Escolar Documentos
Profissional Documentos
Cultura Documentos
B
User Interface Guide 104-DOC000027-E
TJ100CPr4 Version 1.0
Revision history
Revision Date Comments
1.0 11/03/2008 Standard Release
To the best of Tejas Networks's knowledge, at the time of its preparation, the information in this document is accurate.
However, Tejas Networks makes no warranty or representation with respect to its accuracy and disclaims all liability
which may result from inaccuracies, or third-party use, or third-party reliance. This information is subject to change
without notice.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means,
electronic, mechanical, photocopy, or otherwise, without the prior written consent of Tejas Networks. Tejas Networks
assumes no responsibility for its use, nor for infringements of patents or other rights of third parties. This document
implies no license under patents or copyrights. Trademarks in this document belong to their respective companies.
Table of contents iii
Table of contents 0
8.2 Connections 33
8.3 Timing Manager 38
8.3.1 Viewing timing manager protection request 39
8.3.2 Giving external commands to synchronization sources 40
Configuration 41
9.1 Introduction 41
9.2 Cross-connects 41
9.2.1 Filtering cross-connects 42
9.2.2 Adding cross-connects 44
9.2.3 Editing Cross-connects 47
9.2.4 Deleting Cross-connects 48
9.3 Overhead Tunnel 48
9.3.1 Viewing Overhead tunnel 49
9.3.2 Provisioning overhead tunnel 50
9.3.3 Deleting overhead tunnel 51
9.4 Environmental Alarm Inputs 51
9.4.1 Provisioning environmental alarms 51
9.5 SNMP traps 52
9.5.1 Configuring network element to send SNMP traps 52
9.5.2 Deleting SNMP traps 53
9.6 Facilities 53
9.6.1 Provisioning STM ports 56
9.6.2 Setting TCA for 15-min interval/1-day duration 59
9.6.3 Provisioning AUG 61
9.6.4 Provisioning AU4 62
9.6.5 Editing AU4 performance monitoring parameters 66
9.6.6 Provisioning TU 67
9.6.7 Configuring TU performance monitoring parameters 72
9.7 PDH Ports 74
9.7.1 Configuring E1/E3 ports 75
9.7.2 Viewing TCA profiles for PDH ports 76
9.7.3 Provisioning a new TCA profile for PDH ports 78
9.7.4 Deleting TCA profile of a PDH port 81
9.8 Ethernet 81
9.8.1 Configuring Ethernet ports 84
9.8.2 Viewing the TCA settings for Ethernet ports 86
9.8.3 Configuring TCA profiles for Ethernet ports 86
9.9 VCG 87
9.9.1 Provisioning the VCG interface 87
9.9.2 Viewing VC group 90
9.9.3 Provisioning LCAS 91
9.9.4 Adding a VC to VCG 93
9.9.5 Deleting a VC from VCG 95
9.10 Network (NE) Adjacency 95
9.10.1 Enabling auto-discovery for an STM port 96
TJ100CPr4
Table of contents v
TJ100CPr4
Table of contents vii
TJ100CPr4
1
About this Document 1-
• Planners
• Provisioners
• Network Administrators
• Maintenance Personnels
1.2 References
This document has references to the following documents:
Note : Some of the features are licensed. If you do not find the following options in
the navigation menu, please contact your sales co-ordinator.
• Terminal Server
TJ100CPr4
2
Technical Support Information 1-
Table 2-1
Technical Assistance Center
For problems that affect service 91-99019-71880
For 24 hours emergency recover or software upgrade 91-93438- 31565
support, that is for:
Restoration of service for equipment that has been
carrying traffic
Issues that prevent traffic protection switching
Issues that prevent completion of software upgrades
For problems that affect and do not affect the service 91-80-4179-4700
For assistance on technical support and upgrade
notification
You can also mail to tac@india.tejasnetworks.com
TJ100CPr4
Browser Based User Interface
3 1-
3.1 Introduction
This chapter describes the procedures for logging in and logging out
of the Tejas Network Element (NE). It also provides the structure
and functionality of the craft application or Web User Interface
(WUI) for the Tejas Network Element Software (TejNES).
• Windows XP
• Windows 2000
• Windows NT
• Linux 2.4, 2.6
The browsers that can be used for accessing the WUI are:
Step Action
• System Operation
• System Configuration
• Diagnostics
• Maintenance Operations
• Software and Configuration Management
• User Administration
TJ100CPr4
Browser Based User Interface 7
The default view of the WUI is divided into four separate areas. The
four areas are as follows:
• Alarm Banner
• Title area
• Navigation menu
• Input/Output area
Figure 3-1 shows the default view of the TejNES web user interface.
Figure 3-1
Sample User Interface Layout - Page 1
When automatic refresh is disabled, the counters are not updated and
count change due to declaration of new alarms or clearing of existing
alarms are not reflected on the banner. Disabling the automatic
refresh will affect only the current WUI and will not affect the refresh
functionality for other users or alarm notification to NMS
applications.
TJ100CPr4
Browser Based User Interface 9
The question mark above the alarm banner indicates the order in
which the alarms are displayed (Critical Major Minor Deferred
Warning) when mouse is brought over it.
3.5 Logging In
The craft application or the WUI of a network element can be
accessed remotely using DCC. To access a network element in a
network remotely, you need to add the IP address of the gateway
network element in the network as route in your system.
Note 1: An Ethernet cross cable is used for direct connectivity between the Ethernet
interface of the PC and the NMS port on the PXAT card of the network element.
Note 2: An Ethernet straight cable is used to connect the network element and the PC
terminal, when connected through an Ethernet hub/switch.
To log into the network element, open a web browser session and
enter the following Universal Resource Locator (URL):
http://192.168.1.254:20080/
Note 3: The URL http://192.168.1.254 is the default factory setting. After the system
is commissioned the network element is assigned the element specific URL.
TJ100CPr4
Browser Based User Interface 11
Note 4: If the URL is not accessible, the following can be a possible reason:
• Ethernet connectivity to the network element is improper.
• Type of cable used is different (straight/cross).
• Ethernet interface on the PC/terminal is not provisioned.
• Incorrect URL entered to access the network element.
• Malfunction of the network element software.
• Route to the subnet IP, http://192.168.1.254:20080, is not present
on the terminal.
Note 5: Ensure that the computer has Netscape Navigator, version 4.75 onwards or
Internet Explorer, version 5.0 onwards for setting up the network element
software.
If the URL is accessible, login to the WUI with the User Name as
tejas and Password as j72e#05t. On successful log in, the NE
Information page is displayed.
Note 6: Change the initial password of the default user account on the network
element. The default user accounts and passwords are widely known.
Note 7: The performance of the craft application is reduced with the increase in the
number of sessions.
Note 8: The “Save this password in your password list” should not be checked if the
craft application is used from a shared PC. Also after finishing the work, the
user should logout of the application and close the browser.
CAUTION
Multiple administrative and diagnostic logins
During multiple administrative and diagnostic logins, ensure that
actions performed do not affect the work of other users. The
command implementations are on first-come-first-serve basis.
TJ100CPr4
4
NE Information 1-
4.1 Introduction
This chapter explains the Network Element (NE) information page.
The NE information page is the default page displayed after logging
into the network element. The basic configuration information of a
network element can be accessed and managed in this page.
Step Action
Note : Editing the fields on the NE information page is service non-disruptive. The
software reboots without affecting the commissioned traffic (warm reset) when
Router ID or Ethernet IP are changed. The network element does not reboot
for any changes made in name, location, etc. Connectivity to the Network
element software is lost while rebooting.
TJ100CPr4
NE Information 15
Table 4-2 gives the default and acceptable values for the configurable
network element parameters.
Table 4-2
Default and acceptable values for configurable network element parameters
Parameter Default value Acceptable value
Name Default 0 - 20 character string
(see Note)
Router ID 192.168.1.254 0.0.0.0 - 254.254.254.254
Ethernet IP 192.168.1.254/24 0.0.0.0 - 254.254.254.254. The mask
can take a value of 0, 8, 16, or 24
Contact - 0 - 255 character string
(see Note)
Location - 0 - 255 character string
(see Note)
Note: This field supports all alphanumeric and special characters.
TJ100CPr4
5
Node Slot View 1-
Clicking the graphical image of the card displays the details of the card
in a new page. The lower portion of the page displays the status of
active alarms present on the card.
The Node slot view page is refreshed for every two seconds. The Stop
Refresh button, when clicked stops the automatic refresh of the page.
Clicking the Stop Refresh button again will resume the automatic
refresh of the page.
Table 5-1 lists the visual indicators on the Node Slot View page.
Table 5-1
Visual Indicators on the Node Slot View page
Status of the LED Indication
Status
Red Card failure
Green Normal working
Amber • Power cycle
• Mismatch
Alarm
Red Major/Critical alarms present on the network element
Green Normal working
Amber Minor alarms present on the network element
Blue Deferred alarms present on the network element
Active
Red Card failure
Green Normal working
Amber • Power cycle
• Mismatch
Step Action
1 Click Node Slot View in the main menu. The Node slot view
page is displayed.
2 Click the card to view its parameters. The card page is
displayed.
TJ100CPr4
Node Slot View 19
Note : The slot view shows all the cards physically present in the network element.
The view of the cards may or may not match with the physical orientation of
the cards.
TJ100CPr4
6
System Time 1-
6.1 Introduction
This chapter describes the System Time menu in the WUI.
Note : You can change the network element time settings by editing values in the WUI.
But for changes to take place in the OS and logs, a service non-disruptive reset
has to be applied.
The following are the steps to set the system date and time:
Step Action
Note : The network element must be warm rebooted for the changes made for time
zone to take effect.
TJ100CPr4
System Time 23
The following are the steps to set time zone on a network element.
Step Action
Table 6-2 lists the configurable parameters for setting other time
zones with default and acceptable values.
Table 6-2
Default and acceptable values for configurable Other time zone parameters
Parameter Default value Acceptable value
Zone IST Any time zone available in the time zones list
Offset Hours -5 -12 to 11
Offset Minutes 30 0 - 59
Daylight saving Disable • Enable
• Disable
DST String - Enter an identifier for the DST period. The
identifier can be a set of alphanumeric
characters.(see Note)
DST Start - • Month—January to December
(Month: Week: Day: Hour: • Week—1st Week to 4th Week, Last week
Minute) • Day—Sunday to Saturday
• Hour—0 to 23
• Minutes—0 to 59
(see Note)
DST Stop - • Month—January to December
(Month: Week: Day: Hour: • Week—1st Week to 4rth Week, Last week
Minute) • Day—Sunday to Saturday
• Hour—0 to 23
• Minutes—0 to 59
(see Note)
Note: The DST String, DST Start and DST Stop parameters can be provisioned only if Daylight
savings is enabled.
TJ100CPr4
System Time 25
CAUTION
In case the network elements in a network are synchronized to more
than one NTP server, ensure that the NTP servers are synchronized
to a common wall clock. Non-synchronous NTP servers may result in
frequent reset of internal clock in the network elements, which may
lead to incorrect performance bining.
Note 2: Timing server nominated must be of stratum level of 14 or less than 14. The
network element will not synchronize to the server if the stratum level is not
within the range.
Table 6-3 describes the fields on the Set Time Server page.
Table 6-3
Fields on the Set Time Server page
Field Description
NTP Client Enable Enable Allows an NTP server to be nominated as
synchronization source for date and time.
Disable Nomination of an NTP server as
synchronization source for date and time is
not allowed.
NTP Server-0 Enter the IP Address of the first time server.
NTP Server-1 Enter the IP Address of the second time server.
The following are the steps to set the network time server.
Step Action
TJ100CPr4
System Time 27
Table 6-4 gives the default and acceptable values for the configurable
time server parameters.
Table 6-4
Default and acceptable values for configurable time server settings
Parameter Default value Acceptable value
NTP client Enable Disable • Enable
• Disable
NTP Server-0 - 0.0.0.0 - 255.255.255.255
NTP Server-1 - 0.0.0.0 - 255.255.255.255
NTP Server-2 - 0.0.0.0 - 255.255.255.255
NTP Server-3 - 0.0.0.0 - 255.255.255.255
NTP Server-4 - 0.0.0.0 - 255.255.255.255
Synchronization interval 1024 • 16
(seconds) • 32
• 64
• 128
• 256
• 512
• 1024
• 2048
• 4096
• 8192
• 16384
TJ100CPr4
7
Inventory 1-
7.1 Introduction
The Inventory menu in the WUI provides the inventory of the
modules, circuit packs and SFPs in the network element and its details
such as physical presence, operation status, product code and serial
number.
Note : The Node inventory does not refresh automatically. You need to manually
refresh the page or the pane to view any change made to the inventory of the
node.
7.2.1 Deleting pluggable modules
Pluggable Modules describes the SFP parameters. The SFPs are
associated with the STM ports on the cross-connect card. The SFPs
can be deleted without having to actually remove the SFP. The SFP
will autoprovision with the slotted SFP values.
TJ100CPr4
Inventory 31
Note 1: Lasers are specific to the interfaces. For example, a STM laser can be
inserted only into an STM interface. The ranges that a Laser can have are
Long Reach, Short Reach and Intermediate Reach.
Note 2: The Delete button allows you to delete the SFP. You do not require to
physically remove the SFP before deleting. The SFP will autoprovision with
the slotted SFP values. The Node inventory page displays modules pluggable
status along with the chassis information.
The following are the steps to delete the configuration of pluggable
modules from the network element.
Step Action
7.3 Shelf
The shelf submenu lists all the cards present in the network element.
Each individual card link, when clicked, displays the physical
parameters of the card.
Table 7-3 gives the general information about the physical attributes
of the cards present in the network element.
Table 7-3
Physical attributes of the cards present in the network element
Attribute Description Applicable to
Shelf Displays the shelf number in which the network • PXAT
element is present. This value is always 1 in this • TETH02EX
release.
• APSU01, DPSU01
Slot Displays the slot number in which the card is • PXAT
present • TETH02EX
• APSU01, DPSU01
Equipment • Present indicates that the card is present in the • PXAT
node • TETH02EX
• NotPresent indicates that the card is not present • APSU01, DPSU01
in the node
Product Code Displays the product code of the module • PXAT
• TETH02EX
• APSU01, DPSU01
Serial Number Displays the unique serial number of a specific • PXAT
module • TETH02EX
• APSU01, DPSU01
Software Displays the version of the software installed in PXAT
Version the node
Redundancy Displays the Redundancy Status of the card as PXAT
Status primary or secondary.
TJ100CPr4
8
Protection 1-
8.1 Introduction
This chapter describes the protection feature for a network element.
The linear protection switching mechanism is coordinated by the K1
and K2 bytes in the Line Overhead. Protection switching comes into
effect in case of:
• Signal failure
• Signal degradation
• User initiated request
• Connections
• Timing Manager
8.2 Connections
Sub-Network Connection Protection (SNCP) is path protection
switching that is initiated in the path terminating equipment when the
network element is in SDH mode.
TJ100CPr4
Protection 35
Figure 8-1 shows switching in the case of single and dual fiber cuts.
Figure 8-1
SNCP configuration
Normal Operation
A B
C D
A B
C D
A B
C D
Working Path
Protection Path
Bridging
Note 1: When there is a signal fail on the protect path, then a manual switch to the
protect path will fail.
Note 3: The manual switch command is successfully executed only if the working or
the protection path to which the traffic is being switched is error or alarm free.
Note 5: SNCP protection for card failure can be provided by provisioning work and
protect port/time slot on different card packs in the network element.
In the Connection Protection Requests page, you can
TJ100CPr4
Protection 37
TJ100CPr4
Protection 39
Step Action
Step Action
TJ100CPr4
9
Configuration 1-
9.1 Introduction
This chapter describes the Configuration menu in the WUI. In the
Configuration menu, you can configure the following:
• Cross-connect
• Overhead Tunnel
• Environmental Alarm Input
• SNMP Traps
• Facilities
• NE Adjacency
• DCN
• Synchronization
9.2 Cross-connects
The Cross-connect menu enables you to create cross-connects in a
network element. You can provision 1WAY, 2WAY, protected or
unprotected cross-connects of different capacities. The numbering
scheme used is
• filter cross-connects
• add cross-connects
• edit a cross-connect
• delete a cross-connect
• edit VCG
9.2.1 Filtering cross-connects
The Filter button when clicked, filters cross-connect based on the
selected criteria for capacity, card, port number, etc. The filtered
results are displayed in the Cross-connects section.of the Configure
Cross-connects page.
The Select all button when clicked selects all the filtered
cross-connects. The Deselect all button when clicked deselects all
the selected cross-connects.
Step Action
TJ100CPr4
Configuration 43
TJ100CPr4
Configuration 45
Step Action
Table 9-3 gives the default and acceptable values for configurable
cross-connect parameters.
Table 9-3
Default and acceptable values for the configurable cross-connect parameters
Parameter Default value Acceptable value
Number of connections 1 The number of cross-connects is limited
by the uplink bandwidth of the
cross-connect card.
Capacity VC12 • VC12
• VC3
• VC4
Circuit Identifier Tejas Networks Any alphanumeric character string (see
Note 1)
Directionality 2WAY • 1WAY
• 2WAY
Working Source and - Valid Source and Destination port from
Destination port the drop down menu
STM No. 1 1 - 16
K 1 1-3
L 1 1-7
M 1 1 - 3 in case of VC12
Source Protection Disable • Enable
• Disable
Destination Protection Disable • Enable
• Disable
Reversion mode parameters
Source Port Revertive Non-revertive • Non-revertive
• Revertive
Source WTR Time 5 1 to 12 minutes
(see Note 2)
TJ100CPr4
Configuration 47
Note 1: Traffic reverts back to work path when the conditions that diverted it to the
protect path are set right in case of revertive mode. In case of Non-revertive
mode, traffic remains in protect path even when the conditions that diverted it
to the protect path are set right.
Note 2: Source Protection and Destination Protection must be enabled in the Edit
CrossConnect page for Source WTR Time, Destination WTR Time and for
fields under protection to be available for editing.
Step Action
Step Action
TJ100CPr4
Configuration 49
Step Action
Note : The user can provision a maximum of 30 overhead bytes for overhead
tunneling.
Table 9-4 describes the fields on the Configure Overhead Tunnels
page.
Table 9-4
Fields on the Configure Overhead Tunnels page
Field Description
Tunnel Name Displays the Tunnel name. The Tunnel name is a combination of
the source and destination ports.
Source Port Displays the Source STM port.
Destination Port Displays the Destination STM port.
Overhead Byte Displays the overhead byte that is tunneled.
delete Select the check box for the overhead tunnel to be deleted.
Step Action
TJ100CPr4
Configuration 51
Step Action
Step Action
Step Action
TJ100CPr4
Configuration 53
Table 9-6 gives the default and acceptable values for SNMP trap
parameters.
Table 9-6
Default and acceptable values for the SNMP trap parameters
Parameter Default values Acceptable values
IP Address - 0.0.0.0 - 225.225.225.254
Port 162 -
SNMP Version SNMP_V1 SNMP_V1
SNMP_V2
Step Action
9.6 Facilities
The Facilities menu should be used for checking, viewing or editing
the attributes of optical ports, PDH ports, Ethernet and VCG ports.
Table 9-7 describes the fields on the Provision interface page for
STM ports.
Table 9-7
Field on the Provision interface page for STM port
Field Description
Admin Status Up Sets the interfaces in service.
Down Sets the interfaces out of service.
Alarm Reporting Status Report Enables reporting of alarms on STM port.
No-Report Disables reporting of alarms on STM port.
STM Port Profile Select an STM port profile.
Line Coding Displays the type of line coding being used—NRZ coding
Laser Displays as a link, the Laser being used. Click the link to view the
Laser provisioning page.
ECC Byte Selection Displays the established Embedded Communication Channel:
• ecc_DCC_M
• ecc_DCC_R
• ecc_F1
• ecc_F2
• ecc_F3
• ecc_F2F3
Transmit J0 Enter the section trace message to be transmitted. Maximum length
is as specified by Transmit J0 Length, padded with spaces for
strings less than specified length.
Transmit J0 Length Select the length of the section trace to be transmitted.
Expected J0 Enter the expected received section trace value.
Expected J0 Length Allows you to select the length of expected received section trace.
Received J0 Displays the received Section trace message. TIM Action settings
control handling of mismatches between received and expected
trace messages.
TJ100CPr4
Configuration 55
Step Action
TJ100CPr4
Configuration 57
TJ100CPr4
Configuration 59
Table 9-9
TCA Settings for 15-min and 1-Day duration
Field Description
Threshold RS-ES Threshold for Errored Seconds-Regenerator Section
Threshold RS-SES Threshold for Severely Errored Seconds-Regenerator Section
Threshold RS-BBE/RS-CV Threshold for Background Block Errors/Code
Violations-Regenerator Section
Threshold MS-ES Threshold for Errored Seconds-Multiplex Section
Threshold MS-SES Threshold for Severely Errored Seconds-Multiplex Section
Threshold Threshold for Background Block Errors/Code
MS-BBE/MS-CV Violations-Multiplex Section
Step Action
4
If you want to Then
enable
Threshold for select Enable for Threshold (for TCA-15min)
15-min
Threshold for select Enable for Threshold (for TCA-1Day)
1-day
Step Action
TJ100CPr4
Configuration 61
Table 9-10
Default and acceptable values for TCA threshold parameters
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES-S 114 10944 0 - 900 0 - 86400
Threshold SES-S 10 960 0 - 900 0 - 86400
Threshold 27000 2592000 0 - 16777215 0 - 1610612640
BBE-S/CV-S
Threshold ES-L 114 10944 0 - 900 0 - 86400
Threshold SES-L 10 960 0 - 900 0 - 86400
Threshold 27000 2592000 0 - 16777215 0 - 1610612640
BBE-L/CV-L
Note 1: The signal label field is provisionable, but should not be edited as it will be
automatically assigned a value depending on the type of cross-connect
provisioned.
Note 2: AU can be provisioned only if all the cross-connects associated with that AUG
are unprovisioned or deleted.
Step Action
Note : Options available in the Mapping structure depend on the mapping selected
while initializing the network element. Refer to the Installation and
Commissioning Procedures manual, 104-DOC000026-E for more information.
9.6.4 Provisioning AU4
Table 9-11 describes the fields displayed on the Provision AU4 page.
Table 9-11
Fields on the Provision AU4 page
Field Description
Signal Label Select a payload signal label from the drop-down menu.
Received Signal Label Displays the payload type or the Signal label received on the AU
path. For example, tug_structure, asynchronous_container3,
unequipped and so on
Transmit Trace Enter the path transmitted in the AU on J1 byte
Transmit Trace Length Select the length of the section path trace to be sent. The length
can be 16 or 64.
Expected Trace Enter the path trace that is expected to be received on AU path.
TJ100CPr4
Configuration 63
Step Action
Table 9-12 gives the default and acceptable values for the configurable
AU4 parameters when the network element is configured in SDH
mode.
Table 9-12
Default and acceptable values for configurable AU4/AU3 parameters
Parameter Default value Acceptable value
Signal Label • Unequipped if there are no • unequipped
cross-connects provisioned • equipped_non_specific
• Tug_structure if the lower order • tug_structure
path (VC-3, VC-12) is AU4
• locked_tu_n
mapped
• asynchronous_container3
• Asynchronous_container4 if the
higher order path (VC-4) is AU4 • asynchronous_container4
mapped • atm_mapping
• Asynchronous_container3 if the • dqdb_mapping
higher order path (VC-3) is AU4 • fddi_mapping
mapped
• hdlc_ppp
• sdl_sss
• hdlc_laps
• sdl_srs
• eth_10g
• gfp
• test_O181
• vc_ais
(see Note 1)
Transmit Trace Tx_Unallocated Trace message of 16 or 64 characters
Transmit Trace 16 16 or 64
Length (see Note 2)
Expected Trace Rx_Unallocated Trace message of 16 or 64 characters
Expected Trace 16 16 or 64
Length (see Note 2)
TJ100CPr4
Configuration 65
• Errored Seconds
• Severely Errored Seconds
• Background Block Errors
The following are the steps to configure the AU-4 performance
monitoring parameters for 15-min duration and 1-day duration.
Step Action
TJ100CPr4
Configuration 67
Table 9-13 gives the default and acceptable values for 15 min and
1-day duration performance monitoring threshold parameters.
Table 9-13
Default and acceptable values for 15 min and 1 day performance monitoring threshold
parameters
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES 180 17280 0 - 900 0 - 86400
Threshold SES 15 1440 0 - 900 0 - 86400
Threshold BBE/CV 1100 105600 0 - 65535 0 - 6291360
9.6.6 Provisioning TU
Table 9-14 describes the fields on the Provision TU page.
Table 9-14
Fields on the Provision TU page
Field Description
Signal Label Select a label for the payload content from the drop down menu.
Extended Signal Label Select the signal label for type of Ethernet traffic from the drop
down menu.
Received Signal label Displays the payload type or signal label received on the TU path.
For example, tug structured, asynchronous_container3.
Transmit Trace Enter the path transmitted in the AU on J1 byte.
Transmit Trace Length Select the length of the section path trace to be sent. The length can
be 16 or 64.
Expected trace Enter the path trace that is expected on the TU path.
Expected Trace Length Select the length of the expected section path trace. The Length can
be 16 or 64.
Received Trace Displays the TU path trace that is received.
Signal Fail BER Threshold Enable Allows you to select the threshold, exceeding
which signal fail alarm is raised for errors.
Threshold range is 1e-3 to 1e-5.
Disable Signal Fail BER Thresholds are disabled.
Note 1: Tributary Units (TU) can be provisioned only after TU cross-connects are
created.
Note 3: The Transmit Trace and Expected Trace field are editable only for add/drop
cross-connects. The Expected trace field is not editable for pass through
cross-connects.
TJ100CPr4
Configuration 69
Step Action
Table 9-15 gives the default and acceptable values for provisioning
TU.
Table 9-15
Default and acceptable values for provisioning TU
Parameter Default value Acceptable value
Signal Label Unequipped when there are no • unequipped
(See Note 1 and Note 2) cross-connects provisioned • equipped_non_specific
• asynchronous
• bit_synchronous
• byte_synchronous
• test_O181
• vc_ais
• extended
Extended Signal Label GFP for add drop Ethernet • ATM
(See Note 1 and Note 3) cross-connects • HDLC_PPP
• HDLC_LAPS
• VCAT_TEST
• GFP
Received Signal Label Read-only
Transmit Trace TX_Unallocated Trace message of 16 or 64
characters
Transmit Trace Length 16 16 or 64
Expected Trace RX_Unallocated Trace message of 16 or 64
characters
Expected Trace Length 16 16 or 64
Received Trace Read-only
Signal Fail BER Threshold 1e-3 • Disable
• 1e-3
• 1e-4
• 1e-5
TJ100CPr4
Configuration 71
• Errored Seconds
• Severely Errored Seconds
• Background Blocked Errors
The following are the steps to edit the TU performance monitoring
thresholds for 15-minutes and 1-day duration.
Step Action
TJ100CPr4
Configuration 73
5
If you want to Then
Set TCA settings Click TCA Settings for 15-min duration
for 15-minute link.
duration The TCA Settings for 15-minute duration
page is displayed.
Set TCA settings Click TCA Settings for 1-day duration link.
for 1-day duration The TCA Settings for 1-day duration page
is displayed.
6 Enter values referring to Table 9-17.
7 Click Submit. A confirmation page is displayed.
8 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Table 9-17 gives the default and acceptable values for 15 minute and
1 day duration.
Table 9-17
Default and acceptable values for 15 min and 1 day duration TCA thresholds for TU
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES 120 11520 0 - 900 0 - 86400
Threshold SES 15 1440 0 - 900 0 - 86400
Threshold BBE/CV 300 28800 0 - 65536 0 - 6291360
TJ100CPr4
Configuration 75
Step Action
Table 9-19 gives the default and acceptable values for the configurable
E1/E3 parameters.
Table 9-19
Default and acceptable values for the configurable E1/E3 parameters
Parameter Default value Acceptable value
Admin Status Down • Up
• Down
Alarm Reporting Status Report • No-Report
• Report
Threshold Disable • Disable
(for TCA-15min/24-hour) • Default TCA Profile
Identifier - Any alphanumeric string identifier that the
user may like to associate with a E1/E3/DS3
port. This string can be used to search on list
of port.
Framing Type Unframed • Unframed
• Framed
Step Action
TJ100CPr4
Configuration 77
Table 9-20 describes the fields on the View TCA Profile page.
Table 9-20
Fields on the View TCA Profile page
Field Description
Profile Name Displays the profile name.
Threshold ES-L(15 mins) Displays the threshold value of the ES-Line. If the Errored
Seconds-Line (ES-L) count crosses the set value, then TCA is
raised.
Threshold SES-L(15 mins) Displays the threshold value of the SES-Line. If the Severely
Errored Seconds-line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-L(15 mins) Displays the threshold value of the CV-L. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Threshold ES-P(15 mins) Displays the threshold value of the ES-Path. If the Errored
Seconds-Path (ES-P) count crosses the set value, then TCA is
raised.
Threshold SES-P(15 mins) Displays the threshold value of the SES-Path. If the Severely
Errored Seconds-line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-P(15 mins) Displays the threshold value of the CV-Path. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Threshold UAS-P(15 mins) Displays the unavailable seconds in the regenerator section.
Threshold ES-L(24 hr) Displays the threshold value of the ES-Line. If the Errored
Seconds-Line (ES-L) count crosses the set value, then TCA is
raised.
Threshold SES-L(24 hr) Displays the threshold value of the SES-Line. If the Severely
Errored Seconds-Line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-L(24 hr) Displays the threshold value of the CV-Line. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Step Action
TJ100CPr4
Configuration 79
Table 9-21 gives the default and acceptable values for the configurable
TCA profile parameters.
Table 9-21
Default and acceptable values for the configurable E1/E3 TCA profile parameters
Field Default value Acceptable values
Profile Name - Enter a name for the profile. The
name can be a set of alphanumeric
characters.
Threshold ES-L(15 mins) 65 0 - 900
Threshold SES-L(15 mins) 10 0 - 900
Threshold CV-L(15 mins) 13340 0 - 16383
Threshold ES-P(15 mins) 65 0 - 900
Threshold SES-P(15 mins) 10 0 - 900
Threshold CV-P(15 mins) 72 0 - 16383
Threshold UAS-P(15 mins) 10 0 - 900
Threshold ES-L(24 hr) 648 0 - 65535
Threshold SES-L(24 hr) 100 0 - 65535
Threshold CV-L(24 hr) 133400 0 - 133315200
Threshold ES-P(24 hr) 648 0 - 65535
Threshold SES-P(24 hr) 100 0 - 65535
Threshold CV-P(24 hr) 691 0 - 27561600
Threshold UAS-P(24 hr) 10 0 - 65535
Table 9-22 gives the default and acceptable values for the configurable
TCA profile parameters.
Table 9-22
Default and acceptable values for the configurable E1/E3 TCA profile parameters
Field Default value Acceptable values
Profile Name - Enter a name for the profile. The
name can be a set of alphanumeric
characters.
Threshold ES-L(15 mins) 65 0 - 900
Threshold SES-L(15 mins) 10 0 - 900
Threshold CV-L(15 mins) 13340 0 - 16383
Threshold ES-P(15 mins) 65 0 - 900
Threshold SES-P(15 mins) 10 0 - 900
Threshold CV-P(15 mins) 72 0 - 16383
Threshold UAS-P(15 mins) 10 0 - 900
Threshold ES-L(24 hr) 648 0 - 65535
Threshold SES-L(24 hr) 100 0 - 65535
Threshold CV-L(24 hr) 133400 0 - 133315200
Threshold ES-P(24 hr) 648 0 - 65535
Threshold SES-P(24 hr) 100 0 - 65535
Threshold CV-P(24 hr) 691 0 - 27561600
Threshold UAS-P(24 hr) 10 0 - 65535
TJ100CPr4
Configuration 81
Step Action
TJ100CPr4
Configuration 83
Step Action
TJ100CPr4
Configuration 85
Table 9-24 gives the default and acceptable values for the configurable
Ethernet port parameters.
Table 9-24
Default and acceptable value for the configurable Ethernet port parameters
Parameter Default value Acceptable value
Admin Status Down • Up
• Down
Alarm Reporting Status Report • No-Report
• Report
Link Integrity Enable Disable or Enable
MTU 9600 64 - 9600
AutoNegotiation Enable Disable or Enable
Flow Control Manual Tx-Rx • Manual Disable
• Manual Tx-Rx
• Manual Tx-only
• Manual Rx-only
• Advertize None
• Advertize Both
• Advertize Sym
• Advertize Asym (see Note 1)
Threshold Enable for Disable • Enable
15-min interval • Disable
LAN Circuit Identifier Ethernet 1-32 characters string
Supports space character also.
Note 1: The Advertise None, Advertize Both, Advertize Sym, Advertize Asym values for the Flow
Control field are available only when autonegotiation is enabled.
Note 2: The speed and duplex mode of the ethernet port can be manually provisioned only if
autonegotiation is set to disable. Speed and Mode settings are applicable only to 10/100 Mbps
ports.
Note 3: The MTU size may differ for different cards across different software versions. MTU size
of 64 - 9600 bytes can be set only when the software supports jumbo frames over 1518 bytes.
Step Action
Step Action
Note : The default value for Threshold for CRC Errors is 73146 and the acceptable
value ranges between 0 - 133928568.
6 Click Submit. A confirmation page is displayed.
TJ100CPr4
Configuration 87
Step Action
TJ100CPr4
Configuration 89
Table 9-26 gives the default and acceptable values for the configurable
VCG parameters.
Table 9-26
Default and acceptable values for the configurable VCG parameters
Parameter Default value Acceptable value
Admin Status Up • Up
• Down
Alarm Reporting Status Report • Report
• No-Report
LCAS Support Enable • Enable
• Disable
VCAT Enable • Disable
• Enable
Operating Granularity VC-12 • VC-12
• VC-3
• VC-4
Payload FCS Enable • Disable
• Enable (see Note 1)
VCG Circuit Identifier Tejas Networks An alphanumeric string of maximum 32
characters. Space is allowed.
Note 1: It is recommended to keep the Payload FCS enabled.
Step Action
TJ100CPr4
Configuration 91
Note : LCAS support needs to be enabled or disabled at both the transmitter and
receiver.
Step Action
TJ100CPr4
Configuration 93
Step Action
Note : The protection feature can be configured to function in the revertive mode, to
enable reversion of traffic from the protect fiber to the working fiber. This
happens after a specified time (wait to restore time).
TJ100CPr4
Configuration 95
Step Action
Note : The NE Adjacency feature is available only when the Autodiscovery and
PNCP_Enable parameters are enabled in the license file.
Step Action
Step Action
TJ100CPr4
Configuration 97
Step Action
Table 9-31 gives the default and acceptable values for configuring
trunks.
Table 9-31
Default and acceptable values for configurable Trunk parameters
Parameter Default value Acceptable value
General
Local End point - Any STM port at the network element.
AUG-AU 0-0 Values of Aggregate units at the STM level..
Remote IP Address - 0.0.0.0 - 255.255.255.254
Remote End point - Any STM port at the remote end.
AUG-AU 0-0 Values of Aggregate units at the STM level.
Command - --
Add Trunk/Delete
Note 1: Add Trunk is displayed in the Command drop down menu when no trunks are created.
Delete is displayed when there is atleast one trunk provisioned in the network element.
Note 2: It is not advisable to change the Remote IP address as the trunk automatically discovers
the neighbours.
9.11 DCN
DCN is an ECC (Embedded Communication Channel) on the Tejas
network element. The TejNES can be provisioned to act as an OSPF
router for ECC in remote management. It can exchange and maintain
the routing information on both the ECC and LAN to which it is
connected using the NMS port. The network element processes the
router information on the NMS port, if the OSPF Ethernet
parameter is enabled. Similarly, the routing information on the Data
Communication channel is processed.
TJ100CPr4
Configuration 99
The network elements also support the remote management using the
embedded communication channel (ECC) to allow the remote
EMS/NMS to communicate to the network element for OAM&P
applications.
• DCC-R/SDCC
• DCC-M/LDCC
• F1
• F2
• F3
• F2F3
Each SDH frame includes two Embedded Communication Channels
(ECC) called Regenerator Section and Multiplex Section ECC for
transporting management messages between network elements and
management systems. These in-band data communication channels
enable service providers Operation Support Systems (OSS) to
manage SDH network elements without the need for an expensive
out-of-band data communication network.
Note : If the ECC_bytes are enabled on the STM-1 port, then the corresponding bytes
cannot be used for tunneling.
The Network interface feature gives a list of all the active Network
Interfaces with their attributes.
Step Action
TJ100CPr4
Configuration 101
Step Action
Table 9-33 gives the default and acceptable values for the configurable
parameters on the Edit Network Interface Provisioning page.
Table 9-33
Default and acceptable values for the network interface parameters
Parameter Default value Acceptable value
Admin Status Up • Up
• Down
Layer 3
MTU 1518 248 - 1518
Layer 2
Layer 2 protocol Standard PPP, • Standard PPP, RFC 1661
RFC 1661 • PPP, HDLC Framing
(see Note 2)
Magic number Enable • Enable
• Disable
(see Note 1)
Proxy ARP
Proxy ARP Disable • Enable
• Disable
OSPF
OSPF Disable • Disable
• Enable
Hello Interval 10 1 - 65535 sec (see Note 4)
Router Dead Interval 40 1 - 65535 sec (see Note 4)
TJ100CPr4
Configuration 103
Step Action
Table 9-34 gives the default and acceptable values for the configurable
ECC parameters.
Table 9-34
Default and acceptable values for configurable ECC parameters
Parameter Default Value Acceptable Value
Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
ECC Byte Selection ecc_disable • ecc_disable
• ecc_F1
• ecc_F2
• ecc_F3
• ecc_F2F3
• ecc_DCC_R
• ecc_DCC_M
ECC Path - AU-n over which ECC is carried.
Step Action
TJ100CPr4
Configuration 105
Table 9-35 gives the default and acceptable values for the
Management Channel parameters.
Table 9-35
Default and acceptable values for Management Channel parameters
Parameter Default value Acceptable value
Management Channel E1 • E1
Type • VC12
• Unprovisioned
E1 Port E1-1-N-1 E1-1-5-M
where M is the E1 port number (see Note).
Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
STM No 1 1
K 1 1-3
L 1 1-7
M 1 1-3
Note: When E1 is selected for Management Channel Type, E1 port is the only configurable
parameter. The SDH Path parameters are configurable when VC12 is selected for Management
Channel Type.
9.12 OSPF
The Open Shortest Path First (OSPF) is an interior gateway routing
protocol based on the shortest path first or link-state algorithm.
Routers use link-state algorithms to send routing information to all
nodes in an internetwork by calculating the shortest path to each node
based on a topography of the internet constructed by each node.
Each router sends that portion of the routing table (keeps track of
routes to particular network destinations) that describes the state of
its own links, and the complete routing structure (topography). The
advantage of shortest path first algorithms is that it results in smaller
and more frequent updates everywhere. The converge is quick, thus
preventing problems like routing loops and count-to-infinity (when
routers continuously increment the hop count to a particular network)
which results in a stable network.
TJ100CPr4
Configuration 107
Step Action
CAUTION
Loss of communication
Changing the OSPF area may cause a loss of communication to the
network element.
Step Action
Step Action
TJ100CPr4
Configuration 109
Step Action
Table 9-37 gives the configurable static route parameters with their
default and acceptable values.
Table 9-37
Default and acceptable values for the configurable static route parameters
Parameter Default value Acceptable value
Destination Network IP - 0.0.0.0 - 255.255.255.254
Address
Destination Network Address - 0 - 32
Mask Length
Next hop IP Address - 0.0.0.0 - 255.255.255.254
Advertise Route Disable • Disable
• Enable
Network Interface LAN-1-6 (eth0) • LAN-1-6 (eth0)
• STM1-1-5-1
• STM1-1-5-2
Note 1: Any invalid static route added on a point to point interface is added in the WUI but is not
added in the Kernel routing table.
Note 2: Any invalid static route added on a broadcast interface (eth) is blocked.
Note 3: The Next Hop IP Address has to be specified only when the static route is provisioned
on eth0. If it is ecc interface, the Next Hop IP Address need not be specified.
Note 4: If the address is not specified or is invalid for eth0 interface, an error message is displayed
on submit.
Step Action
TJ100CPr4
Configuration 111
Step Action
Note 2: Ensure that the router ARP timers are set to less than 10 minutes to limit the
DCN outage to 10 minutes.
The following are the steps to add a Proxy ARP neighbour.
Step Action
TJ100CPr4
Configuration 113
Table 9-39 gives the default and acceptable values for the Proxy ARP
neighbour parameters page.
Table 9-39
Default and acceptable values for the Proxy ARP Neighbour parameters
Field Default value Acceptable value
Destination Network IP - Any valid IP address of a network element
Address in the same subnet that is reachable from
the gateway network element.
Network Interface Select the network interface. Currently it
supports only LAN-1-6 (eth0).
Note : Deleting Proxy Address Resolution Protocol (ARP) Neighbours will result in
loss of communication to the remote network elements, in the absence of static
route.
The following are the steps to delete a proxy ARP neigbhbour.
Step Action
Step Action
TJ100CPr4
Configuration 115
Table 9-40 describes the fields on the View Serial Port page.
Table 9-40
Fields on the View Serial Port page
Field Description
Port Displays the Serial port name.
Application Displays the type of application that runs on the serial interface.
Baud Rate Displays the operating rate of serial interface.
Admin Status Displays the status of the serial interface as up or down.
edit Click the link to edit the serial port information.
Note 1: In the serial port provisioning, the Application and the Admin status fields
cannot be changed simultaneously. First application and the corresponding
parameter has to be selected. For the application to come into effect, the
admin status of the serial port must be set to up.
Note 2: If F1-UDC needs to be used for serial port application, then F1 byte cannot
be used for ECC byte communication.
Step Action
Table 9-41 gives the default and acceptable values for configuring the
serial port parameters.
Table 9-41
Default and acceptable values for configuring serial port parameters
Parameter Default value Acceptable value
Application Unprovision • udc
Application • terminal server
• Unprovision Application
Admin Status Down • Up
• Down
UDC Application
Overhead byte F1 • F1
• F2
STM Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
AUG AUG-1-5-1-1 • AUG-1-5-1-1
AU AUG-1-5-1-1-1 • AUG-1-5-1-1-1
Terminal Server
TCP Port 20090 20090 - 20099
Timeout (sec.) 0 0 - 600. Beyond 600 seconds, the telnet
connection is timed out.
Note: The AUG and AU fields are editable only if the F2 byte is selected for the Overhead byte.
TJ100CPr4
Configuration 117
9.16 Synchronization
The Synchronization feature provides the timing and synchronization
management functionality for the network element.
TJ100CPr4
Configuration 119
Step Action
Step Action
TJ100CPr4
Configuration 121
Note : The Quality Level is visible only when the QL mode is enabled in
Synchronization state page. When the QL mode is disabled, Manual should be
selected for the Output QL Mode in the Synchronization state page.
Step Action
TJ100CPr4
Configuration 123
Table 9-46 gives the default and acceptable values for the configurable
timing reference parameters.
Table 9-46
Default and acceptable values for configurable timing reference parameters
Parameter Default value Acceptable value
Priority 0 0-8
LockOut Request Off • On
• Off
Input Quality Mode Manual • Manual
• Auto
Quality Level Invalid • PRC
• SSU A
• SSU B
• SEC
• DNU
• Invalid
Note 1: Quality Level is displayed when the user has nominated E1 ports.
Note 2: Input Quality Mode and Quality Level are displayed when the user has nominated BITS.
Step Action
Note : If the network element is locked to a clock source that needs to be deleted, then
lockout the network element from the clock source before deleting the clock.
9.16.5 Nominating a timing reference
Table 9-47 describes fields on the Nominate timing references
page.
Table 9-47
Fields on the Nominate timing references page
Field Description
Clock Reference Three types of references are available:
• Port
• Bits
• Internal
Clock Reference Port If Port is selected for Clock Reference, then select the desired STM
clock reference port.
If Bits is selected for Clock Reference, then select the desired bits.
The clock reference is given as BITSIN_n_1, BITSIN_n_2, (n is
slot number of the card from which BITS clock inputs are driving)
Priority Select the priority for the clock source.
Note 1: 1 has the highest priority and 8 has the least. 0 priority indicates the clock reference is not
used for selection.
Note 2: The Clock Reference Port is valid for BITS and ports timing references only.
Note 3: BITSIN_n_1 is a 2MHz signal where as BITSIN_n_2 is a 2Mbps signal.
TJ100CPr4
Configuration 125
The following are the steps to nominate a timing reference for the
network element.
Step Action
TJ100CPr4
10
Faults 1-
10.1 Introduction
Fault management deals with detection and reporting of faults by the
network element. Alarms are raised to alert the user about fault
conditions. The alarms can be categorized into the following types
based on their severity:
• Critical
• Major
• Minor
• Deferred
• Warnings
This chapter provides information on the following:
• Active alarms
• Suppressed alarms
• Alarm filters
• Event history and
• Alarm severity
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Active alarms. The Active alarms page is displayed on
the right pane.
Table 10-1 describes the fields on the Active alarms page.
Table 10-1
Field on the Active alarms page
Field Description
# Displays the serial number of the alarm.
Time Displays the date and time when the alarm was raised.
Information Provides information on the fault due to which the alarm was raised
Severity Displays severity of the Alarm – critical, major, minor, deferred or
warning.
Object Displays source of the fault.
Acknowledgement Status Displays whether alarm has been acknowledged or not.
TJ100CPr4
Faults 129
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Suppressed alarms. The Suppressed alarms page is
displayed.
Table 10-2 describes the fields on the Suppressed alarms page.
Table 10-2
Fields on the Suppressed alarms page
Field Description
# Displays the serial number of the alarm.
Time Displays the date and time at which the alarm was raised.
Alarm Information Displays information on the fault due to which the alarm was
raised.
Severity Displays the severity of the alarm—Critical, major, minor, deferred
or warning.
Object Displays the object on which the alarm is suppressed.
Alarm Suppressor Displays the technique used to suppress the alarms.
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filter page is displayed.
Table 10-3 describes the fields on the View Alarm Filter page.
Table 10-3
Fields on the View Alarm Filter page
Field Description
Alarm Filter Displays the alarm filter.
Managed object Displays the object to which the filter is applied.
Alarm Displays the alarm that is being suppressed.
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filters page is
displayed.
3 Click Provision a new alarm filter. The Provision New
Alarm Filter page is displayed.
4 Enter/Select values as described in Table 10-4.
5 Click Create. A confirmation page is displayed.
TJ100CPr4
Faults 131
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filters page is
displayed.
3 Select the check box in the Delete column for the alarm filter
to be deleted.
4 Click Delete. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
The Show All Events link opens a new window, in which all the
events are listed.
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Event history. The Event history page is displayed.
3 Click Latest, to view a list of 20 latest events.
Click Previous, to view the previous 20 events.
Click Next, to view the next 20 events.
4 To view all the events, click Show All Events link. This opens
a separate window listing all the events.
TJ100CPr4
Faults 133
Step Action
1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm severity. The Alarm severity page is displayed.
3 Select the desired severity level from the drop down menu in
the Severity field, for the alarm whose severity is to be
changed.
TJ100CPr4
Profiles
11 1-
11.1 Introduction
This chapter describes the Profiles menu in the WUI. In the Profiles
menu, the following two profiles are available:
• STM Port Profiles - The STM profiles defines the path profiles to
be applied for all Higher order/Lower order
terminating/non-terminating cross-connects.
• Path Alarm Profiles - The path alarm profiles enable the alarm
reporting control on all alarms available in the AU and TU objects.
In the Profiles menu, you can
Step Action
1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click STM Port Profile. The View STM Port Profile page is
displayed with a table listing all the profiles.
3 Click the profile name link in the View column to view its
details. The corresponding port profile page is displayed.
TJ100CPr4
Profiles 137
Table 11-1 describes the fields on the View STM Port Profile page.
Table 11-1
Fields on the View STM Port Profile page
Field Description
View Click the profile name link to view the profile details.
Profile name Displays the profile name.
Edit Click to edit the STM Port profile.
Step Action
1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click STM Port Profile. The View STM Port Profile page is
displayed.
3 Click edit link in the Edit column for the profile to be edited.
The corresponding Edit port profile page is displayed.
4 Make changes referring to Table 11-2.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Table 11-2 gives the default and acceptable values for the configurable
STM profile parameters.
Table 11-2
Default and acceptable values for the configurable STM profile parameters
Parameter Default value Accepted values
Profile Name Internal-NNI when Enter a profile name.
Internal NNI is selected
External-NNI when
External NNI is
selected
Terminating and Mask TIM • Mask TIM
UnProtected TU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
Terminating and Protected Mask TIM • Mask TIM
TU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all
Passthrough and Mask all except LOP • Mask TIM
UnProtected TU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
Passthrough and Protected Mask all except LOP • Mask TIM
TU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all
Terminating and Mask TIM • Mask TIM
UnProtected AU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
TJ100CPr4
Profiles 139
Step Action
1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profile
page is displayed with a table listing all the profiles.
Table 11-3 describes the fields on the View Path Alarm Profile page.
Table 11-3
Fields on the View Path Alarm Profile page
Field Description
Profile Name Displays the profile name.
TIM Action Report TIM, no Reports the TIM alarm without affecting traffic.
Downstream AIS
Ignore TIM No alarm is reported or traffic affecting action
is taken on TIM.
Report TIM, Reports the TIM alarm and also transmits a
Downstream AIS downstream AIS so that traffic transmission is
affected.
Supress TIM Reports the TIM alarm, but in the suppressed alarm
page, and there are no traffic affecting alarms.
Signal Label Report SLM, no On Signal Label Mismatch (SLM), PLM alarm is
Mismatch Action downstream AIS reported, but no downstream AIS is sent.
Ignore SLM No action is taken on SLM.
Downstream AIS Reports PLM alarm and sends AIS downstream
(traffic affecting) on SLM.
Supress SLM The SLM alarm is reported in the supressed alarm
page.
UNEQ Signal Label Report UNEQ, Reports the UNEQ alarm without affecting traffic.
Action no Downstream
AIS
Ignore UNEQ No alarm is reported or traffic affecting action
is taken on an UNEQ.
Report UNEQ, Reports the UNEQ alarm and also transmits a
Downstream AIS downstream AIS. Traffic is affected.
Supress UNEQ Reports the UNEQ alarm in the suppressed alarm
page. There are no traffic affecting alarms.
Masked Alarms List Displays a list of masked alarms.
Delete Select the check box(s) to delete the path alarm profile(s).
TJ100CPr4
Profiles 141
Step Action
1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profiles
page is displayed with a table listing all the profiles.
3 Click Provision a new Path Alarm Profile link. The
Provision New Path Alarm Profile page is displayed.
4 Enter values referring to Table 11-4.
5 Click Create. A confirmation page is displayed.
6 Click Yes. A “Successfully Created” message is displayed.
Table 11-4 lists the default and acceptable values for the configurable
path alarm profiles.
Table 11-4
Default and acceptable values for the configurable path alarm profile parameters
Parameter Default value Accepted values
Profile Name - Enter a profile name. The profile name
can be a set of alpha, numeric or
alphanumeric characters.
TIM Action Suppress TIM • Suppress TIM
• Ignore TIM
• Report TIM, No downstream AIS
• Downstream AIS on TIM
TJ100CPr4
Profiles 143
Step Action
1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profiles
page is displayed with a table listing all the profiles.
3 Select the check box in the Delete column, for the path alarm
profiles to be deleted.
4 Click Delete. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
Note 1: Default path alarm profiles are indicated with an asterisk. Default path
alarm profiles cannot be deleted.
TJ100CPr4
12
Performance 1-
12.1 Introduction
Performance Monitoring (PM) refers to the in-service, non-intrusive
monitoring of transmission quality.
• collection of PM counts
• reporting of PM counts
• storage of PM counts
• threshold crossing alerts when PM counts exceed their threshold
settings
The network element monitors performance parameters for working
and protection facilities separately.
TJ100CPr4
Performance 147
Step Action
TJ100CPr4
Performance 149
Step Action
The current interval statistics of the Path is available for the current
time interval, previous 15 minutes, current day and the previous day.
TJ100CPr4
Performance 151
Step Action
Note : The current interval statistics of the Tributary Unit is available for the current
time interval, previous 15 minutes, current day and the previous day.
Table 12-4 describes the parameters on the Tributary Unit
performance parameters.
Table 12-4
Tributary Unit performance parameters
Parameter Description
ES Displays the errored second.
SES Displays the severely errored second.
UAS Displays the unavailable second.
SEP Displays the severely errored period.
TJ100CPr4
Performance 153
Step Action
TJ100CPr4
Performance 155
Step Action
Note : The frame status of the port is displayed on the performance statistics page.
Table 12-7
E1 path performance parameters
Parameter Description
EB-P Displays the errored blocks on the path.
BBE-P Displays the background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing
one or more anomalies and/or defects on the path.
SES-P Displays the severely errored seconds on the path.
UAS-P Displays the unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
TJ100CPr4
Performance 157
Table 12-9
E3 path performance parameters
Parameter Description
ES-P Errored Seconds Path(ES-P) is a count of the seconds containing
one or more anomalies and/or defects on the path.
SES-P Displays the severely errored second on the path.
UAS-P Displays the unavailable second on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
Step Action
TJ100CPr4
Performance 159
Step Action
Idle Seconds Displays the count of idle second in VCG traffic. An idle second is
a second in which no data frames or errored frames are received.
This counter will be incremented in a non-ES/non-SES/non-UAS
second.
ES Displays the count of Errored Seconds.
SES Displays the count of Severely Error Seconds.
UAS Displays the count of Un Available Seconds.
Valid Frames Transmitted Displays the count of valid frames transmitted count.
TJ100CPr4
Performance 161
Core Header Single Error Displays the GFP (Generic Framing Procedure as in G.7041) core
Corrections header single errors correction count.
Type Header Single Error Displays the GFP type header single error correction count.
Corrections
Core Header CRC Errors Displays the GFP core header CRC error count.
Type Header CRC Errors Displays the GFP type header CRC error count.
Payload FCS Errors Displays the payload FCS incorrect count.
TJ100CPr4
13
Security 1-
13.1 Introduction
The user interface provides four different user access group
(ADMIN, OPERATOR, OPERATOR2, USER).
Table 13-1 lists the user access classes with their privileges.
Table 13-1
Access groups and corresponding privileges
Access Group Privileges
USER Has Read-only access to all the management information including
configuration, faults and performance.
OPERATOR Can preform all configuration operations such as port and
cross-connect configurations, acknowledgement of faults, resetting
performance statistics, etc.
OPERATOR2 Can configure node name, configure Router ID and Ethernet IP,
perform maintenance operations such as software or configuration
backup and restore, loopbacks and all other operations similar to
operator.
ADMIN Can create and delete logins on the network element. Can configure
network element parameters such as network element mode,
Location, Contact, as well as management parameters such as
Ethernet/Router IP Address/Masks, OSPF parameters, etc.
Note : Only an ADMIN can add users, delete users or modify user access field. All
the other users can only change their passwords.
Table 13-2 lists the user name and password details for user accounts
on the network element.
Table 13-2
User name and password details
User name • is unique.
• can be alphabetic/numeric/alphanumeric.
• supports up to 32 characters.
• is case sensitive.
Password • is unique.
• must be exactly eight characters long.
• can be alphabetic/numeric/alphanumeric.
• supports special characters except # and space.
• is case sensitive.
• cannot be identical to user name
CAUTION
Risk of Unauthorized access
Change the initial password of the default user account on the
network element. The default user accounts and passwords are
widely known.
TJ100CPr4
Security 165
Step Action
1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage users. The Manage Users page is displayed.
The page lists the existing users and the group to which they
belong to.
3 Click the Add User button. The New User page is displayed.
4 Enter/Select values referring to Table 13-4.
5 Click Submit. A confirmation page is displayed.
6 Click Yes. A “Successfully Created” message is displayed.
Table 13-4 gives the default and acceptable values for configuring the
parameters on the New User page.
Table 13-4
Default and acceptable values for configuring new user
Parameter Default value Acceptable values
User Name - Can be a set of alphanumeric
characters. Maximum of 32
characters is allowed.
Access USER USER
OPERATOR
OPERATOR2
ADMIN
User lockout Allow access Allow access
Deny access
Password - Can be a set of alphanumeric
characters and should be
exactly 8 characters long.
Confirm Password - Same as password.
Step Action
1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists existing users and their access group.
3 Click the hyperlink of the User Name to be modified. The
Modify User page is displayed.
TJ100CPr4
Security 167
Step Action
1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists existing users and their access group.
3 Enter the new password in the Password field. Re-enter the
password in the Confirm Password field.
4 Click Submit. A “Successfully Modified” message is displayed.
Note : For an ADMIN, the ADMIN should click the link in the user name field to
change the password.
Step Action
1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists the existing users and the group to which they
belong.
3 Select the check box in the delete column for the users to be
deleted.
4 Click Submit. A confirmation message is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
TJ100CPr4
14
Maintenance Operations 1-
14.1 Introduction
This chapter describes the maintenance procedures that can be
performed on the network element. The maintenance procedures that
can be performed are—warm and cold reboot of cards, provision
loopbacks, backup and restore the network element configuration,
restore default settings, etc.
Table 14-1
Fields on the System Settings page
Field Description
Alarm Buzzer Enable Enables the hooter alarm.
Disable Disables the hooter alarm.
Performance Day Bin GMT Enables Performance Day Bin Rollover as per GMT
rollover timezone Time zone.
Local Enables Performance Day Bin Rollover as per Local
Time zone.
Note: If Local is set to IST (ahead of GMT by 5.30 hrs), Performance Day Bin Rollover happens
at 00:00:00 IST. If GMT is selected for day bin rollover, Performance Day Bin Rollover happens
at 05:30:00 IST.
Step Action
• Warm reboot - Warm reboot does not affect traffic on the card.
• Cold reboot - Cold reboot disrupts traffic on the card for the
period while the card is rebooting.
TJ100CPr4
Maintenance Operations 171
Note : : Warm reboot is applicable only for the PXAT8E1, PXAT21E1 and PXATDS3
cards. Cold reboot is applicable only for the tributary card (TETH02EX).
The following are the steps to reboot cards.
Step Action
Step Action
Step Action
Note : A linux system has an inbuilt FTP server. On windows, the IIS server available
with Windows can be used or any third party server such as 3Com server
available at the following URL can be used:
http://support.3com.com/software/utilities_for_windows_32_bit.h
tm
TJ100CPr4
Maintenance Operations 173
Step Action
14.5 Loop-Backs
Loopbacks are performed to check the continuity on SDH, PDH or
Ethernet ports. The ports can be configured for facility loopback and
terminal loopback. The exact location of failure can be detected using
loopbacks. You can perform facility and terminal loopbacks to test
the electrical (E1/E3) and optical (STM-1) connectivity of the
network element. When a facility loopback is operated on E1 and
optical ports, AIS is sent downstream.
Figure 14-1 shows a facility loopback for testing the E1/E3 port
connections at network elements 1 and 2.
Figure 14-1
Facility Loopback
Network element
Network element
1
2
Test set 1
Test Set 2
E1 STM-1/OC-3 STM-1/OC-3
E1
Interface E1
Interface
E1
TJ100CPr4
Maintenance Operations 175
Network
element Network
1 element
2
Test Set
E1 E1
Interface STM-1/OC-3 STM-1/OC-3
E1
Interface
E1
CAUTION
Traffic affecting process
Facility loopback and terminal loopback are traffic affecting.
Figure 14-3 shows the connectivity of the nodes to the NMS server.
Facility or terminal loopbacks can be created at the near end ports of
Node A without loss of connectivity due to presence of Ethernet
connectivity. But, provisioning loopbacks at the near end and far end
ports of Node B and Node C will lead to loss of connectivity to the
downstream network.
Figure 14-3
Terminal Loopback
Remotely
Downstream Network Managed Nodes
Step Action
TJ100CPr4
Maintenance Operations 177
TJ100CPr4
Maintenance Operations 179
The following are the steps to view changes made to the database.
Step Action
System diagnostics data comprises log files and dump files which
provide information on faults. The diagnostic data can be used for
analyzing problems arising in any network element.
Step Action
• Areas
• Database
• Interfaces
• Neighbors
• Statistics
• LSA expansion
• AS externals
• Routing table
• Opaque-LSAs
Area
The Area indicates the Open Shortest Path First area to which an
attached network belongs.
The area data structure contains all the information used to run the
basic OSPF routing algorithm. Each area maintains its own link-state
database. A network belongs to a single area, and a router interface
connects to a single area. Each router adjacency also belongs to a
single area.
TJ100CPr4
Maintenance Operations 181
Database
The Database member displays the format and function of the LSA.
Interfaces
The Interfaces member displays the type of physical network
interface. Different interfaces are eth, hdlcppp or ecc.
Neighbors
The Neighbors member displays the name of the physical network
interface, address, router ID and state of the neighbors.
TJ100CPr4
Maintenance Operations 183
Statistics
The Statistics member displays the checksum of number of external
LSAs received by the network element and also the checksum of the
Autonomous System (AS) externals.
LSA Expansion
The LSA Expansion member allows to select the format and
function of the LSA.
TJ100CPr4
Maintenance Operations 185
AS externals
The AS externals member displays the number of LSAs in the
database of the Autonomous system.
Routing Table
The Routing Table member displays all the neighboring network
element information indicating the number of hops to reach any
node.
Opaque-LSAs
The Opaque-LSA member displays the checksum of the complete
contents of the Opaque LSAs.
TJ100CPr4
Maintenance Operations 187
The following are the steps to access the system diagnostics data.
Step Action
4 Select the card for which the debug data is to be collected from
the Card Name drop down menu. Click the Collect Data.
The data is stored as a tar file in the temp folder of your system.
Download Debug Data link for downloading the debug data
is displayed.
5 Click the Download Debug Data link and select the location
where you want to save the data. The debug data is saved as a
tar file.
Click Clean up data to clear the debug data from the
temporary folder.
14.8 Configuration Management
The user interface provides options for configuration backup and
storing it on a selected server.
The network element gives an error message for the cause of the
failure. The messages may be due to one of the following reasons:
TJ100CPr4
Maintenance Operations 189
Step Action
Note : The Node Configuration state is displayed at the bottom of the page and is
refreshed for every 2 seconds. The Configuration state displayed is the last
operation performed with the configuration management.
Note : The remote server should have an FTP server installed on it to carry out the
Restore configuration data command. For a Linux system, FTP server is
inbuilt. For a windows system, a IIS server provided along with windows or
any third party server such as 3com server needs to be installed.
Step Action
TJ100CPr4
Maintenance Operations 191
Note 2: The Node Configuration state is displayed at the bottom of the page.
Table 14-16 describes the fields on the Restore/Backup
configuration data page.
Table 14-16
Fields on the Restore/Backup Configuration Data page
Field Description
Configuration operation Restore The configuration is restored from local
configuration from machine or remote machine.
local machine
Restore The configuration is restored from remote
configuration from machine
remote machine
Username Enter the username of the PC to be accessed.
Password Enter the password of the PC to be accessed.
IP Address Enter the IP address of the PC to be accessed.
FTP port (optional) Enter the FTP port number for accessing the remote server.(It is an
optional field)
Directory Enter the directory where the configuration data file is located.
CAUTION
Restoration of Configuration Data
The restoration of configuration data of a network element is service
disruptive. The new configuration data requires backup. Restoration
could be done from a system which has an FTP server.
The following are the steps to restore factory default settings for the
network element.
Step Action
Note 1: All configuration information, event history and performance data will be
deleted on restoring factory default settings.
Note 2: The Restore factory default operation brings down existing traffic. Please
attempt the action only if the network element needs to be re-initialized.
TJ100CPr4
15
Acronyms 1-
TJ100CPr4
16
Appendix A 1-
TJ100CPr4
17
Appendix B 1-
TJ100CPr4
Appendix B 199
TJ100CPr4
Appendix B 201
TJ100CPr4
Appendix B 203
TJ100CPr4
18
Appendix C 1-
Note : The procedures and the screenshots in this appendix are for Version 1.1.007 of
the 3Com server.
18.1 Installing 3Com server
The following are the steps to install the 3Com server.
Step Action
TJ100CPr4
Appendix C 207
TJ100CPr4
Appendix C 209
Step Action
Note : To upload or download software, the FTP server should be turned ON. The
ON/OFF status of the FTP server is indicated in the status bar. To turn
ON/OFF the FTP server, click the FTP icon .
TJ100CPr4
Appendix C 211
6 Enter the name of the user in the User Name text box.
TJ100CPr4
213
Index 1-
A E
advertise route 150 E1 performance
Alarm area 14 interval Valid 198, 199
SES 198, 199
UAS 198, 199
C Environmental Alarm Input 55, 88–89
Connections (SNCP) 39, 43
cross connections F
1WAY 72
2WAY 72 Facilities 55, 92–134
numbering scheme 72 E1/DS1/E3/DS3 ports 113–119
protected 72 Ethernet ports 119
unprotected 72 EFM 252–253
Cross-connect 55 STM ports 92–111
VCG 119, 125–134
cross-connections 72–79 LCAS 130–132
Faults 167–173
D Active alarms 167–168
DCN 55, 138–156 Alarm filters 170–171
Alarm severity 173–174
ECC 143–144
Critical 173, 174
Management channel 144–145
Deferred 173, 174
Network interface 139–141
Major 173, 174
OSPF 146–148
Minor 173, 174
Proxy ARP 151–154
Warning 173, 174
Serial port 154–156
Event history 172–173
PPP 154
Suppressed alarms 169
Terminal Server 154
UDC 154
Static route 148–151 I
destination address 150 Input/Output area 14
Inventory 31–35
M Trunks 137–138
next hop 150
Maintenance 211–236
Backup configuration 232
NMS 10
Cold reboot 212 Node Configuration 15
Cold restart 217
Diagnostics 223
OSPF diagnostics 224
O
Area 224 offset 27
AS externals 229 Other Time Zone 24–27
Database 225 Overhead Tunnel 55, 80–82
Interfaces 225
LSA Expansion 228
Neighbors 226 P
Opaque-LSA 230 Performance
Routing Table 230 Path 192
Statistics 227 Tributary unit 194
System diagnostics 223, 231
Loopbacks 219–223
performance
Facility loopback 219–221 multiplex section
Terminal loopback 219–221 BBE 189
Restart Options 217 BBE-FE 190
Restore configuration 232 BBER 189
Restore factory defaults 236 EB 189, 190, 193
software downgrade 219 ES 189, 190
System settings 211–212 ES-FE 190, 191
Upgrade software 217 ESR 189
Warm reboot 212 far end Interval valid 191
Warm restart 217 interval Valid 190
SES 189, 190
Maintenance Operations 211
SES-FE 190, 191
multiplex section SESR 189
SES 189, 190 UAS 189, 190
UAS-FE 190, 191
N path 193
BBE 192
Navigation Menu 14 BBE-FE 193
Network Adjacency 135–137 EB 192
Auto-discovery 135 ES 192, 193
Neighbour information 135–137 ES-FE 192, 193
Trunks 136–137 ESR 192
network interface 150 far end interval valid 193
Network Adjacency interval Valid 192, 193
NPJE 192, 193
TJ100CPr4
Index 215
Trib Protection 6
U
UPSR 43–46
W
WUI 9–14
TJ100CPr4