Professional Documents
Culture Documents
INSTALLATION AND
ACE-3105, ACE-
3205
Cell-Site Gateways
Version 6.1
Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the ACE-3105,
ACE-3205 and any software components contained therein are proprietary products of RAD
protected under international copyright law and shall be and remain solely with RAD.
The ACE-3105, ACE-3205 product name is owned by RAD. No right, license, or interest to such
trademark is granted hereunder, and you agree that no such right, license, or interest shall be
asserted by you with respect to such trademark. The RAD name, logo, logotype, and the terms
EtherAccess, TDMoIP and TDMoIP Driven, and the product names Optimux and IPmux, are
registered trademarks of RAD Data Communications Ltd. All other trademarks are the property of
their respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
ACE-3105, ACE-3205. You are prohibited from, and shall not, directly or indirectly, develop,
market, distribute, license, or sell any product that supports substantially similar functionality as
the ACE-3105, ACE-3205, based on or derived in any way from the ACE-3105, ACE-3205. Your
undertaking in this paragraph shall survive the termination of this Agreement.
This Agreement is effective upon your opening of the ACE-3105, ACE-3205 package and shall
continue until terminated. RAD may terminate this Agreement upon the breach by you of any
term hereof. Upon such termination by RAD, you agree to return to RAD the ACE-3105, ACE-
3205 and all copies and portions thereof.
This product is manufactured and sold under license to U.S. Patent Re. 36,633.
For further information contact RAD at the address below or contact your local distributor.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the units use,
customers should provide for its collection for reuse, recycling or other form
of environmentally conscientious disposal.
General Safety Instructions
The following instructions serve as a general guide for the safe installation and operation of
telecommunications products. Additional instructions, if applicable, are included inside the
manual.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or service
personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while the
product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building
protective ground bus.
Some products may be equipped with a laser diode. In such cases, a label with the
laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Warning Please observe the following precautions:
Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the transmitter.
Do not attempt to adjust the laser drive current.
Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
The use of optical devices with the equipment will increase eye hazard.
Use of controls, adjustments or performing procedures other than those
specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.
Handling Energized Products
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
V.11, V.28, V.35, V.36, RS-530, X.21, SELV Safety Extra Low Voltage:
10 BaseT, 100 BaseT, Unbalanced E1, Ports which do not present a safety hazard. Usually
E2, E3, STM, DS-2, DS-3, S-Interface up to 30 VAC or 60 VDC.
ISDN, Analog voice E&M
xDSL (without feeding voltage), TNV-1 Telecommunication Network Voltage-1:
Balanced E1, T1, Sub E1/T1 Ports whose normal operating voltage is within the
limits of SELV, on which overvoltages from
telecommunications networks are possible.
FXS (Foreign Exchange Subscriber) TNV-2 Telecommunication Network Voltage-2:
Ports whose normal operating voltage exceeds the
limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are not possible. These
ports are not permitted to be directly connected to
external telephone and data lines.
FXO (Foreign Exchange Office), xDSL TNV-3 Telecommunication Network Voltage-3:
(with feeding voltage), U-Interface Ports whose normal operating voltage exceeds the
ISDN limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are possible.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line
cords.
Attention Pour rduire les risques sincendie, utiliser seulement des conducteurs de
tlcommunications 26 AWG ou de section suprieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Avertissement Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet
appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre
demand lutilisateur de prendre les mesures appropries.
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques
potentiels de scurit pour l'oprateur ou le personnel de service, quant
l'opration du produit ou sa maintenance.
Avertissement
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le
produit est sous tension ou connect des lignes externes de tlcommunications.
Franais
tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant,
sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut
aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :
Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre
optique est intact et qu'il est connect au transmetteur.
Ne tentez pas d'ajuster le courant de la commande laser.
N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans
terminaison et n'observez pas directement un rayon laser.
L'usage de priphriques optiques avec l'quipement augmentera le risque pour
les yeux.
L'usage de contrles, ajustages ou procdures autres que celles spcifies ici
pourrait rsulter en une dangereuse exposition aux radiations.
ATTENTION : Le rayon laser peut tre invisible !
Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de
tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus
particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par
l'agence et conformes la rglementation locale de scurit laser pour les produits laser de
classe 1.
Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la
maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer
l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation,
d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou
l'utilisateur.
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de
court-circuit dpassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.
Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Supplementary Information:
The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the
Low Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The
product was tested in a typical configuration.
Haim Karshen
VP Quality
Supplementary Information:
The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the
Low Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The
product was tested in a typical configuration.
Haim Karshen
VP Quality
Abis This is a GSM term for an interface linking the BTS (base
transceiver station) and the BSC (base station controller). Other
GSM interfaces are the A between the BSC and the MSC (mobile
switching center), and the E between the MSC and the PSTN.
AWG The American Wire Gauge System, which specifies wire width.
Bridge A device interconnecting local area networks at the OSI data link
layer, filtering and forwarding frames according to media access
control (MAC) addresses.
Circuit Emulation New technology for offering circuit emulation services over
Service packet-switched networks. The service offers traditional TDM
trunking (at n x 64 kbps, fractional E1/T1, E1/T1 or E3/T3) over a
range of transport protocols, including Internet Protocol (IP), MPLS
and Ethernet.
Compression Any of several techniques that reduce the number of bits required
to represent information in data transmission or storage, thereby
conserving bandwidth and/or memory.
Differential Delay Differential delay is caused when traffic is split over different lines
that may traverse shorter and longer paths. Products like the RAD
IMX-2T1/E1 inverse multiplexer compensate for any differential
delay (up to 64 msec) between the T1 lines, to properly
reconstruct the original stream.
Ethernet A local area network (LAN) technology which has extended into
the wide area networks. Ethernet operates at many speeds,
including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast
Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and
100 Gbps.
Framing At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame,
plus information about the integrity of the frame. All other
information, such as network protocols and the actual payload of
data, is encapsulated in a packet, which is encapsulated in the
frame.
GUI (Graphical User Pronounced gooey, this software interface is based on pictorial
Interface) representations and menus of operations and files. Opposite of
command line interface.
IMA (Inverse A method to pass ATM traffic over multiple E1/T1 links while
Multiplexing over ATM) keeping the ATMs Quality of Service and optimization of
bandwidth usage.
Inverse Multiplexing A method in which the inverse multiplexer slices the data stream
into equal portions and transmits each portion over an available
circuit. The receiving end adjusts for network-induced delay and
reassembles the data packets into their proper order. Therefore,
an inverse multiplexer allows lower speed channels across a
network to be combined into a single, higher speed data stream.
Master Clock The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
NMS (Network The system that controls the network configuration, fault and
Management System) performance management, and diagnostic analysis.
Payload The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.
Physical Layer Layer 1 of the OSI model. The layer concerned with electrical,
mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.
Policing A method for verifying that the incoming VC complies with the
users service contract.
Routing The process of selecting the most efficient circuit path for a
message.
Silence Suppression In a telephone conversation, only about 50% of the full duplex
connection is used at any given time. This is generally because
only one person talks while the other person listens. In addition,
voice packets are not sent during interword pauses and natural
pauses in the conversation, reducing the required bandwidth by
another 10%. Silence suppression frees this 60% of bandwidth on
the full duplex link for other voice or data transmissions.
SNMP (Simple Network The Internet standard protocol for managing nodes on an IP
Management Protocol) network.
Traffic Policing Mechanism whereby any traffic which violates the traffic contract
agreed to at connection setup, is detected and discarded.
Traffic Shaping A method for smoothing the bursty traffic rate that might arrive
on an access virtual circuit so as to present a more uniform traffic
rate on the network.
Trunk A single circuit between two points, both of which are switching
centers or individual distribution points. A trunk usually handles
many channels simultaneously.
VLAN-Aware A device that is doing the Layer 2 bridging according to the VLAN
tag in addition to the standard bridging parameters. A VLAN-aware
device will not strip or add any VLAN header.
VLAN Stacking A technique that lets carriers offer multiple virtual LANs over a
single circuit. In essence, the carrier creates an Ethernet virtual
private network to tunnel customer VLANs across its WAN; this
helps avoid name conflicts among customers of service providers
who connect to the carrier. Stacking works by assigning two VLAN
IDs to each frame header. One is a "backbone" VLAN ID used by
the service provider; the other one has up to 4,096 unique 802.1Q
VLAN tags.
Quick Start Guide
Only an experienced technician should carry out the installation of ACE-3105,
ACE-3205. If you are familiar with ACE-3105, ACE-3205, use this quick guide to
prepare the unit for operation.
Note The number and type of available ports depend on the chassis you purchased.
Lock the wire latch of each SFP module by lifting it up until it clicks into place.
For additional information, refer to Chapter 2.
Connecting to a Terminal
To connect the unit to a terminal:
1. Connect the standard DB-9 flat cable to the unit's 9-pin connector,
designated 'CONTROL'.
2. Connect the other side of the cable to the ASCII terminal equipment.
7. Check the ALM red LED on the front panel of the unit:
Blinking: One or more alarms are active
Off: No alarms.
Logging In
According to your user privileges, you may log in as super user, technician or
user. To configure ACE-3105, ACE-3205, you have to log in as super user.
Configuring Flows
Flows are needed for Ethernet pseudowires. The flows are uni-directional,
therefore separate flows have to be configured for both directions (ingress and
egress flows). Ingress and egress flows require a switched virtual interface (SVI).
Adding/Removing a Manager
To add or remove a manager to/from the manager list, do the following:
Chapter 3. Operation
3.1 Turning On the Unit ................................................................................................... 3-1
3.2 Indicators .................................................................................................................. 3-2
3.3 Configuration and Management Alternatives .............................................................. 3-3
Working with Terminal ............................................................................................ 3-4
Connecting to the Control Port ........................................................................... 3-4
Login ................................................................................................................. 3-7
Using the CLI ...................................................................................................... 3-7
Command Tree ..................................................................................................... 3-10
Working with RADview .......................................................................................... 3-27
3.4 Startup .................................................................................................................... 3-27
Configuration Files ................................................................................................ 3-27
Loading Sequence ................................................................................................. 3-28
3.5 Using a Custom Configuration File ............................................................................ 3-29
3.6 Turning Off the Unit ................................................................................................. 3-29
Chapter 4. Configuration
4.1 Terminal Control ........................................................................................................ 4-1
Factory Defaults ..................................................................................................... 4-1
Configuring the Terminal Connection ....................................................................... 4-1
Example .................................................................................................................. 4-2
4.2 User Access Levels ..................................................................................................... 4-2
Defining Users and Passwords ................................................................................ 4-2
Example .................................................................................................................. 4-3
Viewing Connected Users ........................................................................................ 4-4
4.3 Managers ................................................................................................................... 4-5
Configuring a Manager ............................................................................................ 4-5
4.4 Access ....................................................................................................................... 4-6
Configuring Access .................................................................................................. 4-7
4.5 SNMP Management .................................................................................................... 4-8
Standards ............................................................................................................... 4-8
Benefits.................................................................................................................. 4-9
Functional Description ............................................................................................ 4-9
SNMP Message Formats ................................................................................... 4-10
The SNMPv3 Mechanism ................................................................................... 4-14
Factory Defaults ................................................................................................... 4-15
Configuring for SNMP Management ....................................................................... 4-15
Specifying an SNMPv3 Engine ........................................................................... 4-15
Enabling SNMPv3 .............................................................................................. 4-16
Specifying an SNMPv3 User .............................................................................. 4-16
Defining User (Access) Groups.......................................................................... 4-17
Setting up a View ............................................................................................. 4-18
Mapping SNMPv1 to SNMPv3 ............................................................................ 4-19
Configuring Targets .......................................................................................... 4-20
Binding Managers to a Trap Synchronization Group........................................... 4-22
Viewing the Current Trap Synchronization Settings ........................................... 4-23
Configuring SNMP Communities for SNMPv1 ..................................................... 4-23
Adding SNMPv3 Notification Entries .................................................................. 4-24
Configuring a Notification Filter ........................................................................ 4-25
Configuring a Notification Filter Profile ............................................................. 4-26
Linking User (Access) Groups to an Access Control Policy .................................. 4-26
Configuring OpenView Severity ......................................................................... 4-27
Example ........................................................................................................... 4-27
1.1 Overview
RADs ACE-3105, ACE-3205 multiservice cell site gateway is specifically designed
to accommodate the rapid expansion in cellular backhaul traffic resulting from the
widespread deployment of new mobile broadband services. It simplifies service
provisioning and control by enabling simultaneous delivery of GSM, UMTS and
next-generation 3GPP/LTE Wimax traffic over the same transport network.
Working opposite the ACE-340x, ACE-3600 or third-party aggregation site
gateways, ACE-3105, ACE-3205 minimizes capital investments and shortens
service rollout times by leveraging available ATM SDH/SONET infrastructure to
access high-capacity, economical packet-switched transport networks.
Typically located at the BTS or Node B site (cell site), ACE-3105, ACE-3205
aggregates traffic from E1/T1 and Ethernet interfaces, and transmits the traffic
over or Ethernet uplinks. ACE-3105, ACE-3205 provides different
aggregation/switching abilities over different types of networks:
Over DSL backhauling data and voice traffic over two separate transports
DSL networks, using the dual uplink in order to backhaul voice (RTdelay
sensitive) traffic over bonded SHDSL.bis and/or data traffic (HSDPA) over
ADSL2+.
Over packet-switched networks (PSNs) aggregating multiservice protocols
(ATM and TDM) over packet-switched networks, such as Ethernet, MPLS and
IP networks, by utilizing pseudowire (PW) connections that are established by
ACE-3105, ACE-3205 over the PSN. These virtual pseudowires comprise
uniquely-formatted Ethernet packets, which provide complete emulation of
ATM/TDM services (UNI/IMA/CES/SAT) over all types of packet-switched
networks.
Device Options
ACE-3105, ACE-3205 is a standalone, fully assembled non-modular unit.
ADSL2+ Interfaces
The one or two modular ADSL2+ interfaces (per module) support ADSL2+ over
POTS (Annex A) and ADSL2+ over ISDN (Annex B), as well as auto-mode
synchronization to ADSL/ ADSL2/ ADSL2+ (complying with G.992.1/ G.992.3/
G.992.5).
SHDSL Interfaces
The up to four modular SHDSL.bis interfaces support SHDSL Annex A (in North
America), Annex B (in Europ1) and SHDSL.bis Annex F & G.
In addition, ACE-3105, ACE-3205 uses the Ethernet First Mile protocol (RFC 5066
and 802.3 sec. 5) to implement SHDSL EFM.
SHDSL EFM is always CPE. For ACE-3105, the SHDSL EFM is available as CO as an
ordering option.
PCS
The SHDSL EFM supports a single PCS, which binds all SHDSL wires together into
one bridge port.
E1/T1 Interfaces
ACE-3205 includes 8 or 16 E1 or T1 multiservice ports while ACE-3105 includes 4
or no E1 or T1 ports. The E1/T1 ports can be configured to work in ATM UNI/IMA
or TDM mode. This Any-Service-Any-Port framework enables high flexibility in
deployment within various backhaul solutions.
The E1 ports are available with balanced or unbalanced interfaces (via an optional
RJ-45 to BNC adapter cable).
Power Supply
ACE-3205 is supplied with one or two power supplies at the front, which can be
either AC-powered (100240 VAC) or DC-powered (24/-48/-60 VDC).
ACE-3105 is supplied with one power supply at the rear, which can be either
AC-powered (100240 VAC) or DC-powered (24/-48/-60 VDC).
Clock Synchronization
ACE-3105, ACE-3205 provides robust clock synchronization and flexible timing
modes, including:
Clock recovery a dedicated clock recovery module (optional) allows
ACE-3105, ACE-3205 to adaptively recover the clock from a source device
that distributes the clock signal over a packet-switched network.
High precision clock recovery is performed according to the IEEE 1588-2008
requirements.
Synchronization over packet transport networks (Sync-E) as performed
according to the ITU-T G.8261/G.8262 requirements.
NTR clock recovery ACE-3105, ACE-3205 supports clock synchronization via
NTR over SHDSL. In this case, the DSLAM provides the clock reference via the
DSL connection.
Unicast clock distribution the master clock is distributed with a dedicated
stream towards up to 32 remote PSN peers via pseudowire connections.
Multicast clock distribution the master clock is distributed towards the PSN
using a single IP multicast clock stream (IGMPv2 host) via pseudowire
connections.
1588-2008 and Sync-E synchronization.
ACE-3105, ACE-3205 can be ordered with clock recovery hardware components
as specified below. Activating the clock recovery hardware requires P2 or P3 as
software license packs.
P2 includes the functionalities of license packs P1 and P3 P5. These license
packs support specific functionalities as listed under License Packs and can be
ordered separately at a later stage.
License Packs
Available software license packs are:
P1 ATM and PSN functionality, not including clock recovery over packet
P2 Complete functionality, including clock recovery over packet
P3 ATM and PSN uplink including software support for synchronization over
packet, and MPLS LDP software functionality
P4 ATM and PSN uplink, including MPLS LDP software functionality, not
including clock recovery over packet
P5 MPLS LDP software functionality only
Applications
In a typical 3G over PSN application, ACE-3105, ACE-3205 receives ATM-based
traffic from the Node B unit and TDM-based traffic from the BTS. HSDPA traffic is
transmitted over ADSL2+ and voice traffic over SHDSL using pseudowire
connections. The traffic is then received at the central site by ACE-3400/3402 or
ACE-3600, which transmits it towards the RNC and BSC units, by using
STM1/OC-3c, N E1 (IMA), N E1/T1 TDM and Fast Ethernet traffic bridged over
DSL or Gigabit Ethernet.
ACE-3105, ACE-3205 uses either an ADSL2+ or an SHDSL uplink, as shown in the
following figure:
Features
ACE-3105, ACE-3205 aggregates both data and voice traffic simultaneously using
the SHDSL and ADSL2+ interfaces together.
Bridging Capabilities
ACE-3105, ACE-3205 supports the bridging capabilities listed below. For
additional information, refer to Bridge in Chapter 4.
LAN-to-LAN Bridging
In addition to ATM and TDM over DSL backhauling, LAN-to-LAN bridging facilitates
backhauling of Ethernet traffic originating from the cellular site/IP Node B
towards the PSN.
tunnels endpoints fails and the Keep Alive message cannot be sent anymore, the
system can switch to a redundant path.
Clock Synchronization
Robust clock synchronization and flexible timing modes include the following:
Clock recovery a dedicated clock recovery module (optional; requires a
software license) allows ACE-3105, ACE-3205 to adaptively recover the clock
from a source device that distributes the ATM clock over a packet-switched
Ethernet
ACE-3105, ACE-3205 provides comprehensive monitoring and diagnostic
capabilities on Fast Ethernet and Gigabit Ethernet interfaces according to
802.3ah, which include:
User configurable active and passive mode
Remote failure indications
Remote OAM link event link fault
Remote OAM link event dying gasp
OAM loopback (initiation/reacting in Active mode and reacting in Passive
mode)
The link OAM (802.3ah) is a trigger for alarm (fault) propagation towards the
ATM\TDM network.
When working with Ethernet redundancy, a remote link fault event will trigger
a port switch.
For additional information, refer to Ethernet OAM in Chapter 4.
Pseudowires
ACE-3105, ACE-3205 periodically verifies the connectivity status of pseudowire
connections, using VCCV-BFD messages according to the 'draft-ietf-bfd-base'
requirements. If a failure is detected, a notification is sent to both the remote
peer and the ATM/TDM connection of the specific PW. This allows complete
monitoring over the pseudowire connections in real-time.
External and internal physical loopbacks on the E1/T1 ports
(user-configurable) as explained in Physical Loopback Tests under E1 Ports
and T1 Ports in Chapter 4.
Cell test towards the ATM ports as explained under ATM Cell Tests in
Chapter 4.
ATM/TDM
In addition, ATM/TDM and PSN port alarms are propagated over the
packet-switched network from end to end, towards both the BTS/Node B side
and the BSC/RNC side. This includes the mapping of:
Packet-switched network alarms to ATM/TDM alarms
ATM/TDM alarms over the PSN to the remote customer equipment (CE)
Physical failures of ATM/TDM ports, over the packet-switched network
towards both the local and remote CE.
ATM Cross-Connects
Performance Monitoring
Performance monitoring is provided by Ethernet and IP-layer network condition
statistics, such as packet sequence errors (loss or misorder) and packet delay
variation (jitter), which are monitored and stored by the device.
ACE-3105, ACE-3205 collects statistics per physical port and per connection for
15-minute intervals. Statistics for the last 6 hours are stored in the device and
can be retrieved at the network management station. For additional information,
refer to the Statistics section for the relevant port in Chapter 4, for example
Viewing an Ethernet Ports Statistics under Ethernet Ports .
ACE-3105, ACE-3205 maintains a cyclic event log file that stores up to 2000
time-stamped events. In addition, an internal system log agent can send all
reported events to a centralized repository or remote server. For additional
information, refer to Alarms and Traps in Chapter 5
Management
ACE-3105, ACE-3205 can be managed using different access methods, via:
The dedicated RS-232 or 10/100BaseT ports (out-of-band, when the port is
not used for Ethernet traffic or clock recovery)
Ethernet uplink port, using IP-based connection (raw IP or over PW).
The unit can be fully managed and controlled using the following:
DHCP Client
One DHCP client can be enabled for a router interface defined over an Ethernet
interface or a VC operating in bridged PDU mode.
Security
ACE-3105, ACE-3205 supports the Secure Socket Layer (SSL) protocol for
enabling secure Web access to the unit. If enabled, the SSL protocol encrypts the
data between the TCP and HTTP Web layers.
Telnet-like management can be secured using a Secure Shell (SSH) client/server
program. Instead of sending plain-text ASCII-based commands and login requests
over the network, SSH provides a secure communication channel.
User access to the unit is restricted via user name and password. For more
information, refer to Access in Chapter 4.
In addition, ACE-3105, ACE-3205 supports SNMP version 3, providing secure
access to the device by authenticating and encrypting packets transmitted over
the network. For more information, refer to The SNMPv3 Mechanism in Chapter
4.
The unit is fully accessible from the front panel, which includes the interface
ports, control connector and LED indicators. ACE-3105, ACE-3205 has one or two
power connectors on its front panel.
For information about the initial installation and required cable connections, refer
to Chapter 2. For information about the unit's operation and LED indicators,
refer to Chapter 3.
Interfaces
ACE-3105, ACE-3205 is equipped with Fast Ethernet and E1/T1.
SFP interface is inserted,
ACE-3105, ACE-3205 includes 8 or 16 E1 or T1 multiservice ports that can be
configured to work in ATM UNI/IMA or TDM mode. This Any-Service-Any-Port
framework enables high flexibility in deployment within various backhaul
solutions.
The E1 ports are available with balanced or unbalanced interfaces (via an optional
RJ-45 to BNC adapter cable).
For detailed specifications and compliance of the E1/T1 interfaces, refer to
Technical Specifications. For the connector pinouts, refer to Appendix A.
ACE-3105, ACE-3205 includes two Fast Ethernet RJ-45 or SFP ports, used for
pseudowire (PW) connectivity, user connections and inband management access.
The Ethernet ports are also used for out of band management in applications
that do not utilize an Ethernet uplink.
The Ethernet interfaces can be ordered as electrical (RJ-45) or fiber optic ports.
The fiber optic ports utilize hot swappable Ethernet-compliant SFPs.
Framing ESF
Unframed
Connectors RJ-45
Type ACE-3105:
AC/DC: 100240 VAC or -40/-60 VDC
(wide range)
ACE-3205:
AC: 100 to 240 VAC (10%), 50/60 Hz
DC: -48 VDC nominal (-41 to -71 VDC)
or 24 VDC nominal (20 to 36 VDC)
Note
Since ACE-3105, ACE-3205 units or other devices in use generate their own heat,
the actual ambient temperature may be higher than the room temperature if
several units are placed next to or on top of each other (such placement is
allowed as long as the ambient temperature does not exceed the specified
above).
Power Cable
AC-powered ACE-3105, ACE-3205 units are equipped with an appropriate power
cord (country or region dependent). It is used to connect the power socket of the
power supply unit to the mains. The power socket is accessible from the front
panel.
DC-powered ACE-3105, ACE-3205 units are equipped with an appropriate DC
connection kit, which should be used for preparing the DC cable connection.
Interface Cables
Refer to the following table to determine what cables and connectors are
required for installation. Appendix A specifies the wiring of all connector pinouts.
Note The SFP you are installing may have a different wire latch or closing mechanism. If
this is the case, refer to its manufacturer instructions.
If the SFP module does not click into place, remove the SFP, lock it properly and
then re-insert the SFP module into the port.
2. Connect the other end of each cable to the relevant packet-switched network
equipment.
Note If the SFP you are installing has a different wire latch or closing mechanism, refer
to its manufacturer instructions.
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to supervisory
terminal port.
Connecting to AC Power
AC power is supplied to ACE-3105, ACE-3205 via a 3-prong plug. AC power should
be supplied through the 1.5m (5 ft) standard power cable terminated by a 3-
prong plug. The cable is provided with the unit.
In ACE-3105, ACE-3205, two power cables may be connected to the unit
simultaneously.
Connecting to DC Power
To connect ACE-3105, ACE-3205 to DC power:
Refer to the DC power supply connection supplement, located on the
Technical Documentation CD or at the back of the official printed version of
this manual. Also, refer to the safety instructions at the beginning of this
manual.
Once turned on, ACE-3105, ACE-3205 requires no operator attention, with the
exception of occasional monitoring of front panel indicators. Intervention is
required only when:
ACE-3105, ACE-3205 must be configured to its operational requirements.
The Alarm LED indicator indicates an alarm.
Diagnostic tests are performed.
3.2 Indicators
The front panel of ACE-3105, ACE-3205 incorporates LED indicators that show
the current operating status of the unit and its different ports. Figure 3-1 and
Figure 3-2 illustrate the ACE-3105 and ACE-3205 front panel respectively:
The following table summarizes the function of all LED indicators in ACE-3105,
ACE-3205.
Table 3-1. System LED Indicators
ALM Red On: One or more alarms are active. Refer to list
of alarms in Chapter 5
Off: No active alarms
11. Press <ENTER> until the login prompt appears. Refer to the next section for
details on logging on.
Login
To access the unit's management/configuration/monitoring options, you must
log in.
ACE-3105, ACE-3205 supports two access levels
Superuser can perform all the activities supported by the ACE-3105, ACE-
3205 management facility, including defining new users.
Users access rights (full control or read only) are defined by the superuser.
Users are not allowed to create new users.
To enter as Superuser:
1. At the User prompt (user>), Enter su and press <Enter>.
The Password prompt (password>) appears.
2. Enter 1234 as password and press <Enter>.
The base prompt ACE-3105# or ACE-3205# appears.
Superuser allows you to configure all parameters of ACE-3105, ACE-3205 and to
change the su and user passwords.
To enter as User:
1. Enter user as user name and press <Enter>.
2. Enter 1234 for password.
The base prompt ACE-3105# or ACE-3205# appears.
ACE-3105, ACE-3205#
ACE-3105, ACE-3205# configure port ethernet 1 loopback local
ACE-3105, ACE-3205# show configure port ethernet 1 loopback
Loopback : Local Forever
ACE-3105, ACE-3205#
In the example below, the levels were typed separately and the navigation is
reflected by the changing prompt.
You can type only as many letters of the level or command as required by the
system to identify the level or command, for example you can enter
config manage to navigate to the management level.
In addition to being the default prompt, the # symbol also indicates a static entity
(such as a port) or already configured entity. The $ symbol indicates a new
dynamic entity (such as a flow) that takes several commands to configure. The
dynamic entity is created as inactive. After the configuration is completed, it is
activated by using the no shutdown command, as shown in the example below.
ACE-3105, ACE-3205#
ACE-3105, ACE-3205# configure
ACE-3105, ACE-3205>config# port
ACE-3105, ACE-3205>config>port# ethernet 1
ACE-3105, ACE-3205>config>port>eth(1)# loopback local
ACE-3105, ACE-3205>config>port>eth(1)# show loopback
Loopback : Local Forever
ACE-3105, ACE-3205>config>port>eth(1)#
CLI commands can be gathered into text files called scripts. They can be created
using a text editor, by recording the user commands or by saving the current
configuration. The scripts can be imported from and exported to RAD devices via
file transfer protocols.
Command Tree
At the CLI root, the following categories are available:
version
self-test
admin
file
configure
Each category is detailed in the tables below.
Command Description
GlobalCommands
| save
Command Description
Command Description
Command Description
Command Description
Command Description
| terminal
| | baud-rate
| | timeout
Command Description
| | queue-map-profile
| | | map
| | e1 Specifies E1 parameters
| | t1 Specifies T1 parameters
Command Description
| | | restoration-time Time req. for port to resume normal oper after LOF
| | | line-length
| | j1 Specifies J1 parameters
| | | restoration-time Time req. for port to resume normal oper after LOF
| | | line-length
Command Description
Command Description
Command Description
| | logical-mac
| | | bind
| | | show oam-efm
| | | show oam-efm-statistics
| | ppp
| | | bind
| | | authentication
Command Description
| | | access-authentication
| | | pppoe
| | | | ac-name
| | | | service-name
| | | | scheduled-restart
| | | | backoff-random-range
| | | | vlan
| | | show status
| | | show oam-efm
| | | show oam-efm-statistics
Command Description
| | | show status
Command Description
| | | | show status
| | | server
| | | | trap-source-address
| | | snmp-engine-id
| | | snmpv3
| | | | show information
| | | user
| | | | authentication
| | | | privacy
| | | | shutdown
| | | access-group
| | | | shutdown
| | | | context-match
| | | | read-view
Command Description
| | | | write-view
| | | | notify-view
| | | security-to-group
| | | | group-name
| | | | shutdown
| | | view
| | | | shutdown
| | | | mask
| | | | type
| | | community
| | | | name
| | | | sec-name
| | | | shutdown
| | | | tag
| | | target-params
| | | | message-processing-model
| | | | version
| | | | security
| | | | shutdown
| | | target
| | | | target-params
| | | | address
| | | | shutdown
| | | | tag-list
| | | | trap-sync-group
| | | notify
| | | | shutdown
| | | | tag
| | | | bind
| | | notify-filter
| | | | shutdown
| | | | type
| | | | mask
| | | notify-filter-profile
Command Description
| | | | profile-name
| | | | shutdown
| | | show trap-sync
| | | trap-sync-group
| | | | target-params
| | | | tag-list
| | | community
| | | ov-severity-in-traps
| | | trap-mask
| | access
| | show users
| flows
| | classifier-profile
| | | match
Command Description
| | flow
| | | shutdown
| | | classifier
| | | mark
| | | | vlan
| | | | p-bit
| | | vlan-tag
| | | ingress-port
| | | egress-port
| | show summary
| | pw Create/delete Pseudo-wire
Command Description
| | product-name
Command Description
| | tftp
| | sftp
| | | | debug
| | | | | dbg-mode
| | | | | dbg-logger
| | | | | dbg-acqusition-switch
| | | | | dbg-smart-delta-switch
Command Description
| | | | | dbg-smart-self-test
| | | | | dbg-smart-delta-timeout
| | | | | dbg-bw-adaptive-switch
| | | | | dbg-const-delay-change
| | | | | dbg-freeze-system
| | | | | dbg-bw-adapter-lower-level
| | | | | dbg-bw-adapter-upper-level
| | | | | dbg-adaptive-jb-reset
| | | | | dbg-adaptive-sw-reset
| | | | | dbg-cdc-threshold-track1
| | | | | dbg-cdc-threshold-track2
| | | | | dbg-frequency-deflection
| | | | | dbg-threshold-exit-slip
| | | | | dbg-sdt-threshold
| | | | | dbg-sdt-threshold-hysteresis
| | | | | dbg-sliding-window
| | | | | dbg-pvd-adev-target
| | | | | dbg-pvd-adev-trg-indf-zone
| | | | | show dbg-counters
Command Description
Command Description
3.4 Startup
Configuration Files
The following files contain configuration settings:
factory-default Contains the manufacturer default settings
running-config Contains the current configuration that is different from the
default configuration
startup-config Contains saved non-default user configuration. This file is
not automatically created. You can use the save or copy command to create
it.
user-default-config Contains default user configuration. This file is not
automatically created. You can use the copy command to create it.
main-sw Contains the active software image.
Refer to File Operations in Chapter 4 for details on file operations.
Note The save command is used to save the user configuration. Some commands that
reset the device also erase the saved user configuration by copying another file
to it before the reset. Refer to Figure 3-9for details.
Loading Sequence
At startup, the device boots from the startup-config file, the user-default file, or
the factory-default file, in the sequence shown in Figure 3-10 . If none of these
files exist, the device boots using hard-coded defaults.
If the loading of startup-config or the user-default file fails, the loading failure
event is registered in the event log.
To display the parameter values after startup, use the info [detail]
command.
Factory Defaults
The table below lists the factory defaults of the terminal connection.
Note Terminal parameters can only be configured when using a terminal connection.
Example
The example below illustrates how to set up a terminal connection.
Notes User passwords are stored in a database so that the system can perform
password verification when a user attempts to log in. To preserve
confidentiality of system passwords, the password verification data is typically
stored after a one-way hash function is applied to the password, in
combination with other data. When a user attempts to log in by entering a
password, the same function is applied to the entered value and the result is
compared with the stored value.
A cryptographic hash function is a deterministic procedure that takes an
arbitrary block of data and returns a fixed-size bit string, the (cryptographic)
hash value, such that any change to the data changes the hash value.
Note To add a user or change the password of an existing user, you must be logged on
as a super user.
To add an additional user with the same password using the hash function:
1. At the user prompt config>mngmnt> prompt, enter info detail and press
<Enter> until you get to the first users password hash value as illustrated
below.
ACE-3105, ACE-3205>config>mngmnt# info detail
user "staff1" level user password
"3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
2. Define another user with the hashed password obtained from the info
output.
The second user is added and can log on with the text password defined
in step 1.
Example
To add a super user with a text password:
Specify the user name staff for the user level su.
Assign the password 1234.
ACE-3105, ACE-3205>config>mngmnt# user staff level su password 1234
# Password is encrypted successfully
ACE-3105, ACE-3205>config>mngmnt#
To add two new users with identical passwords using the hash function:
Assign the user name staff1.
Assign the password 4222.
Assign the user name staff2.
Assign the same password 4222 to staff2 by linking the hash output to
staff2.
ACE-3105, ACE-3205>config>mngmnt# user staff1 level user password 4222
# Password is encrypted successfully
ACE-3105, ACE-3205>config>mngmnt# info
user "staff1" level user password
"3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
user "su"
ACE-3105, ACE-3205>config>mngmnt#
4.3 Managers
This section explains how to add and remove managers and mask traps
associated with the respective manager.
Configuring a Manager
This section explains how to add and remove managers. You can add up to 16
managers. In addition, you can mask and unmask all traps or specific ones for a
specific manager.
To add a manager:
1. At the config# prompt, enter management.
The config>mngmnt# prompt appears.
2. At the config>mngmnt# prompt, enter manager <0.0.0.0..255.255.255.255>.
The specified manager has been added and the
config>mngmnt>manager <0.0.0.0..255.255.255.255> prompt appears
displaying the IP address of the manager you just added.
To unmask traps (that have been previously masked) for a specific manager:
At the config>mngmnt>manager <0.0.0.0..255.255.255.255> prompt, enter
no trap-mask {all|adsl-tx-rate|agent-status|atm-lcd|atm-line-ais|atm-line-
febe|atm-line-rdi|atm-lof|atm-lop|atm-los|atm-path-ais|atm-path-rdi|atm-
section-bip|atm-slm|atm-vc-ais-reception|atm-vc-continuity-loss|atm-vc-
loopback|atm-vc-rdi-reception|atm-vp-ais-reception|atm-vp-continuity-
loss|atm-vp-loopback|atm-vp-rdi-reception|authentication-failure|bfd-session-
up-down|cold-start|fan-failure|ima-group-status|ldp-session-up-down|license-
update|link-up-down|port-status|power-failure|pw-up-down|recovered-clock-
frequency-alarm|recovered-clock-state|self-test-result|sonet-line-ais|sonet-
line-rdi|sonet-lof|sonet-los|sonet-path-ais|sonet-path-rdi|station-clock-
failure|tftp-status|upload-data|csm-domain-state|csm-source-status}
The included traps will be displayed to the respective manager.
To delete a manager:
At the config>mngmnt# prompt, enter
no manager <0.0.0.0..255.255.255.255>.
The specified manager has been removed.
4.4 Access
You can enable or disable access to the ACE-3105, ACE-3205 management
system via Telnet, SSH, or SNMP applications for a specific router interface. By
disabling Telnet, SSH, or SNMP, you prevent unauthorized access to the system
when security of the associated IP address has been compromised. When Telnet,
SSH, and SNMP are disabled, ACE-3105, ACE-3205 cannot be managed using the
relevant router interface. If Telnet, SSH and SNMP are disabled for all router
interfaces, the unit can be managed via an ASCII terminal only. In addition, you
can limit access to the device to only the defined management stations.
In addition, ACE-3105, ACE-3205 can use up to four RADIUS servers to facilitate
remote authentication. Introducing a RADIUS server allows configuring up to two
authentication protocols according to a user-configured order. If the first
authentication method is unavailable or the user is not found, the next method is
used.
The table below lists management access implementation, according to the
defined management access and whether network managers are defined.
Configuring Access
Follow the instructions below to enable/disable access via Telnet, SSH or SNMP. In
addition, you have to configure the access policy
Enabling access via Telnet for telnet managers-only To allow Telnet access to pre-defined
managers only managers only, you have to first
block Telnet access if Telnet access is
curently allowed to everybody.
Enabling access via Secure Shell (SSH) ssh managers-only To allow SSH access to pre-defined
for managers only managers only, you have to first
block SSH access if SSH access is
curently allowed to everybody.
Enabling access via SNMP for snmp managers-only To allow SNMP access to pre-defined
managers only managers only, you have to first
block SNMP access if SNMP access is
curently allowed to everybody.
Standards
This section states the standards that the supported SNMP versions are based
on.
RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working
Group.
RFC 1902, Structure of Management Information for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group.
RFC 1903, Textual Conventions for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
RFC 1904, Conformance Statements for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
RFC 1905, Protocol Operations for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
RFC 1906, Transport Mappings for Version 2 of the Simple Network
Management Protocol (SNMPv2).
RFC 1907, Management Information Base for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group.
RFC 1908, Coexistence between Version 1 and Version 2 of the Internet-
standard Network Management Framework. SNMPv2 Working Group.
Benefits
The SNMP protocol allows you to remotely manage multiple units from a central
work station using RADview EMS. RADview EMS offers a graphical user interface
that resembles the front panel of your unit with its interfaces and LEDs.
ACE-3105, ACE-3205 supports SNMPv3, which allows data to be collected
securely from SNMP devices. Confidential information such as SNMP commands
can thus be encrypted to prevent unauthorized parties from being able to access
them.
Functional Description
In an SNMP configuration, one or more administrative computers manage a group
of hosts or devices. Each managed system continuously executes a software
component called agent, which reports information via SNMP back to the
managing systems.
The SNMP agent contains MIB variables whose values the SNMP manager can
request or change. A manager receives/transmits a value from/to an agent. The
agent gathers data from the MIB (Management Information Base). A MIB module
is actually the store for data on network and device parameters. In addition, the
agent may set or get data according to manager commands. Commands are used
to send and receive data as follows:
get. Retrieving specific management information.
get-next. Retrieving management information via traversal
set. Manipulating management information.
get-response. Sent by an agent to respond to any of the above.
trap. Messages on events such as improper authentication, link status,
loss/restoration of connections etc, sent by the agent to notify the manager
of the current conditions.
Community Octet string Variable Community String. Identifies the SNMP community in which
the sender and recipient of this message are located. This
is used to implement the simple SNMP community-based
security mechanism.
PDU -- Variable Protocol Data Unit. The PDU is communicated at the body
of the message.
0 16 32
Version Number = 0
Community String
0 16 32
Message Identifier
Context Engine ID
Context Name
Scoped PDU
PDU Control Fields
0 4 8
Privacy Authen-
Reportable tication
Reserved Flag Flag
Flag
(Priv)
(Auth)
Msg Version Integer 4 Message Version Number. Describes the SNMP version
number of this message; used for ensuring compatibility
between versions. For SNMPv3, this value is 3.
Msg Max Size Integer 4 Maximum Message Size. The maximum size of message that
the sender of this message can receive. Minimum value of
this field is 484.
Msg Flags Octet String 1 Message Flags. A set of flags tcontrols processing the
message. the substructure of this field is illustrated in
Table 4-3.
Msg Security Integer 4 Message Security Model. An integer value indicating which
Model security model was used for this message. For the user-
based security model (default), this value is 3.
Msg Security -- Variable Message Security Parameters. A set of fields that contain
Parameter parameters required to implement the respective security
model for this message. The contents of this field are
specified in every document that describes an SNMPv3
security model. For example, the parameters for the user-
based model are defined in RFC 3414.
Scoped PDU -- Variable Scoped PDU. Contains the PDU to be transmitted along
with parameters that identify an SNMP context, which
describes a set of management information accessible by a
particular entity. The PDU is referred to as scoped
because it is applied within the scope of this context. This
field may or may not be encrypted, depending on the value
of the Private Flag. The structure of the PDU field is
illustrated in Table 4-4.
Reportable Flag 1/8 (1 bit) Reportable Flag. If set to 1, a device receiving this message has
to return a Report-PDU whenever conditions arise that require
such a PDU to be generated.
Priv Flag 1/8 (1 bit) Privacy Flag. If set to 1, it indicates that the message was
encrypted to ensure its privacy.
Auth Flag 1/8 (1 bit) Authentication Flag. If set to 1, it indicates that authentication
was used to protect the authenticity of this message.
Context Engine ID Octet String Variable Context Engine ID. Used to identify to which
application the PDU will be sent for processing.
Context Name Octet String Variable Context Name. An object identifier specifying the
particular context associated with this PDU.
SNMPv3 Components
SNMPv3 consists of components that deal with receiving/issuing requests,
generating traps etc. These commands are listed and explained below.
Factory Defaults
By default, SNMPv1 is enabled. SNMPv2c and SNMPv3 are disabled.
Enabling SNMPv3
To enable/disable SNMPv3:
To enable the SNMPv3 engine, at the config>mngmnt>snmp# prompt, enter
snmpv3.
The SNMPv3 engine is enabled.
To disable the SNMPv3 engine, at the config>mngmnt>snmp# prompt, enter
no snmpv3.
The SNMPv3 engine is disabled.
Adding a user who user <security-name> security name. The user specific security
authenticates using the [md5-auth [{des|none}]] name, consisting of up to 32 alphanumeric
MD5 protocol. characters.
md5-auth. MD5 authentication protocol.
des. Using the DES privacy protocol.
none. No privacy protocol used.
To deactivate a user:
1. At the config>mngmnt>snmp# prompt, enter user <security name>.
The config>mngmnt>snmp>user(<security name>)# prompt appears.
2. Enter shutdown.
The user is deactivated but remains available.
Defining access matching criteria context-match {exact|prefix} exact. In order to gain access rights,
the group name must match exactly
the value of the instance of this
project.
prefix. The group name must match
partially the value of the instance of
this project.
Setting up a View
To define a view:
At the config>mngmnt>snmp# prompt, enter parameters as illustrated and
explained in the table below.
The mngmnt>snmp>view(<view name>/<subtree OID>)# prompt appears.
Masking a view mask <mask> subtree OID mask (for example, the
standard mask 1.1.1 converts
1.3.6.7.8 OID to 1.3.6)
Specifying the SNMPv3 security name sec-name <sec-name> sec-name. Free text, consisting of
to be mapped to the SNMPv1/SNMPv2 up to 32 alphanumeric characters
community name
Specifying a set of the transport tag <transport-tag> As defined for each target
endpoints that are used in either of
the following methods:
Specifying the transport endpoints
from which an SNMP entity accepts
management requests.
Specifying the transport endpoints
to which a notification may be sent,
using the community string
matching the corresponding
instance of community name.
Configuring Targets
A target is a network management station to which ACE-3105, ACE-3205 should
send trap notifications over SNMPv3. A set of parameters must be configured and
assigned to each target. Then, each target must have a valid IP address and IP
mask. In addition, a previously configured parameter set and notification tags
must be assigned to the target.
To configure a target, you have to first configure a parameter set that you will
have to attach to the relevant target when it is being configured.
Identifying the address udp-domain <0.0.0.0..255.255.255.255> You have to enter the domain
target NMS address oam-domain <oam-port> and the IP address or the OAM
port, depending on whether
the target NMS belongs to a
UDP domain or an OAM
domain.
Note A manager can be associated with one trap synchronization group only.
A trap synchronization group is created once the first manager is added and
deleted once the last manager is removed from it.
Managers being added to an existing trap synchronization group require
identical parameters such as the same target parameter set, tag list etc.
Specifying traps to be part of the trap-mask {all|list-of-trap-names} all. All traps are included.
trap mask in the trap syny group. list-of-trap-names. Traps
that are listed on the list of
trap names are included.
ACE-3105, ACE-3205>config>mngmnt>snmp#
To set up communities:
Make sure that SNMPv3 is disabled and at the
ACE-3105, ACE-3205>config>mngmnt>snmp# prompt, define the desired
community as illustrated and explained below.
Note
The names you assign to the communities are case sensitive.
ooOpti
To disable notification:
At the config>mngmnt>snmp# prompt, enter no notify <notify_name>.
The notification is disabled.
Defining if the notification filter includes type {included|excluded} included. The subtrees defined by
or excludes specific notifications. sub-tree-oid are included in the
notification profile.
excluded. The listed subtrees by
sub-tree-oid excluded from the
notification profile.
Assigning a name to the notification profile-name <name> Refers to the name of the profile
profile itself
Example
This example illustrates how to define an access control policy for two users and
link these two users to a user group.
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS).
RFC 2618, RADIUS Authentication Client MIB.
Benefits
The RADIUS protocol allows centralized authentication and access control,
avoiding the need of maintaining a local user data base on each device on the
network.
Because of its generic nature, the RADIUS protocol can easily be used by service
providers and enterprises to manage access to the Internet, internal networks,
Functional Description
A work station attempts to log on to an ACE unit, which in turn submits an
authentication request to the RADIUS server.
The password is not transmitted over the network. A hash code is generated over
it instead and a previously defined shared secret (string of free text) between
RADIUS server and ACE unit is transmitted.
The RADIUS server verifies the user information against a database stored at the
RADIUS server. The RADIUS server replies in one of the following ways:
Access Rejected. Access to all resources denied.
Access Accepted. Access to the requested network resources granted.
Factory Defaults
Task Command
Changing the UDP port used for the auth-port <1.. 65535>
authentication channel
ACE-3105, ACE-3205>config>mngmnt>radius#
Benefits
Configuring a dedicate management port eliminates the possibility that
management traffic reduces bandwidth and/or causes interruptions in the traffic
flow caused by the management.
Note When configuring a flow over an Ethernet port, you cannot configure the
respective port to be the uplink port of a PW or bridge port.
Enabling Ethernet OAM EFM efm {<OAM EFM descriptor ID>} descriptor. Enter the
descriptor of the OAM
EFM descriptor you added
as explained under
Configuring Ethernet
OAM.
Note To configure IP addresses for remote addresses, you have to set up a router
interface and bind the desired Ethernet pot to it as explained under Router.
Example
The following section explains how to configure the Fast Ethernet port labeled 1
on the front panel, and one of the Gigabit Ethernet combo ports.
This Ethernet ports are administratively enabled by default.
To configure the Ethernet port at 100 Mbps with auto negotiation enabled:
Enable auto negotiation.
Set the max capability to 100 Mbps Full Duplex.
ACE-3105, ACE-3205>config>port>eth(1)# auto-negotiation
ACE-3105, ACE-3205>config>port>eth(1)# max-capability 100-full-duplex
To configure the Ethernet port at 100 Mbps with auto negotiation disabled:
Disable auto-negotiation.
Set the Ethernet ports default rate to 100 Mbps and the duplex mode to Full
Duplex.
ACE-3105, ACE-3205>config>port>eth(1)# no auto-negotiation
ACE-3105, ACE-3205>config>port>eth(1)# speed-duplex 100-full-duplex
Administrative Status : Up
Operational Status : Up
Connector Type : RJ45
Speed And Duplex (RJ-45) : 100 Full Duplex
MAC Address : 00-20-D2-AA-BB-04
ACE-3105, ACE-3205>config>port>eth(1)#
Parameter Comments
Time Elapsed The time (in seconds) since the port was enabled
Interval Number In case of show-statistics <1..24>. Displays the results for the time interval
you chose. You can select interval 1 till 24.
In case of show-statistics interval-all or show-statistics all. Displays the
Parameter Comments
results all intervals. The system displays the results for one interval at the
time. For the next interval, press <M>.
Start Date The date you start recording statistics for a specific interval or all of them.
Start Time The time you start recording the statistics for a specific interval or all of them.
FCS Errors The number of frames that failed the FCS test
Congestion Drop The number of frames dropped due to incompatibility with one of the defined
classification flows related to the port. This counter is relevant if the port is
connected to flows
Unclassified Drop The number of frames dropped to other reasons than congestion
Rx Tx
Total Frames 96 20608
Total Bytes 8100 2263868
FCS Errors 0 --
Alignment Errors 0 --
Length Errors 0 --
Congestion Drop 0 0
Unclassified Drop 0 --
ACE-3105, ACE-3205>config>port>eth(1)#
4.9 Bridge
ACE-3105, ACE-3205 supports LAN-to-LAN and LAN-to-ATM bridges.
Standards
LAN-to-LAN: RFC 1493 and RFC 2674
LAN-to-ATM: RFC 1483.
Benefits
Allows extending the network reach as necessary.
Allows for scaling the total traffic without introducing severe congestion
problems.
Functional Description
ACE-3105, ACE-3205 supports LAN-to-LAN and LAN-to-ATM bridging to allow
backhauling of Ethernet traffic originating from the cellular site/Node B.
Accordingly, the bridge port can consist of Fast Ethernet, a Gigabit Ethernet, VC
over E1/T1, VC over ATM-155, VC over IMA Group, ADSL2+ or SHDSL ports as
available with your respective hardware configuration and unit.
The bridge functionality includes support for a VLAN aware bridge in IVL mode,
configurable VLAN tag ingress stacking, VLAN tag egress stripping, learned MAC
addresses (up to 512), configurable aging time, and mapping of the VLAN priority
versus four Ethernet transmit queues.
LAN-to-ATM Bridging
ACE-3105, ACE-3205 supports the transfer of Ethernet traffic over ATM networks
using the AAL5 layer. The Ethernet frames are transferred using LLC/SNAP
encapsulation.
Figure 4-8 illustrates the structure of the AAL5 CPCS PDU payload field used to
carry Ethernet frames using the LLC/SNAP encapsulation method.
LLC SNAP
Header Header
Only when CRC
use is enabled
The payload field includes the original LLC and SNAP headers. The PID field in the
SNAP header can assume two values:
0001 (hexa) to indicate the bridged IEEE 802.3 protocol, with end-to-end
transmission of the FCS field of the Ethernet frame.
0007 (hexa) to indicate the bridged IEEE 802.3 protocol, without end-to-end
transmission of the FCS field.
ACE-3105, ACE-3205 supports both FCS transmission options, the selection being
made by the user.
After the SNAP header, the AAL5 CPCS PDU includes optional padding bytes (0
through 47, as required to ensure that the length of the payload field is an
integer multiple of 48 bytes (the ATM cell payload length), the destination MAC
address and then the other parts of the MAC frame. When the PID is 0001, the
AAL5 CPCS PDU also includes the 4 bytes of the LAN frame FCS field.
Factory Defaults
Configuring a Bridge
ACE-3105, ACE-3205 currently supports one bridge. This section explains how to
configure it.
Binding a physical or logical port bind [{host|ethernet < For instructions on configuring a
to the bridge port. port>|logical-mac Logical MAC port, refer to
<port-number>|pcs 1}] [<1..39>] Configuring an ATM Uplink.
Setting the bridge port to discard ingress-filtering The VLAN membership of the
incoming frames whose VID is not port is set using the vlan
included in the member set. command.
Not relevant for the host
bridge port
Setting the bridge port to accept accept-frame-type {all|vlan-only} all. All frames will be accepted.
all frames or VLAN-tagged frames vlan-only. Untagged received
only. frames are discarded
Not relevant for the host
bridge port.
Assigning a VLAN ID and defining pvid <0..4094> priority <0..7> pvid. VLAN ID
the priority to untagged frames priority. The priority that the
received on a VLAN Aware bridge, frame will receive by default.
or for use for stacking on tagged
frames.
Stripping the higher layer egress-tag pop vlan Not relevant for the host bridge
(external) VLAN tag before the port.
frame exits the bridge port.
Adding an extra VLAN tag to the ingress-tag push vlan p-bit copy. Copying the priority tag
frame and specifying the priority {fixed|copy} associated with the original
VLAN tag of the frame.
fixed. Using the priority tag of
the pvid configured on the
port.
Not relevant for the host
bridge port
Parameter Comments
Time Elapsed The time (in seconds) since the port was enabled
Interval Number In case of show-statistics <1..24>. Displays the results for the time interval
you chose. You can select interval 1 till 24.
In case of show-statistics all-intervals or show-statistics all. Displays the
results all intervals. The system displays the results for one interval at the
time. For the next interval, press <M>.
Start Date The date you start recording statistics for a specific interval or all of them.
Start Time The time you start recording the statistics for a specific interval or all of them.
Rx Tx
Correct Frames : 0 0
Broadcast Frames : 0 0
Multicast Frames : 0 0
Drop Frames : 0
ACE-3105, ACE-3205>config>bridge(1)>port(1)#
ACE-3105, ACE-3205>config>bridge(1)#
To view a list of MAC addresses associated with ports bound to the bridge:
At the config>bridge(1)# prompt, enter show mac-address-table.
A list of MAC addresses associated with ports and VLANs appears.
ACE-3105, ACE-3205>config>bridge(1)# show mac-address-table
Total MAC Addresses : 0
Dynamic MAC Addresses : 0
Static Mac Addresses : 0
ACE-3220>config>bridge(1)#
Standards
IEEE 802.1p
Benefits
QoS allows you to optimize bandwidth and ensure traffic flow while avoiding the
need of allocating excessive bandwidth to facilitate the necessary bandwidth for
traffic at different requirements for speed and quality.
Functional Description
To differentiate traffic, the IEEE 802.1p standard specifies eight classes of service
per queue map profile you define. These classes of service are associated with
priority values between 0 and 7, using the 3-bit user priority field in an IEEE
0 Best effort
1 Background
2 Spare
3 Excellent effort
4 Controlled load
5 Video
6 Voice
7 Network control
Factory Defaults
All 7 priority levels are mapped to priority queue 3 as illustrated below:
ACE-3105, ACE-3205>config>qos>queue-map-profile(test)# info
map 0 to-queue 3
map 1 to-queue 3
map 2 to-queue 3
map 3 to-queue 3
map 4 to-queue 3
map 5 to-queue 3
map 6 to-queue 3
map 7 to-queue 3
ACE-3105, ACE-3205>config>qos>queue-map-profile(test)#
4.12 Flows
Flows are used to define classified stream of packets received on Ethernet ports
and can be used to facilitate attachment circuits (AC) over a specified Ethernet
port, which in turn are required for configuring Ethernet pseudowires.
In case of Ethernet to ATM, packets related to a flow are transmitted to pre-
defined ATM VCs.
Flows are uni-directional. To support bi-directional traffic, you have to create two
flows, an ingress flow (user -> network) and an egress flow (network -> user).
Standards
IEEE 802.3x
Functional Description
Packets can be identified and classified by means of their VLAN IDs, their
destination IP addresses, their class of service (CoS) or their ingress or egress
interfaces.
Ingress user traffic is mapped to Ethernet flows using the per-port classification
criteria listed below and explained in the sections below. In the classifications,
the term VLAN refers to the service provider VLAN as outer VLAN while the
customer entity VLAN is referred to as inner VLAN.
VLAN ID
VLAN ID + P-Bits
DST IP
DST IP + IP-Precedence (values are 0-7)
DST IP + DSCP (DSCP values are 0-63)
ACE-3105, ACE-3205 supports up to 32 flows. An ingress flow is defined by the
following objects:
Ingress port. User interface (Ethernet port number)
Classifier. Group of classification rules that distinguish user traffic from flows
Marking. To change the user VLAN and priority bit within the original frame
Vlan Tag. Adding or removing a VLAN and priority bit from the original frame
Egress port. Service Virtual Interface (SVI). Information on the SVI is available
under The Service Virtual Interface.
The objects for the egress flow are listed under Egress Flows. Classification types
are relevant to ingress flows.
VLAN ID
Every VLAN is mapped to an ingress flow as illustrated below.
Ingress (User) Port Egress (Network Port)
(Ethernet port) (SVI)
Ingress Flow
(User Network)
VLAN ID + P-Bits
VLANs associated with a priority bit (p-bit) are mapped to an ingress flow as
illustrated below.
Ingress (User) Port Egress (Network Port)
(Ethernet port) (SVI)
VLAN ID 1 +
pbit <1..7>
Flow 1 SVI 1 Pseudowire 1
VLAN ID 2 +
pbit <1..7>
Flow 2 SVI 2 Pseudowire 2 PSN
VLAN ID 3 +
pbit <1..7>
Flow 3 SVI 3 Pseudowire 3
Ingress Flow
(User Network)
Destination IP
The destination IP address may be associated with a specific device or a
broadcast/multicast address, depending on the intended service.
The destination devices IP address (DST IP) is mapped to an ingress flow as
illustrated below.
Ingress (User) Port Egress (Network Port)
(Ethernet port) (SVI)
PSN
Ingress Flow
(User Network)
DST IP 1 + IP
Precedence Flow 1 SVI 1 Pseudowire 1 DST IP 1
<1..7>
DST IP 2 + IP
Precedence Flow 2 SVI 2 Pseudowire 2 DST IP 2
<1..7>
DST IP 3 + IP
Precedence Flow 3 SVI 3 Pseudowire 3 DST IP 3
<1..7>
PSN
Ingress Flow
(User Network)
Figure 4-13. Ingress Flows Mapped to the Destination IP associated with the precedence bits
DST IP 1 +
DSCP Flow 1 SVI 1 Pseudowire 1 DST IP 1
<0..63>
DST IP 2 +
DSCP Flow 2 SVI 2 Pseudowire 2 DST IP 2
<0..63>
DST IP 3 +
DSCP Flow 3 SVI 3 Pseudowire 3 DST IP 3
<0..63>
PSN
Ingress Flow
(User Network)
Egress Flows
An egress flow carries traffic in network user direction. It is defined by the
following objects:
Ingress port. The same SVI?logical MAC used as the egress port for the
ingress flow
(user -> network)
Classifier. NA
Marking. NA
Egress port. The Ethernet interface and priority queue on the user side
The following figure illustrates the egress flow:
Configuring Flows
In order to configure Ethernet pseudowires, you have to configure an attachment
circuit (AC) over the relevant Ethernet port, only then they can be bound to a
cross connection (XC). An attachment circuit (AC) over Ethernet will be facilitated
by an ingress flow (user -> network) and an egress flow (network -> user)
configured over the relevant port. For additional information and objects that
define the ingress and egress flows, refer to the previous sections in this
chapter.
The Ethernet pseudowire cross connection (PW XC) is created by mapping the
pseudowire to the SVI. In N:1 mode, multiple flows will terminate at the same SVI
and this SVI will be mapped to a single pseudowire, so that different flows will be
directed to the same pseudowire.
Specifying a VLAN + Pbit match [vlan <0..4094>] {p-bit <0..7>} Packets belonging to the
classifier profile. defined VLAN range and the
defined priority bits will be
mapped to the flow.
Specifying a Dest IP + DSCP match [ip-dscp <0..63>] [dst-ip Packets transmitting to the
classifier profile. <0.0.0.0..255.255.255.255>] [to-dst-ip defined range of destination
<0.0.0.0..255.255.255.255>] IP addresses and IP DSCPs
will be mapped to the flow.
Removing the classifier profile no classifier <classification name> If you want to map a
different classifier
profile to the flow,
you have to first
remove the current
one.
Enabling marking op tions on the flow mark all You have to add the
marking configuration.
Manipulating the outer VLAN. vlan-tag {push|pop} [{vlan} <sp-vlan> p-bit push. The original
The original VLAN either becomes the {fixed <value>|copy}] outer VLAN
inner VLAN or is removed without becomes the inner
anything being added instead. VLAN or adding an
outer VLAN to the
If adding a new VLAN and the original
frame. If an other
outer VLAN becomes the inner VLAN,
VLAN already
a new pbit must be defined, which
exists, the original
can be copied from the original or a
outer VLAN of the
new value.
frame becomes
the inner VLAN
pop. The original
outer VLAN is
removed.
sp-vlan. The VLAN
p-bit. Priority bit
for each VLAN
Example
This section illustrates creating a classifier profile, an ingress flow and the
corresponding egress flow.
Use the Gigabit Ethernet port ethernet 1 as ingress port if the Gigabit
Ethernet module is installed in slot 1, otherwise use any other Fixed Ethernet
port.
Use the previously configured SVI port SVI 1 as egress port.
Activate the flow.
ACE-3105, ACE-3205>config>flows# flow test_ingress
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ classifier my_test
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ mark all
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ mark vlan 200
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ mark pbit 5
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ vlan-tag pop 100
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ ingress-port ethernet 1
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ egress-port SVI 1
ACE-3105, ACE-3205>config>flows>flow(test_ingress)$ no shutdown
Name : test_ingress
Admin Status : Up
Oper Status : Up
Classifier : my_test
Ingress Port : ethernet-1 Egress port : SVI 1
Name : test_egress
Admin Status : Up
Oper Status : Up
Ingress Port : SVI 1 Egress port : ethernet-1/1
ACE-3105, ACE-3205>config>flows#
Standards
The Ethernet OAM in use complies with the following standards:
Ethernet at the First Mile (EFM) according to the OAM Tutorial (Revision 3,
June 2004)
IEEE 802.3ah OAM specification.
Ethernet in the First Mile (EFM) OAM MIB according to the Internet Draft
(draft-ietf-hubmib-efm-mib-03.txt), March 2005.
Benefits
Ethernet OAM monitors channels and links using the following capabilities:
Functional Description
IEEE 802.3ah specifies the Ethernet in the First Mile (EFM) standard that includes
an Operation & Management/Maintenance (OAM) sublayer to the Data Link layer
(Layer 2).
OAM facilitates monitoring, testing, and reporting abilities that enables a link's
QoS to handle voice, video, and data.
The OAM sublayer (Figure 4-17) enables Ethernet nodes to monitor a link's
service quality between two adjacent network elements such as a DSL modem
and a DSLAM. OAM EFM (802.3ah) is not an end-to-end network protocol,
enabling both copper and fiber network elements to send link information
encapsulated in slow frames that pass at a rate of about one frame per second.
Thus, OAM adds little overhead to a link while adding link monitoring, remote-
failure indication, and remote-loopback testing capabilities. The EFM OAM
supports the capabilities explained below.
Timers
Two timers drive this protocol, one, which controls how frequently OAMPDUs
must be sent, and the other one which controls how frequently OAMPDUs must
be received to maintain the adjacency between devices.
OAMPDUs must be sent at least once per second. If there is no other OAMPDU to
be sent within one second, an Information OAMPDU must be sent. Similarly,
OAMPDUs must be received at least once every 5 seconds. When the timer
expires, the local OAM entity assumes that the remote OAM entity is non-
operational and resets its state machine.
The standard ensures that by defining OAM protocol as a slow protocol, where
the OAM client is not allowed to send more than 10 frames per second.
Factory Defaults
Ethernet OAM is disabled by default.
Specifying the rate limit for OAM descriptor {rate limit <1..10>}
EFM frames
Example
The following section illustrates how to enable and specify an OAM descriptor.
To enable and configure the first OAM EFM descriptor in the system:
Define an active descriptor and assign the ID# 1 to it.
Set the rate limit of descriptor 1 to 5 frames per second.
ACE-3105, ACE-3205>config>oam>efm# descriptor 1 active
ACE-3105, ACE-3205>config>oam>efm# descriptor 1 rate-limit 5
Standards
The BFD protocol standardization process is in draft stage at the IETF working
group. Internet drafts define the BFD protocol as follows:
draft-ietf-bdf-base-08 covers the BFD session initialization, the negotiation
process, the packet format etc.
draft-ietf-bfd-v4v6-1hop-08 covers the use of BFD to track IPv4/IPv6
connectivity between directly connected systems.
Functional Description
BFD establishes a session between two endpoints over a particular link. If more
than one link exists between two systems, multiple BFD sessions may be
established to monitor each one of them. The session is established with a three-
way handshake, and will be removed the same way. The session usually passes
the following stages:
Down. The session is down or has just been created. A session remains down
until the remote system sends a BFD packet in Down or Init state. By that, it
indicates that the session is down on the other side as well. If this packet
indicates a Down state, the session advances to the Init state. If the packet
signals an Init state, the session moves to the Up state.
Init. The remote system is communicating and the local system requests to
enable the session, but the remote system does not yet realize it. A session
will remain in Init state until either a BFD Control packet is received, indicating
an Init or Up state (in which case the session advances to up state) or until
the detection time expires, which means that communication with the remote
system has been lost. In this case the session moves to the Down state.
Up. The BFD session has been successfully established, and implies that
connectivity between the systems is working. The session will remain in the
Up state until either the connectivity fails or the session is administratively
disabled. If either the remote system signals a Down state, or the detection
time expires, the session moves to the Down state.
Factory Defaults
The following defaults apply for BFD sessions.
Specifying the minimum interval min-interval [tx <50000..5000000>] [rx Tx/Rx. Specifies the
(in microseconds) to receive or <50000..5000000>] [echo-rx interval of transmitted/
transmit bfd-descriptor packets <0|50000..5000000>] received BFD cotrol
packets respectively.
Echo-Rx. Specifies the
interval of received echo
packets. To disable echo
packets, enter 0.
Note Make sure that the BFD descriptor is not in use when trying to remove it.
Example
The following section explains how to configure a Bidirectional Forwarding
Detection
4.15 E1 Ports
Depending on the unit I use and your hardware profile, ACE-3105, ACE-3205 may
include 4, 8 or 16 multiservice ports that can be configured to work in ATM
UNI/IMA or TDM mode. This Any-Service-Any-Port framework enables high
flexibility in deployment within various backhaul solutions.
What is E1
The European Conference of Postal and Telecommunications Administrations
(CEPT) standardized the E-Carrier system, which revised the already existing T-
Carrier system. After being adopted by the International Union
Telecommunication Standardization sector (ITU-T), the E-Carrier system is used in
almost all countries outside the USA, Canada and Japan.
The most commonly used versions are E1 and E3. E1 circuits are very common in
most telephone exchanges and used to connect medium and large companies to
remote exchanges. In many cases, E1 connects exchanges with each other. E1
ports allow you to perform loopback tests as explained Physical Loopback Tests.
Benefits
E1 ports serve as multiservice ports that can be configured to work in ATM
UNI/IMA or TDM mode. This Any-Service-Any-Port framework enables high
flexibility in deployment within various backhaul solutions.
Functional Description
An E1 link operates over a twisted pair of cables. A nominal 3 Volt peak signal is
encoded with pulses using a method that avoids long periods without polarity
changes. The line data rate is 2.048 Mbps at full duplex, which means 2.048 Mbps
for downstream and 2.048 Mbps for upstream. The E1 signal splits into 32
timeslots each which is being allocated 8 bits. Each timeslot sends and receives
an 8-bit sample 8000 times per second (8 x 8000 x 32 = 2,048,000), which is
ideal for voice telephone calls where the voice is sampled into an 8 bit number at
that data rate and restored at the other end. The timeslots are numbered from 0
to 31.
One timeslot (TS0) is reserved for framing purposes, and alternately transmits a
fixed pattern. This allows the receiver to lock onto the start of each frame and
match up each channel in turn. The standards allow a full cyclic redundancy check
to be performed across all bits transmitted in each frame, to detect if the circuit
is losing bits (information), but this is not always used.
Another timeslot (TS16) is often reserved for signaling purposes to control
setting up and ending a transmission according to one of several standard
telecommunications protocols.
Factory Defaults
ACE-3105, ACE-3205 ships with all E1 ports enabled.
Configuring an E1 Port
To configure an E1 port:
1. At the config>port# prompt, enter e1 <14/8/16> for the E1 port labeled 1
4/8/16 respectively.
The config>port>e1(<14/8/16>) prompt appears.
2. Enter all necessary information according to the tasks below.
Specifying the mode in which the functional-mode The CES mode can be
E1 interface operates {ima|uni|ces-atm|ces-psn} either over PSN or ATM.
The mode cannot be
changed while IMA groups
or VP/VC XC or a CES
connection are
configured.
Specifying the E1 line type that line-type {unframed|g732n| g732n-crc} unframed. E1 line type
implements this circuit. Note: set to Unframed
The type of circuit affects the In UNI/IMA mode, Unframed is not g732n. G.732.N with CRC
number of bits per second that valid. disabled.
the circuit can reasonably carry, g732n-crc. G.732.N with
In CES-ATM mode, the line type
as well as the usage CRC enabled.
cannot be changed from
interpretation and the error
g732n-crc/g732n to Unframed and
statistics.
vice versa as long as CES XC is active
on the relevant port.
Enabling the loopback mode for loopback {remote|local} [duration local. Returns the
the E1 port. The duration is <1..300>] transmitted data at the
expressed in minutes. physical layer to the
receiving path. The local
physical loopback
includes a configurable
timeout mechanism that
ends the loopback
operation after a user-
defined duration.
remote. Returns the
received data at the
physical layer to the
transmitting path.
Example
The following section illustrates how to configure the E1 port labeled 1 for use in
IMA mode as follows:
Set the transmit (Tx) clock type to Domain and use domain 1.
Set the Functional mode to IMA.
Set the idle code to 0xFF.
Enable OAM.
Administratively enable the port.
Leave all other parameters disabled or at their defaults.
Administrative Status : Up
Operation Status : Down
Connector Type : RJ45
ACE-3105, ACE-3205>config>port>e1(1)#
Parameter Comments
Time Elapsed (Sec) The elapsed time since the beginning of the current interval
LCD Number of seconds during which Loss of Cell Delineation was detected.
Note: LCD is not available in E1/T1 CES mode.
RAI Number of seconds during which Remote Alarm Indication was detected.
Note: RAI is not available in Unframed E1/T1 mode.
AIS Number of seconds during which Alarm Indication Signal was detected.
FEBE Number of Far End Block Error, i.e. seconds during which an MF-CRC4 error
indication is received from the remote E1 device.
Parameter Comments
Note: FEBE is not available in Unframed mode.
ES Number of Errored Seconds, i.e. seconds during which CRC, SEF (Severely
Errored Frame) or AIS errors have occurred.
SES Number of Severely Errored Second, i.e. seconds during which 320 or more
CRC error events with at least one SEF or AIS have occurred.
UAS Number of Unavailable Seconds, i.e. seconds counted in the period after 10
consecutive SES occurrences. UAS state is deactivated after 10 consecutive
seconds without SES occurrences.
BES Number of Burst Errored Seconds, i.e. seconds during which 2 to 319 CRC
error events with no AIS or SEF have occurred
LVC Number of code violations, i.e. the times when both a BPV (Bipolar Violation)
and an EXZ error have occurred in one second
Uncorrected HEC Cells Number of cells received with two or more uncorrected HEC errors that have
been dropped.
Note: Invisible for IMA groups.
LOS : 10 AIS : 0
LOF : 0 FEBE : 0
LCD : 0
RAI : 0
ES : 0 DM : 0
SES : 0 LCV : 0
UAS : 10
Rx Frames Slip : 0
BES : 0
ATM
-----------------------------------------------------------------------------
Rx Cells :
Tx Cells :
Uncorrected HEC Cells :
ACE-3105, ACE-3205>config>port>e1(1)#
4.16 T1 Ports
Depending on the unit I use and your hardware profile, ACE-3105, ACE-3205 may
include 4, 8 or 16 multiservice ports that can be configured to work in ATM
UNI/IMA or TDM mode. This Any-Service-Any-Port framework enables high
flexibility in deployment within various backhaul solutions.
What is T1
T1, also referred to as DS-1 is a T-carrier signaling scheme devised by Bell Labs
and a widely used standard in telecommunications in the USA, Canada and Japan
to transmit voice and data between devices.
Benefits
T1 ports serve as multiservice ports that can be configured to work in ATM
UNI/IMA or TDM mode. This Any-Service-Any-Port framework enables high
flexibility in deployment within various backhaul solutions.
Functional Description
A T1 link operates over a twisted pair of cables. A nominal 3 Volt peak signal is
encoded with pulses using a method that avoids long periods without polarity
changes. The line data rate is 1.544 Mbps at full duplex, which means 1.544 Mbps
for downstream and 1.544 Mbps for upstream. The T1 signal splits into 32
timeslots each which is being allocated 8 bits. Each timeslot sends and receives
an 8-bit sample 8000 times per second (8 x 8000 x 24 = 1,544,000), which is
ideal for voice telephone calls where the voice is sampled into an 8 bit number at
that data rate and restored at the other end. The timeslots are numbered from 0
to 24.
Factory Defaults
ACE-3105, ACE-3205 ships with all T1 ports enabled.
Configuring a T1 Port
To configure a T1 port:
1. At the config>port# prompt, enter T1 <14/8/16> for the T1 port labeled 1
4/8/16 respectively.
The config>port>t1(<14/8/16>) prompt appears.
2. Enter all necessary information according to the tasks below.
Specifying the variety of zero line-code b8zs b8zs. Bipolar with Eight-zero
code suppression used for this substitution
port.
Specifying the mode in which the functional-mode The CES mode can be
T1 interface operates {ima|uni|ces-atm|ces-psn} either over PSN or ATM.
The mode cannot be
changed while IMA groups
or VP/VC XC or a CES
connection are
configured on units
equipped wit DSP
Specifying the T1 line type that line-type {unframed|esf} unframed. T1 line type
implements this circuit. Note: set to Unframed
The type of circuit affects the In UNI/IMA mode, Unframed is not esf. Extended Super
number of bits per second that valid. Frame (24 T1 frames)
the circuit can reasonably carry,
In CES-ATM mode, the line type
as well as the usage
cannot be changed to Unframed
interpretation and the error
and vice versa as long as CES XC is
statistics.
active on the relevant port.
Enabling the loopback mode for loopback {remote|local} [duration local. Returns the
the T1 port. The duration is <1..300>] transmitted data at the
expressed in minutes. physical layer to the
receiving path. The local
physical loopback
includes a configurable
timeout mechanism that
ends the loopback
operation after a user-
defined duration.
remote. Returns the
received data at the
physical layer to the
transmitting path.
Example
The following section illustrates how to configure the T1 port labeled 1 for use in
IMA mode as follows:
Set the transmit (Tx) clock type to Domain and use domain 1.
Set the Functional mode to IMA.
Set the idle code to 0xFF.
Enable OAM.
Administratively enable the port.
Leave all other parameters disabled or at their defaults.
ACE-3105, ACE-3205>config>port>t1(1)# tx-clock-source domain 1
ACE-3105, ACE-3205>config>port>t1(1)# functional mode ima
ACE-3105, ACE-3205>config>port>t1(1)# idle-code 0xFF
ACE-3105, ACE-3205>config>port>t1(1)# oam-cell-generator
ACE-3105, ACE-3205>config>port>t1(1)# no shutdown
Administrative Status : Up
Operation Status : Down
Connector Type : RJ45
ACE-3105, ACE-3205>config>port>t1(1)#
Parameter Comments
Time Elapsed (Sec) The elapsed time since the beginning of the current interval
LCD Number of seconds during which Loss of Cell Delineation was detected.
Note: LCD is not available in E1/T1 CES mode.
RAI Number of seconds during which Remote Alarm Indication was detected.
Note: RAI is not available in Unframed E1/T1 mode.
AIS Number of seconds during which Alarm Indication Signal was detected.
FEBE Number of Far End Block Error, i.e. seconds during which an MF-CRC4 error
indication is received from the remote E1 device.
Note: FEBE is not available in Unframed mode.
ES Number of Errored Seconds, i.e. seconds during which CRC, SEF (Severely
Errored Frame) or AIS errors have occurred.
SES Number of Severely Errored Second, i.e. seconds during which 320 or more
CRC error events with at least one SEF or AIS have occurred.
UAS Number of Unavailable Seconds, i.e. seconds counted in the period after 10
consecutive SES occurrences. UAS state is deactivated after 10 consecutive
seconds without SES occurrences.
BES Number of Burst Errored Seconds, i.e. seconds during which 2 to 319 CRC
error events with no AIS or SEF have occurred
LVC Number of code violations, i.e. the times when both a BPV (Bipolar Violation)
and an EXZ error have occurred in one second
Uncorrected HEC Cells Number of cells received with two or more uncorrected HEC errors that have
been dropped
Note: Invisible for IMA groups.
LOS : 10 AIS : 0
LOF : 0 FEBE : 0
LCD : 0
RAI : 0
ES : 0 DM : 0
SES : 0 LCV : 0
UAS : 10
Rx Frames Slip : 0
BES : 0
ATM
-----------------------------------------------------------------------------
Rx Cells :
Tx Cells :
Uncorrected HEC Cells :
ACE-3105, ACE-3205>config>port>t1(1)#
What is ADSL2+
ADSL stands for Asymmetric digital subscriber line and is a form of DSL. It is a
data communications technology that enables faster data transmission over
copper lines than a conventional modem can provide by utilizing frequencies that
are not used by a voice telephone call. A splitter allows a single connection to
support both ADSL service and voice calls at the same time.
ADSL2+ is capable of doubling the frequency band of typical ADSL connections
from 1.1 MHz to 2.2 MHz, doubling the downstream data rates of the previous
ADSL2 standard from 12 Mbps to up to 24 Mbps.
Standards
The modular ADSL2+ interfaces support ADSL2+ over POTS (Annex A) and ADSL2+
over ISDN (Annex B), as well as auto-mode synchronization to ADSL/ ADSL2/
ADSL2+ (complying with G.992.1/ G.992.3/ G.992.5).
Benefits
ACE-3105, ACE-3205 can aggregate all ATM, TDM, Ethernet and management
traffic over SHDSL.bis and ADSL2+ links as illustrated below.
Factory Defaults
The ADSL2+ port is enabled by default.
Example
The following section illustrates how to enable the ADSL2+ port labeled 1:
Administratively enable the port.
Set the port to restart after synchronization is completed.
ACE-3105, ACE-3205>config>port>adsl2plus(1)# no shutdown
ACE-3105, ACE-3205>config>port>adsl2plus(1)# restart
Transmission mode Transmission mode, selected by the system while ADSL2+ Annex A
synchronizing. ADSL2+ Annex B
ADSL2 Annex A
ADSL2 Annex B
ADSL Annex A
ADSL Annex B
ATM
-----------------------------------------------------------------------------
Rx Cells :
Tx Cells :
Uncorrected HEC Cells :
What is SHDSL
SHDSL stands for Single-Pair High-speed Digital Subscriber Line. It is a data
communications technology that enables faster data transmission over copper
telephone lines than a conventional voice band modem can provide. Compared to
ADSL, SHDSL employs frequencies that include those used by traditional POTS
telephone services to provide equal data rates to transmit and receive. As such, a
telephone line cannot be used by both an SHDSL service and a POTS service at
the same time. Support of symmetric data rates has made SHDSL a popular
choice by businesses for PBX, VPN, web hosting and other data services.
Standards
The industry standard for SHDSL is defined by ITU-T recommendation G.991.2.
This was first published in February 2001. SHDSL equipment is also known by the
standard's draft name of G.SHDSL. Major updates to G.991.2 were released in
December 2003. Equipment conforming to the 2003 version of G.991.2 is often
referred to by the standard's draft name of G.SHDSL.bis or just SHDSL.bis.
ACE-3105, ACE-3205 supports SHDSL Annex A (in North America), Annex B (in
Europe) and SHDSL.bis Annex F & G.
Benefits
ACE-3105, ACE-3205 can aggregate all ATM, TDM, Ethernet and management
traffic over SHDSL.bis and ADSL2+ links as illustrated in Figure 4-20.
Factory Defaults
The SHDSL port is enabled by default. For default settings of parameters, refer to
the table below.
Example
The following section illustrates how to enable the SHDSL port labeled 1:
Administratively enable the port.
Set the TC layer to ATM.
Set the number of wires for the M-pair group to 4.
For Globespan based DSLAMs, set the 4w wire mode to Enhanced.
Leave all other parameters at their default values.
ACE-3105, ACE-3205>config>port>shdsl(1)# no shutdown
ACE-3105, ACE-3205>config>port>shdsl(1)# tc atm
ACE-3105, ACE-3205>config>port>shdsl(1)# wires 4
ACE-3105, ACE-3205>config>port>shdsl(1)# 4w-mode enhanced
Operation Status Up
Down
Transmission Mode The region specific transmission set you specified A-F
B-G
Payload Rate The actual data rate within the max and min data
rates you may have specified
SNR Margin (db) Currently measured SNR on the Rx signal of the Current SNR
(signal to noise ratio) physical wire pair.
Loop Attnuation (db) Currently measured attenuation on the Rx signal Current attenuation
of the physical wire pair.
PSD Mask Current power spectral density (PSD) mask used Symmetric
for transmission of the physical wire pair. Assymetric
Power Backoff (db) Effective power backoff value used in order to Current power backoff
attenuate the modem Tx power of the physical
wire pair
Wires
------------------------------------------------------------------------
State SNR Loop Tx PSD Power
Margin Attenuation Power Mask Backoff
(db) (db) (dBm)
------------------------------------------------------------------------
Pre-Activation 0 0 0.0 Symmetric 0
ACE-3105, ACE-3205>config>port>shdsl(1)#
Parameter Comments
ES Number of Errored Seconds where one or more CRC error events or one or more LOSW
error events have been detected. This parameter is inhibited during UAS state.
SES Number of Severely Errored Seconds where 50 or more CRC error events or one or more
LOSW error events have been detected. This parameter is inhibited during UAS state.
UAS Number of Unavailable Seconds. This state begins after 10 consecutive severely-
errored seconds, and ends after 10 consecutive error-free seconds.
LOSWS Number of seconds where Loss Of Sync Word events have been detected.
ACE-3105, ACE-3205>config>port>shdsl(1)#
To view the statistics for the first wire pair at interval 20:
At the config>port>shdsl(1)# prompt, enter show statistics 1 interval 20.
Statistics for the specified wire pair (1) and interval (20) appear.
To view the statistics for the first wire pair and all intervals:
1. At the config>port> shdsl(1)# prompt, enter show statistics 1 all.
Statistics for specified wire pair (1) and the first interval appear.
2. Press <M>.
The statistics for the next interval appear.
3. Repeat this procedure for all recorded intervals until the
config>port>shdsl(1)# prompt appears again.
Factory Defaults
The PCS is administratively disabled by default.
Parameter Comments
Rx FCS Errors Number of received frames that did not pass the FCS check
Tx FCS Errors Number of transmitted frames that did not pass the FCS check
ACE-3105, ACE-3205>config>port>pcs(1)$
ACE-3105, ACE-3205>config>port>pcs(1)$
To view the statistics for the PCS port for all intervals:
1. At the config>port>pcs(1)$ prompt, enter show statistics all-intervals.
Statistics for the first interval appear.
2. Press <M>.
The statistics for the next interval appear.
3. Repeat this procedure for all recorded intervals until the config>port>pcs(1)$
prompt appears again.
Standards
ITU-T I.371 (ATM transfer capability definition)
Benefits
The ATM Traffic Descriptor divides traffic into priority queues, thus allowing the
transmission of traffic according to specified service categories and priorities.
Functional Description
A traffic descriptor consists of the following:
Service categories
Traffic parameters of each data flow in both directions
ATM Traffic shaping
ATM cell scheduling
ATM policing.
The traffic descriptor parameters and their functionalities are explained in the
sections below.
Service Categories
Services are divided into four service categories, which define the methods to
correlate traffic characteristics and QoS requirements with network behavior. The
service categories and levels are listed in Table 4-6. The concept distinguishes
real-time services such as CBR and VBR and non-real-time services such as
UBR+/UBR. The service categories are listed and explained in the subsections
below.
Constant Bit-Rate
The CBR service category serves connections at constant bit-rates. This option
can be used in cases where synchronization between the source and the
destination is highly reliable. The CBR is geared towards data for which a
predictable response time and constant bandwidth capacity are required at the
end points. The amount of bandwidth is characterized by the peak cell rate (PCR).
Unspecified Bit-Rate
The UBR service category serves connections, which transport variable bit-rate
traffic that does not rely on synchronization between the traffic source and its
destination. UBR is used for applications that are most tolerant against delays
and losses. The system works on reaching a specified minimum cell rate (MCR),
but commits only to best effort. UBR+ guarantees the MCR you specify.
Traffic Parameters
Traffic parameters describe the traffic characteristics of the source. Traffic
parameters are the following:
PCR. Refers to the peak cell rate, which defines the highest rate at which cells
can be transported along a connection in the ATM network. PCR determines
how often cells are sent during a given time increment in an effort to
minimize jitter. PCR is usually coupled with the cell delay variation tolerance
(CDVT) parameter, which indicates how much jitter can be allowed.
SCR. Refers to the sustainable cell rate, which defines the average long-term
cell rate allowed on a specific ATM connection.
MBS. Refers to the maximum burst size, which defines the burst size of cells
allowed for transmission contiguously on a particular connection.
MCR. Refers to the minimum cell rate, which defines the minimum rate
allowed for transmission along an ATM connection.
PCR/SCR granularity is up to 0.39% (worst case) and the min PCR/SCR supports up
to 100 cells per second.
Second VBR
Third UBR+
Fourth UBR
ATM Policing
The ATM Policing mechanism defines which non-conformant ATM cells should be
discarded, tagged or counted by ACE-3105, ACE-3205 per user configuration. The
following policing modes (listed below) are supported according to ATMF TM4.1:
CBR.1
VBR.1
VBR.2
VBR.3
UBR.1
UBR.2
The policing is configurable per received channel. Multiple channels can be
mapped to a single policing policy (group policing).
The granularity of the CDVT is 10 ns. The minimum CDVT depends on the port
type as follows:
Factory Defaults
By default, the ATM descriptor is not activated.
Creating an ATM traffic-descriptor <1..99999> cbr pcr. Peak cell rate (cells per
descriptor for a shaped shaping-scheduling [pcr <100..353208>] second, cps).
CBR stream. [cdvt <1..8000>] cdvt. Cell delay variation tolerance
(microseconds, usec).
Example
This example illustrates how to configure a traffic descriptor for a CBR stream.
Use the following parameters:
Set the descriptor up for a shaped-scheduled stream
Choose Traffic Descriptor #2
Set the peak cell rate (PCR) to 10.000 cells per second.
Set the cell delay variation tolerance (CDVT) to 4000 usec.
Standards
ACE-3105, ACE-3205 provides F4 and F5 ATM OAM support that complies with
ITU-I.610.
Functional Description
OAM can operate over ATM networks in five different modes:
VP Intermediate Point
VC Intermediate Point
VP Segment Point
VC Segment Point
VC End-to-End Point.
VP Intermediate Point
When a VP connection point (CP) is set as an intermediate point, it operates as
follows:
If the other side of the VP XC is also set as an intermediate point:
F4 segment, F5 segment and end-to-end OAM cells are forwarded
transparently to the other side of the XC.
When a failure is detected on the physical port, AIS state is declared and
F4 segment AIS and end-to-end AIS cells are generated towards the
forward direction.
When a failure is detected on the physical port, AIS state is declared and
F4 end-to-end AIS cells are generated towards the forward direction.
For OAM loopback cells (see OAM Loopback), an ID match check determines
the loopback state:
VC Intermediate Point
When a VC connection point is set as an intermediate point, it operates as
follows:
If the other side of the VC XC is also set as an intermediate point:
F5 segment and end-to-end OAM cells are forwarded transparently to the
other side of the XC. F4 segment and end-to-end OAM cells are dropped
from the cell stream.
When a failure is detected on the physical port, AIS state is declared and
F5 segment AIS together with end-to-end AIS cells are generated towards
the forward direction.
When a failure is detected on the physical port, AIS state is declared and F5
end-to-end AIS cells are generated towards the forward direction.
For OAM loopback cells (see OAM Loopback), an ID match check determines
the loopback state:
VP Segment Point
When a VP connection point is set as a segment point, it operates as follows:
F4 end-to-end, F5 segment and end-to-end OAM cells are forwarded
transparently to the other side of the XC. F4 segment OAM cells are dropped
from the cell stream, while F4 segment AIS, RDI and CC cells are monitored.
When F4 segment AIS cells are received on the connection point, AIS state is
declared. F4 end-to-end AIS cells are generated towards the forward
direction, while F4 segment RDI cells are generated towards the backward
direction.
the last 3.5 seconds, an AIS state is declared, F4 end-to-end AIS cells are
generated towards the forward direction and F4 segment RDI cells are
generated towards the backward direction.
VC Segment Point
When a VC connection point is set as a segment point, it operates as follows:
F5 end-to-end OAM cells are forwarded transparently to the other side of the
XC. F4 segment, F5 segment and end-to-end OAM cells are dropped from the
cell stream, while F5 segment AIS, RDI and CC cells are monitored.
When F5 segment AIS cells are received, AIS state is declared. F5 end-to-end
AIS cells are generated towards the forward direction, while F5 segment RDI
cells are generated towards the backward direction.
VC End-to-End Point
When a VC connection point is set as an endpoint (end-to-end), it operates as
follows:
F4 and F5 segment and end-to-end OAM cells are dropped from the cell
stream. F5 end-to-end AIS, RDI and CC cells are monitored.
When F5 end-to-end AIS cells are received, AIS state is declared and F5
end-to-end RDI cells are generated towards the backward direction.
When a failure is detected on the physical port, AIS state is declared and F5
end-to-end RDI cells are generated towards the backward direction.
OAM Loopback
OAM loopback cells are used to determine connectivity at specific points in a
network or between networks. OAM cells are part of the F4 and F5 OAM service,
which allows fault management for VPs and VCs. Loopback cells can be defined as
Segment or End-to-End.
OAM loopback support includes the following functionality:
OAM loopback cell generation If OAM loopback generation is enabled for a
VC/VP at a certain CP, a loopback cell is sent for this VC/VP once every 5
seconds. The loopback cell is inserted towards the uplink (Tx) direction and
must be looped through another CP back to the origin point, all within no
more than 5 seconds.
OAM loopback reply Each CP must:
Have the ability to receive OAM LB cells that are addressed to it,
regardless of whether the OAM LB generation is enabled
Loop the cells back towards the originator according to the standard
definitions.
Note To add or modify a parameter, you have to re-enter the entire string covering all
relevant descriptor parameters at the config>oam>atm# prompt.
Adding a descriptor with descriptor <1..256> end-to-end [cc-direction OAM Descriptor 1, 2 and
OAM mode set to End-to- {source|sink|both|off}] [loopback on lb-dest- 3 are default OAM
End, loopback enabled addr <00FFx16>] descriptors and cannot be
and a loopback deleted or modified.
destination address OAM descriptors cannot
defined be modified while being
used by connections.
CC-Direction stands for
the OAM continuity
check.
Task Command
Specifying the loopback address and the loopback [source-addr <00FFx16>] [fail-threshold <1..16>]
number of lost loopback cells required
before a loopback failure state is declared.
Example
The following section illustrates how to enable and configure the first ATM OAM
descriptor that can be modified and set up a loopback.
Set the descriptor to 4.
Choose end-to-end for the OAM mode.
Set the Loopback destination address to FF and the source address to 00.
Set the threshold of lost loopback packets to 8.
ACE-3105, ACE-3205>config>oam>atm# descriptor 4 end-to-end cc-direction source
loopback on lb-dest-addr FF
ACE-3105, ACE-3205>config>oam>atm# loopback source-addr 00 fail-threshold 8
Note To add or modify a parameter, you have to re-enter the entire string covering all
relevant cell-test parameters at the config>port>atm# prompt.
Example
The example below illustrates how to set up and run an ATM cell test for ATM
cells with segmented OAM information over E1 ports.
Choose the E1 port labeled 1 as the desired port.
Set VPI to 4095 and VCI to 65535.
Choose the OAM cells that are always forwarded (CLP0).
Use cells with OAM information of OAM type AIS.
Set the number of cells to be sent for this test to 5000.
ACE-3105, ACE-3205>config>port>atm# cell-test e1 1 vc 4095/65535 oam-segment
clp clp0 oam ais no-of-cells 5000
ACE-3105, ACE-3205>config>port>atm#
Standards
The encapsulation and transport of multiprotocol data over ATM over AAL5 is
specified in RFC1483.
Benefits
The ATM uplink extends the ability of carrying pseudowires over DSL to the ability
of carrying pseudowires over other physical and logical ATM ports.
Factory Defaults
By default, no virtual MAC addresses are bound to ATM ports (E1/T1).
To create a logical port by assigning a virtual MAC address to the relevant ATM
port:
1. Create the VCL of the type vcl_interface as explained under Configuring VPL
and VCL Interfaces. You may use physical interfaces (E1) or logical ones (IMA
group).
2. Create a router bound to the VCL, setting llc-snap-encapsulation to bridged-
pdu. For additional information, refer to Configuring the Router.
Standards
The standard specification (version 1.0) was initially approved by The ATM Forum
in July 1997 and updated to version 1.1 in March 1999.
Benefits
The IMA protocol allows breaking up ATM traffic and transmit over several links
combined to one logical link, thus increasing the bandwidth by a factor of 8/16,
depending on the number of E1/T1 ports belonging to the IMA group.
Specifying the minum number minimum-links {rx <1..8/16>} {tx <1..8/16>} The required min
of required Rx and Tx links. Default: 1 for Rx and Tx number of links must
be the same for Rx
and Tx links.
Blocking the IMA group for any blocking The block value is valid
reason other than an only if the IMA group
insufficient number of links is administratively
enabled.
Example
The example below illustrates how to create and configure an IMA group over the
first E1 port and bind more to it. Set parameters as follows:
Set the functional mode of the first E1 port labeled 1 on the front panel to
IMA.
Specify IMA group 1 and enter the first E1 port (the one labeled 1 at the
front panel) as the physical port.
Assign 1 as ID for the IMA group.
Set the Tx frame length to 32 cells.
Set the max differential delay to 50 ms.
Associate the IMA group with IMA version 1.1.
Use CTC as the Tx clock source.
Choose the internal oscillator as CTC source.
Set the min number of Tx and Rx links to 16.
Bind the first E1 port (the one labeled 1 at the front panel) to the IMA group.
Administratively enable the IMA group.
ACE-3105, ACE-3205>config>port# e1 1
ACE-3105, ACE-3205>config>port>e1(1)# functional-mode ima
ACE-3105, ACE-3205>config>port>atm# ima-group 1 E1
ACE-3105, ACE-3205>config>port>atm>ima-group(1)#
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# group-id 1
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# tx-frame-length 32cells
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# max-differential-delay 50
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# ima-version 1.1
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# tx-clock-source ctc
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# ctc-clock-source internal
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# minimum-links rx 16 tx 16
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# no shutdown
ACE-3105, ACE-3205>config>port>atm>ima-group(1)# bind 1
Near End/Far End State Current state of the near/far end group state
engine
Near End Tx Clock Clock mode of near-end IMA group, CTC only
Far End Tx Clock Clock mode of far-end IMA group, either CTC or
ITC.
Rx/Tx Available Cell Rate Current cell rate provided by the IMA group in Numerical
receiving/transmitting direction
Rx Time Reference Links The index of the received timing reference link
used by the near end for IMA data cell clock
recovery toward the ATM layer.
Last Change Date and time when IMA has changed its state
last.
Least Delay Link Index of the link with the shortest propagation
delay
GSMT Running Seconds Number of seconds since IMA group has been in Numerical
operational state.
Rx Tx
IMA ID 0 1
Frame Length 32 32
Active Links 0 0
Available Cell Rate 0 0
Time Reference Link 0 0
Configured Links 0 0
ACE-3105, ACE-3205>config>atm>ima-group(1)$
Parameter Comment
Near End Rx State Current state of near end receiving link state machine
Parameter Comment
Near End Tx State Current state of near end transmitting link state machine
Near End Rx Failure Current link failure status of the near end receive link
Far End Rx State Current state of far end receiving link state machine
Far End Tx State Current state of far end transmitting link state machine
Far End Rx Failure Current link failure status of the far end receive link
ACE-3105, ACE-3205>config>port>atm>ima-group(1)$
Parameter Comments
Time Elapsed Time that has elapsed since the IMA group has been administratively enabled
Parameter Comments
Group UAS Number of one second intervals during which the IMA group traffic state
machine is down
NE Failures Number of times when a near end group failure has occured due to aborting
the configuration or insufficient links.
FE Failures Number of times when a far end group failure has occurred such as start-up,
aborting the cofiguration, insufficient links or blocking.
Parameter Comments
Time Elapsed Time that has elapsed since the IMA group has been administratively enabled.
Violation Number of ICP cells that are in error, invalid or missing (except during seconds
when a SES or UAS-IMA condition is reported).
OIF Number of OIF (Out of IMA Frame) irregularities (except during SES or UAS IMA
at the near end).
Near End SES Number of one-second intervals containing one of the following at the near
end:
More than 30% of ICP cells are IV-IMA (invalid IMA).
One or more of the following link errors: LOS, OOF/LOF, AIS, LCD.
LIF (Loss of IMA Frame) error.
LODS (Link Out of Delay Synchronization) error.
Far End SES Number of one-second intervals containing one or more RDI IMA errors (except
during UAS IMA at the far end).
Near End/Far End UAS Number of unavailable seconds (UAS) at the near/far end respectively. A status
of unavailable is initiated when there are 10 consecutive IMA near/far end SES
occurrences; the status ends when there are 10 consecutive seconds with no
IMA near/far end SES occurrences.
Near End/Far End Tx UUS Number of unusable seconds at the near/far end transmission LSM (Link State
Machine) respectively.
Near End/Far End Rx UUS Number of unusable seconds at the near/far end receiving LSM.
Near End/Far End Rx Fail Number of occurrences of a near/far end receiving failure, causing an alarm
condition on this link
Far End Tx Fail Number of occurrences of a far end transmission failure causing an alarm
condition on this link.
ACE-3105, ACE-3205>config>atm>ima-group(1)$
4.25 Router
Benefits
Router interfaces enables users to assign up to 8 IP addresses to a single ACE-
3105, ACE-3205 unit using various protocols.
Factory Default
By default, no router interface is enabled. Initially, ACE-3105, ACE-3205 must be
accessed via a local craft connection using a terminal application such as
HyperTerminal.
Using a router interface as default-gateway interface This option requires a router interface
default gateway <1..8> to be configured.
Specifying the vendor class class-id <free text of max 25 The vendor class identifier is a
identifier characters> string that is passed on to the
DHCP server for authentication.
Setting the lease time lease <lease time in days> The DHCP requested lease time
Binding an IMA group of ports bind ima-group <1..4/8/16> vc The number of possible IMA
{<0..4095>/<0..65535>} group depends on your hardware
profile.
You must have a VCL inteface
configured as explained under
Configuring VPL and VCL
Interfaces.
Binding a PPP connection bind ppp <1..4> You must have PPP configured as
explained under Configuring PPPoE.
Binding the bridge bind bridge 1 You must have a bridge configured
as explained under Configuring a
Bridge.
Binding an SHDSL port bind shdsl {1..4}{1/1..1/4} You must have a VCL inteface
configured as explained under
Configuring VPL and VCL Interfaces.
Binding an ADSL2+ port bind adsl {1|2}{1/1|1/2} You must have a VCL inteface
configured as explained under
Configuring VPL and VCL Interfaces.
Binding a GRE tunel bind gre-tunnel <1..4> For instructions on defining a GRE
tunnel, refer to the section below.
Defining and enabling keepalive [interval <1..32767>] [retries keepalive. Enables and specifies
Keep Alive <1..255> the interval at which keep alive
messages will be sent, and the
number of keep alive messages to
be sent.
Enabling management access for management-access The device can be accessed for
SNMP, Telnet and SSH via this management only if
router interface. management access is enabled
via this router interface.
Setting the LLC/SNAP llc-snap-encapsualtion {routed- Relevant and available only for
encapsulation used with the AAL5 pdu|bridged-pdu} E1, IMA group, , ADSL, SHDSL.
frame
Note The remote peers IP address must be associated with a known route
Enabling the static route and the static-route <IP address/IP mask of static-route. The next hop
next gateway (next hop) using static route> address <IP address of must be a subnet of one of
the next hops IP address next hop> priority <1..2> the router interfaces.
The IP addresses and the
mask may range between
0.0.0.0 and
255.255.255.255.
address. Multicast, broadcast
or all ones address is not
allowed.
priority. The default is 1.
Enabling the static route and the static-route <IP address/IP mask of
router interface number towards static route> interface <router
which the destination subnet is interface number> [priority <1..2>]
to be routed.
Disabling the static route and the no static-route <IP address/IP mask
next hop using the next hops IP of static route> address <IP address
address. of next hop>
Disabling the static route and the no static-route <IP address/IP mask
router interface number towards of static route> interface <router
which the destination subnet was interface number>
to be routed.
Defining the dynamic label range label-range dynamic {0 Relevant only for incoming traffic. These
0|1000065534} settings have no effect on outgoing
Default: 1000014095 traffic.
Cannot be changed when the LDP
signaling protocol is enabled.
The range setting is rejected if there are
static PW connections or tunnels
configured with labels that are included
in the dynamic range.
The range is relevant to both tunnel
and0020PW labels.
The static range is automatically
determined according to the dynamic
range selection,
A static label cannot be allocated in the
range allocated only for dynamic labels.
00. To be set if no dynamic label range
is used.
1000065534. ACE-3105, ACE-3205
supports a single dynamic label range of
up to 4094 labels within the range of
10000 and 65534. For example, the
label range may be set to 2000024094.
Associating an interface with the ldp-id <0.0.0.0..255.255.255.255> The LDP identifier to be used
LDP. in all LDP sessions
established with the unit.
The IP address must match
one of the interface IP
addresses or loopback
addresses.
Cannot be changed when
LDP is enabled.
Defining the required interval hello-timer <0..65535> LDP Hello messages enable
between two consecutive Hello Default: 45 LDP nodes to discover each
messages (in seconds). other and to detect the
failure of an LDP node or the
link to it.
LDP Hello messages are sent
periodically on all interfaces
where LDP is enabled.
The Hello timer cannot be
modified when the the LDP
mode is enabled.
Defining the time after which a keep-alive-timer <1..65535> The Keep Alive timer cannot
keep alive is sent (in seconds) for Default: 40 be modified when the the
periods of inactivity LDP mode is enabled.
Activating LDP on the selected router-interface <1..32> [basic-hello basic-hello. Activates LDP
router interface. {disable|enable}] Basic Hello on the selected
interface.
ACE-3220>config>router(1)>mpls>ldp#
Configuring the ingress tunnel ingress-tunnel <1..32> manual 1..32. Ingress Tunnel index
with the provisioning mode set to [label <16..65534>] [name <string manual. Tunnel assignment
Manual of up to 32 characters>] mode.
The tunnel assignment mode
cannot be changed
dynamically (on-the-fly)
label. ID of the label within
the static label range. This
value can only be set if the
tunnel assignment mode is
set to Manual.
name. Name of the ingress
tunnel connection.
Configuring the ingress tunnel ingress-tunnel <1..32> ldp [name ldp. Indicates whether the
with the provisioning mode set to <string of up to 32 characters>] Tunnel Assignment mode is
LDP manual or LDP-assigned.
If LDP-assigned, only one
ingress tunnel can be
configured.
The tunnel assignment mode
cannot be changed
dynamically (on-the-fly)
A label-binding message is
not published over an LDP
session created with
targeted peers, meaning that
tunnel labels are never
created with targeted peers.
Only one ingress tunnel is
possible in LDP mode.
Configuring the egress tunnel egress-tunnel <1..32> manual [label 1..32. Egress Tunnel index
with the provisioning mode set to <16..1048575>] [name <string of manual. Tunnel assignment
Manual and the EXP bits mode set up to 32 characters>] [static-exp mode.
to Static. <0..7>] The tunnel assignment mode
cannot be changed
dynamically (on-the-fly)
label. ID of the label within
the static label range. This
value can only be set if the
tunnel assignment mode is
set to Manual.
name. Name of the egress
tunnel connection.
static-exp. The EXP biots
mode is set to static and the
EXP bits have to be specified.
Configuring the egress tunnel egress-tunnel <1..32> manual [label copy-exp-from-pw. The EXP
with the provisioning mode set to <16..1048575>] [name <string of bits are copied from the PSN
Manual and the EXP bits mode set up to 32 characters>] copy-exp- parameters of the specific
to copy the EXP bit from the from-pw pseudowire.
pseudowire.
Configuring the egress tunnel egress-tunnel <1..32> ldp [name ldp. Indicates whether the
with the provisioning mode set to <string of up to 32 characters>] Tunnel Assignment mode is
LDP and the EXP bits mode set to [static-exp <0..7>] manual or LDP-assigned.
Static. The tunnel assignment mode
cannot be changed
dynamically (on-the-fly).
To configure the router and a router interface for the Ethernet port:
Dont specify a system address. You use the IP address of the to-be-
configured router interface to access ACE-3105, ACE-3205.
Define the first router interface (router interface 1) as follows:
Assign 172.17.180.153 or any desired IP address and 24 as the prefix for
the 24-bit prefix of the mask. Leave DHCP disabled.
Assign Ethernet port 1 (to reflect the port in use) as name to identify the
router interface.
Enable the router interface using the no shutdown command.
Configure a static route, setting the static routes IP address to
172.17.181.100, the next gateway (hop) to 172.17.180.200 and the priority
to 1.
Define a default gateway, for example 172.17.180.1.
Server IP : 192.114.24.10
Gateway IP : 172.17.180.1
Standards
VCCs/VPCs and VCLs/VPLs are defined in RFC1695.
Factory Defaults
No VCL or VPL interfaces are defined by default.
Configuring a VPL vpl e1 < port> vp <0..4095> type {atm-xc|pw} VP: Virtual path, states
interface over E1 [out-traffic-descriptor <1..99999>] [in-traffic- the virtual path index
descriptor <0..99999>] [oam-descriptor (VPI).
<1..256>] Type: Specifies if the VPL
interface is associated
with a pseudowire or an
ATM cross connection.
Out traffic descriptor:
Specifies the channels
Out-TD.
In traffic descriptor:
Specifies the channels
In-TD.
Task Command
Deleting a VPL interface over E1 no vpl e1 < port> vp <0..4095> type {atm-xc|pw}
Deleting a VPL interface over an IMA no vpl ima-group <port number> vp <0..4095> type {atm-xc|pw}
group
Configuring a VCL vcl e1 < port> vc <0..4095/0..65535> type VC: Virtual channel, states
interface over E1 {atm-xc|ces-vc|pw|vcl-interface|router} [out- the virtual path index and
traffic-descriptor <1..99999>] [in-traffic- the virtual channel index
descriptor <0..99999>] [oam-descriptor (VPI/VCI).
<1..256>] CES-VC: CES virtual
connection
VCL-Interface: Virtual
channel link interface
Router. Router interface.
VCL interfaces must be
configured before
configuring an ATM router
interface.
Task Command
Disabling a VCL interface over an no vcl ima-group <port number> vc <0..4095/0..65535> type
IMA group {atm-xc|ces-vc|pw|vcl-interface|router}
Example
The example below illustrates how to create and configure a VCL interface over
the first E1 interface and an ATM cross-connection. Use the following
parameters:
For the virtual channel (VC), use 4095 for the VPI and 65535 for the VCI.
Set the type to ATM-XC (ATM cross connection).
Set the outbound traffic descriptor to 1.
Set the inbound traffic descriptor to 1.
Set the OAM descriptor to 1.
ACE-3105, ACE-3205>config>port>atm# vcl e1 1 vc 4095/65535 type atm-xc out-
traffic-descriptor 1 in-traffic-descriptor 1 oam-descriptor 1
ACE-3105, ACE-3205>config>port>atm#
To view the current statistics for a VPL (over the second E1 port and VP set to
4095):
At the config>port>atm# prompt, enter show e1 2 vp 4095 statistics current.
Statistics for the current time interval appear as illustrated in the screen
image. Parameters that appear are illustrated below.
Current
-----------------------------------------------------------------------------
Time Elapsed (Sec) 403
Valid Intervals 24
ATM-155 1 VP 1 E1-UNI 2 VP 1
Rx Cells(CLP 0+1) 0 0
Rx Cells(CLP 0) 0 0
Policing Discard(CLP 0+1) 0 0
Policing Discard(CLP 0) 0 0
Tagged Cells 0 0
Tx Cells(CLP 0+1) 0 0
Tx Cells(CLP 0) 0 0
Congestion Discard (CLP 0+1) 0 0
Congestion Discard (CLP0) 0 0
OAM Rx AIS 0 0
OAM Rx RDI 0 0
OAM Tx RDI 0 0
LOC 0 0
FM SES 0 0
FM UAS 0 0
Loopback Avrg.Delay (usec) 0 0
Loopback Min.Delay (usec) 0 0
Loopback Max.Delay (usec) 0 0
Loopback CDV 0 0
Loopback Errored Session 0 0
ACE-3105, ACE-3205>config>port>atm#
To view the current statistics for a VCL (over the first E1 port and VC set to
4095/65535):
At the config>port>atm# prompt, enter show vcl e1 1 vc 4095/65535
statistics current.
Statistics for the current time interval appear as illustrated in the screen
image. Parameters that appear are illustrated below.
Current
-----------------------------------------------------------------------------
Time Elapsed (Sec) 447
Valid Intervals 24
ATM-155 1 VC 32 E1-UNI 1 VC 32
Rx Cells(CLP 0+1) 4468564 2024338
Rx Cells(CLP 0) 0 0
Policing Discard(CLP 0+1) 457 0
Policing Discard(CLP 0) 0 0
Tagged Cells 0 0
Tx Cells(CLP 0+1) 2024336 2024338
Tx Cells(CLP 0) 0 0
Congestion Discard (CLP0) 0 0
Congestion Discard (CLP 0+1) 2443773 0
OAM Rx AIS 0 0
OAM Rx RDI 0 0
OAM Tx RDI 0 0
LOC 0 0
FM SES 0 0
FM UAS 0 0
Loopback Avrg.Delay (usec) 0 0
Loopback Min.Delay (usec) 0 0
Loopback Max.Delay (usec) 0 0
Loopback CDV 0 0
Loopback Errored Session 0 0
Standards
RFC 2516.
Functional Description
PPPoE stands for Point-to-Point over Ethernet. It is a protocol that encapsulates
PPP frames inside Ethernet frames and is used mainly with DSL services where
individual users connect to the DSL modem over Ethernet.
Up to four PPPoE sessions can be initiated for acquiring IP addresses of all
data/voice and management connections. When working with multiple sessions
of PPPoE or other dynamic entities, ACE-3105, ACE-3205 provides virtual MAC
addresses in addition to the standard ones that are provided for each physical
port. Once the virtual MAC file is loaded, it is used by PPPoE entities and bridge
ports, if such are configured.
In addition:
When a VCL is defined for DSL ports, several PPPoE sessions can be defined
on the same VCL
Two PPPoE sessions can be established over the same ADSL2+ interface.
One PPPoE session is used to carry OAM traffic directed towards/from
ACE-3105, ACE-3205, and the second PPPoE session is used to carry all the
traffic to/from the Node B (a single PPPoE session is used for both data and
OAM traffic of the Node B)
Each PPPoE session uses a different virtual source MAC address, and allocates
a dynamic IP address from the LNS. The allocated IP address does not
change, and another IP interface is defined statically on the Ethernet port
Benefits
The PPPoE protocol allows point-to-point connections over Ethernet while
Ethernet networks themselves are packet-based and have no concept of a
connection or circuit.
Factory Defaults
By default, PPPoE is disabled.
Configuring PPPoE
Some parameters apply to point-to-point (PPP) protocols in general while others
specifically apply to the point-to-point over Ethernet (PPPoE). Therefore
parameters are available under PPP and PPPoE.
You can enable and operate up to four PPP ports as explained below.
Defining the authentication and authentication chap [minimum pap. Simple password
the minimum authentication level {pap|chap}} authentication, no
used by the PPP session. Default: chap, encryption prior to
minimum authentication level: pap transmission
chap. Secure
authentication protocol
that does not transmit
passwords over the
networks.
To configure PPPoE:
1. At the config>port>ppp(<1..4>)# prompt, enter pppoe.
The config>port>ppp(<1..4>)>pppoe# prompt appears.
2. Configure the PPPoE settings as illustrated and explained.
Defining the name of a specific service-name {free text] If the the access
service that may be requested concentrator does not
during the PPPoE session. support the requested
service, the session will not
be enabled.
Scheduling the time at around scheduled-restart <hh:mm:ss> Changing the random range
which the PPPoE session should {random-range [0..3600]} triggers the re-selection of a
restart. random value.
A random time range can be
defined during to which the
scheduled restart will occur.
Defining the range from which a backoff-random-range {0..600} Changing the random range
random back-off value will be triggers the re-selection of a
chosen. random value.
The random value is the number
of delay seconds, applied before
the initialization of each PPPoE
session. This means that the
PPPoE initialization packet (PADI)
is not sent until the defied delay
expires.
Example
The following section illustrates how to enable and configure a PPP port and the
PPPoE:
Bind Gigabit Ethernet port labeled 1 (port 1) to the PPP.
Set the authentication level to CHAP and the minimum authentication level to
PAP.
Specify test as user name and 1234 as password for authentication.
Administratively enable the PPP.
Enable and configure the PPPoE.
Assign conc-1 as AC name.
Assign serv-1 as service name.
Schedule 7:00:00 as restart time and provide a random range of 600 s.
Do not define a backoff random range.
Do not enable VLAN tagging.
LCP Indicates whether the LCP of the PPP session is Not applicable
currently up or down. Up
Down
IPCP Indicates whether the IPCP of the PPP session is Not applicable
currently up or down Up
Down
Remote MRU Value of the remote MRU (maximum receive unit) Numerical
Local MAC Displays the MAC address associated with the XX-XX-XX-XX-XX-XX
PPPoE session. (hexadecima)
Backoff Time The actual delay in seconds before every PPPoE Number of seconds
initialization process (not including a scheduled
restart). If the first PPPoE packet is not sent, this
delay expires.
PPPoE :
Session Status : UP Session ID : 1
Remote MAC : 00-20-D2-20-51-CD Local MAC : 00-20-D2-22-AB-60
Backoff Time (Sec) : 0
Scheduled Restart : 07:08:17
4.28 Pseudowires
Pseudowires are an emulation of Layer-2 point-to-point connection-oriented
services over packet-switching networks (PSN).
Services are carried over pseudowires over PSN such as ATM, Ethernet or TDM,
while the PSN may either be MPLS (Multi-protocol label switching) or IP.
Standards
RFC 4448 - Encapsulation Methods for Transport of Ethernet over MPLS Networks
RFC 4447 - Pseudowire Setup and Maintenance - Using the Label Distribution
Protocol (LDP)
RFC 4553 - Structure-Agnostic Time Division Multiplexing (TDM) over Packet
(SAToP)
RFC 4717 - Encapsulation Methods for Transport of Asynchronous Transfer Mode
(ATM) over MPLS Networks
RFC 5086 - Structure-Aware Time Division Multiplexed (TDM) Circuit Emulation
Service over Packet Switched Network (CESoPSN)
RFC 5287 - Control Protocol Extensions for the Setup of Time-Division
Multiplexing (TDM) Pseudowires in MPLS Networks.
Y.1411 - ATM pseudowires
Y.1412 - AAL5 pseudowires
Y.1413 - TDM pseudowires
Functional Description
This section illustrates and explains the pseudowire structure for Ethernet, ATM
and TDM pseudowires.
Ethernet header
PSN Header
Control Word
Payload
0 0 0 0 Reserved (4 bits)
ATM Control
Sequence number (2 bytes)
M V Reserved PTI C
Cell Header
VCI (2 bytes)
The following figure illustrates the multiple cells concatenation in 1:1 mode:
0 0 0 0 Reserved (4 bits)
ATM Control
Sequence number (2 bytes)
M V Reserved PTI C
Cell Header
VCI (2 bytes)
M V Reserved PTI C
Cell Header
VCI (2 bytes)
M V Reserved PTI C
Cell Header
VCI (2 bytes)
In N-to-one (N:1) mapping mode (selectable), one or more ATM VCCs/VPCs are
mapped to a pseudowire link. The following figure illustrates the packet format in
N:1 mode:
0 0 0 0 flags (4 bits)
ATM Control Reserved length (6 bits)
Sequence number (2 bytes)
VPI (12 bits)
The following figure illustrates the multiple cells concatenation in N:1 mode:
0 0 0 0 flags (4 bits)
ATM Control Reserved length (6 bits)
Sequence number (2 bytes)
4 bytes cell header
0 0 0 0 T E C U
Reserved length (6 bits)
Sequence number (2 bytes)
TDM Payload
The following figure illustrates the structure of the TDM payload:
Timeslot 1
Up to N Timeslot 2
timeslots in a
bundle
Timeslot N
Timeslot 1
Up to N Timeslot 2
Payload
timeslots in a Up to M
bundle TDM frames
Timeslot N
Timeslot 1
Timeslot 2
Timeslot N
Clock Encapsulation
ACE-3105, ACE-3205 can encapsulate and distribute an adaptive clock, based on
the CESoPSN format, explained and illustrated under CESoPSN Control Word. The
maximum payload size is 512 bytes. ACE units at the desired destination receive
the adaptive clock by setting the recovered clock to Adaptive as explained under
Recovered Clock.
Ethernet header
PSN Header
0 0 0 0 L R M FRG LEN (6 bits)
Sequence number (2 bytes)
Timeslot 1
Up to N Timeslot 2
timeslots in a
bundle
Timeslot N
Timeslot 1
Up to N Timeslot 2
Payload
timeslots in a Up to M
bundle TDM frames
Timeslot N
Timeslot 1
Timeslot 2
Timeslot N
Each port can only operate in one classification mode. The mode of a port is
determined by the mode of the first flow configured on that specific Ethernet
port.
The Ethernet pseudowire cross connection (PW XC) is created by mapping the
pseudowire to the SVI. In N:1 mode, multiple flows will terminate at the same SVI
and this SVI will be mapped to a single pseudowire, so that different flows will be
directed to the same pseudowire
VLAN ID
The RNC differentiates the traffic to several Node Bs by assigning an individual
VLAN ID to every Node B. A single pseudowire is created per assigned VLAN ID.
VLAN ID + P Bits
The RNC differentiates the traffic to several Node Bs by assigning a different
VLAN ID to every Node B. Different traffic classes such as signaling, voice and
data are separated by defining a different priority for every class. A single
pseudowire is created per combination of VLAN ID and priority.
DST IP
The RNC differentiates traffic directed to several Node Bs by assigning a different
IP address to every Node B. A single pseudowire is created per destination (Node
B) IP address or range of destination IP addresses.
DST IP + IP Precedence
The RNC differentiates traffic to several Node Bs by assigning a different IP
address to every Node B. Different traffic classes such as signaling, voice and
data are separated by defining a different priority for every class. A single
pseudowire is created per combination of destination IP address and IP
Precedence bit or per range of destination IP addresses and IP Precedence bits.
DST IP + DSCP
This option is similar to the previous one. The difference is that the priorities are
marked by DSCP bits instead of IP Precedence bits.
Raw/Tagged Mode
In both modes, VLAN Manipulation (push, pop, swap) is supported in user to
network direction. It is not supported in network to user direction.
The only difference between the two modes is that if the Ethernet pseudowire is
configured with LDP enabled, the Ethernet pseudowire is bound to a single flow
over a single VLAN. This VLAN is published via LDP packets.
Factory Defaults
By default, no pseudowires are configured. If you configure a pseudowire, the
following default values are set.
The number of an existing peer device to which to assign the current pseudowire. Next higher number
after the the last peer
device you defined
Configuring Pseudowires
To configure pseudowires, you have to configure the ATM parameters, clear the
DF bit (if required), set the MTU settings (if required) and then select the
pseudowire type.
Note This parameter is relevant only if you use certain Cisco routers as pseudowire
peers.
Note This parameter is relevant only if you use certain Cisco routers as pseudowire
peers.
Enabling the MTU mtu-tlv-sent The MTU type length value must
type length value. be enabled for transmitting LDP
TDM pseudowires over Cisco
routers.
Specifying the number peer <1..8> A peer with a multicast IP address can be
of an existing peer set only for a clock distribution or a clock
device to which the recovery PW.
current pseudowire is A peer that is routed through a PPPoE
assigned. router interface cannot be set for MPLS
over GRE.
The peer number cannot be changed
dynamicaly (on-the-fly).
Enabling the use of a control-word The control word can be disabled only in the
control word on this following pseudowire types:
pseudowire ATM VP 1 to 1 (atm-vp-1-to-1)
ATM VC 1 to 1 (atm-vc-1-to-1)
ATM VP N to 1 (atm-vp-n-to-1)
ATM VC N to 1 (atm-vc-n-to-1)
Ethernet PW
Selecting the Tx queue tx-queue {high|medium|low} Specifies the priority of the pseudowire in the
level outbound direction via the Ethernet port. Not
relevant when the pseudowire subtype is
clock recovery.
Note: For clock distribution pseudowires, the
priority level is assigned automatically and
cannot be changed.
Enabling and oam vccv-bfd [{multiplier <2..60} Not relevant for SAToP, Basic CES PSN or
configuring the OAM {tx-minimum AAL5-SDU pseudowires
VCCV-BFD protocol <1000000..4294967295>}
{rx-minimum
<1000000..4294967295>}]
Eabling and vlan [id <0..4094>] [priority The VLAN ID and priority are indicated to
configuring VLAN <0..7>] every transmitted packet of the relevant
tagging on every pseudowire.
transmitted packet
Assigning the EXP bits exp-bits <0..7> Applies only to MPLS-based PSNs such as
to be used on the MPLS, MPLSoIP, MPLSoGRE and only if the PW
pseudowire label and subtype is data or clock distribution.
the tunnel label.
Specifying the value tos <0..255> Applies if the PSN type is UDP over IP, MPLS
for the ToS byte used over IP, or MPLS over GRE.
on outbound traffic
Specifying the ingress tunnel-index [ingress {0|<1..8>}] Relevant for MPLS based PSNs only
and egress tunnel [egress {0|<1..8>}] Ingress tunnel, ot relevant for clock
indices distribution
Cannot be modified dynamically (on the
fly)
The ingress tunnel provisioning mode
(manual or LDP driven) must be the same
as the egress tunnel provisioning mode
0 the tunnel label is not used.
Configuring the ATM atm-payload [max-cells <1..29>] max-cells. Refers to the max number of
service parameters [aal5-mode {enable|disable}] ATM cells concentrated in a single
(ATM payload) [timeout-mode enable timeout Ethernet frame for this pseudowire.
<100..5000000>} An Ethernet frame is sent only if the max
number of cells has been reached, if an
ATM cell indicating the end of AAL5-PDU
atm-payload [max-cells <1..29>]
has been received (LBS in PTI field = 1),
[aal5-mode {enable|disable}]
if the timeout for this pseudowire has
[timeout-mode disable}
expired.
aal5-mode. Enables or disables the AAL5
mode for the relevant psudowire. When
enabled, reciving a cell with PTI=1 triggers
a frame transmission. This parameter is
not relevant for AAL5-SDU pseudowires.
timeout-mode. Enables or disables the
timeout mechanism for the relevant
pseudowire and specifies the timeout in
usec, if enabled. This parameter is not
relevant for the AAL5-SDU pseudowire
type.
Configuring the TDM tdm-payload [size <34..512>] size. The payload size in bytes. It is
payload for CES over [rate <1..31>] multiplied with the number of timeslots in
PSN. the bundle.
rate. The number of time slots for each
frame in the packet. The value of size/rate
should be 2 to 256.
Configuring the TDM tdm-payload [size <34..512>] size. The payload size in bytes, The
payload for SAToP. payload size is multiplied with 32.
rate. The number of time slots for each
frame in the packet. The value of size/rate
should be 2 to 256.
Specifying the jitter jitter-buffer <1000..32000> The jitter buffer compensates for the packet
buffers delay towards delay variation tolerance (PDVT) and general
the transmit direction network jitter.
in usec. The minimum value cannot be lower than the
packetization delay, which is calculated as
follows:
For E1/T1 CES PSN packetization delay
the payload size (frames in packet) is
doubled by 125 microseconds.
For T1 SAToP packetization delay the
payload size (frames in packet) is
multiplied with 32. The result is divided by
24 and then multiplied with 125
microseconds:
{[payload size x 32] : 24} x 125 usecs.
Note
Once activated, a pseudowire cannot be deactivated (shut down).
Name : PW-5
PW Type : SAToP
PSN Type : MPLS
Operational Status : -
Local Status : Forwarding
Remote Status : N/A
Active Router IF :
Out Label : 0
Out Tunnel Label : 0
In Label : 0
In Tunnel Label : 0
ACE-3220>config>pwe>pw(5)$
Defining an ATM- atm-vp [{e1|t1} <1..4/8/16>] [vp <0..4095>] [{e1|t1} e1/t1. Port 1, carrying
VP cross <1..4/8/16>] [vp <0..4095>] [name {name}} the stream to be cross
connection for a connected with the
stream of one VP stream on port 2
received over vp. Virtual path of the
E1/T1 and to be stream on port 1.
cross-connected
e1/t1. Port 2
with a stream of
another VP to be vp. Virtual path of the
transmitted over stream on port 2
the same or a name. Name of the
different E1/T1 cross connection that
port. attaches the stream
received over E1 (port
1) to the stream that
transmits over E1 (port
2).
Defining an ATM- atm-vp [{e1|t1} <1..4/8/16>] [vp <0..4095>] [ima-group e1/t1. Carries the
VP cross <group number>] [vp <0..4095>] [name {name}} stream to be cross
connection for a connected with the
stream received of stream transmitted over
one VP over E1 and the IMA group. The
to be cross- number of available E1
connected with a ports depends on your
stream of another hardware profile
VP to be vp. Virtual path of the
transmitted over stream on E1.
IMA.
ima-group. IMA group
vp. Virtual path of the
stream transmitted over
the IMA group.
name. Name of the
cross connection that
attaches the stream
received via E1 to the
stream that transmits
over the IMA group.
Defining an ATM- atm-vp [{e1|1} <1..4/8/16>] [vp <0..4095>] [shdsl e1/t1. Carries the
VP cross {1|2|3|4|5|6|7|8}] [vp <0..4095>] [name {name}} stream to be cross
connection for a connected with the
stream received stream transmitted over
over E1/T1 and to SHDSL. The number of
be cross- availabble E1 ports
connected with a depends on your
stream to be hardware profile.
transmitted over vp. Virtual path of the
SHDSL. stream on E1.
shdsl. SHDSL port
vp. Virtual path of the
stream transmitted over
SHDSL.
name. Name of the
cross connection that
attaches the stream
received over E1 to the
stream that transmits
over SHDSL.
Defining an ATM- atm-vp [ima-group <group number>] [vp <0..4095>] ima-group. Carries the
VP cross [{e1|t1} <1..4/8/16>] [vp <0..4095>] [name {name}} stream to be cross
connection for a connected with the
stream received stream transmitted over
over IMA and to be E1.
cross-connected vp. Virtual path of the
with a stream to stream transmitted over
be transmitted the IMA group.
over E1/T1.
e1/t1. E1/T1 port
vp. Virtual path of the
stream transmitted over
E1.
name. Name of the
cross connection that
attaches the stream
received via E1/T1 to
the stream that
transmits over E1/T1.
Defining an ATM- atm-vp [ima-group <group number>] [vp <0..4095>] ima-goup. Port 1,
VP cross [ima-group <group number>] [vp <0..4095>] [name carrying the stream to
connection for a {name}} be cross connected with
stream received the stream on port 2
over IMA and to be vp. Virtual path of the
cross-connected stream on port 1.
with a stream to
ima-group. Port 2
be transmitted
over a different vp. Virtual path of the
IMA group. stream on port 2
name. Name of the
cross connection that
attaches the stream
received over the IMA
group (port 1) to the
stream that transmits
over the IMA group
(port 2).
Defining an ATM- atm-vp [shdsl {1|2|3|4|5|6|7|8}] [vp <0..4095>] [{e1|t1} shdsl. Carries the
VP cross <1..4/8/16>] [vp <0..4095>] [name {name}} stream to be cross
connection for a connected with the
stream received stream transmitted over
over SHDSL and to E1.
be cross- vp. Virtual path of the
connected with a stream on SHDSL.
stream to be
e1/t1. E1/T1 port
transmitted over
E1/T1. vp. Virtual path of the
stream transmitted over
E1.
name. Name of the
cross connection that
attaches the stream
received over SHDSL to
the stream that
transmits over E1.
Removing a VP no atm-vp [{e1|t1} <1..4/8/16>] [vp <0..4095>] [{e1|t1} Modify the syntax for
cross connection <1..4/8/16>] [vp <0..4095>] removing cross connections
for ATM VPs. over other ports
accordingly.
Defining an ATM- atm-vc [{e1|t1} <1..4/8/16>] [vc <0..4095/0..65535>] e1/t1. Port 1, carrying
VC cross [{e1|t1} <1..4/8/16>] [vc <0..4095/0..65535>] [name the stream to be cross
connection for a {name}} connected with the
stream received stream on port 2
over E1/T1 and to vc. Virtual channel of
be cross- the stream on port 1.
connected with a
e1/t1. Port 2
stream to be
transmitted over a vc. Virtual channel of
different E1/T1 the stream on port 2
port. name. Name of the
cross connection that
attaches the stream
received over E1/T1
(port 1) to the stream
that transmits over
E1/T1 (port 2).
Defining an ATM- atm-vc [{e1|t1} <1..4/8/16>] [vc <0..4095/0..65535>] e1/t1. Carries the
VC cross [ima-group <group number>] [vc <0..4095/0..65535>] stream to be cross
connection for a [name {name}} connected with the
stream received stream transmitted over
over E1/T1 and to the IMA group.
be cross- vc. Virtual channel of
connected with a the stream on E1/T1.
stream to be
ima-group. IMA group
transmitted over
IMA. vc. Virtual channel of
the stream transmitted
over the IMA group.
name. Name of the
cross connection that
attaches the stream
received via E1/T1 to
the stream that
transmits over the IMA
group.
Defining an ATM- atm-vc [{e1|t1} <1..4/8/16>] [vc <0..4095/0..65535>] e1/t1. Carries the
VC cross [shdsl {1|2|3|4|5|6|7|8}] [vc <0..4095/0..65535>] [name stream to be cross
connection for a {name}} connected with the
stream received stream transmitted over
over E1 and to be SHDSL
cross-connected vc. Virtual channel of
with a stream to the stream on E1/T1.
be transmitted
shdsl. SHDSL port
over SHDSL.
vc. Virtual channel of
the stream transmitted
over SHDSL.
name. Name of the
cross connection that
attaches the stream
received over E1/T1 to
the stream that
transmits over SHDSL.
The number of E1/T1
ports and the
availability of SHDSL
interfaces depend on
your hardware
configuration.
Defining an ATM- atm-vc [ima-group <group number>] [vc ima-group. Carries the
VC cross <0..4095/0..65535>] [{e1|t1} <1..4/8/16>] [vc stream to be cross
connection for a <0..4095/0..65535>] [name {name}} connected with the
stream received stream transmitted over
over IMA and to be E1/T1.
cross-connected vc. Virtual channel of
with a stream to the stream transmitted
be transmitted over the IMA group.
over E1/T1.
e1/t1. E1/T1 port
vc. Virtual channel of
the stream transmitted
over E1/T1.
name. Name of the
cross connection that
attaches the stream
received via E1/T1 to
the stream that
transmits over E1.
Defining an ATM- atm-vc [shdsl {1|2|3|4|5|6|7|8}] [vc <0..4095/0..65535>] shdsl. Carries the
VC cross [{e1|t1} <1..4/8/16>] [vc <0..4095/0..65535>] [name stream to be cross
connection for a {name}} connected with the
stream received stream transmitted over
over SHDSL and to E1/T1.
be cross- vc. Virtual channel of
connected with a the stream on SHDSL.
stream to be
e1/t1. E1/T1 port
transmitted over
E1/T1. vc. Virtual channel of
the stream transmitted
over E1/T1.
name. Name of the
cross connection that
attaches the stream
received over SHDSL to
the stream that
transmits over E1/T1.
Defining an ATM- atm-ces [ima-group <group number>] [vc ima-group. Carries the
CES cross <0..4095/0..65535>] [{e1|t1} <1..4/8/16>] [time-slots stream to be cross-
connection for <0..31>] [jitter-buffer <1..32>} [name {name}} connected with the E1
ATM VPs over IMA stream.
group and E1/T1. vc. Virtual channel of
the stream on port 1.
e1/t1. E1/T1 port
time-slots. The CES
bundles time slot.
jitter-buffer. CDVT
buffer delay in
milliseconds towards
the transmit direction
(ATM to TDM).
name. Name of the
cross connection.
2. Configure the cross connection as illustrated and explained below for the
various interfaces.
Defining a pw-vp [pw <pw number>] [e1 <1..4/8/16>] [vp pw-vp. A previously
pseudowire cross <0..4095>] [to-psn <0..4095>] [from-psn <0..4095>] configured pseudowire
connection over E1 e1/t1. The port used by
between two the pseudowire
PSNs.
to-psn. VP carried
towards the target PSN
from-psn. VP carried
towards the PSN that
carries the PW.
Defining a pw-vp [pw <pw number>] [ima-group <group number>] pw-vp. A previously
pseudowire cross [vp <0..4095>] [to-psn <0..4095>] [from-psn configured pseudowire
connection over <0..4095>] ima-group. A previously
IMA between two configured pseudowire
PSNs.
to-psn. VP carried
towards the target PSN
from-psn. VP carried
towards the PSN that
carries the PW.
Defining a pw-vp [pw <pw number>] [{e1|t1} <1..4/8/16>] [vp pw-vp. A previously
pseudowire cross <0..4095>] [to-psn <0..4095>] [from-psn <0..4095>] configured pseudowire
connection over E1 e1/t1. The port used by
between two the pseudowire
PSNs.
to-psn. VP carried
towards the target PSN
from-psn. VP carried
towards the PSN that
carries the PW.
Defining a pw-vc [pw <pw number>] [{e1|t1} <1..4/8/16>] [vc pw-vc. A previously
pseudowire cross <0..4095/0..65535>] [to-psn <0..4095/0..65535>] configured pseudowire
connection over E1 [from-psn <0..4095/0..65535>] e1/t1. The port used by
between two the pseudowire
PSNs.
to-psn. VC carried
towards the target PSN
from-psn. VC carried
towards the PSN that
carries the PW.
Defining a pw-vc [pw <pw number>] [ima-group <group number>] pw-vc. A previously
pseudowire cross [vc <0..4095/0..65535>] [to-psn <0..4095/0..65535>] configured pseudowire
connection over [from-psn <0..4095/0..65535>] ima-group. A previously
IMA between two configured pseudowire
PSNs.
to-psn. VC carried
towards the target PSN
from-psn. VC carried
towards the PSN that
carries the PW.
Defining a TDM pw-tdm [pw <pw number>] [{e1|t1} <1..4/8/16>] [time- pw-tdm. A previously
pseudowire cross slots <0..31>] configured TDM
connection over pseudowire
E1/T1 e1/t1. The port used by
the pseudowire
time-slots. The
designated time slots at
the destination
Example
This section provides an example on creating a TDM pseudowire cross connection
using the following parameters:
Use pseudowire (pw) 1.
Use E1 port 4.
Set the time slot to 10.
ACE-3105, ACE-3205>config>xc# pw-tdm pw 1 e1 4 time-slots 10
ACE-3105, ACE-3205>config>xc#
4.30 Administration
This section covers administrative tasks such as entering contact info, viewing
inventory, defining the clock source, adjusting the system clock, file management,
operating a remote system slog (Syslog) server etc. In addition, this section
instructs you on resetting the unit. It also contains the global commands, which
are available from any level.
timeout and number of retries for file transfers to the unit and view the
inventory.
Specifying the interval for retrying tftp timeout <1..1000> retry-timeout 10 In this case, TFTP refers to
file transfers and the timeout file transfers not related to
after unsuccessful attempts (in upgrades.
seconds).
Assigning an alias name for the inventory alias <user assigned alias Refer to Viewing the
physical entity as specified by a name> Hardware and Software
network manager. Profile for additional
information.
Clock Domain
Before you can configure the distributed and recovered clocks respectively, you
have to define and configure the clock domain. ACE units only support one clock
domain at present.
Disabling the the Quality mode no quality The clock source is selected
according to the configured
clock source priority.
Assigning a priority to the specific priority <1..2> The number of priority levels corresponds to the
clock source. number of clock sources in the domain, which can
be up to 2 at present. 1 assigns the highest priority
to the current clock source and the highest number
assigns the lowest priority.
Disabling the priority for the no priority No priority is given to the current clock source.
current clock source
Task Command
Entering the time in seconds that the system waits to wait-to-restore <0..720>
recover the clock source after it has been restored Default: 300
upon failure.
Task Command
ACE-3105, ACE-3205>config>system>clock>domain(1)>source(1)#
Parameter Comments
ESMC Failure Counter The number of EMSC failures. An EMSC failure is declared, if no ESMC messages
were received for 5 seconds.
ACE-3105, ACE-3205>config>system>clock>domain(1)>source(1)#
ACE-3105, ACE-3205>config>system>clock>domain(1)#
Specifying the master clock master rx-port [{e1|t1} <1..4/8/16>| Specifies the port via
source shdsl 1|ima-group <1..5>/9/17>] which to transmit the
master clock source.
Specifying the fallback fallback rx-port [{e1|t1} <1..4/8/16>| Specifies the port via
clock source sdh-sonet <1..2>|shdsl 1|ima-group <1..5>/9/17>] which to transmit
the fallback clock
source.
You should use the
same port as for the
master clock.
Specifying the fallback fallback rx-port [{e1|t1} <1..4/8/16>| Specifies the port via
clock source sdh-sonet <1..2>|shdsl 1|ima-group <1..5>/9/17>] which to transmit
the fallback clock
source.
You should use the
same port as for the
master clock.
Recovered Clock
ACE-3105 units can recover the Precision Time Protocol IEEE-1588 clock
distributed by ACE-3220.
In addition, you can recover a clock transmitted over TDM pseudowire by any ACE
unit.
ACE-3200 and ACE-3205 units can recover a clock transmitted over TDM
pseudowire by any ACE unit.
Specifying the type of the network-type <type-a|type- type-a. Networks with low jitter (low
PSN from which the clock b|type-c|type-d> noise) and low PDV.
is recovered Default: type-b Compatible only with the Stratum 1 and
Stratum 2 clock type.
type-b. Networks with high jitter (high
noise). Compatible with all clock types.
type-c. Networks in DSL-based backhaul
applications.
type-d. Applies to SHDSL links only.
Specifying the type of the network-type <type-a|type-c> type-a. Networks with low jitter (low
PSN from which the clock Default: type-a noise) and low PDV.
is recovered Compatible only with the Stratum 1 and
Stratum 2 clock type.
type-c. Networks in DSL-based backhaul
applications.
Specifying the type of the network-type <type-a|type-c> type-a. Networks with low jitter (low
PSN from which the clock Default: type-a noise) and low PDV.
is recovered Compatible only with the Stratum 1 and
Stratum 2 clock type.
type-c. Networks in DSL-based backhaul
applications.
Current
-----------------------------------------------------------------------------
Time Elapsed (Sec) 685
Valid Intervals 3
Rx Packets 0
Lost Packets 0
Out of Order Packets 0
ACE-3105, ACE-3205>config>system>clock>recovered(1/adaptive)#
Parameter Comments
Time Elapsed Time that has elapsed since the beginning of he current interval .
Out of Order Packets Number of packets that arrived in the wrong order
Current
-----------------------------------------------------------------------------
Time Elapsed (Sec) 677
Valid Intervals 5
Rx Sync Packets 0
Rx Follow Up Packets 0
Lost Packets 0
Out of Order Packets 0
ACE-3105, ACE-3205>config>system>clock>recovered(1/1588)#
Parameter Comments
Time Elapsed Time that has elapsed since the beginning of the current interval.
Out of Order Packets Number of packets that arrived in the wrong order
To specify the system date and time and daylight saving time options:
1. At the config>system# prompt, enter date-and-time.
The config>system>date-time# prompt appears.
2. Specify the date and time and associated parameters as illustrated and
explained below.
Task Command
Task Command
Defining the summer time summer date start <yyyy-mm-dd> <hh:mm> end <yyyy-mm-dd> <hh:mm>
according to specified offset <0..600>
dates.
Task Command
Task Command
Specifying the UDP port on the server that receives port <1..65535>
the syslog messages. Default: 514
Task Command
ACE-3105, ACE-3205>config>system>syslog(device)#
Parameter Description
Non- queued Dropped Messages The total number of syslog messages that were dropped before being
queued.
ACE-3105, ACE-3205>config>system#
ACE-3105, ACE-3205>config>system#
File Operations
You can do the following:
Transfer files via SFTP, TFTP or XMODEM
Copy files within the ACE-3105, ACE-3205 unit
Display files
Swap files
Delete files.
You can copy files using the copy command, or via the commands shown in
Table 4-22. As shown in the table, some commands that reset the device also
erase the saved user configuration by copying another file to it before the reset.
Downloading/Uploading Files
You can download or upload files to the ACE-3105, ACE-3205 unit via SFTP.
Normally the types of files copied are configuration files and software files.
Software files can also be downloaded to ACE-3105, ACE-3205 via the Boot
Manager, using XMODEM or TFTP. For details on upgrading the device software
and additional information on TFTP and XMODEM, refer to Chapter 6.
Note TFTP is available only when downloading a software image via the Boot Manager.
When you copy files using the copy command, you have to use SFTP.
5. Check whether port 22 appears on the exceptions list. If it does not, click
Add Port and add it to the list of exceptions.
Note Different firewall types require different configuration. Refer to your firewall's
documentation to check how SFTP file transfers can be allowed to pass through it
using TCP port 22.
For example:
ACE-3105, ACE-3205# file
ACE-3105, ACE-3205>file# dir
Swapping Files
You can swap local files, for example the main and backup configurations.
Deleting Files
You can delete the user default configuration or the license. Before deleting a
file, make sure that it is not in use. For additional information on configuration
files and the consequences of deleting, refer to Configuration Files and Loading
Sequence in Chapter 3.
To delete a file:
1. At the file# prompt, enter delete {user-default|license}.
You are asked to confirm the deletion.
2. Confirm the deletion.
The unit reverts to the factory default.
For example:
ACE-3105, ACE-3205# file
ACE-3105, ACE-3205>file# delete user-default
File will be erased. Are you sure?? [yes/no] _yes
Global Commands
Global commands are general commands that let you ping different devices,
display the tree of the current level etc. For a list of those commands, refer to
the table below.
Task Command
Self-Test
ACE-3105, ACE-3205 can be tested in order to diagnose possible setbacks as
explained below.
LEDs
This section lists the LED statuses for the system and the various ports and
explains what they indicate.
Table 5-1. System LED Indicators
ALM Red On: One or more alarms are active. Refer to list
of alarms under Alarms and Traps.
Off: No active alarms
ACE-3105, ACE-3205>config>system#
Statistic Counters
Statistic counters provide information on possible abnormal behavior and failures.
You can collect statistics of the following:
RADIUS server
Physical ports such as Ethernet, E1/T1, DSL, SDH/SONET etc.
IMA groups
VPL and VCL connections.
For further information, refer to the relevant sections in Chapter 4 and the
relevant sections in the troubleshooting chart.
Even though masked traps are not sent, all alarms are recorded in the system
event log once they are triggered.
Note Not all events and alarms may be relevant for you specific configuration. Relevant
alarms and events depend on your hardware configuration.
1. Cold start
2. Device reset
4. Login Valid/Invalid
5. Authentication Fail
1. BFD Up No diagnostic PW #n
1. PW Up No diagnostic PW #n
2. PW Down No diagnostic PW #n
1. Rx L|M='100' Start/End PW #n
2. Rx R=L Start/End PW #n
3. Underrun Start/End PW #n
1. Cold Start
2. Agent Status
3. TFTP status
4. Authentication failure
5. Power failure
6. Fan failure
7. Upload data
9. Port status
25. PW up/down
Corrective Measures
Depending on the reported alarm and its severity, change the units configuration
or check the integrity of ports, connections or standalone devices (such as
switches, routers, etc.) that are part of the particular application.
If the alarm/problem persists, refer to Troubleshooting or Technical Support.
5.3 Troubleshooting
This section provides you with a general troubleshooting chart that lists possible
failures and provides workarounds.
In addition, failure scenarios with instructions on testing and resolving these
issues are provided.
Troubleshooting Chart
The following troubleshooting chart is based on LED indications or other inputs.
Use this chart to identify the cause of a problem that may arise during operation.
For detailed description of the LED indicators functions, refer to Chapter 3.
To correct the reported problem, perform the suggested corrective actions. If a
problem cannot be resolved by performing the suggested action, please contact
Technical Support.
The unit is dead No power Verify that both ends of the power
(POWER LED is off) cable are properly connected.
SYSTEM RDY LED Self test failed Run the self test as explained under
blinks Self-Test.
If a component indicates a failure,
restart the unit.
If the error persists, send the unit for
repair.
The unit is unreachable Incorrect management settings Using a local serial connection, enable
the relevant management access type
by entering telnet, snmp and/or ssh at
the config>mngmnt>access prompt.
View the list of enabled management
access types and settings by entering
info at the config>mngmnt prompt.
In case of SNMP, verify that the read,
write and trap communities match the
setting (public, private) of your
management station.
Verify that the management stations
IP address is included in the manager
list. To do so, try to add the desired
management stations IP address using
the command manager <IP address> at
the config>mngmnt prompt. The
manager is added to the list if it was
not already listed. You may also try to
delete a manager by entering
no manager <IP address>. If the
manager was not listed, an error is
returned.
Verify that the router interface in use
is enabled for management. To do so,
enter management-access at the
config>router>interface prompt.
Physical link fails to Link may be administratively Administratively enable the link at the
respond disabled. relevant port prompt, for example
config>port>eth.
In case of Ethernet links, make sure
that the autonegotiation, speed and
duplex modes match the configured
values on the access switch/router.
Run the self test as explained under
Self-Test. If a component returns FAIL,
the relevant interface module must be
replaced. If associated with a fixed
interface, the unit must be sent in for
repair.
Ethernet LINK LED Ethernet cable problem Check the Ethernet cable to see
is off whether a cross or straight cable is
needed.
Check/replace Ethernet cable.
Verify that the range is within the
limits.
Check the port by connecting the
remote end of the cable to a different
switch.
Send the unit for repair.
ATM service problems Physical layer problems Check the SONET/SDH statistics by
entering show statistics all at the
relevant config>port>sdh-sonet
prompt.
Follow the suggestions for corrective
action listed under SONET/SDH SYNC
LED is off and SONET/SDH SYNC LED
blinks.
Loss of ATM cells Physical line errors (CRC errors). To monitor Rx, Tx and HEC cells,
Cells discarded due to bad HEC. perform a physical loopback test. To do
so, enter loopback at the prompt
associated with the relevant ATM port,
for example config>port>e1.
Check whether the relevant interface
reports an LCD error. To do so,
navigate to the relevant port prompt
and use the show statistics command.
For further information, refer to the
sections associated with the physical
ATM ports.
Replace the cable.
Replace the ACE unit.
Rx congestions can be caused in To view if cells have been lost, view the
networks that carry PW packets. PW statistics by entering show
statistics all at the config>pwe>pw
prompt of the relevant pseudowire.
Error while transmitting Physical layer fault Refer to the respective troubleshooting
over Ethernet section on the physical layer at the
pseudowire beginning of this table.
Check for FCS and alignment errors
working opposite the switch or router.
To do so, view the Ethernet port
statistics by entering show statistics at
the relevant Ethernet port prompt
(config>port>eth).
The BFD fails to receive The BFD on the local unit failed to Verify that the BFD is enabled on the
keep-alive messages in receive BFD messages from the remote unit. To do so, view the status
the given time frame remote unit. of the PW at the remote unit using the
and the PW is disabled. show status command at the
config>pwe>pw prompt.
The local system did not receive any Check the network path between ACE-
BFD packets from each other at the 3105, ACE-3205 (local unit) and the
pre-defined time interval. remote unit using the ping command
from any prompt.
Increase the detection multiplier using
the detection-multiplier command and
the Min Tx interval using the min-
interval tx command. Both are available
at the config>oam>bfd-descriptor
prompt.
Error while transmitting The jitter buffer failed to Monitor the pseudowire statistics by
over TDM pseudowire compensate PSN packet delay entering show statistics all at the
variations (PDV). relevant config>pwe>pw prompt.
The PDV buffer is used to To view the frequency of underruns,
compensate for PDV in PSN view the log file by entering show log-
networks. If the network PDV file at the config>system prompt.
exceeds the configured depth of Investigate the clocking settings and
the jitter buffer, an underrun the network topology. The screen
occurs, causing the jitter buffer to image below illustrates and explains a
re-initialize. possible scenario.
Make sure that the Ethernet link is
running in Full Duplex mode by entering
show status at the relevant
config>port>eth or prompt.
Increase the jitter buffer delay. To do
so, you have to remove the PW and
recreate it with the new jitter buffer
delay. To specify the jitter buffer delay,
enter jitter-buffer <1000..32000> at
the relevant config>pwe>pw prompt.
Identify different network elements
that may cause the underrun, such as
LAN congestions, overloaded queuimg
mechanisms, routing table updates,
load sharing and re-route events.
Rx R=1 means that the remote unit was experiencing Underrun condition.
Rx L|M=100 means that the remote unit is reporting on failure on the TDM
interface.
When Rx L|M is up together with Underrun event, continue with the fault on
the remote TDM interface procedure.
In case the missing packets counter is also increasing along with the
underruns, it is possible that the underruns are simply caused by the massive
packet loss events and not by high PDV.
Clock related underruns Incorrect clocking configuration Rule out that there is more than one
may cause periodic active clock source in the network.
underruns.
Adaptive clock recovery Pseudowire problems Run a self test as explained under Self-
failure Test to determine if a physical port or
component associated with the
pseudowire has failed.
Check events and alarms that are
active for the associated physical
ports.
Check the status of the CES PSN
Recovery Clock PW. The operational
status must be up and the local status
must be forwarding.
Verify that the clock source associated
with the CES PSN Recovery Clock PW is
set to Recovered.
Restart the adaptive clock recovery
(ACR) by changing the configuration to
a different clock option, for example to
Rx Clock and then back to Recovered.
Check the status of the clock recovery
PW on the distribution unit. To do so,
verify that the distributed clock
associated with the CES PSN Recovery
Clock PW is set to Distributed.
Insufficient PSN -> ATM buffer size Increase the buffer size by entering
The buffer size is too small for the atm-payload max-cells <1..29> at the
number of cells per packet. relevant config>pwe>pw prompt.
Bursty traffic from the remote Enable policing on the remote unit by
device. The remote unit receives entering traffic-descriptor <1..99999>
traffic at a rate that causes cbr policing [pcr <100..353208>]
temporary burstiness, which cannot [cdvt <1..8000>] at the
be handled by the receiving units config>qos>atm prompt.
Additional information and instructions
An IMA group failed Physical link failure Check the status of the relevant IMA
group by entering show status group
at the relevant config>port>atm>ima-
group prompt.
Check the physical ports that belong to
the relevant IMA group. To do so, enter
show status link.
View the status of the link that
encountered an error by entering show
statistics at the relevant ports prompt.
In case of LOS, a physical error
occurred.
The number of active links is below In the IMA Group Status screen,
the minimal compare the number of active links (Rx
and Tx) with the min. number of links
you configured. If the number of active
links is lower, reduce the min number
of active links by entering minimum-
links {rx <1..8/16>} {tx <1..8/16>} at
the relevnt config>port>atm>ima-
group prompt.
The max link delay may have been Increase the allowed max differential
exceeded. delay by entering
max-differential-delay <1..100>.
A clocking issue may cause the IMA Make sure that the clock settings
group to fail. match the settings on the opposite
unit. For additional information and
instructions, refer to the clock
parameters under Configuring an IMA
Group in Chapter 4.
Clocking problems may have caused Monitor the OIF by entering show
out of IMA frame irregularities statistics link all at the relevant
(OIF), except during SES or UAS IMA config>port>atm>ima-group prompt.
at the near end.
Problems may occur in the IMA Check the number of ICP cells that are
control plane (ICP cells) in error, invalid or missing (except
during seconds when a SES or UAS-IMA
condition is reported). To do so, enter
show statistics link current at the
relevant config>port>atm>ima-group
prompt. The counter of the relevant
ICP cells is listed under Violation.
Restart the IMA group on the local and
the remote unit. To do so, enter no
blocking and then restart at the
relevant config>port>atm>ima-group
prompt.
Disconnect and reconnect all active
links and restart the IMA group again
on the local and remote units.
IP Connectivity Tests
The IP connectivity tests include two types of tests and are available from every
command level:
Ping test allows you to send packet shares towards a specified IP address
IP route tracing allows you to send trace-route packets towards a specified
IP address to trace and locate bottlenecks over the IP network.
Task Command
Q Does ACE-3105, ACE-3205 support ATM over PSN and ATM switching at the
same time?
A Yes, both function types are supported by the unit and can be utilized
simultaneously.
PW VP
1 1
PW=1 ATM
VP=1
VP PW ETH STM-1
ACE
1 1
2 2
3 3
PW VP
2 1
ACE
VP1, VP2, VP3 PW1, PW2, PW3 Ethernet PW=2 ATM
VP=1
STM-1 ETH Network ETH ACE STM-1
PW VP
3 1
PW=3 ATM
VP=1
ETH STM-1
ACE
Q How can one calculate the required Ethernet bandwidth for a PW based on
the ATM parameters?
A Bandwidth utilization depends on the ATM connection rate, mapping methods
(VPoPSN or VCoPSN), network type (L2/MPLS or IP), VLAN existence and
number of concatenated cells. A calculator that calculates the bandwidth
based on these parameters can be obtained from Technical Support.
6.1 Impact
ACE-3105, ACE-3205 is upgraded once the unit has been reset.
6.3 Prerequisites
This section details the software file names and outlines system requirements
needed for the upgrade procedure.
Software Files
New version releases are distributed as software files named for example
ACE3105_SW6_10A18.cmp. The files can be obtained from the local RAD business
partner from whom the device was purchased.
System Requirements
Before starting the upgrade, verify that you have the following:
For upgrade via TFTP:
ACE-3105, ACE-3205 unit with a router interface bound to the
management interface used, and a static route defined to a PC with the
TFTP server application (such as 3Cdaemon or PumpKIN), and a valid IP
address.
Software file stored on the PC.
Note ACE-3105, ACE-3205 communicates with TFTP servers via Ethernet ports only.
Using TFTP
Network administrators use the TFTP protocol to distribute new software
releases to all the managed ACE-3105, ACE-3205 units in the network from a
central location. The central application is a PC on the network with a TFTP server
application such as the PumpKIN server installed on it.
6-2 Upgrading Software using the CLI ACE-3105, ACE-3205 Ver. 6.1
Installation and Operation Manual Chapter 6 Software Upgrade
Pinging the PC
To verify IP settings and the communication between ACE-3105, ACE-3205 and
the PC, send a ping command from the ACE unit to the PC.
2. If the ping request is timed out, check the link between ACE-3105, ACE-3205
and the PC (physical path, configuration parameters etc).
ACE-3105, ACE-3205 Ver. 6.1 Upgrading Software using the CLI 6-3
Chapter 6 Software Upgrade Installation and Operation Manual
Using XMODEM
XMODEM is used to download and upgrade from a PC connected to the CONTROL
port of the relevant ACE unit.
Application file is
transferred to
ACE-3xxx
RS-232
ACE-3xxx
PC with a Terminal
Emulation and
Application File
6-4 Upgrading Software using the CLI ACE-3105, ACE-3205 Ver. 6.1
Installation and Operation Manual Chapter 6 Software Upgrade
Note The command times out and the send file request is considered as failed if you
do not initiate sending the file within approximately three minutes.
ACE-3105, ACE-3205 Ver. 6.1 Upgrading Software using the CLI 6-5
Chapter 6 Software Upgrade Installation and Operation Manual
Caution The Boot menu procedures are recommended only for use by authorized
personnel, because this menu provides many additional options that are intended
for use only by technical support personnel.
Similar to upgrading via the CLI, you can upgrade via the Boot menu using either
the TFTP or the XMODEM protocol. Both protocols are briefly explained with the
respective upgrade options via CLI under Using TFTP and Using XMODEM
respectively.
Note All the screens shown in this section serve illustration purposes only. Your ACE-
3105, ACE-3205 may display different software versions and port profiles.
6-6 Upgrading Software via the Boot Menu ACE-3105, ACE-3205 Ver. 6.1
Installation and Operation Manual Chapter 6 Software Upgrade
Select mode:
ACE-3105, ACE-3205 Ver. 6.1 Upgrading Software via the Boot Menu 6-7
Chapter 6 Software Upgrade Installation and Operation Manual
Packet : 42284K
Using TFTP
The preparations needed for using the TFTP protocol via the Boot menu are
similar to the preparations needed to download software using the TFTP protocol
via the CLI. Additional information on preparing the system for using the TFTP
protocol, refer to File Operations in Chapter 4.
The main difference is that you need to define the IP communication parameters
associated with the corresponding Ethernet port (IP addresses and the associated
subnet mask and a default gateway IP address).
Use the following procedure to download software release 6.1 to ACE-3105, ACE-
3205 via TFTP.
1. Verify that the ACE3105_SW6_10A18.cmp is stored on the PC with the TFTP
server application.
2. Prepare the system and access the File menu as explained under Preparing
for Downloading an Application File.
6-8 Upgrading Software via the Boot Menu ACE-3105, ACE-3205 Ver. 6.1
Installation and Operation Manual Chapter 6 Software Upgrade
4. Type the number associated with the relevant Ethernet port and press
<Enter>.
You are asked for the application file name.
5. Enter the path with the application files name including its suffix.
You are asked for the IP settings of the relevant ACE unit (Host) and the
TFTP server.
6. Enter the IP settings and then press <S> to transfer the application file as
illustrated below.
FILE NAME: ACE3105_SW6_10A18.cmp
HOST IP: 172.17.180.30
HOST MASK: 255.255.255.0
DEFAULT GATEWAY: 172.17.180.1
HOST IP: The IP address of the Ethernet port used for the upload. Press
<Enter> to continue.
HOST Mask: The IP subnet mask. Press <Enter> to continue.
DEFAULT GATEWAY: If the TFTP server is located on a different LAN, you
have to define the IP address of the default gateway associated with the
relevant port. Make sure to select an IP address within the subnet of the
assigned ports IP address. To change the current value, type the desired
IP address, and then press <Enter> to end the configuration.
If no default gateway is needed, for example, because the TFTP server
belongs to the same LAN as the relevant port used for the upgrade, enter
0.0.0.0.
TFTP IP SERVER: The IP address of the TFTP (e.g. PumpKIN) server.
7. To complete the upgrade and log on again, follow the onscreen instructions.
ACE-3105, ACE-3205 Ver. 6.1 Upgrading Software via the Boot Menu 6-9
Chapter 6 Software Upgrade Installation and Operation Manual
Using XMODEM
Use the following procedure to download software release 6.1 to ACE-3105, ACE-
3205 via XMODEM.
1. Verify that the ACE3105_SW6_10A18.cmp is stored on the PC with the
HyperTerminal application installed.
2. Prepare the system and access the File menu as explained under Preparing
for Downloading an Application File.
6-10 Upgrading Software via the Boot Menu ACE-3105, ACE-3205 Ver. 6.1
Installation and Operation Manual Chapter 6 Software Upgrade
When the download is complete, the ACE units file system is updated as
illustrated below. Once the update is complete, the unit restarts and you are
ready to log on.
Downloading application file.
Send the file.
Note
If downloading fails, the current version remains active and you have to repeat
the entire procedure to upgrade the unit.
ACE-3105, ACE-3205 Ver. 6.1 Upgrading Software via the Boot Menu 6-11
Chapter 6 Software Upgrade Installation and Operation Manual
Select mode:
RAD BOOT
FILE MENU
0. Reset the system.
1. File swap: operating backup.
2. Delete Operating file (existing backup will be saved as operating).
3. Delete configuration file.
4. Show files list in flash directory.
9. Delete all file system (software and configuration files).
3. Enter the number associated with the desired option (explained below).
0 - Reset the system. Restarts ACE-3105, ACE-3205.
1 - File swap: operating backup. Operates the backup file. The previously
active file is now the backup.
2 - Delete Operating file (existing backup will be saved as operating).
Deletes the active file. The backup file becomes the operating file and no
backup is available. If no backup is available, the unit reverts to the
factory default.
3 - Delete configuration file. Deletes the user configuration. The unit
reverts to the factory default configuration.
4 - Show files list in flash directory. Displays all files stored on the flash
disk of your unit.
9 - Delete all file system (software and configuration files). Deletes all
files. To operate the unit, a new application file must be downloaded as
explained under Using XMODEM or Using TFTP.
6-12 Upgrading Software via the Boot Menu ACE-3105, ACE-3205 Ver. 6.1
Appendix A
Connection Data
Pin Function
1 NC
2 NC
3 TIP 1 (Loop 1)
4 RING 1 (Loop 0)
5 TIP_0 (Loop 0)
6 RING 1 (Loop 1)
7 NC
8 NC
Pin Function
1 NC
2 NC
3 NC
4 RING 0
5 TIP_0
6 NC
7 NC
8 NC
A.3 E1 or T1 Connectors
The E1 or T1 interfaces of ACE-3105, ACE-3205 terminate in an 8-pin RJ-45
connector, wired as follows:
Pin Function
1 RX+
2 RX-
4 TX+
5 TX-
8 GND
Note
For balanced E1 or T1, only use a 4-wire cable (pins 1, 2, 4, 5).
Pin Function
1 TX+
2 TX
3 RX+
6 RX
4, 5, 7, 8 GND
Note Fiber optic Ethernet interfaces (if ordered) use SFP transceivers.
Pin Function
5 Common
2 RX Data
3 TX Data
AC/DC Adapter
(AD) Plug
for DC Power Supply Connection
Caution
Prepare all connections to the AD plug before inserting it into the units power
connector.
Reversing the wire voltage polarity will not cause damage to the unit, but the
internal protection fuse will not function.
Warning Always connect a ground wire to the AD plugs chassis (frame) ground
terminal. Connecting the unit without a protective ground, or interrupting the
grounding (for example, by using an extension power cord without a
grounding conductor) can damage the unit or the equipment connected to it!
The AD adapter is not intended for field wiring.
2
Supplement
Terminal Block
Connector
for DC Power Supply Connection
Caution
Prepare all connections to the TB plug before inserting it into the units VDC-IN
connector.
Reversing the wire voltage polarity can cause damage to the unit!
Always connect a ground wire to the TB plugs chassis (frame) ground
Warning terminal. Connecting the unit without a protective ground, or interruption of
the grounding (for example, by using an extension power cord without a
grounding conductor) can cause harm to the unit or to the equipment
connected to it!
2
Terminal Block Connector
2. If the units VDC-IN connector is type B, lift the locking latch (see Figure 1).
5
Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.
3
Terminal Block Connector
4
24 Raoul Wallenberg Street, Tel Aviv 69719, Israel
Tel: +972-3-6458181, Fax +972-3-6483331, +972-3-6498250
E-mail: erika_y@rad.com, Web site: http://www.rad.com
Installation instructions
Operating instructions
Manual organization
Illustrations
Please list the exact page numbers with the error(s), detail the errors you found (information missing,
unclear or inadequately explained, etc.) and attach the page to your fax, if necessary.
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com