FibeAir IP-20S C83 U
FibeAir IP-20S C83 U
FibeAir IP-20S C83 U
User Guide
Notice
This document contains information that is proprietary to Ceragon Networks Ltd. No part of this
publication may be reproduced, modified, or distributed without prior written authorization of
Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.
Trademarks
Ceragon Networks®, FibeAir® and CeraView® are trademarks of Ceragon Networks Ltd., registered
in the United States and other countries.
Ceragon® is a trademark of Ceragon Networks Ltd., registered in various countries.
CeraMap™, PolyView™, EncryptAir™, ConfigAir™, CeraMon™, EtherAir™, CeraBuild™, CeraWeb™, and
QuickAir™, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice. Ceragon Networks
Ltd. shall not be liable for errors contained herein or for incidental or consequential damage in
connection with the furnishing, performance, or use of this document or equipment supplied with it.
Intended Use/Limitation
Fixed point-to-point radio links for private networks.
Authorized to Use
Only entities with individual authorization from the National Regulator to operate the mentioned
radio equipment.
The equipment can be used in the following EU countries:
Austria (AT) - Belgium (BE) - Bulgaria (BG) - Switzerland/Liechtenstein (CH) - Cyprus (CY) - Czech
Republic (CZ) - Germany (DE) – Denmark (DK) - Estonia (EE) - Finland (FI) - France (FR) -Greece (GR)
- Hungary (HU) - Ireland (IE) – Iceland (IS) – Italy (IT) – Lithuania (LT) - Luxembourg (LU) – Latvia
(LV) - Malta (MT) - Netherlands (NL) - Norway (NO) - Portugal (PT) - Romania (RO) - Sweden (SE) -
Slovenia (SI) - Slovak Republic (SK) – United Kingdom (UK) – Spain (SP) – Poland (PL)
Table of Contents
Section I: Introduction ......................................................................................... 21
1. Introduction .................................................................................................... 22
1.1 IP-20C System Overview ............................................................................................. 22
1.2 IP-20S System Overview ............................................................................................. 22
1.3 IP-20E System Overview ............................................................................................. 23
1.4 PoE Injector Overview.................................................................................................. 23
1.5 The Web-Based Element Management System .......................................................... 24
1.5.1 Introduction to the Web EMS ....................................................................................... 24
1.5.2 Web EMS Page Layout ................................................................................................ 24
1.6 Reference Guide to Web EMS Menu Structure ........................................................... 27
2. Getting Started................................................................................................ 33
2.1 Assigning IP Addresses in the Network ....................................................................... 33
2.2 Establishing a Connection ........................................................................................... 33
2.2.1 PC Setup ...................................................................................................................... 34
2.3 Logging on ................................................................................................................... 35
2.3.1 Logging in Without Knowing the IP Address ................................................................ 35
2.4 Changing Your Password ............................................................................................ 36
2.5 Configuring In-Band Management ............................................................................... 37
2.6 Changing the Management IP Address ....................................................................... 37
2.7 Configuring the Activation Key ..................................................................................... 39
2.7.1 Activation Key Overview .............................................................................................. 39
2.7.2 Viewing the Activation Key Status Parameters ............................................................ 40
2.7.3 Entering the Activation Key .......................................................................................... 41
2.7.4 Activating Demo Mode ................................................................................................. 41
2.7.5 Displaying a List of Activation-Key-Enabled Features ................................................. 41
2.8 Setting the Time and Date (Optional) .......................................................................... 42
2.9 Enabling the Interfaces (Interface Manager)................................................................ 45
2.10 Configuring the Radio Parameters ............................................................................... 47
2.11 Configuring the Radio (MRMC) Script(s) ..................................................................... 49
2.11.1 Radio Profiles ............................................................................................................... 53
2.12 Enabling ACM with Adaptive Transmit Power ............................................................. 53
2.13 Operating in FIPS Mode............................................................................................... 55
2.13.1 Requirements for FIPS Compliance ............................................................................ 55
2.13.2 Enabling FIPS Mode .................................................................................................... 56
2.14 Configuring Grouping (Optional) .................................................................................. 56
2.15 Creating Service(s) for Traffic ...................................................................................... 57
4. Unit Management............................................................................................ 98
4.1 Defining the IP Protocol Version for Initiating Communications .................................. 99
4.2 Configuring the Remote Unit’s IP Address .................................................................. 99
4.2.1 Changing the Subnet of the Remote IP Address ....................................................... 101
4.3 Configuring SNMP ..................................................................................................... 102
4.4 Configuring Trap Managers ....................................................................................... 105
4.5 Installing and Configuring an FTP or SFTP Server ................................................... 107
9. Synchronization............................................................................................ 261
9.1 Configuring SyncE Regenerator ................................................................................ 261
11.3.2 Viewing the Probable Cause and Corrective Actions for an Alarm Type .................. 311
11.3.3 Editing an Alarm Type ................................................................................................ 311
11.3.4 Setting Alarms to their Default Values ....................................................................... 312
11.4 Uploading Unit Info ..................................................................................................... 312
11.5 Performing Diagnostics .............................................................................................. 314
11.5.1 Performing Radio Loopback ...................................................................................... 314
11.5.2 Performing Ethernet Loopback .................................................................................. 315
11.5.3 Configuring Service OAM (SOAM) Fault Management (FM) ..................................... 316
18.2.6 Configuring the Line Compensation Value for a Rate Meter (Policer) (CLI) .............. 475
18.2.7 Displaying Rate Meter Statistics for an Interface (CLI) .............................................. 476
18.3 Configuring Marking (CLI) .......................................................................................... 478
18.3.1 Marking Overview (CLI) ............................................................................................. 478
18.3.2 Configuring Marking Mode on a Service Point (CLI) ................................................. 479
18.3.3 Marking Table for C-VLAN UP Bits (CLI) ................................................................... 480
18.3.4 Marking Table for S-VLAN UP Bits (CLI) ................................................................... 481
18.4 Configuring WRED (CLI) ............................................................................................ 483
18.4.1 WRED Overview (CLI) ............................................................................................... 483
18.4.2 Configuring WRED Profiles (CLI) ............................................................................... 483
18.4.3 Assigning a WRED Profile to a Queue (CLI) ............................................................. 485
18.5 Configuring Shapers (CLI) ......................................................................................... 486
18.5.1 Overview of Egress Shaping (CLI) ............................................................................. 486
18.5.2 Configuring Queue Shapers (CLI) ............................................................................. 486
18.5.3 Configuring Service Bundle Shapers (CLI) ................................................................ 489
18.5.4 Configuring Egress Line Compensation for Shaping (CLI) ........................................ 492
18.6 Configuring Scheduling (CLI) ..................................................................................... 493
18.6.1 Overview of Egress Scheduling (CLI) ........................................................................ 493
18.6.2 Configuring Queue Priority (CLI) ................................................................................ 493
18.6.3 Configuring Interface Priority Profiles (CLI) ............................................................... 494
18.6.4 Attaching a Priority Profile to an Interface (CLI) ........................................................ 497
18.6.5 Configuring Weighted Fair Queuing (WFQ) (CLI) ...................................................... 498
18.7 Displaying Egress Statistics (CLI) .............................................................................. 502
18.7.1 Displaying Queue-Level PMs (CLI) ............................................................................ 502
18.7.2 Displaying Service Bundle-Level PMs (CLI) .............................................................. 503
When working with a FibeAir IDU, note the following risk of electric
shock and energy hazard: Disconnecting one power supply disconnects
! only one power supply module. To isolate the unit completely,
disconnect all power sources.
ESD
Laser
The optical interface must only be serviced by qualified personnel, who are
aware of the hazards involved to repair laser products.
When handling laser products the following precautions must be taken:
Never look directly into an open connector or optical cable.
Before disconnecting an optical cable from the optical transmitter, the
power should be switched off. If this is not possible, the cable must be
disconnected from the transmitter before it is disconnected from the
receiver.
When the cable is reconnected it must be connected to the receiver before
it is connected to the transmitter.
Beachten Sie beim Arbeiten mit FibeAir IDU das folgende Stromschlag-
und Gefahrenrisiko: Durch Abtrennen einer Stromquelle wird nur ein
! Stromversorgungsmodul abgetrennt. Um die Einheit vollständig zu
isolieren, trennen Sie alle Stromversorgungen ab.
Hazardous Substance
Component
Hexavalent Polybrominated Polybrominated
Lead Mercury Cadmium
Chromium Biphenyls Diphenyl
(Pb) (Hg) (Cd)
(Cr VI) (PBB) Ethers (PBDE)
PCB/Circuit
Comply Comply Comply Comply Comply Comply
Modules
Mechanical
Comply Comply Comply Comply Comply Comply
Parts
Cables Comply Comply Comply Comply Comply Comply
Target Audience
This manual is intended for use by individuals responsible for configuration
and administration of an IP-20 system or network.
Related Documents
FibeAir IP-20C Technical Description
FibeAir IP-20C Installation Guide
FibeAir IP-20S Technical Description
FibeAir IP-20S Installation Guide
FibeAir IP-20E Technical Description
FibeAir IP-20E Installation Guide
FibeAir IP-20 Series MIB Reference
FibeAir IP-20C/S/E Release Notes
Section I:
Introduction
1. Introduction
This section includes:
IP-20C System Overview
IP-20S System Overview
IP-20E System Overview
PoE Injector Overview
The Web-Based Element Management System
Reference Guide to Web EMS Menu Structure
This user manual provides instructions for configuring and operating the
following systems:
IP-20C
IP-20S
IP-20E
Each of these systems can be used with a PoE Injector.
Wherever applicable, the manual notes the specific distinctions between these
systems. The manual also notes when specific features are only applicable to
certain systems and not others.
Figure 2: Main Web EMS Page with Representation of Front Panel – IP-20C/S
Figure 3: Main Web EMS Page with Representation of Front Panel – IP-20E
When HSB radio protection is enabled, two tabs appear on the top of the main
section. These tabs are labeled Active and Standby and enable you to configure
the Active and Standby units separately if necessary. The title above the main
section indicates whether you are working with the Active or Standby TCC.
For details on configuring HSB radio protection, see Configuring HSB Radio
Protection.
Note: HSB protection is only available for IP-20C and IP-20S.
Figure 4: Main Web EMS Page with Active and Standby Tabs
Certain pages include a Related Pages drop-down list on the upper right of
the main section of the page. You can navigate to a page related to the current
page by selecting the page from this list.
Section II:
Web EMS
Configuration
2. Getting Started
This section includes:
Assigning IP Addresses in the Network
Establishing a Connection
Logging on
Changing Your Password
Configuring In-Band Management
Changing the Management IP Address
Configuring the Activation Key
Setting the Time and Date (Optional)
Enabling the Interfaces (Interface Manager)
Configuring the Radio Parameters
Configuring the Radio (MRMC) Script(s)
Enabling ACM with Adaptive Transmit Power
Operating in FIPS Mode
Configuring Grouping (Optional)
Creating Service(s) for Traffic
2.2.1 PC Setup
To obtain contact between the PC and the IP-20 unit, it is necessary to
configure an IP address on the PC within the same subnet as the IP-20 unit.
The default IP-20 IP address is 192.168.1.1. Set the PC address to e.g.
192.168.1.10 and subnet mask to 255.255.255.0. Note the initial settings
before changing.
Note: The IP-20 IP address, as well as the password, should be
changed before operating the system. See Changing the
Management IP Address and Changing Your Password.
1 Select Control Panel > All Control Panel Items > Network and Sharing
Center.
2 Click Change the adapter settings.
3 Select Local Area Connection > Properties > Internet Protocol Version
4 (TCP/IP), and set the following parameters:
IP address: 192.168.1.10
Subnet mask 255.255.255.0
No default gateway
4 Click OK to apply the settings.
Figure 6: Internet Protocol Properties Window
2.3 Logging on
1 Open an Internet browser (Internet Explorer or Mozilla Firefox).
2 Enter the default IP address “192.168.1.1” in the Address Bar. The Login
page opens.
Figure 7: Login Page
4 Verify that the MGT port LED is orange. (When a connection is established
using Channel 1 of the cable, the LED on the MGT port is green.)
Note: For IP-20E, there is no LED to indicate whether the
connection has been established.
5 The system will prompt you for a user name and password (see Figure 7).
6 Enter the default user name and password:
User Name: admin
Password: admin
7 Click Apply.
8 After a connection is established, you can view or configure the unit's IP
address using the Web EMS. See Changing the Management IP Address.
2 In the Old password field, enter the current password. For example, upon
initial login, enter the default password (admin).
Parameter Definition
Type Displays the current activation key type.
Validation number Displays a random, system-generated validation number.
Date code Displays a date code used for validation of the current activation key
cipher.
Violation runtime counter (hours) In the event of an Activation Key Violation alarm, this field displays the
number of hours remaining in the 48-hour activation key violation grace
period.
Sanction state If an Activation Key Violation alarm has occurred, and the 48-hour
activation key violation grace period has expired without the system
having been brought into conformance with the activation-key-enabled
capacity and feature set, Yes appears in this field to indicate that the
system is in an Activation Key Violation sanction state. All other alarms
are hidden until the capacity and features in use are brought within the
activation-key-enabled capacity and feature set.
Parameter Definition
Feature ID A unique ID that identifies the feature.
Feature name The name of the feature.
Feature Description A description of the feature.
Activation key-enabled feature Indicates whether the activation-key-enabled feature is actually being
usage used.
Activation key-enabled feature Indicates whether the feature is allowed under the activation key that is
credit currently installed in the unit.
Activation key violation status Indicates whether the system configuration violates the currently installed
activation key with respect to this feature.
Parameter Definition
Date & Time UTC Date and Time The UTC date and time.
Configuration
Local Current Date and Read-only. The calculated local date and time,
Time based on the local clock, Universal Time
Coordinated (UTC), and Daylight Savings Time
(DST) configurations.
Offset from GMT UTC Offset Hours The required hours offset (positive or negative)
relative to GMT. This is used to offset the clock
relative to GMT, according to the global
meridian location.
UTC Offset Minutes The required minutes offset (positive or
negative) relative to GMT. This is used to offset
the clock relative to GMT, according to the
global meridian location.
Daylight Saving Start Month The month when Daylight Savings Time begins.
Time
Day The date in the month when Daylight Savings
Time begins.
Daylight Saving End Time Month The month when Daylight Savings Time ends.
Day The date in the month when Daylight Savings
Time ends.
DST Offset (Hours) The required offset, in hours, for Daylight
Savings Time. Only positive offset is supported.
3 Click Apply.
Note: The Operational Status field displays the current, actual
operational state of the interface (Up or Down).
2 For IP-20C units, select the carrier in the Radio table (see Figure 16) and
click Edit. A separate Radio Parameters page opens. The page is essentially
identical to the IP-20E and IP-20S page, except for the addition of a Radio
location parameter.
The following figures show scripts supported by the IP-20C and IP-20E.
For an up-to-date list of scripts supported by the IP-20C, IP-20S, and IP-
20E in this release, see the IP-20C, IP-20S, and the IP-20E Release Notes.
Figure 18: MRMC Symmetrical Scripts Page (IP-20C) (ETSI)
2 In the Select Radio Interface field, select the slot for which you want to
configure the script.
Note: This step is only applicable for IP-20C units.
3 Select the script you want to assign to the radio. The currently-assigned
script is marked by a check mark (Script ID 1504 in the image above).
4 Click Configure Script. A separate MRMC Symmetrical Scripts page opens
similar to the page shown below.
Figure 21: MRMC Symmetrical Scripts Page (Configuration)
Note: Changing the script resets the radio interface and affects
traffic.
Table 11 describes the MRMC Symmetrical Scripts page parameters.
Parameter Definition
Script ID A unique ID assigned to the script in the system.
Channel bandwidth (MHz) The script's channel bandwidth (channel spacing).
Occupied bandwidth (MHz) The script's occupied bandwidth.
Modulation Script Indicates whether the script supports Adaptive Coding Modulation (ACM).
In ACM mode, a range of profiles determines Tx and Rx rates. This
enables the radio to modify its transmit and receive levels in response to
environmental conditions.
Multi-Carrier Indicates the Multi-Carrier status of the script (XPIC, MIMO, or Single-
Carrier).
Adjacent Channel Displays the script’s adjacent channel polarization mode.
Latency Level Indicates whether the script is a normal or low-latency script.
Symmetry Indicates that the script is symmetrical (Normal). Only symmetrical scripts
are supported in the current release.
Standard Indicates whether the script is compatible with ETSI or FCC (ANSI)
standards, or both.
MRMC Script operational mode The ACM mode: Fixed or Adaptive.
Fixed ACM mode applies constant TX and RX rates. However, unlike
regular scripts, with a Fixed ACM script you can specify a maximum
profile to inhibit inefficient transmission levels.
In Adaptive ACM mode, TX and RX rates are dynamic. An
ACM-enabled radio system automatically chooses which profile to use
according to the channel fading conditions.
MRMC Script maximum profile The maximum profile for the script. For example, if you select a maximum
profile of 5, the system will not climb above profile 5, even if channel fading
conditions allow it.
MRMC Script minimum profile Displays the minimum ACM profile available for the script.
Profile Modulation
Profile 0 QPSK
Profile 1 8 QAM
Profile 2 16 QAM
Profile 3 32 QAM
Profile 4 64 QAM
Profile 5 128 QAM
Profile 6 256 QAM
Profile 7 512 QAM
Profile 8 1024 QAM (Strong FEC)
Profile 9 1024 QAM (Light FEC)
Profile 10 2048 QAM
Profile Modulation
Profile 0 BPSK
Profile 1 QPSK
Profile 2 8 QAM
Profile 3 16 QAM
Profile 4 32 QAM
Profile 5 64 QAM
Profile 6 128 QAM
3. Configuration Guide
This section includes:
System Configurations
Configuring a Link Using the Quick Configuration Wizard
Configuring Multi-Carrier ABC
Configuring Link Aggregation (LAG)
Configuring XPIC
Configuring HSB Radio Protection
Configuring MIMO and Space Diversity
Operating an IP-20C in Single Radio Carrier Mode
Note: Multi-Carrier ABC, XPIC, MIMO, and Space Diversity are only
supported with IP-20C. HSB radio protection is only
supported with IP-20C and IP-20S.
You can also use this wizard to configure XPIC between the radios within
the Multi-Carrier ABC group. For a detailed explanation of XPIC and its
requirements, see Configuring XPIC.
Note: 1+0 Repeater links and Multi-Carrier ABC are only available
for IP-20C dual-carrier units.
Because the Quick Configuration wizard creates Pipe links, you cannot add an
interface to a link using the Quick Configuration wizard if any service points
are attached to the interface prior to configuring the link. See Deleting a
Service Point.
11 In the Script ID field, select the MRMC script you want to assign to the
radio. For a full explanation of choosing an MRMC script, see Configuring
the Radio (MRMC) Script(s).
12 In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
Fixed ACM mode applies constant TX and RX rates. However, unlike
regular scripts, with a Fixed ACM script you can specify a maximum
profile to inhibit inefficient transmission levels.
18 Click Finish. Page 5 of the 1+0 Quick Configuration wizard opens. This
page displays the parameters you have selected for the link.
Figure 28: 1+0 Quick Configuration Wizard – Page 5 (Summary Page)
2 In the Radio #1 Interface field, select the first radio interface for the link.
3 Click Next. Page 2 of the 1+0 Repeater Quick Configuration wizard opens.
Figure 30: 1+0 Repeater Quick Configuration Wizard – Page 2
4 In the Radio #2 Interface field, select the second radio interface for the
link.
5 In the Pipe Type field, select the Attached Interface type for the service
that will connect the radios. Options are:
s-tag – A single S-VLAN is classified into the service points.
dot1q - A single C-VLAN is classified into the service points.
Note: For a full explanation of Ethernet Services, service types,
and attached interface types, see Configuring Ethernet
Service(s).
6 Click Next. Page 3 of the 1+0 Repeater Quick Configuration wizard opens.
Figure 31: 1+0 Repeater Quick Configuration Wizard – Page 3
13 Click Finish. Page 6 of the 1+0 Repeater Quick Configuration wizard opens.
This page displays the parameters you have selected for the link.
Figure 34: 1+0 Repeater Quick Configuration Wizard – Page 6 (Summary Page)
6 In the Radio #2 Interface field, select the second radio interface for the
group.
7 Click Next. The Radio XPIC Configuration page opens. If you want to set up
an XPIC configuration, select the radio pair. For full instructions on
configuring XPIC, including antenna alignment instructions, see
Configuring XPIC.
Figure 37: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio XPIC
Configuration Page
8 Click Next. The Radio Parameters Configuration page opens. You can
configure the basic radio parameters for each interface. If you selected
XPIC in the Radio XPIC Configuration page, you configure the parameters
for the group rather than the individual interfaces.
Figure 38: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters
Configuration Page
Figure 39: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters
Configuration Page (XPIC)
Figure 41: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script
Configuration Page - XPIC
11 For each interface or XPIC group, configure the following MRMC script
parameters:
i In the Script ID field, select the MRMC script you want to assign to the
radio or XPIC group. For a full explanation of choosing an MRMC script,
see Configuring the Radio (MRMC) Script(s).
ii In the Operational Mode field, select the ACM mode: Fixed or
Adaptive.
Fixed ACM mode applies constant TX and RX rates. However, unlike
regular scripts, with a Fixed ACM script you can specify a maximum
profile to inhibit inefficient transmission levels.
In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-
enabled radio system automatically chooses which profile to use
according to the channel fading conditions.
iii Do one of the following:
If you selected Fixed in the Operational Mode field, the next field
is Profile. Select the ACM profile in the Profile field.
If you selected Adaptive in the Operational Mode field, the next
field is Maximum Profile. Enter the maximum profile for the script
in the Maximum Profile field. See Configuring the Radio (MRMC)
Script(s).
12 Click Next. The Management Configuration page opens.
Figure 42: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Management
Configuration Page
16 Click Finish. The Summary page opens. This page displays the parameters
you have selected for the group.
Figure 43: 2 + 0 Multi Carrier ABC Quick Configuration Wizard –Summary Page
2 Click Create Group. The first page of the Create ABC Group wizard opens.
Figure 45: Create ABC Group Wizard – First Page
3 Optionally, enter a descriptive name for the group in the Group Name
field.
4 Click Next. The next page of the Create Group wizard opens.
Figure 46: Create ABC Group Wizard – Second Page
3 Click Apply.
4 Repeat these steps to remove additional members from the group.
3 In the Group ID field, select a LAG Group ID. Only LAG IDs that are not
already assigned to a LAG group appear in the dropdown list.
4 In the LAG Member 1 field, select an interface to assign to the LAG group.
Only interfaces not already assigned to a LAG group appear in the
dropdown list.
5 Click Next. A new Create LAG Group page opens.
Figure 50: Create LAG Group – Page 2
9 Click Submit. If all the interfaces meet the criteria listed above, a message
appears that the LAG group has been successfully created. If not, a
message appears indicating that the LAG group was not created and giving
the reason.
2 In the XPIC Configuration page, select Enable in the Admin state field and
click Apply.
To disable XPIC, select Disable in the Admin state field and click Apply.
In additional, almost every Web EMS page will now include two tabs on
top of the main section of the page:
Active – Enables you to configure the Active unit.
Standby – In most cases, this tab is read-only and enables you to
display Standby unit parameters. Even when a switchover occurs, the
unit displayed in the Web EMS is always the currently Active unit.
Note: The parameters that are editable on the Standby tab are
described in Editing Standby Unit Settings.
5 Once you have enabled Protection:
i Perform all necessary radio configurations on the Active unit, such as
setting the frequency, assigning MRMC scripts, unmuting the radio, and
setting up radio groups such as XPIC or Multi-Carrier ABC
(Multi-Radio).
ii Perform all necessary Ethernet configurations on the Active unit, such
as defining Ethernet services.
iii In the Unit Redundancy page, click Copy to Mate to copy the
configuration of the Active unit to the Standby unit. Confirm the action
in the confirmation window that appears.
Note: While the system is performing the copy-to-mate operation,
a temporary loss of management connection will occur.
To keep the Standby unit up-to-date, after any change to the configuration of
the Active unit click Copy to Mate to copy the configuration to the Standby
unit.
If you change the configuration of the Active unit but do not perform Copy to
Mate, a Configuration Mismatch alarm appears in the Faults > Current
Alarms page.
Note: You can use the following CLI command to display a list of
mismatched parameters:
3 In the Group Type field, select one of the following according to your
desired system configuration:
MIMO 2x2
MIMO 4x4
1+0 Space Diversity
2+0 Space Diversity
Note To enable 2+2 Space Diversity, select 2+0 Space
Diversity after setting up the hardware configuration
for 2+2 Space Diversity. See 2+2 Space Diversity.
4 Click Next. The Create MIMO Group page is updated and displays your
system configuration.
Figure 59: Create MIMO Group – Page 2
7 For 4x4 MIMO configurations and 2+2 Space Diversity configurations, you
must set the role of the group to Master or Slave. See Setting the Role of a
MIMO or Space Diversity Group.
The MIMO - Edit Members page provides the following information for each
radio carrier in the MIMO group:
MMI – MIMO Mate Interference. MMI represents the difference between
the RSL1 and the RSL2 of the remote Master and Slave transmitters with
the same polarization. The nominal range is 0. The range should be from -3
dB to +3 dB.
This parameter is not relevant for 1+0 Space Diversity (as indicated by a
value of -99).
XPI – Cross Polarization Interference. This is only relevant in 4x4
configurations, where each unit operates in dual polarization (XPIC) mode.
The XPI value should be at least 25 dB. For further information, see
Configuring XPIC.
4. Unit Management
This section includes:
Defining the IP Protocol Version for Initiating Communications
Configuring the Remote Unit’s IP Address
Configuring SNMP
Configuring Trap Managers
Installing and Configuring an FTP or SFTP Server
Upgrading the Software
Backing Up and Restoring Configurations
Setting the Unit to the Factory Default Configuration
Performing a Hard (Cold) Reset
Configuring Unit Parameters
Configuring NTP
Displaying Unit Inventory
Related topics:
Setting the Time and Date (Optional)
Enabling the Interfaces (Interface Manager)
Uploading Unit Info
Changing the Management IP Address
2 In the IP address Family field, select the IP protocol the unit will use
when initiating communications. The options are IPv4 or IPv6.
2 For IP-20C units, select the carrier in the Radio table (see Figure 65) and
click Edit. A separate Remote IP Configuration page opens. The page is
identical to the IP-20C and IP-20S page.
3 In the Remote IP address field, enter an IP address for the remote unit.
You can enter the address in IPv4 format in this field, and/or in IPv6
format in the IPv6 Address field. The remote unit will receive
communications whether they are sent to its IPv4 address or its IPv6
address.
4 In the Remote Subnet mask field, enter the subnet mask of the remote
radio.
5 Optionally, in the Remote default gateway field, enter the default
gateway address for the remote radio.
6 Optionally, in the Remote IPv6 Address field, enter an IPv6 address for
the remote unit. You can enter the address in IPv6 format in this field,
and/or in IPv4 format in the IP Address field. The unit will receive
communications whether they are sent to its IPv4 address or its IPv6
address.
7 If you entered an IPv6 address, enter the IPv6 prefix length in the Remote
IPv6 Prefix-Length field.
8 Optionally, if you entered an IPv6 address, enter the default gateway in
IPv6 format in the Remote default Gateway IPv6 field.
9 Click Apply.
Parameter Definition
User Name Enter the SNMPv3 user name.
Password Enter a password for SNMPv3 authentication. The password must be at
least eight characters.
Authentication Algorithm Select an authentication algorithm for the user. Options are:
None
SHA
MD5
Encryption (Privacy) Mode Select an encryption (privacy) protocol for the user. Options are:
None
DES
AES
Access Mode Select an access permission level for the user. Options are:
Read Write User
Read Only User
2 Select a trap manager and click Edit. The Trap Managers Edit page opens.
Figure 72: Trap Managers - Edit Page
Parameter Definition
IPv4 Address If the IP address family is configured to be IPv4, enter the destination IPv4
address. Traps will be sent to this IP address. See Defining the IP Protocol
Version for Initiating Communications.
IPv6 Address If the IP address family is configured to be IPv6, enter the destination IPv6
address. Traps will be sent to this IP address. See Defining the IP Protocol
Version for Initiating Communications.
Description Enter a description of the trap manager (optional).
Admin Select Enable or Disable to enable or disable the selected trap manager.
Community Enter the community string for the SNMP read community.
Port Enter the number of the port through which traps will be sent.
Heartbeat Period Enter the interval, in minutes, between each heartbeat trap.
CLLI Enter a Common Language Location Identifier (CLLI). The CLLI is free text
that will be sent with the trap. You can enter up to 100 characters.
Parameter Definition
V3 User Name If the SNMP Trap version selected in SNMP Parameters page is V3, enter
the name of a V3 user defined in the system.
To view or define a V3 user, use the V3 Users page.
Note: Make sure that an identical V3 user is also defined on the manager's
side.
Parameter Definition
Package Name The name of the software package.
Target Device The specific component on which the software runs.
Running Version The software version currently running on the component.
Installed Version The software version currently installed for the component. If the installed
version is not already the running version, it will become the running
version after the next reset takes place.
Downloaded Version The version, if any, that has been downloaded from the server but not yet
installed. Upon installation, this version will become the Installed Version.
Parameter Definition
Reset Type The level of reset required by the component in order for the Installed
Version to become the Active Version. A cold (hard) reset powers down
and powers back up the component. A warm (soft) reset simply reboots the
software or firmware in the component.
3 Unzip the new software package for IP-20 into your shared FTP or SFTP
folder.
4 In the IP-20’s Web EMS, select Platform > Software > Download &
Install. The Download & Install page opens.
Figure 76: Download & Install Page
5 In the File Transfer Protocol field, select the file transfer protocol you
want to use (FTP or SFTP).
6 In the Username field, enter the user name you configured in the FTP
server.
7 In the Password field, enter the password you configured in the FTP
server. If you did not configure a password for your FTP/SFTP user, simply
leave this field blank.
8 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP/SFTP server in the Server IPv4
address field. See Defining the IP Protocol Version for Initiating
Communications.
9 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP/SFTP server in the Server IPv6
Address field. See Defining the IP Protocol Version for Initiating
Communications.
10 In the Path field, enter the directory path from which you are downloading
the files. Enter the path relative to the FTP user's home directory, not the
absolute path. To leave the path blank, enter //.
11 To configure a timed installation, in the Timed installation field, select
Yes. Otherwise, select No. For more information on timed installations, see
Configuring a Timed Installation.
12 Click Apply to save your settings.
13 Click Download. The download begins. You can view the status of the
download in the Download & Install - Status Parameters section of the
Download & Install page. See Table 18.
14 Once the download has been completed, verify that the version you want
to install has been downloaded. You can check the downloaded version for
each component by viewing the Downloaded Version column in the
Versions page. See Viewing Current Software Versions.
Important Note – If upgrading from version 7.9 or earlier:
• Before you proceed to install the software, repeat the download
process even if Download Success is displayed in the Download
status field, until the unit displays the message No new software
modules found.
Parameter Definition
Download status The status of any pending software download. Possible values are:
Ready – The default value, which appears when no download is in
progress.
Verifying download files – The system is verifying the files to be
downloaded.
Download in progress – The download files have been verified, and
the download is in progress.
If an error occurs during the download, an appropriate error message is
displayed in this field.
When the download is complete, one of the following status indications
appears:
Download Success
Download Failure
All components already found in the system
When the system is reset, the Download Status returns to Ready.
Download progress Displays the progress of the current software download.
Install status The status of any pending software installation. Possible values are:
Ready – The default value, which appears when no installation is in
progress.
Verifying installation files – The system is verifying the files to be
installed.
Installation in progress – The installation files have been verified,
and the installation is in progress.
If an error occurs during the installation, an appropriate error message is
displayed in this field.
When the installation is complete, one of the following status indications
appears:
Installation Success
Installation Partial Success
Installation Failure
incomplete-sw-version
When the system is reset, the Installation Status returns to Ready.
Install progress Displays the progress of the current software installation.
2 Select Platform > Software > Timer Parameters. The Timer Parameters
– Software Installation page opens.
Figure 77: Timer Parameters - Software Installation Page
Parameter Definition
File number A number from 1 to 3 that identifies the restore point.
Parameter Definition
Original system type The type of unit from which the backup configuration file was created.
Software version The software version of the unit from which the backup configuration file
was created.
Time of creation The time and date on which the configuration file was created.
Original IP address The IP address of the unit from which the configuration file was created.
System ID The System ID, if any, of the unit from which the configuration file was
created. This is taken from the Name field in the Unit Parameters page.
See Configuring Unit Parameters.
Valid Reserved for future use.
3 In the IP-20 Web EMS, select Platform > Configuration > Configuration
Management. The Configuration Management page opens.
Figure 80: Configuration Management Page
4 In the File transfer protocol field, select the file transfer protocol you
want to use (FTP or SFTP).
5 In the Username field, enter the user name you configured in the FTP
server.
6 In the Password field, enter the password you configured in the FTP
server. If you did not configure a password for your FTP user, simply leave
this field blank.
7 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP server in the Server IP address
field. See Defining the IP Protocol Version for Initiating Communications.
8 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP server in the IPv6 Server
Address field. See Defining the IP Protocol Version for Initiating
Communications.
9 In the Path field, enter the directory path to or from which you are
downloading or uploading the file. Enter the path relative to the FTP user's
home directory, not the absolute path. To leave the path blank, enter //.
10 In the File name field, enter the name of the file you are importing, or the
name you want to give the file you are exporting.
Note: You must add the suffix .zip to the file name. Otherwise, the
file import may fail. You can export the file using any name,
then add the suffix .zip manually.
11 In the File number field, select from three system restore points:
When you import a configuration file, the file is saved to the selected
restore point, and overwrites whichever file was previously held in
that restore point.
When you export a configuration file, the file is exported from the
selected restore point.
When you back up the current configuration, the backup configuration
file is saved to the selected restore point, and overwrites whichever file
was previously held in that restore point.
When you restore a configuration, the configuration file in the selected
restore point is the file that is restored.
Note: The Timed installation field is reserved for future use.
12 Click Apply to save your settings.
2 Click Set to Factory Default. The unit is restored to its factory default
settings. This does not change the unit's IP address or FIPS configuration.
2 Click Reset.
3 A prompt appears asking if you want to proceed with the reset.
Click Yes to initiate the reset.
The unit is reset.
Parameter Definition
Name A name for the unit (optional). This name appears at the top of every Web EMS page.
Description Descriptive information about the unit. This information is used for debugging, and
should include information such as the unit type.
System up time The time since the system was last reinitialized.
Contact person The name of the person to be contacted if and when a problem with the system occurs
(optional).
Location The actual physical location of the node or agent (optional).
Longitude The unit's longitude coordinates.
Latitude The unit's latitude coordinates.
Measurement format The type of measurement you want the system to use: Metric or Imperial.
Unit Temperature The current temperature of the unit.
Voltage input (Volt) The voltage input of the unit.
Parameter Definition
Poll interval Displays the interval used by the NTP client to maintain synchronization with the current
NTP server.
Sync on NTP server Displays the IP address of the remote NTP server on which the NTP client is currently
IP address locked.
Client lock status Indicates if the NTP client is locked on a remote NTP server. Possible values are:
LOCK – The NTP client is locked on the remote server.
LOCAL – The NTP client is locked on the local system clock (free running clock).
N/A – The NTP client is not locked on any clock.
5. Radio Configuration
This section includes:
Viewing the Radio Status and Settings
Configuring the Remote Radio Parameters
Configuring ATPC
Configuring Header De-Duplication and Frame Cut-Through
Configuring AES-256 Payload Encryption
Configuring and Viewing Radio PMs and Statistics
Related topics:
Configuring the Radio Parameters
Configuring the Radio (MRMC) Script(s)
System Configurations
Configuring Multi-Carrier ABC
Configuring XPIC
Configuring HSB Radio Protection
Configuring MIMO and Space Diversity
Operating an IP-20C in Single Radio Carrier Mode
Performing Radio Loopback
2 For IP-20C units, select the carrier in the Radio table (see Figure 86) and
click Edit. A separate Radio Parameters page opens. The page is essentially
identical to the IP-20E and IP-20S page, except for the addition of a Radio
location parameter.
Table 22 lists and describes the parameters in the Radio table of the IP-20C
Radio Parameters page and the Status parameters section of the Radio
Parameters configuration page.
Parameter Description
Type The RF module type.
Parameter Description
XPIC Support Indicates whether the carrier is operating in XPIC mode. For
instructions on configuring XPIC, refer to Configuring XPIC.
Note: Only relevant for IP-20C units.
TX Frequency The configured TX radio frequency. The TX radio frequency is
configured in the Frequency control (Local) section of the Radio
Parameters page. See Configuring the Radio Parameters.
RX Frequency The configured RX radio frequency. The RX radio frequency is
configured in the Frequency control (Local) section of the Radio
Parameters page. See Configuring the Radio Parameters.
Radio Interface operational status Indicates whether the carrier is operational (Up) or not operational
(Down).
Operational TX Level (dBm) The actual TX signal level (TSL) of the carrier (in dBm).
RX Level (dBm) The actual measured RX signal level (RSL) of the carrier (in dBm).
Modem MSE (dB) The MSE (Mean Square Error) of the RX signal, measured in dB. A
value of -99.00 dB means that the modem is not locked.
Modem XPI (dB) The XPI (Cross Polarization Interference) level, measured in dB.
Note: Only relevant for IP-20C units.
Defective Blocks The number of defective radio blocks that have been counted.
TX Mute Status Indicates whether radio transmission is muted.
Adaptive TX power operational status Indicates whether Adaptive TX power is currently operational.
2 For IP-20C units, select the carrier in the Remote Radio table (see
Figure 88) and click Edit. A separate Remote Radio Parameters page
opens. The page is identical to the IP-20E and IP-20S page.
Parameter Definition
Radio Location Read-only. Identifies the carrier.
Remote Radio Location Read-only. Identifies the location of the remote radio.
Local Remote Channel Operational Read-only. The operational status of the active (in a protection
Status configuration) remote channel.
Remote Receiver Signal Level Read-only. The Rx level of the remote radio, in dBm.
Remote Most Severe Alarm Read-only. The level of the most severe alarm currently active on the
remote unit.
Remote Unit Link ID Edit page only. Identifies the link, in order to distinguish it from other links.
Enter a unique identifier from 1 to 65535.
Remote Tx Output Level The remote unit's Tx output level, if the remote unit has been configured to
operate at a fixed Tx level (in dBm).
Parameter Definition
Remote Radio Mute To mute the TX output of the remote radio, select On. To unmute the TX
output of the remote radio, select Off.
Remote IP Address The IPv4 IP address of the remote unit.
Remote IPv6 Address The IPv6 IP address of the remote unit.
2 For IP-20C units, select the carrier you wish to configure in the ATPC table
(see Figure 91) and click Edit. A separate ATPC –Edit page opens. The page
is essentially identical to the IP-20E and IP-20S page.
2 For IP-20C units, select the carrier in the Radio Ethernet and Compression
table (see Figure 93) and click Edit. A separate Radio Ethernet Interface
Configuration page opens. The page is essentially identical to the IP-20E
and IP-20S page.
3 Click Edit. The Radio Ethernet Interface Configuration – Edit page opens.
Figure 94: Radio Ethernet Interface Configuration – Edit Page Per Carrier – IP-20C
4 In the Cut through mode field, select Yes to enable Frame Cut-Through or
No to disable Frame Cut-Through.
5 In the Header Compression mode field, select from the following
options:
Disabled – Header De-Duplication is disabled.
Layer2 – Header De-Duplication operates on the Ethernet level.
MPLS – Header De-Duplication operates on the Ethernet and MPLS
levels.
Layer3 – Header De-Duplication operates on the Ethernet and IP
levels.
Layer4 – Header De-Duplication operates on all supported layers up to
Layer 4.
Tunnel – Header De-Duplication operates on Layer 2, Layer 3, and on
the Tunnel layer for packets carrying GTP or GRE frames.
Tunnel-Layer3 – Header De-Duplication operates on Layer 2, Layer 3,
and on the Tunnel and T-3 layers for packets carrying GTP or GRE
frames.
Tunnel-Layer4 – Header De-Duplication operates on Layer 2, Layer 3,
and on the Tunnel, T-3, and T-4 layers for packets carrying GTP or GRE
frames.
6 Click Apply, then Close
Note: The Utilization threshold field is not applicable.
Figure 96: Radio Ethernet Interface Counters Page – IP-20S and IP-20E
2 For IP-20C units, select the carrier in the Header Compression Counters
table (Figure 95) and click View. A separate Radio Ethernet Interface
Configuration page opens. The page is essentially identical to the IP-20E
and IP-20S page.
Figure 97: Radio Ethernet Interface Counters Page Per Carrier – IP-20C
Table 24 lists and describes the fields in the Radio Ethernet Interface Counters
page.
Parameter Description
Interface Location Identifies the radio interface.
Header Compression Counters
TX bytes before enhanced HC Bytes on the TX side before Header De-Duplication.
TX compressed bytes Bytes on the TX side that were compressed by Header
De-Duplication.
TX frames before enhanced HC Frames on the TX side before Header De-Duplication.
TX frames compressed by enhanced Frames on the TX side that were compressed by Header
HC De-Duplication.
Parameter Description
TX learning frames The number of frames that have been used to learn unique data
flows. Once a particular flow type has been learned, subsequent
frames with that flow type are compressed by Header
De-Duplication.
TX frames not compressed due to Frames on the TX side that were not compressed due to exclusion
excluding rule rules.
Note: The use of exclusion rules for Header De-Duplication is
planned for future release.
TX frames not compressed due to Frames on the TX side that were not compressed for reasons other
other reasons than the use of exclusion rules.
TX number of active flows The number of Header De-Duplication flows that are active on the
TX side.
Number of active flows of user Not supported.
selected flow type
Ethernet Port Counters
Port RX good bytes The number of good bytes received on the port since the last time
the Radio Ethernet Interface counters were cleared.
Port RX good frames The number of good frames received on the port since the last time
the Radio Ethernet Interface counters were cleared.
Port TX total bytes The number of bytes transmitted since the last time the Radio
Ethernet Interface counters were cleared.
Port TX frames The number of frames transmitted since the last time the Radio
Ethernet Interface counters were cleared.
Port TX idle bytes The number of idle bytes transmitted since the last time the Radio
Ethernet Interface counters were cleared.
Cut Through Counters
TX frames The number of frames that have been transmitted via Frame
Cut-Through since the last time the Radio Ethernet Interface
counters were cleared.
2 Select the carrier you want to configure and click Edit. The Payload
Encryption – Edit page opens.
Figure 99: Payload Encryption – Edit Page
You must use the same master key on both sides of the link. This means
that if you generate a master key automatically on one side of the link, you
must copy that key and for use on the other side of the link. Once payload
encryption has been enabled on both sides of the link, the Key Exchange
Protocol periodically verifies that both ends of the link have the same
master key. If a mismatch is detected, an alarm is raised and traffic
transmission is stopped for the mismatched carrier at both sides of the
link. The link becomes non-valid and traffic stops being forwarded.
When you enter a master key, or when the master key is automatically
generated, the key is hidden behind dots. To copy the master key, you
must display the key. To display the master key, click Show Key. A new
Master key field appears, displaying the master key. You can copy the key
to the clipboard from this field.
Figure 100: Payload Encryption – Edit Page with Master Key Displayed
5 In the Session Key Period field, configure a time interval in hours and
minutes (HH:MM). This is the interval at which the session key is
automatically regenerated.
6 When you are finished, click Apply.
Note: Any time payload encryption fails, the Operational status of
the link is Down until payload encryption is successfully
restored.
2 In the Excessive BER admin field, select Enable to enable excessive BER
administration or Disable to disable excessive BER administration.
Excessive BER administration determines whether or not excessive BER is
propagated as a fault and considered a system event. For example, if
excessive BER administration is enabled, excessive BER can trigger a
protection switchover and can cause a synchronization source to go into a
failure status. Excessive BER administration is enabled or disabled for the
entire unit rather than for specific radios.
Ceragon Proprietary and Confidential Page 145 of 597
FibeAir IP-20C/S/E User Guide
3 In the Thresholds table, select the radio for which you want to configure
thresholds.
4 Click Edit. The Radio Thresholds – Edit page opens.
Figure 102: Radio Thresholds – Edit Page
Parameter Definition
Radio Location Identifies the carrier (Slot 2, port 1 or Slot 2, port 2).
Note: Only relevant for IP-20C units.
RX Level Threshold 1 (dBm) Specify the threshold for counting exceeded seconds if the RSL is below
this level.
RX Level Threshold 2 (dBm) Specify a second threshold for counting exceeded seconds if the RSL is
below this level.
TX Level Threshold (dBm) Specify the threshold for counting exceeded seconds if the TSL is below
this level.
MSE PM Threshold (dB) Specify the modem MSE (Mean Square Error) threshold for calculating
MSE Exceed Threshold seconds.
XPI PM Threshold (dB) Specify the modem XPI threshold for calculating XPI Exceed Threshold
seconds.
Excessive BER Threshold Select the level above which an excessive BER alarm is issued for errors
detected over the radio link.
Signal Degrade BER Threshold Select the level above which a Signal Degrade alarm is issued for errors
detected over the radio link.
Related Topics:
Configuring the Radio (MRMC) Script(s)
To display the current modulation and bit rate per radio:
1 Select Radio > MRMC > MRMC Status. The MRMC Status page opens.
Figure 103: MRMC Status Page
Parameter Definition
Radio Location Identifies the carrier (Slot 2, port 1 or Slot 2, port 2).
Note: Only relevant for IP-20C units.
TX profile The current TX profile.
TX QAM The current TX modulation.
TX bit-rate The current TX bit-rate.
RX profile The current RX profile.
RX QAM The current RX modulation.
RX bit-rate The current RX bit-rate.
Related Topics:
Configuring the Radio (MRMC) Script(s)
To display Multi-Rate Multi-Constellation PMs, including information on ACM
profile fluctuations per interval per radio:
1 Select Radio > PM & Statistics > MRMC. The MRMC PM Report page
opens.
Figure 104: MRMC PM Report Page
2 For the IP-20C, In the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 27 describes the MRMC PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the MRMC PM table and
click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min profile Displays the minimum ACM profile that was measured during the interval.
Max profile Displays the maximum ACM profile that was measured during the interval.
Min bitrate Displays the minimum total radio throughput (Mbps) delivered during the
interval.
Max bitrate Displays the maximum total radio throughput (Mbps) delivered during the
interval.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the values
are not reliable due to a possible power surge or power failure that
occurred at that time.
2 For IP-20C units, you can select the carrier in the Radio table (see
Figure 105) and click View to display a page for that carrier. A separate
Counters page opens.
Figure 107: Counters Page Per Carrier – IP-20C
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 28 describes the Signal Level PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the RF PM table and
click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Max TSL (dBm) The maximum TSL (Transmit Signal Level) that was measured during the
interval.
Min TSL (dBm) The minimum TSL (Transmit Signal Level) that was measured during the
interval.
Max RSL (dBm) The maximum RSL (Received Signal Level) that was measured during the
interval.
Min RSL (dBm) The minimum RSL (Received Signal Level) that was measured during the
interval.
TSL exceed threshold seconds The number of seconds the measured TSL exceeded the threshold during
the interval. TSL thresholds are configured in the Radio Thresholds page.
See Configuring Radio Thresholds.
RSL exceed threshold1 seconds The number of seconds the measured RSL exceeded RSL threshold 1
during the interval. RSL thresholds are configured in the Radio Thresholds
page. See Configuring Radio Thresholds.
RSL exceed threshold2 seconds The number of seconds the measured RSL exceeded RSL threshold 2
during the interval. RSL thresholds are configured in the Radio Thresholds
page. See Configuring Radio Thresholds.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 29 describes the Modem BER (Aggregate) PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the Modem BER PM
table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
ES Displays the number of seconds in the measuring interval during which
errors occurred.
SES Displays the number of severe error seconds in the measuring interval.
UAS Displays the Unavailable Seconds value of the measured interval. The value
can be between 0 and 900 seconds (15 minutes).
Parameter Definition
BBE Displays the number of background block errors during the measured
interval.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 30 describes the Modem MSE PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the Modem MSE PM
table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min MSE (dB) Displays the minimum MSE in dB, measured during the interval.
Max MSE (dB) Displays the maximum MSE in dB, measured during the interval.
Exceed threshold seconds Displays the number of seconds the MSE exceeded the MSE PM threshold
during the interval. The MSE PM is configured in the Radio Thresholds
page. See Configuring Radio Thresholds.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Related topics:
Configuring XPIC
To display XPI (Cross Polarization Interface) PMs per radio:
1 Select Radio > PM & Statistics > XPI. The XPI PM report page opens.
Note: The XPI page only appears if XPIC is configured on the unit.
Figure 111: XPI PM Report Page
2 In the Port field, select the port that holds the radio for which you want to
display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 31 describes the XPI PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the Modem XPI PM table
and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min XPI (dB) The minimum XPI level that was measured during the interval.
Max XPI (dB) The maximum XPI level that was measured during the interval.
XPI below threshold seconds The number of seconds the measured XPI level was below the threshold
during the interval. XPI thresholds are configured in the Radio Thresholds
page. See Configuring Radio Thresholds.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
To set the thresholds for capacity and throughput PMs:
1 Select Threshold. The Ethernet Radio Capacity & Throughput Threshold
page opens.
Figure 113: Ethernet Radio Capacity and Throughput Threshold Page
2 Enter the capacity and throughput thresholds you want, in Mbps. The
range of values is 0 to 4294967295. The default value for is 1000.
3 Click Apply, then Close.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak capacity (Mbps) Displays the highest L1 bandwidth, in Mbps, sent through the selected radio
during the measured time interval.
Average capacity (Mbps) Displays the average L1 bandwidth, in Mbps, during the measured time
interval.
Seconds exceeding Threshold Displays the number of seconds during the measured time interval during
which the L1 bandwidth exceeded the configured capacity threshold.
Peak throughput (Mbps) Displays the highest throughput, in Mbps, that occurred for the selected
radio during the measured time interval.
Average throughput (Mbps) Displays the average throughput, in Mbps, for the selected radio during the
measured time interval.
Seconds exceeding Threshold Displays the number of seconds during the measured time interval during
which the throughput exceeded the configured throughput threshold.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
To set the thresholds for utilization PMs:
1 Select Threshold. The Utilization Threshold page opens.
2 Enter the utilization threshold you want, in % (1-100). The default value
for is 100.
3 Click Apply, then Close.
Table 33 describes the capacity and throughput PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the PM table and click
View.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak utilization (%) Indicates the highest utilization of the radio capacity that occurred for the
selected radio or group during the measured time interval.
Average utilization (%) Indicates the average utilization of the radio capacity for the selected radio
or group during the measured time interval.
Seconds exceeding Threshold Displays the number of seconds during the measured time interval during
which the L1 bandwidth exceeded the configured utilization threshold.
Integrity Indicates whether the values received at time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
2 For the IP-20C, in the Port field, select the port that holds the radio for
which you want to display PMs.
3 In the Interval Type field:
To display reports in 15-minute intervals, select 15 minutes.
To display reports in daily intervals, select 24 hours.
Table 34 describes the capacity and throughput PMs.
Note: To display the same parameters for a specific interval in a
separate page, select the interval in the PM table and click
View.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
FER Displays the frame error rate (%) during the measured time interval.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Related topics:
Configuring Link Aggregation (LAG)
Quality of Service (QoS)
Ethernet Protocols
Performing Ethernet Loopback
Parameter Definition
Services ID A unique ID for the service.
Service Type The service type:
MP – Multipoint
P2P – Point-to-Point
MNG – Management
Service sub type Indicates the type of service (Ethernet).
EVC ID The Ethernet Virtual Connection (EVC) ID. This parameter does not affect
the network element’s behavior, but is used by the NMS for topology
management.
EVC description The Ethernet Virtual Connection (EVC) description. This parameter does not
affect the network element’s behavior, but is used by the NMS for topology
management.
Admin Indicates whether the service is enabled (Operational) or disabled
(Reserved). You can configure services for later use by defining the service
as Reserved. In Reserved mode, the service occupies system resources
but is unable to transmit and receive data.
3 In the Service ID field, select a unique ID for the service. You can choose
any unused value from 1 to 1024. Once you have added the service, you
cannot change the Service ID. Service ID 1025 is reserved for a pre-defined
management service.
4 In the Service Type field, select the service type:
MP – Multipoint
MNG – Management
P2P – Point-to-Point
5 Optionally, in the EVC ID field, enter an Ethernet Virtual Connection (EVC)
ID (up to 20 characters). This parameter does not affect the network
element’s behavior, but is used by the NMS for topology management.
6 Optionally, in the EVC Description field, enter a text description of the
service (up to 64 characters). This parameter does not affect the network
element’s behavior, but is used by the NMS for topology management.
7 In the Admin field, select one of the following options:
Operational - The service is functional.
Reserved - The service is disabled until this parameter is changed to
Operational. In this mode, the service occupies system resources but
is unable to receive and transmit data.
8 In the MAC table size field, enter the maximum MAC address table size for
the service. The MAC address table is a source MAC address learning table
used to forward frames from one service point to another. You can select a
value from 16 to 131,072, in multiples of 16. This maximum only applies to
dynamic, not static, MAC address table entries.
Note: Additional configuration of the MAC address table can be
performed via the CLI. See Defining the MAC Address
Forwarding Table for a Service.
Ceragon Proprietary and Confidential Page 167 of 597
FibeAir IP-20C/S/E User Guide
9 In the Default CoS field, enter a default Class of Service (CoS) value (0-7).
This value is assigned to frames at the service level if CoS Mode is set to
Default-CoS. Otherwise, this value is not used, and frames retain whatever
CoS value they were assigned at the service point or logical interface level.
10 In the CoS Mode field, select one of the following options. This parameter
determines whether or not frames passing through the service have their
CoS modified at the service level. The CoS determines the priority queue to
which frames are assigned.
Default CoS – Frames passing through the service are assigned the
default CoS defined above. This CoS value overrides whatever CoS may
have been assigned at the service point or interface level.
Preserve-SP-COS-Decision – The CoS of frames passing through the
service is not modified by the service's default CoS.
11 Click Apply, then Close to close the Ethernet Services - Add page.
12 Add service points. You must add service points to the service in order for
the service to carry traffic. See Configuring Service Points.
You can choose to display the following sets of attributes by selecting the
appropriate button above the SP Attributes table:
General – See Ethernet Service Points – General SP Attributes Table
Ingress – See Ethernet Service Points – Ingress Attributes
Egress – See Ethernet Service Points – Egress Attributes
To return to the Ethernet Services page at any time, click Back to Services
table at the top of the Ethernet Service Points page.
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint services, the
range of values is 1-32. For Management services, the range of values is 1-30.
When adding a service point, you can select a service point ID from the available
options in the Service point ID drop-down list in the Ethernet Service Points – Add
page. Once you have added the service point, you cannot change the service point
ID.
Service point name A descriptive name for the service point (optional). The Service Point Name can be
up to 20 characters.
Service point type The service point type. Options are:
SAP – Service Access Point.
SNP – Service Network Point.
MNG – Management service point.
PIPE – Pipe service point.
The following rules apply to the mixing of different types of service points on a single
logical interface:
You cannot configure both SAPs and SNPs on the same logical interface.
You can configure both SAPs or SNPs on the same logical interface as a MNG
service point.
If you configure a Pipe service point on an interface, you cannot configure an
SAP, SNP, or another Pipe service point on the same interface. You can,
however, configure an MNG service point on the same interface.
You cannot configure more than one MNG service point on a single logical
interface.
Once you have added the service point, you cannot change this parameter.
Interface location The physical or logical interface on which the service point is located. Once you have
added the service point, you cannot change this parameter.
Attached interface type The encapsulation type (Ethertype) for frames entering the service point. Once you
have added the service point, you cannot change this parameter.
The Attached Interface Type determines which frames enter the service via this
service point, based on the frame’s VLAN tagging. Since more than one service point
may be associated with a single interface, frames are assigned to the earliest defined
service point in case of conflict.
For a list of available Attached Interface Types, the types of frames to which each
one applies, and the service point types for which each one is available, see
Table 37.
Parameter Definition
C-Vlan encapsulation The C-VLAN classified into the service point. Options are 1-4094, Untagged, or N.A.
(Not Applicable). Once you have added the service point, you cannot change this
parameter.
If you selected Bundle-C in the Attached Interface Type field, select Untagged or
N.A. You can then add multiple C-VLANs via the Attach VLAN option. See Attaching
VLANs.
S-Vlan encapsulation The S-VLAN classified into the service point. Options are 1-4094, Untagged, or N.A.
(Not Applicable). Once you have added the service point, you cannot change this
parameter.
If you selected Bundle-S in the Attached Interface Type field, select the S-VLAN
value to classify into the service point (1-4094), or select Untagged. You can then
add multiple C-VLANs via the Attach VLAN option. See Attaching VLANs.
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint services, the
range of values is 1-32. For Management services, the range of values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point Name can be
up to 20 characters.
Service point type The service point type. Options are:
SAP – Service Access Point.
SNP – Service Network Point.
MNG – Management service point.
PIPE – Pipe service point.
Learning admin Determines whether MAC address learning for incoming frames is enabled (Enable)
or disabled (Disable). When enabled, the service point learns the source MAC
addresses of incoming frames and adds them to a MAC address forwarding table.
Allow flooding Determines whether incoming frames with unknown MAC addresses are forwarded
to other service points via flooding. Select Allow to allow flooding or Disable to
disable flooding.
Allow broadcast Indicates whether frames with a broadcast destination MAC address are allowed to
ingress the service via this service point. Select Allow to allow broadcast or Disable
to disable broadcast.
Parameter Definition
CoS Mode Indicates how the service point handles the CoS of frames that pass through the
service point. Options are:
sp-def-cos – The service point re-defines the CoS of frames that pass through
the service point, according to the Default CoS (below). This decision can be
overwritten on the service level.
Interface-Decision – The service point preserves the CoS decision made at the
interface level. The decision can still be overwritten at the service level.
PCL – Reserved for future use.
TCAM – Reserved for future use.
Default CoS The default CoS. If the CoS Mode is sp-def-cos, this is the CoS assigned to frames
that pass through the service point. This decision can be overwritten at the service
level. Possible values are 0 to 7.
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint services, the
range of values is 1-32. For Management services, the range of values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point Name can be
up to 20 characters.
Service point type The service point type. Options are:
SAP – Service Access Point.
SNP – Service Network Point.
MNG – Management service point.
PIPE – Pipe service point.
Parameter Definition
C-Vlan CoS preservation Determines whether the original C-VLAN CoS value is preserved or restored for
frames egressing from the service point.
If C-VLAN CoS preservation is enabled, the C-VLAN CoS value of frames
egressing the service point is the same as the value when the frame entered the
service.
If C-VLAN CoS preservation is disabled, the C-VLAN CoS value of frames
egressing the service point is set at whatever value might have been
re-assigned by the interface, service point, or service, or whatever value results
from marking (see Marking admin, below).
C-Vlan preservation Determines whether the original C-VLAN ID is preserved or restored for frames
egressing from the service point.
If C-VLAN preservation is enabled, the C-VLAN ID of frames egressing the
service point is the same as the C-VLAN ID when the frame entered the service.
If C-VLAN preservation is disabled, the C-VLAN ID of frames egressing the
service point is set at whatever value might have been re-assigned by the
interface, service point, or service, or whatever value results from marking (see
Marking admin, below).
S-Vlan CoS preservation Determines whether the original S-VLAN CoS value is preserved or restored for
frames egressing from the service point.
If S-VLAN CoS preservation is enabled, the S-VLAN CoS value of frames
egressing the service point is the same as the value when the frame entered the
service.
If S-VLAN CoS preservation is disabled, the C-VLAN CoS value of frames
egressing the service point is set at whatever value might have been
re-assigned by the interface, service point, or service, or whatever value results
from marking (see Marking admin, below).
S-Vlan preservation Read-only. Indicates whether the original S-VLAN ID is preserved or restored for
frames egressing from the service point.
If S-VLAN preservation is enabled, the S-VLAN ID of frames egressing the
service point is the same as the S-VLAN ID when the frame entered the service.
If S-VLAN preservation is disabled, the S-VLAN ID of frames egressing the
service point is set at whatever value might have been re-assigned by the
interface, service point, or service, or whatever value results from marking (see
Marking admin, below).
Parameter Definition
Marking admin Determines whether re-marking of the outer VLAN (C-VLAN or S-VLAN) of tagged
frames that pass through the service point is enabled.
If Marking admin is set to Enable, and CoS preservation for the relevant outer
VLAN is set to Disable, the SAP re-marks the C-VLAN or S-VLAN 802.1p UP
bits of egress frames according to the calculated CoS and Color, and the
user-configurable 802.1Q and 802.1AD marking tables. You can configure these
tables by selecting Ethernet > QoS > Marking from the menu on the left side of
the Web EMS.
If Marking admin and CoS preservation for the relevant outer VLAN are both
set to Enable, re-marking is not performed.
If Marking admin and CoS preservation for the relevant outer VLAN are both
set to Disable, re-marking is applied, but only according to the values defined
for Green frames in the 802.1Q and 802.1AD marking tables.
Service Bundle ID This can be used to assign one of the available service bundles from the H-QoS
hierarchy queues to the service point. This enables you to personalize the QoS
egress path. Permitted values are 1-63.
6 Configure the service point attributes, as described in Table 36, Table 38,
and Table 39.
Note: Optionally, you can select from a list of pre-defined service
point options in the Pre defined options field at the top of
the Ethernet Service Points - Add page. The system
automatically populates the remaining service point
parameters according to the system-defined parameters.
However, you can manually change these parameter values.
The pre-defined options are customized to the type of
service to which you are adding the service point.
7 Click Apply, then Close.
Parameter Definition
Interface Location Read-only. The physical or logical interface on which the service point is located.
Service ID Read-only. The ID of the service to which the service point belongs.
Service Point ID Read-only. The ID of the service point.
C-Vlan Encapsulation Select the C-VLAN you want to add to the service point.
S-Vlan Encapsulation Read-only.
If the Attached Interface Type for the service point is Bundle-S, this field displays
the S-VLAN encapsulation selected when the service point was created.
If the Attached Interface Type for the service point is Bundle-C, this field is
inactive.
CoS Overwrite Valid If you want to assign a specific CoS and Color to frames with the C-VLAN or S-VLAN
defined in the C-VLAN Encapsulation field, select true. This CoS and Color values
defined below override the CoS and Color decisions made at the interface level.
However, if the service point or service are configured to apply their own CoS and
Color decisions, those decisions override the decision made here.
Parameter Definition
CoS Value If CoS Overwrite Valid is set to true, the CoS value defined in this field is applied to
frames with the C-VLAN defined in the C-VLAN Encapsulation field. This CoS
overrides the CoS decision made at the interface level. However, if the service point
or service are configured to apply their own CoS, that decision overrides the decision
made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
Color If CoS Overwrite Valid is set to true, the Color value defined in this field is applied
to frames with the C-VLAN defined in the C-VLAN Encapsulation field. This Color
overrides the Color decision made at the interface level. However, if the service point
or service are configured to apply their own Color, that decision overrides the
decision made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
To edit a VLAN Classification table entry, select the entry in the VLAN
Classification table and click Edit. You can edit all the fields that can be
configured in the Attached VLAN List – Add page, except the C-VLAN
Encapsulation field.
To delete a VLAN Classification table entry, select the entry in the VLAN
Classification table and click Delete.
2 In the MRU field, enter the global size (in bytes) of the Maximum Receive
Unit (MRU). Permitted values are 64 to 9612. The default value is 2000.
Frames that are larger than the global MRU will be discarded.
3 In the S VLAN Ether type field, select the S-VLAN Ethertype. This defines
the ethertype recognized by the system as the S-VLAN ethertype. Options
are: 0x8100, 0x88A8, 0x9100, and 0x9200. The default value is 0x88A8.
Note: The C-VLAN Ethertype is set at 0x8100 and cannot be
modified.
4 Click Apply.
2 Select the interface you want to configure and click Edit. The Physical
Interfaces - Edit page opens.
Figure 128: Physical Interfaces - Edit Page
Parameter Definition
Interface location The location of the interface.
Operational Status Indicates whether the interface is currently operational (Up) or non-operational (Down).
Admin Status Indicates whether the interface is currently enabled (Up) or disabled (Down). You can
enable or disable an interface from the Interface Manager page. See Enabling the
Interfaces (Interface Manager).
Media Type The physical interface layer 1 media type.
Actual port speed Displays the actual speed of the interface for the link as agreed by the two sides of the
link after the auto negotiation process.
Actual port duplex Displays the actual duplex status of the interface for the link as agreed by the two sides
of the link after the auto negotiation process.
3 In the Controlled Ethernet interface field, select the interface that will be
disabled upon failure of the Monitored Radio Interface, defined below.
4 In the Monitored Radio interface field, select the Monitored Radio
Interface. The Controlled Ethernet Interface, defined above, is disabled
upon a failure indication on the Monitored Radio Interface.
5 In the Auto state propagation admin field, select Enable to enable
Automatic State Propagation on the interface pair, or Disable to disable
Automatic State Propagation on the pair.
6 Optionally, in the Auto state propagation trigger by remote fault field,
select Enable if you want to configure the system to disable the Controlled
Ethernet Interface upon a radio failure at the remote side of the link from
the Monitored Radio Interface.
7 Optionally, in the Auto state propagation CSF mode admin field, select
Enable or Disable to enable or disable Client Signal Failure (CSF) mode. In
CSF mode, the ASP mechanism does not physically shut down the
Controlled Interface when ASP is triggered. Instead, the ASP mechanism
sends a failure indication message (a CSF message). The CSF message is
used to propagate the failure indication to external equipment.
To edit an Automatic State Propagation interface pair:
1 Select the interface pair in the Automatic state propagation configuration
table.
2 Click Edit. The Automatic State Propagation – Edit page opens. The Edit
page is similar to the Add page (Figure 130), but the Controlled Ethernet
Interface and Monitored Radio Interface parameters are read-only.
To delete an Automatic State Propagation interface pair:
1 Select the interface pair in the Automatic state propagation configuration
table.
2 Click Delete. The interface pair is removed from the Automatic state
propagation configuration table.
To delete multiple interface pairs:
1 Select the interface pairs in the Automatic state propagation configuration
table or select all the interfaces by selecting the check box in the top row.
Ceragon Proprietary and Confidential Page 187 of 597
FibeAir IP-20C/S/E User Guide
2 Click Delete. The interface pairs are removed from the Automatic state
propagation configuration table.
To clear the statistics, click Clear All at the bottom of the page.
To refresh the statistics, click Refresh at the bottom of the page.
Each column in the RMON page displays RMON statistics for one of the unit’s
interfaces. To hide or display columns:
1 In the header row, select the arrow next to any of the columns.
2 Select Columns.
3 Mark the interfaces you want to display and clear the interfaces you do not
want to display.
Figure 132: RMON Page – Hiding and Displaying Columns
2 In the Interface field, select the interface for which you want to display
PMs.
3 In the Interval Type field:
To display reports for the past 24 hours, in 15 minute intervals, select
15 minutes.
To display reports for the past month, in daily intervals, select 24
hours.
Table 42 describes the Ethernet TX port PMs.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute intervals,
displays the date and ending time of the interval.
Peak... Average... bytes... Various peak transmission rates (in seconds) and average transmission rates (in
Packets... seconds), both in bytes and in packets, for each measured time interval.
TX bytes Layer 1 exceed The number of seconds the TX bytes exceeded the specified threshold during the
threshold (sec) interval. For instructions on setting the threshold, see Setting the Ethernet Port TX
Threshold.
Invalid data flag Indicates whether the values received during the measured interval are valid. An x
in the column indicates that the values are not valid (for example, because of a
power surge or power failure that occurred during the interval).
2 In the Interface field, select the interface for which you want to display
PMs.
3 In the Interval Type field:
To display reports for the past 24 hours, in 15 minute intervals, select
15 minutes.
To display reports for the past month, in daily intervals, select 24
hours.
Table 43 describes the Ethernet RX port PMs.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute intervals,
displays the date and ending time of the interval.
Peak... Average... bytes... Various peak transmission rates (in seconds) and average RX rates (in seconds),
Packets... both in bytes and in packets, for each measured time interval.
RX bytes Layer 1 exceed The number of seconds the RX bytes exceeded the specified threshold during the
threshold (sec) interval. For instructions on setting the threshold, see Setting the Ethernet Port RX
Threshold.
Invalid data flag Indicates whether the values received during the measured interval are valid. An x
in the column indicates that the values are not valid (for example, because of a
power surge or power failure that occurred during the interval).
Egress
Ingress
Marker
Rate Limit (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
Egress
Ingress CET/Pipe Marker
Rate Limit Services (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
IP-20 performs the classification on each frame ingressing the system via the
logical interface. Classification is performed step by step from the highest
priority to the lowest priority classification method. Once a match is found, the
classifier determines the CoS and Color decision for the frame for the logical
interface-level.
For example, if the frame is an untagged IP Ethernet frame, a match will not be
found until the third priority level (DSCP). The CoS and Color values defined
for the frame’s DSCP value will be applied to the frame.
You can disable some of these classification methods by configuring them as
un-trusted. For example, if 802.1p classification is configured as un-trusted for
a specific interface, the classification mechanism does not perform
classification by UP bits. This is useful, for example, if classification is based on
DSCP priority bits.
If no match is found at the logical interface level, the default CoS is applied to
incoming frames at this level. In this case, the Color of the frame is assumed to
be Green.
2 Select the interface you want to configure and click Edit. The Logical
Interfaces - Edit page opens.
Figure 141: Logical Interfaces - Edit Page
Parameter Definition
Trust VLAN UP bits Select the interface's trust mode for user priority (UP) bits:
Trust – The interface performs QoS and color classification according to UP and
CFI/DEI bits according to user-configurable tables for 802.1q UP bits (C-VLAN
frames) or 802.1AD UP bits (S-VLAN frames). VLAN UP bit classification has
priority over DSCP and MPLS classification, so that if a match is found with the UP
bit of the ingressing frame, DSCP values and MPLS bits are not considered.
Un-Trust – The interface does not consider 802.1 UP bits during classification.
Trust DSCP Select the interface's trust mode for DSCP:
Trust – The interface performs QoS and color classification according to a
user-configurable table for DSCP to CoS and color classification. DSCP
classification has priority over MPLS classification, so that if a match is found with
the DSCP value of the ingressing frame, MPLS bits are not considered.
Un-Trust – The interface does not consider DSCP during classification.
Trust MPLS Select the interface's trust mode for MPLS bits:
Trust – The interface performs QoS and color classification according to a
user-configurable table for MPLS EXP to CoS and color classification.
Un-Trust – The interface does not consider MPLS bits during classification.
Default port CoS Select the default CoS value for frames passing through the interface (0 to 7). This value
can be overwritten on the service point and service level.
2 Select the row you want to modify and click Edit. The 802.1Q
Classification – Edit page opens.
Figure 143: 802.1Q Classification - Edit Page
7.2.4 Modifying the S-VLAN 802.1 UP and DEI Bit Classification Table
To modify the classification criteria for 802.1AD User Priority (UP) bits:
1 Select Ethernet > QoS > Classification > 802.1AD. The 802.1AD
Classification page opens.
Figure 144: 802.1AD Classification Page
2 Select the row you want to modify and click Edit. The 802.1AD
Classification - Edit page opens.
Figure 145: 802.1Q Classification - Edit Page
2 Select the row you want to modify and click Edit. The DSCP Classification -
Edit page opens.
Figure 147: DSCP Classification - Edit Page
2 Select the row you want to modify and click Edit. The MPLS Classification -
Edit page opens.
Figure 149: MPLS Classification - Edit Page
Parameter Definition
Profile ID A unique ID for the policer profile. You can choose any unused value from 1 to 250.
Once you have added the profile, you cannot change the Profile ID.
Description A description of the policer profile.
Policer type Read-only. The type of policer. Always set to MEF-TRTCM.
CIR Enter the Committed Information Rate (CIR) for the policer, in bits per second. Permitted
values are 0, or 64,000 through 1,000,000,000 bps. If the value is 0, all incoming CIR
traffic is dropped.
CBS Enter the Committed Burst Rate (CBR) for the policer, in Kbytes. Permitted values are 2
through 128 Kbytes.
EIR Enter the Excess Information Rate (EIR) for the policer, in bits per second. Permitted
values are 0, or 64,000 through 1,000,000,000 bps. If the value is 0, all incoming EIR
traffic is dropped.
EBS Enter the Excess Burst Rate (EBR) for the policer, in Kbytes. Permitted values are 2
through 128 Kbytes.
Parameter Definition
Color mode Select how the policer treats packets that ingress with a CFI or DEI field set to 1 (yellow).
Options are:
Color Aware – All packets that ingress with a CFI/DEI field set to 1 (yellow) are
treated as EIR packets, even if credits remain in the CIR bucket.
Color Blind – All ingress packets are treated as green regardless of their CFI/DEI
value. A color-blind policer discards any former color decisions.
Coupling flag Select Enable or Disable. When enabled, frames that ingress as yellow may be
converted to green when there are no available yellow credits in the EIR bucket.
Coupling Flag is only relevant in Color Aware mode.
For a logical interface, you can assign policers to the following traffic flows:
Unicast Policer
Multicast Policer
Broadcast Policer
Ethertype Policers
4 In the Policer profile field, select a profile from the policer profiles
defined in the system. The Policer profile drop-down list includes the ID
and description of all defined profiles.
5 In the Multicast admin field, select Enable to enable policing on multicast
traffic flows from the logical interface, or Disable to disable policing on
multicast traffic flows from the logical interface.
6 Click Apply.
4 In the Policer profile field, select a profile from the policer profiles
defined in the system. The Policer profile drop-down list includes the ID
and description of all defined profiles.
5 In the Broadcast admin field, select Enable to enable policing on
broadcast traffic flows from the logical interface, or Disable to disable
policing on broadcast traffic flows from the logical interface.
6 Click Apply.
4 In the Ethertype 1 profile field, select a profile from the policer profiles
defined in the system. The Ethertype 1 profile drop-down list includes
the ID and description of all defined profiles.
5 In the Ethertype 1 user value field, enter the Ethertype value to which
you want to apply this policer. The field length is 4 nibbles (for example,
0x0806 - ARP).
6 In the Ethertype 1 admin field, select Enable to enable policing on the
logical interface for the specified ethertype, or Disable to disable policing
on the logical interface for the specified ethertype.
7 Click Apply.
8 To assign policers to additional Ethertypes, select Ethertype type 2
Policer and Ethertype type 3 Policer and repeat the steps above.
2 Select the row you want to modify and click Edit. The 802.1Q Marking -
Edit page opens.
Figure 157: 802.1Q Marking - Edit Page
2 Select the row you want to modify and click Edit. The 802.1AD Marking -
Edit page opens.
Figure 159: 802.1AD Marking - Edit Page
2 Click ADD. The WRED Profile - Add page opens, with default values
displayed.
Figure 161: WRED Profile - Add Page
5 In the Profile ID field, select the WRED profile you want to assign to the
selected queue.
6 Click Apply, then Close.
2 Click Add. The Queue Shaper – Add page opens, with default values
displayed.
Figure 165: Queue Shaper Profile – Add Page
2 Click Add. The Service Bundle Shaper Profile – Add page opens, with
default values displayed.
Figure 167: Service Bundle Shaper Profile – Add Page
3 Click Add. The Egress Queue Shaper Configuration – Add page opens.
Figure 169: Logical Interfaces – Egress Queue Shaper Configuration – Add Page
4 Click Add. The Egress Service Bundle Shaper Configuration – Add page
opens.
Figure 171: Logical Interfaces – Egress Service Bundle Shaper Configuration – Add
Page
2 Click Add. The Scheduler Priority Profile – Add page opens, with default
values displayed.
Figure 173: Scheduler Priority Profile – Add Page
2 Click Add. The Scheduler WFQ Profile – Add page opens, with default
values displayed.
Figure 175: Scheduler WFQ Profile – Add Page
3 Select Egress Port Scheduling WFQ. The Egress Port Scheduling WFQ
Configuration – Edit page opens.
Figure 177: Logical Interfaces – Scheduler – Egress Port Scheduling WFQ
8. Ethernet Protocols
This section includes:
Configuring Adaptive Bandwidth Notification (ABN)
Configuring LLDP
Related Topics:
Configuring Service OAM (SOAM) Fault Management (FM)
2 Click Add underneath the ABN Configuration and Status table. The ABN
Configuration and Status – Add page opens.
Figure 179: ABN Configuration and Status – Add Page
Parameter Definition
Nominal BW The nominal bandwidth of the link.
Current BW The weighted average of the bandwidth readings taken during the last Monitoring
Interval.
Version The ABN version used.
Parameter Definition
Name The name of the ABN entity.
Tx Messages The number of bandwidth messages transmitted since the counter was last reset.
Counter
Holdoff State The Holdoff state of the monitored link. Options are:
Off – Holdoff time measurement has not been started.
Counting – Holdoff time measurement has started but the timeout has not elapsed
yet.
On – Holdoff measurement time has ended and the current bandwidth is still below
the nominal value.
Holdoff Start Time The Holdoff start time for the last event.
(mSec)
Last Tx message The last transmitted bandwidth message, in hexadecimal notation.
Parameter Definition
Local Interface Location The location of the local interface.
Management Address The octet string used to identify the management address component associated
with the remote system.
Address Sub Type The type of management address identifier encoding used in the associated
LLDP Agent Remote Management Address.
Time Mark The time the entry was created.
Parameter Definition
Max TX Credit Displays the maximum number of consecutive LLDPDUs that can be
transmitted at any one time. In this release, the Max TX Credit is set at 5.
Fast TX Interval (Seconds) Displays, in seconds, the interval at which LLDP frames are transmitted
during fast transmission periods, such as when the unit detects a new peer.
In this release, the Fast TX Interval is set at 1.
Fast TX The initial value used to initialize the variable which determines the number
of transmissions that are made during fast transmission periods. In this
release, the Fast TX No. is set at 4.
Reinit Delay (Seconds) Defines the minimum time, in seconds, the system waits after the LLDP
Admin status becomes Disabled until it will process a request to reinitialize
LLDP. For instructions on disabling or enabling LLDP on a port, see
Configuring the LLDP Port Parameters.
In this release, the Reinit Delay is set at 2.
Parameter Definition
TX Interval (Seconds) Defines the interval, in seconds, at which LLDP frames are transmitted. You
can select a value from 5 to 32768. The default value is 30.
Notification Interval (Seconds) Defines the interval, in seconds, between transmission of LLDP notifications
during normal transmission periods. You can select a value from 5 to 3600.
The default value is 10.
Hold Multiplier Defines the time-to-live (TTL) multiplier. The TTL determines the length of
time LLDP frames are retained by the receiving device. The TTL is
determined by multiplying the TX Interval by the Hold Multiplier.
You can select a value from 2 to 10. The default value is 4.
2 Select an interface and click Edit. The LLDP Port Configuration - Edit page
opens.
Figure 184: LLDP Port Configuration - Edit Page
3 In the Admin field, select from the following options to define how the
LLDP protocol operates for this port:
TX Only – LLDP agent transmits LLDP frames on this port but does not
update information about its peer.
RX Only – LLDP agent receives but does not transmit LLDP frames on
this port.
TX and RX – LLDP agent transmits and receives LLDP frames on this
port (default value).
Disabled – LLDP agent does not transmit or receive LLDP frames on
this port.
4 In the Notification Enable field, select from the following options to
define, on a per agent basis, whether or not notifications from the agent to
the NMS are enabled:
True – The agent sends a Topology Change trap to the NMS whenever
the system information received from the peer changes.
False – Notifications to the NMS are disabled (default value).
5 Click Apply, then Close.
Table 51 lists and describes the status parameters in the LLDP Port
Configuration page.
Parameter Definition
Interface Location Identifies the port.
Destination Address The destination address of the LLDP agent associated with this port.
TLV TX Indicates which of the unit's capabilities is transmitted by the LLDP agent for the
port:
PortDesc – The LLDP agent transmits Port Description TLVs.
SysName – The LLDP agent transmits System Name TLVs.
SysDesc – The LLDP agent transmits System Description TLVs.
SysCap – The LLDP agent transmits System Capabilities TLVs.
To displays the MAC address associated with the unit for purposes of LLDP
transmissions:
1 Select Ethernet > Protocols > LLDP > Advanced > Configuration >
Management TLV. The LLDP Management TLV Configuration page opens.
Figure 186: LLDP Management TLV Configuration Page
Table 52 lists and describes the status parameters in the LLDP Management
TLV Configuration page.
Parameter Definition
Interface Location Identifies the port.
Destination Address Defines the MAC address associated with the port for purposes of LLDP
transmissions.
Management Address The unit's IP address.
Address Subtype Defines the type of the management address identifier encoding used for
the Management Address.
Tx Enable Indicates whether the unit's Management Address is transmitted with
LLDPDUs. In this release, the Management Address is always sent.
Parameter Definition
Local Interface Location The location of the local interface.
Parameter Definition
Management Address The octet string used to identify the management address component associated
with the remote system.
Address Sub Type The type of management address identifier encoding used in the associated
LLDP Agent Remote Management Address.
Destination Address The peer LLDP agent's destination MAC Address.
Remote ID An arbitrary local integer value used by this agent to identify a particular
connection instance, unique only for the indicated remote system.
Time Mark The time the entry was created.
To display unit parameter information received via LLDP from the unit's
nearest neighbor (peer):
1 Select Ethernet > Protocols > LLDP > Advanced > Remote System >
Remote Table. The LLDP Remote System Table page opens.
Figure 188: LLDP Remote System Table Page
Table 54 describes the parameters in the LLDP Remote System Table page.
These parameters are read-only.
Parameter Definition
Local Interface Location The location of the local interface.
Remote ID An arbitrary local integer value used by this agent to identify a particular
connection instance, unique only for the indicated peer.
Parameter Definition
Remote Chassis ID An octet string used to identify the peer's hardware unit.
Chassis ID Subtype The type of encoding used to identify the peer's hardware unit.
Remote Port An octet string used to identify the port component associated with the remote
system.
Port Sub type The type of port identifier encoding used in the peer's Port ID.
Time Mark The time the entry was created.
Table 55 describes the parameters in the LLDP Local System Parameters page.
These parameters are read-only.
Parameter Definition
System Name The system name included in TLVs transmitted by the LLDP agent, as defined in
the Name field of the Unit Parameters page. See Configuring Unit Parameters.
System Description The system description included in TLVs transmitted by the LLDP agent, as
defined in the Description field of the Unit Parameters page. See Configuring
Unit Parameters.
Chassis ID The MAC Address of the local unit.
Chassis ID SubType The type of encoding used to identify the local unit. In this release, this parameter
is always set to MAC Address.
Capabilities Supported A bitmap value used to identify which system capabilities are supported on the
local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Capabilities Enabled A bitmap value used to identify which system capabilities are enabled on the
local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Table 56 describes the parameters in the LLDP Local System Port page. These
parameters are read-only.
Parameter Definition
Interface Location Identifies the port.
Port ID The port's MAC address.
Port Sub Type The type of encoding used to identify the port in LLDP transmissions. In this
release, this parameter is always set to MAC Address.
Port Description A description of the port.
Parameter Definition
Management Address The local unit's IP address.
Address Sub Type The format of the local unit's IP Address.
Address Length Reserved for future use.
Address Interface ID Reserved for future use.
Address Interface Sub Type Reserved for future use.
Address OID Reserved for future use.
Parameter Definition
Last Change Time The time of the most recent change in the remote unit, as reported via LLDP.
Inserts The number of times the information from the remote system has changed.
Deletes The number of times the information from the remote system has been deleted.
Drops Reserved for future use.
Ageouts The number of times the information from the remote system has been deleted
from the local unit's database because the information's TTL has expired.
The RX Ageouts counter in the Port RX page is similar to this counter, but is for
specific ports rather than the entire unit.
Parameter Definition
Interface Location The index value used to identify the port in LLDP transmissions.
Destination Address The LLDP MAC address associated with this entry.
Total Frames The number of LLDP frames transmitted by the LLDP agent on this port to the
destination MAC address.
Errored Length Frames The number of LLDPDU Length Errors recorded for this port and destination
MAC address.
If the set of TLVs that is selected in the LLDP local system MIB by network
management would result in an LLDPDU that violates LLDPDU length
restrictions, then the No. of Length Error statistic is incremented by 1, and an
LLDPDU is sent containing the mandatory TLVs plus as many of the optional
TLVs in the set as will fit in the remaining LLDPDU length.
Parameter Definition
Interface Location The index value used to identify the port in LLDP transmissions.
Parameter Definition
Destination Address The LLDP MAC address associated with this entry.
Total Discarded The number of LLDP frames received by the LLDP agent on this port, and then
discarded for any reason. This counter can provide an indication that LLDP
header formatting problems may exist with the local LLDP agent in the sending
system or that LLDPDU validation problems may exist with the local LLDP agent
in the receiving system.
Invalid Frames The number of invalid LLDP frames received by the LLDP agent on this port
while the agent is enabled.
Valid Frames The number of valid LLDP frames received by the LLDP agent on this port.
Discarded TLVs The number of LLDP TLVs discarded for any reason by the LLDP agent on this
port.
Unrecognized TLVs The number of LLDP TLVs received on the given port that are not recognized by
LLDP agent.
Ageouts The number of age-outs that occurred on the port. An age-out is the number of
times the complete set of information advertised by the remote system has been
deleted from the unit's database because the information timeliness interval has
expired.
This counter is similar to the LLDP No. of Ageouts counter in the LLDP Statistic
page, except that it is per port rather than for the entire unit.
This counter is set to zero during agent initialization. This counter is incremented
only once when the complete set of information is invalidated (aged out) from all
related tables on a particular port. Partial ageing is not allowed.
9. Synchronization
This section includes:
Configuring SyncE Regenerator
Note: The Sync Source and Outgoing Clock pages are reserved for
future use.
Related topics:
Changing Your Password
Operating in FIPS Mode
Configuring AES-256 Payload Encryption
2 In the Failure login attempts to block user field, select the number of
failed login attempts that will trigger blocking. If a user attempts to login
to the system with incorrect credentials this number of times
consecutively, the user will temporarily be prevented from logging into the
system for the time period defined in the Blocking period field. Valid
values are 1-10. The default value is 3.
3 In the Blocking period (Minutes) field, enter the length of time, in
minutes, that a user is prevented from logging into the system after the
defined number of failed login attempts. Valid values are 1-60. The default
value is 5.
4 In the Unused account period for blocking (Days) field, you can
configure a number of days after which a user is prevented from logging
into the system if the user has not logged in for the configured number of
days. Valid values are 0, or 30-90. If you enter 0, this feature is disabled.
The default value is 0.
5 Click Apply.
Ceragon Proprietary and Confidential Page 264 of 597
FibeAir IP-20C/S/E User Guide
Once a user is blocked, you can unblock the user from the User Accounts page.
To unblock a user:
1 Select Platform > Security > Access Control > User Accounts. The
Access Control User Accounts page opens (Figure 206).
2 Select the user and click Edit. The Access Control User Accounts - Edit page
opens.
Figure 201: Access Control User Accounts - Edit Page
2 In the Enforce password strength field, select Yes or No. When Yes is
selected:
Password length must be at least eight characters.
Password must include characters of at least three of the following
character types: lower case letters, upper case letters, digits, and
special characters. For purposes of meeting this requirement, upper
case letters at the beginning of the password and digits at the end of
the password are not counted.
The last five passwords you used cannot be reused.
3 In the Password change for first login field, select Yes or No. When Yes
is selected, the system requires the user to change his or her password the
first time the user logs in.
4 In the Password aging (Days) field, select the number of days that user
passwords will remain valid from the first time the user logs into the
system. You can enter 20-90, or No Aging. If you select No Aging,
password aging is disabled and passwords remain valid indefinitely.
5 Click Apply.
Related topics:
Changing Your Password
2 Click Add. The Access Control User Profiles - Add page opens.
Figure 205: Access Control User Profiles - Add Page
3 In the Profile field, enter a name for the profile. The profile name can
include up to 49 characters. Once you have created the user profile, you
cannot change its name.
Note: The Usage counter field displays the number of users to
whom the user profile is assigned.
4 In the Permitted access channels row, select the access channels the user
will be permitted to use to access the system.
5 For each functionality group, select one of these options for write level and
read level. All users with this profile will be assigned these access levels:
None
Normal
Advanced
6 Click Apply, then Close.
To view a user profile, click + next to the profile you want to view.
To edit a user profile, select the profile and click Edit. You can edit all of the
profile parameters except the profile name.
To delete a user profile, select the profile and click Delete.
Note: You cannot delete a user profile if the profile is assigned to
any users.
2 Click Add. The Access Control User Profiles - Add page opens.
Figure 207: Access Control User Accounts - Add Page
3 In the User name field, enter a user name for the user. The user name can
be up to 32 characters.
4 In the Profile field, select a User Profile. The User Profile defines the user’s
access levels for functionality groups in the system. See Configuring User
Profiles.
5 In the Password field, enter a password for the user. If Enforce Password
Strength is activated (see Configuring the Password Security Parameters),
the password must meet the following criteria:
Password length must be at least eight characters.
Password must include characters of at least three of the following
character types: lower case letters, upper case letters, digits, and
special characters. For purposes of meeting this requirement, upper
case letters at the beginning of the password and digits at the end of
the password are not counted.
The last five passwords you used cannot be reused.
6 In the Blocked field, you can block or unblock the user. Selecting Yes
blocks the user. You can use this option to block a user temporarily,
without deleting the user from the system. If you set this option to Yes
while the user is logged into the system, the user will be automatically
logged out of the system within 30 seconds.
Note: Users can also be blocked by the system automatically. You
can unblock the user by selecting No in the Blocked field.
See Configuring the General Access Control Parameters.
7 Optionally, in the Expiration date field, you can configure the user to
remain active only until a defined date. After that date, the user
automatically becomes inactive. To set an expiration date, click the
calendar icon and select a date, or enter a date in the format dd-mm-yyyy.
In addition to the configurable parameters described above, the Access
Control User Accounts page displays the following information for each user:
Login Status – Indicates whether the user is currently logged into the
system.
Last Logout – The date and time the user most recently logged out of the
system.
To edit a user’s account details, select the user and click Edit. You can edit all
of the user account parameters except the User name and password.
To add a user, click Add.
To delete a user, select the user and click Delete.
4 In the IPV4 address field, enter the IP address of the RADIUS server.
5 In the Port field, enter the port of the RADIUS server.
6 In the Retries field, enter the number of times the unit will try to
communicate with the RADIUS server before declaring the server to be
unreachable.
7 In the Timeout field, enter the timeout (in seconds) that the agent will
wait in each communication with the selected RADIUS server before
retrying if no response is received.
8 In the Secret field, enter the shared secret of the RADIUS server. The string
must be between 22-128 characters long.
9 Click Apply, then Close.
In addition to the configurable parameters described above, the Radius
Configuration page displays the following information for each RADIUS server:
Server Id – The server ID of the Radius server:
1 – The primary Radius server.
2 – The secondary Radius server.
Connectivity Status – The connectivity status of the Radius server in the
last attempted connection:
True – The last connection attempt succeeded.
False – The last connection attempt failed.
To view the user’s authorized access levels, click + next to the user name. The
page refreshes and displays the additional access level information.
Figure 211: Radius Users Page – Expanded
Figure 215: Create Network Policy – Specify Name and Connection Type
4 Click Next.
5 In the Specify Conditions window, click Add.
6 In the Select Condition window that appears, select the User Groups
condition and click Add.
Figure 216: Create Network Policy – Select Condition
13 In the Specify Access Permission window that appears, select the Access
Granted option.
Figure 218: Create Network Policy – Specifying Access Permission
14 Click Next.
ii Select the Vendor Specific checkbox and click Add under the
Attributes table.
security-ro = advanced,
security-wo = advanced,
mng-ro = advanced,
mng-wo = advanced,
radio-ro = advanced,
radio-wo = advanced,
tdm-ro = advanced,
tdm-wo = advanced,
eth-ro = advanced,
eth-wo = advanced,
sync-ro = advanced,
sync-wo = advanced,
access_channel = u1accesschannel,
fall-through = yes
security-ro = regular,
security-wo = regular,
mng-ro = regular,
mng-wo = regular,
radio-ro = regular,
radio-wo = regular,
tdm-ro = regular,
tdm-wo = regular,
eth-ro = regular,
eth-wo = regular,
sync-ro = regular,
sync-wo = regular,
access_channel = u2accesschannel,
fall-through = yes
security-ro = none,
security-wo = none,
mng-ro = none,
mng-wo = none,
radio-ro = none,
radio-wo = none,
tdm-ro = none,
tdm-wo = none,
eth-ro = none,
eth-wo = none,
sync-ro = none,
sync-wo = none,
access_channel = u3accesschannel,
fall-through = yes
2 Save the changes in the /etc/raddb/users file.
### serial 1
### telnet 2
### ssh 4
### web 8
### nms 16
### snmp 32
### snmpV3 64
For example:
The value 127 denotes permission to access the device from all channels:
Serial + Telnet + SSH + Web + NMS + SNMP +SNMPv3
The value 24 indicates permission to access the device only from the Web
+ NMS channels.
To define each user’s access channels:
1 In the usr/share/freeradius/dictionary.ceragon file, configure the
values of the access channels according to the following example:
### access channel for u1
user:serial+telnet+ssh+web+nms+snmp+snmpV4
client 192.168.1.118 {
secret = default_not_applicable
shortname = ceragon-ip-20G
Keep in mind:
The secret must be between 22 and 128 characters long. Note down
the secret because you will need to enter the same value in the Secret
field of the Radius Configuration – Edit page (Figure 209).
The shortname is not mandatory, but should be added, and should be
different for each RADIUS client.
2 Save the changes to the /etc/raddb/clients.conf file.
Note: To check the logs each time a user connects to the server,
enter:
radius –X &
2 In the Common Name field, enter the fully–qualified domain name for
your web server. You must enter the exact domain name.
3 In the Organization field, enter the exact legal name of your organization.
Do not abbreviate.
4 In the Organization Unit field, enter the division of the organization that
handles the certificate.
5 In the Locality field, enter the city in which the organization is legally
located.
6 In the State field, enter the state, province, or region in which the
organization is located. Do not abbreviate.
7 In the Country field, enter the two-letter ISO abbreviation for your
country (e.g., US).
8 In the Email field, enter an e-mail address that can be used to contact your
organization.
9 In the File Format field, select PEM or DER to determine the file format.
Note: In this version, only PEM is supported.
10 In the Username field, enter the user name you configured in the SFTP
server.
11 In the Password field, enter the password you configured in the SFTP
server. If you did not configure a password for your SFTP user, simply
leave this field blank.
12 In the Path field, enter the directory path to which you are uploading the
CSR. Enter the path relative to the SFTP user's home directory, not the
absolute path. To leave the path blank, enter //.
13 In the File Name field, enter the name you want to give to the exported
CSR.
14 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the SFTP server in the Server IPV4
address field. See Defining the IP Protocol Version for Initiating
Communications.
15 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the SFTP server in the Server IPv6
address field. See Defining the IP Protocol Version for Initiating
Communications.
16 Click Apply to save your settings.
17 Click Generate & Upload. The file is generated and uploaded.
The Creation/Upload status field displays the status of any pending CSR
generation and upload. Possible values are:
Ready – The default value, which appears when CSR generation and
upload is in progress.
File-in-transfer – The upload operation is in progress.
Success – The file has been successfully uploaded.
Failure – The file was not successfully uploaded.
The Creation/Upload progress field displays the progress of any current CSR
upload operation.
2 In the Username field, enter the user name you configured in the SFTP
server.
3 In the Password field, enter the password you configured in the SFTP
server. If you did not configure a password for your SFTP user, simply
leave this field blank.
4 In the Path field, enter the directory path from which you are uploading
the certificate. Enter the path relative to the SFTP user’s home directory,
not the absolute path. To leave the path blank, enter //.
5 In the File Name field, enter the certificate’s file name in the SFTP server.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the SFTP server in the Server IPV4
address field. See Defining the IP Protocol Version for Initiating
Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the SFTP server in the Server IPv6
address field. See Defining the IP Protocol Version for Initiating
Communications.
8 Click Apply to save your settings.
9 Click Download. The certificate is downloaded.
10 Click Install. The certificate is installed on the IP-20.
2 In the Telnet Admin field, select Disable to block telnet access. By default,
telnet access is enabled (Enable).
3 Click Apply.
2 Select Platform > Security > General > Security Log Upload. The
Security Log Upload page opens.
Figure 232: Security Log Upload Page
3 In the Protocol Type field, select the file transfer protocol you want to use
(FTP or SFTP).
4 In the Server username field, enter the user name you configured in the
FTP server.
5 In the Server password field, enter the password you configured in the
FTP server. If you did not configure a password for your FTP user, simply
leave this field blank.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP server in the Server IPV4
address field. See Defining the IP Protocol Version for Initiating
Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP server in the Server IPv6
address field. See Defining the IP Protocol Version for Initiating
Communications.
8 In the Path field, enter the directory path to which you are uploading the
files. Enter the path relative to the FTP user's home directory, not the
absolute path. To leave the path blank, enter //.
9 In the File Name field, enter the name you want to give to the exported
security log.
10 Click Apply to save your settings.
11 Click Upload. The upload begins.
The File transfer status field displays the status of any pending security log
upload. Possible values are:
Ready – The default value, which appears when no file transfer is in
progress.
File-in-transfer – The upload operation is in progress.
Success – The file has been successfully uploaded.
Failure – The file was not successfully uploaded.
The File transfer progress field displays the progress of any current security
log upload operation.
3 In the File transfer protocol field, select the file transfer protocol you
want to use (FTP or SFTP).
4 In the Username field, enter the user name you configured in the FTP
server.
5 In the Password field, enter the password you configured in the FTP
server. If you did not configure a password for your FTP user, simply leave
this field blank.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP server in the Server IPV4
address field. See Defining the IP Protocol Version for Initiating
Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP server in the Server IPv6
address field. See Defining the IP Protocol Version for Initiating
Communications.
8 In the Path field, enter the directory path to which you are uploading the
files. Enter the path relative to the FTP user's home directory, not the
absolute path. To leave the path blank, enter //.
9 In the File Name field, enter the name you want to give to the exported
configuration log.
Note: The directory path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
10 Click Apply to save your settings.
11 Click Upload. The upload begins.
The File transfer status field displays the status of any pending configuration
log upload. Possible values are:
Ready – The default value, which appears when no file transfer is in
progress.
File-in-transfer – The upload operation is in progress.
Success – The file has been successfully uploaded.
Failure – The file was not successfully uploaded.
The File transfer progress field displays the progress of any current
configuration log upload operation.
Parameter Definition
Sequence Number (#) A unique sequence number assigned to the alarm by the system.
Time The date and time the alarm was triggered.
Severity The severity of the alarm. In the Current Alarms table, the severity is
indicated by a symbol. You can display a textual description of the severity
by holding the cursor over the symbol.
Note: You can edit the severity of alarm types in the Alarm Configuration
page. See Editing Alarm Text and Severity.
Description A system-defined description of the alarm.
User Text Additional text that has been added to the system-defined description of
the alarm by users.
Note: You can add user text to alarms in the Alarm Configuration page.
See Editing Alarm Text and Severity.
Origin The module that generated the alarm.
Probable Cause This field only appears in the Current Alarms - View page. One or more
possible causes of the alarm, to be used for troubleshooting.
Corrective Actions This field only appears in the Current Alarms - View page. One or more
possible corrective actions to be taken in troubleshooting the alarm.
Alarm ID A unique ID that identifies the alarm type.
Parameter Definition
Time The date and time the event was triggered.
Sequence Number (#) A unique sequence number assigned to the event by the system.
Severity The severity of the event. In the Event Log table, the severity is indicated
by a symbol. You can display a textual description of the severity by
holding the cursor over the symbol.
Note: You can edit the severity of event types in the Alarm Configuration
page. See Editing Alarm Text and Severity.
State Indicates whether the event is currently raised or has been cleared.
Description A system-defined description of the event.
User Text Additional text that has been added to the system-defined description of
the event by users.
Note: You can add user text to events in the Alarm Configuration page.
See Editing Alarm Text and Severity.
Origin The module that generated the event.
Parameter Definition
Sequence Number (#) A unique sequence number assigned to the row by the system.
Alarm ID A unique ID that identifies the alarm type.
Severity The severity assigned to the alarm type. You can edit the severity in the Alarm
Configuration – Edit page. See Editing an Alarm Type.
Description A system-defined description of the alarm.
Parameter Definition
Additional Text Additional text that has been added to the system-defined description of the alarm by
users. You can edit the text in the Alarm Configuration – Edit page. See Editing an
Alarm Type.
Service Affecting Indicates whether the alarm is considered by the system to be service-affecting (on)
or not (off).
11.3.2 Viewing the Probable Cause and Corrective Actions for an Alarm
Type
Most alarm types include a system-defined probable cause and suggested
corrective actions. To view an alarm type's probable cause and corrective
actions, click + on the left side of the alarm type's row in the Alarm
Configuration page. The Probable Cause and Corrective Actions appear
underneath the alarm type's row, as shown below. If there is no +, that means
no Probable Cause and Corrective Actions are defined for the alarm type.
Figure 238: Alarm Configuration Page – Expanded
3 In the File transfer protocol field, select the file transfer protocol you
want to use (FTP or SFTP).
4 In the Username field, enter the user name you configured in the FTP
server.
5 In the Password field, enter the password you configured in the FTP
server. If you did not configure a password for your FTP user, simply leave
this field blank.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP server in the Server IPv4
address field. See Defining the IP Protocol Version for Initiating
Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP server in the Server IPv6
address field. See Defining the IP Protocol Version for Initiating
Communications.
8 In the Path field, enter the directory path to which you are uploading the
file. Enter the path relative to the FTP user's home directory, not the
absolute path. To leave the path blank, enter //.
9 In the File Name field, enter the name you want to give to the exported
Unit Information file.
10 Click Apply to save your settings.
11 Click Create to create the Unit Information file. The following fields
display the status of the file creation process:
File creation status – Displays the file creation status. You must wait
until the status is Success to upload the file. Possible values are:
Ready – The default value, which appears when no file is being
created.
Generating File – The file is being generated.
Success – The file has been successfully created. You may now
upload the file.
Failure – The file was not successfully created.
File creation progress – Displays the progress of the current Unit
Information file creation operation.
12 Click Export. The upload begins. The following fields display the status of
the upload process:
File transfer status – Displays the status of any pending Unit
Information file upload. Possible values are:
Ready – The default value, which appears when no file transfer is in
progress.
File-in-transfer – The upload operation is in progress.
Success – The file has been successfully uploaded.
2 Select the slot on which you want to perform loopback and click Edit. The
Radio Loopbacks – Edit page opens.
Note: You cannot perform loopback directly on a Multi-Carrier
ABC group. To perform traffic-level diagnostics on a
Multi-Carrier ABC group, the loopback must be activated for
Parameter Definition
MD (ID, Name) Select the MD to which you are assigning the MEP.
MA/MEG short name Enter a name for the MEG (up to 44 alphanumeric characters).
Parameter Definition
MEG Level Select a MEG level (0-7). The MEG level must be the same for MEGs on both sides of
the link. Higher levels take priority over lower levels.
If MEGs are nested, the OAM flow of each MEG must be clearly identifiable and
separable from the OAM flows of the other MEGs. In cases where the OAM flows are
not distinguishable by the Ethernet layer encapsulation itself, the MEG level in the OAM
frame distinguishes between the OAM flows of nested MEGs.
Eight MEG levels are available to accommodate different network deployment
scenarios. When customer, provider, and operator data path flows are not
distinguishable based on means of the Ethernet layer encapsulations, the eight MEG
levels can be shared among them to distinguish between OAM frames belonging to
nested MEGs of customers, providers and operators. The default MEG level
assignment among customer, provider, and operator roles is:
The customer role is assigned MEG levels 6 and 7.
The provider role is assigned MEG levels 3 through 5.
The operator role is assigned MEG levels: 0 through 2.
The default MEG level assignment can be changed via a mutual agreement among
customer, provider, and/or operator roles.
The number of MEG levels used depends on the number of nested MEs for which the
OAM flows are not distinguishable based on the Ethernet layer encapsulation.
CCM Interval The interval at which CCM messages are sent within the MEG. Options are:
1 second (default)
10 seconds
1 minute
10 minutes
It takes a MEP 3.5 times the CCM interval to determine a change in the status of its
peer MEP. For example, if the CCM interval is 1 second, a MEP will detect failure of the
peer 3.5 seconds after it receives the first CCM failure message. If the CCM interval is
10 minutes, the MEP will detect failure of the peer 35 minutes after it receives the first
CCM failure message.
Service ID Select an Ethernet service to which the MEG belongs. You must define the service
before you configure the MEG.
Parameter Definition
MA/MEG ID Automatically generated by the system.
MA/MEG Name Format Reserved for future use. In the current release, this is Char String only.
MIP Creation Reserved for future use.
Tx Sender ID TLV content Reserved for future use. Sender ID TLV is not transmitted.
Port Status TLV TX Reserved for future use. No Port Status TLV is transmitted in the CCM frame.
Interface Status TLV TX Reserved for future use. No Interface Status TLV is transmitted in the CCM frame.
MEP List Lists all local and remote MEPs that have been defined for the MEG.
6 In the MEP ID field, select a MEP ID from the list of MEPs you have added
to the selected MEG.
7 In the Service Point field, select the service point on which you want to
place the MEP.
8 Click Finish. The Add SOAM MEP wizard displays the parameters you have
selected.
Figure 253: Add SOAM MEP Wizard –Summary Page
9 Verify that you want to submit the displayed parameters and click Submit.
Parameter Definition
MD ID An MD ID automatically generated by the system.
MA/MEG ID An MA/MEG ID automatically generated by the system.
MEP ID The MEP ID.
Interface Location The interface on which the service point associated with the MEP is
located.
SP ID The service point ID.
MEP Direction In this release, only Down is supported.
MEP Fault Notification State The initial status of the SOAM state machine.
MEP Active Indicates whether the MEP is enabled (True).
MEP CCM TX Enable Indicates whether the MEP is sending CCMs (True).
CCM and LTM Priority The p-bit included in CCMs sent by this MEP (0 to 7).
MEP Defects Reserved for future use.
RMEP List Once you have configured at least one local MEP, all other MEPs
that you have added but not configured as local MEPs are displayed
here.
Table 67 lists and describes the parameters displayed in the SOAM MEP DB
table. To return to the SOAM MEP page, click Back to MEP.
Note: To display these parameters in a separate window for a
specific remote MEP, select the RMEP ID and click View.
Parameter Definition
RMEP ID The remote MEP ID.
RMEP Operational State The operational state of the remote MEP.
RMEP Last rx CCM MAC Address The MAC Address of the interface on which the remote MEP is located.
RMEP Last CCM OK or Fail Timestamp The timestamp marked by the remote MEP indicated the most recent CCM OK
or failure it recorded. If none, this field indicates the amount of time since SOAM
was activated.
RMEP Last rx CCM RDI Indication Displays the state of the RDI bit in the most recent CCM received by the remote
MEP:
True – RDI was received in the last CCM.
False – No RDI was received in the last CCM.
RMEP Last rx CCM Port Status TLV The Port Status TLV in the most recent CCM received from the remote MEP.
RMEP Last rx CCM Interface Status TLV Reserved for future use.
RMEP Last rx CCM Chassis ID Format Displays the MAC address of the remote unit.
RMEP Last rx CCM Chassis ID Reserved for future use.
The Last RX error CCM message field displays the frame of the last CCM that
contains an error received by the MEP.
The Last RX Xcon fault message field displays the frame of the last CCM that
contains a cross-connect error received by the MEP.
Note: A cross-connect error occurs when a CCM is received from a
remote MEP that has not been defined locally.
If you have an ifIndex and you want to determine which hardware item in
the unit it represents, enter the number in the ifIndex number field and
click Calculate Index to name. A description of the object appears in the
Result field.
To determine the ifIndex of a hardware item in the unit, such as an
interface, card, or slot, select the object type in the Functional Type field,
select the Slot and Port (if relevant), and click Calculate Name to Index.
The object’s ifIndex appears in the Result field.
The MIB Reference Table is customized to the type of IP-20 product you are
using. There are three separate versions of the MIB Reference Table:
IP-20N/A/LH
IP-20G/GX
IP-20C/S/E
Note: Even though the MIB Reference Table is customized to these
three product groups, some of the entities listed in the Table
may not be relevant to the particular unit you are using.
This may occur because of activation key restrictions, minor
differences between product types, or simply because a
certain feature is not used in a particular configuration. For
example, the column genEquipUnitShelfSlotConfigTable is
relevant to IP-20GX but not to IP-20G.
To search for a text string, enter the string in the Search field and press
<Enter>. Items that contain the string are displayed in yellow. Searches are
not case-sensitive.
To save the MIB Reference Table as a .csv file, click Save to File.
Section III:
CLI
Configuration
Password:
IP20C
root>
Some of these are complete commands, such as quit and exit. Others
constitute the first word or phrase for a series of commands, such as ethernet
and radio.
Similarly, if you enter the word “platform” and press <TAB> twice, the first
word or phrase of every command that follows platform is displayed:
root> platform
activation-key configuration if-manager management
security software status
sync unit-info unit-info-file
root> platform
The system will prompt you to enter your existing password. The system will
then prompt you to enter the new password.
If Enforce Password Strength is activated, the password must meet the
following criteria:
Password length must be at least eight characters.
To set the unit's IP address in IPv6 format, enter the following command in
root view to configure the IP address, subnet mask, and default gateway:
root> platform management ip set ipv6-address <ipv6-address>
prefix-length <prefix-length> gateway <gateway>
Examples
The command below sets the following parameters:
IPv4 Address - 192.168.1.160
Subnet Mask – 255.255.0.0
Default Gateway – 192.168.1.100
root> platform management ip set ipv4-address 192.168.1.160
subnet 255.255.0.0 gateway 192.168.1.100
If the activation key is not legal (e.g., a typing mistake or an invalid serial
number), an Activation Key Loading Failure event is sent to the Event Log.
When a legal activation key is entered, an Activation Key Loaded Successfully
event is sent to the Event Log.
To display the current status of demo mode, enter the following command in
root view:
root> platform activation-key show demo status
To display a list of the radio capacities that your current activation key
supports and their usage information, enter the following command in root
view:
root> platform activation-key show usage radio
To set the local time offset relative to UTC, enter the following command in
root view:
root> platform management time-services utc set offset hours-
offset <hours-offset> minutes-offset <minutes-offset>
To display the local time configurations, enter the following command in root
view:
root> platform management time-services show status
Examples
The following command sets the GMT date and time to January 30, 2014,
3:07 pm and 58 seconds:
root> platform management time-services utc set date-and-time
30-01-2014,15:07:58
The following command sets the GMT offset to 13 hours and 32 minutes:
root> platform management time-services utc set offset hours-
offset 13 minutes-offset 32
Examples
The following command configures daylight savings time as starting on May
30 and ending on October 1, with an offset of 20 hours.
root> platform management time-services daylight-savings-time
set start-date-month 5 start-date-day 30 end-date-month 10 end-
date-day 1 offset 20
To display the status of all the interfaces in the unit, enter the following
command in root view:
root> platform if-manager show interfaces
Examples
The following command enables Ethernet port 2:
root> platform if-manager set interface-type ethernet slot 1
port 2 admin up
Examples
The following command enters radio view for radio carrier 1:
root> radio slot 2 port 1
To display the mute status of a radio, enter the following command in radio
view:
radio[x/x]>rf mute show status
Examples
The following command mutes radio carrier 1:
radio[2/1]>rf mute set admin on
To display the maximum transmit (TX) level of a radio, enter the following
command in radio view:
radio[x/x]>rf show max-tx-level
Examples
The following command sets the TX level of radio carrier 1 to 10 dBm:
radio[2/1]>rf set tx-level 10
Examples
The following command sets the TX frequency of radio carrier 1 in an IP-20C
or IP-20S unit to 12900000 KHz, and sets the RX frequency of the remote unit
to the same value.
radio[2/1]>rf set tx-frequency 12900000 local-remote enable
The following command sets the TX frequency of the radio in an IP-20E unit to
71000000 KHz, and sets the RX frequency of the remote unit to the same
value.
radio[2/1]> rf set tx-frequency 71000000 local-remote enable
The following command sets the TX frequency of the radio in an IP-20E unit to
71000000 KHz, but does not set the RX frequency of the remote unit.
radio[2/1]> rf set rx-frequency 71000000 local-remote disable
Examples
The following command displays available symmetrical (normal) scripts with
ACM support for radio carrier 2 in an IP-20C unit:
radio[2/2]>mrmc script show script-type normal acm-support yes
To assign a script without ACM enabled, enter the following command in radio
view:
radio[x/x]> mrmc set acm-support script-id <script-id>
modulation fixed profile <profile>
Examples
The following command assigns MRMC script ID 1503, with ACM enabled and
a maximum profile of 9, to radio carrier 1 in an IP-20C and IP-20S unit:
radio[2/1]>mrmc set acm-support script-id 13 modulation
adaptive max-profile 9
The following command assigns MRMC script ID 1502, with ACM disabled and
a maximum profile of 5, to radio carrier 2 in an IP-20C unit:
radio[2/2]>mrmc set acm-support script-id 13 modulation fixed
profile 5
The following command assigns MRMC script ID 4701, with ACM disabled and
a maximum profile of 5, to the radio carrier in an IP-20E unit:
radio[2/1]>mrmc set acm-support script-id 4701 modulation fixed
profile 5
To enter interface view for a LAG, enter the following command in root view:
root> ethernet interfaces group <lagid>
To display details about a LAG, go to interface view for the LAG and enter the
following command:
eth group [lagx]> summary show
To display a LAG's operational state, go to interface view for the LAG and enter
the following command:
eth group [lagx]> operational state show
To display a list of interfaces that belong to a LAG, go to interface view for the
LAG and enter the following command:
eth group [lagx]> port static-lag show members
To remove a member radio interface from a LAG, go to interface view for the
LAG and enter the following command:
eth group [lagx]> port static-lag remove member interface radio
slot <slot> port <port>
To delete a LAG, go to interface view for the LAG and simply remove all the
members, as described above.
Examples
The following commands create a LAG with the ID lag2. The LAG includes the
Ethernet interfaces 1 and 2 and radio interface 1:
root> platform if-manager set interface-type ethernet slot 1
port 1 admin down
root>
root>
The following command displays the name of the LAG to which Ethernet
port 1 belongs:
eth type eth [1/1]> static-lag show name
Static-lag members
-------------------
Eth#[1/1]
Eth#[1/2]
Radio#[2/1]
3 Record the RSLwanted and mute the first radio carrier at each end of the
link.
4 Unmute the second (orthogonal) radio carrier which was muted during the
antenna alignment process.
5 Determine the XPI, by either of the following two methods:
Measure the RSL of the second carrier (the “RSLunwanted”). To calculate
the XPI, subtract RSLunwanted from the RSLwanted.
Note: To measure the second carrier, leave the Voltmeter
connected to the BNC connector. In the Radio Parameters
page of the Web EMS (Figure 17), change the RSL
Connector Source field from PHYS1 to PHYS2 (or vice
versa). The BNC connector will now measure RSL from the
other carrier.
Read the XPI by going to radio view and entering one of the following
commands:
radio [x/x]>modem pm-xpi show interval 15min
All four carriers should have approximately the same XPI value. Do not
adjust the XPI at the remote side of the link, as this may cause the XPI at
the local side of the link to deteriorate.
Note: In some cases, the XPI might not exceed the required 25dB
minimum due to adverse atmospheric conditions. If you
believe this to be the case, you can leave the configuration at
the lower values, but be sure to monitor the XPI to make
sure it subsequently exceeds 25dB. A normal XPI level in
clear sky conditions is between 25 and 30dB.
radio-groups>
radio-groups>
To keep the Standby unit up-to-date, after any change to the configuration of
the Active unit enter the copy-to-mate command to copy the configuration to
the Standby unit.
If you are unsure whether the Standby unit’s configuration matches that of the
Active unit, enter the following command in root view. The command output
displays the list of mismatched parameters.
root> platform management protection show mismatch details
mate/root>
2 Enter the specific CLI command you want to run in mate/root context.
3 To switch back to the active unit, enter the following command:
mate/root> switch-back
root>
Note that the MMI value can also be calculated manually. To calculate it
manually, you must measure the following RSL levels per receiver:
1 Mute all remote transmitters except the transmitter for the link you want
to measure, and measure the local RSL level (RSL_Wanted).
2 Mute all remote transmitters except the same polarization interferer and
measure the local RSL2 (RSL_Int).
3 The MMI is equal to RSL_Wanted – RSL_Int.
To show the status of a MIMO group, as well as the MMI and XPI levels for the
individual radio carriers, enter the following command:
root > radio mimo show status group 1
Related topics:
Setting the Time and Date (Optional) (CLI)
Uploading Unit Info (CLI)
Changing the Management IP Address (CLI)
To show the IP protocol version the unit will use when initiating
communications, enter the following command in root view:
root> platform management ip show ip-address-family
To set the remote radio’s subnet mask, enter the following command in radio
view:
radio[x/x]>remote-unit set subnet-mask IP <subnet-mask>
To display the remote radio’s subnet mask, enter the following command in
radio view:
radio[x/x]>remote-unit show subnet-mask
To set the remote radio’s default gateway, enter the following command in
radio view:
radio[x/x]>remote-unit set default-gateway IP <ipv4-address>
To display the remote radio’s default gateway, enter the following command
in radio view:
radio[x/x]>remote-unit show default-gateway
Examples
The following command sets the default gateway of the remote radio as
192.168.1.20:
radio[2/1]>remote-unit set default-gateway IP 192.168.1.20
To set the remote radio’s prefix length , enter the following command in radio
view:
radio[x/x]>remote-unit set prefix-length <prefix-length >
To set the remote radio’s default gateway, enter the following command in
radio view:
radio[x/x]>remote-unit set default-gateway-ipv6 IPv6 <ipv6-
address>
To display the remote radio’s default gateway, enter the following command
in radio view:
radio[x/x]>remote-unit show default-gateway-ipv6
Examples
The following command sets the default gateway of the remote radio as
FE80:0000:0000:0000:0202:B3FF:FE1E:8329:
radio[2/1]>remote-unit set default-gateway-ipv6 IPv6
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
To specify the SNMP version, enter the following command in root view:
root> platform security protocols-control snmp version set
<version>
To specify the SNMP read and write communities, enter the following
command in root view:
root> platform security protocols-control snmpv1v2 set read-
community <read-community> write-community <write-community>
Example
The following commands enable SNMP v2 on the unit, and set the read
community to “public” and the write community to “private”:
root> platform security protocols-control snmp admin set enable
To display all SNMP v3 users and their authentication parameters, enter the
following command in root view:
root> platform security protocols-control snmp v3-
authentication show
Example
The following commands enable SNMP v2 on the unit, and set the read
community to “public” and the write community to “private”:
root> platform security protocols-control snmp admin set enable
The following commands enable SNMP v3 on the unit, block SNMP v1 and
SNMP v2 access, and define an SNMPv3 user with User Name=Geno,
Password=abcdefgh, security mode authPriv, encryption mode DES,
authentication algorithm SHA, and read-write access:
root> platform security protocols-control snmp admin set enable
To display all SNMP v3 users and their authentication parameters, enter the
following command in root view:
root> platform security protocols-control snmp v3-
authentication show
To display the current MIB version used in the system, enter the following
command in root view:
root> platform security protocols-control snmp show-mib-version
To display details about the current MIB version used in the system, enter the
following command in root view:
root> platform security protocols-control snmp show-mib-
version-table
To display the SNMP read and write communities, enter the following
command in root view:
root> platform security protocols-control snmpv1v2 show
To modify the settings of an SNMP trap manger, enter the following command
in root view:
root> platform security protocols-control snmp trap-manager set
manager-id <manager-id> manager-admin <manager-admin> manager-
ipv4 <manager-ipv4> manager-ipv6<manager-ipv6> manager-port
<manager-port> manager-community <manager-community> manager-
v3-user <manager-v3-user> manager-description <manager-
description>
To enable an SNMP trap manger without modifying its parameters, enter the
following command in root view:
root> platform security protocols-control snmp trap-manager
admin manager-id <manager-id> manager-admin <manager-admin>
Examples
The following commands enable trap manager 2, and assign it IP address
192.168.1.250, port 164, and community “private”, with a heartbeat of
12 minutes.
root> platform security protocols-control snmp trap-manager set
manager-id 2 manager-admin enable manager-ip 192.168.1.250
manager-port 164 manager-community private manager-description
text
Enter Yes at the prompt. When the prompt appears again, enter the following
command to check the download status:
root> platform software download status show
If the software version on the FTP or SFTP server has already been
downloaded to the unit, the following message appears:
DOWNLOAD VERSION status: all components exist, process
percentage: 0
If you wish to delay the start of installation, enter instead the following
command. The time you enter in HH:MM format is the amount of time to delay
until the start of the installation process:
root> platform software install version timer-countdown <hh:mm>
Important Notes:
• DO NOT reboot the unit during software installation process. As soon
as the process is successfully completed, the unit will reboot itself.
• Sometimes the installation process can take up to 30 minutes.
• Only in the event that software installation was not successfully
finished and more than 30 minutes have passed can the unit be
rebooted.
If you configured delayed installation, you can do any of the following:
Abort the current delayed installation. To do so, enter the following
command:
root> platform software install abort-timer
Show the time left until the installation process begins. To do so, enter the
following command:
root> platform software install time-to-install
Show the original timer as configured for a delayed installation. To do so,
enter the following command:
root> platform software install show-time
To set the file transfer protocol you want to use (FTP or SFTP), enter the
following command:
root>platform configuration channel set protocol <ftp|sftp>
Permitted
Parameter Input Type Values Description
server-ipv4 Dotted decimal Any valid IPv4 The IPv4 address of the PC or laptop you
format. address. are using as the FTP server.
server-ipv6 Eight groups of four Any valid IPv6 The IPv6 address of the PC or laptop you
hexadecimal digits address. are using as the FTP server.
separated by
colons.
directory Text String. The directory path to which you are
exporting or from which you are importing
the configuration file. Enter the path relative
to the FTP user's home directory, not the
absolute path. To leave the path blank,
enter //.
Permitted
Parameter Input Type Values Description
filename Text String. The name of the file you are importing, or
the name you want to give the file you are
exporting.
Note: You must add the suffix .zip to the
file name. Otherwise, the file import
may fail. You can export the file
using any name, then add the suffix
.zip manually.
username Text String. The user name you configured in the FTP
server.
password Text String. The password you configured in the FTP
server. If you did not configure a password
for your FTP user, simply omit this
parameter.
Examples
The following command configures the FTP channel for configuration file
import and export to IP address 192.168.1.99, in the directory “current”, with
file name “version_8_backup.zip”, user name “anonymous”, and password
“12345.”
root> platform configuration channel server set server-ip
192.168.1.99 directory \current filename version_8_backup.zip
username anonymous password 12345
Permitted
Parameter Input Type Values Description
restore-point Variable restore-point-1 Identifies the restore point to or from which
restore-point-2 to perform the backup operation.
restore-point-3
Examples
The following commands save the current configuration as a configuration at
Restore Point 1, and export the file to the external server location:
root> platform configuration configuration-file add restore-
point-1
Permitted
Parameter Input Type Values Description
restore-point Variable restore-point-1 Identifies the restore point to or from which
restore-point-2 to perform the backup operation.
restore-point-3
Examples
The following commands import a configuration file from an external PC or
laptop to Restore Point 2 on the IP-20, and restore the file to be the system
configuration file for the IP-20:
root> platform configuration configuration-file import restore-
point-2
To define a location for the unit, enter the following command in root view:
root> platform management system-location set name <name>
To define a contact person for questions pertaining to the unit, enter the
following command in root view:
root> platform management system-contact set name <name>
To define the unit's latitude coordinates, enter the following command in root
view:
root> platform management system-latitude set <latitude>
To define the type of measurement unit you want the system to use, enter the
following command in root view:
root> platform management set unit_measure_format
<unit_measure_format>
To display the type of measurement unit used by the system, enter the
following command in root view:
root> platform management show unit_measure_format
Examples
The following commands configure a name, location, contact person, latitude
coordinates, longitude coordinates, and units of measurements for the IP-20:
root> platform management system-name set name "My-System-Name"
Example
The following command enables NTP, using NTP v4, and sets the IP address of
the NTP server as 62.90.139.210.
root> platform management ntp set admin enable ntp-version
ntpv4 ntp-server-ip-address-1
For example:
root> platform management inventory show info
System information:
card-name : IP-20
Subtype : 350
root>
Related topics:
Entering Radio View (CLI)
Muting and Unmuting a Radio (CLI)
Configuring the Transmit (TX) Level (CLI)
Configuring the Transmit (TX) Frequency (CLI)
Configuring the Radio (MRMC) Script(s) (CLI)
System Configurations (CLI)
Configuring Multi-Carrier ABC (CLI)
Configuring Link Aggregation (LAG) (Optional) (CLI)
Configuring XPIC (CLI)
Configuring HSB Radio Protection (CLI)
Configuring MIMO and Space Diversity (CLI)
Operating an IP-20C in Single Radio Carrier Mode (CLI)
Note that to view and configure radio parameters, you must first enter the
radio’s view level in the CLI. For details, refer to Entering Radio View (CLI).
Note: For convenience, this User Guide generally shows the radio
prompt as radio[2/1]>.
Related topics
Configuring the Remote Unit’s IP Address (CLI)
Ceragon Proprietary and Confidential Page 388 of 597
FibeAir IP-20C/S/E User Guide
To display the mute status of the remote radio, enter the following command
in radio view:
radio[x/x]>remote-unit mute show status
To display the transmit (TX) level of the remote radio, enter the following
command in radio view:
radio[x/x]>remote-unit show tx-level
The following command sets the TX level of the remote radio to 10 dBm:
radio[2/1]>remote-unit set tx-level 10
To display the RX reference level for ATPC on the remote radio, enter the
following command in radio view:
radio[x/x]>remote-unit atpc show ref-level
The following command sets the ATPC RX reference level of the remote radio
to -55:
radio[2/1]>remote-unit atpc set ref-level -55
To set the RX reference level for ATPC, enter the following command in radio
view
radio[x/x]>atpc set rx-level atpc_ref_rx_level <rx-level>
To display the RX reference level for ATPC, enter the following command in
radio view:
radio[x/x]>atpc show rx-level
The following commands enable ATPC mode for radio carrier 1 and set the RX
reference level to -55:
radio[2/1]>atpc set admin enable
To display the number of frames and bytes that have been transmitted via
Frame Cut-Through, enter the following command in radio view:
radio[2/1]> cut-through show-counters
To configure AES on a radio carrier, you must first enter traffic encryption
view for the specific radio. To enter traffic encryption view, enter the
following command in root view:
root> payload encryption slot 2 port <port>
To display the payload encryption mode of the radio interface, enter the
following command in Traffic Encryption view:
Traffic Encryption [2/x]> payload encryption mode show
You must use the same master key on both sides of the link. This means that if
you generate a master key automatically on one side of the link, you must copy
that key and for use on the other side of the link. Once payload encryption has
been enabled on both sides of the link, the Key Exchange Protocol periodically
verifies that both ends of the link have the same master key. If a mismatch is
detected, an alarm is raised and traffic transmission is stopped for the
mismatched carrier at both sides of the link. The link becomes non-valid and
traffic stops being forwarded.
To define the master key manually, enter the following command in Traffic
Encryption view:
Traffic Encryption [2/x]> payload encryption mkey
Enter the master key and press <Enter>. The master key must be between 8
and 32 ASCII characters. The characters do not appear as you type them. To
display the master key and verify that you typed it correctly, enter the payload
encryption status show command described above. You can copy the master
key from the output of this command.
To generate the master key automatically, enter the following command in
Traffic Encryption view:
Traffic Encryption [2/x]> master key generate
A random master key is generated. You must copy and paste this key to the
remote end of the link to ensure that both sides of the link have the same
master key. To display and copy the master key, enter the traffic
encryption status show command described above. You can copy the master
key from the output of this command.
You can set all master keys defined on the unit to zero value. To zeroize the
master keys, enter the following command in root view:
root> payload encryption key zeroize
Enter the regeneration interval in hours and minutes (HH:MM). For example,
the following command configures radio interface 1 to regenerate the session
key every 4 hours and 15 minutes:
Traffic Encryption [2/1]> payload encryption session-key period
set 04:15
To display the session key regeneration interval, enter the following command
in Traffic Encryption view:
Traffic Encryption [2/x]> payload encryption session-key period
show
Current Tx profile: 0
Current Tx QAM: 4
Current Tx rate(Kbps): 43389
Current Rx profile: 0
Current Rx QAM: 4
Current Rx rate(Kbps): 43389
radio [2/1]>modem show status
To clear all radio PMs in the system, enter the following command in root
view:
root> radio pm clear all
To clear defective blocks counters for a radio, enter the following command in
radio view:
radio[x/x]>modem clear counters
radio [2/1]>
To display modem BER PMs in daily intervals, enter the following command in
radio view:
radio [x/x]>framer pm-aggregate show interval 24hr
radio [2/1]>
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute PM
reports.
Integrity Indicates whether the values received at the time and date of the measured interval
are reliable. "1" in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
ES Indicates the number of seconds in the measuring interval during which errors
occurred.
SES Indicates the number of severe error seconds in the measuring interval.
UAS Indicates the Unavailable Seconds value of the measured interval. The value can be
between 0 and 900 seconds (15 minutes).
BBE Indicates the number of background block errors during the measured interval.
To set the level above which an excessive BER alarm is issued for errors
detected over the radio link, enter the following command in radio view:
radio [x/x]>modem excessive-ber set threshold <threshold>
To display the excessive BER threshold, enter the following command in radio
view:
radio [x/x]>modem excessive-ber show threshold
The following command sets the RSL thresholds to -30 dBm and -60 dBm,
respectively.
radio [2/1]>rf pm-rsl set threshold1 -30 threshold2 -60
To display RSL and TSL PMs in daily intervals, enter the following command in
radio view:
radio [x/x]>rf pm-rsl-tsl show interval 24hr
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not reliable
due to a possible power surge or power failure that occurred at that time.
Min RSL (dBm) The minimum RSL (Received Signal Level) that was measured during the
interval.
Max RSL (dBm) The maximum RSL (Received Signal Level) that was measured during the
interval.
Min TSL (dBm) The minimum TSL (Transmit Signal Level) that was measured during the
interval.
Max TSL (dBm) The maximum TSL (Transmit Signal Level) that was measured during the
interval.
TSL exceed The number of seconds the measured TSL exceeded the threshold during the
threshold seconds interval. See Configuring TSL Thresholds (CLI).
RSL exceed The number of seconds the measured RSL exceeded RSL threshold 1 during
threshold1 seconds the interval. See Configuring RSL Thresholds (CLI).
RSL exceed The number of seconds the measured RSL exceeded RSL threshold 2 during
threshold2 seconds the interval. See Configuring RSL Thresholds (CLI).
To display the Signal Degrade BER threshold, enter the following command in
radio view:
radio [x/x]>modem signal-degrade show threshold
16.6.8 Configuring the MSE Thresholds and Displaying the MSE PMs
(CLI)
To configure the MSE (Mean Square Error) threshold, enter the following
command in radio view:
radio [x/x]>modem set mse-exceed threshold <threshold>
To display MSE (Mean Square Error) PMs in 15-minute intervals, enter the
following command in radio view:
radio [x/x]>modem pm-mse show interval 15min
The following is a partial sample output of the modem pm-mse show interval
15min command:
radio [2/1]>
To display MSE (Mean Square Error) PMs in daily intervals, enter the
following command in radio view:
radio [x/x]>modem pm-mse show interval 24hr
radio [2/1]>modem
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute PM
reports.
Integrity Indicates whether the values received at the time and date of the measured interval
are reliable. "1" in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
Min MSE (dB) Indicates the minimum MSE in dB, measured during the interval.
Max MSE (dB) Indicates the maximum MSE in dB, measured during the interval.
Exceed Indicates the number of seconds the MSE exceeded the MSE PM threshold during
Threshold the interval.
Seconds
16.6.9 Configuring the XPI Thresholds and Displaying the XPI PMs
(CLI)
To configure the modem XPI threshold for calculating XPI Exceed Threshold
seconds, enter the following command in radio view:
radio[x/x]>modem set threshold-xpi-exceed threshold <threshold>
The following is a partial sample output of the modem pm-xpi show interval
15min command:
radio [2/1]>
To display XPI PMs in daily intervals, enter the following command in radio
view:
radio[x/x]>modem pm-xpi show interval 24hr
The following is a partial sample output of the modem pm-xpi show interval
24hr command:
radio [2/1]>
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute PM
reports.
Integrity Indicates whether the values received at the time and date of the measured interval
are reliable. "1" in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
Min XPI (dB) Indicates the lowest XPI value in dB, measured during the interval.
Max XPI (dB) Indicates the highest XPI value in dB, measured during the interval.
XPI Below Indicates the number of seconds the XPI value was lower than the XPI threshold
Threshold during the interval.
Seconds
The following command sets the XPI threshold for radio carrier 2 to 15:
radio[2/1]>modem set threshold-xpi-below threshold 15
The following is a partial sample output of the modem pm-acm show interval
15min command:
MRMC PM Table:
==============
Interval Integrity Min profile Max profile Min bitrate Max bitrate
============================================================================
0 1 0 0 43389 43389
1 1 0 0 43389 43389
2 1 0 0 43389 43389
3 1 0 0 43389 43389
4 1 0 0 43389 43389
5 1 0 0 43389 43389
6 1 0 0 43389 43389
7 1 0 0 43389 43389
8 1 0 0 43389 43389
9 1 0 0 43389 43389
10 1 0 0 43389 43389
radio [2/1]>
To display ACM PMs in daily intervals, enter the following command in radio
view:
radio [x/x]>mrmc pm-acm show interval 24hr
MRMC PM Table:
==============
Interval Integrity Min profile Max profile Min bitrate Max bitrate
===========================================================================
0 1 0 0 43389 43389
4 1 0 0 43389 43389
5 1 0 0 43389 43389
6 1 0 0 43389 43389
8 1 0 0 43389 43389
11 1 0 0 43389 43389
15 1 0 0 43389 43389
17 1 0 0 43389 43389
radio [2/1]>
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute PM
reports.
Integrity Indicates whether the values received at the time and date of the measured interval
are reliable. "1" in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
Min profile Indicates the minimum ACM profile that was measured during the interval.
Max profile Indicates the maximum ACM profile that was measured during the interval.
Min bitrate Indicates the minimum total radio throughput (Mbps), delivered during the interval.
Max bitrate Indicates the maximum total radio throughput (Mbps), delivered during the interval.
Related topics:
Configuring Link Aggregation (LAG) (Optional) (CLI)
Quality of Service (QoS) (CLI)
Ethernet Protocols (CLI)
Performing Ethernet Loopback (CLI)
Example
The following command adds a Multipoint service with Service ID 18:
root> ethernet service add type mp sid 18 admin operational
evc-id Ring_1 description east_west
Example
The following command enters service view for the service with Service ID 10:
root> ethernet service sid 10
For example:
service[1]>service info show
service info:
service id: 1
service type: p2p
service admin: operational
Maximal MAC address learning entries: 131072
default cos: 0
cos mode: preserve-sp-cos-decision
EVC id: N.A.
EVC description: N.A.
split horizon group: disable
configured multicast grouping: no
service[1]>
To display the attributes of a service and its service points, go to service view
for the service and enter the following command:
service[SID]>service detailed-info show
For example:
To display a list of service points and their attributes, enter the following
command in root view:
root>ethernet service show info sid <sid>
For example:
To display a service’s admin mode, go to service view for the service and enter
the following command:
Service[SID]> service admin show state
Example
The following command sets Service 10 to be operational:
service[10]>service admin set operational
If the CoS mode is set to default-cos, you must define the Default CoS. Use the
following command to define the Default CoS:
service[SID]>service default-cos set cos <cos>
Examples
The following commands configure Service 10 to assign a CoS value of 7 to
frames traversing the service:
service[10]>service cos-mode set cos-mode default-cos
service[10]>service default-cos set cos 7
To display a service’s EVC ID, go to service view for the service and enter the
following command:
service[SID]>service evcid show
To add or change the EVC description of a service, go to service view for the
service and enter the following command:
service[SID]>service description set <evc description>
To display a service’s EVC description, go to service view for the service and
enter the following command:
service[SID]>service description show
Examples
The following commands add the EVC ID "East_West" and the EVC description
"Line_to_Radio" to Service 10:
service[10]>service evcid set East_West
service[10]>service description set Line_to_Radio
Examples
The following command deletes Service 10:
root>ethernet service delete sid 10
Table 117 summarizes the service point types available per service type.
Table 118 shows which service point types can co-exist on the same interface.
Table 119: Legal Service Point – Interface Type Combinations per Interface –
SAP and SNP
S-Tag No No No No No No Yes
Pipe 802.1q No No No No No No No
S-Tag No No No No No No No
Q in Q No No Yes No Yes No No
S-Tag No No No No No No Yes
Table 120: Legal Service Point – Interface Type Combinations per Interface –
Pipe and MNG
Bundle-C No No Yes No No
Bundle-S No No No Yes No
All to One No No No No No
Q in Q No No No Yes No
S-Tag No No No No Yes
Q in Q No No No Only 1 MNG No
SP Allowed
To add a service point with a Dot1q interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type dot1q spid <sp-
id> [interface|group] <interface|group> slot <slot> port
<port> vlan <vlan> sp-name <sp-name>
To add a service point with an S-Tag interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type s-tag spid <sp-
id> [interface|group] <interface|group> slot <slot> port
<port> vlan <vlan> sp-name <sp-name>
To add a service point with a Bundle-C interface type, go to service view for
the service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type bundle-
c spid <sp-id> [interface|group] <interface|group> slot <slot>
port <port> sp-name <sp-name>
To add a service point with a Bundle-S interface type, go to service view for
the service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type bundle-
s spid <sp-id> [interface|group] <interface|group> slot <slot>
port <port> [outer-vlan <outer-vlan>|vlan <vlan>] sp-name <sp-
name>
To add a Pipe service point, go to service view for the service and enter the
following command:
service[SID]>sp add sp-type pipe int-type <int-type> spid <sp-
id> [interface|group] <interface|group> slot <slot> port <port>
sp-name <sp-name>
Permitted
Parameter Input Type Values Description
sp-type Variable sap SAP - Service Access Point
snp SNP - Service Network Point
pipe PIPE - Pipe service point
mng MNG - Management service point
int-type Variable all-to-one Determines which frames enter the service via
dot1q this service point, based on the frame's VLAN
tagging. Since more than one service point may
s-tag
be associated with a single interface, frames are
bundle-c-tag assigned to the earliest defined service point in
bundle-s-tag case of conflict.
qinq all-to-one - All C-VLANs and untagged
frames that enter the interface are classified
to the service point. Only valid for SAP
service point types.
dot1q - A single C-VLAN is classified to the
service point. Valid for all service point types.
s-tag - A single S- VLAN is classified to the
service point. Valid for SNP and MNG
service point types.
bundle-c-tag - A set of multiple C-VLANs is
classified to the service point. Only valid for
SAP service point types.
bundle-s-tag - A single S-VLAN and a set of
multiple C-VLANs are classified to the
service point. Only valid for SAP service
point types.
qinq - A single S-VLAN and C-VLAN
combination is classified to the service point.
Valid for SAP and MNG service point types.
sp-id Number 1-32 for P2P This ID is unique within the service.
and MP
services.
1-30 for MNG
services.
interface Variable eth The Interface type for the service point:
radio eth - An Ethernet interface.
radio - A radio interface.
When you are defining the service point on a
group, such as a LAG, use the group parameter
instead of the interface parameter.
Permitted
Parameter Input Type Values Description
group Variable rp1 When you are defining the service point on an
rp2 HSB group (rp1 - rp-4), a LAG (lag1 - lag4), or a
Multi-Carrier ABC group (mc-abc1 - mc-abc4),
rp3
use this parameter instead of the interface
rp4 parameter to identify the group. The group must
lag1 be defined before you add the service point.
lag2 Note: Multi-Carrier ABC and HSP protection are
only relevant for IP-20C units.
lag3
lag4
mc-abc1
mc-abc2
mc-abc3
mc-abc4
slot Number Ethernet: 1
Radio: 2
port Number For an Ethernet The port or radio carrier on which the service
interface: 1-3 point is located.
For a radio
interface in IP-
20C units: 1-2
For a radio
interface in IP-
20S and IP-20E
units: 1
vlan Number or 1-4094 (except Defines the VLAN classified to the service point.
Variable 4092 which is This parameter should not be included for service
reserved for the points with an interface type of bundle-C-tag. For
default instructions on attaching a bundled VLAN, refer to
management Attaching a VLAN Bundle to a Service Point
service), or (CLI).
Untagged
This parameter is also not relevant for:
Service points with an interface type of qinq and
all-to-one.
Pipe service points.
outer-vlan Number 1-4094 (except Defines the S-VLAN classified to the service
4092, which is point.
reserved for the This parameter is only relevant for service points
default with the interface type bundle-s-tag or qinq.
management
service), or
Untagged
Permitted
Parameter Input Type Values Description
inner-vlan Number 1-4094 (except Defines the C-VLAN classified to the service
4092, which is point.
reserved for the This parameter is only relevant for service points
default with the interface type qinq.
management
service), or
Untagged
sp-name Text string Up to 20 A descriptive name for the service point
characters. (optional).
Examples
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type dot1q. This service point is located on radio
carrier 1. VLAN ID 100 is classified to this service point.
service[37]>sp add sp-type sap int-type dot1q spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type bundle-c-tag. This service point is located on
radio carrier 1.
service[37]>sp add sp-type sap int-type bundle-c-tag spid 10
interface radio slot 2 port 1 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type bundle-s-tag. This service point is located on
radio carrier 2 in an IP-20C unit. S-VLAN 100 is classified to the service point.
service[37]>sp add sp-type sap int-type bundle-s-tag spid 10
interface radio slot 2 port 2 outer-vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type qinq. This service point is located on radio
carrier 2 in an IP-20C unit. S-VLAN 100 and C-VLAN 200 are classified to the
service point.
service[37]>sp add sp-type sap int-type qinq spid 10 interface
radio slot 2 port 2 outer-vlan 100 inner-vlan 200 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type all-to-one. This service point is located on radio
carrier 1. All traffic entering the system from that port is classified to the
service point.
service[37]>sp add sp-type sap int-type all-to-one spid 10
interface radio slot 2 port 1 sp-name "all-to-one"
The following command adds an SNP service point with Service Point ID 10 to
Service 37, with interface type dot1q. This service point is located on radio
carrier 1. VLAN ID 100 is classified to this service point.
service[37]>sp add sp-type snp int-type dot1q spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SNP service point with Service Point ID 10 to
Service 37, with interface type s-tag. This service point is located on radio
carrier 1. S-VLAN 100 is classified to the service point.
service[37]>sp add sp-type snp int-type s-tag spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 7 to
Service 36, with interface type dot1q. This service point is connected to HSB
group 1 (rp1). VLAN ID 100 is classified to the service point.
service[36]>sp add sp-type sap int-type dot1q spid 7 group
rp1 vlan 100 sp-name test1
The following command adds a Pipe service point with Service Point ID 1 to
Service 1, with interface type dot1q. This service point is connected to Eth1.
service[1]>sp add sp-type pipe int-type dot1q spid 1 interface
eth slot 1 port 1 sp-name pipe_dot1q
The following command adds a Pipe service point with Service Point ID 2 to
Service 1, with interface type dot1q. This service point is located on radio
carrier 1.
service[1]>sp add sp-type pipe int-type dot1q spid 2 interface
radio slot 2 port 1 sp-name pipe_dot1q_radio
The following commands create a Smart Pipe service between Eth1 and radio
carrier 1. This service carries S-VLANs and untagged frames between the two
interfaces:
root> ethernet service add type p2p sid 10 admin
operational evc-id test description east_west
root>
root> ethernet service sid 10
service[10]>
service[10]>sp add sp-type pipe int-type s-tag spid 1 interface
eth slot 1 port 1 sp-name test1
service[10]>
service[10]>sp add sp-type pipe int-type s-tag spid 2 interface
radio slot 2 port 1 sp-name test2
service[10]>
Examples
The following command allows frames with a broadcast destination MAC
address to ingress Service 37 via Service Point 1.
service[37]>sp broadcast set spid 1 state allow
If you set cos-mode to sp-def-cos, you must then configure a default CoS. This
CoS is applied to frames that ingress the service point, but can be overwritten
at the service level.
To configure the default CoS, go to service view for the service and enter the
following command:
service[SID]>sp sp-def-cos set spid <sp-id> cos <cos>
Examples
The following commands configure Service Point 1 in Service 37 to apply a
CoS value of 5 to frames that ingress the service point:
service[37]>sp cos-mode set spid 1 mode sp-def-cos
service[37]>sp sp-def-cos set spid 1 cos 5
Examples
The following command configures Service Point 1 in Service 37 to flood
incoming frames with unknown MAC addresses to other service points:
service[37]>sp flooding set spid 1 state allow
Examples
The following command enables C-VLAN CoS preservation for Service Point 1
on Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode
enable
The following command disables C-VLAN CoS preservation for Service Point 1
on Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode
disable
Examples
The following command enables C-VLAN preservation for Service Point 1 on
Service 37:
service[37]>sp cvlan-preservation-mode set spid 1 mode enable
Examples
The following command enables S-VLAN CoS preservation for Service Point 1
on Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode
enable
The following command disables S-VLAN CoS preservation for Service Point 1
on Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode
disable
Examples
The following command assigns Service Bundle 1 to Service Point 1 in Service
37.
service[37]>sp egress-service-bundle set spid 1 service-bundle-
id 1
Examples
The following command classifies C-VLANs 100 through 200 to Service Point 1
in Service 37:
service[37]>sp bundle cvlan attach spid 1 vlan 100 to-vlan 200
The following command removes C-VLANs 100 through 200 from Service
Point 1 in Service 37:
service[37]>sp bundle cvlan remove spid 1 vlan 100 to-vlan 200
Example
The following command displays the attributes of Service Point 1 in Service
37:
service[37]>sp service-point-info show spid 1
Example
The following command deletes Service Point 10 from Service 37:
service[37]>sp delete spid 10
17.1.5 Defining the MAC Address Forwarding Table for a Service (CLI)
17.1.5.2 Setting the Maximum Size of the MAC Address Forwarding Table (CLI)
To limit the size of the MAC address forwarding table for a specific service, go
to service view for the service and enter the following command:
service[SID]>service mac-limit-value set <mac limit>
Table 132: MAC Address Forwarding Table Maximum Size CLI Parameters
Example
The following command limits the number of dynamic MAC address
forwarding table entries for Service 10 to 128:
service[10]>service mac-limit-value set 128
17.1.5.3 Setting the MAC Address Forwarding Table Aging Time (CLI)
You can configure a global aging time for dynamic entries in the MAC address
forwarding table. Once this aging time expires for a specific table entry, the
entry is erased from the table.
To set the global aging time for the MAC address forwarding table, enter the
following command:
root> ethernet service learning-ageing-time set time <time>
To display the global aging time for the MAC address forwarding table, enter
the following command:
root> ethernet service learning-ageing-time show
Table 133: MAC Address Forwarding Table Aging Time CLI Parameters
Example
The following command sets the global aging time to 2500 seconds:
root> ethernet service learning-ageing-time set time 2500
To delete a static MAC address from the MAC address forwarding table, go to
service view for the service from which you want to delete the MAC address
and enter the following command:
service[SID]>service mac-learning-table del-static-
mac <static mac> spid <sp-id>
Table 134: Adding Static Address to MAC Address Forwarding Table CLI
Parameters
Permitted
Parameter Input Type Values Description
static mac Six groups of two The MAC address.
hexadecimal digits
sp-id Number 1-32 The Service Point ID of the service point
associated with the MAC address.
Examples
The following command adds MAC address 00:11:22:33:44:55 to the MAC
address forwarding table for Service 10, and associates the MAC address with
Service Point ID 1 on Service 10:
service[10]>service mac-learning-table set-static-
mac 00:11:22:33:44:55 spid 1
To display the MAC address forwarding table for the entire unit, enter the
following command:
root> ethernet generalcfg mac-learning-table show
Example
To display the MAC address forwarding table for GbE 1, enter the following
commands:
root> ethernet interfaces eth slot 1 port 1
eth type eth[1/1]>mac-learning-table show
Examples
The following command enables MAC address learning for Service Point 1 on
Service 37:
service[37]>sp learning-state set spid 1 learning enable
The following command disables MAC address learning for Service Point 1 on
Service 37:
service[37]>sp learning-state set spid 1 learning disable
17.2 Setting the MRU Size and the S-VLAN Ethertype (CLI)
The following parameters are configured globally for the IP-20 switch:
S- VLAN Ethertype – Defines the ethertype recognized by the system as the
S-VLAN ethertype.
C-VLAN Ethertype – Defines the ethertype recognized by the system as the
C-VLAN ethertype. IP-20 supports 0x8100 as the C-VLAN ethertype.
MRU – The maximum segment size defines the maximum receive unit
(MRU) capability and the maximum transmit capability (MTU) of the
system. You can configure a global MRU for the system.
Note: The MTU is determined by the receiving frame and editing
operation on the frame.
To display the system S-VLAN ethertype, enter the following command in root
view:
root> ethernet generalcfg ethertype show svlan
Example
For example, the following command sets the system S-VLAN ethertype to
0x88a8:
root> ethernet generalcfg ethertype set svlan-value 0x88a8
To display the system MRU, enter the following command in root view:
root> ethernet generalcfg mru show
Example
For example, the following command sets the system MRU to 9612:
root> ethernet generalcfg mru set size 9612
Auto negotiation ON
Full Duplex
RJ45 - 100Mbps
Use the following command to enter the radio interface’s view level:
root> ethernet interfaces radio slot <slot> port <port>
Use the following command to enter the view level of a group, such as a Multi-
Carrier ABC group, an HSB protection group, or a LAG:
root> ethernet interfaces group <group>
Example
The following command enters interface view for Ethernet port 3:
root> ethernet interfaces eth slot 1 port 3
The following command enters interface view for the radio interface in an
IP-20S or an IP-20E unit:
root> ethernet interfaces radio slot 2 port 1
Examples
The following command shows the attributes of GbE 1:
eth type eth [1/1]>summary show
Permitted
Parameter Input Type Values Description
media type Variable rj45 Select the physical interface layer 1 media type:
sfp RJ45 - An electrical (RJ-45) Ethernet interface.
SFP - An optical (SFP) Ethernet interface.
Example
The following command sets GbE 1 to RJ-45 (electrical):
eth type eth [1/2]>media-type state set rj45
Permitted
Parameter Input Type Values Description
speed-and- Variable '10hd' This parameter sets the maximum speed and the
duplex state '10fd' duplex state of the interface. For RJ-45 interfaces, any
of the permitted values can be configured. For SFP
'100hd'
interfaces, only '1000fd' is supported.
'100fd'
'1000fd'
Examples
The following command sets GbE 1 to 100 Mbps, full duplex:
eth type eth [1/1]>speed-and-duplex state set '100fd'
Note: Before performing this command, you must verify that the
media-type attribute is set to rj45.
The following command sets GbE 1 to 1000 Mbps, full duplex:
eth type eth [1/1]>speed-and-duplex state set '1000fd'
Permitted
Parameter Input Type Values Description
autoneg state Variable On Enables or disables auto-negotiation on the physical
off interface.
Example
The following command enables auto negotiation for GbE 2:
eth type eth [1/2]>autoneg state set on
Permitted
Parameter Input Type Values Description
ifg Number 6 - 15 Sets the interface’s IFG (in bytes).
Example
The following command sets the ifg for GbE 1 to 12:
eth type eth [1/1]>ifg set 12
Permitted
Parameter Input Type Values Description
preamble Number 6 - 15 Sets the interface’s preamble (in bytes).
Example
The following command sets the preamble for GbE 1 to 8:
eth type eth [1/1]>preamble set 8
To delete a description, go to interface view for the interface and enter the
following command:
eth type eth [x/x]>description delete
Permitted
Parameter Input Type Values Description
description Text String Up to 40 Adds a text description to the interface.
characters
Example
The following command adds the description “Line” to GbE 1:
eth type eth [1/1]>description set Line
Permitted
Parameter Input Type Values Description
clear-on-read Boolean yes If you enter yes, the statistics are cleared once you
no display them.
Example
The following commands enter interface view for GbE 1, and clear the
statistics after displaying them.
root> ethernet interfaces eth slot 1 port 1
The following commands enter interface view for radio carrier 1 in an IP-20C
or IP-20S unit, and display statistics for the interface, without clearing the
statistics.
root> ethernet interfaces radio slot 2 port 1
Example
The following commands configure and enable automatic state propagation to
propagate faults from radio interface 1 to Ethernet port 1.
root> auto-state-propagation add eth-port-to-radio eth-slot 1
eth-port 1 radio-slot 2 radio-port 1
Permitted
Parameter Input Type Values Description
eth-slot Number 1 Always enter 1.
eth-port Number 1-3 The interface to which you want to propagate faults
from the selected radio or group.
asp-admin Variable enable Enables or disables automatic state propagation on
disable the Ethernet interface.
Example
The following command enables automatic state propagation to Ethernet port
1, and specifies that faults on the remote carrier are also propagated to
Ethernet port 1. CSF mode is enabled.
root> auto-state-propagation configure eth-port eth-slot 1 eth-
port 1 asp-admin enable remote-fault-trigger-admin enable csf-
mode-admin enable
Permitted
Parameter Input Type Values Description
eth-slot Number 1 Always enter 1.
eth-port Number 1-3 The interface to which you wanted to propagate
faults from the selected radio or group.
Permitted
Parameter Input Type Values Description
eth-slot Number 1 Always enter 1.
eth-port Number 1-3 The interface to which you propagate faults from the
selected radio or group.
The following commands bring you to interface view for Ethernet port 1, and
clears the statistics after displaying them.
root> ethernet interfaces eth slot 1 port 1
The following commands bring you to interface view for radio interface 2,
without clearing the statistics.
root> ethernet interfaces radio slot 2 port 1
You can configure thresholds and display the number of seconds these
thresholds were exceeded during a specified interval.
To configure interface PM thresholds, go to interface view for the interface
and enter the following command:
eth type eth [x/x]> pm set thresholds rx-layer1-rate-threshold
<0-4294967295> tx-layer1-rate-threshold <0-4294967295>
tx-layer1-rate- Number 0-4294967295 The exceed threshold for port TX PMs, in bytes per second.
thershold
The following commands bring you to interface view for Ethernet port 1,
enable PM gathering, and set the thresholds for RX and TX PMs at 850,000,000
bytes per second:
root> ethernet interfaces eth slot 1 port 1
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute intervals,
displays the date and ending time of the interval.
Invalid data flag Indicates whether the values received during the measured interval are valid.
An x in the column indicates that the values are not valid (for example,
because of a power surge or power failure that occurred during the interval).
Peak RX Packets The peak rate of RX packets per second for the measured time interval.
Average RX Packets The average rate of RX packets per second for the measured time interval.
Peak RX Broadcast Packets The peak rate of RX broadcast packets per second for the measured time
interval.
Average RX Broadcast Packets The average rate of RX broadcast packets per second for the measured time
interval.
Ceragon Proprietary and Confidential Page 453 of 597
FibeAir IP-20C/S/E User Guide
Parameter Definition
Peak RX Multicast Packets The peak rate of RX multicast packets per second for the measured time
interval.
Average RX Multicast Packets The average rate of RX multicast packets per second for the measured time
interval.
Peak RX Bytes in Layer1 The peak RX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
Average RX Bytes in Layer1 The average RX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
RX Bytes Layer1 Exceed The number of seconds during the measured time interval that the RX rate
Threshold (sec) exceeded the configured threshold.
Peak RX Bytes in Layer2 The peak RX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
Average RX Bytes in Layer2 The average RX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
Peak TX Packets The peak rate of TX packets per second for the measured time interval.
Average TX Packets The average rate of TX packets per second for the measured time interval.
Peak TX Broadcast Packets The peak rate of TX broadcast packets per second for the measured time
interval.
Average TX Broadcast Packets The average rate of TX broadcast packets per second for the measured time
interval.
Peak TX Multicast Packets The peak rate of TX multicast packets per second for the measured time
interval.
Average TX Multicast Packets The average rate of TX multicast packets per second for the measured time
interval.
Peak TX Bytes in Layer1 The peak TX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
Average TX Bytes in Layer1 The average TX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
TX Bytes Layer1 Exceed The number of seconds during the measured time interval that the TX rate
Threshold (sec) exceeded the configured threshold.
Peak TX Bytes in Layer2 The peak TX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
Average TX Bytes in Layer2 The average TX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
The classifier at the logical interface level supports the following classification
methods, listed from highest to lowest priority. A higher level classification
method supersedes a lower level classification method:
VLAN ID
802.1p bits.
DSCP values.
MPLS EXP field.
Default CoS
IP-20 performs the classification on each frame ingressing the system via the
logical interface. Classification is performed step by step from the highest
priority to the lowest priority classification method. Once a match is found, the
classifier determines the CoS and Color decision for the frame for the logical
interface-level.
For example, if the frame is an untagged IP Ethernet frame, a match will not be
found until the third priority level (DSCP). The CoS and Color values defined
for the frame’s DSCP value will be applied to the frame.
You can disable some of these classification methods by configuring them as
un-trusted. For example, if 802.1p classification is configured as un-trusted for
a specific interface, the classification mechanism does not perform
classification by UP bits. This is useful, for example, if classification is based on
DSCP priority bits.
If no match is found at the logical interface level, the default CoS is applied to
incoming frames at this level. In this case, the Color of the frame is assumed to
be Green.
inner-vlan-id Number 1 – 4094 (except Optional. Include this parameter when you want to map
4092, which is double-tagged frames to specific CoS and Color values.
reserved for the When this parameter is included in the command, both the
default management S-VLAN and the C-VLAN IDs must match the configured
service) outer-vlan-id and inner-vlan-id values,
respectively, in order for the defined CoS and Color values
to be applied to the frame.
Examples
The following command configures the classification mechanism on GbE 1 to
override the CoS and Color values of frames with S-VLAN ID 10 and C-VLAN ID
30 with a CoS value of 6 and a Color value of Green:
eth type eth [1/1]>vlan-cos-override set outer-vlan-id 10
inner-vlan-id 30 use-cos 6 use-color green
The following command displays the CoS and Color override values for frames
that ingress on GbE 1, with S-VLAN ID 10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override show outer-vlan-id 10
inner-vlan-id 20
The following command displays all CoS and Color override values for frames
that ingress on GbE 2:
eth type eth [1/2]>vlan-cos-override show all
The following command deletes the VLAN to CoS and Color override mapping
for frames that ingress on GbE 1, with S-VLAN ID 10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override delete outer-vlan-id 10
inner-vlan-id 20
To display the trust mode for 802.1p classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show 802.1p state
Examples
The following command enables 802.1p trust mode for GbE 1:
eth type eth [1/1]>classification set 802.1p trust
18.1.4.2 Modifying the C-VLAN 802.1 UP and CFI Bit Classification Table (CLI)
The following table shows the default values for the C-VLAN 802.1 UP and CFI
bit classification table.
Table 155: C-VLAN 802.1 UP and CFI Bit Classification Table Default Values
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the C-VLAN 802.1 UP and CFI bit classification table, enter the
following command:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p
<802.1p> cfi <cfi> cos <cos> color <color>
To display the C-VLAN 802.1 UP and CFI bit classification table, enter the
following command:
root> ethernet qos 802.1q-up-bits-mapping-tbl show
Table 156: C-VLAN 802.1 UP and CFI Bit Classification Table CLI Parameters
cos Number 0–7 The CoS assigned to frames with the designated UP and
CFI.
color Variable green The Color assigned to frames with the designated UP and
yellow CFI.
Example
The following command maps frames with an 802.1p UP bit value of 1 and a
CFI bit value of 0 to CoS 1 and Green color:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p
1 cfi 0 cos 1 color green
18.1.4.3 Modifying the S-VLAN 802.1 UP and DEI Bit Classification Table (CLI)
The following table shows the default values for the S-VLAN 802.1 UP and DEI
bit classification table.
Table 157: S-VLAN 802.1 UP and DEI Bit Classification Table Default Values
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the S-VLAN 802.1 UP and DEI bit classification table, enter the
following command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p
<802.1p> dei <dei> cos <cos> color <color>
To display the S-VLAN 802.1 UP and CFI bit classification table, enter the
following command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl show
Table 158: S-VLAN 802.1 UP and DEI Bit Classification Table CLI Parameters
cos Number 0–7 The CoS assigned to frames with the designated UP and
CFI.
color Variable green The Color assigned to frames with the designated UP and
yellow CFI.
Example
The following command maps frames with an 802.1ad UP bit value of 7 and a
DEI bit value of 0 to CoS 7 and Green color:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p 7 dei
0 cos 7 color green
To display the trust mode for DSCP classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show 802.1p state
Examples
The following command enables DSCP trust mode for GbE 1:
eth type eth [1/1]>classification set ip-dscp trust
46 101110 EF 7 Green
Example
The following command maps frames with DSCP value of 10 to CoS 1 and
Green color:
root> ethernet qos dscp-mapping-tbl set dscp 10 cos 1 color
green
To display the trust mode for MPLS classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show mpls state
Examples
The following command enables MPLS trust mode for GbE 1:
eth type eth [1/1]>classification set mpls trust
1 1 Green
2 2 Yellow
3 3 Green
4 4 Yellow
5 5 Green
6 6 Green
7 7 Green
To modify the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp
<mpls-exp> cos <cos> color <color>
To display the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-mapping-tbl show
Table 164: MPLS EXP Bit Classification Table Modification CLI Parameters
cos Number 0–7 The CoS assigned to frames with the designated MPLS
EXP bit value.
color Variable green The Color assigned to frames with the designated MPLS
yellow EXP bit value.
Example
The following command maps frames with MPLS EXP bit value of 4 to CoS 4
and Yellow color:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp 4
cos 4 color yellow
To display the default CoS value for an interface, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show default-cos
Example
The following command sets the default CoS for GbE 1 as 7:
eth type eth [1/1]>classification set default-cos 7
To edit an existing rate meter (policer) profile, enter the following command:
root> ethernet qos rate-meter edit profile-id <profile-id> cir
<cir> cbs <cbs> eir <eir> ebs <ebs> color-mode <color-mode>
coupling-flag <coupling-flag> rate-meter-profile-name <rate-
meter-profile-name>
cir Number 0, or 64,000 - The Committed Information Rate (CIR) defined for the rate meter
1,000,000,000 (policer), in bits per second.
If the value is 0, all incoming CIR traffic is dropped.
cbs Number 0 - 128 The Committed Burst Rate (CBR) for the rate meter (policer), in
Kbytes.
eir Number 0, or 64,000 - The Excess Information Rate (EIR) for the rate meter (policer), in
1,000,000,000 bits per second.
If the value is 0, all incoming EIR traffic is dropped.
ebs Number 0 - 128 The Excess Burst Rate (EBR) for the rate meter (policer), in
Kbytes.
color-mode Variable color-blind Determines how the rate meter (policer) treats frames that ingress
color-aware with a CFI or DEI field set to 1 (yellow). Options are:
color aware – All frames that ingress with a CFI/DEI field
set to 1 (yellow) are treated as EIR frames, even if credits
remain in the CIR bucket.
color blind – All ingress frames are treated as green
regardless of their CFI/DEI value. A color-blind policer
discards any former color decisions.
coupling-flag Variable enable When enabled, frames that ingress as yellow may be converted to
disable green when there are no available yellow credits in the EIR
bucket. Only relevant in color-aware mode.
rate-meter- Text string Up to 20 characters. A description of the rate meter (policer) profile.
profile-name
Examples
The following command creates a rate meter (policer) profile with Profile ID
50, named “64k.”
root> ethernet qos rate-meter add profile-id 50 cir 64000 cbs 5
eir 64000 ebs 5 color-mode color-blind coupling-flag disable
rate-meter-profile-name 64k
Example
The following command displays the parameters of Rate Meter Profile 50:
root> ethernet qos rate-meter show profile-id 50
Example
The following command deletes Rate Meter Profile 50:
root> ethernet qos rate-meter delete profile-id 50
To change the rate meter (policer) profile for unicast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast edit admin-state <admin-
state> profile-id <profile-id>
To display the current unicast rate meter (policer) profile for an interface, go
to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast show configuration
To delete the rate meter (policer) profile for unicast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast delete
Table 167: Assigning Rate Meter for Unicast Traffic CLI Parameters
profile-id Number 1 – 250 Select from the rate meter profiles defined in the system.
Examples
The following command assigns Rate Meter Profile 1 to unicast traffic on
GbE 1, and enables rate metering on the port:
eth type eth [1/1]>rate-meter unicast add capability admin-
state enable profile-id 1
The following command changes the rate meter (policer) profile for unicast
traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter unicast edit admin-state enable
profile-id 4
To change the rate meter (policer) profile for multicast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast edit admin-state
<admin-state> profile-id <profile-id>
To display the current multicast rate meter (policer) profile for an interface,
go to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast show configuration
To delete the rate meter (policer) profile for multicast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast delete
Table 168: Assigning Rate Meter for Multicast Traffic CLI Parameters
profile-id Number 1 – 250 Select from the rate meter profiles defined in the system.
Examples
The following command assigns Rate Meter Profile 1 to multicast traffic on
GbE 1, and enables rate metering on the port.
eth type eth [1/1]>rate-meter multicast add capability admin-
state enable profile-id 1
The following command changes the rate meter (policer) profile for multicast
traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter multicast edit admin-state enable
profile-id 4
To change the rate meter (policer) profile for broadcast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast edit admin-state
<admin-state> profile-id <profile-id>
To display the current broadcast rate meter (policer) settings for an interface,
go to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast show configuration
To delete the rate meter (policer) profile for broadcast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast delete
Table 169: Assigning Rate Meter for Broadcast Traffic CLI Parameters
profile-id Number 1 – 250 Select from the rate meter profiles defined in the system.
Examples
The following command assigns Profile 1 to broadcast traffic on GbE 1, and
enables rate metering on the port.
eth type eth [1/1]>rate-meter broadcast add capability admin-
state enable profile-id 1
The following command changes the rate meter (policer) profile for broadcast
traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter broadcast edit admin-state enable
profile-id 4
To display the current Ethertype rate meter (policer) settings for an interface,
go to interface view for the interface and enter the following commands:
eth type eth [x/x]>rate-meter ethertype1 show configuration
eth type eth [x/x]>rate-meter ethertype2 show configuration
eth type eth [x/x]>rate-meter ethertype3 show configuration
To delete the rate meter (policer) profile for an Ethertype, go to interface view
for the interface and enter one or more of the following commands:
eth type eth [x/x]>rate-meter ethertype1 delete
eth type eth [x/x]>rate-meter ethertype2 delete
eth type eth [x/x]>rate-meter ethertype3 delete
ethertype-value Hexadecimal 1-65535 Identifies the Ethertype to which the profile applies.
profile-id Number 1 – 250 Select from the policer profiles defined in the system.
For instructions on defining rate meter (policer) profiles,
refer to Configuring Rate Meter (Policer) Profiles (CLI).
Examples
The following commands assign Rate Meter Profiles 1, 2, and 3 to Ethertypes
0x8000, 0x8100, and 0x9100, respectively, on GbE 1, and enable rate metering
on the port.
eth type eth [1/1]>rate-meter ethertype1 add capability
ethertype-value 0x8000 admin-state enable profile-id 1
The following commands change the rate meter (policer) profiles assigned in
the examples above to 4, 5, and 6, respectively.
eth type eth [1/1]>rate-meter ethertype1 edit ethertype-value
0x8000 admin-state enable profile-id 4
To display the rate meter (policer) line compensation value for an interface, go
to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter-compensation-value get
Table 171: Assigning Line Compensation Value for Rate Meter CLI Parameters
Example
The following command sets the line compensation value for policers attached
to GbE 1 to 20:
eth type eth [1/1]>rate-meter-compensation-value set 20
Example
The following commands display rate meter counters for GbE 1, for each of the
available frame types and Ethertypes. These commands clear the counters
after displaying them.
eth type eth [1/1]>rate-meter unicast show statistics clear-on-
read yes layer-1 no
Examples
The following command enables marking mode on Service Point 3 on
Service 2:
service[2]>sp marking set spid 3 mode enable
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
To modify the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos <cos>
color <color> 802.1p <802.1p> cfi <cfi>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl show
Table 175: 802.1q CoS and Color to UP and CFI Bit Mapping Table CLI
Parameters
cfi Number 0–1 The CFI bit value assigned to matching frames.
Example
The following command maps CoS 0, Green, to 802.1p UP bit 0, and CFI bit 0:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos 0 color
green 802.1p 0 cfi 0
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
Ceragon Proprietary and Confidential Page 481 of 597
FibeAir IP-20C/S/E User Guide
To modify the 802.1ad CoS and Color to UP and DEI bit mapping table, enter
the following command in root view:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos <cos>
color <color> 802.1p <802.1p> dei <dei>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1ad-up-bits-marking-tbl show
dei Number 0–1 The DEI bit value assigned to matching frames.
Example
The following command marks CoS 5, Yellow, to 802.1p UP bit 5, and DEI bit 1:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos 5 color
yellow 802.1p 5 dei 1
To edit an existing WRED profile, enter the following command in root view:
root> ethernet qos wred-profile-tbl edit profile-id <profile-
id> green-min-threshold <green-min-threshold> green-max-
threshold <green-max-threshold> green-max-drop <green-max-drop>
yellow-min-threshold <yellow-min-threshold> yellow-max-
threshold <yellow-max-threshold> yellow-max-drop <yellow-max-
drop>
You cannot delete a WRED profile that is assigned to a queue. You must first
remove the WRED profile from the queue by replacing it with a different
WRED profile. You can then delete the WRED profile.
green-min-threshold Number 0 - 8192 The minimum throughput of green frames for queues
with this profile, in Kbytes. When this value is
reached, the system begins dropping green frames in
the queue.
green-max-threshold Number 0 - 8192 The maximum throughput of green frames for queues
with this profile, in Kbytes. When this value is
reached, all green frames in the queue are dropped.
yellow-min-threshold Number 0 - 8192 The minimum throughput of yellow frames for queues
with this profile, in Kbytes. When this value is
reached, the system begins dropping yellow frames in
the queue.
yellow-max-threshold Number 0 - 8192 The maximum throughput of yellow frames for queues
with this profile, in Kbytes. After this value is reached,
all yellow frames in the queue are dropped.
Examples
The following command adds a WRED profile.
root> ethernet qos wred-profile-tbl add profile-id 2 green-min-
threshold 8000 green-max-threshold 8000 green-max-drop 100
yellow-min-threshold 8000 yellow-max-threshold 8000 yellow-max-
drop 100
The following command edits the WRED profile created by the previous
command:
root> ethernet qos wred-profile-tbl edit profile-id 2 green-
min-threshold 8000 green-max-threshold 8000 green-max-drop 100
yellow-min-threshold 4000 yellow-max-threshold 4000 yellow-max-
drop 100
To display the WRED profile assigned to a queue, go to interface view for the
interface and enter the following command:
eth type eth [x/x]> wred show profile-id service-bundle-id
<service-bundle-id> cos <cos>
Examples
The following command assigns WRED Profile 2 to the CoS 0 queue in Service
Bundle 1, on GbE 1:
eth type eth [1/1]> wred set service-bundle-id 1 cos 0 profile-
id 2
The following command displays the WRED profile assigned to the CoS
0 queue in Service Bundle 1, on GbE 1:
eth type eth [1/1]> wred show profile-id service-bundle-id
1 cos 0
Ceragon Proprietary and Confidential Page 485 of 597
FibeAir IP-20C/S/E User Guide
To edit the parameters of an existing queue shaper profile, enter the following
command in root view:
root> ethernet qos queue-shaper-profile-tbl edit profile-id
<profile-id> cir <cir> shaper-profile-name <shaper-profile-
name> burst-type short
To delete a queue shaper profile, enter the following command in root view:
root> ethernet qos queue-shaper-profile-tbl delete profile-id
<profile id>
You cannot delete a queue shaper profile if it is attached to a queue. You must
first remove the profile from the queue. You can then delete the profile.
cir Number 16000 – 131008000 The Committed Information Rate (CIR) assigned
to the profile (in bps).
Examples
The following command creates Queue Shaper 1, named “p1”, with a CIR value
of 16000 bps:
root> ethernet qos queue-shaper-profile-tbl add profile-id 1
cir 16000 shaper-profile-name p1
The following command changes the CIR value of the profile created above
from 16000 to 32000, and changes the profile name to p3:
root> ethernet qos queue-shaper-profile-tbl edit profile-id 1
cir 32000 shaper-profile-name p3 burst-type short
To remove a queue shaper profile from a queue, go to interface view for the
interface and enter the following command:
eth type eth [x/x]> queue-shaper delete service-bundle-id
<service-bundle-id> cos <cos>
cos Number 0–7 The CoS queue ID of the queue to which you
want to assign the shaper. Queues are numbered
according to CoS value.
Examples
The following command adds Queue Shaper Profile 5 to queues with CoS 0, on
Service Bundle 1, on GbE 1, and enables shaping on these queues:
eth type eth [1/1]> queue-shaper add capability service-bundle-
id 1 cos 0 admin-state enable profile-id 5
The following command changes the Queue Shaper Profile assigned in the
previous command to Queue Shaper Profile 2:
eth type eth [1/1]> queue-shaper edit service-bundle-id 1 cos 0
admin-state enable profile-id 2
To edit the parameters of an existing service bundle shaper profile, enter the
following command in root view:
root> ethernet qos service-bundle-shaper-profile-tbl edit
profile-id <profile-id> cir <cir> pir <pir> shaper-profile-name
<shaper-profile-name>
To delete a service bundle shaper profile, enter the following command in root
view:
root> ethernet qos service-bundle-shaper-profile-tbl delete
profile-id <profile-id>
cir Number 1 - 1000000000 The Committed Information Rate (CIR) assigned to the
profile (in bps).
pir Number 16000 - 1000000000 The Peak Information Rate (PIR) assigned to the
profile (in bps).
The following command creates Service Bundle Shaper 1, named “p1”, with a
CIR value of 100000000 bps and a PIR value of 200000000 bps:
root> ethernet qos service-bundle-shaper-profile-tbl add
profile-id 1 cir 100000000 pir 200000000 shaper-profile-name p1
The following command changes the CIR value in the Service Bundle Shaper
created above from 100000000 bps to 110000000 bps:
root> ethernet qos service-bundle-shaper-profile-tbl edit
profile-id 1 cir 110000000 pir 200000000 shaper-profile-name p1
profile-id Number 1 – 256 Enter the ID of one of the configured service bundle
shaper profiles.
Examples
The following command adds Service Bundle Shaper Profile 5 to Service
Bundle 1, on GbE 1, and enables shaping on this service bundle:
eth type eth [1/1]> service-bundle-shaper add capability
service-bundle-id 1 admin-state enable profile-id 5
The following command changes the Service Bundle Shaper Profile assigned in
the previous command to Service Bundle 1, from 5 to 4:
eth type eth [1/1]> service-bundle-shaper edit service-bundle-
id 1 admin-state enable profile-id 4
To display the egress line compensation value, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>shaping-compensation-value get
Example
The following command sets the egress line compensation value to 0 on
GbE 1:
eth type eth [1/1]>shaping-compensation-value set 0
Profile ID (1-9)
Green Priority Yellow Priority
CoS (user defined) (read only) Description
0 1 1 Best Effort
1 2 1 Data Service 4
2 2 1 Data Service 3
3 2 1 Data Service 2
4 2 1 Data Service 1
When the service bundle state is Green (committed state), the service bundle
priorities are as defined in the Green Priority column. When the service
bundle state is Yellow (best effort state), the service bundle priorities are
system-defined priorities shown in the Yellow Priority column.
Note: CoS 7 is always marked with the highest priority and cannot
be changed or edited, no matter what the service bundle
state is, since it is assumed that only high priority traffic will
be tunneled via CoS 7.
The system supports up to nine interface priority profiles. Profiles 1 to 8 are
defined by the user, while profile 9 is the pre-defined read-only default
interface priority profile.
You can only delete an interface priority profile if the profile is not attached to
any interface.
cos0-priority Number 1–4 The Green priority for the CoS 0 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 0 egressing the service bundle to which the profile is
assigned.
cos1-priority Number 1–4 The Green priority for the CoS 1 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 1 egressing the service bundle to which the profile is
assigned.
cos2-priority Number 1–4 The Green priority for the CoS 2 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 2 egressing the service bundle to which the profile is
assigned.
cos3-priority Number 1–4 The Green priority for the CoS 3 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 3 egressing the service bundle to which the profile is
assigned.
cos5-priority Number 1–4 The Green priority for the CoS 5 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 5 egressing the service bundle to which the profile is
assigned.
cos6-priority Number 1–4 The Green priority for the CoS 6 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 6 egressing the service bundle to which the profile is
assigned.
cos7-priority Number 1–4 The Green priority for the CoS 7 queue, from 4 (highest)
to 1 (lowest). This priority is applied to Green frames with
CoS 7 egressing the service bundle to which the profile is
assigned.
Example
The following command configures a priority profile with Profile ID 1:
root> ethernet qos port-priority-profile-tbl add profile-id 1
cos0-priority 1 description c0_p1 cos1-priority 1 description
c1_p1 cos2-priority 1 description c2_p1 cos3-priority 2
description c3_p2 cos4-priority 2 description c4_p2 cos5-
priority 3 description c5_p3 cos6-priority 4 description c6_p4
cos7-priority 4 description c7_p4
The following command edits the profile you created in the previous
command so that CoS 6 queues have a Green priority of 3 instead of 4, and a
description of “c6_p3”.
root> ethernet qos port-priority-profile-tbl edit profile-id 1
cos0-priority 1 description c0_p1 cos1-priority 1 description
c1_p1 cos2-priority 1 description c2_p1 cos3-priority 2
description c3_p2 cos4-priority 2 description c4_p2 cos5-
priority 3 description c5_p3 cos6-priority 3 description c6_p3
cos7-priority 4 description c7_p4
Examples
The following command attaches Interface Priority Profile 3 to GbE 1:
eth type eth [1/1]> priority set profile-id 3
Profile ID: 9
0 1 1 best effort
1 2 1 data service
2 2 1 data service
3 2 1 data service
4 2 1 data service
5 3 1 real time
6 3 1 real time
7 4 4 management
Profile ID (1-7)
CoS Queue Weight (Green) Queue Weight (Yellow – not visible to
users, and cannot be edited)
0 20 20
1 20 20
2 20 20
3 20 20
4 20 20
5 20 20
6 20 20
7 20 20
You can attach one of the configured interface WFQ profiles to each interface.
By default, the interface is assigned Profile ID 1, the pre-defined system
profile.
To edit an existing WFQ profile, enter the following command in root view:
root> ethernet qos wfq-weight-profile-tbl edit profile-id
<profile.id> cos0-weight <cos0-weight> cos1-weight <cos1-
weight> cos2-weight <cos2-weight> cos3-weight <cos3-weight>
cos4-weight <cos4-weight> cos5-weight <cos5-weight> cos6-weight
<cos6-weight> cos7-weight <cos7-weight>
You can only delete a WFQ profile if the profile is not attached to any interface.
cos1- weight Number 1 - 20 The relative weight for the CoS 1 queue.
cos2- weight Number 1 - 20 The relative weight for the CoS 2 queue.
cos3- weight Number 1 - 20 The relative weight for the CoS 3 queue.
cos4- weight Number 1 - 20 The relative weight for the CoS 4 queue.
cos5- weight Number 1 - 20 The relative weight for the CoS 5 queue.
cos6- weight Number 1 - 20 The relative weight for the CoS 6 queue.
cos7- weight Number 1 - 20 The relative weight for the CoS 7 queue.
Examples
The following command configures a WFQ profile with Profile ID 2:
root> ethernet qos wfq-weight-profile-tbl add profile-id 2
cos0-weight 15 cos1-weight 15 cos2-weight 15 cos3-weight 15
cos4-weight 15 cos5-weight 15 cos6-weight 15 cos7-weight 20
This profile has the parameters listed in the following table. Note that the
yellow queue weight is constant and cannot be changed. This means that all
best effort traffic (yellow) will always have the same weight, regardless of CoS.
The following command edits the profile you created in the previous
command so that CoS 6 queues have a weight of 20 instead of 15:
root> ethernet qos wfq-weight-profile-tbl edit profile-id 2
cos0-weight 15 cos1-weight 15 cos2-weight 15 cos3-weight 15
cos4-weight 15 cos5-weight 15 cos6-weight 20 cos7-weight 20
Examples
The following command assigns WFQ Profile 3 to GbE 1:
eth type eth [1/1]> port-wfq set profile-id 3
Profile ID: 1
0 20
1 20
2 20
3 20
4 20
5 20
6 20
7 20
To clear queue-level PMs for a specific service bundle, enter interface view for
the interface and enter the following command:
eth type eth [x/x]> tm-queue clear statistics service-bundle-id
<service-bundle-id>
cos Number 0-7 The queue for which you want to display PMs.
clear-on-read Boolean yes If you enter yes, the statistics are cleared once you
no display them.
The following command displays PMs for the CoS 0 queue in Service Bundle 1,
on GbE 2. The PMs are cleared after they are displayed:
eth type eth [1/2]> tm-queue show statistics service-bundle-id
1 cos 0 clear-on-read yes layer-1 yes
The following command clears PMs for all queues in Service Bundle 1, on
GbE 2:
eth type eth [1/2]> tm-queue clear statistics service-bundle-id
1
To clear service bundle-level PMs for all service bundles on an interface, enter
interface view for the interface and enter the following command:
eth type eth [x/x]> tm-service-bundle clear statistics
clear-on-read Boolean yes If you enter yes, the statistics are cleared once
no you display them.
Example
The following command displays service bundle PMs for Service Bundle 1, on
GbE 1. The PMs are cleared after they are displayed.
eth type eth [1/1]> tm-service-bundle show statistics service-
bundle-id 1 clear-on-read yes layer-1 yes
Related Topics:
Configuring Service OAM (SOAM) Fault Management (FM)
To set the Admin status of an ABN entity, enter the following command in root
view:
root> ethernet abn abn-admin-set abn-name <abn-name> admin
<admin-state>
To show a summary of all ABN entities defined, enter the following command
in root view:
root> ethernet abn abn-entities-summary-show
To set the monitoring interval for which a weighted average of the bandwidth
readings is calculated, enter the following command in root view:
root> ethernet abn abn-monitoring-interval-set abn-name <abn-
name> period <monitoring-interval>
To set how often messages are transmitted when bandwidth is below the
nominal value, enter the following command in root view:
root> ethernet abn abn-period-set abn-name <abn-name> period
<message-frequency>
To set the holdoff time, enter the following command in root view. Holdoff
time is the amount of time the system waits when bandwidth degradation
occurs, before transmitting a message. If the bandwidth is below the nominal
value when the holdoff period ends, the system starts transmitting messages:
root> ethernet abn abn-holdoff-set abn-name <abn-name> holdoff
<holdoff-time>
To clear the messages counter, enter the following command in root view:
root> ethernet abn abn-entity-counter-reset abn-name <abn-name>
Examples
The following command creates an ABN entity with radio interface 1 as the
monitored interface and Ethernet port 1 as the control interface. It also
specifies to transmit bandwidth messages on VLAN 1:
root> ethernet abn abn-entity-create abn-name ABN-1 monitored-
interface radio monitored-slot 1 monitored-port 1 control-
interface ethernet control-slot 1 control-port 1 vlan 1
The following command creates an ABN entity in an IP-20C unit with radio
interface 2 as the monitored interface and LAG group lag1 as the control
interface. It also specifies to transmit bandwidth messages on VLAN 55:
root> ethernet abn abn-entity-create abn-name ABN-3 monitored-
interface radio monitored-slot 1 monitored-port 2 control-group
lag1 vlan 55
The following command creates an ABN entity in an IP-20C unit with HSB
protection group rp1 as the monitored interface and Ethernet port 2 as the
control interface. It also specifies to transmit bandwidth messages on VLAN
200:
root> ethernet abn abn-entity-create abn-name ABN-4 monitored-
group rp1 control-interface ethernet control-slot 1 control-
port 2 vlan 200
The following command creates an ABN entity in an IP-20C unit with HSB
protection group rp1 as the monitored interface and LAG group lag1 as the
control interface. It also specifies to transmit bandwidth messages on
VLAN 300:
root> ethernet abn abn-entity-create abn-name ABN-5 monitored-
group rp1 control-group lag1 vlan 300
The time-to-live (TTL) determines the length of time LLDP frames are
retained by the receiving device. The TTL is determined by multiplying the
Transmit Interval by the TTL Multiplier.
To define the TTL Multiplier, enter the following command in root view:
root> ethernet lldp tx-hold-multiplier-set hold-multiplier
<hold-multiplier>
Permitted
Parameter Input Type Values Description
tx-interval Number 5-3600 The interval, in seconds, at which LLDP frames are
transmitted. The default value is 30.
hold- Number 2-10 The TTL Multiplier, which is multiplied by the
multiplier Transmit Interval to determine the TTL, in seconds,
of LLDP frames. The default value is 4.
notif-interval Number 5-3600 The interval, in seconds, between transmission of
LLDP notifications during normal transmission
periods. The default value is 30.
Examples
The following commands set the Transmit Interval to 50 seconds with a TTL
Multiplier of 5. This produces a TTL of 4 minutes and 10 seconds.
root> ethernet lldp tx-interval-set tx-interval 50
root> ethernet lldp tx-hold-multiplier-set hold-multiplier 50
Message Fast Init - The initial value used to initialize the variable which
determines the number of transmissions that are made during fast
transmission periods. In this release, this parameter is set at 4.
To enable or disable LLDP notifications to the NMS on a specific port, enter the
following command in root view:
root> ethernet lldp agent-notif-enable interface eth slot
<slot> port <port> agent-notif-enable <agent-notif-enable>
Permitted
Parameter Input Type Values Description
slot Number 1 The slot in which the card resides.
port Number 1-3 The port for which you want to configure LLDP.
agent-admin Variable txOnly Defines how the LLDP protocol operates for this port:
rxOnly txOnly - The LLDP agent transmits LLDP
txAndRx frames on this port but does not update
information about its peer.
disabled
rxOnly - The LLDP agent receives but does not
transmit LLDP frames on this port.
txAndRx - The LLDP agent transmits and
receives LLDP frames on this port (default value).
disabled - The LLDP agent does not transmit
or receive LLDP frames on this port.
agent-notif- Variable true true - The agent sends a Topology Change trap
enable false to the NMS whenever the system information
received from its peer changes.
false - Notifications to the NMS are disabled
(default value).
Example
The following commands configure Ethernet port 2 to transmit and receive
LLDP frames and to send a Topology Change trap to the NMS whenever the
system information of its peer changes:
root> ethernet lldp agent-admin-set interface eth slot 1 port 2
agent-admin txAndRx
Remote Changes - Indicates whether there are changes in the peer's MIB,
as determined by the variable remoteChanges. Possible values are:
True - Changes have taken place in the peer's MIB since the
defined agent-start-time.
False - No changes have taken place in the peer's MIB since the
defined agent-start-time.
19.2.6.2 Displaying the LLDP Remote Management Data per Port (CLI)
To display remote LLDP management data from a specific port, starting from a
specific time, enter the following command in root view. If no time is specified,
all data is displayed.
root> ethernet lldp agent-remote-mng-show agent-start-time
<agent-start-time> interface eth slot <slot> port <port>
Table 199: LLDP Remote Management Data Per Port CLI Parameters
Agent Rem OID - The OID value used to identify the type of hardware
component or protocol entity associated with the management address
advertised by the remote system agent.
To change the first interface in a SyncE pipe, enter the following command in
root view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id>
interface-1-type <interface-1-type> slot <slot> port <port>
To change the second interface in a SyncE pipe, enter the following command
in root view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id>
interface-2-type <interface-2-type> slot <slot> port <port>
To view the configured SyncE pipes, enter the following command in root
view:
root> platform sync pipe show
Examples
The following command configures a SyncE pipe between Ethernet port 1 and
radio interface 1:
root> platform sync pipe add pipe-id 1 interface-1-type
ethernet slot 1 port 1 interface-2-type radio slot 2 port 1
The following command changes the first interface in the pipe from ethernet
port 1 to Ethernet port 2:
root> platform sync pipe edit interface-1 pipe-id 1 interface-
1-type ethernet slot 1 port 2
The following command changes the second interface in the pipe from radio
interface 1 to radio interface 2:
root> platform sync pipe edit interface-2 pipe-id 1 interface-
2-type radio slot 2 port 2
Related Topics:
Logging On (CLI)
Operating in FIPS Mode (CLI)
Configuring AES-256 Payload Encryption (CLI)
Example
The following command sets the session inactivity timeout period to 30
minutes:
root> platform security protocols-control session inactivity-
timeout set 30
To define the period (in minutes) for which a user is blocked after the
configured number of failed login attempts, enter the following command in
root view:
root> platform security access-control block-failure-login
period set <period>
To display the current failed login attempt blocking parameters, enter the
following command in root view:
root> platform security access-control block-failure-login show
Example
The following commands configure a blocking period of 45 minutes for users
that perform 5 consecutive failed login attempts:
root> platform security access-control block-failure-login
attempt set 5
Once the user is blocked, you can use the following command to unblock the
user:
root> platform security access-control user-account block user-
name <user-name> block no
To manually block a specific user, enter the following command in root view:
root> platform security access-control user-account block user-
name <user-name> block yes
Examples
The following command configures the system to block any user that does not
log into the system for 50 days:
root> platform security access-control block-unused-account
period set 50
The following commands block, then unblock, a user with the user name
John_Smith:
root> platform security access-control user-account block user-
name John_Smith block yes
Example
The following command sets the password aging time to 60 days:
root> platform security access-control password aging set 60
Permitted
Parameter Input Type Values Description
password Number 0, 20 - 90 The number of days that user passwords will remain
aging valid from the first time the user logs into the system.
enforce- Boolean Yes When yes is selected:
strength no Password length must be at least eight characters.
Password must include characters of at least three
of the following character types: lower case letters,
upper case letters, digits, and special characters.
For purposes of meeting this requirement, upper
case letters at the beginning of the password and
digits at the end of the password are not counted.
The last five passwords you used cannot be
reused.
Example
The following command enables password strength enforcement:
root> platform security access-control password enforce-
strength set yes
To require users to change their password the first time they log in, enter the
following command in root view:
root> platform security access-control password first-login set
yes
Table 207: Force Password Change on First Time Login CLI Parameters
Permitted
Parameter Input Type Values Description
first-login Boolean yes When yes is selected, the system requires users to
no change their password the first time they log in.
Related topics:
Logging On (CLI)
Example
The following commands create a user profile called “operator” and give users
to whom this profile is assigned normal write privileges for all system
functionality and advanced read privileges for all functionality except security
features.
root> platform security access-control profile add name
operator
Example
The following command prevents users with the user profile “operator” from
accessing the system via NMS:
root> platform security access-control profile edit mng-channel
name operator channel-type NMS allowed no
When you create a new user account, the system will prompt you to enter a
default password. If Enforce Password Strength is activated (refer to
Configuring Password Strength Enforcement (CLI)), the password must meet
the following criteria:
Password length must be at least eight characters.
Password must include characters of at least three of the following
character types: lower case letters, upper case letters, digits, and special
characters. For purposes of meeting this requirement, upper case letters at
the beginning of the password and digits at the end of the password are
not counted.
The last five passwords you used cannot be reused.
To block or unblock a user account, enter the following command:
root> platform security access-control user-account block user-
name <user-name> block <block>
To display all user accounts configured on the unit and their settings,
including whether the user is currently logged in and the time of the user's last
logout, enter the following command:
root> platform security access-control user-account show
Example
The following command creates a user account named Tom_Jones, with user
profile “operator”. This user’s account expires on February 1, 2014.
root> platform security access-control user-account add user-
name Tom_Jones profile-name operator expired-date 2014-02-01
Example
The following command configures Radius server attributes for the primary
Radius server:
root> platform security radius-server-communication-ipv4 set
server-id 1 ip-address 192.168.1.99 port 1812 retries 5 timeout
10 secret U8glp3KJ6FKGksdgase4IQ9FMm
To generate and upload a CSR, enter the following command in root view:
root> platform security csr-generate-and-upload
To display the status of a pending CSR generation and upload operation, enter
the following command in root view:
root> platform security csr-generate-and-upload-show-status
file-format Variable PEM The file format of the CSR. In this version, only
DER PEM is supported.
server-ipv4 Dotted decimal Any valid IPv4 IP The IPv4 address of the PC or laptop you are using
format. address. as the SFTP server.
server-ipv6 Eight groups of four Any valid IPv6 The IPv6 address of the PC or laptop you are using
hexadecimal digits address. as the SFTP server.
separated by colons.
server-path Text String The directory path to which you are uploading the
CSR. Enter the path relative to the SFTP user's
home directory, not the absolute path. To leave the
path blank, enter //.
filename Text String The name you want to give the CSR.
username Text String The user name for the SFTP session.
password Text String The password for the SFTP session. To configure
the SFTP settings without a password, simply omit
this parameter.
server-ipv6 Eight groups of four Any valid IPv6 The IPv6 address of the PC or laptop you are using
hexadecimal digits address. as the SFTP server.
separated by colons.
server-path Text String The directory path from which you are downloading
the certificate. Enter the path relative to the SFTP
user's home directory, not the absolute path. To
leave the path blank, enter //.
filename Text String The certificate’s file name in the SFTP server.
username Text String The user name for the SFTP session.
password Text String The password for the SFTP session. To configure
the SFTP settings without a password, simply omit
this parameter.
Note: Make sure you have installed a valid certificate in the IP-20
before changing the web interface protocol to HTTPS.
Failure to do this may prevent users from accessing the Web
EMS.
To change the protocol back to HTTP, enter the following command in root
view:
root> platform security url-protocol-set url-protocol http
Note: When you block telnet, any current telnet sessions are
immediately disconnected.
To display the FTP channel parameters for uploading the security log, enter
the following command in root view:
root> platform security file-transfer show configuration
To upload the security log to your FTP server, enter the following command in
root view:
root> platform security file-transfer operation set upload-
security-log
To display the progress of a current security log upload operation, enter the
following command in root view:
root> platform security file-transfer show operation
To display the result of the most recent current security log upload operation,
enter the following command in root view:
root> platform security file-transfer show status
file-name Text String The name you want to give the file you are
uploading.
ip-address Dotted decimal format. Any valid IP address. The IP address of the FTP server.
username Text String The user name for the FTP or SFTP session.
password Text String The password for the FTP or SFTP session. To
configure the FTP settings without a password,
simply omit this parameter.
Example
The following commands configure an FTP channel for security log upload to
IP address 192.168.1.80, in the directory “current”, with file name
“security_log_Oct8.zip”, user name “anonymous”, and password “12345”, and
initiate the upload:
root> platform security file-transfer set server-path \current
file-name security_log_Oct8.zip ip-address 192.168.1.80
protocol ftp username anonymous password 12345
To display the FTP or SFTP parameters for configuration log export, enter the
following command in root view:
root> platform security configuration-log-upload-params show
To export the configuration log, enter the following command in root view:
root> platform security configuration-log upload
Permitted
Parameter Input Type Values Description
path Text String The directory path to which you are exporting the configuration
log. Enter the path relative to the FTP user's home directory,
not the absolute path. To leave the path blank, enter //.
file-name Text String The name you want to give the file you are exporting.
Note: You must add the suffix .zip to the file name. Otherwise,
the file import may fail. You can export the file using any
name, then add the suffix .zip manually. For example:
UnitInfo.zip
If the Unit Information file is exported several times
consecutively, the file itself will not be replaced. Instead, the
filename will be updated by time stamp. For example:
UnitInfo.zip.11-05-14 03-31-04
ip-address Dotted decimal Any valid IP The IP address of the PC or laptop you are using as the FTP or
format. address. SFTP server.
username Text String The user name for the FTP or SFTP session.
password Text String The password for the FTP or SFTP session. To configure the
FTP or SFTP settings without a password, simply omit this
parameter.
Note: The path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
Examples
The following commands configure an FTP channel for configuration log
export to IP address 192.168.1.99, in the directory “current”, with file name
“cfg_log”, user name “anonymous”, and password “12345.”
root> platform security configuration-log-upload-params set
path \file-name cfg_log ip-address 192.168.1.99 protocol ftp
username anonymous password 12345
The following command exports the configuration log to the external server
location:
root> platform security configuration-log upload
To display the most severe alarm currently raised in the unit, enter the
following command in root view:
root> platform status current-alarm show most-severe-alarm
module unit
To clear the event log, enter the following command in root view:
root> platform status event-log clear module unit
Example
The following command changes the severity level of alarm type 401 (Loss of
Carrier) to minor:
root> platform status alarm-management set alarm-id 401
severity-level minor
To restore the severity levels and descriptions of all alarm types to their
default values, enter the following command in root view:
root> platform status alarm-management set all default
Example
The following command restores alarm type 401 (Loss of Carrier) to its
default severity level:
root> platform status alarm-management set alarm-id 401 restore
default
To set the protocol for unit information file export, enter the following
command in root view.
root> platform unit-info channel set protocol <protocol>
To display the FTP or SFTP parameters for unit information file export, enter
one of the following commands in root view:
root> platform unit-info-file channel show
To create a unit information file based on the current state of the system,
enter the following command in root view:
root> platform unit-info-file create
To export the unit information file you just created, enter the following
command in root view:
root> platform unit-info-file export
To display the status of a unit information file export operation, enter the
following command in root view
root> platform unit-info-file status show
server-ipv6 Eight groups of four hexadecimal Any valid IPv6 address. The IPv6 address of the PC or laptop
digits separated by colons. you are using as the FTP or SFTP
server.
filename Text String The name you want to give the file you
are exporting.
Note: You must add the suffix .zip to
the file name. Otherwise, the file
import may fail. You can export
the file using any name, then add
the suffix .zip manually.
username Text String The user name for the FTP or SFTP
session.
The following commands create a unit information file and export the file to
the external server location:
root> platform unit-info-file create
root> platform unit-info-file export
Example
The following commands configures an FTP channel for unit information file
export to IP address 192.168.1.99, in the directory “current”, with file name
“version_8_backup.zip”, user name “anonymous”, and password “12345.”
root> platform unit-info channel server set ip-address
192.168.1.99 directory \current filename version_8_backup.zip
username anonymous password 12345
The following commands create a unit information file and export the file to
the external server location:
root> platform unit-info-file create
To display the radio loopback timeout, enter the following command in radio
view:
radio[x/x]>radio loopbacks-timeout show
Permitted
Parameter Input Type Values Description
duration Number 0 – 1440 The timeout, in minutes, for automatic
termination of a loopback. A value of 0 indicates
that there is no timeout.
admin Variable on Set on to initiate an RF loopback.
off
Examples
The following commands initiate an RF loopback on radio carrier 1 with a
timeout of two minutes:
radio[2/1]> radio loopbacks-timeout set duration 2
To configure the loopback duration time, go to interface view for the interface
and enter the following command:
eth type eth[x/x]> loopback set duration <loopback-duration>
You can select whether to swap DA and SA MAC addresses during the
loopback. Swapping addresses prevents Ethernet loops from occurring. It is
recommended to enable MAC address swapping if LLDP is enabled.
To configure MAC address swapping, go to interface view for the interface and
enter the following command:
eth type eth[x/x]> loopback swap-mac-address admin <MAC_swap-
admin-state>
To view loopback status, go to interface view for the interface and enter the
following command:
eth type eth[x/x]> loopback status show
Permitted
Parameter Input Type Values Description
loopback- Variable enable Enter enable to enable Ethernet loopback on the
admin-state disable interface, or disable to disable Ethernet
loopback on the interface.
loopback- Number 1 - 900 The loopback duration time, in seconds.
duration
MAC_swap- Variable enable Enter enable to enable MAC address swapping,
admin-state disable or disable to disable MAC address swapping.
Examples
The following command enables Ethernet loopback on Ethernet interface 2:
eth type eth [1/2]> loopback admin enable
The following command sets the loopback duration time to 900 seconds:
eth type eth [1/2]> loopback set duration 900
The following command enables MAC address swapping during the loopback:
eth type eth [1/2]> loopback swap-mac-address admin enable
Once you are in CW mode, you can choose to transmit in a single tone or two
tones.
To transmit in a single tone, enter the following command in radio view:
radio[x/x] modem tx-source set mode one-tone freq-shift <freq-
shift>
Permitted
Parameter Input Type Values Description
freq-shift Number 0-7000 Enter the frequency you want to transmit, in KHz.
Section IV
Maintenance
23. Maintenance
This section includes:
IP-20C Connector Pin-outs
IP-20C LEDs
IP-20S Connector Pin-outs
IP-20S LEDs
IP-20E Connector Pin-outs
IP-20E LEDs
PoE Injector Pin-outs
23.1.5 DC
The DC port is UL-60950 compliant, with a 2-pin connector.
Figure 261: IP-20C DC Port Connector
23.3.5 DC
The DC port is UL-60950 compliant, with a 2-pin connector.
Figure 263: IP-20S DC Connector
23.7.3 DC
One or two DC ports, depending on the PoE Injector model:
Two models of the PoE Injector are available:
PoE_Inj_AO_2DC_24V_48V – Includes two DC power ports with power
input ranges of ±(18-60)V each.
PoE_Inj_AO – Includes one DC power port (DC Power Port #1), with a
power input range of ±(40-60)V.
These ports are UL-60950 compliant, with a 2-pin connector.
Section V:
Appendices
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
Slot X port XX is mirrored to slot Y Mirroring is enabled by user
103 port-mirroring-is-active Alarm Minor Disable mirroring.
port YY configuration.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Check link performance.
1. Fade in the link.
2. Check IF cable and replace if
2. Defective IF cable.
required.
601 radio-excessive-ber Alarm Radio excessive BER Major 3. Fault in RFU.
3. Replace RFU.
4. Fault in RMC (Radio Modem
4. Replace RMC (Radio Modem
Card).
Card).
Link ID is not the same at both sides of Configure same Link ID for both sides of
602 remote-link-id-mismatch Alarm Link ID mismatch Major
link link
1. Check link performance.
1. Fade in the link.
2. Check IF cable and replace if
2. Defective IF cable.
required.
3. Fault in RFU.
3. Replace RFU.
603 radio-lof Alarm Radio loss of frame Critical 4. Fault in RMC (Radio Modem
4. Replace RMC (Radio Modem
Card).
Card).
5. Different radio scripts at both
5. Make sure same script is loaded at
ends of the link.
both ends of the link.
1. Check link performance.
1. Fade in the link.
2. Check IF cable and replace if
2. Defective IF cable.
required.
604 radio-signal-degrade Alarm Radio signal degrade Minor 3. Fault in RFU.
3. Replace RFU.
4. Fault in RMC (Radio Modem
4. Replace RMC (Radio Modem
Card).
Card).
605 radio-link-up Event Radio interface is up Warning
606 radio-link-down Event Radio interface is down Warning
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Reset the system.
801 corrupted-file Alarm Corrupted inventory file Warning The inventory file is corrupted
2. Reinstall the software.
1. Reset the system.
802 file-not-found Alarm Inventory file not found Warning The inventory file is missing
2. Reinstall the software.
Demo mode has been activated by the
901 demo-license-alarm Alarm Demo mode is active Warning Disable demo mode.
user
902 license-demo-expired Event Demo mode is expired Warning
license-demo-start-by-
903 Event Demo mode is started Warning
user
license-demo-stop-by-
904 Event Demo mode is stopped Warning
user
905 license-load-fail Event Activation key loading failure Major
906 license-load-successful Event Activation key loaded successfully Warning
The current configuration does not
match the activation-key-enabled 1. Get the list of features'
feature set. configurations that are violated via
48 hours after a "activation key the "activation key information
907 license-violation-alarm Alarm Activation key violation Critical violation" alarm is raised, sanction report".
mode is activated in which all alarms 2. Install a new activation key that
except the activation key violation allows the use of all required
alarm are cleared and no new alarms features.
are raised.
demo-license-about-to- Demo mode allowed period is about to Disable demo mode and install a new
908 Alarm Demo mode is about to expire Major
expire-alarm end within 10 days valid activation key.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
license-signature-failed- Activation key validation has failed due
910 Alarm Activation key signature failure Major Replace the IDU
alarm to invalid product serial number
license-violation- Activation key violation sanction is
911 Event Major
runtime-counter-expired enforced
license-bad-xml-file- Activation key components are Essential internal activation key
913 Alarm Major Reinstall software
alarm missing or corrupted components are missing or corrupted.
software-installation-
1102 Event Software installation status: Warning
status
software-new-version- A software version has been installed
1105 Event New version installed Warning
installed but system has not been reset.
software-user- User approved download of software
1111 Event Warning
confirmation-for-version version file
software-download-
1112 Event Software download status: Warning
status
software-download-
1113 Event Missing components: Warning
missing-components
software-management- Incomplete file set; missing Software bundle is missing
1114 Event Warning Get a complete software bundle
incomplete-bundle components components.
Configuration file backup generation
1150 backup-started Event Warning User command
started
Backup file creation finished
1151 backup-succeeded Event Configuration file backup created Warning
successfully
Failure in configuration file backup System failed in attempt to create
1152 backup-failure Event Warning
generation backup configuration file
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
Configuration successfully restored Configuration restore finished
1153 restore-succeeded Event Warning
from file backup successfully
1. Configuration file system type
Failure in configuration restoring from System failed in attempt to restore mismatch
1154 restore-failure Event Warning
backup file configuration from backup file 2. Invalid or corrupted configuration
file
Restore operation cancelled because
Configuration restore operation of user command or execution of
1155 restore-canceled Event Warning Try again
cancelled another configuration management
operation
User issued command for transfer of
1156 file-transfer-issued Event Warning User command
configuration file
1157 file-transfer-succeeded Event Configuration file transfer successful Warning Configuration file transfer successful
1. Mark sure protocol details are
1. Communications failure.
1158 file-transfer-failure Event Configuration file transfer failure Warning properly configured.
2. File not found in server
2. Make sure file exists.
1159 file-transfer-in-progress Event Configuration file transfer in progress Warning File transfer started
cli-script-activation- CLI configuration script activation
1163 Event Warning User command
started started
cli-script-activation- CLI Configuration script executed
1164 Event Warning
succeeded successfully
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
Verify script in the relevant line, and run
1. Syntax Error.
cli-script-activation- again.
1165 Event CLI Configuration script failed Warning 2. Error returned by system during
failure Note that script may assume pre-
runtime
existing configuration.
unit-info-file-transfer-
1166 Event Unit info file transfer status: Warning
status-changed
unit-info-file-creation-
1167 Event Unit info file creation status: Warning
status-changed
Configuration restore operation Restore operation started because of
1169 restore-started Event Warning
started user command
1. Download software package.
1201 file-missed Alarm Modem firmware file not found Critical Modem file is missing
2. Reset the system.
Modem firmware was not loaded 1. Modem firmware file is corrupted. 1. Download software package.
1202 load-failed Alarm Critical
successfully 2. System failure. 2. Reset the system.
1203 modem-wd-reset Event Modem watch-dog reset event Warning
1312 script-loading-failed Alarm Radio MRMC script loading failed Major Damaged hardware module Replace the radio hardware module
incompatible-rfu-tx- RFU calibration tables require SW
1401 Alarm Incompatible RFU TX calibration Major Upgrade IDU SW
calibration upgrade
remote-communication-
1501 Alarm Remote communication failure Critical Fade in the link Check the link performance
failure
1601 if-loopback Alarm IF loopback Warning User enabled IF loopback Disable IF loopback
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Check installation.
2. Reset the RMC (Radio Modem
1. Extreme temperature condition.
1602 lock-detect Alarm IF synthesizer is unlocked. Critical Card) module.
2. HW failure.
3. Replace the RMC (Radio Modem
Card).
1. Check IF cable and connectors.
2. Verify that the N-Type connector
Cable is not connected to RMC (Radio inner pin is not spliced.
1701 cable-open Alarm Cable open Major
Modem Card) or RFU 3. Replace RMC (Radio Modem
Card).
4. Replace RFU.
1. Check IF cable and connectors.
2. Verify that the N-Type connector
inner pin is not spliced.
1702 cable-short Alarm Cable short Major Physical short at the IF cable
3. Replace RMC (Radio Modem
Card).
4. Replace RFU.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Check IF cable and connectors.
3. Defective IF cable. 2. Verify that N-Type connector inner
4. IF cable not connected properly. pin is not spliced.
5. Defective RMC (Radio Modem 3. Replace RMC (Radio Modem
1703 communication-failure Alarm RFU communication failure Warning Card). Card).
6. Defective RFU. 4. Replace RFU.
7. RFU software download in For a high power RF Unit:
progress. 1. Check BMA connector on OCB
2. Check BMA connector on RFU.
1. Reset the RMC (Radio Modem
delay-calibration-failure-
1704 Alarm RFU delay calibration failure 1 Warning Defective RFU Card) / RFU.
1
2. Replace RFU.
delay-calibration-failure- Calibration cannot be completed due to
1705 Alarm RFU delay calibration failure 2 Warning Enter delay calibration value manually.
2 notch detection
1. Check installation conditions.
1. Installation conditions. 2. Verify operation as per product's
1706 extreme-temp-cond Alarm RFU extreme temperature Warning
2. Defective RFU. specs.
3. Replace RFU.
1. Check if problem repeats and if
1708 freq-set-automatically Event RFU frequency was set automatically Warning Defective RFU errors/alarms reported.
2. Replace RFU.
1709 hardware-failure-1 Alarm RFU hardware failure 1 Critical Defective RFU. Replace RFU.
1710 hardware-failure-2 Alarm RFU hardware failure 2 Critical Defective RFU. Replace RFU.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Check IF cable connectors.
1. IF cable connection. 2. Verify that N-Type connector inner
2. Defective RFU. pin is not spliced.
1711 low-if-signal-to-rfu Alarm Low IF signal to RFU Major
3. Defective RMC (Radio Modem 3. Replace RMC (Radio Modem
Card). Card).
4. Replace RFU.
1. Check IF cable and connectors.
2. Verify that N-Type connector inner
pin is not spliced.
1712 no-signal-from-rfu Alarm Low IF signal from RFU Warning Low RX IF signal (140 MHz) from RFU.
3. Replace RMC (Radio Modem
Card).
4. Replace RFU.
1. Installation conditions. 1. Check installation conditions.
1713 pa-extreme-temp-cond Alarm RFU PA extreme temperature Warning
2. Defective RFU. 2. Replace RFU.
1721 reset-occurred Event RFU reset Major
1722 rfu-loopback-active Alarm RFU loopback is active Major User has activated RFU loopback. Disable RFU loopback.
rfu-mode-changed-to-
1723 Event RFU mode changed to Combined Indeterminate
combined
rfu-mode-changed-to-
1724 Event RFU mode changed to Diversity Indeterminate
diversity
rfu-mode-changed-to-
1725 Event RFU mode changed to Main Indeterminate
main
At least one of the RFU's power supply
1726 rfu-power-supply-failure Alarm RFU power supply failure Major Replace RFU.
voltages is too low.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Check antenna alignment & link
planning.
2. Check link settings (TX power, TX
1727 rx-level-out-of-range Alarm RFU RX level out of range Warning RSL is very low, link is down.
frequency).
3. Check antenna connections.
4. Replace local/remote RFU.
1. Check that the fault is not due to
rain/multi-path fading or lack of
LOS.
1. Improper installation.
rx-level-path1-out-of- 2. Check link settings (TX power, TX
1728 Alarm RFU RX level path1 out of range Warning 2. Fading event. frequency).
range
3. Defective RFU. 3. Check antenna alignment.
4. Check antenna connections.
5. Replace local/remote RFU.
1. Check that the fault is not due to
rain/multi-path fading or lack of
LOS.
1. Improper installation.
rx-level-path2-out-of- 2. Check link settings (TX power, TX
1729 Alarm RFU RX level path2 out of range Warning 2. Fading event. frequency).
range
3. Defective RFU. 3. Check antenna alignment.
4. Check antenna connections.
5. Replace local/remote RFU.
1. Replace RFU.
At least one of the RFU synthesizers is
1733 synthesizer-unlocked Alarm RFU synthesizer unlocked Major 2. In XPIC mode, replace mate RFU
unlocked
as well.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Replace RFU.
Defective RFU (the RFU cannot
1734 tx-level-out-of-range Alarm RFU TX level out of range Minor 2. Intermediate solution - reduce TX
transmit the requested TX power)
power.
1735 tx-mute Alarm RFU TX Mute Warning RFU Transmitter muted by user Unmute the RFU transmitter
IDU SW does not support this type of
1736 unknown-rfu-type Alarm Major IDC SW does not support the RFU Upgrade IDC SW
RFU
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
5. Check link performance.
6. Check IF cable, and replace if
The estimated radio BER (Bit Error required.
1773 early-warning Alarm Radio early warning. Warning
Rate) is above 10E-12.
7. Replace XCVR.
8. Replace RMC.
The hardware of the XCVR is OK, but 1. Upgrade the XCVR software
sw-download- RFU software download cannot be
1774 Alarm Critical is it running with METRO radio application via XPAND-IP and then
incompatible-rfu initiated.
application. reinitiate software download.
RFU software download is not Wrong type of XCVR, the XCVR
1775 hw-incompatible-rfu Alarm Critical Replace the XCVR
possible. hardware is METRO.
RMC hardware failure of the clock
1776 pll-rmc Alarm RMC hardware failure. Major Replace the RMC.
distributor.
1. Make sure the required software
New installed software package does package include the running
mrmc-running-script- MRMC radio script.
1780 Event MRMC running script is deleted Warning not include the running MRMC radio
deleted
script 2. Download and install the correct
software package.
New installed software package does
mrmc-running-script- Reset the radio carrier to reacquire the
1781 Event MRMC running script is updated Warning has an updated version of the running
updated new updated MRMC radio script
MRMC radio script
An internal hardware failure has been Replace the card or unit reporting the
1790 np-hw-failure Alarm Hardware failure Critical
detected by the system. hardware failure.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Reconnect line.
Loss of Signal on Line Interface 1. Line is not properly connected.
2100 STM-1-OC-3-IN-LOS Alarm Critical 2. Check line cables.
(LOS) on STM-1/OC-3 port. 2. External equipment is faulty.
3. Check external equipment.
1. Reconnect line.
Loss of Frame on Line Interface 1. Line is not properly connected.
2101 STM-1-OC-3-IN-LOF Alarm Major 2. Check line cables.
(LOF) on STM-1/OC-3 port. 2. External equipment is faulty.
3. Check external equipment.
1. Reconnect line.
Alarm Indication Signal on Line 1. Line is not properly connected.
2102 STM-1-OC-3-IN-MSAIS Alarm Minor 2. Check line cables.
Interface (MS-AIS/AIS-L) received. 2. External equipment is faulty.
3. Check external equipment.
Remote Defect Indication on Line
2103 STM-1-OC-3-IN-MSRDI Alarm Minor External equipment is faulty. Check external equipment.
Interface (MS-RDI/RDI-L) received.
1. All channels in Multi Carrier ABC
1. Check link performance.
Loss of STM-1/OC-3 Frame on Radio group are down.
2104 STM-1-OC-3-RX-LOS Alarm Major 2. Check radio alarms for channel.
Interface. 2. Incorrect configuration on remote
side. 3. Check configuration.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
STM-1-OC-3-
2107 Alarm Loopback Warning Looping. Remove looping.
LOOPBACK
STM-1/OC-3-
STM-1/OC-3 Channel Removed 1. Reduced capacity. 1. Check link performance.
2108 CHANNEL-1- Alarm Warning
alarm (due to reduced radio capacity). 2. Fading 2. Check radio alarms for channel.
REMOVED
STM-1-OC-3-PBRS-
2109 Alarm PBRS insertion. Warning PRBS insertion on STM-1/OC-3 card. Remove PRBS insertion.
INSERTION
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
STM-1/OC-3- 1. Reduced capacity. 1. Check link performance.
STM-1/OC-3 Channel Removed
2116 CHANNEL-5- Alarm Warning
alarm (due to reduced radio capacity). 2. Fading. 2. Check radio alarms for channel.
REMOVED
STM-1/OC-3- 1. Reduced capacity. 1. Check link performance.
STM-1/OC-3 Channel Removed
2117 CHANNEL-6- Alarm Warning
alarm (due to reduced radio capacity). 2. Fading. 2. Check radio alarms for channel.
REMOVED
STM-1/OC-3-
STM-1/OC-3 Channel Removed 1. Reduced capacity. 1. Check link performance.
2118 CHANNEL-7- Alarm Warning
alarm (due to reduced radio capacity). 2. Fading. 2. Check radio alarms for channel.
REMOVED
STM-1/OC-3-
STM-1/OC-3 Channel Removed 1. Reduced capacity. 1. Check link performance.
2119 CHANNEL-8- Alarm Warning
alarm (due to reduced radio capacity). 2. Fading. 2. Check radio alarms for channel.
REMOVED
1. Check link performance on all radio
channels in Multi Carrier ABC
group.
All channels in Multi Carrier ABC group
2200 MC-ABC-Local-LOF Alarm Multi Carrier ABC LOF. Critical 2. Check radio alarms for channels in
are down.
Multi Carrier ABC group.
3. Check configuration of Multi Carrier
ABC group.
1. Replace RMC.
Hardware failure between RMC and
2203 MC-ABC-Lvds-Error-Sl2 Alarm LVDS RX Error Slot 2. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2204 MC-ABC-Lvds-Error-Sl3 Alarm LVDS RX Error Slot 3. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Replace RMC.
Hardware failure between RMC and
2205 MC-ABC-Lvds-Error-Sl4 Alarm LVDS RX Error Slot 4. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2206 MC-ABC-Lvds-Error-Sl5 Alarm LVDS RX Error Slot 5. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2207 MC-ABC-Lvds-Error-Sl6 Alarm LVDS RX Error Slot 6. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2208 MC-ABC-Lvds-Error-Sl7 Alarm LVDS RX Error Slot 7. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2209 MC-ABC-Lvds-Error-Sl8 Alarm LVDS RX Error Slot 8. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
Hardware failure between RMC and
2210 MC-ABC-Lvds-Error-Sl9 Alarm LVDS RX Error Slot 9. Major 2. Replace TCC.
TCC cards.
3. Replace chassis.
1. Replace RMC.
MC-ABC-Lvds-Error- Hardware failure between RMC and
2211 Alarm LVDS RX Error Slot 10. Major 2. Replace TCC.
Sl10 TCC cards.
3. Replace chassis.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Replace RMC.
MC-ABC-Lvds-Error- Hardware failure between RMC and
2212 Alarm LVDS RX Error Slot 12. Major 2. Replace TCC.
Sl12 TCC cards.
3. Replace chassis.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2219 Alarm Warning Configuration failure.
Mismatch-Ch1 Mismatch Ch1. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2220 Alarm Warning Configuration failure.
Mismatch-Ch2 Mismatch Ch2. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2221 Alarm Warning Configuration failure.
Mismatch-Ch3 Mismatch Ch3. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2222 Alarm Warning Configuration failure.
Mismatch-Ch4 Mismatch Ch4. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2223 Alarm Warning Configuration failure.
Mismatch-Ch5 Mismatch Ch5. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2224 Alarm Warning Configuration failure.
Mismatch-Ch6 Mismatch Ch6. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2225 Alarm Warning Configuration failure.
Mismatch-Ch7 Mismatch Ch7. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Compare Channel ID configuration with
2226 Alarm Warning Configuration failure.
Mismatch-Ch8 Mismatch Ch8. remote side.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2235 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch1 Disabled Ch1.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2236 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch2 Disabled Ch2.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2237 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch3 Disabled Ch3.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2238 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch4 Disabled Ch4.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2239 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch5 Disabled Ch5.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2240 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch6 Disabled Ch6.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2241 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch7 Disabled Ch7.
MC-ABC-Ch-Id- Multi Carrier ABC Channel Id Manual
2242 Alarm Warning Admin state for channel is down. Enable admin state for channel.
Disabled-Ch8 Disabled Ch8.
Apply copy-to-mate command to copy
protection-configuration- The configuration between the
2300 Alarm Protection configuration mismatch! Major the configuration from the required All
mismatc protected devices is not aligned.
device to the other one.
protection-copytomate- The copy-to-mate command has just
2301 Event Copy to mate started Indeterminate This is a notification All
started begun!
protection-copytomate- The copy-to-mate command was
2302 Event Copy to mate completed Indeterminate This is a notification All
completed completed.
User blocked due to consecutive User blocked due to consecutive The user should wait few minutes until it
5000 failure-login-event Event Indeterminate
failure login failure login account will be unblock
g8032-protection- ERPI is either in protection state or Either user "force switch" command or Either clear force command or recover
5001 Alarm Minor
switching-alarm forced protection state one of the ring links has failed the link
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
g8032-failure-of- More than a single RPL is configured
5002 Alarm Warning User configuration Reconfigure the RPL
protocol-pm-alarm in a ring
5003 lldp-topology-change Event LLDP topology change Warning New neighbor None
security-log-upload-
5004 Event Security log upload started Indeterminate Security log upload started
started-event
security-log-upload-
5005 Event Security log upload failed Indeterminate Security log upload failed
failed-event
security-log-upload-
5006 Event Security log upload succeeded Indeterminate Security log upload succeeded
succeeded-event
5010 force-mode-alarm Alarm System is in sync force mode state Warning User command
sync-quality-change- The sync-source quality level was
5011 Event Major
event changed
system-clock-in- System Synchronization Reference in
5012 Alarm Critical
holdover-mode Holdover Mode
sync-T0-quality-change- The system's reference-quality
5013 Event Major
event changed
The pipe interface clock-source in
sync-pipe-invalid-
5014 Alarm signal-interface table is not system- Major
interface-clock-source
clock
Regenerator contains less than 2 Accomplish configuration by assigning
5015 sync-pipe-missing-edge Alarm The pipe is missing an edge interface Major
interfaces second interface
sync-pipe-interface-op- Pipe interface operational state is At least one of Regenerator Interfaces
5016 Alarm Major Checking regenerator Admin status
state-down down status is down
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
Interfaces has Configuration or
5017 sync-pipe-invalid-pipe Alarm Pipe is invalid Major Configuration not accomplished
Operation fails
soam-connectivity- Specific defect dependent: User
5030 Alarm A connectivity failure in MA/MEG Minor Reconfigure the RPL.
failure configuration , connectivity loss.
Master key mismatch cross over the
5100 mkey-mismatch Alarm Critical Master Key was not set correctly. Verify the Master Key. (1)
link
No Master Key set, default value Crypto module has been enabled, but
5101 mkey-no-exist Alarm Warning Set the Master Key. (1)
used no Master Key has been loaded.
1. Validate the MSE on both sides of
1. Radio LOF on Tx/Rx direction.
the link.
2. The session key does not match
general-encryption- 2. Validate the session key on both
5102 Alarm Payload Encryption failure Critical across the link. (1)
failure sides of the link.
1. The AES admin setting does not
1. Validate the AES admin setting on
match across the link.
both sides of the link.
Event Key Exchange Protocol successfully
5103 kep-finished Indeterminate (1)
finished
5104 kep-initiated Event Key Exchange Protocol initiated Indeterminate (1)
Event Key Exchange Protocol initiated by
5105 kep-remote-initiated Indeterminate (1)
remote side
5106 kep-zeroized Event Key Zeroization command executed Indeterminate (1)
5107 bypass-self-test-alarm Alarm FIPS Bypass Self-Test failed Critical Disk failure (1)
5108 post-fail-alarm Alarm Power On Self-Test Failed Critical System failure Reboot the unit. (1)
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
1. Try re-initiation of MIMO. If still
1. Faulty coaxial cable between
fails:
Clock-source-sharing- master and slave RFUs.
30007 Event Clock source sharing failure Critical 2. Replace faulty coaxial cable and (2)
failure-event 2. Hardware failure in Master RFU.
reset Master RFU.
3. Hardware failure in Slave RFU.
3. Replace faulty RFU.
1. Make sure all cables between
master and slave are connected
Insufficient-conditions- 1. Insufficient conditions for MIMO.
31000 Alarm Insufficient conditions for MIMO Critical (MIMO 4x4 only). (2)
for-MIMO-alarm 2. Hardware failure.
2. Replace faulty units and check that
cables are plugged.
1. Unsuitable hardware for MIMO
operation requirements.
2. Dual carrier RFUs (MIMO 2x2 and
Unsuitable-hardware- 4x4). Make sure both RFUs are compatible
31003 Alarm Unsuitable hardware for MIMO Critical (2)
for-MIMO-alarm 3. RFUs with MIMO bus interface for MIMO operation.
(MIMO 4x4).
4. Clock source sharing capability
(MIMO 4x4).
1. Not all MIMO carriers are set to
1. Load same MIMO compatible radio
same radio script or script is not
script to all MIMO carriers.
Unsuitable-software- compatible for MIMO.
Unsuitable software configuration for 2. Set same TX and RX frequency on
31004 configuration-for-MIMO- Alarm Critical 2. Radio TX and RX frequency is not (2)
MIMO all MIMO carriers.
alarm identical on all MIMO carriers.
3. Disable XPIC, Multi radio and
3. XPIC or Multi radio or ATPC
ATPC on all MIMO carriers.
features are enabled.
Alarm ID Name Type Description Severity Probable Cause Corrective Action Notes
25. Abbreviations
The following table lists the abbreviations used in this guide.
A
ABC Adaptive Bandwidth Control
ABN Adaptive Bandwidth Notification
AC Alternating Current
ACAP Adjacent Channel Alternate Polarization
ACCP Adjacent Channel Co-Polarization
ACM Adaptive Coded Modulation
ACR Adaptive Clock Recovery
AES Advanced Encryption Standard
AGC Automatic Gain Control
AIS Alarm Indicating Signal
ALC Automatic Level Control
ANSI American National Standards Institute
ASIC Application Specified Integrated Circuit
ATPC Automatic Transmit Power Control
AUX Auxiliary Unit
B
BB Baseband
BBS Baseband Switching
BER Bit Error Rate
BLSR Bidirectional Line Switch Ring
BPDU Bridge Protocol Data Units
BWA Broadband Wireless Access
C
CBS Committed Burst Size
CCDP Co-Channel Dual Polarization
Comité Consultatif International de Télégraph et des
CCITT
Télécommunications (ITU)
CET Carrier-Ethernet Transport
CFM Connectivity Fault Management
MUX Multiplexer
N
NE Network Element
NMS Network Management System
NTP Network Time Protocol
O
OAM Operation Administration & Maintenance (Protocols)
OCB Outdoor Circulator Box
OHC OverHead Connections
OMT Orthogonal Mode Transducer
OOF Out of Frame
OPEX Operational Expenditure
P
PBB-TE Provider Backbone Bridge Traffic Engineering
PBS Peak Burst Rate
PC Personal Computer
PCB Printed Circuit Board
PDV Packed Delay Variation
PIR Peak Information Rate
PLL Phase Locked Loop
PM Performance Monitoring
PN Provider Network
PROM Programmable Read Only Memory
PSN Packet Switched Network
PTP Precision Timing Protocol
PWR Power
Q
QoE Quality of Experience
QoS Quality of Service
R
RBAC Role Based Access Control
RCVR Receiver
RDI Reverse Defect Indication
RF Radio Frequency