Sunteți pe pagina 1din 252

TJ1400-12 User Interface

Guide

Document ID: 140-DOC000015-E Release: Standard Release Version: 1.0

www.tejasnetworks.com
Copyright Notice

Copyright © 2000-2016. Tejas Networks Ltd. All rights reserved. No part of this book or manual may be
reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying,
recording, or by any information storage and retrieval system, without the express written permission from
Tejas Networks Ltd.

Warning and Disclaimer

While every effort has been made to make this document as complete and as accurate as possible, Tejas
Networks does not accept any responsibility for poorly designed or malfunctioning networks. The information
provided in this document is on an “as is” basis and is subject to change without prior notice. The author,
Tejas Networks, shall have neither liability nor responsibility to any person or entity with respect to any loss or
damage arising from the information contained in this document or from the use of equipment or software
that might accompany it. The opinions expressed in this document are not necessarily those of Tejas Networks.

Trademark Acknowledgments

All terms mentioned in this book that are known trademarks or service marks have been appropriately
capitalized. All trademarks duly acknowledged. Tejas Networks cannot attest to the accuracy of third-party
information. Use of a term in this document should not be regarded as affecting the validity of any trademark
or service mark.

Technical Support Information

Tejas customers can contact Tejas Support Center (TSC) 24x7x365 for any assistance through helpline, fax or
email.

- Phone(s): +91 80 41719090/91/92/93/94/95

- Email: support@tejasnetworks.com

- Skype: tscsupport123

- Web: www.tejasnetworks.com

Revision History

Version Date Modifications Made

1.0 February 03, 2016 Standard Release


Your Feedback is valuable to us!

Your opinion is of great value and will help us improve the quality of our product documentation and offer
better services to you. Please take few moments to provide us your opinion of this document. Send your
comments to docs@tejasnetworks.com

Presentation: (Introductions, Procedures, Illustrations, Completeness, Level of


Detail, Organization, Appearance)

 Good  Fair  Average  Poor  Bad  N/A


Your evaluation of this Intelligibility: (Language, Vocabulary, Readability and Clarity, Technical Accuracy,
document Content)

 Good  Fair  Average  Poor  Bad  N/A

Accessibility: (Contents, Index, Headings, Numbering, Glossary)

 Good  Fair  Average  Poor  Bad  N/A

Improve the  Make it more  Improve the


overview/introduction concise/brief Contents

 Add more step-by-step  Improve the organization  Add more


Your suggestions for procedures/ tutorials troubleshooting
improving this information
document
 Include more figures  Make it less technical  Add more examples

 Add more/better quick  Add more detail  Improve the index


reference aids

Other Suggestions:

If you wish to be contacted regarding your comments, please provide your contact details:

Name: Company:

Postcode: Address:

Telephone: Email:
Table of Contents

Using This Guide 17


Who This Guide Is For..................................................................................................................... 17
What This Guide Covers .................................................................................................................. 17
Typographical Conventions ............................................................................................................. 18
Mouse Operation Conventions ....................................................................................................... 18
Chapter Organization ........................................................................................................................ 19
Using Tejas Product Documentation ............................................................................................ 20
Related Documents............................................................................................................................ 20

Getting Started with Network Element Application 21


System Requirements ........................................................................................................................ 21
Refreshing Alarm Monitoring Pane Automatically .................................................................... 21
Accessing Web User Interface Using LAN .................................................................................. 22
Logging to the Network Application ............................................................................................. 23
Setting or Editing the Network Element Information .............................................................. 24

Understanding User Interface 27


Working with Network Element Information Pane .................................................................. 27
Title Pane ....................................................................................................................................... 28
Alarm Banner ................................................................................................................................ 28
Navigation Pane ............................................................................................................................. 29
Preview Pane .................................................................................................................................. 29

Working with Node Slot View Pane 31


Refreshing Node Slot View Page .................................................................................................... 31
Understanding Visual Indicators .................................................................................................... 32
Viewing Card Parameters ................................................................................................................. 32

Working With System Time Menu 35


Setting Date and Time of the Network Element ........................................................................ 35
Setting Time Zone ............................................................................................................................. 36
Setting Other Time Zone ................................................................................................................ 36
Setting Time Server for the Network Element ........................................................................... 39

Working with Inventory Menu 41


Viewing Node Inventory .................................................................................................................. 41

iv
Performing Forced Switch Over..................................................................................................... 42
Port Group Configuration on SOT18 ........................................................................................... 42
Port Rate Configuration in Port Group ........................................................................................ 43
CEF1-9P Card Configuration.......................................................................................................... 44
Configure E1 Mode ........................................................................................................................... 45
Deleting Card Configurations ......................................................................................................... 45
Deleting Pluggable Modules ............................................................................................................ 46
Working with Shelf Submenu.......................................................................................................... 46

Working with Protection Menu 47


Managing Timing Manager .............................................................................................................. 47
Viewing Timing Manager Protection Request ................................................................................ 48
Executing External Command on a Synchronization Source ........................................................ 49
Managing MSP/APS Groups .......................................................................................................... 50
Viewing MSP/APS Groups ........................................................................................................ 50
Executing External Commands on MSP Groups ........................................................................ 51
Managing Connections...................................................................................................................... 52
Viewing SNCP/UPSR Protection ............................................................................................... 52
Executing External Commands .................................................................................................... 52
Working with MS-SP/BLSR............................................................................................................ 54
Viewing Provisioned MS-SPRing/BLSR .................................................................................... 55
Executing External Commands on MS-SP/BLSR Ring............................................................ 56
Nested Protection .............................................................................................................................. 57

Working with Configuration Menu 59


Managing MSP/APS Groups .......................................................................................................... 59
Viewing MSP/APS Groups ........................................................................................................ 60
Provisioning MSP/APS Group .................................................................................................... 61
Editing MSP/APS Group ........................................................................................................... 64
Deleting MSP/APS Groups ........................................................................................................ 67
Working with MS-SP/BLSR............................................................................................................ 67
Viewing Provisioned MS-SP/BLSR Ring ................................................................................... 68
Provisioning MS-SPRing/BLSR.................................................................................................. 69
Editing MS-SP/BLSR Ring........................................................................................................ 70
Deleting MS-SPRing/BLSR........................................................................................................ 71
Configure Bulk Squelch Table ......................................................................................................... 71
Managing Cross-connects................................................................................................................. 72
Adding Cross-Connects .................................................................................................................. 72
Filtering Cross-Connects................................................................................................................. 75
Editing Cross-Connects .................................................................................................................. 76
Deleting Cross-Connects ................................................................................................................. 76
Managing Overhead Tunnels........................................................................................................... 76
View Overhead Tunnels ................................................................................................................. 77
Adding Overhead Tunnel ............................................................................................................... 77
Deleting Overhead Tunnels ............................................................................................................ 78
Provisioning Environmental Alarm Input.................................................................................... 79

v
Configuring SNMP Traps ................................................................................................................ 80
Managing Facilities ............................................................................................................................. 81
Viewing STM/OC Ports .............................................................................................................. 81
Provisioning STM/OC Ports ........................................................................................................ 81
Editing TCA Settings for STM/OC Ports .................................................................................. 85
Provisioning AUG ......................................................................................................................... 86
Provisioning AU/STS .................................................................................................................. 87
Editing TCA Settings for AU4 .................................................................................................... 90
Provisioning TU ............................................................................................................................. 91
Editing TCA Settings for TU ....................................................................................................... 95
Provision E1 Interface .................................................................................................................... 95
Provisioning E1/DS1 Interface ..................................................................................................... 98
View TCA Profiles for PDH Ports ............................................................................................ 100
Provision TCA Profile for PDH Ports ....................................................................................... 100
Delete TCA Profile of a PDH Port ............................................................................................ 104
Provisioning Ethernet Interface ..................................................................................................... 104
Provisioning VCG Interface......................................................................................................... 107
Adding a Virtual Container (VC) to VCG.............................................................................. 109
Viewing VC/VT Group ........................................................................................................... 111
Adding and Removing LCAS in Bulk ....................................................................................... 114
Deleting Channels ........................................................................................................................ 114
Viewing Diff Delays for a VCG Port ........................................................................................ 114
Provisioning LCAS ..................................................................................................................... 116
Deleting VC/VT from VCG .................................................................................................... 117
Managing NE Adjacency ................................................................................................................ 118
Enable Auto-Discovery for STM/OC Port ................................................................................ 118
Viewing Neighbour Information .................................................................................................. 119
Provisioning Trunks Manually .................................................................................................... 120
Managing DCN................................................................................................................................. 121
Viewing the Network Interfaces ................................................................................................... 122
Editing Network Interfaces .......................................................................................................... 122
Provisioning/Editing Embedded Communication Channel ......................................................... 125
View Static Routes....................................................................................................................... 127
Add Static Routes ........................................................................................................................ 128
Deleting a Static Route................................................................................................................. 131
Managing Proxy ARP Neighbour .............................................................................................. 131
Add a Proxy ARP Neighbour .................................................................................................... 131
Delete Proxy ARP Neighbour..................................................................................................... 132
Configure OSPF Area ................................................................................................................. 133
Disabling OSPF .......................................................................................................................... 133
View Serial Port Information ...................................................................................................... 135
Edit Serial Port............................................................................................................................ 136
Synchronizing Network Element ................................................................................................. 138
Editing the Synchronization Status .............................................................................................. 138
Nominating Timing Reference ...................................................................................................... 140
View Selected Timing References .................................................................................................. 142
Clear Non Reversion mode ........................................................................................................... 142
Editing Selected Timing References............................................................................................... 143
Delete Nominated Timing Reference ............................................................................................ 143

vi
Managing License 145
Enabling License Feature ............................................................................................................... 145
Viewing Enabled License Features............................................................................................... 146
Viewing Failed License Features ................................................................................................... 146

Managing Faults 147


Understanding Alarms .................................................................................................................... 147
Viewing Active Alarms ................................................................................................................... 148
View Suppressed Alarms ................................................................................................................ 150
Provision Alarm Filters ................................................................................................................... 150
View Alarm Filters ........................................................................................................................... 153
Deleting Alarm Filters ..................................................................................................................... 153
Viewing Event History .................................................................................................................... 154
View Alarm Severity ........................................................................................................................ 155
Setting Alarm Severity ..................................................................................................................... 156

Working with Profiles 157


Managing STM/OC Port Profiles ................................................................................................ 157
Viewing STM/OC Port Profiles ................................................................................................ 158
Editing STM/OC Port Profiles .................................................................................................. 159
Managing Path Alarm Profiles ...................................................................................................... 161
Viewing Path Alarm Profiles ...................................................................................................... 162
Provisioning Path Alarm Profile .................................................................................................. 163
Deleting Path Alarm Profile ........................................................................................................ 166

Performance Monitoring 167


Viewing STM/OC Performance Statistics ................................................................................. 167
Viewing STM/OC-Current Interval Statistics ........................................................................... 167
Viewing Performance Statistics of Regenerator Section/Section and Multiplex Section/Line ..... 167
Viewing Performance Statistics of Path ........................................................................................ 170
Viewing Performance Statistics of Tributary Unit ....................................................................... 172
Viewing Performance Statistics of Transceiver.............................................................................. 173
Viewing E1 Port Performance Statistics ..................................................................................... 174
Viewing PDH (E1/DS1) Port Performance Statistics............................................................. 176
Viewing Ethernet Performance Statistics ................................................................................... 178
Viewing VCG Performance Statistics .......................................................................................... 181
Monitoring Input Voltage Statistics ............................................................................................. 183
Editing Voltage Thresholds for PSU ........................................................................................... 184

Security Management 185


Working with RADIUS Server...................................................................................................... 185
Viewing RADIUS Server........................................................................................................... 186
Provisioning RADIUS Server ..................................................................................................... 186
Enabling RADIUS Authentication ........................................................................................... 187

vii
Editing RADIUS Settings ......................................................................................................... 188
Managing User Accounts................................................................................................................ 188
Creating User Accounts ............................................................................................................... 188
Modifying User Accounts ............................................................................................................. 191
Changing Password of a Logged in User ...................................................................................... 191
Deleting User Accounts ................................................................................................................ 191
Managing User-Lockout ................................................................................................................. 192
Enabling Users Lockout .............................................................................................................. 192
Configuring UserLock .................................................................................................................. 192
Unlocking Users ........................................................................................................................... 193
Managing Security Settings............................................................................................................. 194
Blocking Ports .............................................................................................................................. 196
Viewing Blocked Ports ................................................................................................................. 196
Unblocking Ports.......................................................................................................................... 197
Viewing Blocked IPs .................................................................................................................... 197
Blocking an IP ............................................................................................................................. 198
Unblocking an IP......................................................................................................................... 199
Enabling Challenge-Response Authentication .............................................................................. 199
Configuring Ssh ............................................................................................................................ 199
Regenerate Keys............................................................................................................................. 200
Provision Keys............................................................................................................................... 200
HMAC Selection ......................................................................................................................... 201
Cipher Selection ............................................................................................................................ 202
Managing Audit Logs ...................................................................................................................... 202
Viewing Logs ............................................................................................................................... 203
Collecting Audit Logs Archive ..................................................................................................... 204
Managing User Sessions.................................................................................................................. 205
Viewing HTTP Sessions ............................................................................................................. 205
Configuring HTTP Sessions ........................................................................................................ 206
Viewing Sessions History ............................................................................................................. 207
Viewing InvalidLogins History .................................................................................................... 208

Maintenance Operations 209


Editing System Settings................................................................................................................... 210
Viewing System Upgrade History ................................................................................................. 211
Viewing Load Availability............................................................................................................... 212
Rebooting Cards ............................................................................................................................... 213
Warm Rebooting Cards ............................................................................................................... 213
Cold Rebooting Cards .................................................................................................................. 213
System Restart options .................................................................................................................... 213
Warm Restarting a Network Element ........................................................................................ 214
Cold Restarting a network element ............................................................................................... 215
Adding System Notes ...................................................................................................................... 216
Performing Loop-Backs.................................................................................................................. 216
Performing Loopback on STM/OC Ports .................................................................................. 217
Performing Loopback on PDH Ports .......................................................................................... 218
Performing Loopback on Ethernet Ports ...................................................................................... 218

viii
Diagnostics......................................................................................................................................... 219
Accessing OSPF diagnostics data................................................................................................. 220
Viewing System Information ........................................................................................................ 225
Collecting Debug Data ................................................................................................................. 227
Collecting Micro-SD Statistics ..................................................................................................... 228
Configuration management............................................................................................................ 229
Backing Up Configuration Data ................................................................................................. 230
Restoring Configuration ................................................................................................................ 231
Restoring Factory Default Settings ............................................................................................... 233
Configuring Parameters in SLAT Page ...................................................................................... 233
Upgrade Operations ........................................................................................................................ 236
Upgrading Software ...................................................................................................................... 237
Downloading SSL Certificate ...................................................................................................... 241
Upgrading Firmware .................................................................................................................... 242

Glossary of Terms 245


Index 249

ix
List of Figures
Figure 1: Login Page ...................................................................................................................................23
Figure 2: NE Information .........................................................................................................................23
Figure 3: NE Information .........................................................................................................................24
Figure 4: NE Information .........................................................................................................................27
Figure 5: Title Pane .....................................................................................................................................28
Figure 6: Alarm Banner ..............................................................................................................................28
Figure 7: Navigation Pane .........................................................................................................................29
Figure 8: Node Slot View ..........................................................................................................................31
Figure 9: Node Slot View ..........................................................................................................................32
Figure 10: Set Node Time..........................................................................................................................35
Figure 11: Set Time Zone ..........................................................................................................................36
Figure 12: Other time zone .......................................................................................................................37
Figure 13: Set Time Server ........................................................................................................................39
Figure 14: Node Inventory ........................................................................................................................41
Figure 15: Port Group Configuration - SOT18 ....................................................................................43
Figure 16: Port Rate Configuration in Port Group..............................................................................44
Figure 17: CEF1-9P Port Configuration ................................................................................................44
Figure 18: Timing manager protection request .....................................................................................48
Figure 19: Timing manager protection request .....................................................................................49
Figure 20: MSP groups Protection ..........................................................................................................50
Figure 21: Protection provisioning ..........................................................................................................51
Figure 22: Protection request page ..........................................................................................................53
Figure 23: Viewing MS-SPRing ................................................................................................................55
Figure 24: View MSP groups ....................................................................................................................60
Figure 25: Provision port protection .......................................................................................................62
Figure 26: Protection provisioning configuration ................................................................................65
Figure 27: View MS-SPRing ......................................................................................................................68
Figure 28: Configure Bulk Squelch Table ..............................................................................................71
Figure 29: Add Cross-connects ................................................................................................................73
Figure 30: View Overhead Tunnels .........................................................................................................77
Figure 31: Add Overhead Tunnel ............................................................................................................78
Figure 32: Configuring Environmental Alarms ....................................................................................79
Figure 33: Provisioning SNMP Traps .....................................................................................................80
Figure 34: Viewing STM Ports .................................................................................................................81
Figure 35: Provisioning TCA Settings for STM Ports ........................................................................85
Figure 36: Provisioning AUG ...................................................................................................................86
Figure 37: Provisioning AU4 ....................................................................................................................87
Figure 38: Editing TCA Settings for AU4 .............................................................................................90
Figure 39: Provisioning TU .......................................................................................................................92
Figure 40: Provision Interface - E1 .........................................................................................................96
Figure 41: View TCA Profile ................................................................................................................. 100
Figure 42: Provision New TCA Profile ............................................................................................... 101
Figure 43: Provisioning Ethernet Interface Port ............................................................................... 104

x
Figure 44: Provisioning VCG Interface............................................................................................... 107
Figure 45: Add VC to VCG ................................................................................................................... 110
Figure 46: View VC Group .................................................................................................................... 112
Figure 47: VCG to VCG Cross connect ............................................................................................. 112
Figure 48: View DiffDelays .................................................................................................................... 115
Figure 49: LCAS Provisioning ............................................................................................................... 116
Figure 50: Enabling Auto-Discovery ................................................................................................... 118
Figure 51: Viewing Neighbor Information ......................................................................................... 119
Figure 52: Manually Configuring Trunks ............................................................................................ 121
Figure 53: Edit Network Interface Provisioning ............................................................................... 123
Figure 54: Provisioning ECC ................................................................................................................. 126
Figure 55: Static routes configuration .................................................................................................. 127
Figure 56: Creating Static Route............................................................................................................ 129
Figure 57: Creating Proxy ARP Neighbour ........................................................................................ 132
Figure 58: Creating OSPF Area ............................................................................................................. 133
Figure 59: Edit Network interface provisioning ................................................................................ 134
Figure 60: Serial port configuration ...................................................................................................... 135
Figure 61: Serial port configuration ...................................................................................................... 136
Figure 62: Nominating Timing References......................................................................................... 140
Figure 63: Enable License Feature........................................................................................................ 145
Figure 64: Failed License Features ........................................................................................................ 146
Figure 65: Active alarms .......................................................................................................................... 148
Figure 66: Viewing Suppressed Alarms ............................................................................................... 150
Figure 67: Provisioning Alarm Filter .................................................................................................... 151
Figure 68: Viewing Alarm Filter ............................................................................................................ 153
Figure 69: Event history .......................................................................................................................... 154
Figure 70: Alarm severity ........................................................................................................................ 155
Figure 71: Alarm severity ........................................................................................................................ 156
Figure 72: View STM Port Profile ........................................................................................................ 157
Figure 73: View STM Port Profiles ...................................................................................................... 158
Figure 74: Edit Internal External NNI ................................................................................................ 160
Figure 75: View Path Alarm Profile ..................................................................................................... 162
Figure 76: Provisioning Path Alarm Profile ....................................................................................... 164
Figure 77: Viewing Performance Statistics of Regenerator Section and Multiplex Section .... 168
Figure 78: Viewing Performance Statistics of Path........................................................................... 170
Figure 79: Viewing Performance Statistics of Tributary Unit ........................................................ 172
Figure 80: Performance Statistics of Transceiver .............................................................................. 174
Figure 81: Performance Attributes ....................................................................................................... 175
Figure 82: Performance Attributes ....................................................................................................... 177
Figure 83: Ethernet-Current interval statistics ................................................................................... 179
Figure 84: VCG Performance Statistics............................................................................................... 181
Figure 85: Viewing Input Voltage Statistics........................................................................................ 183
Figure 86: Edit Voltage Thresholds for InputPowerFeed_DPU .................................................. 184
Figure 87: View RADIUS ....................................................................................................................... 186
Figure 88: Provisioning RADIUS Server ............................................................................................ 187
Figure 89: Manage Users ......................................................................................................................... 188
Figure 90: Add New User ....................................................................................................................... 189
Figure 91: Security settings ..................................................................................................................... 194
Figure 92: Block a Service....................................................................................................................... 196

xi
Figure 93: Blocked Services .................................................................................................................... 197
Figure 94: Viewing Blocked IPs ............................................................................................................ 198
Figure 95: Block a IP ............................................................................................................................... 198
Figure 96: Regenerate Keys .................................................................................................................... 200
Figure 97: Provision Keys....................................................................................................................... 201
Figure 98: HMAC Selection ................................................................................................................... 201
Figure 99: Cipher Selection .................................................................................................................... 202
Figure 100: Audit Log.............................................................................................................................. 203
Figure 101: Collect Audit Logs Archive .............................................................................................. 204
Figure 102: Active HTTP Sessions ....................................................................................................... 205
Figure 103: Sessions History .................................................................................................................. 207
Figure 104: Invalid Login Sessions History ........................................................................................ 208
Figure 105: System settings .................................................................................................................... 210
Figure 106: System Upgrade History ................................................................................................... 211
Figure 107: Load Availability ................................................................................................................. 212
Figure 108: Reset and load management ............................................................................................. 214
Figure 109: Reset and load management ............................................................................................. 215
Figure 110: System Notes ....................................................................................................................... 216
Figure 111: Performing Loopback on STM Ports ............................................................................ 217
Figure 112: Performing Loopback on PDH Ports ........................................................................... 218
Figure 113: Port maintenance ETH Loopback ................................................................................. 219
Figure 114: Diagnostics OSPF .............................................................................................................. 220
Figure 115: Collect Micro-SD Statistics............................................................................................... 228
Figure 116: Backup configuration ......................................................................................................... 230
Figure 117: Restore configuration ........................................................................................................ 231
Figure 118: Initialize Node Parameters ............................................................................................... 234
Figure 119: Software Download ........................................................................................................... 237
Figure 120: Check Upgrade .................................................................................................................... 237
Figure 121: Load Upgrade ...................................................................................................................... 238
Figure 122: Invoke Upgrade................................................................................................................... 238
Figure 123: Commit Upgrade ................................................................................................................ 239
Figure 124: SSL Certificate Download ................................................................................................ 241
Figure 125: Firmware Download .......................................................................................................... 242

xii
List of Tables
Table 1: Typographical Conventions...................................................................................................18
Table 2: Mouse Operation .....................................................................................................................18
Table 3: Chapter Organization..............................................................................................................19
Table 4: Related documents ..................................................................................................................20
Table 5: System requirements ...............................................................................................................21
Table 6: Network Element Parameters ...............................................................................................25
Table 7: Visual Indicators on the Node Slot View pane .................................................................32
Table 8: Card Parameters .......................................................................................................................33
Table 9: Set Node Time..........................................................................................................................36
Table 10: Other Time Zone Parameters ...............................................................................................38
Table 11: Set Time Server ........................................................................................................................40
Table 12: Timing Manager Protection Request Parameters .............................................................48
Table 13: External commands.................................................................................................................49
Table 14: Parameters on the MSP/APS groups page ........................................................................50
Table 15: Commands Executable on Protection Provisioning ........................................................51
Table 16: View Connections Protection Requests .............................................................................52
Table 17: SNCP/UPSR parameters .......................................................................................................54
Table 18: External commands executable on SNCP/UPSR............................................................54
Table 19: MS-SPRing/BLSR parameters ..............................................................................................56
Table 20: Commands executable on MS-SPRing/BLSR Protection provisioning page............57
Table 21: View MSP/APS Groups ........................................................................................................61
Table 22: Provision Port Protection ......................................................................................................63
Table 23: Protection Provisioning ..........................................................................................................66
Table 24: MS-SP ring/BLSR parameters ..............................................................................................69
Table 25: View and Provision MS-SPRing parameters .....................................................................70
Table 26: Configure Bulk Squelch Table parameters .........................................................................72
Table 27: Add Cross-connects ................................................................................................................74
Table 28: Overhead Tunnel parameters ................................................................................................77
Table 29: Configure Overhead Tunnel parameters ............................................................................78
Table 30: SNMP Trap destination IP addresses .................................................................................80
Table 31: Provision Interface STM/OC parameters .........................................................................82
Table 32: TCA settings .............................................................................................................................85
Table 33: Provision AU4 parameters.....................................................................................................88
Table 34: TCA settings with AU4/STS3c for 15 minutes duration ...............................................91
Table 35: TCA settings with AU4/STS3c for one day duration .....................................................91
Table 36: TU/VT parameters .................................................................................................................93
Table 37: TCA settings with TU/VT for 15 minutes duration .......................................................95
Table 38: TCA settings with TU/VT for one day duration .............................................................95
Table 39: Provision Interface Parameters.............................................................................................97
Table 40: Provision Interface-E1/DS1 Parameters ...........................................................................99
Table 41: TCA Profile Parameters ...................................................................................................... 102
Table 42: Parameters For Ethernet Interface ................................................................................... 105
Table 43: Provisioning VCG parameters ........................................................................................... 108

xiii
Table 44: Add VC/VT to VCG........................................................................................................... 111
Table 45: VC/VT parameters............................................................................................................... 113
Table 46: View Diff Delays parameters ............................................................................................. 115
Table 47: LCAS parameters .................................................................................................................. 117
Table 48: Neighbor Information parameters .................................................................................... 120
Table 49: Network Interface Configuration parameters ................................................................ 122
Table 50: Edit Network Interface Parameters .................................................................................. 124
Table 51: Provision ECC Page Parameters ....................................................................................... 126
Table 52: Static routes configuration parameters............................................................................. 128
Table 53: Creating Static Route Parameters ...................................................................................... 130
Table 54: Creating Proxy ARP Neighbour Parameters .................................................................. 132
Table 55: View Serial port ..................................................................................................................... 136
Table 56: Serial Port Configuration Parameters ............................................................................... 137
Table 57: Synchronization state parameters ...................................................................................... 139
Table 58: Nominated timing reference parameters ......................................................................... 142
Table 59: Active alarms Parameters .................................................................................................... 149
Table 60: Suppressed Alarms Parameters .......................................................................................... 150
Table 61: Provision Alarm filter Parameters ..................................................................................... 152
Table 62: View Alarm Filter parameters ............................................................................................ 153
Table 63: STM Port Parameters........................................................................................................... 159
Table 64: Edit STM Port Parameters ................................................................................................. 161
Table 65: Path Alarm profile parameters ........................................................................................... 163
Table 66: Provision Path Alarm Profile parameters ........................................................................ 165
Table 67: Regenerator Section Performance Parameters in SDH/SONET mode.................. 169
Table 68: Multiplex Section performance parameters in SDH/SONET mode ....................... 169
Table 69: Path performance parameters in SDH/SONET mode ............................................... 171
Table 70: Tributary Unit performance parameters .......................................................................... 173
Table 71: Path Performance Parameters............................................................................................ 174
Table 72: E1 Line Performance Parameters ..................................................................................... 176
Table 73: E1 Path Performance Parameters ..................................................................................... 176
Table 74: E1/DS1 Line Performance Parameters ........................................................................... 178
Table 75: E1/DS1 Path Performance Parameters........................................................................... 178
Table 76: Ethernet Performance Parameters .................................................................................... 180
Table 77: VCG Performance Parameters .......................................................................................... 182
Table 78: Input Voltage Monitor Statistics ....................................................................................... 184
Table 79: Provision RADIUS Server .................................................................................................. 187
Table 80: User Account Parameters ................................................................................................... 190
Table 81: Locked Users parameters .................................................................................................... 193
Table 82: Security settings parameters................................................................................................ 195
Table 83: Audit Log page parameters ................................................................................................. 204
Table 84: HTTP Session Parameters .................................................................................................. 206
Table 85: Sessions History Page .......................................................................................................... 207
Table 86: Invalid Logins Sessions History Page............................................................................... 208
Table 87: System Setting Parameters .................................................................................................. 210
Table 88: System Upgrade History Parameters ................................................................................ 211
Table 89: Load Availability page Parameters .................................................................................... 212
Table 90: Loop-back mode parameters.............................................................................................. 216
Table 91: LoopBack Mode parameters .............................................................................................. 217
Table 92: PDH Port Loop-back Mode .............................................................................................. 218

xiv
Table 93: OSPF area parameters ......................................................................................................... 221
Table 94: OSPF Database Parameters ............................................................................................... 221
Table 95: OSPF interface parameters ................................................................................................. 222
Table 96: OSPF neighbors parameters .............................................................................................. 222
Table 97: OSPF LSA expansions parameters ................................................................................... 223
Table 98: OSPF AS externals parameters .......................................................................................... 224
Table 99: OSPF Routing table parameters ........................................................................................ 224
Table 100: OSPF Opaque-LSAs parameters....................................................................................... 225
Table 101: System menu parameters..................................................................................................... 226
Table 102: Routing Table parameters ................................................................................................... 226
Table 103: Configuration Backup Parameters .................................................................................... 231
Table 104: Restore Configuration Parameters .................................................................................... 232
Table 105: Unified upgrade parameters ............................................................................................... 240
Table 106: SSL Certificate Download parameters ............................................................................. 241
Table 107: Firmware download parameters ........................................................................................ 243

xv
Chapter 1

Using This Guide


This section describes who should read this guide, how it is organized, and what conventions are
used in the document.

IN THIS CHAPTER
Who This Guide Is For.............................................................................. 17
What This Guide Covers ........................................................................... 17
Typographical Conventions ....................................................................... 18
Mouse Operation Conventions ................................................................. 18
Chapter Organization ................................................................................. 19
Using Tejas Product Documentation ....................................................... 20
Related Documents .................................................................................... 20

Who This Guide Is For


This document is intended for operators, engineers and service providers who use the user
interface of products to provide support services to the network elements.

What This Guide Covers


This document introduces and orients service providers to the content, function, and
organization of the user interface that support the network elements. This revision of the
document is a super set of all the earlier versions of document.

17
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Typographical Conventions
Before you start using this guide, it is important to understand the terms and typographical
conventions used in the document. The following kinds of formatting in the text identify special
information.

Table 1: Typographical Conventions

Formatting Convention Type of Information

 Procedures Step-by-step procedures. You can follow these instructions to


complete a specific task.
Special Bold Items you must select, such as menu options, command buttons,
or items in a list.
Emphasis Use to emphasize the importance of a point or for variable
expressions such as parameters.

CAPITALS Names of keys on the keyboard, for example, SHIFT, CTRL, or


ALT.
KEY+KEY Key combinations for which the user must press and hold down
one key and then press another, for example, CTRL+P, or
ALT+F4.
Means reader take note. Notes contain helpful suggestions or
NOTE: references to materials not contained in this manual.

Mouse Operation Conventions


Table 2: Mouse Operation

Convention Description
Click Refers to pressing and releasing a mouse button to select a screen object.
Double-click Refers to pressing and releasing a mouse button twice in succession while the cursor
is positioned over an object on-screen.
Drag Refers to the function of the mouse by which an element on the screen of a monitor
is moved with the cursor, while holding down the mouse button and moving the
mouse.
Right-click Refers to pressing the right button on a two-button mouse.
Wheel button Refers to the third (middle) button on the mouse.

18
Chapter 1 Using This Guide

Chapter Organization
Table 3: Chapter Organization

Chapter Scope
Getting Started with Network This chapter covers setting up Network Element application.
Element Application on page 21 Logging in and logging out from the application. The
Network Element user interface enables the user to provision
and monitor the node parameters.
Understanding User Interface on page This chapter describes the components of the User Interface.
27
Working with Node Slot View Pane This chapter describes the Node Slot View page, which
on page 31 provides the graphical representation of how the cards are
allotted to the slots of the chassis.
Working with System Time Menu on This chapter describes the System Time menu in the web
page 35 user interface.
Working with Inventory Menu on page This chapter covers the functions of Inventory menu. The
41 Inventory menu in the web user interface provides the
inventory of the modules, cards, and SFPs in the network
element.
Working with Protection Menu on This chapter describes the protection feature for a network
page 47 element.
Working with Configuration Menu on This chapter describes the configuration menu in the User
page 59 Interface.
Managing License on page 145 This chapter describes the license associated with this
product.
Managing Faults on page 147 Fault management deals with detecting and reporting faults
by the network element. Alarms are raised to alert the user
about fault conditions.
Working with Profiles on page 157 Profiles define the behavior of the ports in the event of an
alarm. This chapter describes the Profiles menu in the User
Interface.
Performance Monitoring on page 167 This chapter explains how you can monitor various
performance statistics.
Security Management on page 185 This chapter describes about users and their privileges to
access the network element. The network element provides
four different user access groups (ADMIN, OPERATOR,
OPERATOR2, and USER).
Maintenance Operations on page 209 The chapter describes the maintenance operations available
on the network element.

NOTE: This particular product release supports only SDH, all though the document may
indicate both SDH and SONET terms.

19
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Using Tejas Product Documentation


The following Tejas product documentation set helps you to use the range of Tejas products:
 The Hardware Description Guide explains hardware configuration, functions, capabilities,
limitations, and physical characteristics of the product.
 The Installation and Commissioning Guide provides information on installing the product and to
initially configuring it to the point of verifying its proper operation in the network.
 The User Interface Guide introduces and orients service providers to the content, function, and
organization of the user interface that support the network elements.
 The L2 Services User Interface Guide provides information about provisioning L2 switching
features supported by the switching cards.
All documents for the shelf are referred to as Tejas technical publications. Each document has a
unique thirteen-digit identification number called Tejas Part Number (TPN). This number is used
to identify each document, and assist in cross-referencing from one document TPN to another.

Related Documents
Related documents need to be used in conjunction with the Customer Release Notes (CRN)
defining the scope of the release.

Table 4: Related documents

Document Name Tejas Part Number Description

TJ1400-12 Hardware 140-DOC000013-E This document provides information on hardware


Description Guide configuration, functions, capabilities, limitations, and
physical characteristics of the product.
TJ1400-12 Installation 140-DOC000014-E This document provides information to install the
and Commissioning product and to initially configure the product to the
Guide point of verifying proper operation of the product in the
network.
TJ1400-12 L2 Services 140-DOC000016-E This chapter explains the L2 switching features. The
User Interface Guide Carrier Ethernet card enables service providers to give
point-to-point (ELINE), multi-point-to-multi-point
(ELAN) services.

20
Chapter 2

Getting Started with Network Element


Application
This chapter details the system requirement, provides the procedure to log in and log out of the
network element application.

IN THIS CHAPTER
System Requirements ................................................................................. 21
Refreshing Alarm Monitoring Pane Automatically.................................. 21
Accessing Web User Interface Using LAN .............................................. 22
Logging to the Network Application ........................................................ 23
Setting or Editing the Network Element Information ............................ 24

System Requirements
Before running the application, ensure that your system satisfies the following requirements.

Table 5: System requirements

System Requirements
Operating System  Windows XP
 Red Hat Linux 2.4 or 2.6
Memory 256 MB RAM or greater
Browser  Firefox 1.7 and higher or Red Hat Linux 7.O and higher
 Internet Explorer 7.0 and higher on Windows

Refreshing Alarm Monitoring Pane Automatically


Set the caching mechanism in the Web browser to automatically refresh the alarm monitoring
pages.

To set the alarm monitoring page to automatically refresh in Internet Explorer,

1. Click Tools>Internet Options.


2. On General tab, under Temporary Internet files, click Settings.
3. In Settings dialog box, under Check for newer versions of stored pages, select Automatically,
and then click OK.
4. Click OK in Internet Options.

21
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Accessing Web User Interface Using LAN


To access Web User Interface using LAN, ensure that you have an Ethernet cable, laptop with
browser.

CAUTION: During multiple administrative and diagnostic logins, ensure that actions
performed do not affect the work of other users. The commands are implemented on first-come-
first-serve basis.

WUI is accessible at the URL http://192.168.1.254 by default. If you are unable to access the
URL, ensure that
 Ethernet connectivity to the network element is proper
 Type of cable used is same (straight/cross)
 Ethernet interface on the PC/terminal is provisioned
 Correct URL entered to access the network element and
 There is no malfunction of the network element software

NOTE: To access the Web User Interface of the network element using LAN, connect the
Ethernet interface of the craft PC/terminal to the LAN port of OAM Card.

An Ethernet cross cable is used for direct connectivity between the Ethernet interface of the PC
and the NMS port on the network element. An Ethernet straight cable connects the network
element and the PC terminal through an Ethernet hub or switch.

NOTE: Ensure that you are using Netscape Navigator version 4.75 or higher or Internet
Explorer version 5.0 or higher for setting up the network element software.

22
Chapter 2 Getting Started with Network Element Application

Logging to the Network Application


To log in to the network element application,

1. Open the web browser and enter the URL: http://<node IP>:20080. The login page appears
as shown below.
Figure 1: Login Page

2. Enter the user name as 'tejas' and password as 'j72e#05t'.


3. Click Submit. The home page of the Network Element Application appears as shown below.
Figure 2: NE Information

To log into the node using Challenge-Response Authentication (CHAP),


1. Open the web browser and enter the URL: http://<node IP>:20080/. The login
page appears.
2. Enter the username.
3. Enter the password. The default password is 'testing 123'.
4. Select Domain as CHALLENGE.
5. Click Submit.
6. Enter response.

23
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

7. Click Submit. The authentication result is displayed.

NOTE: For more information on CHAP, refer Enabling Challenge-Response


Authentication on page 199.

To log in as a different user, click Change User and re-enter the user name and password.

To exit the application, click Log Out option provided at the top right of the Title Area.

Setting or Editing the Network Element Information


This chapter describes the Network Element (NE) setup process.

Using the Network Element Information pane, you can access and modify some basic
configuration information of a network element that includes Node name, Router ID, Ethernet
IP, Contact, and Location fields.

Editing the fields on the NE Information Pane is service non-disruptive. The software reboots
without affecting the commissioned traffic (warm reset) when Router ID or Ethernet IP is
changed. The network element does not reboot for any changes made in name or location.
Connectivity to the network element software is lost while rebooting.

To set or edit the network element information,

1. Log in to the network element. For logging in, refer Logging to the Network Application.
The home page of the Network Element Application appears.
Figure 3: NE Information

2. Enter the parameter values and click Submit. A confirmation page is displayed.
3. Click Accept Valid Modifications. A "Successfully Modified” message is displayed. The NE
information is set.

24
Chapter 2 Getting Started with Network Element Application

Table 6: Network Element Parameters

Parameter Description Default Value Acceptable Value


Name Displays the identification label of the Default Up to 20 alphanumeric
network element name. and special characters.
Node Product Displays the product code of the -- --
Code network element.
Node Displays the node configuration. ADM --
Configuration
Node Displays the connection mode (Higher Higher Order + --
Connections Order/Higher Order + Lower Order) Lower Order
Mode
AU Mode Displays the data mapping mode of the -- --
node.
Router ID Allows the user to enter the IP address 192.168.1.254 Any valid IP address
of the network element for in-band
communication. The Router ID is
unique in a network and is used by the
Network Management System (NMS) to
identify and enroll the network element.
Ethernet IP Allows the user to the IP address and 192.168.1.254/24 Any valid IP address
Address the subnet mask for the network
element for LAN port communication.

MAC Address Displays the MAC address of the -- --


network element.
Contact Allows the user to enter the contact Name of contact Up to 255 alphanumeric
details and contact number of the person and special characters.
person maintaining the network
element.
Location Allows the user to enter the location or The location of this Up to 255 alphanumeric
site information where the network device and special characters.
element is physically installed.
Software Displays the version of the software 6.2 --
Version installed on the network element.
Data Path Displays the mode of operation of the SDH  SDH
Mode node.  SONET
PTN Only Displays whether the mode of the No  Yes
operation of the node is PTN only or  No
not.

NOTE: On NE Information page, node goes for a warm reboot once the Router ID and
Ethernet IP values are changed and submitted.

25
Chapter 3

Understanding User Interface


This chapter describes the elements of the user interface and how to set up the network element.

When you delete, modify, or provision any feature; the system prompts for a confirmation and
the changes made are applicable only after you click on Confirm button. During confirmation,
the Cancel button is selected by default to avoid inadvertent submission of changes, as some
web browsers automatically submit the form when Enter key is pressed on the keyboard. On
confirming a change, system prompts for initiating a reboot and traffic disruption.

NOTE: The images displayed in this chapter are for reference purpose only.

IN THIS CHAPTER
Working with Network Element Information Pane................................ 27

Working with Network Element Information Pane


The NE Information Pane is as shown below.

Figure 4: NE Information

27
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

You can expand Navigation menu to access the nested sub-menus. On clicking an option, the
details appear in the preview pane.

The main screen is divided into four parts namely:


 Title Pane
 Alarm Banner
 Navigation Pane
 Preview Pane

Title Pane
The Title Pane is located at the top frame in the application window and includes the following:
 NMS port IP Address of the network element
 Network element name
 Uptime (the time duration for which the node has been up)
 Log out link
 Company logo
Figure 5: Title Pane

Alarm Banner
The Alarm Banner displays the number of active alarms on the network element with severity
level. The Alarm area also displays the last refresh time of the network element. Alarm banner is
automatically refreshed. To disable automatic refresh of Alarm Banner, select the Disable Auto
Refresh check box.

Figure 6: Alarm Banner

28
Chapter 3 Understanding User Interface

The icon ( ) above the alarm banner indicates the order in which the alarms are displayed in the
banner:
 Critical
 Major
 Minor
 Warning
Based on the severity of alarms, color codes are assigned to them.
 Red represents major and critical type of alarms.
 Orange represents minor type of alarms.
 Yellow represents warning type of alarms.

Navigation Pane
The Navigation Pane displays a nested menu items for accessing the various network element
functionalities, where you can access and review the card details.

Figure 7: Navigation Pane

Preview Pane
The Preview Pane displays the details of the menu items that are nested in the Navigation menu
and list the parameters required to configure the network element as desired. Using Preview
Pane you can perform all the configurations.

29
Chapter 4

Working with Node Slot View Pane


This chapter describes the Node Slot View pane options and provides the graphical
representation of how the cards are allotted to the slots of the chassis.

IN THIS CHAPTER
Refreshing Node Slot View Page .............................................................. 31
Understanding Visual Indicators ............................................................... 32
Viewing Card Parameters........................................................................... 32

Refreshing Node Slot View Page


The Node Slot View pane is refreshed for every two seconds. Click Stop Refresh button to stop
automatic refreshing the pane content. To resume the refresh function, click on Start Refresh
button.

Figure 8: Node Slot View

NOTE: The node slot view image here is a representation of the node slot of TJ1400. For
more information on cards for this product, refer Viewing Card Parameters.

31
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Understanding Visual Indicators


Three visual indicators are present on the card representing the status, alarm, and active
conditions of the module or card respectively. The color of the status, Light Emitting Diode
(LED), indicates the status of the module or card.

To view the details in the preview pane, click one of the cards. The lower portion of the pane
displays the status of active alarms present on the card.

Table 7: Visual Indicators on the Node Slot View pane

This LED With this color Represents

Status LED Red Card Failure


Green Normal Working
Amber Power Cycle Mismatch
Alarm LED Red Major/Critical alarms present on the network
element
Green Normal working
Amber Minor alarms present on the network element
Active LED Red Card failure
Green Normal working
Amber Power cycle mismatch

Viewing Card Parameters


To view card parameters, in the navigation menu, click Node Slot View. The Node Slot View
page is displayed.

Figure 9: Node Slot View

32
Chapter 4 Working with Node Slot View Pane

In Node Slot View page, click the required card to view its card parameters.

Table 8: Card Parameters

Parameter Description Applies to


Shelf Displays the shelf number in which the  Chassis
network element is present. The value is  Fan
always 1 in this release.
 Line Cards
 PSU
 XA20G
 SOT18
 CEF1-9P
 OAM Card
 ST63E1
Slot Displays the slot number in which the card  Chassis
is present.  Fan
 Line Cards
 PSU
 XA20G
 SOT18
 CEF1-9P
 OAM Card
 ST63E1
Equipment  Present indicates that the card is present  Chassis
in the node  Fan
 Not present indicates that the card is  Line Cards
not present in the node
 PSU
 XA20G
 SOT18
 CEF1-9P
 OAM Card
 ST63E1
Product Displays the product code.  Chassis
Code  Fan
 Line Cards
 PSU
 XA20G
 SOT18
 CEF1-9P
 OAM Card
 ST63E1

33
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Applies to


Serial Displays the unique serial number of a  Chassis
Number specific module.  Fan
 Line Cards
 PSU
 XA20G
 SOT18
 CEF1-9P
 OAM Card
 ST63E1
Software Displays the version of the software installed  XA20G
Version in the node.  CEF1-9P
Temperature Displays the temperature of the network  XA20G
element.
Redundancy Displays the redundancy status of the card,  XA20G
Status Primary or Secondary.
MAC Displays the MAC address of the network  CEF1-9P
Address element.

NOTE: The slot view shows all the cards physically present in the network element. The view
of the cards may or may not match with the physical orientation of the cards.

34
Chapter 5

Working With System Time Menu


This chapter describes the System Time menu in the user interface.

IN THIS CHAPTER
Setting Date and Time of the Network Element..................................... 35
Setting Time Zone ...................................................................................... 36
Setting Time Server for the Network Element ........................................ 39

Setting Date and Time of the Network Element


Setting the date, time, time zone and time server of a network element in a network is essential to
track the time at which various activities were carried out (mainly alarms) in the network element.
Based on the configured time and date set, TL1 interface displays the GMT. Modifying the date
and time does not affect any of the previously raised alarms. However, all the new alarms are
stamped with the new date and time. Similarly, the event history does not change even after the
date and time change reflects the change. You can change the network element time settings by
editing values in the web user interface. For changes to take place in the operating system and
logs, a service non-disruptive reset has to be applied.

To set date and time,

1. Click System Time > Set Time. Set Node Time pane is displayed. Current date and time is
selected by default.
Figure 10: Set Node Time

35
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Select the desired values and click Submit. A success message is displayed.
Table 9: Set Node Time

Parameter Description Default Value Acceptable Values


Date and Current date and time Current date  Month: January to December
Time relevant to the  Date: 1 to 31
configured time zone.
 Year: 2001 to 2036
 Hour: 00 to 23
 Minutes: 00 to 59
 Seconds: 00 to 59

NOTE: Modifying the date and time does not affect any of the previously raised alarms.
However, all the new alarms are set with the new date and time. Similarly, the event history
does not change even after the date and time change reflects the change.

Setting Time Zone


You can set the time zone relevant to the location of the network element using the Set Time
Zone menu. The Other Time Zone option for zone allows you to set time for zones that are not
listed. You can also set Day Light Saving, if applicable for a particular time zone.

To set time zone,

1. Click System Time > Set time zone. The Set Time Zone preview pane is displayed.
Figure 11: Set Time Zone

2. Select the desired time zone from the zone drop-down menu.
3. Click Submit. A successful message is displayed. Apply warm reboot to the network element.
The desired time zone is set.

Setting Other Time Zone


1. Click System Time > Set time zone. The Set Time Zone preview pane is displayed.

36
Chapter 5 Working With System Time Menu

2. Select the desired time zone from the zone drop-down menu. If the desired time zone is not
listed in the Zone drop-down menu, click Other Time Zones.
3. Click Submit. The Other Time Zone preview pane is displayed.
Figure 12: Other time zone

4. Enter or select values referring to Other Time Zone Parameters table.


5. Click Submit. An alert prompts you to confirm the operation.
6. Click Yes. A successfully modified message is displayed. The time zone is set.

37
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 10: Other Time Zone Parameters

Parameter Description Default Value Acceptable Value


Zone The time zone of the area in which the -- Any relevant time
network element is placed. zone
Offset Hours The hours by which the local time is offset -5 -12 to 11
from GMT.
Offset Minutes The minutes by which the local time is 30 0 to 59
offset from GMT.
Daylight Saving Parameter to configure Daylight saving. Disable  Enable
 Enable: Daylight saving can be  Disable
configured in the network element.
 Disable: Daylight saving cannot be
configured in the network element.

NOTE: When you select the Daylight Saving value as Enable, the below said parameters
appear.

DST String Describes the DST period. - Alphanumeric


characters
NOTE: DST string is changed after
executing a Warm Restart for the
changes. DST string is mandatory
while setting the other time zone
and after enabling DST.

DST Start The instance when DST starts. - Relevant time zone
(Month:Week:Day  Month: January to December
:Hour:Min)
 Week: 1st week - 4th week, Last week

38
Chapter 5 Working With System Time Menu

Parameter Description Default Value Acceptable Value


 Day: Sunday to Saturday
 Hour: 0 - 23
 Min: 0-59
DST Stop The instance when DST stops. - Relevant time zone
(Month:Week:Day  Month: January to December
:Hour:Min)
 Week: 1st week - 4th week, Last week
 Day: Sunday to Saturday
 Hour: 0 - 23
 Min: 0-59

Setting Time Server for the Network Element


Set Time Server menu enables you to set a server or network element as master clock source in
order to apply a uniform clock cycle in the network. All the network elements connected to the
same server in a network function synchronously. The network element periodically synchronizes
itself with the server to avoid an asynchronous state.

In case a network element has to be synchronized with a NTP server for date and time, the NTP
server address and synchronization interval for the network element should be set. Usually, the
NMS server is nominated as the NTP server.

To set the network time server,

1. Click System Time> Set time server in the Navigation menu. The Set Time Server pane is
displayed.
Figure 13: Set Time Server

2. Select or enter desired values and click Submit.


3. Click Create. A success message is displayed.

39
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 11: Set Time Server

Parameter Description Default Value Acceptable Value


NTP Client Parameter to enable NTP client. Enable  Enable
Enable  Enable: NTP server can be  Disable
nominated as synchronization source
for date and time.
 Disable: NTP server cannot be
nominated as synchronization source
for date and time.
NTP Server-0 The IP Address of the first time server. -- 0.0.0.0 to
255.254.254.254
NTP Server-1 The IP Address of the second time -- 0.0.0.0 to
server. 255.254.254.254
NTP Server-2 The IP Address of the Third time server. -- 0.0.0.0 to
255.254.254.254
NTP Server-3 The IP Address of the fourth server. -- 0.0.0.0 to
255.254.254.254
NTP Server-4 The IP Address of the fifth server. -- 0.0.0.0 to
255.254.254.254
Synchronization The synchronization interval specifies (in 1024 16, 32, 64, 128, 256,
seconds); defines how often the network 512, 1024, 2048,
Interval
element should poll the time server. 4096, 8192, 16384
(seconds)
Current NTP The current NTP server. -- --
server
Current Time The time offset in the network element -- --
Offset with respect to the Synchronization
server.
Last Update Time The latest time when the network -- --
element was synchronized to the time
server.

NOTE: In case the network elements in a network are synchronized to more than one NTP
server, ensure that the NTP servers are synchronized to a common clock. Non -synchronous
NTP servers may result in frequent reset of internal clock in the network elements, and it can
be frequent oscillations of internal clock. Up to five NTP servers can be nominated on the
network element.

NOTE: Timing server nominated must be of stratum level of 14 or less than 14. The network
element will not synchronize to the server if the stratum level is out of range.

40
Chapter 6

Working with Inventory Menu


This chapter covers the functions of Inventory menu. The Inventory menu in the Web user
interface provides the inventory of the modules, cards, and SFPs in the network element. You
can view the details of physical presence, operation status, product code, and serial number of the
elements in the Inventory. The Inventory menu provides links to Node Inventory and SHELF-1
pages.

IN THIS CHAPTER
Viewing Node Inventory ........................................................................... 41
Performing Forced Switch Over ............................................................... 42
Port Group Configuration on SOT18 ...................................................... 42
Port Rate Configuration in Port Group……………………………. 43
CEF1-9P Card Configuration……………………………………….. 44
Configure E1 Mode.................................................................................... 45
Deleting Card Configurations.................................................................... 45
Deleting Pluggable Modules ...................................................................... 46
Working with Shelf Submenu.................................................................... 46

Viewing Node Inventory


To view the node inventory, click Inventory > Node Inventory. The Node inventory preview
pane is displayed.

Figure 14: Node Inventory

41
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

NOTE: The Node inventory does not refresh automatically. You need to manually refresh the
page or the pane to view any changes made to the node inventory.

Performing Forced Switch Over


A forced switchover is needed when the secondary or the slave circuit pack needs to become the
primary or master circuit pack. A forced sync command should be issued before forced
switchover so that the secondary circuit pack is synchronized to the primary, before it can assume
the primary role.

NOTE: Forced switchover from WUI only, in case of slave ready for switchover option is
Yes. When a secondary cross-connect circuit pack is jacked-in, the “Equipment” status for the
circuit pack is changed to ‘Present’ and “Operational Status” is changed to ‘UP’ only after a
few minutes (time is taken for the software in the secondary circuit pack to come up).

After a redundant cross-connect circuit pack is jacked in, wait for the Operational status and
Equipment to “UP” and “Present” in the Node inventory page before performing forced
switchover.

To apply Forced Switch Over or Forced Sync command,


1. Click Inventory > Node Inventory. Node inventory pane is displayed.
2. Click the Slot link for the primary redundant card. The details of the selected card are
displayed.
NOTE: The ‘Switch Over and Sync’ link is not displayed when the ‘Slave Ready for
SwitchOver’ status is No.
3. Click Switch Over and Sync link. Traffic and Crossconnect Card - Redundancy operations -
Slot <N> pane is displayed.
4. Click Forced Switch Over. An alert will be displayed prompting you to confirm the
operation.
NOTE: Click Forced Sync before performing forced switch over if you want to synchronize
the secondary card before it can take the role of a primary.
5. Click Yes. Forced switch over will be performed.

Port Group Configuration on SOT18


To configure the port group,

1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which SOT18 circuit pack is present. The STM Port Group Card page is
displayed.

42
Chapter 6 Working with Inventory Menu

3. Click PortGroups. The Port Group configuration-SOT18-<port number> page is displayed.


Figure 15: Port Group Configuration - SOT18

4. Select the required current configuration:


4xSTM-1
1xSTM-4
1xSTM-16
NOTE: The current configuration "4xSTM-1" is only supported for this release.

5. Click Submit. A confirmation window is displayed.


6. Click Accept Valid Modifications. A success message is displayed.

Port Rate Configuration in Port Group


To configure the port rate in port group,

1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which SOT18 circuit pack is present. The STM Port Group Card page is
displayed.
3. Click PortGroups. The Port Group configuration-SOT18-<port number> page is displayed.

43
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

4. Under the column "Member Ports Set", click Ports in PORTGROUP-1-7-1. The Port Rate
configuration in PortGroup-1-7-1 page is displayed.
Figure 16: Port Rate Configuration in Port Group

5. Select the Current Port Rate "STM1".


6. Click Submit. A confirmation window is displayed.
7. Click Accept Valid Modifications. A success message is displayed.

CEF1-9P Card Configuration


To select the CEF1-9P card configuration,

1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which CEF1 9P circuit pack is present. The Intelligent Packet Processing
Card page is displayed.
Figure 17: CEF1-9P Port Configuration

3. Select the required card configuration.

44
Chapter 6 Working with Inventory Menu

NOTE: Only the card configuration "4*100Mbps Cu-Ports + 1*1Gbps Optical-Ports +


4*100Mbps Optical-Ports +16VCGs/CEM" is supported for this release.

4. Select the Port Configuration - 16VCGs.


5. Click Submit. A confirmation window is displayed.
6. Click Accept Valid Modifications. A success message is displayed.

Configure E1 Mode
To configure the E1 mode,

1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. From the Slot column, click the desired card type that you want to configure. The E1
Tributary Card pane is displayed.
3. Click Configure E1 mode. The E1 ports configuration pane is displayed.
4. Select the required Port Configuration from the drop-down menu.
5. Click Submit. A confirmation message is displayed.
6. Click Yes. The E1 mode is configured.

Deleting Card Configurations


The network element retains the configuration of a card even after the card is removed from the
slot. In such cases, the Node Inventory pane shows status ‘DOWN’ for Operational Status and
‘Not Present’ for the removed equipment. The configuration of the card has to be manually
deleted in the View/Delete Cards pane.

To delete a card, delete all the configurations on the card and then jack out the card.

To delete the configuration of the card that has been removed from the network element,

1. Click Inventory > Node Inventory. The Node inventory preview pane is displayed.
2. Click the Delete Cards link.
3. Select the cards whose configuration is to be deleted in the Delete column.
4. Click Submit.
5. Click Confirm Delete. The selected cards will be deleted from Inventory.

45
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Deleting Pluggable Modules


The Pluggable Modules describes the Small Form Factor-Pluggable (SFP) parameters. The SFPs
can be deleted without having to actually remove the SFP. The SFP auto provisions with the
slotted SFP values.

NOTE: Lasers are specific to the interfaces. The ranges that a Laser can have are Long Reach,
Short Reach, and Intermediate Reach.

To delete the configuration of pluggable modules from the network element,

1. Click Inventory > Node Inventory in the Navigation menu. Node inventory pane is
displayed.
2. In the SFP section, click the Delete button in the Name column for the SFP to be deleted.
The Delete button allows you to delete the SFP. You do not require to physically remove the
SFP before deleting. The SFP will auto provision with the slotted SFP values. The Node
inventory pane displays modules pluggable status along with the chassis information.

Working with Shelf Submenu


The SHELF submenu lists all the cards present in the network element. Each individual card link,
when clicked, displays the physical parameters of the card. For information about the physical
attributes of the cards present in the network element, refer Viewing Card Parameters.

NOTE: Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned
by clicking the Ports link provided on the respective panes.

46
Chapter 7

Working with Protection Menu


This chapter describes the protection feature for a network element. The linear protection
switching mechanism is coordinated by the K1 and K2 bytes in the Line Overhead. Protection
switching comes into effect in case of:
 Signal failure
 Signal degradation
 User initiated request
IN THIS CHAPTER
Managing Timing Manager ........................................................................ 47
Managing MSP/APS Groups .................................................................... 50
Managing Connections............................................................................... 52
Working with MS-SP/BLSR...................................................................... 54
Nested Protection ....................................................................................... 57

Managing Timing Manager


Using Timing Manager option, you can view the synchronization source details such as the
synchronization source, priority, protection request and give external commands to the
synchronization sources.

47
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Timing Manager Protection Request


To view Timing Manager Protection Request, select Protection in the Navigation menu, and
click on Timing Manager. The Timing manager protection request appears in the preview pane.

Figure 18: Timing manager protection request

Table 12: Timing Manager Protection Request Parameters

Parameter Description
Select Allows you to select the clock source.
Clock Source Displays the clock source assigned to the node.
Priority Displays the priority assigned to the clock.
Quality Level Displays the quality of the selected clock source.
Clock status Displays the status of the clock source.
Protection Request Displays if a protection request is made or not.
Release Clears the previous external request.
Forced Switch The network element switches to the selected clock source on forced switch
external request and cannot be switched to other clock sources unless the
external request is cleared. Forced switch has a higher priority over manual
switch.
Manual Switch The network element switches to the selected clock source on receiving an
external request for Manual Switch.
Lockout Source Lock out the selected clock source.
Clear Lockout Removes lockout request on the selected clock source.

NOTE: Quality Level field is displayed when QL Mode is enabled in the Synchronization State
page under Configuration menu.

48
Chapter 7 Working with Protection Menu

Executing External Command on a Synchronization Source


To execute external command on a synchronization source,

1. Select Protection in the Navigation menu.


2. Click on Timing Manager. The Timing manager protection request preview pane is
displayed.
Figure 19: Timing manager protection request

3. In the Select column, select the check box for the clock source on which the command is to
be issued.
4. Click the command to be issued. The command is successfully issued on the clock source.
Table 13: External commands

Parameter Description
Release Clears the previous external requests.
Forced Switch The network element switches to the selected clock source on an external request for
forced switch. The network element cannot be switched to other clock sources
unless the external request is cleared. Forced switch has a higher priority over
manual switch.
Manual Switch The network element switches to the selected clock source on an external manual
switch request.
Lockout Source Locks the clock source so that the network element is not synchronized to the clock
source.
Clear Lockout Removes lockout request on the selected clock source.

49
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Managing MSP/APS Groups


Multiplex Section Protection (MSP)/APS is a port level protection supported on the STM -
N/OC-N interfaces. The 1+1 protection scheme uses a complete duplication of services and
implies that two identical lines are active at the same time (both working and protection lines are
transmitting the same signal) allowing for a transparent switch from the working to the
protection line. The MSP/APS groups can be configured either 1WAY or 2WAY. MSP/APS
protection switching is initiated in the event if a fault or alarm in the STM/OC port in the
network element or by user initiated switching commands.

Viewing MSP/APS Groups


To view MSP/APS groups, click Protection>MSP/APS groups in the Navigation menu. The
MSP/APS groups Preview pane is displayed.

Figure 20: MSP groups Protection

Table 14: Parameters on the MSP/APS groups page

Parameter Description

Name Displays the name of the MSP/APS (MSP if node is configured in SDH mode and
APS if it is in SONET mode) group in the form of link. The first name is the work
port and protection port is separated by comma.
Working port Displays the working port.
Protection port Displays the protection port.
Current status Indicates the channel that is carrying the traffic currently.
Protection request Indicates whether any request for protection has been made.
Switch Status Indicates the switch status.

50
Chapter 7 Working with Protection Menu

Executing External Commands on MSP Groups


To execute external commands on MSP/APS groups,

1. Click Protection > MSP/APS groups. The MSP/APS groups Preview pane is displayed.
2. Click the MSP/APS group link in the Name column. The Protection Provisioning preview
pane is displayed.
Figure 21: Protection provisioning

3. Click the required command to be issued on the protection.


Table 15: Commands Executable on Protection Provisioning

Commands Description
Release Clears previously set command.
Lockout protection Prevents traffic from switching to protect path.
Forced Switch to Forces traffic to switch to the protect path regardless of signal fail or degrade
Protect condition existing on protect path.
Forced Switch to Forces traffic to switch to the work path regardless of signal fail or degrade
Working condition existing on the work path.
Manual Switch to Switches traffic to protect path only when it does not have signal fail or degrade
Protect condition existing on it.
Manual Switch to Switches traffic to work path when it does not have signal fail or degrade condition
Working existing on it. Manual Switch to Work is only applicable for non-revertive
connections.

51
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Managing Connections
The Connection menu allows you to execute external commands on SNCP/UPSR provisioned
cross-connections. These external commands cannot be applied to MSP/APS groups.

Viewing SNCP/UPSR Protection


To view provisioned UPSR/SNCP, click Protection > Connections. The Connection
Protection Requests Preview pane is displayed.

Table 16: View Connections Protection Requests

Parameter Description
Working port Lists all the ports having protected cross-connects. Select the port for which
you need to view the protected connections. By default 'All' is selected.
Select all Select the check box to select all the listed connections.
Connection(ID) Displays the name of the connection.
End Displays the end type
Working path Displays the work port.
Protection path Displays the protect port.
Protection status Displays the protection status.
Provisioned protection Displays any protection request provisioned on the connection.
request
Switch status Displays the switch status.

Executing External Commands


To issue external commands,

1. Click Protection > Connections in the Navigation menu. The Connection Protection
Requests Preview pane is displayed.

52
Chapter 7 Working with Protection Menu

2. Select the cross-connect on which the command is to be issued. Protection requests pane is
displayed.
Figure 22: Protection request page

3. Click the command to be issued.

53
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 17: SNCP/UPSR parameters

Parameter Description
Source Protection/ If source or destination protection is enabled, it displays the Source or
Destination Protection destination protection channel name.
Destination Revertive Displays the reversion mode of the source or destination channel as
Revertive or non-revertive.
Destination WTR Time For revertive mode, this parameter displays the wait to restore time in
minutes, after which the traffic must revert to the work path after failure
clears.
Destination Protection Displays the status of the source or Destination channel as work or protect.
Status
Provisioned Destination Displays the external command provisioned for both source and
Protection request destination. This filed is applicable depending on whether source or
destination protection that is provisioned.
Displays the status of the protection switch in a source or destination
Destination Switch Status
channel.
Table 18: External commands executable on SNCP/UPSR

Parameter Description
Release Clears previously set commands.
Lockout Protection Prevents traffic from switching to protect path.
Forced Switch to Protect Forces traffic to switch to the protect path regardless of signal fail/degrade
condition existing on protect path.
Forced Switch to Working Forces traffic to switch to the work path regardless of signal fail/degrade
condition existing.
Manual Switch to Protect Switches traffic to protect path only when it does not have signal
fail/degrade condition existing on it.
Manual Switch to working Switches traffic to protect path when it does not have signal fail/ degrade
condition existing on it. Manual Switch is applicable only for non-revertive
connections.

Working with MS-SP/BLSR


Multiplexed Section-Switched Protection (MS-SP) ring/Bi-directional Line Switched Ring (BLSR)
is a port level protection supported on the interfaces. MS-SP ring/BLSR is a protection scheme
in which the total capacity in a multiplex section is divided equally between working and
protection traffic. Any section can have access to the protection channels when faced with the
failure of a section or network element in the ring.

54
Chapter 7 Working with Protection Menu

Viewing Provisioned MS-SPRing/BLSR


To view provisioned MSSP/BLSR, click Protection > MS-SPRing/BLSR. The View MS-
SPRing/BLSR page is displayed.

Figure 23: Viewing MS-SPRing

55
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 19: MS-SPRing/BLSR parameters

Parameter Description

View Displays the existing MS-SPRing/BLSR rings as links.


East Port Allows you to enter port facing East.
West Port Allows you to enter port facing West.
Ring Type Displays the type of ring—2-Fiber.
Ring Id Displays the ring identifier. All network elements within the same ring will
have the same Ring Id.
Extra Traffic Enable Displays false when extra traffic is disabled and true when enabled.
Node ID Displays the identification number of the node. The value can range from 0 to
15.
Ring WTR (Minutes) Specifies the time to wait in minutes, before switching traffic back to work
port from protect port, after the fault in work port has been rectified. The
value range from 1-12 min.
Node State Displays the current state of the network element—Switching State,
Bidirectional full pass through, Idle state, K-byte pass through.
Protection Switching Displays if the ring switch is active in the east working port.
Status - East Working
Port
Protection Switching Displays if the ring switch is active in the west working port.
Status - West Working
Port

Executing External Commands on MS-SP/BLSR Ring


The external commands applicable to the MS-SPRing/BLSR group are:
 Clear
 Lockout of Protection – Span
 Force Switch – Ring
 Manual Switch – Ring
 Exercise – Ring
To execute external commands on MS-SP/BLSR ring,

1. Click Protection > MS-SPRing/BLSR in the Navigation menu. The View MS-SPRing/BLSR
Preview pane is displayed.
2. Click the MS-SP ring/BLSR link in the View column. The MS-SP ring/BLSR Preview pane
is displayed.
3. Click the desired external command link to execute.

56
Chapter 7 Working with Protection Menu

Table 20: Commands executable on MS-SPRing/BLSR Protection provisioning page

Commands Description

Release Clears previously set command.


Lockout of Prevents the usage of the span for any protection activity. If any working traffic
Protection – Span is already using the protection on this span, this command causes this traffic to
switch back to the working channels.
Force Switch – Ring Performs the ring switch from working channels to the protection channels for
the span between the network element at which the command is initiated and the
adjacent network element to which the command is destined.
Manual Switch – Performs the ring switch from the working channels to the protection channels
Ring for the span between the network element at which the command is initiated and
the adjacent network element to which the command is destined. This occurs if
the protection channels are not in a signal degrade or signal fail condition and are
not satisfying an equal or higher priority bridge request.
Exercise – Ring Exercises ring protection switching of the requested channel without completing
the actual bridge and switch. The command is issued and the responses are
checked, but no working traffic is affected.

NOTE: The Link Protection Group section is moved from this document to L2 Services
Guide. Refer TJ1400-12 L2 Services User Interface Guide (TPN: 140-DOC000016-E) for more
information on LPG.

Nested Protection
Nested Protection supported by TJ1400-12 offers unique advantages which include:
 It provides SNC protection with MSP and MSSP referred to as MSP linear nesting and MSSP
linear nesting protection respectively.
 In MSP linear nesting protection, there is a protection channel for each working channel and
the linear path provisioned for SNC protection.
 In MSSP linear nesting protection, each fiber is divided into working and protect bandwidths.
 When the work path is a failure, the traffic switches to the protection path. When the
protection path also fails, the traffic switches to SNC protect path.

57
Chapter 8

Working with Configuration Menu


This chapter describes the Configuration menu in the User Interface.

IN THIS CHAPTER
Managing MSP/APS Groups .................................................................... 59
Working with MS-SP/BLSR...................................................................... 67
Configure Bulk Squelch Table ................................................................... 71
Managing Cross-connects .......................................................................... 72
Managing Overhead Tunnels..................................................................... 76
Provisioning Environmental Alarm Input................................................ 79
Configuring SNMP Traps .......................................................................... 80
Managing Facilities ..................................................................................... 81
Managing NE Adjacency ......................................................................... 118
Managing DCN......................................................................................... 121
Synchronizing Network Element ............................................................ 138

Managing MSP/APS Groups


The MSP/APS configuration is applicable to STM-N ports. The number of MSP/APS
provisioned depends on the availability of optical ports. One MSP/APS protection group can be
provisioned for every two optical ports in a network element.

NOTE: The local and remote network element must be provisioned with the same protection
configuration.

NOTE: Configure the MSP/APS group before creating the desired cross-connects on the
working port.

The MSP/APS configuration is applicable to STM-N ports. The number of MSP/APS


provisioned depends on the availability of optical ports. One MSP/APS protection group can be
provisioned for every two optical ports in a network element.

59
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing MSP/APS Groups


To view MSP/APS groups, click Configuration > MSP/APS groups in the Navigation menu.
The MSP/APS groups preview pane is displayed.

Figure 24: View MSP groups

60
Chapter 8 Working with Configuration Menu

Table 21: View MSP/APS Groups

Parameter Description

Name Displays the name of the MSP/APS group.


Working port Displays the channel configured to carry the traffic under normal working
conditions.
Protection port Displays the channel configured to carry the traffic under protected (failure of
work channel) conditions.
Reversion mode  Revertive: This mode enables switching back to work channel from protect
channel once the fault on work channel is fixed.
 Non-Revertive: In this mode, switching from protect to work channel does
not occur automatically. Traffic should be manually switched from protect
channel to work channel.
WTR Time Allows you to select a time interval (in minutes) after which the traffic must switch
back to work channel on rectification of work channel, when admin reversion
mode is set as revertive.
Current status The active channel where traffic is being currently carried.
Protection switching  1WAY: Only the Head or Tail end of the network element receiver switches to
mode the alternate receiver on receiving an alarm.
 2WAY: Both the head end of the network element receiver and the tail end of
the network element receiver switch to alternate receiver on receiving an
alarm.
Route Diversity  Enable: Allows the user to have two DCC links. The user can provision DCC
on the work and protect ports independently.
 Disable: When disabled, the ports act dependently. The user can only
provision DCC link on work port. Provision DCC link on protect ports is not
allowed.
Delete It is used to delete the selected MSP/APS port pair association (see Note).

NOTE: The MSP/APS group can be deleted if there are no cross-connects provisioned on the
ports which make up the MSP/APS group and when the traffic is on protect in Route
Diversity disabled mode.

Provisioning MSP/APS Group


To provision MSP/APS group,

1. Click Configuration > MSP/APS groups. The View MSP/APS groups preview pane is
displayed.

61
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click Create MSP/APS group. The Provision port protection preview pane is displayed.
Figure 25: Provision port protection

3. Select appropriate values and click Submit to create the MSP/APS group. A alert is displayed
prompting you confirm the operation.
4. Click Yes. A “Successfully Provisioned” message is displayed.

62
Chapter 8 Working with Configuration Menu

NOTE: On failure of work channel, VC12/VT-2 management channel goes down and comes
up only on restoring the work channel.

Table 22: Provision Port Protection

Parameter Description Default Value Acceptable Value


Working port The channel that carries the traffic STM1/4/16/OC- STM1/4/16/OC-
under normal working conditions. 3/12/48-1-N-M 3/12/48-1-N-M
(where N is the slot
number in which the
card is placed and M
represents the port
number in that
particular slot)
Protection port The channel that carries the traffic STM1/4/16/OC- STM1/4/16/OC-
under protected (failure of work 3/12/48-1-N-M 3/12/48-1-N-M
channel) conditions.
(where N is the slot
number in which the
card is placed and M
represents the port
number in that
particular slot)
Protection mode The protection Mode is used as. 1+1 1+1
1+1 where the traffic is carried in
both the work and the protect
channel. The signal best received
among the work and protect
channel is considered by the
receiver.
Admin Reversion The revertive mode of the Revertive  Revertive
Mode protection.  Non-Revertive
 Revertive: This mode enables
automatic switching to work
channel from protect
channel, once the fault on
work channel is fixed.
 Non-Revertive: In this mode,
traffic has to be manually
switched from protect to
work channel. Until traffic is
manually switched back to
work channel, traffic is
carried on protect channel.

63
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


WTR Time (Wait The time interval (in minutes) after 5 1 to 12
to restore time) which the traffic must switch back
to work channel on rectification of
work channel, when administrator
reversion mode is set to revertive.
Protection Sets the protection in transmitting 1WAY  1WAY
switching mode or receiving direction or in both  2WAY
transmitting and receiving
directions.
 1WAY: Only the Head end of
the network element receiver
switches to the alternate
receiver on receiving an alarm.
 2WAY: Both the head end and
tail end of the network element
receiver switches to the
alternate receiver on receiving
an alarm.
Route Diversity  Enable: Allows the user to have Disable  Disable
two DCC links. The user can  Enable
provision DCC on the work
and protect ports
independently.
 Disable: When disabled, the
ports act dependently. The user
can only provision DCC link on
work port. Provision DCC link
on protect ports is not allowed.

NOTE: The default value for the work port is the first available port (in the ascending order
either STM-N/OC-N interface). The default value for the protect port will be the first
available port, depending upon the type of interface chosen in the work port.

Editing MSP/APS Group


To edit MSP/APS group,

1. Click Configuration > MSP/APS groups. The View MSP/APS groups pane is displayed.

64
Chapter 8 Working with Configuration Menu

2. Click MSP/APS group link in the Name column. The Protection provisioning pane is
displayed.
Figure 26: Protection provisioning configuration

3. Select the suitable values for the editable parameters.


4. Click Submit. A confirmation prompt is displayed.
5. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.

65
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 23: Protection Provisioning

Parameter Description Default Value Acceptable Value

Admin Protection Parameter to indicate if the 1 WAY  1 WAY


Switching Mode or protection is either in  2 WAY
Protection transmitting/receiving direction only
Switching Mode or in both transmitting and receiving
direction.
 1WAY: Protection is in only one
direction, either transmitting or
receiving.
 2WAY: Protection is in both
transmitting and receiving
directions.
Admin Reversion The revertive mode of the Non-Revertive  Revertive
Mode or Revertive protection.  Non-Revertive
Mode  Revertive: This mode enables
automatic switching to work
channel from protect channel,
once the fault on work channel is
fixed.
 Non-Revertive: In this mode,
traffic has to be manually
switched from protect to work
channel. Until traffic is manually
switched back to work channel,
traffic is carried on protect
channel.
WTRTime Time interval (in minutes) where the 5 1 to 12 minutes
(minutes) traffic must switch back to work
channel on rectification of work
channel, when admin reversion mode
is set to revertive.
Route Diversity Parameter to enable or disable route Enable  Enable
diversity.  Disable
 Enable: Allows you to have two
DCC links. You can also
provision both on the work and
protect ports. The ports act
independently.
 Disable: When disabled, you are
not allowed to delete the
MSP/APS since the ports are
not independent.
Operational Displays MSP/APS architecture as 1+1 --
Protection 1+1 protection.
Architecture

66
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value

Operational Displays the operational protection 1WAY --


Protection switching mode as 1WAY or 2WAY
Switching Mode depending on the protection
switching mode of the Far end
network element.
Operational Displays the current operative Revertive --
Reversion Mode reversion mode.
Current Standing Displays status of MSP/APS request -- --
Request on current MSP/APS group.
External Command External commands are used to -- --
configure a protection request.

Deleting MSP/APS Groups


The MSP/APS group can be deleted only if there are no cross-connects or In Band
Communication (IBC) interfaces (F2, F3 and F2F3) provisioned on the ports which make up the
MSP/APS group.

To delete a provisioned MSP/APS group,

1. Click Configuration in the Main menu. The sub menu items are listed.
2. Click MSP/APS groups. The View MSP/APS groups pane is displayed.
3. Select the check box in the delete column of the MSP/APS group to be deleted.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Confirm Delete. A confirmation message is displayed.

Working with MS-SP/BLSR


Multiplexed Section-Switched Protection (MS-SP) ring/Bi-directional Line Switched Ring (BLSR)
is a shared protection supported on the STM/OC interfaces. MS-SPRing/BLSR is a protection
scheme in which the total capacity in a multiplex section is divided equally between worki ng and
protection traffic. Any section can have access to the protection channels when faced with the
failure of a section or network element in the ring.

NOTE: MS-SPRing/BLSR feature is a licensed feature. If you do not see the MS-
SPRing/BLSR option in Configuration menu, contact your sales coordinator.

67
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Provisioned MS-SP/BLSR Ring


To view provisioned MS-SPRing/BLSR, click Configuration>MS-SPRing/BLSR in the
Navigation menu. The View MS-SPRing/BLSR Preview pane is displayed.

Figure 27: View MS-SPRing

68
Chapter 8 Working with Configuration Menu

Table 24: MS-SP ring/BLSR parameters

Parameter Description
View Displays the existing MS-SP/BLSR rings as links.
East Port Displays the port facing East.
West Port Displays the port facing West.
Ring Type Displays the port facing West.
Ring Id Displays the ring identifier. All network elements within the same ring will
have the same Ring Id.
Node ID Displays the identification number of the node. The value can range from 0
- 15.
Ring WTR Specifies the time to wait in minutes, before switching traffic back to work
port from protect port, after the fault in work port has been rectified.
Node State Displays the current state of the network element — Switching State, bi-
directional, Full pass through, Idle state, K-byte pass through
Protection Switching Displays if the ring switch is active in the east working port.
Status- East Working Port
Protection Switching Displays if the ring switch is active in the west working port.
Status- West Working Port
Edit Click the edit link in a row to edit the information in the row.
Delete Select the check box in a row to delete the row.

Provisioning MS-SPRing/BLSR
To provision MS-SP/BLSR ring,

1. Click Configuration>MS-SPRing/BLSR in the Navigation menu. The View MS-


SPRing/BLSR Preview pane is displayed.
2. Click Provision a new MS-SPRing/BLSR link. The Provision New MS-SPRING/BLSR
Preview pane is displayed.
3. Select or enter values referring to the MS-SP Ring/BLSR Parameters table.
4. Click Create. A confirmation Preview pane is displayed.
5. Click Yes. A "Successfully Created" message is displayed.

69
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 25: View and Provision MS-SPRing parameters

Parameter Description Default Value Acceptable Value


East Work Allows you to enter the east side work STM16/OC-48- STM-16/OC-48-1-N-M,
Port port number. 1-N-M Where N is the slot number
which can have values 2 or 4
and M is the port number.
West Work Allows you to enter the west side STM16/OC-48- STM-16/OC-48-1-N-M,
Port work port number. 1-N-M Where N is the slot number
which can have values 2 or 4
and M is the port number.
Ring Id The ring identifier. All network - Acceptable values can be a set
elements within the same ring will of alphanumeric characters.
have the same Ring Id.
Node ID The identification number of the 00 The value can range from 00 to
node. Two nodes cannot have the 15.
same node ID.
Ring Map Allows you to enter the sequence of - Sequence of MS-SPRing/BLSR
IDs of nodes, separated by semi Node IDs, separated by semi
colon, that form a MS-SP/ BLSR ring. colon.

Note: The sequence of IDs


must be given from West port
to East port.

Ring WTR The time to wait in minutes, before 05 Acceptable values range from
(Minutes) switching traffic back to work port 00 to 12 minutes.
from protect port, after the fault in
work port has been rectified.

NOTE: Cross-connects on the ring ports should be deleted before creating or deleting MS-
SPRing/BLSR.

Editing MS-SP/BLSR Ring


To edit MS-SPRing/BLSR,
1. Click Configuration>MS-SPRing/BLSR in the Navigation menu. The View MS-SP/BLSR
Ring Preview pane is displayed.
2. Click the MS-SP/BLSR Ring link in the View column. The MS-SP/BLSR Ring Preview pane
is displayed.
3. Click the Edit link or click the edit link in the Edit column of the MS-SP/BLSR Ring to be
updated. The Edit Preview pane is displayed.
4. Edit required values and click Submit. An alert is displayed prompting you to confirm the
operation.
5. Click Accept Valid Modifications. A success message is displayed.

70
Chapter 8 Working with Configuration Menu

Deleting MS-SPRing/BLSR
To delete MS-SP/BLSR ring,

1. Click Configuration>MS-SPRing/BLSR in the Navigation menu. The View MS-SP/BLSR


Ring Preview pane is displayed.
2. In the delete field, select the check box for those entries that needs to be deleted.
3. Click Delete. A confirmation Preview pane is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

NOTE: Before deleting the MS-SP/BLSR ring, ensure that all cross-connects in the MS-
SP/BLSR ring are deleted.

Configure Bulk Squelch Table


To provision squelch table,

1. Click Configuration > Squelch Table in the navigation menu. The Configure Bulk Squelch
Table page is displayed.
Figure 28: Configure Bulk Squelch Table

2. Edit the required values by referring to the table below.


3. Click Submit. A success message is displayed.

71
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 26: Configure Bulk Squelch Table parameters

Parameter Description Default Value Acceptable Value


Number of The number of cross-connects that 1 1 to N where N is
Channels need to be updated with squelch table. the desired number
of cross-connects.
Capacity The capacity of the cross-connect. VC3 Acceptable values:
 VC12
 VC3
 VC4
First Source Node Select the First Source Node ID from Unset  Unset
ID the drop-down list.  o to 15
Last Destination Select the Last Destination Node ID Unset  Unset
Node ID from the drop-down list.  o to 15
Start Time Slot Select the Start Time Slot for - -
protection.

Managing Cross-connects
The Cross-connect option enables you to create cross-connects in a network element and
provision 1WAY, 2WAY, 3-WAY, 4-WAY, protected or unprotected cross-connects of different
capacities.

Adding Cross-Connects
To add cross-connects,
1. Click Configuration > Cross-connects in the Navigation menu. The Configure Cross-
connects pane is displayed.

72
Chapter 8 Working with Configuration Menu

2. Click Add Cross-connect. The Add Cross-connects pane is displayed.


Figure 29: Add Cross-connects

3. Select or enter values in Add Cross-connects pane.


4. Click Create.
5. Click Yes.

73
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 27: Add Cross-connects

Parameter Description Default Value Acceptable Value


Number of The number of cross-connects 1 --
Connections that need to be created.
Capacity The capacity of the cross- VC12/VT-2  VC12/VT2
connect.  VC3/STS-1
 VC4/STS-3c
 VC4_4c/STS-12c
 VC4_16c/STS-48c
Mode Select the cross-connect mode. Regular  Regular

Circuit Identifier The name given for the cross- Tejas Networks Up to 40 alphanumeric and
connect. special characters.
Directionality The direction of the data flow 2 WAY  1WAY
in the cross-connect.  2WAY
Working Source The source port for work -- Physical & Logical E1
Port channel. All the available ports. ports.
Working The source port for the -- Physical & Logical E1
Destination Port destination channel. All the ports.
available ports.
Source Protection Parameter to enable or disable Disable  Enable
/ Destination source protection.  Disable
Protection  Enable: The protection
path is enabled at the
source/destination.
 Disable: The protection
path is disabled at the
source/destination.
Protection Source The source and the destination -- --
Port / Protection port for the protection channel.
Destination Port
Source Port The reversion mode of the Non-revertive  Revertive
Revertive protection at source.  Non-Revertive
 Revertive: The traffic is
automatically switched to
the work path from the
protect path after the fault
in the work path is rectified.
 Non-Revertive: The traffic
has to be manually switched
to the work path from the
protect path after the fault
in the work path is rectified.
Source WTR The time taken by the source to 5 1 to 12 minutes

74
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value


Time restore.
Destination Port The reversion mode of Non-revertive  Revertive
Revertive protection at the destination.  Non-Revertive
 Revertive: The traffic is
automatically switched to
the work path from the
protect path after the fault
in the work path is rectified.
 Non-revertive: The traffic
has to be manually switched
to the work path from the
protect path after the fault
in the work path is rectified.
Destination WTR The time taken by the 5 1 to 12 minutes
Time destination to restore.

Source Port The source port hold off time 0 The range is 10 - 100.
Holdoff(x100ms) defines the wait time for
reporting the alarms in the
interconnected rings when
failure condition exists on the
source port.
Destination Port The destination port hold off 0 The range is 10 - 100.
Holdoff(x100ms) time defines the wait time for
reporting the alarms in the
interconnected rings when
failure condition exists on the
destination port.

Filtering Cross-Connects
When you click on the Filter button, it filters cross-connect based on the selected criteria for
capacity, card, port number, etc. The filtered results are displayed in the Cross connects section
of the Configure Cross-connects preview pane.

Click Select all button to select all the filtered cross-connects and Deselect all button to clear all
the selected cross-connects.

To filter cross-connects,

1. Click Configuration > Cross-connects. The Configure Cross-connects preview pane is


displayed.
2. Select criteria for filtering in the Filter Cross-connects section by referring to the cross-
connect parameters table mentioned in Managing Cross-Connects.
3. Click Filter. The cross-connects are filtered with the required criteria.

75
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Editing Cross-Connects
To edit cross-connects,

1. Click Configuration > Cross-connects. The Configure Cross-connects preview pane is


displayed.
2. Click the cross-connect to be edited. The entry preview pane is displayed.
3. Click the Edit link or click the edit link in the Edit column for the entry to be updated.
4. Edit the required values by referring to Cross-connects parameters table mentioned in
Managing Cross-Connects.
5. Click Submit.
6. Click Accept Valid Modifications. The cross-connects are modified with the updated
information.

Deleting Cross-Connects
To delete cross-connects,

1. Click Configuration > Cross-connects. The Configure Cross-connects preview pane is


displayed.
2. In the Delete all field, select the check box for the cross-connects to be deleted.
3. Click Delete selected connection(s).
4. Click Confirm Delete. The selected cross-connects are deleted.

NOTE: A maximum of 500 cross-connections can be deleted at once.

Managing Overhead Tunnels


Overhead Tunnel is a feature to pass through overhead bytes transparently between east and west
fibers. Overhead tunneling between two STM ports of a Tejas Node can be created to bypass the
management information carried between other Nodes using DCC_R or (SDCC) /DCC_M or
(LDCC) /F1/E1/E2 bytes, without processing these bytes.

NOTE: Bytes used for In-band communication cannot be used for configuring overhead
tunnel.

76
Chapter 8 Working with Configuration Menu

View Overhead Tunnels


To view provisioned overhead tunnels, click Configuration > Overhead tunnel. The Configure
overhead tunnels preview pane is displayed. The Configure overhead tunnels lists the overhead
tunnels configured on the network element.

Figure 30: View Overhead Tunnels

Table 28: Overhead Tunnel parameters

Parameter Description
Tunnel Name The Tunnel name. The Tunnel name is a combination of
the source and destination ports.
Source Port or Source Port Name The Source STM port.
Destination Port or Destination Port Name The Destination STM port.
Overhead Byte The overhead byte that is tunneled.
Delete Allows you to select the desired Tunnel name and delete.

Adding Overhead Tunnel


To provision overhead tunnel,
1. Click Configuration > Overhead tunnel. The Configure overhead tunnels pane is displayed.

77
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click Create Overhead tunnel. The Add Overhead Tunnel pane is displayed.
Figure 31: Add Overhead Tunnel

3. Select desired values and click Submit.


4. Click Yes. The new overhead tunnel is provisioned.

NOTE: You can provision a maximum of 30 overhead bytes for overhead tunneling.

Table 29: Configure Overhead Tunnel parameters

Parameter Description Default Value Acceptable Value


Source Port Name The Source STM/OC STM16/OC48-1-N-1 All the available STM-
port. 1/4/16/OC-3/12/48 ports
Destination Port The Destination STM16/OC48-1-N-2 All the available STM-
Name STM/OC port. 1/4/16/OC-3/12/48 ports
Overhead Byte The overhead byte that is E1 E1, E2, F1, DCC_R/SDCC
tunneled. and DCC_M/LDCC.

Deleting Overhead Tunnels


To delete overhead tunnel,

1. Click Configuration > Overhead tunnel. The Configure overhead tunnels preview pane is
displayed.
2. In the delete field, select the check box for the entries to be deleted.
3. Click Delete.

78
Chapter 8 Working with Configuration Menu

4. Click Confirm Delete. The selected overhead tunnel is deleted.

Provisioning Environmental Alarm Input


The network element is configured for customized environmental conditions such as power or
air conditioning failure, equipment room door open. The string entered in the environmental
alarm field defines the alarm. The alarm is reported when the defined environmental condition is
detected.

To provision environmental alarms,


1. Click Configuration > Environmental alarm input. The Configure environmental alarms
preview pane is displayed.
Figure 32: Configuring Environmental Alarms

2. Enter the string with which the alarms have to be identified in the Environmental Alarm
fields.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Yes. A "Successfully Created" message is displayed. The environmental alarm is
configured.

NOTE: The environmental alarm can be a set of alphanumeric characters. The maximum
number of characters allowed is 32.

79
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Configuring SNMP Traps


Simple Network Management Protocol (SNMP) is a set of protocols for managing complex
networks. SNMP is an application-layer protocol that allows network devices to exchange
management information. SNMP trap is an SNMP application that uses the SNMP trap
operation to send information to a network manager. Traps are sent when errors or specific
events occur on the network.

SNMP allows network administrator to find and interpret network problems and plan network
growth. The TejNES SNMP is designed to provide asynchronous event notification to a
Network Management System (NMS).

To configure SNMP traps,

1. Click Configuration > SNMP traps. The SNMP trap destination IP addresses preview pane is
displayed.
Figure 33: Provisioning SNMP Traps

2. Enter the IP Address, Port and select the SNMP Version.


3. Click Submit. A Modify SNMP trap destination IP addresses preview pane is displayed.
Table 30: SNMP Trap destination IP addresses

Parameter Description Default Value Acceptable Value


IP Address Enter the destination IP address. -- 0.0.0.0 to
225.225.225.224
Port The port used in SNMP. This value 162 --
cannot be changed.
SNMP Version The version of SNMP in use. SNMP_V1 SNMP_V1,
SNMP_V2.
Delete Allows you to delete the IP Address. -- --
# Serial number -- --

NOTE: SNMP traps can be added manually or when a node is enrolled in EMS.

80
Chapter 8 Working with Configuration Menu

Managing Facilities
The Facilities option allows you to view and edit the attributes of optical ports, PDH ports,
Ethernet, and VCG ports.

Viewing STM/OC Ports


To view the STM/OC Interfaces, click Configuration > Facilities > STM/OC. The STM/OC Port
interface configuration preview pane is displayed.

Figure 34: Viewing STM Ports

Provisioning STM/OC Ports


To provision STM/OC ports,

1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port
interface configuration preview pane is displayed.
2. Click the desired STM/OC port link. The corresponding Provisioning Interface preview pane
is displayed.
3. Select or enter values referring to the Provision Interface STM/OC-N Parameters table.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Created" message is displayed.

81
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 31: Provision Interface STM/OC parameters

Parameter Description Default Value Acceptable Value


Admin Status The administrative status of the port. Up  Up
 Up: Sets the interfaces in service.  Down
 Down: Sets the interfaces out of
service.
Alarm Reporting The alarm reporting status. Report  Report
Status  Report: Enables reporting of  No-Report
alarms on STM/OC port.
 No-Report: Disables reporting of
alarms on STM/OC port.
STM/OC Port The STM/OC port profile. Internal-NNI  Internal-NNI
Profile  External-NNI
Line Coding The type of line coding being used -- --
(NRZ coding). This field is not
configurable.
Laser The Laser being used. Click the link to -- --
view the Laser provisioning page.
ECC Byte The established Embedded ecc_disable  ecc_disable
Selection Communication Channel (field is not  ecc_DCC_M
configurable).
 ecc_DCC_R
Transmit J0 The section trace message is -- --
transmitted with Maximum length as
specified by the Transmit J0 Length,
padded with spaces for strings less
than specified length.
Transmit J0 Allows you to select the transmit 16
1, 16
Length length of section trace.
The expected received section trace
Expected J0 -- --
value.
Expected J0 Allows you to select the expected 16
1, 16
Length receiver section trace.
Received J0 The received Section trace message. -- --
TIM Action settings control handling
of mismatches between received and
expected trace messages.
TIM Action Displays the action taken on trace tim-ignore  tim_report
identifier match.  tim-ignore
 tim_report: Reports alarm traffic  tim_downstream
affecting, on trace identifier _ais
mismatch.
 tim_ignore: Reports no action on
trace identifier mismatch.

82
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value


 tim_downstream_ais: Reports
alarm indication signal (AIS)
downstream (traffic affecting), on
trace identifier mismatch.
Signal Fail BER Parameter to enable or disable Signal Disable  Disable
Threshold (B2) Fail BER thresholds.  1e-3
 Enable: Enables selecting the  1e-4
threshold, on crossing, which
 1e-5
Signal Fail alarm is raised for
errors detected by B2. Threshold
range is between 10e-4 to 10e-5.
 Disable: Signal Fail BER
Thresholds are disabled.
Signal Degrade BER thresholds. Disable  Disable
BER Threshold  Enable: Threshold on crossing,  1e-5
(B2) which Signal Degrade alarm is  1e-6
raised for errors detected B2.
 1e-7
Threshold can be set in the range
between 10e-5 to 10e-9.  1e-8
 Disable: Signal Degrade BER  1e-9
Thresholds are disabled.
Threshold (for Parameter to enable threshold Disable  Enable
TCA-15 min) crossing alerts (TCA) for 15-min  Disable
duration.
 Default
 Enable: TCA is user configured
for 15 minutes interval. If this
field is enabled, an alert/event is
raised on Performance
Monitoring counts crossing the
threshold value. The thresholds
are changed from the TCA
Settings link on the same page.
 Disable: TCA are disabled.
Default -Default values for the
thresholds are used.
Threshold (for Parameter to enable TCA for 1-day Disable  Enable
TCA-1 day) duration.  Disable
 Enable: TCA is user configured  Default
for 1 day interval. If this field is
enabled, an alert/event is raised
on Performance Monitoring
counts crossing the threshold
value. The thresholds are changed
from the TCA Settings link on the
same page.
 Disable: TCA are disabled.
 Default: Default values for the

83
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


thresholds are used.

Identifier The name for the STM/OC port. -- alphanumeric


characters
Transmit SS Bit Allows you to select the value set for  00 in SONET  00
interop with multi-vendor equipment. mode  10
This is used to support legacy network  10 in SDH mode
equipment.

NOTE: Transmit SS Bit is for


STM-16/OC-48 interfaces only.

Miscellaneous

Operate on All Parameter to select the option of bulk -- --


AUGs disabling and enabling of AUGs.
All AUGs Displays the AU mapping changes for AU4 --
Mapping all the AUGs on the STM/OC port.
Structure

NOTE: Alarms are not reported by enabling B1 thresholds. All AUGs Mapping Structure
parameter is editable only when Operate on All AUGs checkbox is selected.

By default, the Threshold Crossing Alert (TCA) settings are not editable. To edit them, enable the
TCA settings first.

84
Chapter 8 Working with Configuration Menu

Table 32: TCA settings

Parameter Description Default Value Acceptable Values

15 min 1 day 15 min 1 day


Threshold RS-ES Threshold for Errored 114 10944 0-900 0-86400
Seconds-Regenerator Section
Threshold RS- Threshold for Severely Errored 10 960 0-900 0-86400
SES Seconds-Regenerator Section
Threshold RS- Threshold for Background 27000 2592000 0-16777215 0-1610612640
BBE/RSCV Block Errors/Code Violations-
Regenerator Section
Threshold MS-ES Threshold for Errored 114 10944 0-900 0-86400
Seconds-Multiplex Section
Threshold MS- Threshold for Severely Errored 10 960 0-900 0-86400
SES Seconds-Multiplex Section
Threshold MS- Threshold for Background 27000 2592000 0-16777215 0-1610612640
BBE/MSCV Block Errors/Code Violations-
Multiplex Section

Editing TCA Settings for STM/OC Ports


To edit TCA settings for STM/OC ports,

1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired STM/OC port. The Provisioning interface preview pane for that STM/OC
port is displayed.
To enable Set TCA for 15-min duration, click TCA Settings for 15-min duration
link. The TCA settings for 15-minute duration pane is displayed.
Figure 35: Provisioning TCA Settings for STM Ports

85
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

To Set TCA for 1-day duration, click TCA Settings for 1-day duration link. The
TCA settings for 1-day duration pane is displayed.
3. Enter the threshold values in the respective text fields.
4. Click Submit. An alert is displayed prompting you to confirmation the operation.
5. Click Accept Valid Modifications. A success message is displayed.

Provisioning AUG
To provision AUG or to provision the mapping structure of the AUG/STS-3,

1. Click Configuration>Facilities>STM/OC. The STM/OC Port interface configuration preview


pane is displayed.
2. Click the desired AUG/STS-3 link. The Provision AUG/STS-3 preview pane is displayed.
Figure 36: Provisioning AUG

3. Select the desired value against the Mapping Structure field.


4. Click Submit. A confirmation page is displayed.
5. Click Accept Valid Modifications. A success message is displayed.

86
Chapter 8 Working with Configuration Menu

NOTE: In the MSP/APS configuration, the AUG parameters need to be provisioned only for
the working STM/OC-N port of the protection group. The provisioned values are
automatically propagated to the protection port.

NOTE: The signal label field is provisionable, but should not be edited as it will be
automatically assigned a value depending on the type of cross-connect provisioned. AUG can
be provisioned only if all its associated cross-connects are unprovisioned or deleted.

NOTE: Options available in the Mapping structure depends on the mapping selected while
initializing the network element. Refer Installation and Commissioning Guide (TPN: 140-
DOC000014-E) for more information.

Provisioning AU/STS
To provision AU/STS,

1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired AU/STS link. The corresponding Provision preview pane is displayed.
Figure 37: Provisioning AU4

3. Select or enter values in Provision preview pane.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modification. A “Successfully Modified” message is displayed.

87
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 33: Provision AU4 parameters

Parameter Description Default Value Acceptable Value


Signal Label The payload  Unequippe SDH Mode SONET Mode
signal label. d if there  unequipped  unequipped
The signal are no
Label field cross-  equipped_non_specific  Equipped_Nonspecifi
will be connects  tug_structure c
automatically provisioned  locked_tu_n  VT-Structured STS-1
assigned a  Tug_structu SPE
value  asynchronous_container
re if the 3  Locked VT Mode
depending on lower order
the type of path (VC-3,  asynchronous_container  ATM Mapping
cross-connect VC-12) is 4  DQDB Mapping
provisioned. AU4  atm_mapping  FDDI Mapping
mapped  dqdb_mapping  HDLC-PPP
 Asynchron  fddi_mapping  SDL-SSS
ous_contain
er4 if the  hdlc_ppp  HDLC-LAPS
higher  sdl_sss  SDL-SRS
order path  hdlc_laps  Ethernet-10G
(VC4) is
AU4  sdl_srs  GFP
mapped  eth_10g  Test_0181
 Tug_structu  gfp  VC-AIS
re if the  test_O181
lower order
path (VC-  vc_ais
12) is AU3
mapped
 Asynchron
ous_contain
er3 if the
higher
order path
(VC-3) is
AU4
mapped
Connection Parameter to Allow both  Allow both Lower Order and Higher Order
Type select the type lower order and Connections
of cross- higher order  Allow Only Lower Order Connections
connects that connection
can be  In Use Higher Order Connection
created.
Received The payload -- --
Signal Label type or the
Signal label
received on
the AU/STS
path. This
field is ready

88
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value


only.

Expected The path RX_Unallocate Trace message of 16 to 64 characters. The received


Trace trace that is d message can be 16 or 64 characters long. The Transmit
expected to Trace Length and Expected Trace Length must be the
be received same.
on AU/STS
path.
Expected The length of 16  16
Trace the section  64
Length path trace
that is
expected to
be received.
Received The AU/STS --
Trace path trace
that is
--
received. This
field is ready
only.
Signal Fail Parameter to 1e-3  1e-3
BER indicate the  1e-4
Threshold threshold for
signal fail Bit  1e-5
Error Rates  Disable
(BER) When Disable is selected, no threshold exists for the
beyond which signal fail BERs and alarms are not raised.
alarm is
raised.
Signal Parameter to 1e-6 1e-3 to 1e-9 and Disable
Degrade indicate the
When Disable is selected, no threshold exists for the
BER threshold for
signal degrade BERs and alarms are not raised.
Threshold signal degrade
Bit Error
Rates (BER)
beyond which
alarm is
raised.
Alarm Parameter to Report  Report
reporting enable or  Disable
status disable
reporting of
alarms raised
on the
interface.
Path alarm Parameter to Mask TIM  mask TIM
profile assign the  suppress TIM

89
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


alarm profile  mask all except LOP
for the Path.
 mask all
 mask TIM_AND_SLM
Transmit The message Tx_Unallocated The trace message can be of 16 or 64 characters long.
Trace transmitted in
the AU on J1
byte.
Transmit The length of 16 16 to 64 characters. The Transmit Trace Length and
Trace the section Expected Trace Length must be the same.
Length path trace to
be sent.

NOTE: Signal Label field will be automatically assigned a value depending on the type of
cross-connect provisioned. Transmit Trace Length and Expected Trace Length must be the
same.

Editing TCA Settings for AU4


To edit TCA Settings for AU/STS,

1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired AU/STS-1 link. The Provision AU/STS-1 preview pane is displayed.
3. Do one of the following:
To edit TCA settings for 1-day duration, click TCA Settings for 1-day duration.
To edit TCA settings for 15-min duration, click TCA Settings for 15-min
duration.
The corresponding TCA Settings preview pane is displayed.
Figure 38: Editing TCA Settings for AU4

90
Chapter 8 Working with Configuration Menu

4. Enter the required values and click Submit. An alert is displayed prompting you to confirm
the operation.
5. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.

NOTE: To reset the PM thresholds of AU/STS-1 to their default values, the Threshold field
(for TCA 15-min or 1-day) need to be set to default. To edit the AU/STS-1 PM thresholds,
set the Threshold field to enable. For details, refer Provisioning STM/OC Ports.

Table 34: TCA settings with AU4/STS3c for 15 minutes duration

Parameter Description Default Value Acceptable Value


Threshold ES Threshold for Errored Seconds 180 0 to 900
Threshold SES Threshold for Severely Errored 15 0 to 900
Seconds
Threshold Threshold for Background Block 1100 0 to 65535
BBE/CV Errors
Table 35: TCA settings with AU4/STS3c for one day duration

Parameter Description Default Value Acceptable Value

Threshold ES Threshold for Errored Seconds 17280 0 to 86400


Threshold SES Threshold for Severely Errored 1440 0 to 86400
Seconds
Threshold Threshold for Background Block 105600 0 to 6291360
BBE/RS-CV Errors

Provisioning TU
Tributary Units (TU) can be provisioned only after TU/VT cross-connects are created. It is
possible to retrieve or view the TU/VT parameters only when TU/VT is acting as a protecting
member for a connection.

NOTE: Presence of unprovisioned TU/VT on the far end network element leads to no
VCAT overhead transmission. The alarm raised due to the above consequence is Loss of
VCAT multiframe on TU/VT. If the STM/OC-N ports are provisioned in an MSP/APS
configuration, then you need to select the TU/VT for the corresponding work port in order
to edit the TU/VT parameters. The settings will be automatically propagated to the protection
TU/VT.

To provision TU,

1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click on the desired AU4/STS3c. The Provision AU4/STS3c preview pane is displayed.

91
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

3. Click on the desired TU/VT link. The Provision TU/VT preview pane is displayed.
Figure 39: Provisioning TU

4. Select or enter values in Provision TU/VT preview pane. Refer TU/VT Parameters table for
the values.
5. Click Submit. A confirmation preview pane is displayed.
6. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.

92
Chapter 8 Working with Configuration Menu

Table 36: TU/VT parameters

Parameter Description Default Value Acceptable Value


Signal Label The payload signal label. The value Unequipped when SONET Mode:
assigned depends on the cross- there are no cross-  unequipped
connect provisioned. The Signal connects
Label field is made user provisioned  equipped_non_specific
provisionable to avoid the Signal  asynchronous
Label Mismatch in case of  bit_synchronous
connectivity between network
elements of multi vendor  byte_synchronous
networks.  test_O181
 vc_ais
 extended
SDH Mode:
 unequipped
 equipped_non_specific
 tug_structure
 locked_tu_n
 asynchronous_container3
 asynchronous_container4
 atm_mapping
 dqdb_mapping
 fddi_mapping
 hdlc_ppp
 sdl_sss
 hdlc_laps
 sdl_srs
 eth_10g
 gfp
 test_0181
 vc_ais
Extended The payload type or the Signal GFP for add drop  ATM
Signal Label label received on the TU/VT path. Ethernet cross-  HDLC_PPP
The value assigned depends on the connects
cross-connect provisioned. The  HDLC_LAPS
Extended Signal Label option is  VCAT_TEST
ignored for TU-3 and TU-12 pass  GFP
through cross-connects.
Received The payload type or signal label -- --
Signal label received on the TU/VT path. For
example, tug structured,
asynchronous_container3.
Transmit The path transmitted in the TX_Unallocated Trace message of 16 or 64
Trace TU/VT on J1 byte. characters

93
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


Transmit The length of the section path 16
Trace trace to be sent. 16
Length
Expected The path trace that is expected on RX_Unallocated Trace message of 16 or 64
trace the TU/VT path. characters
Expected The length of the expected section 16
Trace path trace. 16
Length
Received The TU/VT path trace that is --
--
Trace received.
Signal Fail Parameter to indicate the threshold 1e-3  1e-3
BER for signal fail Bit Error Rates  1e-4
Threshold (BER) beyond which alarm is
raised. When Disable is selected,  1e-5
no threshold exists for the signal  Disable
fail BERs and alarms are not
raised.
Signal Parameter to indicate the threshold 1e-6  1e-3 to 1e-9
Degrade for signal degrade Bit Error Rates  Disable
BER (BER) beyond which alarm is
Threshold raised. When Disable is selected,
no threshold exists for the signal
degrade BERs and alarms are not
raised.
Alarm Parameter to enable or disable Report  Report
Reporting reporting of alarms raised on the  Disable
Status interface.
Path Alarm Parameter to assign the alarm mask TIM  mask TIM
Profile profile for the Path.  suppress TIM
 mask all except LOP
 mask all
 mask TIM_AND_SLM
Performance Performance Monitoring can be Disable  Disable
Monitoring enabled or disabled.  Enable

NOTE: The Signal Label, Extended Signal Label and Signal Label Mismatch action fields are
assigned a value depending on type of cross-connect provisioned. The Signal Label field is
made user provisionable to avoid the Signal Label Mismatch in case of connectivity between
network elements of multi vendor networks. The Extended Signal Label option is ignored for
TU-3/STS-1 and TU-12/VT-2 pass through cross-connects. The Transmit Trace fields are
editable only for add/drop cross-connects. The Transmit Trace is not editable for pass
through cross-connects.

94
Chapter 8 Working with Configuration Menu

Editing TCA Settings for TU


To edit the TU/VT performance monitoring thresholds for 15-minutes and 1-day duration,

1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port
interface configuration preview pane is displayed.
2. Click the desired AU/STS-1. The corresponding provisioning preview pane is displayed.
3. Click the desired TU/VT link. The Provision TU/VT preview pane is displayed.
4. Click TCA Settings for 15-min duration/1-day duration link to edit TCA settings for 15-min
duration. The corresponding TCA settings pane is displayed.
5. Enter the required values.
6. Click Submit. A confirmation preview pane is displayed.
7. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.

NOTE: To configure the TU/VT Performance monitoring thresholds, set the corresponding
Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM/OC-N port
preview pane.

Table 37: TCA settings with TU/VT for 15 minutes duration

Parameter Description Default Value Acceptable Value


Threshold ES Threshold for Errored Seconds 120 0 to 900

Threshold SES Threshold for Severely Errored Seconds 15 0 to 900

Threshold BBE Threshold for Background Block Errors 300 0 to 65536


/CV
Table 38: TCA settings with TU/VT for one day duration

Parameter Description Default Value Acceptable Value

Threshold ES Threshold for Errored Seconds 11520 0 to 86400

Threshold Threshold for Severely Errored Seconds 1440 0 to 86400


SES
Threshold Threshold for Background Block Errors 28800 0 to 6291360
BBE/RS-CV

Provision E1 Interface
To provision E1 interface,
1. Click Configuration > Facilities > E1. The E1 Interface configuration preview pane is
displayed.

95
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click the E1 interface to be provisioned. The Provision Interface E1 preview pane is displayed.
Figure 40: Provision Interface - E1

3. Select or enter values referring to the "Provision Interface Parameters" table.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The E1
Interface is provisioned.

96
Chapter 8 Working with Configuration Menu

Table 39: Provision Interface Parameters

Parameter Description Default Value Acceptable Values

Admin Status Allows you to select the administrator Down  Up


status.  Down
 Up: Sets the port in service.
 Down: Sets the port out of service.
Alarm Allows you to choose Report/No-Report Report  Report
Reporting of Alarm for the particular port.  No-Report
Status
Threshold (for Select the threshold for 15min/24 hour. Disable  Disable
TCA-  Default TCA
15min/24- Profile
hour)
Identifier Allows you to enter the name (Identity) of -- --
the E1 port.
Framing Type Allows you to choose the framing type. Unframed  Unframed
 Framed: Few channels will be used to  Framed
send frames and rest for sending data.
 Unframed: All the channels will be
used to send data.
Framing Displays “Not applicable” for E1 when the CRC4 CRC4
Application Framing Type is set as ‘unframed’.
When Framing Type is set as Framed, the
Framing Application field displays CRC4
for E1
DownStreamA When set as ‘Framed’, it allows you to DownStreamAis  DownStreamAis
is Enable enable or disable downstream AIS. Enable Enable
 DownStreamAis
Disable
Line Build Out The Line build out type is applicable for -- --
Type DS1 ports and not applicable for E1 ports.
This parameter is not editable for E1 port.
Retiming Allows you to select a value for retiming. Disabled  Disabled
 Enable: The E1 signal is reconstituted  Enabled
to the primary reference source
performance specifications.
 Disable: The E1 signal is not
reconstituted to the primary reference
source performance specifications and
hence the synchronization information
is lost.

97
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Provisioning E1/DS1 Interface


To provision PDH ports,

1. Click Configuration > Facilities > E1/DS1. The E1/DS1 Interface Configuration preview
pane is displayed.
2. Click the desired E1/DS1 port. The Provision interface-E1/DS1 preview pane is displayed.
3. Select/Enter values referring to the provision interface-E1/DS1 parameters table.
4. Click Submit. A confirmation message is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The E1
port is provisioned.

98
Chapter 8 Working with Configuration Menu

Table 40: Provision Interface-E1/DS1 Parameters

Parameter Description Default Value Acceptable Value


Admin Status The administrative status of the PDH Down  Up
port.  Down
 Up: Sets the port in service.
 Down: Sets the port out of
service.
Alarm Reporting The alarm reporting status of the Report  Report
Status PDH port.  No-Report
 Report: Reports alarms raised on
the port.
 No-Report: Alarms raised at the
port are not reported.
Threshold (for Parameter to enable or disable TCAs Disable  Enable
TCA 15min/24- for 15min/24-hr duration on the  Disable
hour) PDH ports.
 Default TCA
 Enable: Enables configuring Profile
threshold level (for TCA-15min /
1-day) for TCA.
 Disable: Disables threshold level
for TCA-15 min / 1-day.
 Default TCA Profile: The default
TCA profile is assigned.
Identifier The identifier for the port. - Any string identifier
that the creator may
like to associate with
an E1/DS1 port. This
string can be used to
search on list of port.
Framing The framing application being used. For DS1: Extended For DS1, the values
Application Applicable only for DS1. Superframe format are:
 Extended
Superframe
Format
 Superframe
Format
Framing Type The type of frame. Unframed  Unframed
 framed
Line build out The Line build out type. Applicable DS1: DS1:
type only for DS1.  DS1_0_133ft
DS1_0_133ft
 DS1_133_266ft
 DS1_266_399ft
 DS1_399_533ft
 DS1_533_655ft

99
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


DS1 AIS Egress Allows you to enable or disable the Disabled  Enabled
Alarm Alarm indication signal (AIS) for the  Disabled
Egress Alarm. This parameter is
applicable only for DS1 ports.
Mapping Type This parameter is applicable only for Asynchronous  Asynchronous
DS1 ports.  BitSynchronous
Line Coding The type of line coding being used. DS1: DS1:
This parameter is applicable for DS1  AMI
B8ZS
ports.
 B8ZS

View TCA Profiles for PDH Ports


To view TCA profiles for PDH ports,

1. Click Configuration > Facilities > E1 in the Navigation menu.


2. Click E1 in the sub menu. The E1 Interface configuration preview pane is displayed.
3. Click the desired E1 port. The Provision interface preview pane is displayed.
4. Click the View TCA Profiles link. The View TCA Profile preview pane is displayed.
Figure 41: View TCA Profile

Provision TCA Profile for PDH Ports


To provision TCA profile for PDH ports,

1. Click Configuration > Facilities > E1 in the Navigation menu. The E1 Interface
configuration preview pane is displayed.
2. Click the desired E1 port. The Provision interface preview pane for E1 port is displayed.
3. Click View TCA Profiles. The View TCA Profile preview pane is displayed.

100
Chapter 8 Working with Configuration Menu

4. Click Provision a new TCA Profile. The Provision New TCA Profile preview pane is
displayed.
Figure 42: Provision New TCA Profile

5. Enter values and click Create. An alert is displayed confirmation preview pane is displayed.
6. Click Yes. A "Successfully Created" message is displayed. The TCA profile is provisioned for
PDH port.

101
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 41: TCA Profile Parameters

Parameter Description Default Value Acceptable Value


Profile Name Name assigned to the TCA profile. - Alphanumeric
characters.
Threshold ES- Parameter to indicate the threshold 65 0 to 900
L(15min) value of the Errored Seconds-Line
(ES-L). If the ES-L count crosses the
set value, then TCA is raised.
Threshold SES-L Parameter to indicate the threshold 10 0 to 900
(15min) value of the Severely Errored
Seconds-line (SES-L). If the SES-L
count crosses the set value, then TCA
is raised.
Threshold CV-L Threshold value of the Coding 13340 0 to 16383
(15min) Violation-Line (CV-L). If the
background CV-L count crosses the
set value, then TCA is raised.
Threshold ES-P Threshold value of the Errored 65 0 to 900
(15min) Seconds-Path (ES-P). If the ES-P
count crosses the set value, then TCA
is raised.
Threshold SES-P Threshold value of the Severely 10 0 to 900
(15min) Errored Seconds-Path (SES-P). If the
SES-P count crosses the set value,
then TCA is raised.
Threshold CV-P Threshold value of the Coding 72 0 to 16383
(15min) Violation-Path (CV-P). If the
background CV-P count crosses the
set value, then TCA is raised.
Threshold UAS- Unavailable seconds (UAS) in the 10 0 to 900
P(15min) regenerator section.
Threshold ES-TP Parameter to indicate the threshold 648 The acceptable values
(15min) value of ES-TP. If the ES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold SES- Parameter to indicate the threshold 100 The acceptable values
TP (15min) value of SES-TP. If the SES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold CV-TP Parameter to indicate the threshold 691 The acceptable values
(15min) value of CV-TP. If the background range from 0 to
CV-TP count crosses the set value, 27561600.
then TCA is raised.
Threshold UAS- Parameter to indicate the Unavailable 10 The acceptable values
TP(15min) Seconds (UAS) in the regenerator range from 0 to
section. 65535.

102
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value


Threshold UAS- Unavailable seconds in the regenerator 10 0 to 65535
L(24hr) line section.
Threshold ES-L Threshold value of the Errored 648 0 to 65535
(24hr) Seconds-Line (ES-L). If the ES-L
count crosses the set value, then TCA
is raised.
Threshold SES-L Severely Errored Seconds-Line (SES- 100 0 to 65535
(24hr) L). If the SES-L count crosses the set
value, then TCA is raised.
Threshold CV-L Parameter to indicate the threshold 133400 0 to 133315200
(24hr) value of the Coding Violation-Line
(CV-L). If the background CV-L
count crosses the set value, then TCA
is raised.
Threshold ES-P Parameter to indicate the threshold 648 0 to 65535
(24hr) value of the Errored Seconds-Path
(ES-P). If the ES-P count crosses the
set value, then TCA is raised.
Threshold SES-P The threshold value of the Severely 100 0 to 65535
(24hr) Errored Seconds-Path (SES-P). If the
SES-P count crosses the set value,
then TCA is raised.
Threshold CV-P The threshold value of the Coding 691 0 to 27561600
(24hr) Violation-Path (CV-P). If the
background CV-P count crosses the
set value, then TCA is raised.
Threshold UAS-P Unavailable Seconds (UAS) in the 10 0 to 65535
(24hr) regenerator section.

Threshold ES-TP Parameter to indicate the threshold 648 The acceptable values
(24hr) value of ES-TP. If the ES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold SES- Parameter to indicate the threshold 100 The acceptable values
TP (24hr) value of SES-TP. If the SES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold CV-TP Parameter to indicate the threshold 691 The acceptable values
(24hr) value of CV-TP. If the background range from 0 to
CV-TP count crosses the set value, 27561600.
then TCA is raised.
Threshold UAS- Parameter to indicate the Unavailable 10 The acceptable values
TP (24hr) Seconds (UAS) in the regenerator range from 0 to
section. 65535.

103
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Delete TCA Profile of a PDH Port


To delete TCA profile of a PDH port,

1. Click Configuration > Facilities > E1 in the Navigation menu.


2. Click E1 in the sub menu. The E1 Interface configuration preview pane is displayed.
3. Click the desired E1 port. The Provision interface preview pane for E1 port is displayed.
4. Click the View TCA Profiles link. The View TCA Profile preview pane is displayed.
5. Select the check box in the Delete column for the TCA Profile to be deleted.
6. Click Delete. A confirmation preview pane is displayed.
7. Click Confirm Delete. A "Successfully Deleted" message is displayed. The Selected TCA
profile of a PDH port is deleted.

Provisioning Ethernet Interface


To provision Ethernet interface,

1. Click Configuration > Facilities > Ethernet in the Navigation menu. The Ethernet
Interface configuration preview pane is displayed.
2. Click the desired Ethernet port to be provisioned. The Provision Ethernet Interface Port is
displayed.
Figure 43: Provisioning Ethernet Interface Port

3. Select or enter values referring to the parameters for Ethernet interface table.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

104
Chapter 8 Working with Configuration Menu

Table 42: Parameters For Ethernet Interface

Parameter Description Default Value Acceptable Values


Admin Status Functional state of the port. Down  Up
 Up: The port is functional and  Down
forwards traffic
 Down: The port is not
functional and cannot forward
traffic
Alarm Reporting Reporting status of alarms raised on Report  Report
Status the port.  No-Report
 Report: Alarms raised on the
port are reported.
 No-Report: Alarms raised on the
port are not reported.
Link Status Status of links originating from the -- --
port. The field is not configurable.
 Up: The link is up and is capable
of forwarding traffic.
 Down: The link is down and is
not capable of forwarding traffic
MTU (Bytes) Maximum size of a packet that can 9616 Acceptable values are
be sent through the interface. 64 to 9616
Auto-Negotiation Indicates if information on traffic Enable  Enable
speed, communication mode etc is  Disable
shared while establishing a link
between the ports.
 Enable: Information on traffic
speed, communication mode,
etc., is shared while establishing a
link.
 Disable: Information on traffic
speed, communication mode,
etc., is not shared while
establishing a link.
Flow Control Allows the user to select the type of Manual Tx-Rx  Manual Disable
flow control on the Ethernet port.  Manual Tx-Rx
 Manual Tx Only
 Manual Rx Only
(Not Supported)
 Advertize None
 Advertize Both
 Advertize Sym
 Advertize Asym

105
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Values


SyncE Transmit Allows the user to enable or disable Disable  Enable
Capability SyncE frame transmit capability on  Disable
the port.
Auto-Negotiation The status of auto-negotiation with Complete --
Status the link partner.
Link Partner The capabilities of the link partner. -- --
Capabilities

NOTE: Auto negotiation Status, Link Partner Capabilities and Link Partner Flow Control
parameters are available only if Auto Negotiation is set to enable.

Medium Type Ethernet port type 100 Base-TX --


Alphanumeric
LAN Circuit
Ethernet port name. -- characters. This field
Identifier
can be left blank.
Allows you to click the link, view and
Laser -- --
edit the required details.
Allows you to select the mode.
 None
Port Conf Mode NOTE: This is applicable only None  OTU_2e
for 10G ports.  XGE_WAN

Allows you to enable or disable the  Enable


Link Integrity Enable
link integrity on Ethernet interface.  Disable
Sets the duration in seconds for
triggering Link Integrity. When a link
LinkFailureTimer
error occurs, the alarm is 03 00 to 05
Value
automatically triggered after the set
duration.
Select the required value:
 Disable: Disables threshold level
for TCA- 15min/1-day
Threshold Enable  Default Profile: The default  Disable
for 15min/1-Day TCA profile is assigned. Disable
Interval  Default Profile
NOTE: Default Profile option
can be used to create and
assign new profiles.

NOTE: The parameters Link Integrity, LinkFailureTimerValue, Link Integrity Status and
Threshold Enable for 15min/1-Day Interval are applicable for CEL card.

106
Chapter 8 Working with Configuration Menu

Provisioning VCG Interface


To provision the VCG interface,

1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
Figure 44: Provisioning VCG Interface

3. Select/Enter values referring to Provisioning VCG Parameters table.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

107
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 43: Provisioning VCG parameters

Parameter Description Default Value Acceptable Value


Admin Status The administrative status of the PDH port. Down  Up
 Up: Sets the port in service.  Down
 Down: Sets the port out of service.
Alarm The alarm reporting status of the PDH port. Report  Report
Reporting  Report: Reports alarms raised on the  No-Report
Status port.
 No-Report: Alarms raised at the port are
not reported.
Alarm Reporting status for VCG is
provisionable for ELAN card only.
LCAS Support LCAS support on the VCG port. Enable  Enable
 Enable: Traffic is not disrupted when a  Disable
cross-connect in one of the node is not
functional.
 Disable: The entire VCG port goes down
when a single cross-connect in the port is
not functional.
Framing Type The framing standards for Ethernet over GFP-F GFP-F
SDH as chosen while configuring the ETH
card.
Maximum The maximum difference delay allowed. 63ms --
Differential
Delay (ms)
CRC Type The CRC type. The field is not configurable. CRC-32 --
 CRC-16: Configures VCG for CRC-16
type.
 CRC-32: Configures VCG for CRC-32
type.
VCAT Indicates if the VC Group is provisioned to Enable  Enable
enable or disable virtual concatenation  Disable
(VCAT).
 Enable: VCAT is enabled.
 Disable: VCAT is disabled.
Operating Granularity of the signals as chosen while VC-12/VT2  VC-12/VT2
Granularity configuring the card.  VC-3/STS-1
 VC-4/STS-3c
Payload FCS Adds FCS. Enable  Enable
 Enable: Allows the addition of the  Disable
payload FCS as specified in GFP.
 Disable: Does not allow the addition of
payload FCS as specified in GFP.

108
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Value

NOTE: It is recommended to keep the


Payload FCS enabled.

Remove Removes channels with SD from VCAT. Disable --


channels with  Enable: Channels are removed from a
SD VCAT group when there is a signal
degrade on any of the TUs related to the
channels.
 Disable: Channels are not removed from
a VCAT group when there is a signal
degrade on any of the TUs related to the
channels.

NOTE: Remove Channels with SD is


applicable for TP01 cards only.

VCG Circuit The identifier for the VCG. Tejas Networks Alphanumeric
Identifier characters. This field
can be left blank.
Threshold Performance monitoring thresholds for 15 Disable  Disable
Enable for minute or 1 day interval.  Default Profile
15min/1-Day
Interval
Number of The number of channels configured for the 0 (0 Mbps)
--
Channels group. Parameter not configurable.
Ignore RDI in Ignores the extra RDI generated by Ethernet Disable  Enable
LFE cards in a uni-directional protection scheme.  Disable

Remove Removes channels with high differential Disable --


Channel with delay.
MND

Adding a Virtual Container (VC) to VCG


To add a VC/VT to VCG,

1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The corresponding Provisioning VCG Interface preview pane is
displayed.

109
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

3. Click Add new VC link. The Add VC/VT to VCG preview pane is displayed.
Figure 45: Add VC to VCG

4. Select or enter the values.


5. Click Submit. A confirmation prompt is displayed.
6. Click Yes. A “Successfully Created” message is displayed.

110
Chapter 8 Working with Configuration Menu

Table 44: Add VC/VT to VCG

Parameter Description Default Value Acceptable Value


Number of The number of cross-connects that 1 --
Connections need to be created.
CrossConnect Parameters
Circuit Identifier The name given for the cross-connect. Tejas Networks Up to 40
alphanumeric
characters including
space and special
characters.
Working Port The port on the working channel. -- --
Protection Port The port on the protection channel. -- --
Source Node ID Displays the Node ID from where the -- --
traffic enters in a ring.
Destination Node Displays the Node ID from where the -- --
ID traffic exits in a ring.
Reversion Mode The reversion mode for the channel Revertive  Revertive
(revertive or Non-revertive).  Non-Revertive
WTR Time The wait time (in minutes) before -- --
switching traffic back to work port
from protect port, after the fault in
work port is rectified. Only
provisionable in revertive mode.

NOTE: The protection feature can be configured to function in the revertive mode, to enable
reversion of traffic from the protect fiber to the working fiber. This happens after a specified
time (wait to restore time).

Viewing VC/VT Group


To view VC/VT group,

1. Click Configuration > Facilities > VCG. The VCG Interface Configuration page is displayed.
2. Click the desired VCG. The Provisioning VCG Interface page is displayed.

111
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

3. Click View VC/VT Group. The View VC/VT Group page is displayed.
Figure 46: View VC Group

Figure 47: VCG to VCG Cross connect

112
Chapter 8 Working with Configuration Menu

Table 45: VC/VT parameters

Parameter Default Value Description


Delete - Allows you to delete the selected VC/VT group.
LCAS Remove - Allows you to remove LCAS for the selected VC/VT group.
LCAS Add - Allows you to add LCAS for the selected VC/VT group.
Circuit Identifier Tejas Networks The name assigned to the VCG.

Source - The VCG port selected as Source.


Destination - The VCG port selected as Destination.
Capacity - The rate of the VCG association.
Directionality - The direction (2WAY or 1WAY) of data flow in the VCG
association.
Operational Status - The operating status (working/down) of the channel.

Source Protection Status - The status of the source port (work or protect).

Destination Protection -
The status of the destination port (work or protect).
Status
Destination Protection - The STM/OCn channel (i.e., VCG, TU/VT values selected
for the STM/OCn port) to which the destination switches
on failure.
Working Port - The port on the working channel.
Protection Port - The port on the protection channel.
Revertive Revertive The reversion mode for the channel (revertive or Non-
revertive)
WTR - The WTR value for the channel. Only provisionable in
revertive mode
Tx Control - Transmitted LCAS control value on the associated Tx
channel.
Tx Channel MST - The transmitting member channel status.
Tx Seq - The transmitting member sequence number
Rx Control - The received LCAS control value on the associated Rx
channel.
Rx Channel MST - The receiving member channel status.
Rx Seq - The receiving member sequence number.
Channel Removed The reason for removing the channel.
-
Reason
Edit LCAS - Allows you to click the link and edit the LCAS parameters.
Edit Protection - Allows you to click the link and edit VCG Association.

113
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Adding and Removing LCAS in Bulk


To add and remove LCAS,

1. Click Configuration > Facilities > VCG in the navigation menu.


2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview
pane is displayed.
3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
4. Click View VC/VT Group. The View VC/VT Group preview pane is displayed.
5. Select the option "LCAS Add" (to add the LCAS) or "LCAS Remove" (to remove the LCAS)
from the drop-down menu.
6. Click Select All to select all the VC/VT Group list.
7. Click Submit. A confirmation message is displayed.
8. Click Yes. The selected LCAS is added or removed.

Deleting Channels
To delete the channels,

1. Click Configuration > Facilities > VCG in the navigation menu.


2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview
pane is displayed.
3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
4. Click View VC/VT Group. The View VC/VT Group preview pane is displayed.
5. Select the option "Delete Channels" from the drop-down menu.
6. Click Select All to select all the VC/VT Group list.
7. Click Submit. A confirmation message is displayed.
8. Click Yes. The selected cross-connects are deleted.

Viewing Diff Delays for a VCG Port


To view Diff Delays for the selected a VCG port,

1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface pane is displayed.

114
Chapter 8 Working with Configuration Menu

3. Click View Diff Delays. View Diff Delays page is displayed.


Figure 48: View DiffDelays

Table 46: View Diff Delays parameters

Parameter Description
Destination The VCG port selected as Destination.
Capacity The rate of the VCG association.
Operational Status The operating status (working/down) of the channel.
Destination Protection
The status of the destination port (work or protect).
Status
Destination Protection The STM/OC channel (i.e., VCG, TU/VT values selected for the STM/OC
port) to which the destination switches on failure.
Diff Delay msec Differential Delays in milliseconds.
Tx Control Transmitted LCAS control value on the associated Tx channel.
Tx Channel MST The transmitting member channel status.
Tx Seq The transmitting member sequence number
Rx Control The received LCAS control value on the associated Rx channel.
Rx Channel MST The receiving member channel status.
Rx Seq The receiving member sequence number

115
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Provisioning LCAS
LCAS feature allows the adjustment of data capacity in real time without loss of data. It can be
defined as an adjustment scheme that increases or decreases the capacity of a container that is
transported SDH network using VC/VT.

To provision LCAS,

1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
3. Click View VC/VT Group. The View VC/VT Group preview pane is displayed.
4. Click the LCAS link in the edit LCAS column for the VC/VT you want to edit. The
corresponding Provisioning VCG Association preview pane is displayed.
Figure 49: LCAS Provisioning

5. Select Add for Transmit LCAS provision to enable the LCAS support. Select Remove for
Transmit LCAS provision to disable LCAS support.
6. Click Submit. A confirmation preview pane is displayed.
7. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.

116
Chapter 8 Working with Configuration Menu

NOTE: LCAS support needs to be enabled or disabled at both the transmitter and receiver.

Table 47: LCAS parameters

Parameter Description
VCG The name of the VC/VT Group to which the channel is associated.
Status The status of the channel as either up or down.
Direction The direction of VC/VT on VCG.
Transmit LCAS Provision Parameter to provision LCAS.
 Add: Allows sending the data on a particular channel which is already
part of the VCG.
 Remove: Disables sending the data on a particular channel which is
already part of the VCG.
Transmit Sequence number Displays the transmit sequence number.
Receive sequence number Displays the received sequence number.
Differential Delay
Displays the differential delay.
(Milliseconds)
Tx CTRL (Tx Channel) The Transmitted LCAS control value on the associated Tx channel.
Rx MST (Tx Channel) Displays the receive MST value for the transmit channel.
Rx CTRL (Rx Channel) The Received LCAS control value on the associated Rx channel.
Tx MST (Rx Channel) Displays the transmit MST value for the receive channel.

Deleting VC/VT from VCG


To delete a VC/VT from VCG,
1. Click Configuration > Facilities > VCG. The VCG Interface Configuration page is displayed.
2. Click the desired VCG. The Provisioning VCG interface page is displayed.
3. Click View VC/VT Group. The View VC/VT Group page is displayed.
4. Select the check box in the Delete column, for the VCG to be deleted.
5. Click Submit. An alert is displayed prompting you to confirmation the operation.
6. Click Confirm Delete. A “Successfully Deleted” message is displayed.
The recommended procedure for deleting VC/VT from VCG is,
a) Remove from LCAS at near end.
b) Remove from LCAS at far end.
c) Delete from near end and far end.

117
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Managing NE Adjacency
The NE Adjacency feature gives the information of neighbors immediate to the network
element. The Neighbor information provides the name of the physical device, address, router ID
and the status of the neighboring network elements. Auto-discovery is enabled on a port of the
network element and discovers the next hop neighbors. This feature eliminates the need to
manually create trunks on the nodes.

Enable Auto-Discovery for STM/OC Port


To enable auto-discovery for STM/OC port,

1. Click Configuration > NE adjacency > Auto-Discovery. The Auto-Discovery configuration


preview pane is displayed.
2. Click on the desired STM/OC-N port. The Auto-Discovery configuration preview pane is
displayed.
Figure 50: Enabling Auto-Discovery

3. Select to enable or disable the Auto Discovery Status for the port and its containers.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

118
Chapter 8 Working with Configuration Menu

Viewing Neighbour Information


To view neighbour information, click Configuration > NE adjacency > Neighbour
information. The Neighbour information preview pane is displayed.

Figure 51: Viewing Neighbor Information

119
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 48: Neighbor Information parameters

Parameter Description Default Value Acceptable Values


Trunk Name The trunk name. -- --
Operational Status The operational status of the trunk. -- --
Local IP Address The IP address of the local network The IP address 1-1
element. For example, for STM/OC- assigned to the
1-2
N and AU4/STS-3c. network element
1-3
1-4
Local Endpoint The STM/OC port number on the -- 255.255.255.254
network element.
AUG-AU The values for the Aggregate units at 0-0 1 to 1
the STM level. For example, for
1 to 2
STM/OC-N and AU4/STS-3c.
1 to 3
1 to 4
Remote IP The IP address of the remote network -- 0.0.0.0 to
Address element. 255.255.255.254
Remote Endpoint The STM/OC port number on the -- --
remote network element.
AUG-AU The Aggregate units at the STM/OC 0-0 --
level at the remote network element.
Capacity The trunk capacity. -- --
Command Command to add or delete a trunk. -- --

Provisioning Trunks Manually


Trunks are automatically created when Auto-Discovery is enabled on the port. Trunks can be
created manually in the Neighbour information preview pane.

To provision trunks manually,

1. Click Configuration > NE adjacency > Neighbour information in the Navigation menu.
The Neighbour information preview pane is displayed.

120
Chapter 8 Working with Configuration Menu

2. Click on the desired trunk. Edit Trunk page is displayed.


Figure 52: Manually Configuring Trunks

3. Enter values by referring to the table below.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The
trunks are provisioned manually.

Managing DCN
DCN is an ECC (Embedded Communication Channel) on the network element.

121
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing the Network Interfaces


To view provisioned network interfaces, click Configuration > DCN > Network interface. The
Network interface configuration preview pane gives details on the existing network interfaces.

Table 49: Network Interface Configuration parameters

Parameter Description
Edit Editing the respective interface.
Association The network interface name as used by the operating system.
Network interface The label of the interface.
short name
The administrative status of the interface.
Admin status  Up: Sets the port in service.
 Down: Sets the port out of service.
Layer 3 Protocol The Layer 3 protocol used for the interface.
Layer 2 Protocol The Layer 2 Protocol is MAC and is not editable.
Routing Protocol The routing protocol used for the interface.
IP Address The IP address of the interface.
MTU The maximum size of the packet that can be sent through the interface.
Handoff Interface Route IP address of the local machine.
Mgmt Vlan The interface on the remote node in the chassis-slot-port number format. This is
not applicable.
Delete Deleting the network interface.

Editing Network Interfaces


To edit network interfaces,

1. Click Configuration > DCN > Network interface. The Network interface configuration
preview pane is displayed.

122
Chapter 8 Working with Configuration Menu

2. Click the Edit link in the Edit column for the entry to be updated. The Edit Network
Interface Provisioning preview pane is displayed.

Figure 53: Edit Network Interface Provisioning

3. Edit required values referring to Network Interface Parameters table.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

123
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 50: Edit Network Interface Parameters

Parameter Description Default Value Acceptable Values


Network interface The label of the interface. -- --
short name
Association The network interface name as used -- --
by the operating system.
Admin status The administrative status of the Up  Up
interface.  Down
 Up: Sets the port in service.
 Down: Sets the port out of
service.
Layer 3
Layer 3 Protocol The Layer 3 protocol used for the -- --
interface.
MTU (Includes 8 The maximum size of the packet that 1500 248 to 1518
byte PPP header, can be sent through the interface.
example
MTU=1518
means IP
MTU=1510 and
PPP Header=8)
Layer 2
Layer2 Protocol The Layer 2 protocol used for the PPP, HDLC Framing  PPP, HDLC
interface. Framing
 Standard PPP,
RFC 1661
Magic Number Magic number is editable only when Enable  Enable
Standard PPP, RFC 1661 is selected  Disable
for Layer 2 Protocol. Magic number is
not applicable for LAN.
 Enable: The network element
distinguishes the packets received
from other network elements
from the packets received from
itself during loopback.
 Disable: The network element
cannot distinguish the packets
received from other network
elements from packets received
from itself.
32 Bit CRC Check A CRC of 32 bits provides more Enable  Enable
powerful error detection.  Disable

124
Chapter 8 Working with Configuration Menu

Parameter Description Default Value Acceptable Values


IPCP Address Select the required value from the list. Disable  Enable
Negotiation This option is visible only when the  Disable
value for Layer2 Protocol is selected
as Standard PPP, RFC 1661.
OSPF
OSPF Parameter to enable or disable OSPF. Enable  Enable
 Enable: Enables OSPF on the  Disable
network element.
 Disable: Disables OSPF on the
network element.
Hello Interval The time interval after which the 10 1 to 65535
(sec) network element sends Hello
messages. The Router Dead Interval
should be an integral multiple of Hello
Interval.
Router Dead The maximum time duration for 40 --
Interval (sec) which the network element waits for
response for the hello packet sent by
it to the neighboring network element.
OSPF Applicable only when Simple -- up to 8 alphanumeric
Authentication password is selected for OSPF characters
Password/Key Authentication mode.
OSPF  Disable Authentication: The Disable  Disable
Authentication hello packets received are not Authentication Authentication
Mode authenticated.  Simple Password
 Simple Password: The hello
packets received are authenticated
against the password or key
provisioned in the network
element.
Area Id Displays the identity of set of -- --
networks grouped together by the
OSPF.
OSPF Cost Allows you to enter the default cost -- --
on an OSPF interface.

Provisioning/Editing Embedded Communication Channel


To provision or edit Embedded Communication Channels,

1. Click Configuration > DCN > Network interface. The Network interface configuration
preview pane is displayed.

125
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click Provision ECC. The Provision ECC page is displayed.


Figure 54: Provisioning ECC

3. Select or enter values referring to the Provision ECC Page Parameters table.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A success message is displayed.
Table 51: Provision ECC Page Parameters

Parameter Description Default Value Acceptable Values

Port The port used for the ECC. STM-1/4/16/OC- STM-1/4/16/OC-


3/12/48-1-N-1 3/12/48-1-N-1
ECC Byte The byte used for the ecc_disable  ecc_disable
Selection embedded communication  ecc_DCC_R
channel.
 ecc_DCC_M
ECC Path The AU/STS-n over which AU4/STS3c-1-N-1 AU4/STS3c-1-N-1
the ECC is carried.

126
Chapter 8 Working with Configuration Menu

View Static Routes


Static route is an entry in network element routing table that specifies how to reach an IP address
through a particular gateway (network element or Interface). Static routes are used to provide
static connectivity between routers, meaning the routes do not change automatically unlike
routing protocols. A static route allows the user to access a network element in any network. The
user can do this by adding a destination network IP address and the IP address of next hop
network element. Thus, a user can establish a link.

To view provisioned static routes, click Configuration > DCN > Static route. The Static routes
configuration preview pane is displayed.

Figure 55: Static routes configuration

127
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

The table below describes Static route parameters and their default value.

Table 52: Static routes configuration parameters

Parameter Description
Client Type Displays the client type.

Destination Network IP The IP Address of the destination.


Address
Destination network address The Netmask (in number of bits) to be applied to Destination Network
Mask Length IP Address to determine the network for which this route is added.
Next hop The IP address of the next hop element.
Advertise route Parameter to enable or disable advertising the route. If enabled, the
route is advertised to the neighboring network element.
Network Interface Name The name of the network interface for which the static route is added.
This field is not configurable.
Operational Status The status of the static route.
Delete Deleting the static route.

Add Static Routes


To add the same static route on the Remote NE, which is present on any other node in the
network and advertised with OSPF, make the route advertised so that OSPF can manage the
routing table properly.

To add a static route,

1. Click Configuration > DCN > Static route. The Static routes configuration preview pane is
displayed.

128
Chapter 8 Working with Configuration Menu

2. Click Add a new Static Route. The Creating Static Route is displayed.
Figure 56: Creating Static Route

3. Select or enter values referring to the Static Route Parameters table.


4. Click Submit. A "Successfully Created" message is displayed. The static route is added.

129
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

NOTE: Any invalid static route added on a point-to-point interface is added in the WUI but is
not added in the Kernel routing table.

NOTE: Any invalid static route added on a broadcast interface (eth) is blocked.

NOTE: The Next Hop IP Address has to be specified only when the static route is
provisioned on eth0. If it is ECC interface, the Next Hop IP Address need not be specified. If
the address is not specified or is invalid for eth0 interface, an error message is displayed on
submit.

Table 53: Creating Static Route Parameters

Parameter Description Default Value Acceptable Value


Network Interface The name of the network interface for LAN-1-6 (eth0)  LAN-1-6 (eth0)
name which the static route is added. This  ETH-1-NM,
field is not configurable. Where N is the
slot number
which can have
values 1, 2, 3, 4,
5, or 6. M is the
port number.
Destination The IP Address of the destination. -- 0.0.0.0 to
Network IP 255.255.255.254
Address
Destination The Netmask (in number of bits) to -- 0 to 32 characters
network address be applied to Destination Network IP
Mask Length Address to determine the network for
which this route is added.

Next hop or Next The IP address of the next hop -- 0.0.0.0 to


hop IP Address element. 255.255.255.254

Advertise route Parameter to enable or disable Disable  Disable


advertising the route. If enabled, the  Enable
route is advertised to the neighboring
network element.

130
Chapter 8 Working with Configuration Menu

Deleting a Static Route


To delete a static route,

1. Click Configuration > DCN > Static Route. The Static routes configuration preview pane is
displayed.
2. Select the check box in the Delete field for the static route to be deleted.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed. The static route is
deleted.

NOTE: If your PC and the network element is in a different subnetwork, communication will
be lost as a result of deleting the static route on the LAN interface.

Managing Proxy ARP Neighbour


The Proxy ARP allows a gateway network element to respond to Address Resolution Protocol
(ARP) requests for sub tending network elements that are within the same subnetwork as the
customer DCN address range. The proxy ARP feature removes the need for customers to
provision static routes on their routers and routing protocols (OSPF) between the gateway
network elements and the customer DCN.

NOTE: The user has to manually add all the IP addresses of the network elements for which
the Tejas network element has to respond. The Tejas network element sends a proxy ARP
response for all ARP requests that contain the IP address of an added network element
(regardless of whether that IP address is reachable or not from the Tejas network element).

The network element software supports viewing and adding of proxy ARP neighbors.

Using Proxy ARP Neighbours menu, you can


 View all the proxy ARP neighbours
 Add new proxy ARP neighbours
 Delete proxy ARP neighbours

Add a Proxy ARP Neighbour


To provision proxy ARP neighbour,

1. Click Configuration > DCN > Proxy ARP Neighbour. The Proxy ARP Neighbours
configuration preview pane is displayed.

131
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click Add a new Proxy ARP Neighbour. The Creating Proxy ARP Neighbour is displayed.
Figure 57: Creating Proxy ARP Neighbour

3. Select or enter values referring to Creating Proxy ARP Neighbour Parameters table.
4. Click Submit. A "Successfully Created" message is displayed. The proxy ARP neighbor is
added.
Table 54: Creating Proxy ARP Neighbour Parameters

Parameter Description Default Value Acceptable Value


Destination The IP address of the destination -- Any valid IP address
Network IP network. of a network element
Address in the same subnet
that is reachable from
the gateway network
element.
Network Interface The interface of the neighboring LAN-1-6 (Eth0) LAN-1-6 (Eth0)
network element. LAN-1-6 (Eth0) is
the currently supported interface.

NOTE: The maximum number of Proxy Address Resolution Protocol (ARP) neighbors in the
network element is 14. Ensure that the router ARP timers are set to less than 10 minutes to
limit the DCN outage to 10 minutes.

Delete Proxy ARP Neighbour


To delete proxy ARP neighbour,
1. Click Configuration > DCN > Proxy ARP Neighbour. The Proxy ARP Neighbours
configuration preview pane is displayed.
2. In the delete field, select the check box for the entries to be deleted.
3. Click Submit. A confirmation preview pane is displayed.

132
Chapter 8 Working with Configuration Menu

4. Click Confirm Delete. A "Successfully Deleted" message is displayed. The selected proxy
ARP neighbor is deleted.

NOTE: In the absence of static route, deleting Proxy ARP neighbours will result in loss of
communication to the remote network elements.

Configure OSPF Area

NOTE: OSPF Area cannot be changed.

To configure OSPF area,

1. Click Configuration > DCN > OSPF > Area. The OSPF Area configuration preview pane is
displayed.
2. Click Add a new OSPF Area. The Creating OSPF Area preview pane is displayed.
Figure 58: Creating OSPF Area

3. Enter relevant value for the Area text field.


4. Click Submit. A confirmation message is displayed.
5. Click Yes. A "Successfully Created" message is displayed. The OSPF area is configured with
the required value.

NOTE: The default OSPF area 0.0.0.1 is the area address of the backbone.

Disabling OSPF
To disable OSPF area,

1. Click Configuration > DCN > Network Interface in the Navigation menu. The Network
interface configuration preview pane is displayed.

133
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click the edit link for the interface you want to edit. The Edit Network Interface Provisioning
preview pane is displayed.
Figure 59: Edit Network interface provisioning

3. Select Disable for OSPF.


4. Click Submit. A success message is displayed.

CAUTION: Changing OSPF area may cause a loss of communication to the network
element.

134
Chapter 8 Working with Configuration Menu

View Serial Port Information


Serial port enables serial communication between two network elements. Once properly
configured, the serial port can send and receive data. The network element utilizes the serial port
as:
 User Data Channel (UDC)
 Point-to-Point Protocol (PPP), or
 Terminal Server network.
For UDC application, overhead byte F1 is used for data communication purpose. Serial
communication requires that you specify the transmission baud rate and application. PPP is used
for modem application. The modem facility provides a serial point-to-point connectivity using
PPP protocol and is terminated on IP. Terminal server helps in connecting to a remote node
using telnet in the absence of DiagUser provision in the network element.

To view serial port information, click Configuration > DCN > Serial port. The Serial port
configuration preview pane is displayed.

Figure 60: Serial port configuration

135
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 55: View Serial port

Parameter Description
Port Serial port nomenclature.
Application The application running on the serial interface.
Baud Rate The operating rate of serial interface.
Admin Status The administrative status of the Serial port.
 Up: The port is in service
 Down: The port is out of service.
Edit  Edit the serial port configuration.

Edit Serial Port


To edit serial port,

1. Click Configuration > DCN > Serial port. The Serial port configuration preview pane is
displayed.
2. Click the edit link in the Edit column for the port to be updated. The Serial port configuration
preview pane is displayed.
Figure 61: Serial port configuration

3. Edit required values referring to the Serial Port Configuration Parameters table.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The
serial port is edited with the required values.

136
Chapter 8 Working with Configuration Menu

Table 56: Serial Port Configuration Parameters

Parameter Description Default Value Acceptable Value


Application The application running on the serial Select Application  Select Application
interface.  terminal_server
 login
 ppp
 udc
Baud Rate The operating rate of serial interface. 9600  9600
 19200
 38400
 57600
 Not applicable
Admin Status The administrative status of the Serial Down  Up
port.  Down
 Up: The port is in service
 Down: The port is out of
service.
Terminal Server Parameters
TCP Port The address of the TCP Port. -- --
Timeout The timeout interval 0
Login Parameters
IP Address The IP address of the network -- --
element.
PPP Parameters (Point to Point)
IP Address The IP address of the network IP address of the User can configure
element. network element any IP address
Max Receive Unit The maximum data unit that can be 1500 128 to 1500.
received.
Max Transmit The maximum data unit that can be 1280 1280 to 1500.
Unit transmitted.
UDC Parameters (User Data Channel)
Overhead Byte The overhead byte used for serial port F1 F1
communication.
STM Port The STM port used for the serial port. STM-1/4/16/OC- STM-1/4/16/OC-
3/12/48-1-N-1 3/12/48-1-N-M,
Where N is the slot
number and M is the
port number.

137
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


AUG The AUG involved in the serial port AUG/STS3-1-N-1-1 AUG/STS3-1-N-M-
communication. O, Where N is the slot
number, M is the port
number and O is
AUG number.
AU The AU involved in the serial port AU4/STS3c-1-N-1- AU4/STS-3c-1-N-M-
communication. 1-1 O-1, Where N is the
slot number, M is the
port number and O is
Aug number.

NOTE: The AUG and AU fields are editable only if the F2 byte is selected for the Overhead
byte.

Synchronizing Network Element


The Synchronization feature provides the timing and synchronization management functionality
for the network element.

Editing the Synchronization Status


The Synchronization state preview pane displays the synchronization state of the network
element. The SSM timing alarms are displayed in the lower portion of the Synchronization status
preview pane. The SSM timing alarms are automatically refreshed for every two seconds.

To view or edit the synchronization status,

1. Click Configuration > Synchronization > Synchronization Status. The Synchronization


State page is displayed.
2. Enter or select values and click Submit. A confirmation message is displayed.
3. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

138
Chapter 8 Working with Configuration Menu

Table 57: Synchronization state parameters

Parameter Description Default Value Acceptable Value


QL Mode The clock selection. Disabled  Enabled
 Disabled: The clock is selected  Disabled
based on the priority assigned.
 Enabled: The clock is selected
based on its quality and priority.
Output QL Mode Quality of the clock output. Manual  Auto
 Auto: The output clock is the  Manual
same as the source clock that is
locked, provided QL Mode is
enabled.
 Manual: Quality of output clock
can be set manually.
Manual should be selected for Output
QL mode when QL Mode is disabled.
Reversion Mode Clock switch mode in case of failure. Manual  Auto
 Auto: The switching of the clock  Manual
happens automatically.
 Manual: The switching of the
clock has to be selected manually.
WTR Time The time the clock takes to switch to 5 0 to 12 minutes
(minutes) previously locked clock when it is
restored from failure. Changes made
to the WTR will not affect clocks that
are already in WTR. The changes to
the clocks will be applied on the next
switch.
Node output The output quality level expected by PRC  PRC
quality level the network element to lock to a  SSU_A
particular clock. If the clock does not
have the QL as expected, then the  SSU_B
BITS clock output will be squelched.  EEC1
 DNU
 INVALID
Node minimum The minimum quality level expected EEC1  PRC
quality level by the network element to lock to a  SSU_A
particular clock. If the clock does not
have the QL as expected, then the  SSU_B
BITS clock output will be squelched.  EEC1
 DNU
 INVALID
Output quality The actual value for the Quality of EEC1
level clock output. This field is not --
configurable.

139
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value


SETG Status The status of the PLL within the Hold Over
network elements synchronization --
module.
Selected Clock The clock source being used. This
Internal --
Source field is not configurable.
External Request External requests (forced switch, No Request
on Selected manual switch), if any on the clock --
source source.

NOTE 1: Changes made to the WTR will not impact clocks that are already in WTR. The
changes to the clocks will be applied on the next switch.

NOTE 2: For FTU20R2 card, the following are applicable:

BITSIN-1-10-1 - 2 Mz Clock in SDH mode, and 1.544 MBits Data in SONET

BITSIN-1-10-2 - 2 MBits data in SDH mode, and 1.544 MBits Data in SONET

NOTE 3: For FTU20R1 card, the following are applicable:

BITSIN-1-10-1 - 2 Mz Clock in SDH mode, not used in SONET

BITSIN-1-10-2 - 2 MBits data in SDH mode, and 1.544 MBits Data in SONET

Nominating Timing Reference


To nominate a timing reference,

1. Click Configuration > Synchronization > Nominate Timing Reference. The Nominate
timing references page is displayed.

Figure 62: Nominating Timing References

140
Chapter 8 Working with Configuration Menu

2. Select the required values and click Submit. A "Successfully Created" message is displayed.
The timing reference is nominated.

NOTE: A maximum of eight clocks can be nominated for a network element.

141
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

View Selected Timing References


To view selected timing references, click Configuration > Synchronization > View Nominated
Timing References. The View nominated timing reference preview pane is displayed.

The View nominated timing references preview pane lists all the nominated timing references.
The clock source tagged with an asterisk is the current active source.

Table 58: Nominated timing reference parameters

Parameter Description Default Value Acceptable Values

Current Source Parameter to indicate if the clock -- --


source is the current source. The clock
source tagged with an asterisk is the
current active source.
Clock Source The nominated clock
The nominated clock source.
source
Priority The priority assigned to the clock 0 The acceptable values
source. include 0 - 8.
Quality Level The quality of the timing reference to DNU
which the node is locked.
Clock Status The availability status of the clock Normal  Normal
source as one of the following.  Signal Fail
 Normal: The nominated clock is  Admin down
functioning normally.
 Oper down
 Signal Fail: No signal is being
received from the nominated
clock source.
 Admin down: The clock source is
made out of service.
 Oper down: The clock is not
available for synchronization.
Lockout Request Parameter to exclude or include the Off  On
clock source from selection.  Off
 On: Excludes the clock source
from selection.
 Off: The clock source is available
for selection.
Delete Delete the respective clock source. -- --

Clear Non Reversion mode


To clear NonReversion mode,

1. Click Configuration > Synchronization > View Nominated Timing References. The View
nominated timing references page is displayed.

142
Chapter 8 Working with Configuration Menu

2. Click the desired clock source link in the Clock Source field. The Edit ClockSel page is
displayed.
3. Click ClearNonReversion.
4. Click Submit. A success message is displayed. You have completed the procedure.

NOTE: "ClearNonReversion" button is displayed only when the clock source is nominated
with Reversion mode as Manual in Synchronization state page and there is a failure on the
nominated timing reference.

Editing Selected Timing References


To edit timing references,

1. Click Configuration > Synchronization > View Nominated timing references. The View
nominated timing references preview pane is displayed.
2. Click the Clock Source link to edit the clock source information. The View nominated timing
references preview pane is displayed.
3. Edit the required values.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Delete Nominated Timing Reference


To delete a nominated timing reference,

1. Click Configuration > Synchronization > View Nominated timing references. The View
nominated timing references preview pane is displayed.
2. In the delete field, select the check box for the clock source to be deleted. The user should
manually switch away from the timing reference source to be deleted before proceeding with
the delete command.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Yes. A "Successfully Deleted" message is displayed.

NOTE: If the network element is locked to a clock source that needs to be deleted, then
lockout the network element from the clock source before deleting the clock.

143
Chapter 9

Managing License
This chapter describes the License menu in the network element. The License menu allows you
to view or enable or disable the licensed features in the network element.

IN THIS CHAPTER
Enabling License Feature......................................................................... 145
Viewing Enabled License Features ......................................................... 146
Viewing Failed License Features ............................................................. 146

Enabling License Feature


To enable License feature,

1. Click License > Enable License Feature. The Enable License Feature page is displayed.
Figure 63: Enable License Feature

2. Enter the LIC_TPN and click Submit. An alert is displayed prompting you to confirm the
operation.
3. Click Yes. A success message is displayed.

145
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Enabled License Features


To view enabled License features, click License > View License > ENABLED License Features.
The ENABLED LICENSE FEATURES preview pane is displayed with the enabled Licensed
features.

Viewing Failed License Features


To view failed License features, click License > View License > FAILED License Features. The
FAILED LICENSE FEATURES page is displayed with the failed Licensed features.

Figure 64: Failed License Features

146
Chapter 10

Managing Faults
Fault management deals with detecting and reporting faults by the network element. Alarms are
raised to alert the user about fault conditions.

IN THIS CHAPTER
Understanding Alarms ............................................................................. 147
Viewing Active Alarms............................................................................. 148
View Suppressed Alarms.......................................................................... 150
Provision Alarm Filters ............................................................................ 150
View Alarm Filters.................................................................................... 153
Deleting Alarm Filters .............................................................................. 153
Viewing Event History............................................................................. 154
View Alarm Severity ................................................................................. 155
Setting Alarm Severity .............................................................................. 156

Understanding Alarms
Based on their severity, alarms are categorized as follows:
 Critical
 Major
 Minor
 Warnings

147
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Active Alarms


Active alarms are raised on objects (such as a card, port, cross-connect, protection group, and
trunk) when they deviate from their normal functioning. Each alarm indicates a specific type of
deviation, for example, Signal Deterioration alarm indicates that the signal received on the
receiving port is deteriorated.

The active alarms are displayed in the Active Alarms pane. The list of active alarms is refreshed
after few seconds to include the new alarms raised on any object on the network element. A
Disable Auto Refresh checkbox is provided in the Active Alarms pane to stop the automatic
refreshing of the pane.

To view active alarms, click Faults > Active Alarms in the Navigation menu. The Active alarms
page is displayed.

Figure 65: Active alarms

148
Chapter 10 Managing Faults

Table 59: Active alarms Parameters

Parameter Description
# Serial number of the alarm
Time Time when the alarm was raised according to the local time
Information Summary on the problem in the object
Severity Severity level of the alarm: Critical, Major, Minor, Warning
Object Object on which the alarm was raised.
Additional Information Displays the alarm description entered by the user while
provisioning.

NOTE: The Active alarms pane may not display the updated alarms on refreshing the Active
alarms pane in Internet Explorer versions 6.0.x on Windows XP and Windows 2000.

NOTE: To ensure display of the updated alarm list, set your browser settings as follows: On
the menu bar of your browser, click Tools > Internet Options > General. In the General
dialog box, click Settings in the Temporary Internet files section. In the Settings dialog box,
for “Check for newer versions of stored pane” select ‘Every visit to the pane’. Click OK to
close the Settings dialog box and click OK again to close the Internet dialog box.

149
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

View Suppressed Alarms


Suppressed alarms are alarms being suppressed from reporting on the active alarm page. Such
alarms are listed on the Suppressed Alarms page. The following table describes the suppressed
alarm parameters.

To view suppressed alarms, click Faults > Suppressed Alarms in the Navigation menu. The
Suppressed Alarms page is displayed.

Figure 66: Viewing Suppressed Alarms

Table 60: Suppressed Alarms Parameters

Parameter Description
# Serial number of the suppressed alarm
Time Time at which the alarm was raised
Alarm Information Suppressed alarm
Severity Severity of the suppressed alarm
Object Object on which the alarm was raised
Alarm Suppressor The reason why the alarm is being suppressed and not being reported on
the active alarms page

Provision Alarm Filters


To provision alarm filters,
1. Click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter pane is
displayed.

150
Chapter 10 Managing Faults

2. Click Provision a new Alarm Filter. The Provision New Alarm Filter pane is displayed.
Figure 67: Provisioning Alarm Filter

3. Select or enter values and click Create. An alert is displayed prompting you to confirm the
operation.
4. Click Yes. A successfully message is displayed.

151
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 61: Provision Alarm filter Parameters

Parameter Description Default Value Acceptable Value

Alarm Filter / Name given to the Alarm filter. -- Alphanumeric


Name characters
Managed Object Object to which the alarm filter is Any object on the --
applied. network element such
as the Synchronization
source, Timing
reference, the
Tributary Unit,
Arithmetic Unit,
cross-connect and so
on
Alarm / Alarm Alarm that is filtered by the Alarm All configured alarms --
Class filter. on the network
element
Type The type of the managed object. For -- --
example, if the Managed Object is
'Port', the Type is all the ports
available on the network element. If
the Managed Object is 'Card', the
Type is all the cards available on the
network element.

152
Chapter 10 Managing Faults

View Alarm Filters


Alarm Filters are objects that enable suppressing alarms on the required object such as card,
tributary unit, and protection group.

To view provisioned alarm filters, click Faults > Alarm Filters in the navigation menu. The View
Alarm Filter preview pane is displayed.

Figure 68: Viewing Alarm Filter

Table 62: View Alarm Filter parameters

Parameter Description
Alarm Filter Displays the name given to alarm filter.
Managed Object Displays the object on which alarm filter is applied.
Alarm Displays the suppressed alarm string.
Delete Check box that enables the user to delete the alarm filter provisioned.

Deleting Alarm Filters


To delete alarm filters,

1. Click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is
displayed.
2. Select the filters to be deleted in the delete field.
3. Click Delete. A confirmation page is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

153
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Event History


Event history provides information on fault management event log. To view Event history, click
Faults > Event history in the Navigation menu. The Event history pane is displayed.

Figure 69: Event history

The Next and Previous buttons displays the pane immediate to the current displayed pane. The
Show All Events link opens a new window, in which all the events are listed. The Back to
Node View link takes you to NE information pane. The Stop Refresh button, when clicked,
stops automatic refresh of the Event History pane and is displayed as Start Refresh. The Start
Refresh button when clicked starts the refresh of the Event History pane. The Last Refreshed
field indicates when the pane was refreshed last.

154
Chapter 10 Managing Faults

View Alarm Severity


Based on the severity levels, alarms are categorized as critical, major, minor, and warning based
on their severity. You can set the severity of alarms in Alarm severity page.

To view Alarm Severity, click Faults > Alarm Severity in the Navigation menu. The Alarm
Severity page is displayed.

Figure 70: Alarm severity

155
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Setting Alarm Severity


To set alarm severity,

1. Click Faults > Alarm Severity in the Navigation menu. The Alarm Severity page is displayed.
Figure 71: Alarm severity

2. In the Severity field, for the alarm whose severity is to be changed, select the desired severity
level from the drop down menu.
3. Click Submit. The page refreshes with the changes made. The field modified is indicated by
an asterisk (*). Click Reset to reject the changes. Click Restore Defaults to bring back the
alarm severity levels to default values.

156
Chapter 11

Working with Profiles


The Profiles menu provides following two types of profiles:
 STM/OC Port Profiles: define the path profiles to be applied for all Higher order/Lower
order, terminating/non-terminating cross-connects.
 Path Alarm Profiles: enable the alarm reporting control on all alarms available in the AU/STS
and TU/VT objects.
This section is not supported for this release.

IN THIS CHAPTER
Managing STM/OC Port Profiles........................................................... 157
Managing Path Alarm Profiles................................................................. 161

Managing STM/OC Port Profiles


There are two STM/OC port profiles provided by default:
 Internal NNI: The Internal NNI profile indicates preferences within EMS domains.
 External NNI: The External NNI profile indicates preferences between different management
domains.
Figure 72: View STM Port Profile

STM/OC port profile is non-provisionable, but can be customized to point to different path
profiles. The changes made will be applicable only for new connections. The existing connections
will remain unchanged.

157
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing STM/OC Port Profiles


STM port profile is non-provisionable, but can be customized to point to different path profiles.
The changes made will be applicable only for new connections. The existing connections will
remain unchanged.

To view STM Port Profiles, Click Profiles > STM Port Profile. The View STM Port Profile
preview pane is displayed.
1. Click the STM port profile provided by default:
Internal NNI: The Internal NNI profile indicates preferences within EMS
domains.
External NNI: The External NNI profile indicates preferences between different
management domains.
Figure 73: View STM Port Profiles

158
Chapter 11 Working with Profiles

Table 63: STM Port Parameters

Parameter Description

Profile Name The name assigned to the profiles.


Terminating and Displays the provisioned Path alarm profile for the PDH port terminated at
UnProtected TU Alarm the unprotected TU on the STM port.
Profile
Terminating and Displays the provisioned Path alarm profile for the PDH port terminated at
Protected TU Alarm the protected TU on the STM port.
Profile
Passthrough and Displays the provisioned Path alarm profile for the passthrough terminated at
Unprotected TU Alarm the protected TU on the STM port.
Profile
Passthrough and Displays the provisioned Path alarm profile for the passthrough terminated at
Protected TU Alarm the unprotected TU on the STM port.
Profile
Terminating and Displays the provisioned Path alarm profile for the PDH port terminated at
UnProtected AU Alarm the unprotected AU on the STM port
Profile
Terminating and Displays the provisioned Path alarm profile for the PDH port terminated at
Protected AU Alarm the protected AU on the STM port.
Profile
Passthrough and Displays the provisioned Path alarm profile for the passthrough terminated at
UnProtected AU Alarm the protected AU on the STM port.
Profile
Passthrough and Displays the provisioned Path alarm profile for the passthrough terminated at
Protected AU Alarm the unprotected AU on the STM port.
Profile

Editing STM/OC Port Profiles


To edit STM port profiles,

1. Click Profiles > STM Port Profile. The View STM Port Profile preview pane is displayed.
2. Do one of the following:
Click the View profile to be edited. Selected View profile preview pane is
displayed. Click on the Edit link
Click edit in the Edit column for the entry to be updated.

159
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

The View STM Port Profile preview pane is displayed.


Figure 74: Edit Internal External NNI

3. Edit required values and click Submit. A confirmation preview pane is displayed.
4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

160
Chapter 11 Working with Profiles

Table 64: Edit STM Port Parameters

Parameter Description Default Value Acceptable Value

Profile Name The name assigned to the profiles. -- --


Terminating and Displays the provisioned Path alarm Mask TIM  Mask TIM
UnProtected TU profile for the PDH port terminated  Suppress TIM
Alarm Profile at the unprotected TU on the STM
port.  Mask all except
LOP
Terminating and Displays the provisioned Path alarm Mask TIM  Mask all
Protected TU profile for the PDH port terminated
Alarm Profile at the protected TU on the STM port.  Mask
TIM_AND_SLM
Passthrough and Displays the provisioned Path alarm Mask all except LOP
Unprotected TU profile for the passthrough terminated
Alarm Profile at the protected TU on the STM port.
Passthrough and Displays the provisioned Path alarm Mask
Protected TU profile for the passthrough terminated TIM_AND_SLM
Alarm Profile at the unprotected TU on the STM
port.
Terminating and Displays the provisioned Path alarm Mask TIM
UnProtected AU profile for the PDH port terminated
Alarm Profile at the unprotected AU on the STM
port
Terminating and Displays the provisioned Path alarm Mask TIM
Protected AU profile for the PDH port terminated
Alarm Profile at the protected AU on the STM port.
Passthrough and Displays the provisioned Path alarm Mask all except LOP
UnProtected AU profile for the passthrough terminated
Alarm Profile at the protected AU on the STM port.
Passthrough and Displays the provisioned Path alarm Mask
Protected AU profile for the passthrough terminated TIM_AND_SLM
Alarm Profile at the unprotected AU on the STM
port.

Managing Path Alarm Profiles


The Path Alarm Profiles feature allows you to create unique alarm profiles for individual
network elements. This link enables you to provision a path alarm profile which can enable the
alarm reporting control on secondary alarms reporting at every AU/STS and TU/VT objects.

161
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Path Alarm Profiles


To view path alarm profiles, click Profiles > Path Alarm Profiles. The View Path Alarm Profile
preview pane is displayed.

Figure 75: View Path Alarm Profile

162
Chapter 11 Working with Profiles

Table 65: Path Alarm profile parameters

Parameter Description

Profile Name The name assigned to the profile.

TIM Action Displays the provisioned TIM Action settings for the profile.
 Report TIM, No Downstream AIS: Reports the TIM alarm without affecting traffic.
 Ignore TIM: No alarm is reported or traffic affecting action is taken on TIM.
 Report TIM, Downstream AIS: Reports the TIM alarm and transmits downstream
AIS so that traffic is switched.
 Suppress TIM: Reports the TIM alarm, but in the suppressed alarm page, and there
are no traffic affecting alarms.
Signal Label Displays the provisioned SLM Action settings for the profile
Mismatch  Report SLM, No Downstream AIS: On Signal Label Mismatch (SLM), PLM alarm is
Action reported, but no downstream AIS is sent.
 Ignore SLM: No action is taken on SLM.
 Downstream AIS on SLM: Reports PLM alarm and sends AIS downstream (traffic
affecting) on SLM.
 Suppress SLM: The SLM alarm is reported in the suppressed alarm page.
UNEQ Signal Displays the provisioned UNEQ Signal Label Action settings for the profile.
Label Action  Report UNEQ, No Downstream AIS: Reports the UNEQ alarm without affecting
traffic.
 Ignore UNEQ: No alarm is reported or traffic affecting action is taken on an UNEQ.
 Downstream AIS on UNEQ: Reports the UNEQ alarm and transmits downstream
AIS. Traffic is affected.
 Suppress UNEQ: Reports the UNEQ alarm in the suppressed alarm page. There is
no traffic affecting alarms.
Masked Displays this list of masked alarms.
Alarms List
or Select
Alarms for
Masking

NOTE: Default path for alarm profiles are marked with an asterisk and cannot be deleted.

Provisioning Path Alarm Profile


To provision path alarm profile,

1. Click Profiles > Path Alarm Profiles in the navigation menu. The View Path Alarm Profile is
displayed.

163
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click Provision a new Path Alarm Profile. The Provision New Path Alarm Profile is
displayed.
Figure 76: Provisioning Path Alarm Profile

3. Select or enter values and select alarms for Masking.


4. Click Create. A confirmation preview pane is displayed.
5. Click Yes. A "Successfully Created" message is displayed.

164
Chapter 11 Working with Profiles

Table 66: Provision Path Alarm Profile parameters

Parameter Description Default Value Acceptable Value

Profile Name The name assigned to the profile. -- Alphanumeric


characters
TIM Action Displays the provisioned TIM Action settings Suppress TIM  Report TIM, No
for the profile. Downstream AIS
 Report TIM, No Downstream AIS:  Ignore TIM
Reports the TIM alarm without affecting  Report TIM,
traffic. Downstream AIS
 Ignore TIM: No alarm is reported or  Suppress TIM
traffic affecting action is taken on TIM.
 Report TIM, Downstream AIS: Reports
the TIM alarm and transmits downstream
AIS so that traffic is switched.
 Suppress TIM: Reports the TIM alarm,
but in the suppressed alarm page, and
there are no traffic affecting alarms.
Signal Label Displays the provisioned SLM Action settings Report SLM,  Report SLM, No
Mismatch for the profile No downstream Downstream AIS
Action  Report SLM, No Downstream AIS: On AIS  Ignore SLM
Signal Label Mismatch (SLM), PLM alarm  Downstream AIS
is reported, but no downstream AIS is on SLM
sent.
 Suppress SLM
 Ignore SLM: No action is taken on SLM.
 Downstream AIS on SLM: Reports PLM
alarm and sends AIS downstream (traffic
affecting) on SLM.
 Suppress SLM: The SLM alarm is
reported in the suppressed alarm page.
UNEQ Signal Displays the provisioned UNEQ Signal Label Report UNEQ,  Report UNEQ,
Label Action Action settings for the profile. No downstream No Downstream
AIS AIS
 Report UNEQ, No Downstream AIS:
Reports the UNEQ alarm without  Ignore UNEQ
affecting traffic.  Downstream AIS
 Ignore UNEQ: No alarm is reported or on UNEQ
traffic affecting action is taken on an  Suppress UNEQ
UNEQ.
 Downstream AIS on UNEQ: Reports the
UNEQ alarm and transmits downstream
AIS. Traffic is affected.
 Suppress UNEQ: Reports the UNEQ
alarm in the suppressed alarm page. There
is no traffic affecting alarms.
Masked Displays this list of masked alarms. --  Alarm Indication
Alarms List Signal
or Select

165
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description Default Value Acceptable Value

Alarms for  Remote Defect


Masking Indication
 Loss Of Pointer
 Signal Degrade
 Signal Fail

NOTE: Default path for alarm profiles are indicated with an asterisk and cannot be deleted.

Deleting Path Alarm Profile


To delete path alarm profiles:

1. Click Profiles > Path Alarm Profiles. The View Path Alarm Profile preview pane is displayed.
2. Under Delete column, select the check box for the profiles to be deleted.
3. Click Delete. A confirmation message is displayed.
4. Click Confirm Delete. A 'Successfully Deleted' message is displayed. The selected path alarm
profile is deleted.

NOTE: Default path alarm profiles are indicated with an asterisk. Default path alarm profiles
cannot be deleted. A path alarm assigned to an AU/STS, TU/VT or STM/OC cannot be
deleted.

166
Chapter 12

Performance Monitoring
This chapter explains how you can monitor various performance statistics.

Performance Monitoring (PM) refers to the in-service, non-intrusive monitoring of transmission


quality. It is the process that monitors the performance of a facility through performance data
collection and analysis without interruptions to service.

IN THIS CHAPTER
Viewing STM/OC Performance Statistics ............................................. 167
Viewing E1 Port Performance Statistics................................................. 174
Viewing PDH (E1/DS1) Port Performance Statistics .......................... 176
Viewing Ethernet Performance Statistics ............................................... 178
Viewing VCG Performance Statistics ..................................................... 181
Monitoring Input Voltage Statistics ........................................................ 183
Editing Voltage Thresholds for PSU ...................................................... 184

Viewing STM/OC Performance Statistics


You can view STM/OC performance statistics for
 Current Interval
 15 minutes Intervals
 Previous Day
You can view Performance Statistics of Regenerator Section/Path/Tributary Unit/Transceiver
by clicking the associated links in STM/OC statistics page.

Viewing STM/OC-Current Interval Statistics


To view the STM/OC-Current interval statistics, click Performance > Current interval >
STM/OC. The STM/OC-Current interval statistics preview pane is displayed.

Viewing Performance Statistics of Regenerator Section/Section and


Multiplex Section/Line
To view the performance statistics Regenerator Section/Section and Multiplex Section/Line,
1. Click Performance.
2. Do one of the following:

167
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

To view performance statistics on current interval, click Current interval >


STM/OC. The STM/OC-Current interval statistics page is displayed.
To view performance statistics for 15min interval, click 15min interval >
STM/OC. The STM/OC-Interval statistics page is displayed.
To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Regenerator Section - Multiplex section/Section-Line. The performance statistics
of the Regenerator section/Section and the Multiplex section/Line is displayed.
Figure 77: Viewing Performance Statistics of Regenerator Section and Multiplex Section

168
Chapter 12 Performance Monitoring

Reset options available under STM/OC-Regenerator Section/Section are—Reset Regeneration


Section/Section Current 15 Min Statistics, Reset Regeneration Section/Section Current Day
Statistics.

Reset options available under Multiplex section/Line are—Reset Multiplex Section/Line Current
15 Min Statistics, Reset Multiplex Section/Line Current Day Statistics, Reset Multiplex
Section/Line Current 15 Min (Far End), Reset Multiplex Section/Line Current Day (Far End).
Describes the Regenerator Section performance parameters when the network element is
operated in SDH/SONET mode.

Table 67: Regenerator Section Performance Parameters in SDH/SONET mode

Parameter Description
ES The errored second in the regenerator section.
SES The severely errored second in the regenerator section.
UAS The unavailable second in the regenerator section.
SEP The severely errored period in the regenerator section.
EB The errored blocks in the regenerator section.
BBE The background block errors in the regenerator section.
ESR The errored seconds ratio in the regenerator section.
SESR The severely errored seconds ratio in the regenerator section.
BBER The background block error ratio in the regenerator section.
SEPI The severely errored period intensity in the regenerator section.
Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval in the regenerator section. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 68: Multiplex Section performance parameters in SDH/SONET mode

Parameter Description
ES The errored second in the multiplex section.
SES The severely errored second in the multiplex section.
UAS The unavailable second in the multiplex section.
SEP The severely errored period in the multiplex section.
EB The errored blocks in the multiplex section.
BBE The background block errors in the multiplex section.
ESR The errored seconds ratio in the multiplex section.
SESR The severely errored seconds ratio in the multiplex section.
BBER The background block error ratio in the multiplex section.
SEPI Displays the severely errored period intensity in the multiplex section.

169
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Parameter Description
Interval Valid Interval Valid is the validity of the interval and the validity of data during
that interval in the multiplex section. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
ES-FE The errored seconds at far end in the multiplex section.
SES-FE The severely errored seconds at far end in the multiplex section.
BBE-FE The background blocked errors at far end in the multiplex section.
UAS-FE The unavailable seconds at far end in the multiplex section.
SEP-FE The severely errored period at far end in the multiplex section.
Far End Displays the validity of data during that interval at far end in the multiplex
Interval Valid section. 1 indicates the data displayed during that interval is valid, while 0
indicates the data is not valid.

Viewing Performance Statistics of Path


To view performance statistics of path:

1. Click Performance.
2. Do one of the following:
To view performance statistics on current interval, click Current interval >
STM/OC. The STM/OC-Current interval statistics page is displayed.
To view performance statistics for 15min interval, click 15min interval >
STM/OC. The STM/OC-Interval statistics page is displayed.
To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Path. The STM/OC statistics page is displayed.
4. Click on the desired TU/VT. Performance Statistics of the Path is displayed.
Figure 78: Viewing Performance Statistics of Path

170
Chapter 12 Performance Monitoring

NOTE: The AU/STS hyperlink takes you to the corresponding performance statistics.

The reset options available for each port are—Reset All Current 15 Min Statistics, Reset All
Current Day Statistics, Reset All Current 15 Min (Far End), Reset All Current Day (Far End),
Reset AU Current 15 Min Statistics, Reset AU Current Day Statistics, Reset AU Current 15 Min
(Far End), Reset AU Current Day (Far End).

The current interval statistics of the Path is available for the current time interval, previous 15
minutes, current day and the previous day.

Table 69: Path performance parameters in SDH/SONET mode

Parameter Description
ES The errored second.
SES The severely errored second.
UAS The unavailable second.
SEP The severely errored period in the path
EB The errored blocks.
BBE The background block errors.
PPJE The positive pointer justification events.
NPJE The negative pointer justification events.
ESR The errored seconds ratio.
SESR The severely errored seconds ratio.
BBER The background block error ratio.
SEPI The severely errored period intensity in the path.
Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval. '1' indicates the data displayed during that interval is valid, while '0'
indicates the data is not valid.
ES-FE The errored seconds at far end.
SES-FE The severely errored seconds at far end.
BBE-FE The background blocked errors at far end.
UAS-FE The unavailable seconds at far end.
SEP-FE The severely errored period at far end in the path.
Far End Interval Valid The validity of data during that interval at far end. '1' indicates the data
displayed during that interval is valid, while '0' indicates the data is not valid.

171
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Performance Statistics of Tributary Unit


To view performance statistics of Tributary Unit,

1. Click Performance in the navigation menu.


2. Do one of the following:
To view performance statistics on current interval, click Current interval >
STM/OC. The STM/OC-Current interval statistics page is displayed.
To view performance statistics for 15min interval, click 15min interval >
STM/OC. The STM/OC-Interval statistics page is displayed.
To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Tributary Unit. The STM/OC statistics page is displayed.
4. Click the desired TU/VT. The performance statistics of the Tributary Unit is displayed.
Figure 79: Viewing Performance Statistics of Tributary Unit

172
Chapter 12 Performance Monitoring

NOTE: The current interval statistics of the Tributary Unit is available for the current time
interval, previous 15 minutes, current day, and the previous day.

Reset options available for each TU/VT are—Reset All Current 15 Min Statistics, Reset All
Current Day Statistics, Reset All Current 15 Min (Far End), Reset All Current Day (Far End).

Table 70: Tributary Unit performance parameters

Parameter Description
ES The errored second.
SES The severely errored second.
UAS The unavailable second.
SEP The severely errored period.
EB The errored blocks.
BBE The background blocked error.
ESR The error seconds ratio.
SESR The severely error seconds ratio.
BBER The background blocked error ratio.
SEPI The severely errored period intensity.
Interval Valid The lower order path interval valid. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
ES-FE The error seconds at far end.
SES-FE The severely error seconds at far end.
BBE-FE The background blocked errors at far end.
UAS-FE The unavailable seconds at far end.
SEP-FE The severely errored period at far end.
Far End Interval The validity of data during that interval at far end. 1 indicates the data displayed
Valid during that interval is valid, while 0 indicates the data is not valid.

Viewing Performance Statistics of Transceiver


To view performance statistics of Transceiver,

1. Click Performance in the navigation menu.


2. Do one of the following:
To view performance statistics on current interval, click Current interval >
STM/OC. The STM/OC-Current interval statistics page is displayed.
To view performance statistics for 15min interval, click 15min interval >
STM/OC. The STM/OC-Interval statistics page is displayed.

173
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Transceiver to view performance statistics for Transceiver. The performance statistics
of the Transceiver is displayed.
Figure 80: Performance Statistics of Transceiver

Table 71: Path Performance Parameters

Parameter Description
Received Power (dBm) The value of the received power.
Transmit Power (dBm) The value of the transmitted power.
Laser Bias (mA) The Laser Bias value as received from the device.
Laser Voltage (Volts) The Laser Voltage as received from the device.
Laser Temperature The Laser Temperature as received from the device.
(degrees C)
Interval Valid Indicates the validity of the interval. 1 indicates the data displayed
during that interval is valid, while 0 indicates the data is not valid
Timestamp It contains the date and time in UNIX format.

Viewing E1 Port Performance Statistics


To view performance statistics,

1. Click Performance in the navigation menu.


2. To view performance statistics on current interval, click Current interval > E1. The E1-
Current interval statistics page is displayed.
3. To view performance statistics for 15min interval, click 15min interval > E1. The E1-Interval
statistics page is displayed.

174
Chapter 12 Performance Monitoring

4. To view performance statistics for previous day, click Previous day > E1. The E1-Previous
day's history page is displayed.
5. Click the desired port. The performance statistics of the port chosen is displayed.
Figure 81: Performance Attributes

175
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

NOTE: The frame status of the port is displayed on the performance statistics page.

Table 72: E1 Line Performance Parameters

Parameter Description
CV-L The coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more
anomalies and/or defects on the line.
SES-L The severely error seconds.
UAS-L The unavailable seconds on the line.
Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 73: E1 Path Performance Parameters

Parameter Description
EB-P The errored blocks on the path.
BBE-P The background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more
anomalies and/or defects on the path.
SES-P The severely errored seconds on the path.
UAS-P The unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during that interval
is valid, while 0 indicates the data is not valid.

Viewing PDH (E1/DS1) Port Performance Statistics


The PDH performance statistics gives the line and path performance statistics of the
E1/DS1/E3/DS3 ports.

To view PDH performance statistics,


1. Click Performance in the navigation menu.
2. To view performance statistics on current interval, click Current interval > E1/DS1. The
E1/DS1-Current interval statistics page is displayed.
3. To view performance statistics for 15min interval, click 15min interval > E1/DS1. The
E1/DS1-Interval statistics page is displayed.
4. To view performance statistics for previous day, click Previous day > E1/DS1. The E1/DS1-
Previous day's history page is displayed.

176
Chapter 12 Performance Monitoring

5. Click the desired PDH port. The performance statistics of the PDH port chosen is displayed.
Figure 82: Performance Attributes

177
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

NOTE: The frame status of the port is displayed on the performance statistics page.

Table 74: E1/DS1 Line Performance Parameters

Parameter Description
CV-L The coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more
anomalies and/or defects on the line.
SES-L The severely error seconds.
UAS-L The unavailable seconds on the line.
Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 75: E1/DS1 Path Performance Parameters

Parameter Description
EB-P The errored blocks on the path.
BBE-P The background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more
anomalies and/or defects on the path.
SES-P The severely errored seconds on the path.
UAS-P The unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during that interval
is valid, while 0 indicates the data is not valid.

Viewing Ethernet Performance Statistics


The Ethernet performance statistics gives the Ethernet interface performance statistics.

To view Ethernet performance statistics:

1. Click Performance in the navigation menu.


2. To view performance statistics for:
Current interval, click Current interval > Ethernet. The Ethernet-Current
interval statistics page is displayed.

178
Chapter 12 Performance Monitoring

3. Click on the desired Ethernet port. The performance statistics of the selected Ethernet port is
displayed.
Figure 83: Ethernet-Current interval statistics

179
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 76: Ethernet Performance Parameters

Parameter Description
Section Interval Valid Displays the section interval valid.
Ethernet Interval Valid Displays the valid interval on Ethernet interface.
Packets RX/TX 64 Bytes Count of number of 64 byte length packets.
Packets RX/TX 65-127 Bytes Count of number of 65-127 byte length packets.
Packets RX/TX 128-255 Bytes Count of number of 128-255 byte length packets.
Packets RX/TX 256-511 Bytes Count of number of 256-511 byte length packets.
Packets RX/TX 512-1023 Bytes Count of number of 512-1023 byte length packets.
Packets RX/TX 1024-1518 Count of number of 1024-1518 byte length packets.
Bytes
Packets RX/TX 1519-1522 Count of number of 1519-1522 byte length packets.
Bytes
Frames Received Count of number of valid frames received with correct FCS value.
Octets Received Count of number of bytes received.
Frames Transmitted Count of number of frames transmitted.
Octets Transmitted Count of number of bytes transmitted.
FCS Errors RX Count of number of received frames with incorrect FCS.
Frames Too Short RX Count of number of received frames less than 64 bytes, with a correct
FCS value. When in half-duplex mode, the actual Receive undersize
frame count is determined by TUND, TXCL and TLCL.
Pause Frames Received Count of number of pause frames received on the interface.
Broadcast Frames Received Count of number of broadcast frames received on the interface.
Broadcast Frames Transmitted Count of number of broadcast frames transmitted on the interface.
Multicast Frames Received Count of number of multicast frames received on the interface.
Multicast Frames Transmitted Count of number of multicast frames transmitted on the interface.
Frame Jabber RX Count of number of jabber frames received on the interface.
Discarded Rx packets Count of number of receive frames discarded.
Discarded Tx Packets Count of number of transmit frames discarded.
Ingress Other Discards Count of frames discarded apart from the ingress definitions.
MTU Discards Count of frames discarded based on MTU.
Packets RX/TX > 1522 (Jumbo Count of number of 1522-9600 byte length packets.
Frames)

180
Chapter 12 Performance Monitoring

Viewing VCG Performance Statistics


To view VCG performance statistics:

1. Click Performance in the navigation menu.


2. To view VCG performance statistics:
For Current interval, click Current Interval > VCG. The VCG-Current interval
statistics page is displayed.
For 15 mins interval, click 15min Intervals > VCG. The VCG-Interval statistics
page is displayed.
For Previous Day, click Previous Day > VCG. The VCG-Previous day's history
page is displayed.
3. Click on the desired VCG port. The performance statistics of the selected VCG port is
displayed.
Figure 84: VCG Performance Statistics

181
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

NOTE: The above image is shown for current interval.

Table 77: VCG Performance Parameters

Parameter Description
BINNED COUNTERS
Idle Seconds The count of idle second in VCG traffic. An idle second is a second in which
no data frames or errored frames are received. This counter will be
incremented in a non-ES/non-SES/non-UAS second.
ES The count of Errored Seconds.
SES The count of Severely Error Seconds.
UAS The count of Un Available Seconds.
Valid Frames The count of valid frames transmitted count.
Transmitted
Valid Frames Received The count of valid frames received count.
Valid bytes Transmitted The count of valid bytes transmitted count.
Valid bytes Received The count of valid bytes Received count.
Core Header Single The GFP (Generic Framing Procedure as in G.7041) core header single errors
Error Corrections correction count.
Type Header Single The GFP type header single error correction count.
Error Corrections
Core Header CRC The GFP core header CRC error count.
Errors
Type Header CRC The GFP type header CRC error count.
Errors
Payload FCS Errors The payload FCS incorrect count.
VCG Interval Valid Indicates whether the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
RUNNING COUNTERS
Section Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval.
Unacceptable Frame Count of frames discarded based on frame policy.
Type
CoS Queue 1 Enqueue Number of packets discarded in cos queue 0.
Discards
CoS Queue 2 Enqueue Number of packets discarded in cos queue 1.
Discards
CoS Queue 3 Enqueue Number of packets discarded in cos queue 2.
Discards
CoS Queue 4 Enqueue Number of packets discarded in cos queue 3.
Discards

182
Chapter 12 Performance Monitoring

Parameter Description
CoS Queue 5 Enqueue Number of packets discarded in cos queue 4.
Discards
CoS Queue 6 Enqueue Number of packets discarded in cos queue 5.
Discards
CoS Queue 7 Enqueue Number of packets discarded in cos queue 6.
Discards
CoS Queue 8 Enqueue Number of packets discarded in cos queue 7.
Discards
MTU Discards Count of frames discarded based on MTU.
Service Lookup Failure Count of ingress frames which does not match any of the FP definitions.
Ingress Other Discards Count of frames discarded apart from the ingress definitions.
Frames Received Count of number of valid frames received with correct FCS value.
Octets Received Count of number of bytes received.
Frames Transmitted Count of number of frames transmitted.
Octets Transmitted Count of number of bytes transmitted.
Discarded Rx packets Count of number of receive frames discarded.
Discarded Tx Packets Count of number of transmit frames discarded.

Monitoring Input Voltage Statistics


To view the input voltage statistics, click Performance > input voltage monitor in the
navigation menu. The Input Voltage Statistics page is displayed.

Figure 85: Viewing Input Voltage Statistics

183
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 78: Input Voltage Monitor Statistics

Parameter Description
Link Allows you to edit the required voltage thresholds for input power feed.
Card Name Displays the name of the card for which statistics is shown.
Index Displays the index value given.
Voltage Value (volts) Displays the default voltage value.
Current Voltage Value (volts) Displays the present voltage value.
Voltage high threshold (volts) Displays the value for high threshold voltage that is set.
Voltage low threshold (volts) Displays the value for low threshold voltage that is set.
Admin Status Displays whether the admin status is up or down.

Editing Voltage Thresholds for PSU


To edit voltage thresholds for InputPower Feed,

1. Click Performance > input voltage monitor in the navigation menu. The Input Voltage
Statistics page is displayed.
2. Click Edit in Link column against the PSU. Edit Voltage Thresholds for InputPowerFeed
page is displayed.
Figure 86: Edit Voltage Thresholds for InputPowerFeed_DPU

3. Select or enter the values and click Submit. A success message is displayed.

184
Chapter 13

Security Management
This chapter describes about users and their privileges to access the network element. The
network element provides four different user access groups (ADMIN, OPERATOR,
OPERATOR2, and USER).

IN THIS CHAPTER
Working with RADIUS Server ................................................................ 185
Managing User Accounts ......................................................................... 188
Managing User-Lockout........................................................................... 192
Managing Security Settings ...................................................................... 194
Managing Audit Logs ............................................................................... 202
Managing User Sessions ........................................................................... 205

Working with RADIUS Server


Remote Authentication Dial-In User Service (RADIUS) is an IETF protocol for communication
between RADIUS clients on remote network elements and a RADIUS server. The RADIUS
server provides centralized Authentication, Authorization and Accounting (AAA) services.

When RADIUS setting is enabled on the network element, the network element will use the
authentication details configured on a remote server rather than the authentication details present
on the network element.

185
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing RADIUS Server


To view the RADIUS, click Security > RADIUS settings in the navigation menu. The View
RADIUS preview pane is displayed.

Figure 87: View RADIUS

Provisioning RADIUS Server


To provision RADIUS server,

1. Click Security > RADIUS settings in the navigation menu. The View RADIUS pane is
displayed.

186
Chapter 13 Security Management

2. Click Provision a new RADIUS Server. The Provision New RADIUS Server pane is
displayed.
Figure 88: Provisioning RADIUS Server

3. Select or enter values and click Create. A "Successfully Created" message is displayed.
Table 79: Provision RADIUS Server

Parameter Description Default Value Acceptable Value


Server IP IP address of the RADIUS server 192.168.0.0 Any valid IP Address
RADIUS Secret Code for encrypting data sent to the -- Any alphanumeric
RADIUS server. The same code needs to code for encrypting
be configured on the RADIUS server also. the data sent to the
RADIUS server. The
same code needs to
be configured on the
RADIUS server also.
Timeout Time duration (in seconds) within which 15 4 to 30
communication should be established with
the RADIUS server.
Port Communication port of the RADIUS 1812 --
Server
Priority Priority of the RADIUS server 1 1 to 2

Enabling RADIUS Authentication


To enable RADIUS authentication,

1. Click Security > RADIUS settings in the navigation menu. The View RADIUS page is
displayed.
2. Select Enable for RADIUS Authentication field, listed above the View RADIUS page.

187
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

3. Enter suitable value for RADIUS Cache Time out (Minutes) field, present above the View
RADIUS page.
4. Click Submit. A "Successfully Modified" message is displayed.

Editing RADIUS Settings


To edit RADIUS settings,

1. Click Security> RADIUS settings in the navigation menu. The View RADIUS page is
displayed.
2. Click the Edit link for the entry to be updated. The Edit RADIUS server page is displayed.
Or
Click the entry name. The Edit RADIUS server page is displayed.
3. Edit required values.
4. Click Submit. A confirmation page is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Managing User Accounts


You can perform different operations depending on the access privileges assigned by the
Administrator. The Administrator creates and manages the user accounts for accessing the
network element and ensures security by assigning each user a specific profile.

To manage user accounts, click Security> Manage users in the navigation menu. The Manage
users page is displayed.

Figure 89: Manage Users

Creating User Accounts


To create a user account,

1. Click Security> Manage users in the navigation menu. The Manage Users page is displayed.

188
Chapter 13 Security Management

2. Click Add User. The New User preview pane is displayed.


Figure 90: Add New User

3. Select or enter values and click Submit. A success message is displayed.

189
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 80: User Account Parameters

Parameter Description Default Value Acceptable Value

User Name Name assigned to the user account. User tejas Up to 32


Name should be unique and is case alphanumeric
sensitive. characters
Access Access privilege assigned to the user USER  USER
account.  OPERATOR
 USER: Read-only access to all the  OPERATOR 2
management information including
 ADMIN
configuration, faults and
performance.
 OPERATOR: Can perform certain
configuration operations such as port
and acknowledgment of faults,
resetting performance statistics, etc.
 OPERATOR2: Can configure node
name, configure Router ID and
Ethernet IP; perform maintenance
operations such as software or
configuration backup and restore;
and all other operations similar to
operator.
 ADMIN: Can create and delete
logins on the network element. Can
configure Location, Contact, as well
as management parameters such as
Ethernet/Router IP Address/Masks.
User Lockout Parameter to indicate whether access is Allow access  Allow access
allowed or denied to the user.  Deny access
 Allow access: The user is allowed to
login to confirm the password access
to the network element.
 Deny access: The user is denied
access to the network element.
Password Password assigned to the user for the -- Eight alphanumeric
user account. Password is case-sensitive. or special characters.
Password should be unique and different
from User Name.
Confirm Re-enter password to confirm the --- --
Password password.

190
Chapter 13 Security Management

Modifying User Accounts


To modify user account,

1. Click Security > Manage users in the navigation menu. The Manage Users page is displayed.
2. Click User Name of the user to be updated. A page for modifying the user account is
displayed.
3. Edit required values referring to table mentioned in Creating User Accounts.
4. Click Submit. A success message is displayed.

Changing Password of a Logged in User


Users with USER access privilege are only allowed to view their accounts in the Manage users
page and change the passwords.

To modify password,

1. Click Security > Manage users in the navigation menu. The Manage Users page is displayed.
2. Enter a new password in the Password field. Re-enter the password in the Confirm Password
field.
3. Click Submit. A "Successfully Modified" message is displayed.

NOTE: For an administrator, the administrator should click the user name link in the user
name field to change the password.

Deleting User Accounts


Only an administrator has the privilege to delete existing user accounts and his own account.
Only an ADMIN can delete his own account.

To delete a user account,

1. Click Security > Manage Users in the navigation menu. The Manage Users page is displayed.
2. In the Delete field, select the check box of the entries to be deleted.
3. Click Submit. A confirmation page is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed.

NOTE: When a user account is deleted, other active sessions using this account will be
automatically closed or logged off and the user will be prompted to log back in with another
valid user account.

191
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Managing User-Lockout
The users with administrator privileges can disable a user account by setting the " User lockout "
parameter. When the user is locked out during an active session, the authentication information
stored in the cache is used for the session until the user logs out. The next time the user attempts
to log in to the network element, access is denied.

User-Lockout is usually done to prevent password guessing, unauthorized access to network


element.

Administrator needs to configure the following parameters to the network element:


 Max Invalid Login attempts: The maximum invalid login attempts, after which the user would
get locked out.
 Lockout Time: Time duration during which the locked users cannot connect to network
element. During this lockout time, the authorized users even cannot connect to network
element. After the lockout time expires, the user authentication would proceed as normal.

NOTE: In User lockout feature RADIUS users with ADMIN privilege can be locked through
debug interfaces, namely telnet, ssh, and ftp. The RADIUS user created with same name as
LOCAL user will not be locked out if the LOCAL user is an ADMIN user.

Enabling Users Lockout


To enable Users Lockout,
1. Login to the network element with admin access privilege.
2. Click Security > Security Settings. The Security settings preview pane is displayed.
3. Select Enable against the parameter UserLock Settings.
4. Click Submit. A success message is displayed. The user lockout is enabled.

Configuring UserLock
To configure UserLock,

1. Log on to the network element with admin access privilege.


2. Click Security > Lock Users.
3. Enter the required values by referring to User Lock table.
4. Click Submit. A success message is displayed.

192
Chapter 13 Security Management

Table 81: Locked Users parameters

Parameter Description Default Value Acceptable Value


Maximum The maximum invalid login attempts, after 5 Maximum value of
Invalid Attempt which the user will be locked out. 30
Count
Lockout Time The duration during which the locked users 60 seconds 7200 seconds
(seconds) cannot connect to NE. During this lockout
time, the authorized users even cannot
connect to NE. After the lockout time
expires, the user authentication would
proceed as normal.

Unlocking Users
To view and unlock locked users,

1. Log into the network element with admin access privilege.


2. Click Security > Lock Users.
3. Select a user from the list.
4. Click Unlock. A success message is displayed.

193
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Managing Security Settings


The following set of options can be managed in security settings:
 Blocking Ports
 Blocking IPs
 Enable CHAP Settings
 Regenerate Keys
 Provision Keys
 HMAC Selection
 Cipher Selection
To access security settings preview pane, click Security > Security Settings. The Security
Settings preview pane is displayed.

Figure 91: Security settings

194
Chapter 13 Security Management

Table 82: Security settings parameters

Parameter Description
BlockedPorts Clicking on this link displays the list of ports Blocked.
BlockedIPs Clicking on this link displays the list of IPs Blocked.
CHAP Settings Allows you enable or disable CHAP settings.
CHAP Secret Allows you to enable or disable CHAP Secret.
Login Warning Allows you to enter the warning that is displayed in the Login
page.
Login Notice Allows you to enter the notice that is displayed in the Login page.
SNMP Agent Allows you to enable and disable SNMP Agent
SNMP Community Allows you to enter the SNMP community.
UserLock Settings Allows you to enable and disable UserLock Settings.
Local Auth on Fallback Allows you to enable or disable fall back to the local user
database if the RADIUS server fails during authentication.
Configure Ssh Allows you to turn on Secure Shell (Ssh) protocol. The protocol
secures the sessions using standard cryptographic mechanisms.
Regenerate Keys Allows you to regenerate keys. Clicking on this link allows you to
select the key type for Secure Shell (Ssh) from the following:
 dsa
 rsa
Provision Keys Clicking on this link allows you to provision Secure Shell (ssh)
keys. You can enter the location of the public and private key
files, and select the key type.
HMAC Selection Clicking on this link allows you to select the Hmac to be
supported. HMAC is used for calculating message authentication
code involving a cryptographic hash function(MD5 and SHA1) in
combination with a secret key. HMAC can verify the data
integrity and authenticity of a message. The size of the output for
Hmacs are as follows.
 hmac-md5(128 bits)
 hmac-md5-96(96 bits)
 hmac-sha1(160 bits)
 hmac-sha1-96(96 bits)
Cipher Selection Clicking on this link allows you to select the Cipher to be
supported. In Ciphers, “aes” and “des” are symmetric-key
encryption standards, and the number following specifies the key
size.

195
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Blocking Ports
The open ports to NE might be unused and can be vulnerable to attacks from outside. Port
scanners such as nmap utility can be used to determine the open ports on the NE. The hacker
can stop/affect NE functionalities by detecting the vulnerabilities in any of these open ports. The
administrator should block such vulnerable ports.

NOTE: Blocking of ports results in loss of association with management platforms.

To block ports,

1. Log into the network element with admin access privilege.


2. Click Security > Security Settings.
3. Select BlockedPorts. The list of Blocked Services preview pane is displayed.
4. Click Block a New Service. Block a Service preview pane is displayed.
Figure 92: Block a Service

5. Enter port number to be blocked.


6. Click BlockService. A success message is displayed. The port number selected is blocked.

Viewing Blocked Ports


To view blocked ports,

1. Click Security > Security Settings.

196
Chapter 13 Security Management

2. Click BlockedPorts. The list of Blocked Ports is displayed.


Figure 93: Blocked Services

Unblocking Ports
To unblock a port,

1. Click Security > Security Settings.


2. Click BlockedPorts. The Blocked Services page is displayed.
3. Select the desired port.
4. Click DeleteService. A success message is displayed.

Viewing Blocked IPs


To view blocked IPs,

1. Click Security > Security Settings. The Security settings preview pane is displayed.

197
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

2. Click BlockedIPs. The Blocked IPs preview pane is displayed.


Figure 94: Viewing Blocked IPs

Blocking an IP
Admin can block the IP's so that it disallows complete access to Network Element from that
source IP. This is useful to block the IP Address from which invalid login attempts or
unauthorized access to Network Element is attempted.

To block an IP,
1. Log into the network element with admin access privilege.
2. Click Security > Security Settings.
3. Click BlockedIPs. The list of Blocked IPs preview pane is displayed.
4. Click Block a New IP. The Block an IP preview pane is displayed.
Figure 95: Block a IP

5. Enter the IP in the IPAddress field.

198
Chapter 13 Security Management

6. Click BlockIP. A success message is displayed.

Unblocking an IP
To unblock an IP address,

1. Click Security > Security Settings.


2. Click BlockedIPs. The Blocked IPs page is displayed.
3. Select the desired IP from the list.
4. Click unblockIP. A success message is displayed.

Enabling Challenge-Response Authentication


Challenge-Response Authentication (CHAP) is a method for proving your identity over an
insecure medium without giving any information out to eavesdroppers that may enable them to
identify themselves as you. When CHAP method is enabled on the network element, the network
element will use CHAP algorithm.

To Enable Challenge-Response Authentication,

1. Click Security > Security Settings.


2. Enter the secret in CHAP secret. (By default it is "testing123")
3. Select Enable for CHAP Settings. (By default it is enabled)
4. Click Submit. A success message is displayed. The CHAP is enabled.
Logging using Challenge-Response Authentication

To login,
1. Enter Username.
2. Select Domain as CHALLENGE.
3. Click Submit.
4. Enter Response.
5. Click Submit. Authentication result is displayed.

Configuring Ssh
To configure Ssh,

1. Click Security > Security Settings.


2. Select the value On or Off for Configure Ssh field.
3. Click Submit. A success message is displayed.

199
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Regenerate Keys
To create and check the keys on the network element,

1. Click Security > Security Settings. The Security settings preview pane is displayed.
2. Click Regenerate Keys. The Keytype option is displayed.
Figure 96: Regenerate Keys

3. Select one of the keytype options.


dsa
rsa
4. Click Submit. The Keys are created and checked on network element.

Provision Keys
To validate the provisioned key pair,

1. Click Security > Security Settings. The Security settings preview pane is displayed.

200
Chapter 13 Security Management

2. Click Provision Keys. The Provision keys page is displayed.


Figure 97: Provision Keys

3. Select from the pull down menu or enter the appropriate values in the corresponding fields.
4. Click Submit. The Validation of keys is successful on network element.

HMAC Selection
To select the HMAC listed on the network element,

1. Click Security > Security Settings. The Security settings preview pane is displayed.
2. Click HMAC Selection. The HMAC selection page is displayed.
Figure 98: HMAC Selection

201
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

3. Select the HMAC codes to be supported.


4. Click Submit. The SSH HMAC configuration should be successful.

Cipher Selection
To configure the cipher algorithm to be supported or used by SSH server,

1. Click Security > Security Settings. The Security Settings preview pane is displayed.
2. Click Cipher Selection. The Cipher Selection page is displayed.
Figure 99: Cipher Selection

3. Select the appropriate fields.


4. Click Submit. A success message is displayed.

Managing Audit Logs


You can collect and view the details of user actions performed on the node.

202
Chapter 13 Security Management

Viewing Logs
To view logs, click Security > Audit Logs. The Audit Log page is displayed.

Figure 100: Audit Log

203
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 83: Audit Log page parameters

Field Description
Index Displays the Index number of the log.
Operation Displays the type of operation done
 Add
 Change
 Delete
Object Displays the object ID on which the operation is done.
Attributes Displays the attributes associated with object.
Time Displays the date and time of the operation.
Session Displays the Session number.
Interface Displays the type of interface used for the operation.
User Displays the name of the user.
Domain Displays the domain address.
Host Displays the IP address of the Host.
LATEST Click link to display the latest set of audit log.
OLDER Click link to display the older set of audit log.

Collecting Audit Logs Archive


To collect audit Logs Archive,

1. Click Security > Audit Logs. The Audit Log page is displayed.
2. Click Collect Audit Logs Archive. Collect Audit Logs Archive pane is displayed.
Figure 101: Collect Audit Logs Archive

204
Chapter 13 Security Management

3. Select the duration from the drop-down menu.


4. Click Submit. The Download Audit Logs Archive page is displayed.
5. Click the Audit Logs Archive link.
6. Select the location for downloading the archive file.

Managing User Sessions


The User Sessions menu enables you to configure the maximum number of HTTP sessions on
the network element and the HTTP session timeout. The menu also displays all the active HTTP
sessions at any point in time.

Viewing HTTP Sessions


To view the HTTP session information, click Security > User Session > HTTP Sessions in the
navigation menu. The Active HTTP sessions page is displayed.

Figure 102: Active HTTP Sessions

205
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 84: HTTP Session Parameters

Parameter Description
Session Timeout The time duration after which the session times out.
(Minutes)
Maximum HTTP The maximum number of HTTP sessions allowed on the network element.
Sessions
Index The Index number assigned to the session.
User The user logged into the network element.
Host The remote IP address from which the network element is accessed.
Client Displays the Browser name at the Host IP which is being used for the HTTP
session.
Established The date and time when the session was established.
Last Activity The date and time when the session was closed.
Domain Displays domain name.
Connection Security Displays connection security.
Force-out The admin can terminate the HTTP session of the user or operator forcibly.

Configuring HTTP Sessions


To configure the maximum HTTP sessions allowed on the system and the session timeout,

1. Click Security > HTTP Sessions. The information on the Active HTTP sessions is displayed.
2. Enter values for the HTTP Session Timeout and Maximum HTTP sessions.
3. Click Submit. A confirmation page is displayed.
4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The
HTTP session is configured.

NOTE: The acceptable value for Session Timeout is 0 to 300 minutes and the acceptable value
for Maximum HTTP Sessions is 1 to 30.

206
Chapter 13 Security Management

Viewing Sessions History


To view the Sessions History, click Security > User Sessions > Sessions History. The Sessions
History preview pane is displayed.

Figure 103: Sessions History

Table 85: Sessions History Page

Parameter Description
Index Displays the Index number of the log.
Status Displays status of the link.
User Displays the name of the user.
Domain Displays domain name.
Connection Security Displays connection security.
Client Displays the client details.
Host Displays the IP address of the Host.
Established Displays the Date and Time at which the session was established.
Closed Displays date and time at which the session was closed.

207
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing InvalidLogins History


The InvalidLogins History link provides the details of active sessions.

To view InvalidLogins History, click Security > User sessions > InvalidLogins History. The
Invalid Login Sessions History preview pane is displayed.

Figure 104: Invalid Login Sessions History

Table 86: Invalid Logins Sessions History Page

Parameter Description
Index Displays index number.
User Displays user name.
Domain Displays domain name
Connection Security Displays Connection Security
Client Displays the client details.
Host Displays the Host
Established Displays the Established
LATEST Click LATEST link to view the history of the latest sessions.
NEXT Click NEXT link to view the next list of sessions history page.
PREVIOUS Click PREVIOUS link to view the previous list of sessions history page.

208
Chapter 14

Maintenance Operations
This chapter describes the operations available under Maintenance in the Navigation menu.

IN THIS CHAPTER
Editing System Settings ............................................................................ 210
Viewing System Upgrade History ........................................................... 211
Viewing Load Availability ........................................................................ 212
Rebooting Cards ....................................................................................... 213
System Restart options ............................................................................. 213
Adding System Notes ............................................................................... 216
Performing Loop-Backs........................................................................... 216
Diagnostics ................................................................................................ 219
Configuration management ..................................................................... 229
Upgrade Operations ................................................................................. 236

209
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Editing System Settings


The System settings menu helps you to set the alarm buzzer and the crash recovery option for
the network element. It also allows you to set the time zone for the performance day bin rollover.

To view and edit system settings,

1. Click Maintenance > System Settings in the navigation menu. The System Settings preview
pane is displayed.
Figure 105: System settings

2. Set values. Refer System Setting Parameters table for more information.
3. Click Submit. A "Successfully Modified" message is displayed.
Table 87: System Setting Parameters

Parameter Description Default Value Acceptable Value


Alarm Buzzer Parameter to enable or disable hooter Disable  Disable
alarm.  Enable
 Enable: The hooter alarm is enabled.
 Disable: The hooter alarm is disabled.
Performance day Parameter to set time zone for performance Local  GMT
bin rollover day bin rollover.  Local
timezone  GMT: Performance Day Bin Rollover
is set as per GMT Time zone.
 Local: Performance Day Bin Rollover
is set as per Local Time zone.

210
Chapter 14 Maintenance Operations

Viewing System Upgrade History


The System Changes explains the system level changes like node upgrade, card delete and SFP
delete.

To view system changes, click Maintenance > System Changes. The SYSTEM UPGRADE
HISTORY page is displayed.

Figure 106: System Upgrade History

Table 88: System Upgrade History Parameters

Parameter Description
Operation Displays the operation performed on the node.
Time Displays the time of operation performed on the node.
Detail Displays the operation details of the event performed on the
node.

211
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Viewing Load Availability


The Load Availability link details the information about the software release.

To view load availability, click Maintenance > Load availability. The Load Availability preview
pane is displayed.

Figure 107: Load Availability

Table 89: Load Availability page Parameters

Parameter Description
Software Image Displays the software release of the network element.
Firmware Image Displays the firmware release of the network element.
Documentation Image Displays the documentation bundle available for the software release.
Catalog Displays the catalog file name.
Unified Tarkit Available  True indicates that Unified Tarkit is available.
 False indicates that Unified Tarkit is not available.

212
Chapter 14 Maintenance Operations

Rebooting Cards
Cards need to be rebooted in case of FPGA upgrades.
 Warm Reboot: Warm reboot is applicable only for the Processor Cards and reboots the cards
without any traffic disruption.
 Cold Reboot: Cold reboot disrupts traffic on the card for the period while the card is
rebooting.

Warm Rebooting Cards


To warm reboot cards,

1. Click Maintenance > Warm Reboot Cards in the navigation menu. The Warm Reboot Cards
preview pane is displayed.
2. Select the cards to be rebooted in the Warm Reboot column.
3. Click Reboot. A confirmation message is displayed.
4. Click Yes. The warm reboot of cards is successful.

Cold Rebooting Cards


To cold reboot cards,

1. Click Maintenance > Cold Reboot cards in the navigation menu. The Cold Reboot cards
preview pane is displayed.
2. Select the cards to be rebooted in the Cold Reboot column.
3. Click Reboot. A confirmation message is displayed.
4. Click Yes. The reboot of cards is successful.

System Restart options


The System Restart Options enable you to restart the network system in two modes:
 Warm restart: is a service non-disruptive process in which the traffic is not affected during the
restart period. Gives the warm restart to all the cards in the system.
 Cold restart: is a service disruptive process in which the traffic is affected during the restart
period. Gives the cold reboot to all the cards in the system.

213
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Warm Restarting a Network Element


To warm restart a network element,

1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load
management preview pane is displayed.

Figure 108: Reset and load management

2. Click Warm restart. The network element restarts in the warm restart mode.

214
Chapter 14 Maintenance Operations

Cold Restarting a network element


To cold restart a network element,

1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load
management preview pane is displayed.

Figure 109: Reset and load management

2. Click Cold restart. The network element restarts in the warm restart mode.

215
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Adding System Notes


The System Notes link allows you to add and view notes in the network element. Using this
option, you can save the information and view the information typed in the box.

To add system notes,


1. Click Maintenance > System Notes. The System Notes preview pane is displayed.
Figure 110: System Notes

2. Determine your next step. If you want to:


 Save the information: type the required information in the box provided and click Save.
 Refresh the view: click Refresh to reload the contents of the file saved on the network
element.
 Clear the information: click Clear to clear any saved or entered data in the box provided.

Performing Loop-Backs
Loopbacks are performed to check the continuity on the ports. The ports can be configured for
facility loopback and terminal loopback. The exact location of failure can be detected using
loopbacks. You can perform facility and terminal loopbacks to test the electrical connectivity of
the network element. When a facility loopback is operated on Ethernet and optical ports, AIS is
sent downstream.

Table 90: Loop-back mode parameters

Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility Loopback Loopback is configured at the ingress.
Terminal Loopback Loopback is configured at the egress.

216
Chapter 14 Maintenance Operations

Performing Loopback on STM/OC Ports


To perform loopback on STM/OC ports,

1. Click Maintenance > Loop-Backs > STM/OCn in the navigation menu. The STM/OCn Port
loopback preview pane is displayed.
2. Click the port on which you want to perform the loopback. The Port maintenance preview
pane is displayed.
Figure 111: Performing Loopback on STM Ports

3. Select the desired loopback operation from the LoopBack Mode drop-down menu.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Table 91: LoopBack Mode parameters

Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility LoopBack Loopback is configured at the ingress.
Terminal LoopBack Loopback is configured at the egress.
Transparent The traffic is looped back and a copy of the traffic is sent forward. This
Loopback allows loopbacks on optical ports without disrupting all the services in the
card.

217
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Performing Loopback on PDH Ports


To perform loopback on PDH ports,

1. Click Maintenance > Loop-Backs > PDH in the navigation menu. The PDH Port loopback
preview pane is displayed.
Figure 112: Performing Loopback on PDH Ports

2. Click the port on which you want to perform the loopback. The Port maintenance preview
pane is displayed.
3. Select the desired loopback operation from the LoopBack Mode drop-down list.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Table 92: PDH Port Loop-back Mode

Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility LoopBack Loopback is configured at the ingress.
Terminal LoopBack Loopback is configured at the egress.
Transparent Loopback The traffic is looped back and a copy of the traffic is sent forward. This
allows loopbacks on optical ports without disrupting all the services in the
card.

Performing Loopback on Ethernet Ports


To perform loopback on Ethernet ports:

1. Click Maintenance > Loop-Backs > Ethernet in the navigation menu. The Ethernet Port
loopback preview pane is displayed.

218
Chapter 14 Maintenance Operations

2. Click the desired Ethernet port. The Port maintenance ETH<port> preview pane is displayed.
Figure 113: Port maintenance ETH Loopback

3. Select the required loopback mode from the drop-down list.


4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.

Diagnostics
The Diagnostics menu enables the user to view the system diagnostics and the OSPF related
information.

The OSPF monitor enables monitoring the neighbors of a particular node and debugging the
routing information for the IBC (In Band Communication). The OSPF parameters can be
configured for all the embedded control channel interfaces and for the NMS port to enable
routing between these interfaces.

System diagnostics data comprises log files and dump files which provide information on faults.
The diagnostic data can be used for analyzing problems arising in any network element.

219
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Accessing OSPF diagnostics data


To access OSPF data, click Maintenance > Diagnostics > DCN Monitor > OSPF. The Areas
member preview pane is displayed.

Figure 114: Diagnostics OSPF

220
Chapter 14 Maintenance Operations

The following OSPF protocol member parameters can be accessed by clicking the respective
links shown in the preview pane above.

Areas

The Area indicates the Open Shortest Path First area to which an attached network belongs. The
area data structure contains all the information used to run the basic OSPF routing algorithm.
Each area maintains its own link-state database. A network belongs to a single area, and a router
interface connects to a single area. Each router adjacency also belongs to a single area.

Table 93: OSPF area parameters

Field Description
Area Displays the area ID, which is a 32-bit number identifying the area.
#Ifcs Displays the number of ECC interfaces which are part of the area.
#Routers Displays the number of reachable routers in the area.
#LSAs (Link Displays the total LSAs in the network pertaining to this area.
State
Advertisement)
Xsum Displays the checksum on the area database maintained by the node.
Comments Displays the description of the area capability—transit/stub/demand-capable/no-
import.
Database

The Database member displays the format and function of the LSA.

Table 94: OSPF Database Parameters

Field Description

LSA Type Displays the format and function of the LSA.


LS ID Displays LS ID.
Adv.Rtr Displays the OSPF Router ID of the Router originating the LSA.
LS Seqno Displays the signed 32-bit integer used to detect old and duplicate LSAs.
Xsum Displays the checksum of the complete contents of the LSA, except the LS age field.
Options Displays if the OSPF routers support (or not support) optional capabilities, and
communicate their capability level to other OSPF routers.
Length Displays the size in bytes of the LSA.
Age Displays the age of the LSA in seconds.
Interfaces

The Interfaces member displays the type of physical network interface. Different interfaces are
eth, or ecc.

221
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 95: OSPF interface parameters

Field Description

Phy Displays the name of physical network interface. Different interfaces are eth, hdlcppp,
ecc.
Addr Displays the address of the interface available.
Area Displays the area of the OSPF network to which interface belongs.
Type Indicates the type of the link. Types of links can be
 BCast (Broadcast)
 P-P (Point-to-Point)
State Displays the state of the OSPF process.
#Nbr Displays the number of neighbors on the link.
#Adj Displays the number of adjacencies maintained by the network element's OSPF
database.
Cost Displays the metric used to quantify links which the network element has with other
network elements.
Neighbors

The Neighbors member displays the name of the physical network interface, address, router ID
and state of the neighbors.

Table 96: OSPF neighbors parameters

Field Description

Phy Displays the name of physical network interface. Different interfaces are eth, hdlcppp,
ecc.
Addr Displays the address of the neighboring network element.
ID Displays the OSPF router Id of the neighboring network element.
State Displays the state of the OSPF process.
 Full: Indicates completion of the OSPF process, where the routing information
has been completely exchanged with the neighbor.
 Exchange: Indicates that information exchange between the neighbors is
underway.
 1-Way: Indicates traffic transmission is possible only from the network element to
its neighbor and not vice versa, due to some error/defect.
 2-Way: Indicates that traffic transmission is possible from network element as
well as from its neighbor.
#DD Displays the number of database descriptor packets being received by the network
element.
#Req Displays the number of requests received by the network element for a database
description over that interface.
#Rxmt Displays the number of retransmissions of database descriptions requested by the

222
Chapter 14 Maintenance Operations

Field Description
neighbors due to errors/defects in the previous transmission.
Statistics

The Statistics member displays the checksum of number of external LSAs received by the network
element and the checksum of the Autonomous System (AS) externals.
OSPF statistics parameters
Field Description

Router ID Displays the 32-bit number assigned to each router running the OSPF protocol.

# AS-external- Displays the number of external LSAs received by the network element.
LSAs
ASE checksum Displays the checksum of the AS externals.
#ASEs originated Displays the number of external LSAs originated by the network element.
ASEs Displays the maximum number of AS-external-LSAs in the database.
(Autonomous
System External)
allowed
#Dijkstras Displays the number of times the dijkstra algorithm run on the LSA database.
#Areas Displays the number of areas the network element is a part of.
#Nbrs in Displays the number of #Nbrs undergoing a database exchange.
Exchange
MOSPF enabled Displays if multicast OSPF is enabled or not.
Inter-area Displays if Inter-area multicast is supported or not.
multicast
Inter-AS multicast Not supported.
In overflow state Displays if the number of external LSAs has exceeded the upper limit.
Ospfd version Displays the version of the OSPF software running in the network element.
LSA expansions

The LSA Expansion member allows to select the format and function of the LSA.

Table 97: OSPF LSA expansions parameters

Field Description
Area ID Select the identity of set of networks grouped together by the OSPF.
LS Type Select the format and function of the LSA. The following formats are available:
router-LSA
network-LSA
summary-LSA

223
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Field Description
ASBR-summary-LSA
AS-external-LSA
group-membership-LSA
LS ID Enter the routing domain that is being described by the LSA.
Adv Rtr Enter the OSPF Router ID of the router originating the LSA.
AS externals

The AS externals member displays the number of LSAs in the database of the autonomous
system.

Table 98: OSPF AS externals parameters

Field Description
LSA Type Displays the format and function of the LSA.
LS ID Displays the routing domain that is being described by the LSA.
Adv Rtr Displays the OSPF Router ID of the router originating the LSA.
LS Seqno Displays the signed 32-bit integer used to detect old and duplicate LSAs.
Xsum Displays the checksum of the complete contents of the LSA, excepting the LS age
field.
Length Displays the size in bytes of the LSA.
Age Displays the age of the LSA in seconds.
Routing table

The Routing Table member displays all the neighboring network element information indicat ing
the number of hops to reach any node.

Table 99: OSPF Routing table parameters

Field Description
Prefix Displays the Prefix for the address.
Type Select the format and function of the LSA. The following formats are available:
 router-LSA
 network-LSA
 summary-LSA
 ASBR-summary-LSA
 AS-external-LSA
 group-membership-LSA
Cost Enter the routing domain that is being described by the LSA.
Ifc Enter the OSPF Router ID of the router originating the LSA.
Next-hop Displays the IP address of the next network element through the link.

224
Chapter 14 Maintenance Operations

Field Description
#Paths Displays the number of paths available to the destination network element/network
from the source network element.
Opaque-LSAs

The Opaque-LSA member displays the checksum of the complete contents of the Opaque LSAs.

Table 100: OSPF Opaque-LSAs parameters

Field Description
Phyint Displays the name of physical network interface.
If Address Displays the set of networks grouped together by the OSPF.
Area Displays the set of networks grouped together by the Area.
LS type Displays the piece of routing domain that is being described by the LSA.
LS ID Displays the OSPF Router ID of the router originating the LSA.
Adv. Rtr Displays the signed 32-bit integer used to detect old and duplicate LSAs.
LS Seqno Displays the checksum of the complete contents of the LSA, except the LS age field.
Xsum Displays the size in bytes of the LSA.
Length Displays the length of the LSA in seconds.
Age Displays the age of the LSA in seconds.

Viewing System Information


You can view the system information of the network element using system information menu.

To view system information,

1. Click Maintenance > Diagnostic > DCN Monitor > System in the navigation menu.
2. Click on the desired System menu parameter to view the desired information.

225
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 101: System menu parameters

Field Description
ifconfig Displays the information about interfaces of the network element.
Routing Table Displays the information of IP routing of the network element discovered
automatically through OSPF protocol.
ARP Displays the Address Resolution Protocol (ARP). ARP is the method for finding a
link layer of the host (hardware) address when only the respective Internet Layer (IP)
or some other Network Layer address is known.
Ping Enables the user to know the reach ability of any adjacent network elements by
putting the IP address in the specified box.
Traceroute Displays the number of hops or distance to reach any other adjacent network element
in the network.
Netstat Netstat (network statistics) is a command-line tool that displays network connections
(both incoming and outgoing), routing tables, and a number of network interface
statistics.
Table 102: Routing Table parameters

Parameter Field Description


Destination Displays the destination IP of the network element.
Gateway Displays the IP address of the gateway network element.
Genmask Displays the subnet mask.
Flags Unused
Routing Table
Metric Unused
Ref Unused
Use Unused
Iface Displays the type of interface.
Address Displays the host's link layer (hardware) address.
HWtype Displays the hardware type.
ARP HWaddress Displays the hardware address.
Flags Unused
Mask Unused
Ping Enter the IP address.
c Displays the number of packets to ping.
Ping s Displays the number of bytes (size) of the packet.
start ping Click this button to start the search operation and fetch the Ping
Statistics.

226
Chapter 14 Maintenance Operations

Parameter Field Description


Trace Enter the IP address to trace and print a network path to the
host.
Trace
start trace Click this button to start the search operation and fetch the Trace
Statistics.
Proto Displays the type of protocol.
Recv-Q Specifies the number of bytes which are not received.
Send-Q Specifies the Number of Bytes not send to destination.
Local Address Displays the local IP address.
Netstat
Foreign Address Displays the remote IP address.
State Unused
PID/Program Displays the program name.
name

Collecting Debug Data


The System Diagnostics link provides options to collect the debug data for the selected card.
You can,
 download the debug data to the local machine, and
 clean up the data collected to take a fresh report

NOTE: When two or more users try to collect data at the same time, only one of them will get
the data and the other user will receive a failure message.

To collect debug data,


1. Click Maintenance > Diagnostics > System Diagnostics. The Collect Debug Data page is
displayed.
2. Select the Card Name from the list for which you want to collect the data.
3. Click Collect Data. The data is collected in the database.
4. After the data is collected, click Download Debug Data link to save the collected data.
To clean up the data,

1. Click Maintenance > Diagnostics > System Diagnostics. The Collect Debug Data page is
displayed.
2. Click Clean Up Data. The stored data is cleared.

NOTE: The Clean UP Data button appears after collect debug data procedure is executed.

227
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Collecting Micro-SD Statistics


This option enables the user to collect the micro-SD statistics for the selected cross connect
control and aggregate card.

To collect Micro SD Statistics,

1. Click Maintenance > Diagnostics > Micro-SD Statistics. The Micro-SD Read/Write Profile
preview pane is displayed.
2. Click Collect Micro-SD Statistics. The Collect Micro-SD Statistics preview pane is displayed.
Figure 115: Collect Micro-SD Statistics

3. Select the Card Name.


4. Click Collect Micro-SD Stats to Collect Debug Data.

228
Chapter 14 Maintenance Operations

Configuration management
The user interface provides options for configuration backup and storing it on a selected server.
The easiest way to save network element configuration is to use back up configuration. In back
up configuration, the existing snapshot of the configuration is copied and stored to the server
mentioned using the FTP protocol. In case of backup config failure- 'Database Save Failed” alarm
is raised. In this process, NE obtains the configuration using the FTP protocol from a remote
server, checks and accepts the configuration if applicable to the network element. In case of
failure, a restore failure alarm is raised.

You can restore the configuration by restoring from remote machine via FTP or from the local
machine using HTTP. The network element gives an error message for the cause of the failure.
The cause of the failure may be one of the following:
 Username, password authentication failure
 Unable to reach the server IP address
 Incorrect permissions to transfer file
The network element can recover from restoration operation failures due to network
unavailability by using FTP timeout of 15 seconds.

The network element verifies the validity of the restored configuration. The activation of restored
configuration shall be non-service affecting for the unaffected configuration. If the verification
fails, the restored configuration is rejected and configuration restore failure alarm is raised.

The network element raises an alarm on detecting configuration corruption or version mismatch
without affecting traffic.

229
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Backing Up Configuration Data


To take backup of configuration data,

1. Click Maintenance > Configuration management > Backup Configuration in the


navigation menu. The Backup Configuration preview pane is displayed.
Figure 116: Backup configuration

2. Select or enter values referring to Configuration Backup Parameters table.


3. Click Submit. You are connected to a PC on which you want to back up the configuration
data.
4. Create a backup file in the PC.

230
Chapter 14 Maintenance Operations

NOTE: It is recommended to perform a network element database backup on a daily basis.

Table 103: Configuration Backup Parameters

Parameter Default Value Description


User Name - The user name of the system on which the configuration backup is
to be created.
Password - The password of the system on which the configuration backup is
to be created.
IP Address - The IP address of the system where the configuration backup is
created.
FTP Port - The FTP port number for establishing connection with system
(optional) having the configuration backup.
Directory - The Directory in which the backup file is to be placed.

NOTE: The node configuration state is displayed at the bottom of the preview pane and is
refreshed for every few seconds. The Configuration state displayed is the last operation
performed with the configuration management.

Restoring Configuration
To restore configuration,

1. Click Maintenance > Configuration management > Restore Configuration in the


navigation menu. The Restore Configuration preview pane is displayed.
Figure 117: Restore configuration

2. Edit required values referring to the below table.


3. Click Submit. You are connected to the PC from which you want to restore configuration.

231
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

4. Locate the configuration file and click it. The configuration is restored on the network
element.
5. Click Commit for the restored configuration to take effect.

NOTE: The remote server should have an FTP server installed on it to carry out the Restore
configuration data command. For a Linux system, FTP server is inbuilt. For Windows system,
install any third party server such as 3com server along with the provided IIS server.

Table 104: Restore Configuration Parameters

Parameter Default Value Description

Configuration Restore Parameter to select if the configuration is to be backed up from


Operation Configuration Remote machine or local machine.
from Remote  Restore Configuration from Remote Machine: Configuration is
Machine backed up from remote machine.
 Restore Configuration from Local Machine: Configuration is
backed up from local machine.
User Name - The user name of the system where the backup configuration is
present.
Password - The password of the system on which the backup is present.
IP Address - The IP address of the system where the backup is present.
FTP Port - The FTP port number for establishing connection with system having
(optional) the configuration backup.
Directory - The Directory in which backup configuration file is present.

NOTE: Cold reboot the shelf after committing the configuration. The Node Configuration
state is displayed at the bottom of the preview pane.

CAUTION: The restoration of configuration data of a network element is service


disruptive. The new configuration data requires backup. Restoration could be done from a system
which has an FTP server.

232
Chapter 14 Maintenance Operations

Restoring Factory Default Settings


The Restore Factory Defaults menu is used to delete all configuration data of a node or to bring
down the node with the factory default settings. While restoring the factory default values, all
configuration information, event history and performance data are deleted. The factory defaults
can be restored only by the ADMIN user.

To restore factory default settings,

1. Click Maintenance > Configuration Management > Restore Factory Defaults in the
navigation menu. The Restore factory defaults preview pane is displayed.
2. Enter the password in the field "Enter your password to proceed".
3. Edit required values.
4. Click Restore Factory Default. The network element is re-initialized.

NOTE: All configuration information, event history and performance data will be deleted on
restoring factory default settings. The Restore factory default operation brings down existing
traffic. Please attempt the action only if the network element needs to be re-initialized. A
power cycle is necessary after the operation. Restoring factory defaults does not delete
configured user names and profiles. To delete the user names and profiles, select the Also
delete All User Profiles check box.

Configuring Parameters in SLAT Page


SLAT (System Line-up and Test) is used for new configuration of the network element.

Before downloading software from SLAT page, ensure that you have:
 PC and an Ethernet crossover cable with RJ-45 connector.
 Network element IP address information if the network element has already been
commissioned.
To download software from SLAT page,
1. Connect the laptop with static IP 192.168.1.x to the node so that, it can be accessed.
2. Launch the Internet Explorer 6.0/ Mozilla 2.0 browser and enter the URL
http://192.168.1.254:20080. The following page is displayed.

233
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

To restore from a previously backed up configuration,

Restore configuration can be performed from SLAT page. In case, the configuration backup is
already present, refer to Restoring Configuration on page 231 for restoring the configuration.

To initialize the node parameters,

1. Click Initialize Node Parameters. The Initialize Node Parameters page is displayed.
Figure 118: Initialize Node Parameters

2. Enter the network element name in the Name field.


3. Enter the functional router ID of the network in the Router ID field of the NE information
page.
4. In the Ethernet IP field, the IP address must be entered. The Ethernet IP of each network
element in the network must be unique.
5. Select the Data Path Mode as SDH.
6. For PTN mode, select the option No from the drop-down menu for the parameter Select
PTN mode.
7. Select the value "622M" against the field Ports Configuration.
8. Select the value "2x2488M" against the field Card Configuration.
9. Ensure that the value for Centralized Switching is by default Disabled.
10. Click Submit. A confirmation page is displayed.
11. Click Accept Valid Modifications. A network element reboot warning is displayed.

234
Chapter 14 Maintenance Operations

After setting the network element in PTN mode, execute the following activities in GUI:
 Provision the Admin Status of the port as Up
 Configure the Mac in Mac (MiM) Address for the system
 Provision New Management VLAN interface
For provisioning the above given activities, refer "L2 Services User Interface Guide, Document ID: 140-
DOC000016-E".

To Install the software to proceed,

1. Click Please install the software to proceed.


2. Select the software download options
Deliver release from local machine
Deliver release from remote machine
3. If local machine is selected, provide the file path.
4. If a remote machine is selected, provide the following:
User name
Password
IP of remote machine
FTP (optional)
Directory
5. Click Submit. The new software gets downloaded to the NE. On completing the download,
the system will prompt you to initialize the node parameters like Node Name, Router ID,
Ethernet IP, and location.
On initializing the node parameters, node will go for warm reboot and while the node is coming
up the software gets initialized on the NE. Once the node is up, issue a service disruptive reboot
for the FPGAs to get programmed on the NE.

NOTE: After restoring the new database, the network element requires a cold reboot for the
new configuration to take effect. You can verify the software Version from the description
field of the default WUI page. The software version is in the format x.y, where 'x' and 'y'
represents major and minor release respectively.

235
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Upgrade Operations
Users with ADMIN privileges can download software and firmware from either the local
machine using HTTP or a remote machine using FTP with all the upgrade binaries available on
the FTP server. The process of downloading and activating software does not affect services.
During the software download operation, existing functionality of the network element remains
unaffected, unless otherwise stated in the release notes.

A firmware upgrade involves the upgrade of boot loader, root file system, and operating system.
The firmware bundle is checked for checksum and the version. Firmware download is non-
service affecting and requires a warm restart to take effect.

The five steps involved in the unified upgrade operations are:


 Software download: Downloads the software from remote or local machine onto the network
element. The upgrade bundle present in the remote server is usually in the form of a tar kit
containing a catalogue, the software, and firmware. If the upgrade bundle does not contain
the software and firmware, the software and firmware needs to be upgraded separately. When
upgrading from a local machine, the software and firmware is usually upgraded separately.
 Check upgrade: Checks the downloaded software files for corruption. Also checks if the
downloaded software file is the correct one required for upgrade.
 Load upgrade: Loads the downloaded content into the proper directory on the network
element.
 Invoke upgrade: Invokes the new software on the network element. The node goes for a
warm reboot. After invoking, the new software and firmware comes into effect and the
network element is upgraded.
 Commit upgrade: On committing upgrade, the user cannot revert to the previous software.

NOTE: Only software image files (with extension .img) can be downloaded using HTTP,
where as firmware files, and software load can be downloaded using FTP.

236
Chapter 14 Maintenance Operations

Upgrading Software
To upgrade software,

1. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
Figure 119: Software Download

2. Enter or select the required values by referring to Unified upgrade parameters table.
3. Click Submit. The software download state is displayed at the bottom of the preview pane. A
Stop/Start Refresh button is provided to stop or start the refreshing of the software
download state.
4. Check for the Software download status. A success message is displayed.
5. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
6. Select Check Upgrade.
Figure 120: Check Upgrade

237
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

7. Click Submit. This step checks for the integrity of the build file downloaded.
8. Check for the Software download status. A success message is displayed.
9. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
10. Select Load Upgrade.
Figure 121: Load Upgrade

11. Click Submit. This step loads the downloaded file into the upgrade directory from which the
network element will load the new files.
12. Check for the Software download status. A success message is displayed.
13. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
14. Select invoke upgrade.
Figure 122: Invoke Upgrade

15. Click Submit. This step invokes the operating system to load the new file downloaded. This
is done over a reboot. The automatic FPGA upgrade option enable the user to upgrade the

238
Chapter 14 Maintenance Operations

software and the corresponding FPGA (the process is traffic affecting). However, only the
software can be upgraded without automatically upgrading the FPGA. The user can then
schedule the FPGA upgrade depending on the availability of the network element down-time.
The subsequent FPGA upgrade can be carried out by simply issuing a cold reboot to the
network element. After step4, the network element will be unreachable for a maximum of 5-7
minutes.
16. Login to the network element application. For logging in, refer the section Logging to the
Network Application.
17. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
18. Select Commit Upgrade.
Figure 123: Commit Upgrade

19. Click Submit to complete the upgrade process. This option allows the user to confirm that
the upgrade has completed successfully. If the upgrade has failed, at this step the user would
get a message with the reason for the upgrade failure. The user also gets the option to cancel
the upgrade and revert to the earlier working software build.

239
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Table 105: Unified upgrade parameters

Parameter Description Default Value Acceptable Values


Software  Retrieve Release: Retrieves the Deliver release  Retrieve Release
Download current software version. from Remote  Retrieve state
Operation  Retrieve state: Retrieves the machine
 Retrieve space
current state of upgrade.
 Deliver release
 Retrieve space: Retrieves the free from local
disk area in the partition meant machine
for upgrade.
 Deliver release
 Deliver release from local from remote
machine: Retrieves files from machine
local machine using HTTP.
 Check release
 Deliver release from remote
machine: Retrieves files from
Remote machine using FTP.
 Check release: Checks if the
software is the correct software to
be downloaded.
User name User name of the system where the -- --
catalog. xml along with software,
firmware resides.
Password The password of the system where the -- --
catalog. xml along with software,
firmware resides.
IP Address The IP address of the system where -- --
the catalog.xml along with
software, firmware resides.
FTP Port The FTP port number for establishing -- --
(optional) connection with system where the
catalog.xml along with software,
firmware resides.
Directory The Directory where the -- --
catalog.xml along with software,
firmware resides.

NOTE: User name, Password, IP Address, FTP Port and Directory are present only when
the 'Deliver release from remote machine' is selected for Software Download Operation. For
'Deliver release from local machine', the File Name text field is displayed to enter the file
name.

NOTE: Linux system has an inbuilt FTP server. On windows, the IIS server available with
Windows can be used or any third party server such as 3Com server available at the following
URL can be used: http://support.3com.com/software/utilities_for_windows_32_bit.htm

240
Chapter 14 Maintenance Operations

Downloading SSL Certificate


This option enables the user to upgrade the SSL certificate through the user interface.

To download an SSL certificate,

1. Click Maintenance > Upgrade operations > SSL certificate in the navigation menu. The
SSL Certificate Download preview pane is displayed.

Figure 124: SSL Certificate Download

2. Enter or select the required values by referring to SSL Certificate Download parameters table.
3. Click Submit. The SSL certificate is downloaded.
Table 106: SSL Certificate Download parameters

Parameters Description
Username Allows you to enter the username of the system from where you are downloading the
certificate.
Password Allows you to enter the password of the system.
IP Address Allows you to enter the IP address of the system from where you are downloading the
certificate.
FTP Allows you to enter the FTP port number for accessing the remote server (It is an
port(Optional) optional field. If left blank, default port values 20 and 21 are used).
Directory Allows you to enter the source directory address to download the certificate.
File name Allows you to enter name of the certificate.

241
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Upgrading Firmware
To upgrade firmware from remote machine,

1. Click Maintenance > Upgrade Operations > Firmware. The Firmware download preview
pane is displayed.
Figure 125: Firmware Download

2. Enter or select required values referring to table below.


3. Click Submit. The desired firmware is downloaded to the network element.

242
Chapter 14 Maintenance Operations

NOTE: While doing firmware upgrade from user interface, the file needs to be downloaded
separately for primary and secondary XCC cards. Thereafter warm reboot to the secondary
card from the user interface and then a system warm restart needs to be done.

Table 107: Firmware download parameters

Fields Description
User name Enter the user name of the PC to be accessed.
Password Enter the password of the PC to be accessed.
IP Address Enter the IP address of the PC to be accessed.
FTP port (optional) Enter the FTP port number for accessing the remote server.(It is an optional
field)
Directory Enter the directory where the firmware file is located.
File name Enter the firmware file name.
Card Name Select the intelligent card for which firmware is to be downloaded.

243
Glossary of Terms
A DCC-R
APS Data Communication Channel Regenerator Section
Automatic Protection Switching (APS) schemes (DCC_R) are the bytes in SDH frame that
involve reserving a protection channel enable OAM communication between
(dedicated or shared) with the same capacity individual network elements as well as inter
as the channel or facility to be protected. network element communication. The bytes
D1-D3 in regenerator section are used to set
AU the DCC_R communication channel.
Administrative Unit (AU) is the information DCN
structure which provides adaptation between
the Higher-Order path layer and the Data Communication Network (DCN) is the
Multiplex Section layer. The Virtual SDH network that enables OAM
Container (VC) plus the pointers (H1, H2, communication between individual network
H3 bytes) is called the Administrative Unit elements as well as inter network element
(AU). communication.

AUG E
ELAN
Administrative Unit Group (AUG) is the
structure generated by combining several Emulated Local Area Network (ELAN) An
lower level administrative units into the next emulated LAN is a set of clients and servers
higher level administrative unit. connected by virtual circuits over a network.

D F
DCC FPGA
Data Communication Channel (DCC) are the Field Programmable Gate Array (FPGA) is a
bytes in SDH frame that enable OAM semiconductor device that can be configured
communication between individual network by the customer or designer after
elements as well as inter network element manufacturing hence "field-programmable".
communication.
H
DCC-M HTTP
Data Communication Channel Multiplex Hyper Text Transfer Protocol (HTTP) is a set of
Section/Line (DCC_M) are the bytes in SDH standards that allow users of the World
frame that enable OAM communication Wide Web to exchange information found
between individual network elements as well on web pages.
as inter network element communication.
The bytes D4-D12 in multiplex section are
used to set the DCC_M communication
channel.

245
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

I O
IP OAM
Internet Protocol (IP) is the primary protocol in Operation Administration Maintenance (OAM) is
the internet layer of the Internet Protocol a group of management functions that
Suite and performs the task of delivering provide node or network the functionality of
datagrams from the source host to the fault indication, performance monitoring,
destination host solely based on their security management and diagnostic
addresses. It is a 32-bit address assigned to functions. It is a popular framework among
host using TCP/IP. An IP address belongs service providers for their network
to one of five classes (A, B, C, D, or E) and management systems.
is written as 4 octets separated by periods
(dotted decimal format). Each address OSPF
consists of a network number, an optional Open Shortest Path First (OSPF) is a dynamic
sub-network number, and a host number. routing protocol for use in Internet Protocol
(IP) networks. It is used to allow routers to
L dynamically learn routes from other routers
LDCC and to advertise routes to other routers.
Line Data Communications Channel (LDCC) are OSPF selects the best routes by finding the
the bytes in SONET frame that enable lowest cost paths to a destination.
OAM communication between individual P
network elements as well as inter network
element communication. The bytes D10 - PDH
D12 are used to set the communication Plesiochronous Digital Hierarchy (PDH) is a
channel of capacity 192 kbps. technology used in telecommunications
networks to transport large quantities of
M data over digital transport equipment such as
MAC fibre optic and microwave radio systems. It
Media Access Control (MAC) is a unique is the conventional multiplexing technology
identifier assigned to network interfaces for for network transmission systems.
communication on the physical network S
segment. MAC addresses are used for
numerous network technologies and most SDCC
IEEE 802 network technologies, including Section Data Communications Channel (SDCC) is
Ethernet. MAC address is 48 bits long. The a SONET embedded operations channel at
MAC address is commonly written as a the section level to remotely manage the
sequence of 12 hexadecimal digits. network elements by using in-band
management channels.

246
Glossary of Terms

SDH STS
Synchronous Digital Hierarchy (SDH) is an Synchronous Transport Signal (STS) is the basic
international standard for high speed logical building block signal of SONET data
synchronous data transmission over rate.
optical/electrical networks which can
transport digital signals in variable capacities. V
It is a synchronous system which intend to VC
provide a more flexible and simple network
infrastructure. Virtual Container (VC) is a technique that
allows SDH circuits to be grouped into
SFP arbitrarily sized bandwidth increments for
more efficient transport of client protocols.
Small Form-factor Pluggable (SFP) is a compact
optical transceiver used in optical VCG
communications for both
telecommunication and data Virtual Concatenation Group (VCG) is a logical
communications applications. It interfaces a entity in which the VC channel bandwidth is
network device to a fiber optic cable. divided into smaller individual containers
and are grouped together to form a VCG.
SNCP
VT
Sub Network Connection Protection (SNCP) is a
path protection switching scheme that Virtual Tributary (VT) is a type of
supports uni-directional and dedicated type Synchronous Payload Envelope (SPE)
of protection. It is applied on an individual defined for a Synchronous Optical Network
basis to VC-n (both higher order and lower (SONET). It is a structure used to carry sub
order) signals. rate payloads across a SONET transport
network.
SNMP
W
Simple Network Management Protocol (SNMP) is
WTR
an application layer protocol that facilitates
the exchange of management information Wait To Restore (WTR) defines the wait time
between network management system and in minutes before switching traffic back to
the network devices. It enables network work port from protect port, after the fault
administrators to manage network in work port is rectified.
performance, find and solve network
problems, and plan for network growth.

SONET
Synchronous Optical Network (SONET) is an
American National Standards Institute
(ANSI) standard for high speed
communication over fiber-optic networks.
SONET uses time division multiplexing to
send multiple data streams simultaneously.

247
Index
A D
Accessing OSPF diagnostics data • 220 DCC • 245
Accessing Web User Interface Using LAN • DCC-M • 245
22 DCC-R • 245
Add a Proxy ARP Neighbour • 131 DCN • 245
Add Static Routes • 128 Delete Nominated Timing Reference • 143
Adding a Virtual Container (VC) to VCG • Delete Proxy ARP Neighbour • 132
109 Delete TCA Profile of a PDH Port • 104
Adding Cross-Connects • 72 Deleting a Static Route • 131
Adding Overhead Tunnel • 77 Deleting Alarm Filters • 153
Adding System Notes • 216 Deleting Card Configurations • 45
Alarm Banner • 28 Deleting Cross-Connects • 76
APS • 245 Deleting MSP/APS Groups • 67
AU • 245 Deleting MS-SPRing/BLSR • 71
AUG • 245 Deleting Overhead Tunnels • 78
Deleting Path Alarm Profile • 166
B
Deleting Pluggable Modules • 46
Backing Up Configuration Data • 230 Deleting User Accounts • 191
Blocking an IP • 198 Deleting VC/VT from VCG • 117
Blocking Ports • 196 Diagnostics • 219
C Disabling OSPF • 133
Downloading SSL Certificate • 241
CEF1-9P Card Configuration • 44
E
Changing Password of a Logged in User • 191
Chapter Organization • 19 Edit Serial Port • 136
Cipher Selection • 202 Editing Cross-Connects • 76
Cold Rebooting Cards • 213 Editing MSP/APS Group • 64
Cold Restarting a network element • 215 Editing MS-SP/BLSR Ring • 70
Collecting Audit Logs Archive • 204 Editing Network Interfaces • 122
Collecting Debug Data • 227 Editing RADIUS Settings • 188
Collecting Micro-SD Statistics • 228 Editing Selected Timing References • 143
Configuration management • 229 Editing STM/OC Port Profiles • 159
Configure Bulk Squelch Table • 71 Editing System Settings • 210
Configure E1 Mode • 45 Editing TCA Settings for AU4 • 90
Configure OSPF Area • 133 Editing TCA Settings for STM/OC Ports • 85
Configuring HTTP Sessions • 206 Editing TCA Settings for TU • 95
Configuring Parameters in SLAT Page • 233 Editing the Synchronization Status • 138
Configuring SNMP Traps • 80 Editing Voltage Thresholds for PSU • 184
Configuring Ssh • 199 ELAN • 245
Configuring UserLock • 192 Enable Auto-Discovery for STM/OC Port •
Creating User Accounts • 188 118
Enabling Challenge-Response Authentication
• 24, 199

249
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Enabling License Feature • 145 Managing User-Lockout • 192


Enabling RADIUS Authentication • 187 Modifying User Accounts • 191
Enabling Users Lockout • 192 Monitoring Input Voltage Statistics • 183
Executing External Command on a Mouse Operation Conventions • 18
Synchronization Source • 49
N
Executing External Commands • 52
Executing External Commands on MSP Navigation Pane • 29
Groups • 51 Nested Protection • 57
Executing External Commands on MS- Nominating Timing Reference • 140
SP/BLSR Ring • 56 O
F
OAM • 246
Filtering Cross-Connects • 75 OSPF • 246
FPGA • 245
P
G
PDH • 246
Getting Started with Network Element Performance Monitoring • 19, 167
Application • 19, 21 Performing Forced Switch Over • 42
Performing Loopback on Ethernet Ports • 218
H
Performing Loopback on PDH Ports • 218
HMAC Selection • 201 Performing Loopback on STM/OC Ports •
HTTP • 245 217
Performing Loop-Backs • 216
I
Port Group Configuration on SOT18 • 42
IP • 246 Port Rate Configuration in Port Group • 43
L Preview Pane • 29
Provision Alarm Filters • 150
LDCC • 246 Provision E1 Interface • 95
List of Figures • x Provision Keys • 200
List of Tables • xiii Provision TCA Profile for PDH Ports • 100
Logging to the Network Application • 23 Provisioning AU/STS • 87
M Provisioning AUG • 86
Provisioning E1/DS1 Interface • 98
MAC • 246 Provisioning Environmental Alarm Input • 79
Maintenance Operations • 19, 209 Provisioning Ethernet Interface • 104
Managing Audit Logs • 202 Provisioning LCAS • 116
Managing Connections • 52 Provisioning MSP/APS Group • 61
Managing Cross-connects • 72 Provisioning MS-SPRing/BLSR • 69
Managing DCN • 121 Provisioning Path Alarm Profile • 163
Managing Facilities • 81 Provisioning RADIUS Server • 186
Managing Faults • 19, 147 Provisioning STM/OC Ports • 81
Managing License • 19, 145 Provisioning Trunks Manually • 120
Managing MSP/APS Groups • 50, 59 Provisioning TU • 91
Managing NE Adjacency • 118 Provisioning VCG Interface • 107
Managing Overhead Tunnels • 76 Provisioning/Editing Embedded
Managing Path Alarm Profiles • 161 Communication Channel • 125
Managing Proxy ARP Neighbor • 131
Managing Security Settings • 194 R
Managing STM/OC Port Profiles • 157 Rebooting Cards • 213
Managing Timing Manager • 47 Refreshing Alarm Monitoring Pane
Managing User Accounts • 188 Automatically • 21
Managing User Sessions • 205 Refreshing Node Slot View Page • 31

250
Index

Regenerate Keys • 200 View TCA Profiles for PDH Ports • 100
Related Documents • 20 Viewing Active Alarms • 148
Restoring Configuration • 231, 234 Viewing Blocked IPs • 197
Restoring Factory Default Settings • 233 Viewing Card Parameters • 32
Viewing Diff Delays for a VCG Port • 114
S
Viewing E1 Port Performance Statistics • 174
SDCC • 246 Viewing Enabled License Features • 146
SDH • 247 Viewing Ethernet Performance Statistics • 178
Security Management • 19, 185 Viewing Event History • 154
Setting Alarm Severity • 156 Viewing Failed License Features • 146
Setting Date and Time of the Network Viewing HTTP Sessions • 205
Element • 35 Viewing InvalidLogins History • 208
Setting or Editing the Network Element Viewing Load Availability • 212
Information • 24 Viewing Logs • 203
Setting Time Server for the Network Element Viewing MSP/APS Groups • 50, 60
• 39 Viewing Neighbour Information • 119
Setting Time Zone • 36 Viewing Node Inventory • 41
SFP • 247 Viewing Path Alarm Profiles • 162
SNCP • 247 Viewing PDH (E1/DS1) Port Performance
SNMP • 247 Statistics • 176
SONET • 247 Viewing Performance Statistics of Path • 170
STS • 247 Viewing Performance Statistics of Regenerator
Synchronizing Network Element • 138 Section/Section and Multiplex Section/Line
System Requirements • 21 • 167
System Restart options • 213 Viewing Performance Statistics of Transceiver
• 173
T
Viewing Performance Statistics of Tributary
Title Pane • 28 Unit • 172
Typographical Conventions • 18 Viewing Provisioned MS-SP/BLSR Ring • 68
U Viewing Provisioned MS-SPRing/BLSR • 55
Viewing RADIUS Server • 186
Unblocking an IP • 199 Viewing Sessions History • 207
Understanding Alarms • 147 Viewing SNCP/UPSR Protection • 52
Understanding User Interface • 19, 27 Viewing STM/OC Performance Statistics •
Understanding Visual Indicators • 32 167
Unlocking Users • 193 Viewing STM/OC Port Profiles • 158
Upgrade Operations • 236 Viewing STM/OC Ports • 81
Upgrading Firmware • 242 Viewing System Information • 225
Upgrading Software • 237 Viewing System Upgrade History • 211
Using Tejas Product Documentation • 20 Viewing the Network Interfaces • 122
Using This Guide • 17 Viewing Timing Manager Protection Request •
V 48
Viewing VC/VT Group • 111
VC • 247 Viewing VCG Performance Statistics • 181
VCG • 247 VT • 247
View Alarm Filters • 153
View Alarm Severity • 155 W
View Overhead Tunnels • 77 Warm Rebooting Cards • 213
View Selected Timing References • 142 Warm Restarting a Network Element • 214
View Serial Port Information • 135 What This Guide Covers • 17
View Static Routes • 127 Who This Guide Is For • 17
View Suppressed Alarms • 150

251
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E

Working with Configuration Menu • 19, 59


Working with Inventory Menu • 19, 41
Working with MS-SP/BLSR • 54, 67
Working with Network Element Information
Pane • 27
Working with Node Slot View Pane • 19, 31
Working with Profiles • 19, 157
Working with Protection Menu • 47
Working with RADIUS Server • 185
Working with Shelf Submenu • 46
Working With System Time Menu • 19, 35
WTR • 247

252

S-ar putea să vă placă și