements such as the ONS 15310-CL or ONS 15310-MA. An agent is a software module that resides in a managed device. An agent has local knowledge of management information and translates that information into a form compatible with SNMP. The SNMP agent gathers data from the MIB, which is the repository for device parameter and network data. The agent can also send traps, which are notifications of certain events (such as changes), to the manager. Figure 13-2 illustrates these SNMP operations. 5258213-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.3 SNMP Proxy Support Over Firewalls Figure 13-2 SNMP Agent Gathering Data from a MIB and Sending Traps to the Manager A management system such as HP OpenView executes applications that monitor and control managed devices. Management systems provide the bulk of the processing and memory resources required for network management. One or more management systems must exist on any managed network. Figure 13-3 illustrates the relationship between the three key SNMP components. Figure 13-3 Example of the Primary SNMP Components 13.3 SNMP Proxy Support Over Firewalls Firewalls, often used for isolating security risks inside networks or from outside, have traditionally prevented SNMP and other NMS monitoring and control applications from accessing NEs beyond a firewall. An application-level proxy is available at each firewall to transport SNMP protocol data units (PDU) between the NMS and NEs. This proxy, integrated into the firewall NE SNMP agent, exchanges requests and responses between the NMS and NEs and forwards NE autonomous messages to the NMS. The get, get-next, get-bulk Network device get-response, traps 32632 SNMP Manager NMS MIB SNMP Agent Management Entity Agent Management Database Agent NMS Management Database Managed Devices Agent Management Database 3393013-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.4 SNMP Version Support usefulness of the proxy feature is that network operations centers (NOCs) can fetch performance monitoring data such as remote monitoring (RMON) statistics across the entire network with little provisioning at the NOC and no additional provisioning at the NEs. The firewall proxy interoperates with common NMS such as HP-OpenView. It is intended to be used with many NEs through a single NE gateway in a gateway network element (GNE)-end network element (ENE) topology. Up to 64 SNMP requests (such as get, getnext, or getbulk) are supported at any time behind single or multiple firewalls. For security reasons, the SNMP proxy feature must be turned on at all receiving and transmitting NEs to be enabled. For instructions to do this, refer to the Cisco ONS 15310-CL and ONS 15310-MA Procedure Guide. The feature does not interoperate with earlier ONS 15310-CL releases. 13.4 SNMP Version Support The ONS 15310-CL and ONS 15310-MA support SNMP v1 and SNMPv2c traps and get requests. The SNMP MIBs in the ONS 15310-CL define alarms, traps, and status. Through SNMP, NMS applications can query a management agent using a supported MIB. The functional entities include Ethernet switches and SONET multiplexers. Refer to the Cisco ONS 15310-CL and ONS 15310-MA Procedure Guide for procedures to set up or change SNMP settings. 13.5 SNMP Management Information Bases A MIB is a hierarchically organized collection of information. It consists of managed objects and is identified by object identifiers. Network-management protocols, such as SNMP, are able to access to MIBs. The ONS 15310-CL SNMP agent communicates with an SNMP management application using SNMP messages. Table 13-1 describes these messages. A managed object (sometimes called a MIB object) is one of many specific characteristics of a managed device. Managed objects consist of one or more object instances (variables). Table 13-2 lists the IETF standard MIBs implemented in the ONS 15310-CL or ONS 15310-MA SNMP agent. Table 13-1 SNMP Message Types Operation Description get-request Retrieves a value from a specific variable. get-next-request Retrieves the value following the named variable; this operation is often used to retrieve variables from within a table. With this operation, an SNMP manager does not need to know the exact variable name. The SNMP manager searches sequentially to find the needed variable from within the MIB. get-response Replies to a get-request, get-next-request, get-bulk-request, or set-request sent by an NMS. get-bulk-request Fills the get-response with up to the max-repetition number of get-next interactions, similar to a get-next-request. set-request Provides remote network monitoring (RMON) MIB. trap Indicates that an event has occurred. An unsolicited message is sent by an SNMP agent to an SNMP manager.13-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.5 SNMP Management Information Bases The ONS 15310-CL and ONS 15310-MA MIBs in Table 13-3 are included on the software CD that ships with the ONS 15310-CL and ONS 15310-MA. Compile these MIBs in the order listed in Table 13-2 and then Table 13-3. If you do not follow the order, one or more MIB files might not compile. Table 13-2 IETF Standard MIBs Implemented in the ONS 15454, ONS 15327, ONS 15310-CL and ONS 15310-MA SNMP Agent RFC1 Number 1. RFC = Request for Comment Module Name Title/Comments — IANAifType-MIB.mib Internet Assigned Numbers Authority (IANA) ifType 1213 1907 RFC1213-MIB-rfc1213.mib, SNMPV2-MIB-rfc1907.mib Management Information Base for Network Management of TCP/IP-based internets:MIB-II Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) 1253 RFC1253-MIB-rfc1253.mib OSPF Version 2 Management Information Base 1493 BRIDGE-MIB-rfc1493.mib Definitions of Managed Objects for Bridges (This defines MIB objects for managing MAC bridges based on the IEEE 802.1D-1990 standard between Local Area Network (LAN) segments.) 2819 RMON-MIB-rfc2819.mib Remote Network Monitoring Management Information Base 2737 ENTITY-MIB-rfc2737.mib Entity MIB (Version 2) 2233 IF-MIB-rfc2233.mib Interfaces Group MIB using SMIv2 2358 EtherLike-MIB-rfc2358.mib Definitions of Managed Objects for the Ethernet-like Interface Types 2493 PerfHist-TC-MIB-rfc2493.mib Textual Conventions for MIB Modules Using Performance History Based on 15 Minute Intervals 2495 DS1-MIB-rfc2495.mib Definitions of Managed Objects for the DS1, E1, DS2 and E2 Interface Types 2496 DS3-MIB-rfc2496.mib Definitions of Managed Object for the DS3/E3 Interface Type 2558 SONET-MIB-rfc2558.mib Definitions of Managed Objects for the SONET/SDH Interface Type 2674 P-BRIDGE-MIB-rfc2674.mib Q-BRIDGE-MIB-rfc2674.mib Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN Extensions Table 13-3 ONS Proprietary MIBs MIB Number Module Name 1 CERENT-GLOBAL-REGISTRY.mib 2 CERENT-TC.mib 3 CERENT-454.mib (for ONS 15454 only)13-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.6 SNMP Traps If you cannot compile the ONS 15310-CL or ONS 15310-MA MIBs, call the Cisco Technical Assistance Center (Cisco TAC). Contact information for Cisco TAC is listed in the “Obtaining Documentation and Submitting a Service Request” section on page xxxi. 13.6 SNMP Traps The ONS 15310-CL or ONS 15310-MA can receive SNMP requests from a number of SNMP managers and send traps to 10 trap receivers. The ONS 15310-CL generates all alarms and events as SNMP traps. Both the ONS 15310-CL and ONS 15310-MA generate traps containing an object ID that uniquely identifies the alarm. An entity identifier uniquely identifies the entity that generated the alarm (slot, port, synchronous transport signal [STS], Virtual Tributary [VT], Spanning Tree Protocol [STP], and so on). The traps give the severity of the alarm (Critical, Major, Minor, event, and so on) and indicate whether the alarm is service affecting or non-service affecting. The traps also contain a date/time stamp that shows the date and time the alarm occurred. The ONS 15310-CL and ONS 15310-MA also generate a trap for each alarm when the alarm condition clears. Each SNMP trap contains ten variable bindings, listed in Table 13-4. 4 CERENT-GENERIC.mib (for ONS 15327 only) 5 CISCO-SMI.mib Table 13-3 ONS Proprietary MIBs (continued) MIB Number Module Name Table 13-4 SNMPv2 Trap Variable Bindings Number ONS 15454 Name ONS 15310-CL Name Description 1 sysUpTime sysUpTime The first variable binding in the variable binding list of an SNMPv2-Trap-PDU. 2 snmpTrapOID snmpTrapOID The second variable binding in the variable binding list of an SNMPv2-Trap-PDU. 3 cerent454NodeTime cerentGenericNodeTime The time that an event occurred 4 cerent454AlarmState cerentGenericAlarmState The alarm severity and service-affecting status. Severities are Minor, Major, and Critical. Service- affecting statuses are service-affecting and non-service affecting. 5 cerent454AlarmObjectType cerentGenericAlarmObjectType The entity type that raised the alarm. The NMS should use this value to decide which table to poll for further information about the alarm. 6 cerent454AlarmObjectIndex cerentGenericAlarmObjectIndex Every alarm is raised by an object entry in a specific table. This variable is the index of the objects in each table; if the alarm is interface-related, this is the index of the interfaces in the interface table. 7 cerent454AlarmSlotNumber cerentGenericAlarmSlotNumber The slot of the object that raised the alarm. If a slot is not relevant to the alarm, the slot number is zero.13-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.6 SNMP Traps The ONS 15310-CL and ONS 15310-MA support the generic and IETF traps listed in Table 13-5. 8 cerent454AlarmPortNumber cerentGenericAlarmPortNumber The port of the object that raised the alarm. If a port is not relevant to the alarm, the port number is zero. 9 cerent454AlarmLineNumber cerentGenericAlarmLineNumber The object line that raised the alarm. If a line is not relevant to the alarm, the line number is zero. 10 cerent454AlarmObjectName cerentGenericAlarmObjectName The TL1-style user-visible name that uniquely identifies an object in the system. Table 13-4 SNMPv2 Trap Variable Bindings (continued) Number ONS 15454 Name ONS 15310-CL Name Description Table 13-5 Traps Supported in the ONS 15310-CL and ONS 15310-MA Trap From RFC No. MIB Description coldStart RFC1907-MIB Agent up, cold start. warmStart RFC1907-MIB Agent up, warm start. authenticationFailure RFC1907-MIB Community string does not match. newRoot RFC1493/ BRIDGE-MIB Sending agent is the new root of the spanning tree. topologyChange RFC1493/ BRIDGE-MIB A port in a bridge has changed from Learning to Forwarding or Forwarding to Blocking. entConfigChange RFC2737/ ENTITY-MIB The entLastChangeTime value has changed. dsx1LineStatusChange RFC2495/ DS1-MIB A dsx1LineStatusChange trap is sent when the value of an instance of dsx1LineStatus changes. The trap can be used by an NMS to trigger polls. When the line status change results from a higher-level line status change (for example, a DS-3), no traps for the DS-1 are sent. dsx3LineStatusChange RFC2496/ DS3-MIB A dsx3LineStatusLastChange trap is sent when the value of an instance of dsx3LineStatus changes. This trap can be used by an NMS to trigger polls. When the line status change results in a lower-level line status change (for example, a DS-1), no traps for the lower-level are sent. risingAlarm RFC2819/ RMON-MIB The SNMP trap that is generated when an alarm entry crosses the rising threshold and the entry generates an event that is configured for sending SNMP traps. fallingAlarm RFC2819/ RMON-MIB The SNMP trap that is generated when an alarm entry crosses the falling threshold and the entry generates an event that is configured for sending SNMP traps.13-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.7 SNMP Community Names 13.7 SNMP Community Names You can provision community names for all SNMP requests from the SNMP Trap Destination dialog box in CTC. In effect, SNMP considers any request valid that uses a community name matching a community name on the list of provisioned SNMP trap destinations. Otherwise, SNMP considers the request invalid and drops it. If an SNMP request contains an invalid community name, the request silently drops and the MIB variable (snmpInBadCommunityNames) increments. All MIB variables managed by the agent grant access to all SNMP requests containing a validated community name. 13.8 SNMP Remote Network Monitoring The ONS 15310-CL and ONS 15310-MA incorporate RMON to allow network operators to monitor the ONS 15310-CL Ethernet cards. This feature is not apparent to the typical CTC user, because RMON interoperates with an NMS. However, with CTC you can provision the RMON alarm thresholds. For the procedure, refer to the Cisco ONS 15310-CL and ONS 15310-MA Procedure Guide. CTC also monitors the five RMON groups implemented by the ONS 15310-CL. ONS 15310-CL and ONS 15310-MA RMON implementation is based on the IETF-standard MIB RFC2819. The ONS 15310-CL and ONS 15310-MA implement five groups from the standard MIB: Ethernet Statistics, History Control, Ethernet History, Alarm, and Event. Certain statistics measured on the ML card are mapped to standard MIB if one exists else mapped to a non standard MIB variable. The naming convention used by the standarad/non-standard MIB is not the same as the statistics variable used by the card. Hence when these statistics are obtained via get-reques/get-next-request/SNMP Trap they don’t match the name used on the card or as seen by CTC/TL1. • For ex: STATS_MediaIndStatsRxFramesTooLong stats is mapped to cMediaIndependentInFramesTooLong variable in CERENT MIB. STATS_RxTotalPkts is mapped to mediaIndependentInPkts in HC-RMON-rfc3273.mib 13.8.1 Ethernet Statistics Group The Ethernet Statistics group contains the basic statistics for each monitored subnetwork in a single table named etherstats. The group also contains 64-bit statistics in the etherStatsHighCapacityTable. 13.8.2 History Control Group The History Control group defines sampling functions for one or more monitor interfaces. RFC 2819 defines the historyControlTable. 13.8.3 Ethernet History Group The ONS 15310-CL and ONS 15310-MA implement the etherHistoryTable as defined in RFC 2819, within the bounds of the historyControlTable. It also implements 64-bit Ethernet history in the etherHistoryHighCapacityTable.13-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.8.4 Alarm Group 13.8.4 Alarm Group The Alarm group consists of a single alarm table. This table provides the network performance alarm thresholds for the network management application. With CTC, you can provision the thresholds in the table. 13.8.5 Event Group The Event group consists of two tables, eventTable and logTable. The eventTable is read-only. The ONS 15310-CL and ONS 15310-MA implement the logTable as specified in RFC 2819. 13.9 CE-100T-8 and ML-100T-8 RMON MIBs The CE-100T-8 and CTX2500 use the ONG RMON. The ONG RMON contains the statistics, history, alarms, and events MIB groups from the standard RMON MIB. The ONG RMON is recommended for the ML-100T-8 and contains the statistics, history, alarms, and events MIB groups from the standard RMON MIB. The standard Cisco IOS RMON is also available for the ML-100T-8. 13-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual, R7.0 Chapter 13 SNMP 13.9 CE-100T-8 and ML-100T-8 RMON MIBsA-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 APPENDIX A Specifications Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This appendix contains shelf, card, and Small Form-factor Pluggable (SFP) specifications for the Cisco ONS 15310-CL and Cisco ONS 15310-MA. A.1 Cisco ONS 15310-CL Shelf Specifications This section includes hardware and software specifications. A.1.1 Bandwidth The following bandwidth specifications apply to the ONS 15310-CL: • Total bandwidth: 2.054 Gbps • Optical: 1.24 Gbps (2 x OC-12) • Electrical: 188 Mbps • Expansion: 622 Mbps (OC-12) A.1.2 Expansion Slot Total card slots: 1 expansion slot for CE-100T-8 and ML-100T-8 cards. A blank card (15310-EXP-FILLER) can also be plugged into the expansion slot. A.1.3 Internal Cards The following internal cards are available in the ONS 15310-CL: • 15310-CL-CTX cardA-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.1.4 15310-CL-CTX • Interconnect card • Connector expansion card A.1.4 15310-CL-CTX The 15310-CL-CTX card has the following specifications: • Optical ports – Two user upgradeable and hot swappable SFPs with SONET interface support – Support for multirate SFPs (155.520 Mbps and 622.080 Mbps) – Support for operating the two optical facilities at different line rates in unprotected facility mode (non 1+1 Automatic Protection Switching [APS] operation) • DS-1 ports – Supports Telcordia GR-499-compliant 1.544 Mbps (DS-1) interface – Performance monitoring (PM) is provided through the interface to allow validation of signal quality. – Any outgoing DS-1 signal can be retimed to eliminate accumulated jitter and wander at the point of egress from a synchronous network. – Any incoming T1 signal from the transport element can also be used as a timing source. • DS-3/EC1 ports – Supports Telcordia GR-499-compliant 44.736 Mbps (DS3) interfaces or EC1. – PM is provided through the interface to allow validation of signal quality. Each port can be provisioned in any combination of DS-3 or EC1. • Building integrated timing supply (BITS) – Supports one BITS input and one BITS output – The BITS I/O ports support a 100-ohm termination for external 1.544 Mbps DS1 timing signals. • Alarm – The alarm system provides three alarm inputs and two contacts for alarm outputs. • LAN – Supports a 10/100-Mbps Ethernet interface for Cisco Transport Controller/Transaction Language One (CTC/TL1) provisioning. – For node access in secure mode, SSL (for TL1) and HTTPS (for CTC) security protocols are supported. • Craft interface – An EIA/TIA-232 craft interface is provided and is used for TL1 provisioning. – The craft interface is set to 9600 baud, no parity, and 1 stop bit by default. • 64-kbps user data channel (UDC) digital interface – The 6- kbps digital interface provides a digital input and output. – Any F1 byte that is accessible on the system is interfaced at the UDC connector. – The UDC provides a simplex interface. Protection for UDC overhead channel(s) follows interface line protection for traffic.A-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.1.5 Configurations – The UDC can be enabled or disabled through the management interfaces. The default state is disabled. – The UDC supports a 64-kbps serial interface adaptation function to overhead byte F1. – The physical interface is defined in ITU-T G.703 as a 120-ohm, twisted pair connection. The jitter specification is defined in ITU-T G.823. – The physical interface is defined in ITU-T G.703 as a 120-ohm, twisted pair connection. The jitter specification is defined in ITU-T G.823. – The UDC supports a serial port interface adaptation function to overhead bytes F1. This is an EIA/TIA-232 interface capable of 9.6-, 19.2-, 38.4-, and 56-kbps operation. The rate is selectable through the management interface. The default is 56 kbps with no parity and 1 stop bit. A.1.5 Configurations The ONS 15310-CL supports the following configurations: • Two-fiber path protection • 1+1 protection • Path protected mesh network (PPMN) • Add/drop multiplexer (ADM) • Point-to-point (PPP) terminal mode A.1.6 Cisco Transport Controller CTC, the ONS 15310-CL graphical user interface (GUI), has the following specifications: • 10/100BaseT • 15310-CL-CTX access: RJ-45 connector A.1.7 TL1 Craft Interface TL1, the ONS 15310-CL craft interface, has the following specifications: • Speed: 9600 baud, no parity, 1 stop bit • 15310-CL-CTX: EIA/TIA-232 with RJ-45 type connector A.1.8 LEDs Table A-1 describes the possible LED colors and their significance.A-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.1.9 Alarm Interface A.1.9 Alarm Interface The ONS 15310-CL alarm interface has the following specifications: • Visual: Critical (red LED), Major (red LED), Minor (amber LED) • Three alarm inputs and two alarm contacts, all on the same RJ-45 connector (ALARM port) A.1.10 DS1 Interface The ONS 15310-CL DS-1 interface has the following specifications: • 21 DS-1 (1.544 Mbps) ports • Connector: LFH96 (100-ohm balanced) • Any two ports can be used as primary and secondary timing sources • A DS01 output can be retimed to system clock on a per-port basis A.1.11 DS3/EC1 Interface The ONS 15310-CL DS3/EC1 interface has the following specifications: • Three DS3 (44.736 Mbps)/EC1 (51.84 Mbps) ports • Connector: 75-ohm mini-BNC connector • Ports can be any combination of DS-3 and EC-1 A.1.12 Nonvolatile Memory The ONS 15310-CL nonvolatile memory has the following specifications: • 128 MB, Compact Flash card Table A-1 LED Description LED Color FAIL Red for system failure or during initialization ALARM Red (Major and Critical) Amber (Minor) PWR Green (AC source present or both DC sources present) Amber (one DC source present) SYNC Green (primary and secondary reference synchronization) Amber (only one reference) Red (loss of both references)A-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.1.13 BITS Interface A.1.13 BITS Interface The ONS 15310-CL BITS interface has the following specifications: • One DS-1 BITS input • One derived DS-1 output A.1.14 Push Buttons The ONS 15310-CL has the following push buttons: • Lamp test: When momentarily pushed, lights all LEDs on the ONS 15310-CL front panel. If an LED has more than one color, all the colors will be cycled when the lamp test button is pushed. Note Another use for the lamp test button is to reset the CTC password to its default value (otbu+1). To reset the password, press the lamp test button for at least five seconds, release it for a maximum of five seconds, then press it again for at least five seconds. After the button is released, the default password is set. • System reset: When pressed, performs a soft reset (does not impact traffic). A.1.15 System Timing The ONS 15310-CL has the following timing specifications: • +/– 20 ppm SONET Minimum Clock (SMC) free-running internal clock • Maintains SMC holdover (+/– 4.6 ppm for first 24 hours) in the event of reference frequency loss • Timing reference: External BITS, line optical port, any DS-1 clock, and internal clock A.1.16 Power Specifications The ONS 15310-CL has the following power specifications: • Input power: –48 VDC (dual DC power supply model) or 100/240 VAC (AC power model) • Maximum power consumption – DC chassis with no expansion board: 60 W – DC chassis with expansion board: 115 W – AC chassis with no expansion board: 70 W – AC chassis with expansion board: 140 W • Power requirements: –42 to –56 VDC or 100/240 VAC (+/– 10 percent) • Power terminals: Three-prong male locking connector for DC power supply model or three-prong male AC connector for AC power model Note An ONS 15310-CL that uses DC power is classified as DC-I (DC Isolated). This means that the DC return (RET) conductor at the DC power input connector is not bonded to the chassis frame ground.A-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.1.17 Environmental Specifications A.1.17 Environmental Specifications The ONS 15310-CL has the following environmental specifications: • Operating temperature: 0 to +55 degrees Celsius (32 to +131 degrees Fahrenheit) for AC chassis; –40 to +65 degrees Celsius (–40 to +149 degrees Fahrenheit) for dual-DC chassis • Operating humidity: 5 to 95 percent, noncondensing A.1.18 Shelf Dimensions The ONS 15310-CL has the following shelf dimensions: • Height: 1 Rack Unit (RU), 1.75 inches (4.45 cm) • Width: – 19.0 inches (48.3 cm) – 23.0 inches (58.4 cm) including rackmount brackets • Depth: – 15.0 inches (38.1 cm) sheet metal only – 15.8 inches (40.2) including mini-BNC and DC inlet connectors • Weight: – 11.5 lb. empty – 12.5 lb. maximum (line card installed) A.2 Cisco ONS 15310-MA Shelf Specifications This section provides ONS 15310-MA topologies; Cisco Transport Controller (CTC) specifications; LAN, TL1, modem, alarm, and electrical interface assembly (EIA) interface specifications; timing, power, and environmental specifications; and shelf dimensions. A.2.1 Alarm Interface The ONS 15310-MA alarm interface has the following specifications: • The alarm interface provides 32 alarm inputs and 8 contacts for alarm outputs. • Connector J6: Alarm inputs • Connector J7: Alarm outputs A.2.2 UDC Interface The ONS 15310-MA 64-kbps user data channel (UDC) digital interface has the following specifications: • The 64- kbps digital interface provides a digital input and output. • Any F1 byte that is accessible on the system is interfaced at the UDC connector.A-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.2.3 Cisco Transport Controller LAN Interface • The UDC provides a simplex interface. Protection for UDC overhead channel(s) follows interface line protection for traffic. • The UDC can be enabled or disabled through the management interfaces. The default state is disabled. • The physical interface is defined in ITU-T G.703 as a 120-ohm, twisted pair connection. The jitter specification is defined in ITU-T G.823. • The UDC supports a serial port interface adaptation function to overhead bytes F1. This is an EIA/TIA-232 interface capable of 9.6-, 19.2-, 38.4-, and 56-kbps operation. The rate is selectable through the management interface. The default is 56 kbps with no parity and 1 stop bit. • Connector J3: UDC A.2.3 Cisco Transport Controller LAN Interface The ONS 15310-MA CTC LAN interface has the following specifications: • 10/100BaseT • CTX2500 access: RJ-45 connector • Connector J3: LAN port A.2.4 TL1 Craft Interface The ONS 15310-MA TL1 craft interface has the following specifications: • Speed: 9600 baud, no parity, 1 stop bit • CTX2500: EIA/TIA-232 with RJ-45 type connector • Connector J2: Craft port A.2.5 Configurations The ONS 15310-MA supports the following configurations: • Two-fiber path protection • 1+1 protection • Path protected mesh network (PPMN) • Add/drop multiplexer (ADM) • Point-to-point (PPP) terminal mode A.2.6 LEDs Table A-1 describes the system-level LEDs, located on the on the ONS 15310-MA fan tray, and the possible LED colors and their significance.A-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.2.7 Push Buttons A.2.7 Push Buttons The ONS 15310-MA has the following push buttons: • Lamp test: When momentarily pushed, lights all LEDs on the ONS 15310-MA front panel. If an LED has more than one color, all the colors will be cycled when the lamp test button is pushed. Note Another use for the lamp test button is to reset the CTC password to its default value (otbu+1). To reset the password, press the lamp test button for at least five seconds, release it for a maximum of five seconds, then press it again for at least five seconds. After the button is released, the default password is set. A.2.8 BITS Interface The ONS 15310-MA has the following building integrated timing supply (BITS) specifications: – Supports two BITS inputs and two BITS outputs – The BITS I/O ports support a 100-ohm termination for external 1.544 Mbps DS1 timing signals. – Connector J4: BITS1; Connector J5: BITS2 A.2.9 System Timing The ONS 15310-MA has the following timing specifications: • +/– 20 ppm SONET Minimum Clock (ST3) free-running internal clock • Maintains SMC holdover (+/– 4.6 ppm for first 24 hours) in the event of reference frequency loss • Timing reference: External BITS, line optical port, any DS-1 clock, and internal clock A.2.10 Power Specifications The ONS 15310-MA has the following power specifications: Table A-2 LED Description LED Color and Meaning FAIL Red indicates system failure or during initialization CR Red indicates a critical alarm is present on the shelf assembly. MJ Red indicates a major alarm is present on the shelf assembly. MN Amber indicates a minor alarm is present on the shelf assembly. REM Red indicates a remote alarm is present on the shelf assembly. PWR A PWR B Green indicates that a DC power source present and within normal operating range. Red indicates that DC power source is not present, or is present and not within normal operating range.A-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.2.11 Environmental Specifications • Input power: –48 VDC • Maximum power consumption – Chassis with no cards installed (fan tray only): 55 W – Chassis with cards installed: 347 W • Power requirements: –44 to –54 VDC • Power terminals: Three-prong male locking connector Note An ONS 15310-MA that uses DC power is classified as DC-I (DC Isolated). This means that the DC return (RET) conductor at the DC power input connector is not bonded to the chassis frame ground. A.2.11 Environmental Specifications The ONS 15310-MA has the following environmental specifications: • Operating temperature: –40 to +65 degrees Celsius (–40 to +149 degrees Fahrenheit) • Operating humidity: 5 to 95 percent, noncondensing A.2.12 Fan-Tray Assembly Specifications • Environmental – Operating temperature: -40 to +65 degrees Celsius (-40 to 149 degrees Fahrenheit) – Operating humidity: 5 to 90%, noncondensing • Power – 50 W, 4.2 Amps (at 12 V), 170 BTU/hr • Shelf Acoustics (NEBS acoustic noise compliant) – Normal fan speed: 58 dBA – High fan speed: 64 dBA A.2.13 Shelf Dimensions The ONS 15310-MA has the following shelf dimensions: • Height: 6 Rack Units (RUs), 10.44 inches (26.51 cm) • Width: – 10.67 inches (27.10 cm) • Depth: – 12 inches (20.5 cm) without cables installed – 13.7 inches (34.8 cm) with cables installed • Weight: – 25 lbs. (11.3 kg) maximum (line cards, fan-tray assembly, and two electrical interface assemblies (EIAs) installed)A-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.3 Card Specifications A.3 Card Specifications This section provides specifications for the cards that can be installed in the 15310-CL expansion slot, including the CE-100T-8, ML-100T-8, and Filler cards. It also includes the 15310-MA electrical and CTX2500 cards. For compliance information, refer to the Cisco Optical Transport Products Safety and Compliance Information document. A.3.1 CTX2500 Card The CTX2500 card is installed in Slots 3 and 4 of the ONS 15310-MA only. The CTX2500 has the following specifications. • LAN Port – Supports a 10/100-Mbps Ethernet interface for Cisco Transport Controller/Transaction Language One (CTC/TL1) provisioning. – For node access in secure mode, SSL (for TL1) and HTTPS (for CTC) security protocols are supported. • CRAFT Port – An EIA/TIA-232 craft interface is provided and is used for TL1 provisioning. – The craft interface is set to 9600 baud, no parity, and 1 stop bit by default. • Nonvolatile memory – 128 MB, Compact Flash card • Optical ports: Line – Bit rate: OC-3 (155.520 Mbps), OC-12, (622.080 Mbps), and OC-48 (2488.320 Mbps), depending on the SFP installed Note Both optical interfaces on the card can be configured as OC-3, OC-12, or OC-48. – Code: Scrambled NRZ – Fiber: depends on the SFP used (see the “A.4 SFP Specifications” section on page A-15) – Loopback modes: Terminal and facility – Connectors: LC duplex connector for each SFP – Compliance: Telcordia SONET, Telcordia GR-253-CORE, ITU-T G.707, ITU-T G.957 • Optical ports: Transmitter – Maximum transmitter output power: Depends on the SFP used (see the “A.4 SFP Specifications” section on page A-15) – Minimum transmitter output power: Depends on the SFP used (see the “A.4 SFP Specifications” section on page A-15) – Center wavelength: See wavelength plan – Center wavelength accuracy: 1 nm to 4 nm, depending on the SFP used – Transmitter: DFB laserA-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.3.2 Nonvolatile Memory • Optical ports: Receiver – Maximum receiver level: Depends on the SFP used (see the “A.4 SFP Specifications” section on page A-15) – Minimum receiver level: Depends on the SFP used (see the “A.4 SFP Specifications” section on page A-15) – Receiver: PIN PD – Receiver input wavelength range: Depends on the SFP used • Environmental – Operating temperature: C-Temp: +23 to +131 degrees Fahrenheit (–5 to +55 degrees Celsius) I-Temp: –40 to +149 degrees Fahrenheit (–40 to +65 degrees Celsius) – Operating humidity: 5 to 95 percent, noncondensing – Power consumption: 9.28 W, 0.19 A, 31.68 BTU/hr • Dimensions – Height: 6.94 in. (167.28 mm) – Width: 1.45 in. (36.83 mm) – Depth: 8.35 in. (212.09 mm) – Weight not including clam shell: 1.6 lb (0.73 kg) LAN Port • Supports a 10/100-Mbps Ethernet interface for Cisco Transport Controller/Transaction Language One (CTC/TL1) provisioning. CRAFT Port • An EIA/TIA-232 craft interface is provided and is used for TL1 provisioning. • The craft interface is set to 9600 baud, no parity, and 1 stop bit by default. A.3.2 Nonvolatile Memory The ONS 15310-MA nonvolatile memory has a 128 MB Compact Flash card A.3.3 CE-100T-8 and ML-100T-8 Cards The CE-100T-8 and ML-100T-8 cards have the following specifications: • Environmental – Operating temperature C-Temp: 0 to +55 degrees Celsius (32 to 131 degrees Fahrenheit) – Operating humidity: 5 to 95%, noncondensing – Power consumption: 1.10A, 53 W • Dimensions – Height: 176 mm (6.93 in.)A-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.3.4 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards – Width: 34.29 mm (1.35 in.) – Depth: 238.25 mm (9.38 in.) – Weight (not including clam shell): 0.499 kg (1.1 lb) A.3.4 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards The ONS 15310-MA DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards have the following specifications: For DS1: For DS1: • Input – Bit rate: 1.544 Mbps +/- 32 ppm – Frame format: Unframed, SF (D4), ESF – Line code: AMI, B8ZS – Termination: AMP Champ – Input impedance: 100 ohms – Cable loss: Max 655 feet ABAM #22 or #24 AWG – AIS: TR-TSY-000191 compliant • Output – Bit rate: 1.544 Mbps +/- 32 ppm – Frame format: Unframed, SF (D4), ESF – Line code: AMI, B8ZS – Termination: AMP Champ – Input impedance: 100 ohms – Cable loss: Max 655 feet ABAM #22 or #24 AWG – AIS: TR-TSY-000191 compliant – Power level: 12.5 to 17.9 dBm, centered at 772 KHz, –16.4 to –11.1 dBm centered at 1544 KHz – Pulse shape: Telcordia GR-499-CORE Figure 9-5 – Pulse amplitude: 2.4 to 3.6 V peak-to-peak – Loopback modes: Terminal and facility – Line build out: 0 - 131 ft., 132 - 262 ft., 263 - 393 ft., 394 - 524 ft., 525 - 655 ft. • Electrical interface: 64-pin Champ connectors on high-density EIA For DS3: • Input – Bit rate: 44.736 Mbps +/- 20 ppm – Frame format: Unframed, M13, C-bit – Line code: B3ZS – Termination: Unbalanced coaxial cable A-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.3.4 DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 Cards – Input impedance: 75 ohms +/-5 percent – Cable loss: Max 450 feet with 734A or 728A – AIS: TR-TSY-000191 compliant • Output – Bit rate: 44.736 Mbps +/- 20 ppm – Frame format: Unframed, M13, C-bit – Line code: B3ZS – Termination: Unbalanced coaxial cable – Input impedance: 75 ohms +/-5 percent – Cable loss: Max 450 feet with 734A or 728A cable – AIS: TR-TSY-000191 compliant – Power level: -1.8 to +5.7 dBm – Pulse shape: ANSI T1.102-1988 Figure 8 – Pulse amplitude: 0.36 to 0.85 V peak – Loopback modes: Terminal and facility – Line build out: 0 to 225 feet, 226 to 450 feet • Electrical interface: BNC Connectors on high-density EIA For EC-1: • Input – Bit rate: 51.84 Mbps +/- 20 ppm – Frame format: SONET – Line code: B3ZS – Termination: Unbalanced coaxial cable – Input impedance: 75 ohms +/- 5 percent – Cable loss: Max 450 feet 734A or 728A – AIS: TR-TSY-000191 compliant • Output – Bit rate: 51.84 Mbps +/- 20 ppm – Frame format: SONET – Line code: B3ZS – Termination: Unbalanced coaxial cable – Input impedance: 75 ohms +/-5 percent – Cable loss: Max 450 feet 734A or 728A – AIS: TR-TSY-000191 compliant – Power level: -1.8 +/- 5.7 dBm – Pulse shape: ANSI T1.102-1988 Figure 8 – Pulse amplitude: 0.36 to 0.85 V peak to peak – Loopback modes: Terminal and facility A-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.3.5 Filler Cards – Line build out: 0 to 225 feet, 226 to 450 feet • Electrical interface: BNC connectors on high-density EIA • Surge protection: Telcordia GR-1089 • Operating temperature: I-Temp, -40 to +65 degrees Celsius. • Operating humidity: 5 to 95 percent, noncondensing • Power consumption: 36.60 W, 0.76 A, 124.97 BTU/hr • Dimensions – Height: 6.93 in. (17.60 cm) – Width: 1.35 in. (3.43 cm) – Depth: 8.80 in. (22.35 cm) – Card weight: 1.5 lbs (0.68 kg) A.3.5 Filler Cards The 15310-EXP-FILLER card has the following specifications: • Environmental – Operating temperature I-Temp: –40 to +65 degrees Celsius (–40 to 149 degrees Fahrenheit) – Operating humidity: 5 to 95 percent, noncondensing • Dimensions – Height: 6.93 in. (176 mm) – Width:1.35 in. (34.29 mm) – Depth: 9.38 in. (238.25 mm) – Card weight (not including clam shell): 0.9 lb (0.45 kg) The 15310-CTX-FILLER card has the following specifications: • Environmental – Operating temperature I-Temp: -40 to +65 degrees Celsius (-40 to 149 degrees Fahrenheit) – Operating humidity: 5 to 95%, noncondensing • Dimensions – Height: 6.94 in. (167.28 mm) – Width: 1.450 in. (36.83 mm) – Depth:8.35 in. (212.09 mm) – Weight not including clam shell: 0.51 lb (0.23 kg)A-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.4 SFP Specifications A.4 SFP Specifications Table A-3 lists specifications for available SFPs that can be used with the 15310-CL-CTX and CTX2500 cards. Table A-4 lists specifications for available SFPs that can be used only with the CTX2500 card. The 15310-CL-CTX card does not have a faceplate because it is located inside the chassis; therefore, the two SFP slots are located on the ONS 15310-CL faceplate, just to the left of the LAN port. The two SFP slots on the CTX2500 are located on CTX2500 faceplate. Table A-5 provides cabling specifications for the single-mode fiber (SMF) SFPs that can be used with both the 15310-CL-CTX and the ONS 15310-MA CTX2500. The ports of the listed SFPs have LC-type connectors. Table A-6 provides cabling specifications for SFPs that can only be used with the ONS 15310-MA CTX-2500 card. Table A-3 SFP Specifications—ONS 15310-CL and ONS 15310-MA SFP Product ID Interface Transmitter Output Power Min/Max (dBm) Receiver Input Power Min/Max (dBm) ONS-SI-155-L1 OC-3 –5.0 to 0 –34 to –10 ONS-SI-155-L2 OC-3 –5.0 to 0 –34 to –10 ONS-SI-155-I1 OC-3 –15 to –8.0 –28 to –8 ONS-SI-622-L1 OC-12 –3.0 to 2.0 –28 to –8 ONS-SI-622-L2 OC-12 –3.0 to 2.0 –28 to –8 ONS-SI-622-I1 OC-12/OC-3 –15 to –8.0 –28 to –8 Table A-4 SFP Specifications—ONS 15310-MA Only SFP Product ID Interface Transmitter Output Power Min/Max (dBm) Receiver Input Power Min/Max (dBm) ONS-SE-155-1470= through ONS-SE-155-1610= OC-3 0 to +5 –34 to –3 (at BER 10-10) ONS-SE-622-1470= through ONS-SE-622-1610= OC-12 0 to +5 –28 to –3 (at BER 10-10) ONS-SI-2G-I1= OC-48 –5.0 to 0 –18 to –0 ONS-SI-2G-L1= OC-48 –3 to +2 –27 to –9 ONS-SI-2G-L2= OC-48 –3 to +2 –28 to –9 ONS-SI-2G-S1= OC-48 –10 to -3 –18 to –3 ONS-SC-2G-30.3= through ONS-SC-2G-60.6= OC-48 0 to +4 –28 to –9 Table A-5 Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-CL and ONS 15310-MA SFP Product ID Wavelength1 Fiber Type Cable Distance ONS-SI-155-L1 Long Reach 1310 nm 9 micro SMF 50 km (31.07 miles) ONS-SI-155-L2 Long Reach 1550 nm 9 micro SMF 100 km (62.15 miles)A-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix A Specifications A.4 SFP Specifications ONS-SI-155-I1 Intermediate Reach 1310 nm 9 micro SMF 21 km (13.05 miles) ONS-SI-622-L1 Long Reach 1310 nm 9 micron SMF 42 km (26.10 miles) ONS-SI-622-L2 Long Reach 1550 nm 9 micron SMF 85 km (52.82 miles) ONS-SI-622-I1 Intermediate Reach 1310 nm 9 micron SMF 21 km (13.05 miles) 1. Typical loss on a 1310-nm wavelength SMF is 0.6 dB/km. Table A-6 Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-MA Only SFP Product ID Wavelength1 1. Typical loss on a 1310-nm wavelength SMF is 0.6 dB/km. Fiber Type Cable Distance ONS-SE-155-1470 through ONS-SE-155-1610 (CWDM) 1470 nm through 1610 nm, according to the wavelength indicated in the SFP’s product ID 9 micron SMF 120 km (74.56 miles) ONS-SE-622-1470 through ONS-SE-622-1610 (CWDM) 1470 nm through 1610 nm, according to the wavelength indicated in the SFP’s product ID 9 micron SMF 100 km (62.14 miles) ONS-SI-2G-I1 1310 nm 9 micron SMF 15 km (9.3 miles) ONS-SI-2G-L1 1310 nm 9 micron SMF 40 km (25.80 miles) ONS-SI-2G-L2 1550 nm 9 micron SMF 80 km (49.71 miles) ONS-SI-2G-S1 1310 nm 9 micron SMF 2 km (1.2 miles) ONS-SC-2G-30.3 through ONS-SC-2G-60.6 (DWDM) 1530.30 nm through 1560.60 nm, according to the wavelength indicated in the SFP’s product ID Note When using ONS-SC-2G-xx.x on CTX-2500 the Cisco ONS 15310 -MA operating temperature specification is limited to –5 to +55 degrees Celsius (+23 to +131 degrees Fahrenheit). 9 micron SMF N/A2 2. ONS-SC-2G-xx.x cable distance varies depending on DWDM system installation. Table A-5 Single-Mode Fiber SFP Port Cabling Specifications—ONS 15310-CL and ONS 15310-MA (continued) SFP Product ID Wavelength1 Fiber Type Cable DistanceB-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 APPENDIX B Administrative and Service States This appendix describes the administrative and service states for Cisco ONS 15310-CL and Cisco ONS 15310-MA cards, ports, and cross-connects. For circuit state information, see Chapter 8, “Circuits and Tunnels.” Software Release 6.0 and later states are based on the generic state model defined in Telcordia GR-1093 Core, Issue 2 and ITU-T X.731. B.1 Service States Service states include a Primary State (PST), a Primary State Qualifier (PSTQ), and one or more Secondary States (SST). Table B-1 lists the service state PSTs and PSTQs supported by the ONS 15310-CL and ONS 15310-MA. Table B-2 defines the SSTs supported by the ONS 15310-CL and ONS 15310-MA. Table B-1 ONS 15310-CL and ONS 15310-MA Service State Primary States and Primary State Qualifiers Primary State, Primary State Qualifier Definition IS-NR (In-Service and Normal) The entity is fully operational and will perform as provisioned. OOS-AU (Out-of-Service and Autonomous) The entity is not operational because of an autonomous event. OOS-AUMA (Out-of-Service and Autonomous Management) The entity is not operational because of an autonomous event and has also been manually removed from service. OOS-MA (Out-of-Service and Management) The entity has been manually removed from service.B-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.2 Administrative States B.2 Administrative States Administrative states are used to manage service states. Administrative states consist of a PST and an SST. Table B-3 lists the administrative states supported by the ONS 15310-CL and and ONS 15310-MA. See Table B-2 on page B-2 for SST definitions. Note A change in the administrative state of an entity does not change the service state of supporting or supported entities. Table B-2 ONS 15310-CL and and ONS 15310-MA Secondary States Secondary State Definition AINS (Automatic In-Service) The entity is delayed before transitioning to the IS-NR service state. The transition to IS-NR depends on correction of conditions, or on a soak timer. Alarm reporting is suppressed, but traffic is carried. Raised fault conditions, whether or not their alarms are reported, can be retrieved on the CTC Conditions tab or by using the TL1 RTRV-COND command. DSBLD (Disabled) The entity was manually removed from service and does not provide its provisioned functions. All services are disrupted; the entity is unable to carry traffic. FLT (Fault) The entity has a raised alarm or condition. LPBK (Loopback) The entity is in loopback mode. MEA (Mismatched Equipment) An improper card is installed. For example, an installed card is not compatible with the card preprovisioning or the slot. This SST applies only to cards. MT (Maintenance) The entity has been manually removed from service for a maintenance activity but still performs its provisioned functions. Alarm reporting is suppressed, but traffic is carried. Raised fault conditions, whether or not their alarms are reported, can be retrieved on the CTC Conditions tab or by using the TL1 RTRV-COND command. OOG (Out of Group) The virtual concatenated (VCAT) member cross-connect is not used to carry VCAT group traffic. This state is used to put a member circuit out of the group and to stop sending traffic. OOS-MA,OOG only applies to the cross-connects on an end node where VCAT resides. The cross-connects on intermediate nodes are in the OOS-MA,MT service state. SWDL (Software Download) The card is involved in a software and database download. This SST applies only to cards. UAS (Unassigned) The card is not provisioned in the database. This SST applies only to cards. UEQ (Unequipped) The card is not physically present (that is, an empty slot). This SST applies only to cards.B-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3 Service State Transitions B.3 Service State Transitions This section describes the transition from one service state to the next for cards, ports, and cross-connects. A service state transition is based on the action performed on the entity. Note When an entity is put in the OOS,MT administrative state, the ONS 15454 suppresses all standing alarms on that entity. All alarms and events appear on the Conditions tab. You can change this behavior for the LPBKFACILITY and LPBKTERMINAL alarms. To display these alarms on the Alarms tab, set the NODE.general.ReportLoopbackConditionsOnOOS-MTPorts to TRUE on the NE Defaults tab. B.3.1 Card Service State Transitions Table B-4 lists card service state transitions. Table B-3 ONS 15310-CL and ONS 15310-MA Administrative States Administrative State (PST,SST) Definition IS Puts the entity in-service. IS,AINS Puts the entity in automatic in-service. OOS,DSBLD Removes the entity from service and disables it. OOS,MT Removes the entity from service for maintenance. OOS,OOG (VCAT circuits only) Removes a VCAT member cross-connect from service and from the group of members. Table B-4 ONS 15310-CL and ONS 15310-MA Card Service State Transitions Current Service State Action Next Service State IS-NR Change the administrative state to OOS,MT. OOS-MA,MT Delete the card. OOS-AUMA,UAS Pull the card. OOS-AU,UEQ Reset the card. OOS-AU,SWDL Alarm/condition is raised. OOS-AU,FLT OOS-AU,AINS and MEA Pull the card. OOS-AU,AINS & UEQ Delete the card. OOS-AUMA,UAS if the card is valid OOS-AUMA,MEA & UAS if the card is invalid OOS-AU,AINS & SWDL Restart completed. IS-NR Pull the card. OOS-AU,AINS & UEQB-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.1 Card Service State Transitions OOS-AU,AINS & UEQ Insert a valid card. OOS-AU,AINS & SWDL Insert an invalid card. OOS-AU,AINS & MEA Delete the card. OOS-AUMA,UAS & UEQ OOS-AU,FLT Pull the card. OOS-AU,UEQ Delete the card. OOS-AUMA,UAS Change the administrative state to OOS,MT. OOS-AUMA,FLT & MT Reset the card. OOS-AU,SWDL Alarm/condition is cleared. IS-NR OOS-AU,MEA Pull the card. OOS-AU,UEQ Delete the card. OOS-AUMA,UAS if the card is valid OOS-AUMA,MEA & UAS if the card is invalid Change the administrative state to OOS,MT. OOS-AUMA,MEA & MT OOS-AU,SWDL Restart completed. IS-NR Pull the card. OOS-AU,UEQ OOS-AU,UEQ Insert a valid card. OOS-AU,SWDL Insert an invalid card. OOS-AU,MEA Delete the card. OOS-AUMA,UAS & UEQ Change the administrative state to OOS,MT. OOS-AUMA,MT & UEQ OOS-AUMA,FLT & MT Pull the card. OOS-AUMA,MT & UEQ Delete the card. OOS-AUMA,UAS Change the administrative state to IS. OOS-AU,FLT Reset the card. OOS-AUMA,MT & SWDL Alarm/condition is cleared. OOS-MA,MT OOS-AUMA,MEA & MT Change the administrative state to IS. OOS-AU,MEA Pull the card. OOS-AUMA,MT & UEQ Delete the card. OOS-AUMA,UAS if the card is valid OOS-AUMA,MEA & UAS if the card is invalid OOS-AUMA,MEA & UAS Pull the card. OOS-AUMA,UAS & UEQ Provision the card. OOS-AU,MEA Table B-4 ONS 15310-CL and ONS 15310-MA Card Service State Transitions (continued) Current Service State Action Next Service StateB-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions B.3.2 Port and Cross-Connect Service State Transitions Table B-5 lists the port and cross-connect service state transitions. Port states do not impact cross-connect states with one exception. A cross-connect in the OOS-AU,AINS service state cannot transition autonomously into the IS-NR service state until the parent port is IS-NR. Note Deleting a port or cross-connect removes the entity from the system. The deleted entity does not transition to another service state. OOS-AUMA,MT & SWDL Restart completed. OOS-MA,MT Pull the card. OOS-AUMA,MT & UEQ OOS-AUMA,MT & UEQ Change the administrative state to IS. OOS-AU,UEQ Insert a valid card. OOS-AUMA,MT & SWDL Insert an invalid card. OOS-AUMA,MEA & MT Delete the card. OOS-AUMA,UAS & UEQ OOS-AUMA,UAS Pull the card. OOS-AUMA,UAS & UEQ Provision an invalid card. OOS-AU,MEA Provision a valid card. OOS-AU,SWDL OOS-AUMA,UAS & UEQ Insert a valid card. OOS-AU,SWDL Insert an invalid card. OOS-AUMA,MEA & UAS Preprovision a card. OOS-AU,AINS & UEQ OOS-MA,MT Change the administrative state to IS. IS-NR Delete the card. OOS-AUMA,UAS Pull the card. OOS-AUMA,MT & UEQ Reset the card. OOS-AUMA,MT & SWDL Alarm/condition is raised. OOS-AUMA,FLT & MT Table B-4 ONS 15310-CL and ONS 15310-MA Card Service State Transitions (continued) Current Service State Action Next Service StateB-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions Current Service State Action Next Service State IS-NR Put the port or cross-connect in the OOS,MT administrative state. OOS-MA,MT Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD OOS-MA,DSBLD & OOG for a VCAT cross-connect Put the port or cross-connect in the IS,AINS administrative state. OOS-AU,AINS Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-MA,MT & OOG Alarm/condition is raised. OOS-AU,FLT OOS-AU,FLT & OOG for a VCAT cross-connect OOS-AU,AINS Put the port or cross-connect in the IS administrative state. IS-NR Put the port or cross-connect in the OOS,MT administrative state. OOS-MA,MT Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD OOS-MA,DSBLD & OOG for a VCAT cross-connect Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-MA,MT and OOG Alarm/condition is raised. OOS-AU,AINS & FLT OOS-AU,AINS & FLT & OOG for a VCAT cross-connect OOS-AU,AINS & FLT Alarm/condition is cleared. OOS-AU,AINS Put the port or cross-connect in the IS administrative state. OOS-AU,FLT Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD Put the port or cross-connect in the OOS,MT administrative state. OOS-AUMA,FLT & MT Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-AUMA,FLT & MT & OOGB-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions OOS-AU,AINS & FLT & OOG Alarm/condition is cleared. OOS-AU,AINS or OOS-MA,MT • If an In Group member is IS-NR or OOS-AU,AINS, the member transitions to OOS-AU,AINS. • If an In Group member is OOS-MA,MT, the member transitions to OOS-MA,MT. Put the VCAT cross-connect in the IS administrative state. OOS-AU,FLT & OOG Put the VCAT cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD & OOG Put the VCAT cross-connect in the OOS,MT administrative state. OOS-AUMA,FLT & MT & OOG OOS-AU,FLT Alarm/condition is cleared. IS-NR Put the port or cross-connect in the IS,AINS administrative state. OOS-AU,AINS & FLT Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD OOS-MA,DSBLD & OOG for a VCAT cross-connect Put the port or cross-connect in the OOS,MT administrative state OOS-AUMA,FLT & MT Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-AUMA,FLT & MT & OOG OOS-AU,FLT & OOG Alarm/condition is cleared. IS-NR or OOS-MA,MT • If an In Group member is IS-NR or OOS-AU,AINS, the member transitions to IS-NR. • If an In Group member is OOS-MA,MT, the member transitions to OOS-MA,MT Put the VCAT cross-connect in the IS,AINS administrative state. OOS-AU,AINS & FLT & OOG Put the VCAT cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD & OOG Put the VCAT cross-connect in the OOS,MT administrative state. OOS-AUMA,FLT & MT & OOG Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions Current Service State Action Next Service StateB-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions OOS-AUMA,FLT & LPBK & MT Release the loopback. OOS-AUMA,FLT & MT Alarm/condition is cleared. OOS-MA,LPBK & MT OOS-AUMA,FLT & LPBK & MT & OOG Release the loopback. OOS-AUMA,FLT & MT & OOG Alarm/condition is cleared. OOS-MT,MT & OOG OOS-AUMA,FLT & MT Alarm/condition is cleared. OOS-MA,MT Put the port or cross-connect in the IS administrative state. OOS-AU,FLT Put the port or cross-connect in the IS,AINS administrative state. OOS-AU,AINS & FLT Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD OOS-MA,DSBLD & OOG for a VCAT cross-connect Put the port or cross-connect in a loopback. OOS-AUMA,FLT & LPBK & MT Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-AUMA,FLT & MT & OOG OOS-AUMA,FLT & MT & OOG Alarm/condition is cleared. OOS-MA,MT & OOG Put the VCAT cross-connect in the IS administrative state. Note VCAT In Group members are in the OOS-AU,FLT or IS-NR service state. OOS-AU,FLT & OOG Put the VCAT cross-connect in the IS,AINS administrative state. Note VCAT In Group members are in the OOS-AU,AINS & FLT or IS-NR service state. OOS-AU,AINS & FLT & OOG Put the VCAT cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD & OOG Put the VCAT cross-connect in the OOS,MT administrative state. Note VCAT In Group members are in the OOS-MA,FLT & MT service state. OOS-MA,FLT & MT Operate a loopback. OOS-MA,FLT & LPBK & MT & OOG Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions Current Service State Action Next Service StateB-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions OOS-MA,DSBLD Put the port or cross-connect in the IS administrative state. IS-NR Put the port or cross-connect in the IS,AINS administrative state. OOS-AU,AINS Put the port or cross-connect in the OOS,MT. OOS-MA,MT Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-MA,MT & OOG Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-MA,MT & OOG OOS-MA,LPBK & MT Release the loopback. Note While in OOS-MA,LPBK & MT, both Cisco Transport Controller (CTC) and Transaction Language One (TL1) allow a cross-connect to be deleted, which also removes the loopback. This applies only to the cross-connect, not the ports. OOS-MA,MT Alarm/condition is raised. OOS-AUMA,FLT & LPBK & MT OOS-AUMA,FLT & LPBK & MT & OOG for a VCAT cross-connect OOS-MA,LPBK & MT & OOG Alarm/condition is raised. OOS-AUMA,FLT & LPBK & MT & OOG Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions Current Service State Action Next Service StateB-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix B Administrative and Service States B.3.2 Port and Cross-Connect Service State Transitions OOS-MA,MT Put the port or cross-connect in the IS administrative state. IS-NR Put the port or cross-connect in the IS,AINS administrative state. OOS-AU,AINS Put the port or cross-connect in the OOS,DSBLD administrative state. OOS-MA,DSBLD OOS-MA,DSBLD & OOG for a VCAT cross-connect Put the port or cross-connect in a loopback. OOS-MA,LPBK & MT Put the VCAT cross-connect in the OOS,OOG administrative state. OOS-MA,MT & OOG Alarm/condition is raised. OOS-AUMA,FLT & MT OOS-AUMA,FLT & MT & OOG for a VCAT cross-connect OOG-MA,MT & OOG Alarm/condition is raised. OOS-AUMA,FLT & MT & OOG Table B-5 ONS 15310-CL and ONS 15310-MA Port and Cross-Connect Service State Transitions Current Service State Action Next Service StateC-1 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 APPENDIX C Network Element Defaults Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This appendix describes the factory-configured (default) network element (NE) settings for the Cisco ONS 15310-CL and Cisco ONS 15310-MA. It includes descriptions of card default settings, node default settings, and Cisco Transport Controller (CTC) default settings. For procedures for importing, exporting, and editing the settings, refer to the “Maintain the Node” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Cards that are not listed in this appendix are not supported by user-configurable NE defaults settings. To change card settings individually (that is, without directly changing the NE defaults), refer to the “Change Port Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. To change node settings, refer to the “Change Node Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. This appendix includes the following sections: • C.1 Network Element Defaults Description, page C-1 • C.2 ONS 15310-CL Card Default Settings, page C-2 • C.3 Cisco ONS 15310-CL Node Default Settings, page C-20 • C.4 CTC Default Settings, page C-29 • C.5 ONS 15310-MA Card Default Settings, page C-30 • C.6 Cisco ONS 15310-MA Node Default Settings, page C-64 C.1 Network Element Defaults Description The NE defaults are preinstalled on each Cisco ONS 15310-CL and Cisco ONS 15310-MA common control card. They also ship as a file called 15310-defaults.txt (for the ONS 15310-CL), or 15310MA-defaults.txt (for the ONS 15310-MA) on the CTC software CD if you want to import the defaults onto existing common control cards. The NE defaults include card-level, CTC, and node-level defaults.C-2 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2 ONS 15310-CL Card Default Settings Changes to card provisioning that are made manually using procedures in the “Change Card Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide override default settings. If you use the CTC Defaults editor (in the node view Provisioning > Defaults tab) or import a new defaults file, any changes to card or port settings only affect cards that are installed or preprovisioned after the defaults have changed. Changes that are made manually to most node-level default settings override the current settings, whether default or provisioned. If you change node-level default settings, either by using the Defaults editor or by importing a new defaults file, the new defaults reprovision the node immediately for all settings except those relating to protection (1+1 bidirectional switching, 1+1 reversion time, and 1+1 revertive), which apply to subsequent provisioning. Note Changing some node-level provisioning via NE defaults can cause CTC disconnection or a reboot of the node in order for the provisioning to take effect. Before you change a default, check in the Side Effects column of the Defaults editor (right-click a column header and select Show Column > Side Effects) and be prepared for the occurrence of any side effects listed for that default. C.2 ONS 15310-CL Card Default Settings The tables in this section list the default settings for Cisco ONS 15310-CL common control and Ethernet cards. Cisco provides several types of user-configurable defaults for these cards. Types of card defaults can be broadly grouped by function, as outlined in the following subsections. For information about individual card settings, refer to the “Change Port Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Note When the card level defaults are changed, the new provisioning done after the defaults have changed is affected. Existing provisioning remains unaffected. C.2.1 Configuration Defaults Except as noted, card-level and port-level configuration defaults correspond to settings found in the CTC card-level Provisioning tabs. Note The full set of Automatic Laser Shutdown (ALS) configuration defaults can be found in the CTC card-level Maintenance > Optical > ALS tabs for supported cards. ALS defaults are supported for pluggable port modules (PPMs) on the 15310-CL-CTX card. Note ML-100T-8 console port access and Remote Authentication Dial In User Service (RADIUS) server access defaults can be found in the CTC card-level IOS tab for ML-100T-8 cards. Configuration defaults that correspond to settings that are reachable from the CTC card-level Provisioning tabs (except as noted) include the following types of options (arranged by CTC subtab): • Broadband Ports—(15310-CL-CTX cards only) Set the background block error (BBE) port rate as DS3, EC1, or unassigned (DS3 is the default).C-3 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.2 Threshold Defaults • Pluggable Port Modules—(15310-CL-CTX cards only) PPM (SFP) slot and port rate configuration settings. • DS1—(15310-CL-CTX cards only) DS-1 rate port-level line configuration settings. • DS3—(15310-CL-CTX cards only) DS-3 rate port-level line configuration settings. • EC1—(15310-CL-CTX cards only) EC-1 rate port-level line configuration and SONET synchronous transport signal (STS) settings. • Optical—(15310-CL-CTX cards only) OC-N rate port-level line configuration and SONET STS settings. • ALS (card-level Maintenance > ALS tab)—(15310-CL-CTX cards only) PPM (SFP) OC-N port ALS configuration defaults. • IOS (card-level IOS tab)—(ML-100T-8 cards only) Console port and RADIUS server access settings. • Ether Ports—(CE-100T-8 cards only) Line configuration settings (including 802 class of service [IEEE 802.1p CoS] and IP type of service [ToS]). • POS Ports—(CE-100T-8 cards only) Line configuration settings. Note Line configuration defaults for the CE-100T-8 card apply to both Ethernet port and packet-over-SONET (POS) port settings where the same setting exists for both. Note PPM (SFP) slots and ports are unassigned by default. You can optionally use the Defaults editor to change these defaults to automatically assign PPM slots to take a single-port PPM, and to automatically assign PPM port OC-N rates. However, use discretion in changing the default PPM port rate in cases where single-rate PPMs might be inserted in a card, since preprovisioned PPM port rates that are applied to a single-rate PPM of the wrong rate will result in a mismatch of equipment and software. Note For further information about the supported features of each individual card, see Chapter 12, “Performance Monitoring.”For more information about the supported features of Ethernet cards, consult the Cisco ONS 15310-CL and Cisco ONS 15310-MA Ethernet Card Software Feature and Configuration Guide. C.2.2 Threshold Defaults Threshold default settings define the default cumulative values (thresholds) beyond which a threshold crossing alert (TCA) will be raised, making it possible to monitor the network and detect errors early. Card threshold default settings are provided as follows: • PM thresholds—(15310-CL-CTX cards only) Applicable to DS-1, DS-3, EC-1, and OC-N ports. Can be expressed in counts or seconds; includes line, electrical, and SONET thresholds. • Physical Layer thresholds—(15310-CL-CTX cards only) Applicable to OC-N ports. Expressed in percentages; includes optics thresholds.C-4 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card Threshold defaults are defined for near end and/or far end, at 15-minute and one-day intervals. Thresholds are further broken down by type, such as Section, Line, STS, or Virtual Tributary (VT) for performance monitoring (PM) thresholds, and TCA (warning) or Alarm for physical thresholds. PM threshold types define the layer to which the threshold applies. Physical threshold types define the level of response expected when the threshold is crossed. Note For full descriptions of the thresholds you can set for each card, refer to Chapter 12, “Performance Monitoring.” Note For additional information regarding PM parameter threshold defaults as defined by Telcordia specifications, refer to Telcordia GR-820-CORE and GR-253-CORE. C.2.3 Defaults by Card In the tables that follow, card defaults are defined by the default name, its factory-configured value, and the domain of allowable values that you can assign to it. Note Some default values, such as certain thresholds, are interdependent. Before changing a value, review the domain for that default and any other related defaults for potential dependencies. C.2.3.1 15310-CL-CTX Card Default Settings Table C-1 lists the 15310-CL-CTX card default settings. Table C-1 15310-CL-CTX Card Default Settings Default Name Default Value Default Domain CTX.Broadband.portAssignment DS3-PORT UNASSIGNED, DS3-PORT, EC1-PORT CTX.DS1-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX.DS1-PORT.config.LineCoding AMI B8ZS, AMI CTX.DS1-PORT.config.LineLength 0 - 131 ft 0 - 131 ft, 132 - 262 ft, 263 - 393 ft, 394 - 524 ft, 525 - 655 ft CTX.DS1-PORT.config.LineType D4 ESF, D4, UNFRAMED CTX.DS1-PORT.config.RetimingEnabled FALSE TRUE, FALSE CTX.DS1-PORT.config.SDBER 1.00E-07 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX.DS1-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX.DS1-PORT.config.SendAISOnTerminalLoopback TRUE TRUE, FALSE CTX.DS1-PORT.config.SendAISVOnDefects FALSE FALSE, TRUE CTX.DS1-PORT.config.SendDoNotUse FALSE TRUE, FALSE CTX.DS1-PORT.config.SFBER 1.00E-04 1E-3, 1E-4, 1E-5C-5 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.DS1-PORT.config.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX.DS1-PORT.config.SyncMsgIn FALSE FALSE when LineType D4, E1_MF, E1_CRCMF, UNFRAMED, AUTO FRAME; FALSE, TRUE when LineType ESF, J_ESF CTX.DS1-PORT.config.TreatLOFAsDefect TRUE FALSE, TRUE CTX.DS1-PORT.pmthresholds.line.farend.15min.ES 65 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.line.farend.1day.ES 648 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.line.nearend.15min.CV 13340 (BPV count) 0 - 1388700 CTX.DS1-PORT.pmthresholds.line.nearend.15min.ES 65 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.line.nearend.15min.SES 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.line.nearend.1day.CV 133400 (BPV count) 0 - 133315200 CTX.DS1-PORT.pmthresholds.line.nearend.1day.ES 648 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.line.nearend.1day.SES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.15min.CSS 25 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.CV 13296 (BIP count) 0 - 287100 CTX.DS1-PORT.pmthresholds.path.farend.15min.ES 65 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.ESA 25 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.ESB 25 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.FC 10 (count) 0 - 90 CTX.DS1-PORT.pmthresholds.path.farend.15min.SEFS 25 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.SES 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.farend.1day.CSS 25 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.1day.CV 132960 (BIP count) 0 - 27561600 CTX.DS1-PORT.pmthresholds.path.farend.1day.ES 648 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.1day.ESA 25 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.1day.ESB 25 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.1day.FC 40 (count) 0 - 8640 CTX.DS1-PORT.pmthresholds.path.farend.1day.SEFS 25 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.farend.1day.SES 100 (seconds) 0 - 86400 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-6 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.DS1-PORT.pmthresholds.path.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.nearend.15min.AISS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.nearend.15min.CV 13296 (BIP count) 0 - 287100 CTX.DS1-PORT.pmthresholds.path.nearend.15min.ES 65 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.nearend.15min.FC 10 (count) 0 - 90 CTX.DS1-PORT.pmthresholds.path.nearend.15min.SAS 2 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.nearend.15min.SES 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.path.nearend.1day.AISS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.nearend.1day.CV 132960 (BIP count) 0 - 27561600 CTX.DS1-PORT.pmthresholds.path.nearend.1day.ES 648 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.nearend.1day.FC 40 (count) 0 - 8640 CTX.DS1-PORT.pmthresholds.path.nearend.1day.SAS 17 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.nearend.1day.SES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.path.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.farend.15min.CV 15 (B3 count) 0 - 2160000 CTX.DS1-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 CTX.DS1-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.farend.1day.CV 125 (B3 count) 0 - 207360000 CTX.DS1-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 CTX.DS1-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX.DS1-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 CTX.DS1-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX.DS1-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-7 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.DS1-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX.DS1-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX.DS1-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX.DS1-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS1-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX.DS1-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.DS1-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS3-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX.DS3-PORT.config.FeInhibitLpbk FALSE TRUE, FALSE CTX.DS3-PORT.config.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft CTX.DS3-PORT.config.LineType M13 UNFRAMED, M13, C BIT CTX.DS3-PORT.config.SDBER 1.00E-07 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX.DS3-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX.DS3-PORT.config.SendAISOnTerminalLoopback TRUE TRUE, FALSE CTX.DS3-PORT.config.SFBER 1.00E-04 1E-3, 1E-4, 1E-5 CTX.DS3-PORT.config.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX.DS3-PORT.pmthresholds.cpbitpath.farend.15min.CV 382 (BIP count) 0 - 287100 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.15min.ES 25 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SAS 2 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SES 4 (seconds) 0 - 900 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-8 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.DS3-PORT.pmthresholds.cpbitpath.farend.15min.UAS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.1day.CV 3820 (BIP count) 0 - 27561600 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.1day.ES 250 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SAS 8 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SES 40 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.ES 25 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.SES 4 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.line.nearend.15min.CV 387 (BPV count) 0 - 38700 CTX.DS3-PORT.pmthresholds.line.nearend.15min.ES 25 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.line.nearend.15min.SES 4 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.line.nearend.1day.CV 3865 (BPV count) 0 - 3715200 CTX.DS3-PORT.pmthresholds.line.nearend.1day.ES 250 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.line.nearend.1day.SES 40 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.AISS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.ES 25 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SAS 2 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SES 4 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.AISS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-9 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SAS 8 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.pbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.farend.15min.CV 15 (G1 count) 0 - 2160000 CTX.DS3-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 CTX.DS3-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.farend.1day.CV 125 (G1 count) 0 - 207360000 CTX.DS3-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 CTX.DS3-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX.DS3-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 CTX.DS3-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.DS3-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX.DS3-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 CTX.DS3-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.DS3-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.EC1-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX.EC1-PORT.config.line.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft CTX.EC1-PORT.config.line.PJStsMon# 0 (STS #) 0 - 1 CTX.EC1-PORT.config.line.SDBER 1.00E-07 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX.EC1-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX.EC1-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE CTX.EC1-PORT.config.line.SFBER 1.00E-04 1E-3, 1E-4, 1E-5 CTX.EC1-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX.EC1-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-10 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.EC1-PORT.pmthresholds.line.farend.15min.CV 1312 (B2 count) 0 - 137700 CTX.EC1-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX.EC1-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.farend.1day.CV 13120 (B2 count) 0 - 8850600 CTX.EC1-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 72 CTX.EC1-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.line.nearend.15min.CV 1312 (B2 count) 0 - 137700 CTX.EC1-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX.EC1-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.line.nearend.1day.CV 13120 (B2 count) 0 - 13219200 CTX.EC1-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX.EC1-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 138600 CTX.EC1-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 13305600 CTX.EC1-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-11 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.EC1-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC12-PORT.config.line.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES CTX.OC12-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX.OC12-PORT.config.line.AlsMode Disabled Disabled, Auto Restart, Manual Restart, Manual Restart for Test CTX.OC12-PORT.config.line.AlsRecoveryPulseDuration 2.0 (seconds) 2.0, 2.1, 2.2 .. 100.0 when AlsMode Disabled, Auto Restart, Manual Restart; 80.0, 80.1, 80.2 .. 100.0 when AlsMode Manual Restart for Test CTX.OC12-PORT.config.line.AlsRecoveryPulseInterval 100 (seconds) 60 - 300 CTX.OC12-PORT.config.line.PJStsMon# 0 (STS #) 0 - 12 CTX.OC12-PORT.config.line.SDBER 1.00E-07 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-12 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC12-PORT.config.line.SendDoNotUse FALSE FALSE when SendDoNotUse TRUE; FALSE, TRUE when SendDoNotUse FALSE CTX.OC12-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX.OC12-PORT.config.line.SendDoNotUse FALSE FALSE, TRUE CTX.OC12-PORT.config.line.SFBER 1.00E-04 1E-3, 1E-4, 1E-5 CTX.OC12-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX.OC12-PORT.config.line.SyncMsgIn TRUE FALSE, TRUE CTX.OC12-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE CTX.OC12-PORT.physicalthresholds.alarm.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.alarm.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC12-PORT.physicalthresholds.alarm.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.alarm.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC12-PORT.physicalthresholds.alarm.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.alarm.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC12-PORT.physicalthresholds.warning.15min.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.15min.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC12-PORT.physicalthresholds.warning.15min.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.15min.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC12-PORT.physicalthresholds.warning.15min.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.15min.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC12-PORT.physicalthresholds.warning.1day.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.1day.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC12-PORT.physicalthresholds.warning.1day.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.1day.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC12-PORT.physicalthresholds.warning.1day.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX.OC12-PORT.physicalthresholds.warning.1day.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC12-PORT.pmthresholds.line.farend.15min.CV 5315 (B2 count) 0 - 552600 CTX.OC12-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-13 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC12-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX.OC12-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.farend.1day.CV 53150 (B2 count) 0 - 53049600 CTX.OC12-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 6912 CTX.OC12-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.nearend.15min.CV 5315 (B2 count) 0 - 552600 CTX.OC12-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX.OC12-PORT.pmthresholds.line.nearend.15min.PSC 1 (count) 0 - 600 CTX.OC12-PORT.pmthresholds.line.nearend.15min.PSD 300 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.line.nearend.1day.CV 53150 (B2 count) 0 - 53049600 CTX.OC12-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC12-PORT.pmthresholds.line.nearend.1day.PSC 5 (count) 0 - 57600 CTX.OC12-PORT.pmthresholds.line.nearend.1day.PSD 600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 553500 CTX.OC12-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 53136000 CTX.OC12-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-14 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.CV 75 (B3 count) 0 - 2160000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.ES 60 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.FC 10 (count) 0 - 72 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-15 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.SES 3 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts12c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.CV 750 (B3 count) 0 - 207360000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.ES 600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts12c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.CV 25 (B3 count) 0 - 2160000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.ES 20 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.FC 10 (count) 0 - 72 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.SES 3 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.CV 250 (B3 count) 0 - 207360000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.ES 200 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-16 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC3-PORT.config.line.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES CTX.OC3-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX.OC3-PORT.config.line.AlsMode Disabled Disabled, Auto Restart, Manual Restart, Manual Restart for Test CTX.OC3-PORT.config.line.AlsRecoveryPulseDuration 2.0 (seconds) 2.0, 2.1, 2.2 .. 100.0 when AlsMode Disabled, Auto Restart, Manual Restart; 80.0, 80.1, 80.2 .. 100.0 when AlsMode Manual Restart for Test CTX.OC3-PORT.config.line.AlsRecoveryPulseInterval 100 (seconds) 60 - 300 CTX.OC3-PORT.config.line.PJStsMon# 0 (STS #) 0 - 3 CTX.OC3-PORT.config.line.SDBER 1.00E-07 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX.OC3-PORT.config.line.SendDoNotUse FALSE FALSE when SendDoNotUse TRUE; FALSE, TRUE when SendDoNotUse FALSE CTX.OC3-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX.OC3-PORT.config.line.SendDoNotUse FALSE FALSE, TRUE CTX.OC3-PORT.config.line.SFBER 1.00E-04 1E-3, 1E-4, 1E-5 CTX.OC3-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX.OC3-PORT.config.line.SyncMsgIn TRUE FALSE, TRUE CTX.OC3-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE CTX.OC3-PORT.physicalthresholds.alarm.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.alarm.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC3-PORT.physicalthresholds.alarm.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.alarm.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC3-PORT.physicalthresholds.alarm.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-17 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC3-PORT.physicalthresholds.alarm.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC3-PORT.physicalthresholds.warning.15min.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.15min.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC3-PORT.physicalthresholds.warning.15min.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.15min.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC3-PORT.physicalthresholds.warning.15min.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.15min.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC3-PORT.physicalthresholds.warning.1day.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.1day.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX.OC3-PORT.physicalthresholds.warning.1day.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.1day.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX.OC3-PORT.physicalthresholds.warning.1day.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX.OC3-PORT.physicalthresholds.warning.1day.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX.OC3-PORT.pmthresholds.line.farend.15min.CV 1312 (B2 count) 0 - 137700 CTX.OC3-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX.OC3-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.farend.1day.CV 13120 (B2 count) 0 - 13219200 CTX.OC3-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 6912 CTX.OC3-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.nearend.15min.CV 1312 (B2 count) 0 - 137700 CTX.OC3-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX.OC3-PORT.pmthresholds.line.nearend.15min.PSC 1 (count) 0 - 600 CTX.OC3-PORT.pmthresholds.line.nearend.15min.PSD 300 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-18 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC3-PORT.pmthresholds.line.nearend.1day.CV 13120 (B2 count) 0 - 13219200 CTX.OC3-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC3-PORT.pmthresholds.line.nearend.1day.PSC 5 (count) 0 - 57600 CTX.OC3-PORT.pmthresholds.line.nearend.1day.PSD 600 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 138600 CTX.OC3-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 13305600 CTX.OC3-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-19 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.2.3 Defaults by Card CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.CV 25 (B3 count) 0 - 2160000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.ES 20 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.FC 10 (count) 0 - 72 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.SES 3 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts3c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.CV 250 (B3 count) 0 - 207360000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.ES 200 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.FC 40 (count) 0 - 6912 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX.OC3-PORT.pmthresholds.sts3c.nearend.1day.UAS 10 (seconds) 0 - 86400 Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default DomainC-20 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings C.2.3.2 Ethernet Card Default Settings Table C-2 lists the CE-100T-8 and ML100T-8 card default settings. C.3 Cisco ONS 15310-CL Node Default Settings Table C-3 on page C-21 lists the node-level default settings for the Cisco ONS 15310-CL. Cisco provides the following types of node-level user-configurable defaults: • Circuit settings—Set the administrative state and path protection circuit defaults, and whether to have circuits send a payload defect indication condition (PDIP). • General settings—Set general node management defaults, including whether to use Daylight Savings Time (DST), whether to insert an Alarm Indication Signal VT (AIS-V) in each VT when the carrying STS crosses the signal degrade (SD) path bit error rate (BER) threshold, the IP address of the Network Time Protocol/Simple Network Time Protocol (NTP/SNTP) server to be used, the time zone where the node is located, the SD path BER value, the defaults description, and whether to report loopback conditions on ports in Out-of-Service, Maintenance (OOS-MT) service state. • Network settings—Set whether to prevent the display of node IP addresses in CTC (applicable for all users except Superusers), and the default gateway node type. • OSI settings—Set Open System Interconnection (OSI) main setup, generic routing encapsulation (GRE) tunnel, link access protocol on the D channel (LAP-D), router subnet, and TID address resolution protocol (TARP) settings. • 1+1 protection settings—Set whether or not 1+1 protected circuits have bidirectional switching, are revertive, and what the reversion time is. • Legal Disclaimer—Set the legal disclaimer that warns users at the login screen about the possible legal or contractual ramifications of accessing equipment, systems, or networks without authorization. CTX.PPM.portAssignment UNASSIGNE D UNASSIGNED, OC3-PORT, OC12-PORT CTX.PPM.slotAssignment UNASSIGNE D UNASSIGNED, PPM (1 Port) CTX.Wideband.portAssignment DS1-PORT DS1-PORT Table C-1 15310-CL-CTX Card Default Settings (continued) Default Name Default Value Default Domain Table C-2 Ethernet Card Default Settings Default Name Default Value Default Domain CE-100T-8.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CE-100T-8.config.State OOS,DSBLD IS, OOS,DSBLD, OOS,MT, IS,AINS CE-100T-8.etherPortConfig.802-1Q-VlanCoS 7 (count) 0 - 7 CE-100T-8.etherPortConfig.IP-ToS 255 (count) 0 - 255 ML100T.ios.consolePortAccess TRUE TRUE, FALSE ML100T.ios.radiusServerAccess FALSE TRUE, FALSEC-21 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings • Security Access settings—Sets default security settings for LAN access, shell access, serial craft access, element management system (EMS) access (including Internet Inter-Object Request Broker Protocol [IIOP] listener port number), TL1 access, and Simple Network Management Protocol (SNMP) access. • Security Grant Permissions—Set default user security levels for activating/reverting software, performance monitoring data clearing, database restoring, and retrieving audit logs. • Security RADIUS settings—Set default RADIUS server settings for accounting port number, authentication port number, and whether to enable the node as a final authenticator. • Security Policy settings—Set the allowable failed logins before lockout, idle user timeout for each user level, optional lockout duration or manual unlock enabled, password reuse and change frequency policies, number of characters difference between the old and new password, password aging by security level, enforced single concurrent session per user, and option to disable inactive user after a set inactivity period. • BITS Timing settings—Set the AIS threshold, coding, framing, State, State Out, and line build-out (LBO) settings for building integrated timing supply 1 (BITS-1) timing. • General Timing settings—Set the mode (External, Line, or Mixed), quality of reserved (RES) timing (set the rule that defines the order of clock quality from lowest to highest), revertive, reversion time, and synchronization status messaging (SSM) message set for node timing. Note Any node level defaults changed using the Provisioning > Defaults tab, changes existing node level provisioning. Although this is service affecting, it depends on the type of defaults changed, for example, general, and all timing and security attributes. The “Changing default values for some node level attributes overrides the current provisioning.” message is displayed. The Side Effects column of the Defaults editor (right-click a column header and select Show Column > Side Effects) explains the effect of changing the default values. However, when the card level defaults are changed using the Provisioning > Defaults tab, existing card provisioning remains unaffected. Note For more information about each individual node setting, refer to the “Change Node Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Table C-3 Cisco ONS 15310-CL Node Default Settings Default Name Default Value Default Domain NODE.circuits.SendPDIP FALSE TRUE, FALSE NODE.circuits.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS NODE.circuits.upsr.ReversionTime 5.0 (minutes) 0.5, 1.0, 1.5 .. 12.0 NODE.circuits.upsr.Revertive FALSE TRUE, FALSE NODE.circuits.upsr.STS_SDBER 1.00E-06 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.circuits.upsr.STS_SFBER 1.00E-04 1E-3, 1E-4, 1E-5 NODE.circuits.upsr.SwitchOnPDIP FALSE TRUE, FALSEC-22 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings NODE.circuits.upsr.VT_SDBER 1.00E-06 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.circuits.upsr.VT_SFBER 1.00E-04 1E-3, 1E-4, 1E-5 NODE.general.DefaultsDescription Factory Defaults Free form field NODE.general.InsertAISVOnSDP FALSE TRUE, FALSE NODE.general.NtpSntpServer 0.0.0.0 IP Address NODE.general.ReportLoopbackConditionsOnOOS-MTPorts FALSE FALSE, TRUE NODE.general.SDPBER 1.00E-06 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.general.TimeZone (GMT-08:00) Pacific Time (US & Canada), Tijuana (For applicable time zones, see Table C-4 on page C-26.) NODE.general.UseDST TRUE TRUE, FALSE NODE.network.general.CtcIpDisplaySuppression FALSE TRUE, FALSE NODE.network.general.GatewaySettings None None, ENE, GNE, ProxyOnlyNode NODE.osi.greTunnel.OspfCost 110 110, 111, 112 .. 65535 NODE.osi.greTunnel.SubnetMask 24 (bits) 8, 9, 10 .. 32 NODE.osi.lapd.Mode AITS AITS, UITS NODE.osi.lapd.MTU 512 512, 513, 514 .. 1500 NODE.osi.lapd.Role Network Network, User NODE.osi.lapd.T200 200 (ms) 200, 300, 400 .. 20000 NODE.osi.lapd.T203 10000 (ms) 4000, 4100, 4200 .. 120000 NODE.osi.mainSetup.L1LSPBufferSize 512 (bytes) 512 - 1500 NODE.osi.mainSetup.NodeRoutingMode End System End System, Intermediate System Level 1 NODE.osi.subnet.DISPriority 63 1, 2, 3 .. 127 NODE.osi.subnet.ESH 10 (sec) 10, 20, 30 .. 1000 NODE.osi.subnet.IIH 3 (sec) 1, 2, 3 .. 600 NODE.osi.subnet.ISH 10 (sec) 10, 20, 30 .. 1000 NODE.osi.subnet.LANISISCost 20 1, 2, 3 .. 63 Table C-3 Cisco ONS 15310-CL Node Default Settings (continued) Default Name Default Value Default DomainC-23 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings NODE.osi.subnet.LDCCISISCost 40 1, 2, 3 .. 63 NODE.osi.subnet.SDCCISISCost 60 1, 2, 3 .. 63 NODE.osi.tarp.L1DataCache TRUE FALSE, TRUE NODE.osi.tarp.LANStormSuppression TRUE FALSE, TRUE NODE.osi.tarp.LDB TRUE FALSE, TRUE NODE.osi.tarp.LDBEntry 5 (min) 1 - 10 NODE.osi.tarp.LDBFlush 5 (min) 0 - 1440 NODE.osi.tarp.PDUsL1Propagation TRUE FALSE, TRUE NODE.osi.tarp.PDUsOrigination TRUE FALSE, TRUE NODE.osi.tarp.T1Timer 15 (sec) 0 - 3600 NODE.osi.tarp.T2Timer 25 (sec) 0 - 3600 NODE.osi.tarp.T3Timer 40 (sec) 0 - 3600 NODE.osi.tarp.T4Timer 20 (sec) 0 - 3600 NODE.osi.tarp.Type4PDUDelay 0 (sec) 0 - 255 NODE.protection.1+1.BidirectionalSwitching FALSE TRUE, FALSE NODE.protection.1+1.ReversionTime 5.0 (minutes) 0.5, 1.0, 1.5 .. 12.0 NODE.protection.1+1.Revertive FALSE TRUE, FALSE NODE.security.emsAccess.AccessState NonSecure NonSecure, Secure NODE.security.emsAccess.IIOPListenerPort (May reboot node) 57790 (port #) 0 - 65535 NODE.security.grantPermission.ActivateRevertSoftware Superuser Provisioning, Superuser NODE.security.grantPermission.PMClearingPrivilege Provisioning Provisioning, Superuser NODE.security.grantPermission.RestoreDB Superuser Provisioning, Superuser NODE.security.grantPermission.RetrieveAuditLog Superuser Provisioning, Superuser NODE.security.idleUserTimeout.Maintenance 01:00 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Provisioning 00:30 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Retrieve 00:00 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Superuser 00:15 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.lanAccess.LANAccess (May disconnect CTC from node) Front Only No LAN Access, Front Only Table C-3 Cisco ONS 15310-CL Node Default Settings (continued) Default Name Default Value Default DomainC-24 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings NODE.security.lanAccess.RestoreTimeout 5 (minutes) 0 - 60 NODE.security.legalDisclaimer.LoginWarningMessage WARN INGThis system is restricted to authorized users for business purposes. Unauthorized

access is a violation of the law. This service may be monitored for administrative

and security reasons. By proceeding, you consent to this monitoring. Free form field NODE.security.other.DisableInactiveUser FALSE FALSE, TRUE NODE.security.other.InactiveDuration 45 (days) 1, 2, 3 .. 99 when DisableInactiveU ser TRUE; 45 when DisableInactiveU ser FALSE NODE.security.other.SingleSessionPerUser FALSE TRUE, FALSE NODE.security.passwordAging.EnforcePasswordAging FALSE TRUE, FALSE NODE.security.passwordAging.maintenance.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.maintenance.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.provisioning.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.provisioning.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.retrieve.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.retrieve.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.superuser.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.superuser.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordChange.CannotChangeNewPassword FALSE TRUE, FALSE Table C-3 Cisco ONS 15310-CL Node Default Settings (continued) Default Name Default Value Default DomainC-25 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3 Cisco ONS 15310-CL Node Default Settings NODE.security.passwordChange.CannotChangeNewPasswordForNDays 20 (days) 20 - 95 NODE.security.passwordChange.NewPasswordMustDifferFromOldByNCharacters 1 (characters) 1 - 5 NODE.security.passwordChange.PreventReusingLastNPasswords 1 (times) 1 - 10 NODE.security.passwordChange.RequirePasswordChangeOnFirstLoginToNewAccount FALSE TRUE, FALSE NODE.security.radiusServer.AccountingPort 1813 (port) 0 - 32767 NODE.security.radiusServer.AuthenticationPort 1812 (port) 0 - 32767 NODE.security.radiusServer.EnableNodeAsFinalAuthenticator TRUE FALSE, TRUE NODE.security.serialCraftAccess.EnableCraftPort TRUE TRUE, FALSE NODE.security.shellAccess.AccessState NonSecure Disabled, NonSecure, Secure NODE.security.shellAccess.EnableShellPassword FALSE TRUE, FALSE NODE.security.shellAccess.TelnetPort 23 23 - 9999 NODE.security.snmpAccess.AccessState NonSecure Disabled, NonSecure NODE.security.tl1Access.AccessState NonSecure Disabled, NonSecure, Secure NODE.security.userLockout.FailedLoginsAllowedBeforeLockout 5 (times) 0 - 10 NODE.security.userLockout.LockoutDuration 00:30 (mins:secs) 00:00, 00:05, 00:10 .. 10:00 NODE.security.userLockout.ManualUnlockBySuperuser FALSE TRUE, FALSE NODE.timing.bits-1.AISThreshold SMC PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES NODE.timing.bits-1.Coding B8ZS B8ZS, AMI NODE.timing.bits-1.Framing ESF ESF, D4 NODE.timing.bits-1.LBO 0-133 (ft) 0-133, 134-266, 267-399, 400-533, 534-655 NODE.timing.bits-1.State IS IS, OOS,DSBLD NODE.timing.bits-1.StateOut IS IS, OOS,DSBLD NODE.timing.general.Mode External External, Line, Mixed Table C-3 Cisco ONS 15310-CL Node Default Settings (continued) Default Name Default Value Default DomainC-26 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.3.1 Time Zones C.3.1 Time Zones Table C-4 lists the time zones that apply for node time zone defaults. Time zones in the table are ordered by their relative relationships to Greenwich Mean Time (GMT), and the default values are displayed in the correct format for valid default input. NODE.timing.general.QualityOfRES RES=DUS PRS Optical > ALS tabs for supported cards. ALS defaults are supported for PPM (SFP) OC-N ports on the CTX2500 card. Note ML-100T-8 console port access and RADIUS server access defaults can be found in the CTC card-level IOS tab for ML-100T-8 cards. Configuration defaults that correspond to settings that are reachable from the CTC card-level Provisioning tabs (except as noted) include the following types of options (arranged by CTC subtab): • Broadband Ports—(DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards only) Set the BBE port rate as DS3, EC1, or unassigned (DS3 is the default). • DS1—(DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards only) DS-1 rate port-level line configuration settings. • DS3—(DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards only) DS-3 rate port-level line configuration settings. • EC1—(DS1-28/DS3-EC1-3 and DS1-84/DS3-EC1-3 cards only) EC-1 rate port-level line configuration and SONET STS settings. • Pluggable Port Modules—(CTX2500 cards only) PPM (SFP) slot and port rate configuration settings. • Optical—(CTX2500 cards only) OC-N rate port-level line configuration and SONET STS settings. • ALS (card-level Maintenance > Optical > ALS tab)—(CTX2500 cards only) PPM (SFP) OC-N port ALS configuration defaults. • IOS (card-level IOS tab)—(ML-100T-8 cards only) Console port and RADIUS server access settings. • Ether Ports—(CE-100T-8 cards only) Line configuration settings (including IEEE 802.1p CoS and IP ToS). • POS Ports—(CE-100T-8 cards only) Line configuration settings.C-31 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.2 Threshold Defaults Note Line configuration defaults for the CE-100T-8 apply to both Ethernet port and POS port settings, where the same setting exists for both. Note PPM (SFP) slots and ports are unassigned by default. You can optionally use the Defaults editor to change these defaults to automatically assign PPM slots to take a single-port PPM, and to automatically assign PPM port OC-N rates. However, use discretion in changing the default PPM port rate in cases where single-rate PPMs might be inserted in a card, since preprovisioned PPM port rates that are applied to a single-rate PPM of the wrong rate will result in a mismatch of equipment and software. Note For further information about the supported features of each individual card, see Chapter 3, “Card Reference.”For further information about the supported features of Ethernet cards, consult the Cisco ONS 15310-CL and Cisco ONS 15310-MA Ethernet Card Software Feature and Configuration Guide. C.5.2 Threshold Defaults Threshold default settings define the default cumulative values (thresholds) beyond which a TCA will be raised, making it possible to monitor the network and detect errors early. Card threshold default settings are provided as follows: • PM thresholds—(CTX2500, DS1-28/DS3-EC1-3, and DS1-84/DS3-EC1-3 cards) Applicable to DS-1, DS-3, EC-1, and OC-N ports. Can be expressed in counts or seconds; includes line, electrical, and SONET thresholds. • Physical Layer thresholds—(CTX2500 cards only) Applicable to OC-N ports. Expressed in percentages; includes optics thresholds. Threshold defaults are defined for near end and/or far end, at 15-minute and one-day intervals. Thresholds are further broken down by type, such as Section, Line, STS, or VT for PM thresholds, and TCA (warning) or Alarm (for physical thresholds). PM threshold types define the layer to which the threshold applies. Physical threshold types define the level of response expected when the threshold is crossed. Note For full descriptions of the thresholds you can set for each card, see Chapter 12, “Performance Monitoring.” Note For additional information regarding PM parameter threshold defaults as defined by Telcordia specifications, refer to Telcordia GR-820-CORE and GR-253-CORE. C.5.3 Defaults by Card In the tables that follow, card defaults are defined by the default name, its factory-configured value, and the domain of allowable values that you can assign to it.C-32 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card Note Some default values, such as certain thresholds, are interdependent. Before changing a value, review the domain for that default and any other related defaults for potential dependencies. CTX2500 Card Default Settings Table C-6 lists the CTX2500 card default settings. Table C-6 CTX2500 Card Default Settings Default Name Default Value Default Domain CTX-2500.OC12-PORT.config.line.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES CTX-2500.OC12-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX-2500.OC12-PORT.config.line.AlsMode Disabled Disabled, Auto Restart, Manual Restart, Manual Restart for Test CTX-2500.OC12-PORT.config.line.AlsRecoveryPulseDuration 2.0 (seconds) 2.0, 2.1, 2.2 .. 100.0 when AlsMode Disabled, Auto Restart, Manual Restart; 80.0, 80.1, 80.2 .. 100.0 when AlsMode Manual Restart for Test CTX-2500.OC12-PORT.config.line.AlsRecoveryPulseInterval 100 (seconds) 60 - 300 CTX-2500.OC12-PORT.config.line.PJStsMon# 0 (STS #) 0 - 12 CTX-2500.OC12-PORT.config.line.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX-2500.OC12-PORT.config.line.SendDoNotUse FALSE FALSE when SendDoNotUse TRUE; FALSE, TRUE when SendDoNotUse FALSE CTX-2500.OC12-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX-2500.OC12-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE CTX-2500.OC12-PORT.config.line.SendDoNotUse FALSE FALSE, TRUE CTX-2500.OC12-PORT.config.line.SFBER 1E-4 1E-3, 1E-4, 1E-5 CTX-2500.OC12-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX-2500.OC12-PORT.config.line.SyncMsgIn TRUE FALSE, TRUE CTX-2500.OC12-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE CTX-2500.OC12-PORT.physicalthresholds.alarm.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.alarm.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGHC-33 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC12-PORT.physicalthresholds.alarm.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.alarm.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC12-PORT.physicalthresholds.alarm.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.alarm.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.15min.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.15min.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.15min.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.15min.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.15min.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.15min.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.1day.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.1day.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.1day.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.1day.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC12-PORT.physicalthresholds.warning.1day.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC12-PORT.physicalthresholds.warning.1day.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC12-PORT.pmthresholds.line.farend.15min.CV 5315 (B2 count) 0 - 552600 CTX-2500.OC12-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-34 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC12-PORT.pmthresholds.line.farend.1day.CV 53150 (B2 count) 0 - 53049600 CTX-2500.OC12-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.CV 5315 (B2 count) 0 - 552600 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.PSC 1 (count) 0 - 600 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.PSD 300 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.CV 53150 (B2 count) 0 - 53049600 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.PSC 5 (count) 0 - 57600 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.PSD 600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 553500 CTX-2500.OC12-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 53136000 CTX-2500.OC12-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-35 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.CV 75 (B3 count) 0 - 2160000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.ES 60 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.15min.UAS 10 (seconds) 0 - 900 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-36 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.CV 750 (B3 count) 0 - 207360000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.ES 600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts12c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.CV 25 (B3 count) 0 - 2160000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.ES 20 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.CV 250 (B3 count) 0 - 207360000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.ES 200 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-37 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.sts3c-9c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC12-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC12-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC12-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC3-PORT.config.line.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES CTX-2500.OC3-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX-2500.OC3-PORT.config.line.AlsMode Disabled Disabled, Auto Restart, Manual Restart, Manual Restart for Test Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-38 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC3-PORT.config.line.AlsRecoveryPulseDuration 2.0 (seconds) 2.0, 2.1, 2.2 .. 100.0 when AlsMode Disabled, Auto Restart, Manual Restart; 80.0, 80.1, 80.2 .. 100.0 when AlsMode Manual Restart for Test CTX-2500.OC3-PORT.config.line.AlsRecoveryPulseInterval 100 (seconds) 60 - 300 CTX-2500.OC3-PORT.config.line.PJStsMon# 0 (STS #) 0 - 3 CTX-2500.OC3-PORT.config.line.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX-2500.OC3-PORT.config.line.SendDoNotUse FALSE FALSE when SendDoNotUse TRUE; FALSE, TRUE when SendDoNotUse FALSE CTX-2500.OC3-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX-2500.OC3-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE CTX-2500.OC3-PORT.config.line.SendDoNotUse FALSE FALSE, TRUE CTX-2500.OC3-PORT.config.line.SFBER 1E-4 1E-3, 1E-4, 1E-5 CTX-2500.OC3-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX-2500.OC3-PORT.config.line.SyncMsgIn TRUE FALSE, TRUE CTX-2500.OC3-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE CTX-2500.OC3-PORT.physicalthresholds.alarm.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.alarm.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC3-PORT.physicalthresholds.alarm.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.alarm.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC3-PORT.physicalthresholds.alarm.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.alarm.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.15min.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.warning.15min.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.15min.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-39 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC3-PORT.physicalthresholds.warning.15min.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.15min.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.warning.15min.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.1day.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.warning.1day.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.1day.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.warning.1day.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC3-PORT.physicalthresholds.warning.1day.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC3-PORT.physicalthresholds.warning.1day.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC3-PORT.pmthresholds.line.farend.15min.CV 1312 (B2 count) 0 - 137700 CTX-2500.OC3-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.farend.1day.CV 13120 (B2 count) 0 - 13219200 CTX-2500.OC3-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.CV 1312 (B2 count) 0 - 137700 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.PSC 1 (count) 0 - 600 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.PSD 300 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-40 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.CV 13120 (B2 count) 0 - 13219200 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.PSC 5 (count) 0 - 57600 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.PSD 600 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 138600 CTX-2500.OC3-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 13305600 CTX-2500.OC3-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-41 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.CV 25 (B3 count) 0 - 2160000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.ES 20 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.CV 250 (B3 count) 0 - 207360000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.ES 200 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.sts3c.nearend.1day.UAS 10 (seconds) 0 - 86400 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-42 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC3-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC3-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC3-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.vt.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC3-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.config.line.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES CTX-2500.OC48-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 CTX-2500.OC48-PORT.config.line.AlsMode Disabled Disabled, Auto Restart, Manual Restart, Manual Restart for Test CTX-2500.OC48-PORT.config.line.AlsRecoveryPulseDuration 2.0 (seconds) 2.0, 2.1, 2.2 .. 100.0 when AlsMode Disabled, Auto Restart, Manual Restart; 80.0, 80.1, 80.2 .. 100.0 when AlsMode Manual Restart for Test CTX-2500.OC48-PORT.config.line.AlsRecoveryPulseInterval 100 (seconds) 60 - 300 CTX-2500.OC48-PORT.config.line.PJStsMon# 0 (STS #) 0 - 48 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-43 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC48-PORT.config.line.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 CTX-2500.OC48-PORT.config.line.SendDoNotUse FALSE FALSE when SendDoNotUse TRUE; FALSE, TRUE when SendDoNotUse FALSE CTX-2500.OC48-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE CTX-2500.OC48-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE CTX-2500.OC48-PORT.config.line.SendDoNotUse FALSE FALSE, TRUE CTX-2500.OC48-PORT.config.line.SFBER 1E-4 1E-3, 1E-4, 1E-5 CTX-2500.OC48-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS CTX-2500.OC48-PORT.config.line.SyncMsgIn TRUE FALSE, TRUE CTX-2500.OC48-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE CTX-2500.OC48-PORT.physicalthresholds.alarm.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.alarm.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC48-PORT.physicalthresholds.alarm.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.alarm.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC48-PORT.physicalthresholds.alarm.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.alarm.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC48-PORT.physicalthresholds.warning.15min.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.15min.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC48-PORT.physicalthresholds.warning.15min.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.15min.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC48-PORT.physicalthresholds.warning.15min.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.15min.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-44 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC48-PORT.physicalthresholds.warning.1day.LBC-HIGH 200 (%) LBC-LOW, LBC-LOW + 1.0, LBC-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.1day.LBC-LOW 20 (%) 0.0, 1.0, 2.0 .. LBC-HIGH CTX-2500.OC48-PORT.physicalthresholds.warning.1day.OPR-HIGH 200 (%) OPR-LOW, OPR-LOW + 1.0, OPR-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.1day.OPR-LOW 50 (%) -1.0, 0.0, 1.0 .. OPR-HIGH CTX-2500.OC48-PORT.physicalthresholds.warning.1day.OPT-HIGH 120 (%) OPT-LOW, OPT-LOW + 1.0, OPT-LOW + 2.0 .. 255.0 CTX-2500.OC48-PORT.physicalthresholds.warning.1day.OPT-LOW 80 (%) 0.0, 1.0, 2.0 .. OPT-HIGH CTX-2500.OC48-PORT.pmthresholds.line.farend.15min.CV 21260 (B2 count) 0 - 2212200 CTX-2500.OC48-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.farend.1day.CV 212600 (B2 count) 0 - 212371200 CTX-2500.OC48-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.CV 21260 (B2 count) 0 - 2212200 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.PSC 1 (count) 0 - 600 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.PSD 300 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.CV 212600 (B2 count) 0 - 212371200 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.PSC 5 (count) 0 - 57600 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.PSD 600 (seconds) 0 - 86400 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-45 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 2151900 CTX-2500.OC48-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 206582400 CTX-2500.OC48-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-46 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.CV 75 (B3 count) 0 - 2160000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.ES 60 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.CV 750 (B3 count) 0 - 207360000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.ES 600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts12c-48c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.CV 25 (B3 count) 0 - 2160000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.ES 20 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-47 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.CV 250 (B3 count) 0 - 207360000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.ES 200 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.sts3c-9c.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC48-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.vt.farend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC48-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.farend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.15min.FC 10 (count) 0 - 72 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default DomainC-48 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28/DS3-EC1-3 Card Default Settings Table C-7 lists the DS1-28/DS3-EC1-3 card default settings. CTX-2500.OC48-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.1day.FC 40 (count) 0 - 6912 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 CTX-2500.OC48-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 CTX-2500.PPM.portAssignment UNASSIGNE D UNASSIGNED, OC3-PORT, OC12-PORT, OC48-PORT CTX-2500.PPM.slotAssignment UNASSIGNE D UNASSIGNED, PPM (1 Port) Table C-6 CTX2500 Card Default Settings (continued) Default Name Default Value Default Domain Table C-7 DS1-28/DS3-EC1-3 Card Default Settings Default Name Default Value Default Domain DS1-28-DS3-EC1-3.Broadband.portAssignment DS3-PORT UNASSIGNED, DS3-PORT, EC1-PORT DS1-28-DS3-EC1-3.DS1-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-28-DS3-EC1-3.DS1-PORT.config.LineCoding AMI B8ZS, AMI DS1-28-DS3-EC1-3.DS1-PORT.config.LineLength 0 - 131 ft 0 - 131 ft, 132 - 262 ft, 263 - 393 ft, 394 - 524 ft, 525 - 655 ft DS1-28-DS3-EC1-3.DS1-PORT.config.LineType AUTO FRAME ESF, D4, UNFRAMED, AUTO FRAME DS1-28-DS3-EC1-3.DS1-PORT.config.RetimingEnabled FALSE TRUE, FALSE DS1-28-DS3-EC1-3.DS1-PORT.config.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-28-DS3-EC1-3.DS1-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-28-DS3-EC1-3.DS1-PORT.config.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-28-DS3-EC1-3.DS1-PORT.config.SendAISVOnDefects FALSE FALSE, TRUE DS1-28-DS3-EC1-3.DS1-PORT.config.SendDoNotUse FALSE TRUE, FALSE DS1-28-DS3-EC1-3.DS1-PORT.config.SFBER 1E-4 1E-3, 1E-4, 1E-5C-49 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS1-PORT.config.State OOS,DSBLD OOS,DSBLD when LineType AUTO FRAME; IS, OOS,DSBLD, OOS,MT, IS,AINS when LineType ESF, D4, UNFRAMED DS1-28-DS3-EC1-3.DS1-PORT.config.SyncMsgIn FALSE FALSE when LineType D4, E1_MF, E1_CRCMF, UNFRAMED, AUTO FRAME; FALSE, TRUE when LineType ESF, J_ESF DS1-28-DS3-EC1-3.DS1-PORT.config.TreatLOFAsDefect TRUE FALSE, TRUE DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.ESFE 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.ESNE 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.SESFE 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.SESNE 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.UASFE 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.UASNE 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.ESFE 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.ESNE 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.SESFE 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.SESNE 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.UASFE 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.UASNE 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.farend.15min.ES 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.farend.1day.ES 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.CV 13340 (BPV count) 0 - 1388700 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.ES 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.SES 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.CV 133400 (BPV count) 0 - 133315200 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.ES 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.SES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.CSS 25 (seconds) 0 - 900 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-50 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.CV 13296 (BIP count) 0 - 287100 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ES 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ESA 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ESB 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.FC 10 (count) 0 - 90 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.SEFS 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.SES 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.CSS 25 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.CV 132960 (BIP count) 0 - 27561600 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ES 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ESA 25 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ESB 25 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.FC 40 (count) 0 - 8640 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.SEFS 25 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.SES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.AISS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.CV 13296 (BIP count) 0 - 287100 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.ES 65 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.FC 10 (count) 0 - 90 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.SAS 2 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.SES 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.AISS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.CV 132960 (BIP count) 0 - 27561600 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.ES 648 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.FC 40 (count) 0 - 8640 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.SAS 17 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.SES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.CV 15 (B3 count) 0 - 2160000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-51 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.CV 125 (B3 count) 0 - 207360000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-52 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.FC 40 (count) 0 - 72 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-28-DS3-EC1-3.DS3-PORT.config.FeInhibitLpbk FALSE TRUE, FALSE DS1-28-DS3-EC1-3.DS3-PORT.config.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft DS1-28-DS3-EC1-3.DS3-PORT.config.LineType M13 UNFRAMED, M13, C BIT DS1-28-DS3-EC1-3.DS3-PORT.config.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-28-DS3-EC1-3.DS3-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-28-DS3-EC1-3.DS3-PORT.config.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-28-DS3-EC1-3.DS3-PORT.config.SFBER 1E-4 1E-3, 1E-4, 1E-5 DS1-28-DS3-EC1-3.DS3-PORT.config.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.CV 382 (BIP count) 0 - 287100 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.ES 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SAS 2 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SES 4 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.ES 250 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SAS 8 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SES 40 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.ES 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.SES 4 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-53 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.CV 387 (BPV count) 0 - 38700 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.ES 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.SES 4 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.CV 3865 (BPV count) 0 - 3715200 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.SES 40 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.AISS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.ES 25 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SAS 2 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SES 4 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.AISS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SAS 8 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.CV 15 (G1 count) 0 - 2160000 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.CV 125 (G1 count) 0 - 207360000 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-54 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-28-DS3-EC1-3.EC1-PORT.config.line.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft DS1-28-DS3-EC1-3.EC1-PORT.config.line.PJStsMon# 0 (STS #) 0 - 1 DS1-28-DS3-EC1-3.EC1-PORT.config.line.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-28-DS3-EC1-3.EC1-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-28-DS3-EC1-3.EC1-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-28-DS3-EC1-3.EC1-PORT.config.line.SFBER 1E-4 1E-3, 1E-4, 1E-5 DS1-28-DS3-EC1-3.EC1-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS DS1-28-DS3-EC1-3.EC1-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.CV 1312 (B2 count) 0 - 137700 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.CV 13120 (B2 count) 0 - 8850600 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 72 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.CV 1312 (B2 count) 0 - 137700 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-55 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.CV 13120 (B2 count) 0 - 13219200 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 138600 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 13305600 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-56 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84/DS3-EC1-3 Card Default Settings Table C-8 lists the DS1-84/DS3-EC1-3 card default settings. DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-28-DS3-EC1-3.Wideband.portAssignment DS1-PORT DS1-PORT Table C-7 DS1-28/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default Domain Table C-8 DS1-84/DS3-EC1-3 Card Default Settings Default Name Default Value Default Domain DS1-84-DS3-EC1-3.Broadband.portAssignment DS3-PORT UNASSIGNED, DS3-PORT, EC1-PORT DS1-84-DS3-EC1-3.DS1-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-84-DS3-EC1-3.DS1-PORT.config.LineCoding AMI B8ZS, AMI DS1-84-DS3-EC1-3.DS1-PORT.config.LineLength 0 - 131 ft 0 - 131 ft, 132 - 262 ft, 263 - 393 ft, 394 - 524 ft, 525 - 655 ft DS1-84-DS3-EC1-3.DS1-PORT.config.LineType AUTO FRAME ESF, D4, UNFRAMED, AUTO FRAME DS1-84-DS3-EC1-3.DS1-PORT.config.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-84-DS3-EC1-3.DS1-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-84-DS3-EC1-3.DS1-PORT.config.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-84-DS3-EC1-3.DS1-PORT.config.SendAISVOnDefects FALSE FALSE, TRUE DS1-84-DS3-EC1-3.DS1-PORT.config.SendDoNotUse FALSE TRUE, FALSE DS1-84-DS3-EC1-3.DS1-PORT.config.SFBER 1E-4 1E-3, 1E-4, 1E-5C-57 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS1-PORT.config.State OOS,DSBLD OOS,DSBLD when LineType AUTO FRAME; IS, OOS,DSBLD, OOS,MT, IS,AINS when LineType ESF, D4, UNFRAMED DS1-84-DS3-EC1-3.DS1-PORT.config.SyncMsgIn FALSE FALSE when LineType D4, E1_MF, E1_CRCMF, UNFRAMED, AUTO FRAME; FALSE, TRUE when LineType ESF, J_ESF DS1-84-DS3-EC1-3.DS1-PORT.config.TreatLOFAsDefect TRUE FALSE, TRUE DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.ESFE 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.ESNE 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.SESFE 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.SESNE 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.UASFE 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.15min.UASNE 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.ESFE 648 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.ESNE 648 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.SESFE 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.SESNE 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.UASFE 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.ds1network.farend.1day.UASNE 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.farend.15min.ES 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.farend.1day.ES 648 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.CV 13340 (BPV count) 0 - 1388700 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.ES 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.15min.SES 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.CV 133400 (BPV count) 0 - 133315200 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.ES 648 (seconds) 0 - 86400 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-58 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.line.nearend.1day.SES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.CSS 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.CV 13296 (BIP count) 0 - 287100 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ES 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ESA 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.ESB 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.FC 10 (count) 0 - 90 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.SEFS 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.SES 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.CSS 25 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.CV 132960 (BIP count) 0 - 27561600 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ES 648 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ESA 25 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.ESB 25 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.FC 40 (count) 0 - 8640 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.SEFS 25 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.SES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.AISS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.CV 13296 (BIP count) 0 - 287100 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.ES 65 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.FC 10 (count) 0 - 90 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.SAS 2 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.SES 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.AISS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.CV 132960 (BIP count) 0 - 27561600 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.ES 648 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.FC 40 (count) 0 - 8640 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.SAS 17 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.SES 100 (seconds) 0 - 86400 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-59 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.path.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.CV 15 (B3 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.CV 125 (B3 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.CV 15 (BIP8 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.CV 125 (BIP8 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.CV 15 (BIP8 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.FC 10 (count) 0 - 72 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-60 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.CV 125 (BIP8 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.FC 40 (count) 0 - 72 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS1-PORT.pmthresholds.vt.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.config.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-84-DS3-EC1-3.DS3-PORT.config.FeInhibitLpbk FALSE TRUE, FALSE DS1-84-DS3-EC1-3.DS3-PORT.config.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft DS1-84-DS3-EC1-3.DS3-PORT.config.LineType M13 UNFRAMED, M13, C BIT DS1-84-DS3-EC1-3.DS3-PORT.config.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-84-DS3-EC1-3.DS3-PORT.config.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-84-DS3-EC1-3.DS3-PORT.config.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-84-DS3-EC1-3.DS3-PORT.config.SFBER 1E-4 1E-3, 1E-4, 1E-5 DS1-84-DS3-EC1-3.DS3-PORT.config.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.CV 382 (BIP count) 0 - 287100 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.ES 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SAS 2 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.SES 4 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.ES 250 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SAS 8 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.SES 40 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.ES 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.SES 4 (seconds) 0 - 900 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-61 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.cpbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.CV 387 (BPV count) 0 - 38700 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.ES 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.LOSS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.15min.SES 4 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.CV 3865 (BPV count) 0 - 3715200 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.LOSS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.line.nearend.1day.SES 40 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.AISS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.CV 382 (BIP count) 0 - 287100 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.ES 25 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SAS 2 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.SES 4 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.AISS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.CV 3820 (BIP count) 0 - 27561600 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.ES 250 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SAS 8 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.SES 40 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.pbitpath.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.CV 15 (G1 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.CV 125 (G1 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.ES 100 (seconds) 0 - 86400 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-62 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.CV 15 (B3 count) 0 - 2160000 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.SES 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.DS3-PORT.pmthresholds.sts.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.config.line.AINSSoakTime 08:00 (hours:mins) 00:00, 00:15, 00:30 .. 48:00 DS1-84-DS3-EC1-3.EC1-PORT.config.line.LineLength 0 - 225 ft 0 - 225 ft, 226 - 450 ft DS1-84-DS3-EC1-3.EC1-PORT.config.line.PJStsMon# 0 (STS #) 0 - 1 DS1-84-DS3-EC1-3.EC1-PORT.config.line.SDBER 1E-7 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 DS1-84-DS3-EC1-3.EC1-PORT.config.line.SendAISOnFacilityLoopback TRUE TRUE, FALSE DS1-84-DS3-EC1-3.EC1-PORT.config.line.SendAISOnTerminalLoopback FALSE TRUE, FALSE DS1-84-DS3-EC1-3.EC1-PORT.config.line.SFBER 1E-4 1E-3, 1E-4, 1E-5 DS1-84-DS3-EC1-3.EC1-PORT.config.line.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS DS1-84-DS3-EC1-3.EC1-PORT.config.sts.IPPMEnabled FALSE TRUE, FALSE DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.CV 1312 (B2 count) 0 - 137700 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.ES 87 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.SES 1 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.15min.UAS 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.CV 13120 (B2 count) 0 - 8850600 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.ES 864 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.FC 40 (count) 0 - 72 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-63 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.5.3 Defaults by Card DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.SES 4 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.farend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.CV 1312 (B2 count) 0 - 137700 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.ES 87 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.SES 1 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.15min.UAS 3 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.CV 13120 (B2 count) 0 - 13219200 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.ES 864 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.SES 4 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.line.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.CV 10000 (B1 count) 0 - 138600 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.ES 500 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.SEFS 500 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.15min.SES 500 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.CV 100000 (B1 count) 0 - 13305600 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.ES 5000 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.SEFS 5000 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.section.nearend.1day.SES 5000 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.CV 15 (B3 count) 0 - 2160000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.ES 12 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.FC 10 (count) 0 - 72 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PDET 60 (count) 0 - 7200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.NPJC-PGEN 60 (count) 0 - 7200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCDIFF 60 (count) 0 - 14400000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PDET 100 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PJCS-PGEN 100 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PDET 60 (count) 0 - 7200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.PPJC-PGEN 60 (count) 0 - 7200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.SES 3 (seconds) 0 - 900 Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-64 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings C.5.3.1 Ethernet Card Default Settings Refer to Table C-2 for the CE-100T-8 and ML-100T-8 card default settings. C.6 Cisco ONS 15310-MA Node Default Settings Table C-9 on page C-65 lists the node-level default settings for the Cisco ONS 15310-MA. Cisco provides the following types of node-level user-configurable defaults: • Circuit settings—Set the administrative state and path protection circuit defaults. • General settings—Set general node management defaults, including whether to use DST, whether to insert AIS-V in each VT when the carrying STS crosses the SD path BER threshold, the IP address of the NTP/SNTP server to be used, the time zone where the node is located, the SD path BER value, the defaults description, whether to raise a condition on an empty card slot, and whether to report loopback conditions on ports with an OOS-MT service state. • Network settings—Set whether to prevent the display of node IP addresses in CTC (applicable for all users except Superusers), default gateway node type, and whether to raise an alarm when the backplane LAN cable is disconnected. • OSI settings—Set OSI main setup, GRE tunnel, LAP-D, router subnet, and TARP settings. • 1+1 and Optimized 1+1 protection settings—Set whether or not protected circuits have bidirectional switching, are revertive, and what the reversion time is; set optimized 1+1 detection, recovery, and verify guard timer values. DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.15min.UAS 10 (seconds) 0 - 900 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.CV 125 (B3 count) 0 - 207360000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.ES 100 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.FC 40 (count) 0 - 6912 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PDET 5760 (count) 0 - 691200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.NPJC-PGEN 5760 (count) 0 - 691200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCDIFF 5760 (count) 0 - 1382400000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PDET 9600 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PJCS-PGEN 9600 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PDET 5760 (count) 0 - 691200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.PPJC-PGEN 5760 (count) 0 - 691200000 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.SES 7 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.EC1-PORT.pmthresholds.sts1.nearend.1day.UAS 10 (seconds) 0 - 86400 DS1-84-DS3-EC1-3.Wideband.portAssignment DS1-PORT DS1-PORT Table C-8 DS1-84/DS3-EC1-3 Card Default Settings (continued) Default Name Default Value Default DomainC-65 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings Note Optimized 1+1 supports three timers that ensure the correct state of the cards at key points in card communication. A verification guard timer is used when a Force is issued, to ensure that the far end has a chance to respond. A detection guard timer is used to ensure the presence of an SF/SD condition before switching away from a card. A recover guard timer ensures the absence of SF/SD prior to switching to a card. You can change the default number of seconds before these timers expire by changing the NE default for the corresponding timer to a value within its domain of allowable values. • Legal Disclaimer—Set the legal disclaimer that warns users at the login screen about the possible legal or contractual ramifications of accessing equipment, systems, or networks without authorization. • Security Access settings—Set default security settings for LAN access, shell access, serial craft access, EMS access (including IIOP listener port number), TL1 access, and SNMP access. • Security Grant Permissions—Set default user security levels for activating/reverting software, PMC learning, database restoring, and retrieving audit logs. • Security RADIUS settings—Sets default RADIUS server settings for accounting port number, authentication port number, and whether to enable the node as a final authenticator. • Security Policy settings—Set the allowable failed logins before lockout, idle user timeout for each user level, optional lockout duration or manual unlock enabled, password reuse and change frequency policies, number of characters difference between the old and new password, password aging by security level, enforced single concurrent session per user, and option to disable inactive user after a set inactivity period. • BITS Timing settings—Set the AIS threshold, coding, framing, State, State Out, and LBO settings for BITS-1 and BITS-2 timing. • General Timing settings—Set the mode (External, Line, or Mixed), quality of reserved (RES) timing (set the rule that defines the order of clock quality from lowest to highest), revertive, reversion time, and SSM message set for node timing. Note For more information about each individual node setting, refer to the “Change Node Settings” chapter of the Cisco ONS 15310-CL and Cisco ONS 15310-MA Procedure Guide. Note For Cisco ONS 15310-MA CTC level default settings refer to the “C.4 CTC Default Settings” section on page C-29. Table C-9 ONS 15310-MA Node Default Settings Default Name Default Value Default Domain NODE.circuits.State IS,AINS IS, OOS,DSBLD, OOS,MT, IS,AINS NODE.circuits.upsr.ReversionTime 5.0 (minutes) 0.5, 1.0, 1.5 .. 12.0 NODE.circuits.upsr.Revertive FALSE TRUE, FALSEC-66 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.circuits.upsr.STS_SDBER 1E-6 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.circuits.upsr.STS_SFBER 1E-4 1E-3, 1E-4, 1E-5 NODE.circuits.upsr.SwitchOnPDIP FALSE TRUE, FALSE NODE.circuits.upsr.VT_SDBER 1E-6 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.circuits.upsr.VT_SFBER 1E-4 1E-3, 1E-4, 1E-5 NODE.general.DefaultsDescription Factory Defaults Free form field NODE.general.InsertAISVOnSDP FALSE TRUE, FALSE NODE.general.NtpSntpServer 10.92.18.1 IP Address NODE.general.RaiseConditionOnEmptySlot FALSE TRUE, FALSE NODE.general.ReportLoopbackConditionsOnOOS-MTPorts FALSE FALSE, TRUE NODE.general.SDPBER 1E-6 1E-5, 1E-6, 1E-7, 1E-8, 1E-9 NODE.general.TimeZone (GMT-08:00) Pacific Time (US & Canada), Tijuana (For applicable time zones, see Table C-4 on page C-26.) NODE.general.UseDST TRUE TRUE, FALSE NODE.network.general.AlarmMissingBackplaneLAN FALSE TRUE, FALSE NODE.network.general.CtcIpDisplaySuppression FALSE TRUE, FALSE NODE.network.general.GatewaySettings None None, ENE, GNE, ProxyOnlyNode NODE.osi.greTunnel.OspfCost 110 110, 111, 112 .. 65535 NODE.osi.greTunnel.SubnetMask 24 (bits) 8, 9, 10 .. 32 NODE.osi.lapd.Mode AITS AITS, UITS NODE.osi.lapd.MTU 512 512, 513, 514 .. 1500 NODE.osi.lapd.Role Network Network, User NODE.osi.lapd.T200 200 (ms) 200, 300, 400 .. 20000 NODE.osi.lapd.T203 10000 (ms) 4000, 4100, 4200 .. 120000 NODE.osi.mainSetup.L1LSPBufferSize 512 (bytes) 512 - 1500 Table C-9 ONS 15310-MA Node Default Settings (continued) Default Name Default Value Default DomainC-67 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.osi.mainSetup.NodeRoutingMode End System End System, Intermediate System Level 1 NODE.osi.subnet.DISPriority 63 1, 2, 3 .. 127 NODE.osi.subnet.ESH 10 (sec) 10, 20, 30 .. 1000 NODE.osi.subnet.IIH 3 (sec) 1, 2, 3 .. 600 NODE.osi.subnet.ISH 10 (sec) 10, 20, 30 .. 1000 NODE.osi.subnet.LANISISCost 20 1, 2, 3 .. 63 NODE.osi.subnet.LDCCISISCost 40 1, 2, 3 .. 63 NODE.osi.subnet.SDCCISISCost 60 1, 2, 3 .. 63 NODE.osi.tarp.L1DataCache TRUE FALSE, TRUE NODE.osi.tarp.LANStormSuppression TRUE FALSE, TRUE NODE.osi.tarp.LDB TRUE FALSE, TRUE NODE.osi.tarp.LDBEntry 5 (min) 1 - 10 NODE.osi.tarp.LDBFlush 5 (min) 0 - 1440 NODE.osi.tarp.PDUsL1Propagation TRUE FALSE, TRUE NODE.osi.tarp.PDUsOrigination TRUE FALSE, TRUE NODE.osi.tarp.T1Timer 15 (sec) 0 - 3600 NODE.osi.tarp.T2Timer 25 (sec) 0 - 3600 NODE.osi.tarp.T3Timer 40 (sec) 0 - 3600 NODE.osi.tarp.T4Timer 20 (sec) 0 - 3600 NODE.osi.tarp.Type4PDUDelay 0 (sec) 0 - 255 NODE.protection.1+1.BidirectionalSwitching FALSE TRUE, FALSE NODE.protection.1+1.DetectionGuardTimer 1 (seconds) 0, 0.05, 0.1, 0.5, 1, 2, 3, 4, 5 NODE.protection.1+1.RecoveryGuardTimer 1 (seconds) 0, 0.05, 0.1 .. 10 NODE.protection.1+1.ReversionTime 5.0 (minutes) 0.5, 1.0, 1.5 .. 12.0 NODE.protection.1+1.Revertive FALSE TRUE, FALSE NODE.protection.1+1.VerifyGuardTimer 0.5 (seconds) 0.5, 1 NODE.security.emsAccess.AccessState NonSecure NonSecure, Secure NODE.security.emsAccess.IIOPListenerPort (May reboot node) 57790 (port #) 0 - 65535 NODE.security.grantPermission.ActivateRevertSoftware Superuser Provisioning, Superuser NODE.security.grantPermission.PMClearingPrivilege Provisioning Provisioning, Superuser Table C-9 ONS 15310-MA Node Default Settings (continued) Default Name Default Value Default DomainC-68 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.security.grantPermission.RestoreDB Superuser Provisioning, Superuser NODE.security.grantPermission.RetrieveAuditLog Superuser Provisioning, Superuser NODE.security.idleUserTimeout.Maintenance 01:00 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Provisioning 00:30 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Retrieve 00:00 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.idleUserTimeout.Superuser 00:15 (hours:mins) 00:00, 00:01, 00:02 .. 16:39 NODE.security.lanAccess.LANAccess (May disconnect CTC from node) Front & Backplane No LAN Access, Backplane Only, Front Only, Front & Backplane NODE.security.lanAccess.RestoreTimeout 5 (minutes) 0 - 60 NODE.security.legalDisclaimer.LoginWarningMessage WARNI NGThis system is restricted to authorized users for business purposes. Unauthorized

access is a violation of the law. This service may be monitored for administrative

and security reasons. By proceeding, you consent to this monitoring. Free form field NODE.security.other.DisableInactiveUser FALSE FALSE, TRUE Table C-9 ONS 15310-MA Node Default Settings (continued) Default Name Default Value Default DomainC-69 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.security.other.InactiveDuration 45 (days) 1, 2, 3 .. 99 when DisableInactiveU ser TRUE; 45 when DisableInactiveU ser FALSE NODE.security.other.SingleSessionPerUser FALSE TRUE, FALSE NODE.security.passwordAging.EnforcePasswordAging FALSE TRUE, FALSE NODE.security.passwordAging.maintenance.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.maintenance.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.provisioning.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.provisioning.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.retrieve.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.retrieve.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordAging.superuser.AgingPeriod 45 (days) 20 - 90 NODE.security.passwordAging.superuser.WarningPeriod 5 (days) 2 - 20 NODE.security.passwordChange.CannotChangeNewPassword FALSE TRUE, FALSE NODE.security.passwordChange.CannotChangeNewPasswordForNDays 20 (days) 20 - 95 NODE.security.passwordChange.NewPasswordMustDifferFromOldByNCharacters 1 (characters) 1 - 5 NODE.security.passwordChange.PreventReusingLastNPasswords 1 (times) 1 - 10 NODE.security.passwordChange.RequirePasswordChangeOnFirstLoginToNewAccount FALSE TRUE, FALSE NODE.security.radiusServer.AccountingPort 1813 (port) 0 - 32767 NODE.security.radiusServer.AuthenticationPort 1812 (port) 0 - 32767 NODE.security.radiusServer.EnableNodeAsFinalAuthenticator TRUE FALSE, TRUE NODE.security.serialCraftAccess.EnableCraftPort TRUE TRUE, FALSE NODE.security.shellAccess.AccessState NonSecure Disabled, NonSecure, Secure NODE.security.shellAccess.EnableShellPassword FALSE TRUE, FALSE NODE.security.shellAccess.TelnetPort 23 23 - 9999 NODE.security.snmpAccess.AccessState NonSecure Disabled, NonSecure NODE.security.tl1Access.AccessState NonSecure Disabled, NonSecure, Secure NODE.security.userLockout.FailedLoginsAllowedBeforeLockout 5 (times) 0 - 10 NODE.security.userLockout.LockoutDuration 00:30 (mins:secs) 00:00, 00:05, 00:10 .. 10:00 NODE.security.userLockout.ManualUnlockBySuperuser FALSE TRUE, FALSE Table C-9 ONS 15310-MA Node Default Settings (continued) Default Name Default Value Default DomainC-70 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.timing.bits-1.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES NODE.timing.bits-1.AISThreshold SMC PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES NODE.timing.bits-1.Coding B8ZS B8ZS, AMI NODE.timing.bits-1.Framing ESF ESF, D4 NODE.timing.bits-1.LBO 0-133 (ft) 0-133, 134-266, 267-399, 400-533, 534-655 NODE.timing.bits-1.State OOS,DSBLD IS, OOS,DSBLD NODE.timing.bits-1.StateOut IS IS, OOS,DSBLD NODE.timing.bits-2.AdminSSMIn STU PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES NODE.timing.bits-2.AISThreshold SMC PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES NODE.timing.bits-2.Coding B8ZS B8ZS, AMI NODE.timing.bits-2.Framing ESF ESF, D4 NODE.timing.bits-2.LBO 0-133 (ft) 0-133, 134-266, 267-399, 400-533, 534-655 NODE.timing.bits-2.State OOS,DSBLD IS, OOS,DSBLD NODE.timing.bits-2.StateOut IS IS, OOS,DSBLD NODE.timing.general.Mode Line External, Line, Mixed Table C-9 ONS 15310-MA Node Default Settings (continued) Default Name Default Value Default DomainC-71 Cisco ONS 15310-CL and Cisco ONS 15310-MA Reference Manual. R7.0 Appendix C Network Element Defaults C.6 Cisco ONS 15310-MA Node Default Settings NODE.timing.general.QualityOfRES RES=DUS PRS