Escolar Documentos
Profissional Documentos
Cultura Documentos
ETAG1
etag1_r2c
XMC20
XMC20
ETAG1 User Manual
Copyright and Confidentiality Copyright in this document vests in KEYMILE. This document contains confi-
dential information which is the property of KEYMILE. It must be held in con-
fidence by the recipient and may not be used for any purposes except those
specifically authorised by contract or otherwise in writing by KEYMILE. This
document may not be copied in whole or in part, or any of its contents dis-
closed by the recipient to any third party, without the prior written agreement
of KEYMILE.
Disclaimer KEYMILE has taken reasonable care in compiling this document, however
KEYMILE accepts no liability whatsoever for any error or omission in the
information contained herein and gives no other warranty or undertaking as
to its accuracy.
KEYMILE reserves the right to amend this document at any time without
prior notice.
Published by KEYMILE
http://www.keymile.com
User Manual
ETAG1
Table of Content
1 Preface 7
1.1 Precautions and safety 7
1.2 Symbols and notations 7
1.3 Interfaces and circuit categories 7
1.4 Document history 8
2 Introduction 9
2.1 Functions and features overview 9
2.2 ETAG1 architectural block diagram 11
2.3 Unit view 12
3 Specification 13
3.1 Feature licences 13
3.2 Physical interfaces 13
3.3 Logical interface functions 15
3.4 Networking functions 16
3.5 Protection 18
3.6 Environment 19
3.7 Summary of standards 20
4 Installation 22
4.1 Prerequisites 22
4.2 Slots for the ETAG1 unit 23
4.3 Connections and Cables 24
4.4 Fixing the cables to the cable tray 26
5 Functional Description 27
5.1 Overview 27
5.2 Ethernet LAN interfaces 28
6 Commissioning 68
6.1 Commissioning steps 68
8 GUI Reference 75
8.1 Introduction 75
8.2 AP: / unit-x 79
8.3 AP: / unit-x / bridges 86
8.4 AP: / unit-x / bridges / bridge-y 87
8.5 AP: / unit-x / loopbackInterface 91
8.6 AP: / unit-x / port-r 97
8.7 AP: / unit-x / router 113
8.8 AP: / unit-x / router / ospf 120
8.9 AP: / unit-x / router / ospf / area-s 122
8.10 AP: / unit-x / router / rip 126
8.11 AP: / unit-x / tdmInterfaces 127
8.12 AP: / unit-x / tdmInterfaces / machdlc-t 130
8.13 AP: / unit-x / tdmInterfaces / mlppp-u 138
8.14 AP: / unit-x / tdmInterfaces / mlppp-u / member-v 143
9 Annex 162
9.1 Associated XMC20 documents 162
9.2 Technical support 162
9.3 Product training 163
Figures
1 Preface
Before you handle any equipment you must comply with the safety advices.
Adherence to the safety instructions ensures compliance with the safety
requirements as defined in EN 60950 (Safety of Information Technology
Equipment).
Please refer to the following document:
[202] Safety Instructions “Precautions and safety”.
Please note:
Shows a significant information.
2 Introduction
The ETAG1 is a versatile networking unit with the main purpose of connect-
ing Ethernet LANs over TDM links. Therefore the ETAG1 supports a variety
of powerful functions and features.
1GbE access
Front Connector
2x1 GbE Internal 1 …4
Ethernet
interface 4x10/1
Ethernet
Bridge
interface
virtual
interfaces
PBUS access
1 … 64
Host processor
kplane access
GbE star
2x1 GbE GbE Fast
PHYs 4 x Fast
Ethernet
Ethernet
PHYs
Network
Processor
SD
16x2 Mbit/s
PBUS
PBUS
RAM
access
Primary
Power Input
Power Supply
• Network processor
The network processor is the heart of the unit. It provides packet forward-
ing for bridging and routing and also handles control protocols and man-
agement functions.
• Fast Ethernet PHYs
The physical Ethernet driver chips are responsible for implementing the
CSMA/CD protocol according to the IEEE 802.3 standard.
• GbE PHYs
Circuit adaptation to the NE internal Gigabit Ethernet backplane star.
• PBUS access
The PBUS access block interfaces with the network processor via 8 unit
internal serial links. Doubling the line speed for these links from the usual
2 Mbit/s to 4 Mbit/s enables a maximal PBUS bandwidth of 16 x 2Mbit/s.
On the PBUS side the PBUS access driver behaves slightly different
according to the selected unit mode:
− For “TDM Access” = “8 x 2Mbit/s” the ETAG1 behaviour follows the
standard XMC20 PBUS specification. It allows for P0nc connections
(n = 1 … 32) and P12x (transparent) connections.
− For “TDM Access” = “16 x 2Mbit/s” the ETAG1 deserves great care
for the NEs clock synchronisation. For details see paragraph 5.3.2
Unit mode “8 x 2Mbit/s” versus “16 x 2Mbit/s” (on page 29). The con-
nection types are P0nc (n = 2, 4, 6 … 32) and P12 (Clock master).
• SDRAM
The fast volatile memory serves for the network processor’s own use and
holds all the data queues and various tables for data forwarding.
• Power supply
The ETAG1 unit draws its power exclusively from the non stabilized pri-
mary power. The power supply provides the classic +5V and several
lower voltages according to the boards need.
All secondary voltages are ramped up and down in a controlled way.
Figure 3 shows the ETAG1 unit hardware. On the front plate are two LEDs
for the unit- and traffic failure indication. The four Ethernet interfaces use
standard RJ-45 connectors.
3 Specification
This unit is subject to one or several feature licences. The following licences
are available for this unit.
3.5 Protection
1. Additionally some more time is needed to establish the connection depending on used protocol on layer 2 (PPP, ML-
PPP) and layer 3 (e.g. OSPF, RIP).
3.6 Environment
3.7.1 IEEE
• IEEE 802.3-2005
CSMA/CD access method and physical specifications
• IEEE 802.1D-2004
Media Access Control Bridges
• IEEE 802.1Q-2003
Virtual Bridged Local Area Networks
• IEEE 802.1w-2001
Media Access Control Bridges Amendment 2: Rapid Reconfiguration
3.7.2 IETF
• RFC 792
ICMP
• RFC 826
ARP
• RFC 1332
IPCP
• RFC 1493
MIB for bridges
• RFC 2328
OSPFv2
• RFC 1661
The Point-to-Point Protocol
• RFC 1662
PPP in HDLC-like framing
• RFC 1724
RIPv2 MIB
• RFC 1850
OSPFv2 MIB
• RFC 1990
The PPP Multilink Protocol
• RFC 2082
RIPv2 MD5 Authentication
• RFC 2453
RIPv2
• RFC 2674
MIB for Bridges, VLAN Extensions
• RFC 2787
MIB for VRRP
• RFC 3518
PPP Bridging Control Protocol (BCP)
• RFC 3768
VRRP
3.7.3 ETSI
• ES 201468 V1.1.1
Additional EMC Requirements for Telecommunication Equipment for
enhanced availability of service in specific applications
3.7.4 IEC
• IEC EN60950-1
Information Technology Equipment - Safety - Part 1: General Require-
ments
• ISO/IEC 3309:1191 (E)
Information Technology - Telecommunications and information exchange
between systems - High-level data link control (HDLC) procedures -
Frame structure
3.7.5 EN
• EN 300386 V1.3.1
Telecommunication Network Equipment: EMC Requirements (2001-9)
• EN 55022:1998 + A1
Radiated Emission Class B: Conducted Emission on DC Port Class A
• EN 300 132-2 (2003/01)
Power supply interface at the input to telecommunications equipment;
Part 2: Operated by direct current (dc)
4 Installation
4.1 Prerequisites
Before installing an ETAG1 unit take care to follow the safety advice as listed
in [202] Safety Instructions “Precautions and safety”.
The ETAG1 unit runs on dedicated embedded software (ESW). This ESW is
labelled e.g. etag1_r2c_r2a02.
Valid combinations of hardware (HW) and ESW versions are given in [012]
Release Note “XMC20 System Release R6A”.
The software included in this product contains copyrighted software that is
licensed under the GPL.
For further information and GPL license conditions please refer to [090]
Open Source Software declaration.
The ETAG1 has four Ethernet interfaces on the unit front panel, numbered
from bottom up with C1.1 to C4.1
The Ethernet interfaces are equipped with RJ-45 connectors. The interface
layout is per default according to the switch layout, but implements automatic
crossover functionality (MDI/MDI-X). The pin and port assignment of the four
front panel connectors is shown in the figure below.
ETAG1 R1A
47900 xxx
port-4
pin 1
pin 8
port-3
Each Ethernet interface provides two LEDs indicating the link state and the
link activity:
Activity
Link
1:1 connection and crossover connection cables are available for the Ether-
net interfaces. The cable type can be chosen according to the available
cables since the Ethernet ports on ETAG1 implement automatic crossover
functionality.
According to the Ethernet link speed, the following cable categories have to
be used:
Please note:
The above cables can be ordered directly from KEYMILE
The optical or electrical cables must be attached to the cable tray of the
XMC25 or the corresponding devices of the XMC23/XMC22.
The open cable shields must be in contact with the XMC20 grounding bar
and should be fixed to the cable tray or the corresponding devices in the
XMC23/XMC22.
The figure below shows the cable/cable tray assembly of the XMC25. With
the XMC23/XMC22 the cable tray functionality is implemented differently and
depends on the type of installation (rack-, wall-mounted).
120 mm
xx mm
The open cable length <x> between the cable fixing point on the cable tray
and the connector depends on the connected interface.
Please note:
The cable route on the cable tray should follow approximately the projection
of the unit slot on the cable tray.
5 Functional Description
5.1 Overview
The ETAG1 unit is one of the service unit which is only partially integrated in
the chassis switch. It appears in the chassis switch via their internal back-
plane port on the core unit. The internal GbE port connects the ETAG1 to the
chassis switch via the double GbE star on the backplane, i.e. to an internal
Ethernet port on the COGE5 unit. In order to connect both to the working
and to a possible protecting COGE5, the internal GbE port is implemented in
a 1+1 design. Nevertheless the internal port is presented to the user as a
single port and all possible 1+1 switch-over functions are automatically han-
dled by the system.
E.g. a ETAG1 unit plugged in slot-8 of the XMC20 subrack accesses the
internal COGE5 ports at the APs /unit-11/iports/iport-5 (working COGE5 unit)
and /unit-13/iports/iport-8 (protecting COGE5 unit).
For more information related to non fully integrated units and for a detailed
configuration description please refer to [356] User Manual “Ethernet Switch-
ing” and [341] Quick Guide “Ethernet Switching”.
The PBUS is a XMC20 bus structure for traffic signals of various formats
with and without CAS. The PBUS provides a non-blocking cross connect
with the equivalent capacity of 128 x 2 Mbit/s for traffic signals with and with-
out CAS. For the main characteristics and detailed explanations of the PBUS
please refer to [314] User Guide “TDM Services and Cross Connections in
XMC20”.
ETAG1 supports the following PBUS formats:
• P0nc (with and without CAS)
• P12 (transparent)
• P12 (clock master)
ETAG1 uses the CAS bits for the 1+1 Trail (Path) protection function.
ECST is designed to accept valid PBUS cross connections only, but for
ETAG1 certain otherwise allowed P12 mode combinations should be
avoided. Do not use any other combinations for P12 mode than those in the
table below:
Please note:
Changing the unit mode may cause a restart of the unit and includes the risk
of inconsistent configurations. KEYMILE therefore recommends deleting an
existing unit whenever the unit mode should be changed.
The XMC20 platform provides both 1+1 SNC/I for P0nc/P12x signals and
1+1 path protection for P0nc signals with CAS.
In order to configure a protected TDM link for ETAG1 the option “Protected”
must be set to “Yes”, when establishing the cross connection between
ETAG1 and the TDM transport unit:
If using the 1+1 path protection for P0nc signals with CAS make sure, the
whole link from end to end is configured for CAS transport and the peer unit
is supporting CAS. If a persistent CAS support is not ensured for the full
path, CAS must be disabled on both ends.
For 1+1 path protection between ETAG1 and TUDA1 enable CAS on both
units and select “Supervised” or “1+1 Revertive” as transport mode on the
TUDA1, provided CAS is supported for the full path.
For detailed description of signal protection please refer to [314] User Guide
“TDM Services and Cross Connections in XMC20”.
VLAN A VLAN A
Access port
ETAG1 Access port
Trunk link VLAN aware
VLAN aware
Trunk port Trunk port bridge
Access port bridge Access port
VLAN B VLAN B
Below a list of rules for the VLAN MAC transparent bridge with port based
VLAN concept as implemented in ETAG1:
• General rules
− All received frames have assigned a VLAN membership (after ingress
processing).
− The VLAN membership and the egress port type decide to which ports
a frame may be forwarded to:
a) Forwarding to access ports: only frames with VID = port VID
b) Forwarding to trunk ports: no limitation
− VLAN aware bridges can receive but not send priority tagged frames -
therefore they send either tagged or untagged frames.
− The port type (access/trunk/trunk with native VLAN) decides, whether
a transmitted frame needs a tag or not (Exception: BPDUs are always
untagged).
• Access port
− The port is a member of exactly one VLAN.
− Received untagged and priority tagged frames are assigned the VLAN
membership as defined by the port’s VLAN id configuration.
− Received VLAN tagged frames are not accepted, even if the VID is
the same as assigned to the corresponding access port.
− TX frames are all sent untagged.
• Trunk port
− The port is a member of every VLAN with VID = 1 … 4094, thus
received VLAN tagged frames with VID = 1 … 4094 are accepted.
− Received untagged and priority tagged frames are discarded.
− TX frames are all sent VLAN tagged.
• Trunk port with native VLAN (hybrid port)
− The port is a member of every VLAN with VID = 1 … 4094, thus
received VLAN tagged frames with VID = 1 … 4094 are accepted.
− Received untagged and priority tagged frames are assigned the VLAN
membership as defined by the port’s VLAN id configuration.
− TX frames are all sent VLAN tagged, except the frames with
VID = port VID are sent untagged.
Please note:
The VLAN port type (access or trunk) is not dedicated to a physical port type
(Ethernet front, Ethernet internal or TDM) i.e. the VLAN port type is user con-
figurable without restriction.
Take care to avoid inconsistent networks, see figures below.
Consistency problem 1:
A link between two VLAN segments must be of the same type on both ends.
trunk trunk
VLAN A VLAN B VLAN A VLAN B
access trunk
access
VLAN A VLAN B
access
Consistency problem 2:
Redundant links between two VLAN segments must be of the same link type. Otherwise
the network behaviour will change depending on the active link topography.
forwarding
trunk link
VLAN A access link VLAN B
discarding
Consistency problem 3:
Several links from an untagged LAN segment must all use the same VID. Otherwise
connectivity in the network will change depending on the active link topography .
VLAN VLAN
untagged tagged untagged tagged
access port with access port with
VLAN ID = 110 VLAN ID = 105
VLAN VLAN
untagged tagged untagged tagged
VLAN ID = 110
discarding access port with
VLAN ID = 110
B) Access port with VLAN ID110 is forwarded
VLAN
untagged tagged
VLAN ID = 110
forwarding
The VLAN standard IEEE 802.1Q-2003 mentions two methods for MAC
learning and implementation rules:
• Shared VLAN Learning (SVL); the VLAN aware bridge stores the learned
MAC addresses in a common forwarding database for all VLANs.
• Independent VLAN Learning (IVL); the VLAN aware bridge stores the
learned MAC addresses in a separate forwarding database per VLAN.
• A VLAN aware bridge may implement either SVL only or IVL only or it
may implement both SVL and IVL.
ETAG1 implements the IVL approach with tables supporting 8192 learned
MAC addresses per bridge instance.
5.4.3 RSTP
Root
forwarding
forwarding
forwarding
discarding
forwarding
forwarding
forwarding
discarding
In order to prevent loops, some bridges place ports in a discarding state and
ports that are participating in the active topology are in the forwarding state.
The RSTP standard requests backward compatibility to older versions of
spanning trees such as STP according to 802.1D. Designing networks with
mixed spanning tree versions should be avoided whenever possible,
because the rapid conversion is then lost. ETAG1 provides valuable informa-
tion in the status menus for maintaining and debugging bridged networks .
For details see section 8.6.6.1 "AP: / unit-x / port-r, Status - Bridge" (on
page 107).
Please note:
Traffic isolation between two bridge instances on the same ETAG1 unit is
the same as between two bridges on separate hardware (ETER1 is the
ETAG1 equivalent in the KEYMILE UMUX product family).
ETAG1
ETAG1
PDH/SDH
Network ETER1
3rd party
bridge
ETAG1
Please note:
BPDUs (the bridge control information for RSTP/STP) are always transmit-
ted without a VLAN tag, i.e. the active tree topology is calculated without
consideration of VLAN borders. Only by using independent bridge instances
it is possible to build multiple independent spanning trees with the ETAG1
unit.
The star topology bridging feature supported by the ETAG1 unit can be used
together with VLAN bridging and works as an additional forwarding restric-
tion within a VLAN context.
A star topology bridged network (like a tree) consists of a central location
(the root) and peripheral devices (the leaves). All leaves are allowed to com-
municate with the root, but any traffic between the leaves is inhibited. If
VLANS are used, the whole tree must reside in the same VLAN.
Star topology bridging distinguishes between “public” and “protected” bridge
interfaces and handles frame forwarding according to the following rules:
• Frames received on a public interface are forwarded to all interfaces.
• Frames received on a protected interface are forwarded to public inter-
faces only.
• Frame filtering upon the learned MAC address tables is applied in addi-
tion to the star topology bridging.
For the configuration of star topology networks the following rules must be
observed:
• Interfaces towards the tree root are of type “Public”.
• Interfaces towards the tree leaves are of type “Protected”.
• At least one public interface must be defined on each bridge.
• Star cascades are possible, i.e. the function is recursive.
• RSTP may be activated in order to duplicate uplinks towards the root or
to form a meshed network for the root connection.
• If a bridge in the tree does not support the star topology bridging feature,
then all of its interfaces are of type “Public”.
ETAG1
ETER1
ETAG1
internal port
via backplane
COGE5
ETAG1 ETER1
ETER1
PDH/SDH
ETAG1 Network
PDH/SDH
Network
TUDA1
TUDA1
ETAG1
LineRunner
DTM
SDSL8
LineRunner
Public bridge interface DTU
The ETAG1 star bridging function is a purely local bridge function. It is com-
patible with other bridge/switch equipment (ETER1, LAWA4, third party) as
long each bridge with more than two protected interfaces follows the same
forwarding rules as defined above. The function is compatible with the
“Rooted Multipoint EVC type” as described in MEF 10.1.
RSTP does not interfere with the star bridging function, but must be con-
strained to public interfaces only.
This user guide is not a routing tutorial. The following routing basics and defi-
nitions in this paragraph should help understanding how some important
expressions are used in this document.
A Router
• works on OSI layer 3 (network layer);
• is sometimes called a layer 3 switch;
• performs the routing function, i.e. connects IP subnets with different net-
work addresses;
• acts in two planes:
− in the control plane, the forwarding information is collected, main-
tained and stored;
− in the forwarding plane, IP packets are forwarded from an ingress
interface to an egress interface, using appropriate forwarding infor-
mation.
Forwarding information
− can either be static or dynamic;
− is stored in the routing table;
− is composed of a destination IP address range (network address plus
network mask) and a gateway address.
Static routing is a simple and basic function for every router. The corre-
sponding forwarding information is manually entered by the user and is thus
part of the configuration. With static routing very stable networks can be set
up, but on the other hand, static routing is unable to react on possible topol-
ogy changes on the network.
For the configuration of static routes in ETAG1 see paragraph 8.7.3.2 AP: /
unit-x / router, Configuration - StaticRoutes (on page 116).
The ETAG1 unit uses static routing in order to interconnect between a net-
work with dynamic routing (OSPF or RIP) where it is itself part of and any
external destination.
specific
default route external route
External
Large Network Destination
OSPF or RIP
ETAG1 ETAG1
static routing static routing
Internet
OSPF is a dynamic routing protocol for IP networks. It uses a link state rout-
ing algorithm and falls into the group of interior routing protocols, operating
within a single autonomous system (AS).
All OSPF routers within an AS or alternatively within an area store identical
network information in the link state data base (LSDB), which is periodically
updated through flooding within the AS or within the area. From the LSDB
each router calculates the appropriate routes for the routing table with the so
called “shortest path first” algorithm.
OSPF runs in the control plane of a router.
From the OSPF AS point of view, a static route points to a destination some-
where outside the AS, i.e. it is considered as an external destination and cor-
respondingly as an external route. Normally, external routes are distributed
to the whole AS and routers that advertise external routes are considered as
AS boarder routers.
Please note:
OSPF external routes are advertised only if “OSPF Redistribute” - “Static” in
the “Router” menu is enabled.
Please note:
There is no hard limit for an allowed number of routers per area, as this is
depending on the number of interfaces per router, the routers hardware
capabilities, the area topology and the area mode. However, as a defensive
rule of thumb, a network should perform stable with up to about 50 routers
per area. Keep in mind, that the most loaded routers are the area border
routers, since they have to store the LSAs of more than one area.
Areas can be of type “Normal”, “Stub” or “NSSA”.
Stub areas and NSSA can help reducing overhead traffic, but support AS
external routes in a restricted way only.
Please note:
The stub area and NSSA features should be used by OSPF experts only. If
in doubt, please use areas in default mode.
Two or more OSPF routers in the same broadcast domain or at each end of
a point-to-point link form an adjacency when they have detected each other.
But before the adjacency is built, a few conditions must be met, some of
them concerning the router instance, some the connecting interfaces.
• The connecting interfaces of two neighbouring routers must
− belong to the same area;
− use the same authentication key (if authentication is used);
− use the same timing parameters for hello- and dead-interval.
• The common area of two neighbouring routers must use the same config-
uration for
− area mode (normal, stub, NSSA);
− OSPF packet authentication (none, simple, MD5).
It is not necessary for OSPF routers in a broadcast network to become fully
adjacent to each other router in the same network, as this would multiply the
traffic for OSPF internal data exchange. Instead one router advertises the
common network properties in the OSPF AS. This router is called the desig-
nated router. The designated router along with a backup designated router is
elected from all OSPF routers in the broadcast network upon the OSPF pri-
ority value.
The two routers of a point-to-point link always form full adjacency, provided
matching area configuration.
Authentication helps in maintaining a network stable and safe. Let’s take the
case, where an AS border router is by mistake configured to run OSPF on
the interface that connects to a neighbouring network external to the AS. It
would then collect unwanted routing information from the „foreign“ network
and inject it into his native AS, with potential damage to the proper routing in
the network.
The use of authentication reduces the danger of routers mistakenly taking
part of an OSPF AS and for this use case a simple authentication is ade-
quate.
Another use case is to prevent installing a router in the AS with vicious inten-
tion. In this case MD5 cryptographic authentication should be used.
A major drawback of RIP is its slow conversion in case of a link failure. In the
original version (RIPv1) a recursive process had to count up to the maximum
hop count of 16 in order to detect an obsolete route. The split horizon feature
inhibits sending route information back to a neighbour router where it had
originally been learned from. Counting up to 16 is (in most cases) no longer
necessary and thus speeds up networks convergence.
“Split horizon” is activated by default and should not be deactivated without
strong need of a dedicated application.
Please note:
Whenever possible prefer configuring interfaces in passive mode over redis-
tribution of connected interfaces. For more information regarding the passive
mode, please refer to paragraph 8.7.3.1 AP: / unit-x / router, Configuration -
Router (on page 114).
OSPF
RIP
ETAG1
Gateway router A
IP Network
IP host
The Virtual Router Redundancy Protocol (VRRP) efficiently solves this single
point of failure inherent in static default routed environments. This increased
reliability is achieved by advertising a virtual router, an abstract representa-
tion of master and backup routers acting as a group. From the IP host’s point
of view, the behaviour of the virtual router is the same as a physical router
including the IP address. When the IP address of the virtual router is config-
ured as gateway address in the IP host, connectivity to the network is availa-
ble as long as at least one physical member of the virtual router group is up
and running.
Gateway address =
IP address of the
virtual router
IP Network
IP host
Please note:
This description is simplified and does not contain all possible cases and sub
cases as stated in the VRRP standard (RFC 3768).
The VRRP standard defines a reserved range of IEEE 802 MAC addresses
that should be used by the VRRP master in response to ARP requests and
as source address for packets sent by the master. This virtual MAC address
may only be used by the master and has the following value:
00-00-5E-00-01-{VRID}, where VRID is an 8 bit value with the virtual router’s
ID.
Please note:
The ETAG1 VRRP implementation does not use the virtual MAC address.
Instead the MAC address of the corresponding Ethernet interface on the
ETAG1 is used. As a consequence, the virtual router’s MAC address
changes each time a new router becomes master. In order to immediately
reflect this change in all IP host’s MAC tables, a gratuitous ARP is broad-
casted on the LAN by the newly elected master.
Applications with just one virtual router fulfil the demand for gateway router
redundancy, but all packet forwarding is solely performed by the master and
all backup routers run idle. The application in the figure below is quite com-
mon and allows load sharing. As in the previous example in Figure 17: IP
host logically connected to a virtual router (on page 44), we have still two
gateway routers, but this time each is participating in two virtual routers. The
VRRP priorities are selected in order to have different masters for the virtual
routers. Furthermore the IP hosts use different gateway addresses.
IP host x with gateway address =
IP address of the virtual router 1
Virtual
router 1
Under normal conditions both physical gateway routers are available. Gate-
way router A will be master of virtual router 1 and gateway router B will be
master of virtual router 2. IP host x sends all its traffic to the virtual router 1
(gateway address) and IP host y sends all its traffic to the virtual router 2. In
case of a gateway router failure, the remaining one will become master of
both virtual routers and handles all the traffic for all IP hosts that use gate-
way addresses from virtual router 1 or 2.
The load sharing according to figure 19 above works in transmit direction
only. The return traffic from the IP network finds its way depending on the
routing tables in each router it passes.
172.16.98.18/30 172.16.98.17/30
24 172 172
.13/ Main TDM link, 2Mb/s 30 .16.2
.16 .1
R-A .16 .6 / R-C 2 .4/
1 72
.9 8
.9 /3 6 .9 8 24
2. 1
0 17
All ETAG1 units have OSPF activated in the All ppp over TDM links are configured for
backbone area for all router interfaces automatic OSPF metric.
Under normal conditions and with no network defects, pinging host C from
host A results in the following trace:
Reply from 172.16.22.44: bytes=32 time=4ms TTL=252
Route: 172.16.98.18 ->
172.16.22.4 ->
172.16.22.44 ->
172.16.98.17 ->
172.16.1.13
Under normal conditions and with no network defects, pinging host D from
host A results in the following trace:
Reply from 172.16.22.99: bytes=32 time=4ms TTL=252
Route: 172.16.98.18 ->
172.16.22.4 ->
172.16.22.99 ->
172.16.98.14 ->
172.16.1.113
The forward path follows the upper trail but the return path follows the lower
trail, since host D addresses router D with it’s gateway setting.
The test is repeated with a broken link between host A and router A:
R-A R-C
IP host A IP host C
IP host B IP host D
R-B R-D
Both forward and return path follow the lower trail. An extra hop is added,
because router C must send the return via router D.
Ping test of host D from host A with a broken link:
Reply from 172.16.22.99: bytes=32 time=4ms TTL=252
Route: 172.16.98.13 ->
172.16.22.222 ->
172.16.22.99 ->
172.16.98.14 ->
172.16.1.113
Both forward and return path follow the lower trail. No extra hop is added,
because host D addresses directly router D with it’s gateway address.
Router B is now acting as master for both virtual routers and takes over all
traffic from host A and B. Because router A detects port-4 down, it stops
advertising network 172.16.1.0/24 and as a consequence of this topography
change, router C sends traffic for network 172.16.1.0/24 via router D.
In case of a breakdown of one of the routers, there is a similar corrective
action from the remaining routers performed by OSPF and VRRP.
A problem arises in case of a link failure that can not be detected by the next
router. Let’s assume a setup as in Figure 21 below:
R-A
IP host A
VR-A VR-B
IP host B
R-B
VRRP will react correctly on the break between the switches: router B will
become master for both VRs and takes over all traffic from both host A and
B. But the return traffic never arrives back to host A. Router A does not
detect any interface down, thus continues advertising the corresponding IP
network but is unable to deliver received packets to either host A or B.
Please note:
Keep the network part between hosts and gateway routers with VRRP as
simple as possible, in order to minimise the possibility of undetected
breakes.
Please note:
KEYMILE does not recommend configuring VRRP for VLAN interfaces.
There is no status detection for failed interfaces and any network interruption
between a host and the gateway router is not protected. However the VRRP
protection is working in case of a gateway router breakdown.
The generic stack model reflects the ETAG1 unit’s full capabilities in respect
of networking functions and in respect of interface functions. The stack
model also shows the interface depending signal treatment (packet encapsu-
lation) between the networking function and the physical interface.
• ETAG1 networking functions
− MAC bridging
− IP routing
• ETAG1 interfaces
− Ethernet
− TDM, i.e. P0nc/P12 via the UMUX internal PBUS
− VLAN interface
• ETAG1 encapsulations
− IEEE 802.3 (Ethernet/bridging)
− IPoE/ARP (Ethernet/routing)
− MAC/PPP (TDM/bridging)
− MAC/HDLC (TDM/bridging)
− IP/PPP (TDM/routing)
− PPP/HDLC (Standard WAN encapsulation)
The generic stack model allows graphical connection of two interfaces with
the corresponding encapsulation.
ETAG1
Networking function
Encapsulation Encapsulation
Physical interface Physical interface
Sometimes the encapsulation and the physical interface is omitted for one
side. In this case, the blank side is not essential for the application and could
be of any type.
Networking function
Encapsulation Encapsulation and
Physical interface interface omitted
How the generic stack model can be used is shown by the hypothetical
application examples below.
ETAG1 supports the MAC/PPP framing and the BCP protocol defined by
RFC 1638 and additional features defined by the updated specifications RFC
2878 and RFC 3518.
XMC20 ETAG1
MAC Bridging
MAC/PPP RFC3518 *
MAC/HDLC PPP RFC1661
SDSL8 SELI8
PPP/HDLC RFC1662
P0_nc/P12 P0_nc/P12 P0_nc/P12 P0_nc/P12
SHDSL E1 G.703
The following ETAG1 bridging applications in the figures below are all inter-
connected via a common PDH / SDH network:
Bridging application 1:
ETAG1
TDM WAN link termination
with MAC/PPP MAC Bridging
MAC/PPP RFC3518
PPP RFC1661
SELI8 PPP/HDLC RFC1662
P0_nc/P12 P0_nc/P12
E1 G.703
Bridging application 2:
Ethernet LAN - TDM WAN connection ETAG1
ETAG1 MAC Bridging
MAC Bridging IEEE 802.3 3rd party Bridge
TDM
MAC/PPP 10/100BASE-T
Network IEEE 802.3 MAC Bridging
RFC3518
IEEE 802.3
PPP 10/100 Ethernet
RFC1661 BASE-T 10/100BASE-T
LAN
PPP/HDLC
RFC1662 ETAG1
Bridging application 3:
ETAG1
Traffic aggregation with SDSL8 and LineRunner modem
MAC Bridging
MAC/PPP MAC/PPP
RFC3518 RFC3518
PPP PPP
RFC1661 RFC1661
PPP/HDLC PPP/HDLC 3rd party Bridge
RFC1662 RFC1662 SDSL8 with TDM I/F
SELI8 P0_nc/P12 P0_nc/P12 P0_nc/P12
MAC Bridging
SHDSL
MAC/PPP
RFC3518
PPP
LineRunner RFC1661
DTM/DTU
PPP/HDLC
P0_nc/P12 RFC1662
TDM TDM
SHDSL link SHDSL
interface interface
The following ETAG1 routing applications in the figures below are all inter-
connected via a common PDH / SDH network:
1 TDM WAN link termination with IP / PPP
2 Ethernet LAN - TDM WAN connection
3 TDM WAN connection to 3rd party router with G.703 interface
4 Interconnection of bridged and routed network segments using the
ETAG1 virtual interface
Routing application 4:
Interconnection of bridged and routed network segments using the ETAG1 VLAN interface
ETAG1 (a)
IP Routing VLAN MAC Bridging
IP/PPP RFC1332 IPoE/ARP interface MAC/PPP RFC3518
IEEE 802.3
PPP RFC1661 IEEE 802.3 PPP RFC1661
PPP/HDLC RFC1662 10/100 10/100 PPP/HDLC RFC1662
SELI8 P0_nc/P12 BASE-T BASE-T P0_nc/P12
(b) SELI8
ETAG1
Ethernet
MAC Bridging LAN
MAC/PPP RFC3518
PPP RFC1661 There are two alternative ways to interconnect
PPP/HDLC RFC1662 bridged and routed network segments with a
single unit:
P0_nc/P12 SELI8 (a) using the ETAG1 VLAN interface
(b) using an external connection via two
3rd party Bridge with TDM I/F ETAG1 Ethernet ports
MAC Bridging
MAC/PPP RFC3518 TDM
PPP RFC1661 Network
PPP/HDLC RFC1662
E1 G.703
ETAG1 ETAG1
IP Routing MAC Bridging Termination at the far
Multilink -PPP RFC1990 Multilink -PPP RFC1990 end with Multilink PPP
IP/PPP IP/PPP IP/PPP MAC/PPP MAC/PPP MAC/PPP accordingly
RFC1332 RFC1332 RFC1332 RFC3518 RFC3518 RFC3518 (ETAG1, ETER1 or
PPP PPP PPP PPP PPP PPP third party equipment)
RFC1661 RFC1661 RFC1661 RFC1661 RFC1661 RFC1661
PPP/HDLC PPP/HDLC PPP/HDLC PPP/HDLC PPP/HDLC PPP/HDLC
RFC1662 RFC1662 RFC1662 RFC1662 RFC1662 RFC1662
P0_nc/P12 P0_nc/P12 P0_nc/P12 P0_nc/P12 P0_nc/P12 P0_nc/P12
SELI8
P0_nc/P12
TDM
Member links of the ML PPP bundle E1 G.703 Network
- All member links with MAC/PPP, RFC 3518
- Bandwidth per member link up to 2Mbit/s
- Number of member links limited by total
available B/W
P0_nc/P12
Member links of multilink PPP bundles should consist of similar link quality.
Due to the process of splitting up packets in segments at the transmit side
and recombining the segments at the receive side, it is obvious that bad seg-
ments (from one bad link) can degrade the quality of the whole bundle.
Therefore it could have a positive effect on the throughput of the multilink
PPP bundle when a bad member link is excluded from the bundle by a man-
ual reconfiguration.
For delay calculations on multilink PPP bundles the aggregated total band-
width may not be used, but the single link bandwidth must be considered
instead.
5.7.4 Joining and leaving of link members to and from a multilink PPP bundle
All member links handle their PPP LCP individually including link up and link
down procedures. The multilink PPP stays in operation, as long as one
member link is up and running.
Changes in the number of member links will always lead to an interruption of
the corresponding multilink bundle in the range of 30 seconds up to several
minutes. This behaviour is independent from the reason for the change in
member link numbers (e.g. interruptions in the communication network or
configuration changes).
The ETAG1 unit provides different ways of connecting Ethernet LAN inter-
faces to the router.
direct assignment (standard case )
VLAN
interface
TDM WAN
assignment via a bridge
interfaces instance and a VLAN interface
VLAN
interface
Please note:
The configuration of the peer device on the WAN link must be observed,
since the packet encapsulation for the two possible choices are not cross
compatible. See paragraph 5.6 Interface stacks (on page 49) for stack
details.
The virtual LAN interface is a versatile function mainly for:
− inter VLAN routing;
− selective routing per VLAN;
− connection between bridged and routed network segments.
From the router’s point of view a VLAN interface is handled the same way as
any other numbered interface. For the stack details please refer to Figure 27:
Stack details for ETAG1 routing applications (on page 53).
subnet D
3) VLAN solution with one single port and a VLAN interface per
subnet (/24-mask), each with a unique VLAN ID and IP address
ETAG1 VLAN I/F, VLAN Id = 101
IP addr = 172.16.31.1/24
In the example application below both tagged and untagged frames must be
routed over the same interface.
untagged
Subnet 172.16.1.0/24 ETAG1 Interface assigned to the router,
VLAN A IP addr = 172.16.1.1/24
Subnet 172.16.32.0/24
VLAN-ID = 101 VLAN I/F, VLAN Id = 101
VLAN B IP addr = 172.16.32.1/24 Gateway
Ethernet
Subnet 172.16.33.0/24
front port VLAN I/F, VLAN Id = 102
VLAN-ID = 102
VLAN C IP addr = 172.16.33.1/24
Subnet 172.16.34.0/24
VLAN-ID = 103 VLAN I/F, VLAN Id = 103
VLAN X IP addr = 172.16.34.1/24
VLAN-ID = 168
not routed
Figure 32: Selective VLAN routing for tagged and untagged frames
TDM
LineRunner I/F-6
SHDSL link SDSL8 TDM ETAG1
DTM I/F-1
LineRunner TDM
SHDSL link SDSL8
DTM I/F-4
TDM
I/F-5
TDM
Network
Figure 33: The VLAN interface connects between bridging and routing
Configuration example for untagged traffic from the LineRunner DTM and a
single VLAN interface, i.e. all IP hosts in a common subnet:
• TDM I/F-1 … 4: assigned to bridge-1 as access port with VLAN-ID =1
• one single VLAN interface with VLAN-ID =1 and connected to bridge-1
Configuration example for untagged traffic from the LineRunner DTM and an
IP subnet per TDM interface:
• TDM I/F-1: assigned to bridge-1 as access port with VLAN-ID = 101
• TDM I/F-2 … 4: assigned to bridge-1 as access port with VLAN-ID = 102
… 104 accordingly
• VLAN interface vif-1 with VLAN-ID = 101 and connected to bridge-1
• VLAN interface vif-2 … 4 with VLAN-ID = 102 … 104, all on bridge-1
Configure TDM interfaces as “Trunk” for tagged traffic on the DSL links.
5.9 QoS
QoS for the ETAG1 means forwarding received traffic depending on the traf-
fic priority. This function becomes essential when fast ingress traffic (from
Ethernet ports) is destined for slower egress ports (TDM ports). Several pro-
cesses are involved in the QoS function:
• Traffic classification
• Traffic queueing
• Priority mapping to queues
HW RX
from Ethernet I/F
queue
SW TX queue 1
HW TX Queue SW TX queue 2
to Ethernet I/F
queue scheduling SW TX queue 3
SW TX queue 4
HW TX queue full *
HW RX
from TDM I/F
queue
SW TX queue 1
HW TX Queue SW TX queue 2
to TDM I/F Frame processing
queue scheduling SW TX queue 3
and forwarding
SW TX queue 4
(network processor )
HW TX queue full *
HW RX
from TDM /I F
Multilink PPP bundle
queue
ML PPP
RX
HW RX
from TDM /I F
queue
HW TX SW TX queue 1
to TDM I/F queue full *
queue ML PPP Queue SW TX queue 2
TX scheduling SW TX queue 3
HW TX
to TDM I/F queue full * SW TX queue 4
queue
HW TX queue full *
• Queue scheduling
A scheduling process is responsible to empty a set of queues in a prede-
termined way. The current release of ETAG1 uses strict priority schedul-
ing.
• Forwarding service fairness
Ingress frames from the active interfaces are served and forwarded in a
round robin way.
The relation between traffic priority and transmit queues is controlled with
separate mapping tables for MAC frames and IP packets.
To protect the ETAG1 functions against a failure on the ETAG1 unit, XMC20
offers the possibility to equip the subrack with a second ETAG1 unit as a
protecting unit.
EQP protects the main functions switching and routing on the ETAG1 unit
including the backplane interfaces Ethernet and TDM. The Ethernet front
interfaces can’t be protected. When using ETAG1 equipment protection, the
Ethernet traffic from an Ethernet switch is connected to both ETAG1 units via
cables.
In case of a failure on the active (working or protecting) unit the management
and user traffic is rerouted from the failed ETAG1 unit to the standby ETAG1
(protecting or working) unit.
The working and the protecting ETAG1 units can be plugged in any free slot
of the XMC20 subrack.
Management traffic cross-connected over the backplane to the COGEx unit
and user traffic cross-connected to any service unit can be protected.
Service Unit
ETAG1 ETAG1
p-1 p-2 p-3 p-4 p-1 p-2 p-3 p-4 p-x
COGE5
SDH/PDH
Local Area access
Network network
Local Area
Network
Management traffic over the backplane Gigabit Ethernet star to the COGEx
unit and user traffic to any service unit can be protected.
XMC20 active standby
Local Area
Network
Local Area
Network
Please note:
The ports on the standby unit are inactive.
Please note:
The protection switching is non revertive, i.e. after the repair of a failed
ETAG1 unit, the currently active ETAG1 unit remains the active unit irrespec-
tive if it is the working or protecting unit.
Please note:
During a protection switch-over the user traffic is interrupted up to 9 s
depending on used protocols and switch-over event. For switching times
please refer to table Protection (on page 18). Additionally some more time is
needed to establish the connection depending on used protocol on layer 2
(e.g. MAC/HDLC, PPP) and layer 3 (e.g. OSPF, RIP).
Please note:
Be careful when using an ETAG1 in a protected routed network. A link
breakdown on an Ethernet front port will leads to a correct rerouting with all
routing protocols. A link breakdown behind the external Ethernet switch in
the local area network will prevent a correct rerouting because the ETAG1
front port admin state is still up.
To enable equipment protection for the ETAG1 unit some prerequisites must
be met:
• The protecting ETAG1 unit must be in the unassigned state. Otherwise
the unit will not be selectable in the EQP configuration in AP: /unit-x, Con-
figuration - EQP: Create Group…, EQP Group Creation, Protecting Unit.
• The protecting unit must be hardware compatible with the working unit.
Check the hardware compatibility status after the EQP group configura-
tion in the AP: /unit-x, Status - EQP: Units Status, HW Compatible.
The following requirements must be fulfilled that the two units are stated
as hardware compatible:
− Identical unit function. The unit function is composed of the 5 first
characters of the unit name, e.g. ETAG1. The unit name is available at
the AP:/ Main - Equipment, Unit.
− Identical board identification, e.g. 328. The board identification is avail-
able at the AP:/ Main - Inventory, Board ID.
− Identical hardware variant. The hardware variant is the truncation of
the hardware key divided by 256, e.g. 1/256 = 0. The hardware key is
available at the AP:/ Main - Inventory, Hardware Key.
• The protecting unit must be software compatible with the working unit.
Check the software compatibility status after the EQP group configuration
in the AP: /unit-x, Status - EQP: Units Status, SW Compatible.
The following requirements must be fulfilled that the two units are stated
as software compatible:
− Identical unit function. The unit function is composed of the 5 first
characters of the software name, e.g. etag1. The unit name is availa-
ble at the AP:/ Main - Equipment, Software.
In order to guarantee the full compatibility of all features it is strongly rec-
ommended to use the same software on the working and on the protect-
ing unit.
The compatible software must be installed on the ETAG1 unit before the
EQP group creation.
• The unit configuration of an equipment protection group is always done
on the active unit. The configuration on the standby unit is not possible.
The working ETAG1 unit of an EQP group is assigned and configured the
same way as a stand alone ETAG1 unit.
The protecting ETAG1 unit is running with the same ESW as the working
unit and must be in the unassigned state.
The 1+1 equipment protection group is configured on the working unit:
• AP: /unit-x, Configuration - EQP.
− Execute the command “Create Group…”.
− Select the Protecting unit, e.g. /unit-18.
− Execute “OK”.
• Save the NE configuration.
Further on any changes on the ETAG1 configuration must be done on the
active unit. To find out which unit is the active unit check the shelf view, AP
tree or the unit status of the working or protecting ETAG1 unit.
The unit status of the working and protecting units shows the actual status of
the units belonging to the equipment protection group. The unit status offers
also the commands for the EQP manipulation:
• Manual switch
The currently standby unit is set as active unit and the currently active
unit is set as standby unit. This requires that the currently standby unit is
in operational state, i.e.
− has no failure,
− is not isolated.
A manual switch is possible if it is indicated with the “Manual Switch-Over
Allowed” parameter.
This command can only be activated on the working unit status window.
• Forced switch
The currently standby unit is set as active unit, independent of the failure
state of the currently standby unit.
Note that there is a risk that the user traffic will be permanently inter-
rupted if the currently standby unit is in a failure state.
The currently active unit is set as standby unit.
Note that this command can only be activated on the working unit status
window.
• Isolate unit
To be able to perform a maintenance action, e.g. update of the embed-
ded software, on an active unit without activating a protection switch-
over, the working unit can be isolated. This means that the protection
switching state machine is frozen and no protection switch will be done
until the isolation of the unit is removed.
Note that the isolate unit command can only be applied to the working
unit.
• Join unit
Remove the isolation of a previously isolated unit.
Note that the join unit command can only be applied to the working unit.
The table in the EQP status window displays the following items:
• Unit
MO address of the unit belonging to the EQP group.
• EQP unit mode
The working unit is the unit where the protection group has been config-
ured.
The protecting unit is the unit that has been set to the unassigned state
before configuring the protection group.
• Active
Active true means the unit is the active unit, i.e. it is the operational unit.
Active false means the unit is the standby unit, i.e. it is not the operational
unit.
The active state can be changed with the “Manual Switch” and “Forced
Switch” commands.
• Failure
Failure true means the unit is in a failure state.
Failure false means the unit is not in a failure state.
The failure state can not be changed manually.
• Substituted
Substituted true on the working unit means the unit has been substituted
by the protecting unit. A substituted unit is also in the “active false” state.
Substituted false on the working unit means the unit has not been substi-
tuted, i.e. it is the active unit or it has been isolated.
The substituted state of the protecting unit is always false.
• Isolated
Isolated true means the unit has been isolated with the “Isolate Unit”
command.
Isolated false means the unit is not isolated.
The isolation state can be changed with the “Isolate Unit” and “Join Unit”
commands.
The isolated state of the protecting unit is always false.
• HW Compatible
HW compatible true means the working HW unit is compatible with the
protecting HW unit.
HW compatible false means the working HW unit is not compatible with
the protecting HW unit. Equipment protection is not possible.
• SW Compatible
SW compatible true means the working unit embedded software (ESW) is
compatible with the protecting unit ESW.
SW compatible false means the working unit ESW is not compatible with
the protecting unit ESW. Equipment protection is not possible.
• DB Saved
DB saved true means the current configuration of the working or protect-
ing unit has been saved to the XMC20 internal database.
DB saved false means the current configuration of the working or protect-
ing unit has not been saved to the XMC20 internal database. A protection
switching event will load an outdated configuration and traffic will be dis-
turbed.
6 Commissioning
Units must be physically present in the subrack before they can be config-
ured. Should a unit have no ESW, it will start up in the bootloader. In this
case the user must download the appropriate software before he can con-
tinue with the configuration process.
For a description of ESW download please refer to [355] User Manual
“ECST”.
Though the configuration order for the numerous parameters is not generally
crucial, the parameter “Mode” under the tag “General” must be set in the
very first step, as it can not be changed after any TDM interfaces have been
configured. See also paragraph 5.3.2 "Unit mode “8 x 2Mbit/s” versus “16 x
2Mbit/s”" (on page 29) for details.
Special care is needed for the arrangement of TDM interfaces, especially in
bandwidth demanding applications. Make sure to start with the broad links
and always configure possible multilink PPP first.
Please note:
ECST does check numerous dependencies between different parameters, in
order to prevent inconsistent configurations. A warning pops up in case the
entered selection interferes with configuration rules or is not compatible with
previously entered values. However it is not possible for ECST to prevent all
possible inconsistencies or otherwise non-working configurations.
Please note:
The operation functions described in this section assume a correctly config-
ured and operational ETAG1 unit.
When setting up or debugging an access network using the ETAG1, the task
is facilitated by using the implemented operation, alarm and maintenance
features:
• Status information and maintenance functions
Status indications provide a detailed view for all interfaces on both physi-
cal and logical layers. In addition a number of interactive test functions
are provided:
− Ping command
The ping command is available at the router status function. Please
refer to section 8.7.4.3 "AP: / unit-x / router, Status - Ping Command"
(on page 118).
− Trace route command
The trace route command is available at the router status function.
Please refer to section 8.7.4.4 "AP: / unit-x / router, Status - Tracer-
oute Command" (on page 118).
• Fault management
Depending on the unit’s alarm configuration the active failures generate
entries in the NE active alarms list and in the NE alarm log book. For
details please refer to [302] User Guide “XMC25/XMC23/XMC22”.
For the alarm descriptions please look for the corresponding “Fault Man-
agement” sections in chapter 8 "GUI Reference" (on page 75).
• Performance Monitoring
Performance parameters provide information about the long term stability
and reliability of a link. Furthermore packet statistics provide information
for detailed traffic analysis in the network.
Please note:
Performance monitoring on ETAG1 signals is only available if the signals are
enabled (ports) or cross connections have been configured (internal signals).
LEDs on the front of the ETAG1 unit are used to indicate to the user the
alarm status summary of the unit and of the network traffic signals.
XXXXx R1F
47900242
UNIT TRAFFIC
7.3 Maintenance
It is possible to read inventory data from the ETAG1 unit via the ECST with
the following access point:
AP: /unit-x, Main - Inventory.
It is possible to remotely upgrade the ESW (local unit FW) of the ETAG1 via
software download.
Please refer to [355] User Manual “ECST” for a description of the software
download procedure.
7.3.3 Upgrades
When upgrading the ESW on 1:1 equipment protected ETAG1 units, care
must be taken concerning the traffic interruptions and which unit will finally
be the active unit. At the end of the upgrade procedure the working unit shall
be the active unit.
It is assumed that the working unit is plugged in slot 7 and the protecting unit
is plugged in slot 9 of the XMC25 subrack.
ESW upgrade procedure 1 The following procedure provides the upgrade process with one traffic inter-
ruption of up to 60 s.
Please note:
The ESW upgrade procedure 2 provides shorter interruptions.
Manual switch to protecting 1. Navigate to the EQP status dialogue on the working unit:
unit AP: /unit-9, Status - EQP.
2. Perform a manual switch-over from the working to the protecting ETAG1
unit:
Execute the “Manual Switch-Over” command.
Traffic will be switched to the protecting unit.
Traffic will be interrupted for up to 8 s.
The protecting ETAG1 unit is active.
Manual switch to working unit 1. Navigate to the EQP status dialogue on the working unit:
AP: /unit-7, Status - EQP.
8 GUI Reference
This section gives a complete reference of the managed objects, properties,
and commands of the ETAG1 service unit as far as these are not covered in
the generic descriptions in [302] User Guide “XMC25/XMC23/XMC22”.
In this section, you will find the following information:
• An introduction (section 8.1 "Introduction" (on page 75)),
• Unit management commands and parameters (section 8.2 "AP: / unit-x"
(on page 79)),
• Bridging management commands and parameters (sections 8.3 "AP: /
unit-x / bridges" (on page 86) and 8.4 "AP: / unit-x / bridges / bridge-y"
(on page 87)),
• Loopback interface management commands and parameters (section 8.5
"AP: / unit-x / loopbackInterface" (on page 91)),
• External and internal Ethernet port management commands and parame-
ters (section 8.6 "AP: / unit-x / port-r" (on page 97), 8.18 "AP: / unit-x /
internalPorts" (on page 156) and 8.19 "AP: / unit-x / internalPorts / port-1"
(on page 157)),
• Routing related management commands and parameters (sections 8.7
"AP: / unit-x / router" (on page 113), 8.7 "AP: / unit-x / router" (on
page 113), 8.8 "AP: / unit-x / router / ospf" (on page 120), 8.9 "AP: / unit-x
/ router / ospf / area-s" (on page 122) and 8.10 "AP: / unit-x / router / rip"
(on page 126)),
• TDM interface related management commands and parameters (sections
8.11 "AP: / unit-x / tdmInterfaces" (on page 127), 8.12 "AP: / unit-x /
tdmInterfaces / machdlc-t" (on page 130), 8.13 "AP: / unit-x / tdmInter-
faces / mlppp-u" (on page 138), 8.14 "AP: / unit-x / tdmInterfaces / mlppp-
u / member-v" (on page 143) and 8.15 "AP: / unit-x / tdmInterfaces / ppp-
w" (on page 146)),
• VLAN interface related management commands and parameters (sec-
tions 8.16 "AP: / unit-x / vlanInterfaces" (on page 151) and 8.17 "AP: /
unit-x / vlanInterfaces / vif-z" (on page 153)).
For a description on how to configure and bring into operation the ETAG1
unit and its main functions, please refer to section 6 "Commissioning" (on
page 68).
8.1 Introduction
Below, you will find a detailed description of all the configuration parameters
and operations belonging to the managed objects model (MOM) for the
ETAG1 service unit.
The Figure 38 shows the access point (AP) tree for the ETAG1 unit with its
managed objects.
<ap >
XMC20
1 <ap>
bridges
8 <ap>
bridge-y
1 <ap >
loopbackInterface
4 <ap>
port-r
1 <ap>
router
1 <ap> 1 <ap>
ospf rip
8 <ap >
area-s
1 <ap>
tdmInterfaces
1 ... 64 <ap>
member-v
1 <ap>
vlanInterfaces
0 ... 32 <ap>
vif-z
1 <ap>
internalPorts
1 <ap>
port-1
With these managed objects (MOs) the following functions are covered:
Most of the APs only offer a part of the management functions listed above.
The order of appearance of the management function descriptions is in
accordance with the APs in the ECST AP tree and the availability of the
management functions of each AP.
In the tables of the sections below, the parameter default values for proper-
ties are underlined.
Please note:
For better legibility of numbers in this user guide, inverted commas are used
when the number’s size exceeds three digits (e.g. 40’000). In parameter
entry fields of the ECST GUI, these inverted commas must not be entered.
Instead, the numbers are entered without these inverted commas (e.g.
40000).
Please note:
Screenshots presented in this reference may show configurations or data
that may not correspond to the GUI you see when managing your XMC20
equipment.
Please note:
Please refer to [355] User Manual “ECST” for the description of the ECST
functions.
For details about relations between unit modes, TDM modes and timing con-
figuration see 5.3.2 Unit mode “8 x 2Mbit/s” versus “16 x 2Mbit/s” (on
page 29).
Please note:
With equipment protection of a ETAG1 unit it is possible to protect all the
switching and routing functions on the unit.
Equipment connected to user ports can not be protected without using an
additional switch.
Please note:
The creation and deletion of an EQP group must be done on the working
unit.
Isolated The working unit has been isolated with the “Iso-
late Unit” command.
Please note:
Automatic, manual and forced protection switching is available from the
working to the protecting unit and vice versa.
→ Please refer to section 5.9.4 "Equipment protection (EQP)" (on
page 62).
1. ECST can restrict these ranges in order to maintain save relationships for hello interval, forwarding delay and maximum
age according to the IEEE 802.1w standard.
The loopback interface allows the user to assign an IP address to the unit
itself, rather than to a real interface. The loopback address is used as router
ID for OSPF.
Table 38: AP: / unit-x / loopbackInterface, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the loop-
tus Down back interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
OSPF Mode Mode Active Parameter not relevant for the loopbackInterface
Passive
OSPF Area Area area-1 (0.0.0.0) The loopbackInterface belongs to the selected area.
area-2 … area-8
OSPF Priority Priority 0 … 1 … 255 Parameter not relevant for the loopbackInterface
OSPF Authentica- Key <empty> Parameter not relevant for the loopbackInterface
tion
OSPF Metric Automatic Parameters not relevant for the loopbackInterface
Manual Metric 0 … 65535
OSPF Timers Hello Interval 1 … 10 … 65535 s Parameters not relevant for the loopbackInterface
Router Dead Inter- 0 … 40 … 3600 s
val
Transmission Delay 0 … 1 … 3600 s
Retransmission 0 … 5 … 3600 s
Delay
RIP Mode Mode Active Parameter not relevant for the loopbackInterface
Passive
RIP Metric Default Metric 0 … 15 Parameter not relevant for the loopbackInterface
RIP Version And Mode None / RIPv1 Parameters not relevant for the loopbackInterface
Authentication None / RIPv2
None / RIPv1 And
RIPv2
Simple / RIPv2
MD5 / RIPv2
Key <empty>
Split Horizon Split Horizon Parameter not relevant for the loopbackInterface
These are the Ethernet front ports, with <r> ranging from 1 to 4.
Table 47: AP: / unit-x / port-r, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the port
tus Down (RFC 2863).
Operational Status State Up Display of the IETF operational status of the port
Down (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
Please note:
Bridge configuration for the corresponding Ethernet front port is only mean-
ingful, if the port is assigned to one of the eight bridge instances. For any
other port assignment, these parameters are ignored.
Please note:
For manual path cost configuration, the setting for “Path Cost Version” must
always be considered.
Please note:
Router configuration for the corresponding Ethernet front port is only mean-
ingful, if the port is assigned to the router. For any other port assignment,
these parameters are ignored.
Please note:
OSPF configuration for the corresponding Ethernet front port is only mean-
ingful, if the port is assigned to the router. For any other port assignment,
these parameters are ignored.
OSPF Priority Priority 0 … 1 … 255 The priority value is used in the negotiations process in
order the select the designated router and the backup
designated router. With a priority value of “0”, the router
is ineligible to ever become designated router on the
attached network.
This parameter has no relevance for TDM interfaces.
OSPF Authentica- Key <character string> The configuration of the authentication key for a certain
tion interface is depending on the selection for “Authentica-
tion” for the appropriate area.
Make sure to configure identical keys for all OSPF inter-
faces on a common network segment.
Auth. = none: The parameter is not applicable.
Auth. = Simple: max. 8 characters
Auth. = MD5: max. 16 characters
OSPF Metric Automatic By default, the metric is calculated automatically from
the specified interface bandwidth:
metric = 100’000 / bandwidth in kbit/s
The OSPF metric is derived from the configured manual
metric value.
Manual Metric 0 … 65’535 The OSPF routing table calculations can be affected
with manual OSPF metrics. This feature should how-
ever be used by OSPF experts only.
OSPF Timers Hello Interval 1 … 10 … 65535 s Time interval for sending of hello packets on that inter-
face. All OSPF routers that are attached to the same
network must agree on the same hello interval.
Router Dead Inter- 0 … 40 … 3600 s The time before a neighbouring router is declared down
val after missing the hello packets.
Transmission Delay 0 … 1 … 3600 s The time it takes to transmit a link state update packet
over this interface. LSAs contained in the update packet
must have their age incremented by this amount before
transmission.
Retransmission 0 … 5 … 3600 s Time interval between LSA retransmissions for adjacen-
Delay cies belonging to this interface. Also used when retrans-
mitting database description and link state request
packets.
Please note:
RIP configuration for the corresponding Ethernet front port is only meaning-
ful, if the port is assigned to the router. For any other port assignment, these
parameters are ignored.
RIP Mode Mode Active The usual mode to configure a RIP router interface.
Passive No RIP protocol packets are sent or received on this
interface, but the network that is connected to the inter-
face is still advertised on active interfaces.
The passive mode is typically selected for networks with
no RIP supporting routers.
RIP Metric Default Metric 0 … 15
RIP Version And Mode None / RIPv1 Support of RIPv1 only, which implies no authentication
Authentication support
None / RIPv2 Support of RIPv2 only, without authentication support
None / RIPv1 And Support of both RIPv1 and RIPv2, without authentica-
RIPv2 tion support
Simple / RIPv2 Support of RIPv2 only, authentication with plain text
string
MD5 / RIPv2 Support of RIPv2 only, authentication with MD5 hash
Key 0 … 16 characters User editable text string for authentication. Any printable
character is allowed. By default the string is empty.
Split Horizon Split Horizon Split horizon inhibits sending route information back to
routers, where it had previously been learned from.
Please note:
VRRP A/B configuration for the corresponding Ethernet front port is only
meaningful, if the port is assigned to the router. For any other port assign-
ment, these parameters are ignored.
The ETAG1 can participate on one or two virtual routers over the same inter-
face. Therefore two parameter sets “VRRP A” and “VRRP B” are provided.
Please note:
The bridge status for the corresponding Ethernet front port is only meaning-
ful, if the port is assigned to one of the eight bridge instances.
Effective Port Path The port path cost is calculated from the port bandwidth
Cost and is dependent on the configured path cost version. In
case of manual port path cost, this value is equal to the
configured value.
1. In a bridged LAN whose RSTP information has been completely distributed and is stable, i.e., consistent port roles have
been assigned throughout the LAN, every root port and designated port is in forwarding state and every alternate port
and backup port is in discarding state.
Please note:
The router status for the corresponding Ethernet front port is only meaning-
ful, if the port is assigned to the router.
Please note:
The OSPF status for the corresponding Ethernet front port is only meaning-
ful, if the port is assigned to the router.
Please note:
The VRRP status for the corresponding Ethernet front port is only meaning-
ful, if the port is assigned to the router.
The ETAG1 can participate on one or two virtual routers over the same inter-
face. Therefore two individual status menus for “VRRP A” and “VRRP B” are
provided. Descriptions in this paragraph are correspondingly applicable for
“VRRP A” and “VRRP B”.
Duplex Half Duplex The currently active interface mode. Can be the result of
Full Duplex an automatic negotiation process or user configured.
Gateway Address The address, where the packets for the corresponding
destination are sent to.
Interface physical router The destination network is connected either to an Ether-
interface net front port or to a TDM interface.
VLAN interface The destination network is connected to a VLAN inter-
face
loopback interface N.A.
Source connected The route is derived from the user configuration
OSPF The route is calculated from the OSPF link state data
base
static The route is derived from a user configured static route
Table 73: AP: / unit-x / router / ospf, Status - External Link State
Operation Name Parameter Name Range Descriptions / Details
OSPF External Link Link ID Network address of the corresponding destination
State Router ID ID of the OSPF router that is advertising the external
destination
Sequence Continuously counting up, in order to prevent listing the
same item twice
Age Age of the corresponding advertisement in seconds
Checksum The checksum can be used to quickly detect LSA
changes
Though the OSPF standard does not limit the number of areas, the ETAG1
implementation supports 8 areas, with <s> ranging from 1 to 8.
Table 75: AP: / unit-x / router / ospf / area-s, Configuration - OSPF (continued)
Operation Name Parameter Name Range Descriptions / Details
OSPF Area Type Area Type Standard The standard OSPF area type without restrictions
Stub OSPF AS external routes are not distributed to stub
areas; these destinations can be reached upon a
default route via an area border router. Stub areas must
therefore not contain AS external routes.
If in doubt about the exact behaviour of a stub area
please don’t use this feature and use the default area
type instead.
NSSA As for stub areas, AS external destinations can only be
reached using a summary route via an area border
router. But unlike stub areas, NSSA areas may contain
AS external routes.
If in doubt about the exact behaviour of a the NSSA
please don’t use this feature and use the default area
type instead.
Please note: All OSPF routers in the same area must agree on the same area type
OSPF Area Stub Stub Cost 0 … 4’294’967’295 If the stub area has more than one area border router,
Cost the route calculation of all routers in the stub areas can
be guided with the advertised stub cost. Meaningful for
border routers only.
OSPF Area Authen- Authentication None No authentication is used in OSPF hello- and LSA-
tication Mode packets
Simple Authentication with a plain text string is used in OSPF
hello- and LSA-packets
MD5 Authentication with a MD5 hash is used in OSPF hello-
and LSA-packets.
OSPF Area Ranges Enabled Administrative control for the corresponding area
address range
IP Address Any valid IP net- The address / mask pair unambiguously identifies an IP
IP Mask work address / net- address range. The specified address ranges must not
work mask overlap.
combination
Advertise The corresponding address range is advertised
throughout the AS.
The corresponding address range is not advertised, it is
therefore a hidden address range.
Table 76: AP: / unit-x / router / ospf / area-s, Status - Link State
Operation Name Parameter Name Range Descriptions / Details
OSPF Area State Area Border Rout- Number of border routers in the corresponding area
ers
AS Routers Total number of routers in the OSPF AS
Link State Adver- Number of entries in the OSPF link state data base
tisements
Area LSA Check-
sum
8.12.2.1 AP: / unit-x / tdmInterfaces / machdlc-t, Main - Admin And Oper Status
Table 79: AP: / unit-x / tdmInterfaces / machdlc-t, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the TDM
tus Down interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The interface assignment is the same for all interfaces. Please refer to sec-
tion 8.6.3.1 "AP: / unit-x / port-r, Configuration - Interface Assignment" (on
page 98).
Please note:
The bridge configuration for the corresponding interface is only meaningful, if
it is assigned to one of the eight bridge instances. For any other assignment,
these parameters are ignored.
The bridge configuration is the same for all interfaces. Please refer to section
8.6.3.2 "AP: / unit-x / port-r, Configuration - Bridge" (on page 98).
Please note:
The router configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The router configuration is the same for all interfaces. Please refer to section
8.6.3.3 "AP: / unit-x / port-r, Configuration - Router" (on page 100).
Please note:
The OSPF configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The OSPF configuration is the same for all interfaces. Please refer to section
8.6.3.4 "AP: / unit-x / port-r, Configuration - OSPF" (on page 101).
Please note:
The RIP configuration for the corresponding interface is only meaningful, if it
is assigned to the router. For any other assignment, these parameters are
ignored.
The RIP configuration is the same for all interfaces. Please refer to section
8.6.3.5 "AP: / unit-x / port-r, Configuration - RIP" (on page 102).
Please note:
The bridge status for the corresponding interface is only meaningful, if it is
assigned to one of the eight bridge instances.
The bridge status is the same for all interfaces. Please refer to section
8.6.6.1 AP: / unit-x / port-r, Status - Bridge (on page 107).
Please note:
The router status for the corresponding interface is only meaningful, if it is
assigned to the router.
The router status is the same for all interfaces. Please refer to section
8.6.6.2 AP: / unit-x / port-r, Status - Router (on page 109).
Please note:
The OSPF status for the corresponding interface is only meaningful, if it is
assigned to the router.
The OSPF status is the same for all interfaces. Please refer to section
8.6.6.3 AP: / unit-x / port-r, Status - OSPF (on page 109).
Please note:
TDM cross connection is generic for all TDM service units. For more infor-
mation refer to [314] User Guide “TDM Services and Cross Connections in
XMC20”.
8.13.2.1 AP: / unit-x / tdmInterfaces / mlppp-u, Main - Admin And Oper Status
Table 89: AP: / unit-x / tdmInterfaces / mlppp-u, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the TDM
tus Down interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The interface assignment is the same for all interfaces. Please refer to sec-
tion 8.6.3.1 "AP: / unit-x / port-r, Configuration - Interface Assignment" (on
page 98).
Please note:
The bridge configuration for the corresponding interface is only meaningful, if
it is assigned to one of the eight bridge instances. For any other assignment,
these parameters are ignored.
The bridge configuration is the same for all interfaces. Please refer to section
8.6.3.2 "AP: / unit-x / port-r, Configuration - Bridge" (on page 98).
Please note:
The router configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The router configuration is the same for all interfaces. Please refer to section
8.6.3.3 "AP: / unit-x / port-r, Configuration - Router" (on page 100).
Please note:
The OSPF configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The OSPF configuration is the same for all interfaces. Please refer to section
8.6.3.4 "AP: / unit-x / port-r, Configuration - OSPF" (on page 101).
Please note:
The RIP configuration for the corresponding interface is only meaningful, if it
is assigned to the router. For any other assignment, these parameters are
ignored.
The RIP configuration is the same for all interfaces. Please refer to section
8.6.3.5 "AP: / unit-x / port-r, Configuration - RIP" (on page 102).
Please note:
The bridge status for the corresponding interface is only meaningful, if it is
assigned to one of the eight bridge instances.
The bridge status is the same for all interfaces. Please refer to section
8.6.6.1 AP: / unit-x / port-r, Status - Bridge (on page 107).
Please note:
The router status for the corresponding interface is only meaningful, if it is
assigned to the router.
The router status is the same for all interfaces. Please refer to section
8.6.6.2 AP: / unit-x / port-r, Status - Router (on page 109).
Please note:
The OSPF status for the corresponding interface is only meaningful, if it is
assigned to the router.
The OSPF status is the same for all interfaces. Please refer to section
8.6.6.3 AP: / unit-x / port-r, Status - OSPF (on page 109).
8.14.2.1 AP: / unit-x / tdmInterfaces / mlppp-u / member-v, Main - Admin And Oper Status
Table 96: AP: / unit-x / tdmInterfaces / mlppp-u / member-v, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the TDM
tus Down interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The TDM configuration is the same for all TDM interfaces. Please refer to
section 8.12.3.6 "AP: / unit-x / tdmInterfaces / machdlc-t, Configuration -
TDM" (on page 132).
The CTP configuration is the same for all TDM interfaces. Please refer to
section 8.12.3.7 "AP: / unit-x / tdmInterfaces / machdlc-t, Configuration -
CTP" (on page 132).
The Link status is the same for all TDM interfaces. Please refer to section
8.12.6.4 AP: / unit-x / tdmInterfaces / machdlc-t, Status - Link (on page 135).
The CTP status is the same for all TDM interfaces. Please refer to section
8.12.6.5 AP: / unit-x / tdmInterfaces / machdlc-t, Status - CTP (on page 136).
8.15.2.1 AP: / unit-x / tdmInterfaces / ppp-w, Main - Admin And Oper Status
Table 101: AP: / unit-x / tdmInterfaces / ppp-w, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the TDM
tus Down interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The interface assignment is the same for all interfaces. Please refer to sec-
tion 8.6.3.1 "AP: / unit-x / port-r, Configuration - Interface Assignment" (on
page 98).
Please note:
The bridge configuration for the corresponding interface is only meaningful, if
it is assigned to one of the eight bridge instances. For any other assignment,
these parameters are ignored.
The bridge configuration is the same for all interfaces. Please refer to section
8.6.3.2 "AP: / unit-x / port-r, Configuration - Bridge" (on page 98).
Please note:
The router configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The router configuration is the same for all interfaces. Please refer to section
8.6.3.3 "AP: / unit-x / port-r, Configuration - Router" (on page 100).
Please note:
The OSPF configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The OSPF configuration is the same for all interfaces. Please refer to section
8.6.3.4 "AP: / unit-x / port-r, Configuration - OSPF" (on page 101).
Please note:
The RIP configuration for the corresponding interface is only meaningful, if it
is assigned to the router. For any other assignment, these parameters are
ignored.
The RIP configuration is the same for all interfaces. Please refer to section
8.6.3.5 "AP: / unit-x / port-r, Configuration - RIP" (on page 102).
The TDM configuration is the same for all TDM interfaces. Please refer to
section 8.12.3.6 "AP: / unit-x / tdmInterfaces / machdlc-t, Configuration -
TDM" (on page 132).
The CTP configuration is the same for all TDM interfaces. Please refer to
section 8.12.3.7 "AP: / unit-x / tdmInterfaces / machdlc-t, Configuration -
CTP" (on page 132).
8.15.5.2 AP: / unit-x / tdmInterfaces / ppp-w, Performance Management - MIB-2 Interface Table
Please note:
The bridge status for the corresponding interface is only meaningful, if it is
assigned to one of the eight bridge instances.
The bridge status is the same for all interfaces. Please refer to section
8.6.6.1 AP: / unit-x / port-r, Status - Bridge (on page 107).
Please note:
The router status for the corresponding interface is only meaningful, if it is
assigned to the router.
The router status is the same for all interfaces. Please refer to section
8.6.6.2 AP: / unit-x / port-r, Status - Router (on page 109).
Please note:
The OSPF status for the corresponding interface is only meaningful, if it is
assigned to the router.
The OSPF status is the same for all interfaces. Please refer to section
8.6.6.3 AP: / unit-x / port-r, Status - OSPF (on page 109).
The Link status is the same for all TDM interfaces. Please refer to section
8.12.6.4 AP: / unit-x / tdmInterfaces / machdlc-t, Status - Link (on page 135).
The CTP status is the same for all TDM interfaces. Please refer to section
8.12.6.5 AP: / unit-x / tdmInterfaces / machdlc-t, Status - CTP (on page 136).
8.17.2.1 AP: / unit-x / vlanInterfaces / vif-z, Main - Admin And Oper Status
Table 108: AP: / unit-x / tdmInterfaces / ppp-w, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the VLAN
tus Down interface (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The interface assignment is the same for all interfaces. Please refer to sec-
tion 8.6.3.1 "AP: / unit-x / port-r, Configuration - Interface Assignment" (on
page 98).
The router configuration is the same for all interfaces. Please refer to section
8.6.3.3 "AP: / unit-x / port-r, Configuration - Router" (on page 100).
The OSPF configuration is the same for all interfaces. Please refer to section
8.6.3.4 "AP: / unit-x / port-r, Configuration - OSPF" (on page 101).
The RIP configuration is the same for all interfaces. Please refer to section
8.6.3.5 "AP: / unit-x / port-r, Configuration - RIP" (on page 102).
The VRRP A/B configuration for a VLAN interface is the same as for an
Ethernet interface. Please refer to section 8.6.3.6 AP: / unit-x / port-r, Config-
uration - VRRP A/B (on page 103).
8.17.4.1 AP: / unit-x / vlanInterfaces / vif-z, Performance Management - MIB-2 Interface Table
The OSPF status is the same for all interfaces. Please refer to section
8.6.6.3 AP: / unit-x / port-r, Status - OSPF (on page 109).
The VRRP A/B status is the same for the VLAN interfaces as for the Ether-
net interfaces. Please refer to section 8.6.6.4 AP: / unit-x / port-r, Status -
VRRP A/B (on page 110).
The Interface status is the same for the VLAN interfaces as for the Ethernet
interfaces. Please refer to section 8.6.6.6 AP: / unit-x / port-r, Status - Inter-
face (on page 112).
8.19.2.1 AP: / unit-x / internalPorts / port-1, Main - Admin And Oper Status
Table 111: AP: / unit-x / internalPorts / port-1, Main - Admin And Oper Status
Operation Name Parameter Name Range Description / Details
Administrative Sta- State Up Set the IETF administrative status of the internal
tus Down port (RFC 2863).
Testing
Unknown
Dormant
Not Present
Lower Layer Down
The interface assignment is the same for all interfaces. Please refer to sec-
tion 8.6.3.1 "AP: / unit-x / port-r, Configuration - Interface Assignment" (on
page 98).
Please note:
The bridge configuration for the corresponding interface is only meaningful, if
it is assigned to one of the eight bridge instances. For any other assignment,
these parameters are ignored.
The bridge configuration is the same for all interfaces. Please refer to section
8.6.3.2 "AP: / unit-x / port-r, Configuration - Bridge" (on page 98).
Please note:
The router configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The router configuration is the same for all interfaces. Please refer to section
8.6.3.3 "AP: / unit-x / port-r, Configuration - Router" (on page 100).
Please note:
The OSPF configuration for the corresponding interface is only meaningful, if
it is assigned to the router. For any other assignment, these parameters are
ignored.
The OSPF configuration is the same for all interfaces. Please refer to section
8.6.3.4 "AP: / unit-x / port-r, Configuration - OSPF" (on page 101).
Please note:
The RIP configuration for the corresponding interface is only meaningful, if it
is assigned to the router. For any other assignment, these parameters are
ignored.
The RIP configuration is the same for all interfaces. Please refer to section
8.6.3.5 "AP: / unit-x / port-r, Configuration - RIP" (on page 102).
Please note:
The VRRP A/B configuration for the internal port is only meaningful, if the
internal port is assigned to the router. For any other internal port assignment,
these parameters are ignored.
The VRRP A/B configuration for the internal port is the same as for an Ether-
net interface. Please refer to section 8.6.3.6 AP: / unit-x / port-r, Configura-
tion - VRRP A/B (on page 103).
The Ingress Rate Limiter configuration for the internal port is the same as for
an Ethernet interface. Please refer to section 8.6.3.7 AP: / unit-x / port-r,
Configuration - Ingress Rate Limiter (on page 105).
8.19.4.2 AP: / unit-x / internalPorts / port-1, Performance Management - MIB-2 Interface Table
Please note:
The bridge status for the internal port is only meaningful, if it is assigned to
one of the eight bridge instances.
The bridge status is the same for all interfaces. Please refer to section
8.6.6.1 AP: / unit-x / port-r, Status - Bridge (on page 107).
Please note:
The router status for the internal port is only meaningful, if it is assigned to
the router.
The router status is the same for all interfaces. Please refer to section
8.6.6.2 AP: / unit-x / port-r, Status - Router (on page 109).
Please note:
The OSPF status for the internal port is only meaningful, if it is assigned to
the router.
The OSPF status is the same for all interfaces. Please refer to section
8.6.6.3 AP: / unit-x / port-r, Status - OSPF (on page 109).
Please note:
The VRRP status for the internal port is only meaningful, if it is assigned to
the router.
The VRRP A/B status is the same for the internal port as for the Ethernet
interfaces. Please refer to section 8.6.6.4 AP: / unit-x / port-r, Status - VRRP
A/B (on page 110).
The PHY status is the same for the internal port as for the Ethernet inter-
faces. Please refer to section 8.6.6.5 AP: / unit-x / port-r, Status - PHY (on
page 111).
Please note:
The internal port speed is fixed to 1 Gbit/s and full duplex.
The Interface status is the same for the internal port as for the Ethernet inter-
faces. Please refer to section 8.6.6.6 AP: / unit-x / port-r, Status - Interface
(on page 112).
9 Annex
Any version(s) and/or release(s) indicated with the below listed document
titles identify the specific state of the software and/or feature set at the crea-
tion time of the present document. If the present document is published as
part of a document collection, the hyperlinks might open a document valid for
a newer version/release. That updated version is valid in the context of all
units and features described in the document collection.
Training courses are available for a wide range of KEYMILE products and
applications.
For contact information, course descriptions, locations and dates, refer to the
Website: http://www.keymile.com, then select “Services - Training” from the
menu.