Documente Academic
Documente Profesional
Documente Cultură
Guide
www.tejasnetworks.com
Copyright Notice
Copyright © 2000-2016. Tejas Networks Ltd. All rights reserved. No part of this book or manual may be
reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying,
recording, or by any information storage and retrieval system, without the express written permission from
Tejas Networks Ltd.
While every effort has been made to make this document as complete and as accurate as possible, Tejas
Networks does not accept any responsibility for poorly designed or malfunctioning networks. The information
provided in this document is on an “as is” basis and is subject to change without prior notice. The author,
Tejas Networks, shall have neither liability nor responsibility to any person or entity with respect to any loss or
damage arising from the information contained in this document or from the use of equipment or software
that might accompany it. The opinions expressed in this document are not necessarily those of Tejas Networks.
Trademark Acknowledgments
All terms mentioned in this book that are known trademarks or service marks have been appropriately
capitalized. All trademarks duly acknowledged. Tejas Networks cannot attest to the accuracy of third-party
information. Use of a term in this document should not be regarded as affecting the validity of any trademark
or service mark.
Tejas customers can contact Tejas Support Center (TSC) 24x7x365 for any assistance through helpline, fax or
email.
- Email: support@tejasnetworks.com
- Skype: tscsupport123
- Web: www.tejasnetworks.com
Revision History
Your opinion is of great value and will help us improve the quality of our product documentation and offer
better services to you. Please take few moments to provide us your opinion of this document. Send your
comments to docs@tejasnetworks.com
Other Suggestions:
If you wish to be contacted regarding your comments, please provide your contact details:
Name: Company:
Postcode: Address:
Telephone: Email:
Table of Contents
iv
Performing Forced Switch Over..................................................................................................... 42
Port Group Configuration on SOT18 ........................................................................................... 42
Port Rate Configuration in Port Group ........................................................................................ 43
CEF1-9P Card Configuration.......................................................................................................... 44
Configure E1 Mode ........................................................................................................................... 45
Deleting Card Configurations ......................................................................................................... 45
Deleting Pluggable Modules ............................................................................................................ 46
Working with Shelf Submenu.......................................................................................................... 46
v
Configuring SNMP Traps ................................................................................................................ 80
Managing Facilities ............................................................................................................................. 81
Viewing STM/OC Ports .............................................................................................................. 81
Provisioning STM/OC Ports ........................................................................................................ 81
Editing TCA Settings for STM/OC Ports .................................................................................. 85
Provisioning AUG ......................................................................................................................... 86
Provisioning AU/STS .................................................................................................................. 87
Editing TCA Settings for AU4 .................................................................................................... 90
Provisioning TU ............................................................................................................................. 91
Editing TCA Settings for TU ....................................................................................................... 95
Provision E1 Interface .................................................................................................................... 95
Provisioning E1/DS1 Interface ..................................................................................................... 98
View TCA Profiles for PDH Ports ............................................................................................ 100
Provision TCA Profile for PDH Ports ....................................................................................... 100
Delete TCA Profile of a PDH Port ............................................................................................ 104
Provisioning Ethernet Interface ..................................................................................................... 104
Provisioning VCG Interface......................................................................................................... 107
Adding a Virtual Container (VC) to VCG.............................................................................. 109
Viewing VC/VT Group ........................................................................................................... 111
Adding and Removing LCAS in Bulk ....................................................................................... 114
Deleting Channels ........................................................................................................................ 114
Viewing Diff Delays for a VCG Port ........................................................................................ 114
Provisioning LCAS ..................................................................................................................... 116
Deleting VC/VT from VCG .................................................................................................... 117
Managing NE Adjacency ................................................................................................................ 118
Enable Auto-Discovery for STM/OC Port ................................................................................ 118
Viewing Neighbour Information .................................................................................................. 119
Provisioning Trunks Manually .................................................................................................... 120
Managing DCN................................................................................................................................. 121
Viewing the Network Interfaces ................................................................................................... 122
Editing Network Interfaces .......................................................................................................... 122
Provisioning/Editing Embedded Communication Channel ......................................................... 125
View Static Routes....................................................................................................................... 127
Add Static Routes ........................................................................................................................ 128
Deleting a Static Route................................................................................................................. 131
Managing Proxy ARP Neighbour .............................................................................................. 131
Add a Proxy ARP Neighbour .................................................................................................... 131
Delete Proxy ARP Neighbour..................................................................................................... 132
Configure OSPF Area ................................................................................................................. 133
Disabling OSPF .......................................................................................................................... 133
View Serial Port Information ...................................................................................................... 135
Edit Serial Port............................................................................................................................ 136
Synchronizing Network Element ................................................................................................. 138
Editing the Synchronization Status .............................................................................................. 138
Nominating Timing Reference ...................................................................................................... 140
View Selected Timing References .................................................................................................. 142
Clear Non Reversion mode ........................................................................................................... 142
Editing Selected Timing References............................................................................................... 143
Delete Nominated Timing Reference ............................................................................................ 143
vi
Managing License 145
Enabling License Feature ............................................................................................................... 145
Viewing Enabled License Features............................................................................................... 146
Viewing Failed License Features ................................................................................................... 146
vii
Editing RADIUS Settings ......................................................................................................... 188
Managing User Accounts................................................................................................................ 188
Creating User Accounts ............................................................................................................... 188
Modifying User Accounts ............................................................................................................. 191
Changing Password of a Logged in User ...................................................................................... 191
Deleting User Accounts ................................................................................................................ 191
Managing User-Lockout ................................................................................................................. 192
Enabling Users Lockout .............................................................................................................. 192
Configuring UserLock .................................................................................................................. 192
Unlocking Users ........................................................................................................................... 193
Managing Security Settings............................................................................................................. 194
Blocking Ports .............................................................................................................................. 196
Viewing Blocked Ports ................................................................................................................. 196
Unblocking Ports.......................................................................................................................... 197
Viewing Blocked IPs .................................................................................................................... 197
Blocking an IP ............................................................................................................................. 198
Unblocking an IP......................................................................................................................... 199
Enabling Challenge-Response Authentication .............................................................................. 199
Configuring Ssh ............................................................................................................................ 199
Regenerate Keys............................................................................................................................. 200
Provision Keys............................................................................................................................... 200
HMAC Selection ......................................................................................................................... 201
Cipher Selection ............................................................................................................................ 202
Managing Audit Logs ...................................................................................................................... 202
Viewing Logs ............................................................................................................................... 203
Collecting Audit Logs Archive ..................................................................................................... 204
Managing User Sessions.................................................................................................................. 205
Viewing HTTP Sessions ............................................................................................................. 205
Configuring HTTP Sessions ........................................................................................................ 206
Viewing Sessions History ............................................................................................................. 207
Viewing InvalidLogins History .................................................................................................... 208
viii
Diagnostics......................................................................................................................................... 219
Accessing OSPF diagnostics data................................................................................................. 220
Viewing System Information ........................................................................................................ 225
Collecting Debug Data ................................................................................................................. 227
Collecting Micro-SD Statistics ..................................................................................................... 228
Configuration management............................................................................................................ 229
Backing Up Configuration Data ................................................................................................. 230
Restoring Configuration ................................................................................................................ 231
Restoring Factory Default Settings ............................................................................................... 233
Configuring Parameters in SLAT Page ...................................................................................... 233
Upgrade Operations ........................................................................................................................ 236
Upgrading Software ...................................................................................................................... 237
Downloading SSL Certificate ...................................................................................................... 241
Upgrading Firmware .................................................................................................................... 242
ix
List of Figures
Figure 1: Login Page ...................................................................................................................................23
Figure 2: NE Information .........................................................................................................................23
Figure 3: NE Information .........................................................................................................................24
Figure 4: NE Information .........................................................................................................................27
Figure 5: Title Pane .....................................................................................................................................28
Figure 6: Alarm Banner ..............................................................................................................................28
Figure 7: Navigation Pane .........................................................................................................................29
Figure 8: Node Slot View ..........................................................................................................................31
Figure 9: Node Slot View ..........................................................................................................................32
Figure 10: Set Node Time..........................................................................................................................35
Figure 11: Set Time Zone ..........................................................................................................................36
Figure 12: Other time zone .......................................................................................................................37
Figure 13: Set Time Server ........................................................................................................................39
Figure 14: Node Inventory ........................................................................................................................41
Figure 15: Port Group Configuration - SOT18 ....................................................................................43
Figure 16: Port Rate Configuration in Port Group..............................................................................44
Figure 17: CEF1-9P Port Configuration ................................................................................................44
Figure 18: Timing manager protection request .....................................................................................48
Figure 19: Timing manager protection request .....................................................................................49
Figure 20: MSP groups Protection ..........................................................................................................50
Figure 21: Protection provisioning ..........................................................................................................51
Figure 22: Protection request page ..........................................................................................................53
Figure 23: Viewing MS-SPRing ................................................................................................................55
Figure 24: View MSP groups ....................................................................................................................60
Figure 25: Provision port protection .......................................................................................................62
Figure 26: Protection provisioning configuration ................................................................................65
Figure 27: View MS-SPRing ......................................................................................................................68
Figure 28: Configure Bulk Squelch Table ..............................................................................................71
Figure 29: Add Cross-connects ................................................................................................................73
Figure 30: View Overhead Tunnels .........................................................................................................77
Figure 31: Add Overhead Tunnel ............................................................................................................78
Figure 32: Configuring Environmental Alarms ....................................................................................79
Figure 33: Provisioning SNMP Traps .....................................................................................................80
Figure 34: Viewing STM Ports .................................................................................................................81
Figure 35: Provisioning TCA Settings for STM Ports ........................................................................85
Figure 36: Provisioning AUG ...................................................................................................................86
Figure 37: Provisioning AU4 ....................................................................................................................87
Figure 38: Editing TCA Settings for AU4 .............................................................................................90
Figure 39: Provisioning TU .......................................................................................................................92
Figure 40: Provision Interface - E1 .........................................................................................................96
Figure 41: View TCA Profile ................................................................................................................. 100
Figure 42: Provision New TCA Profile ............................................................................................... 101
Figure 43: Provisioning Ethernet Interface Port ............................................................................... 104
x
Figure 44: Provisioning VCG Interface............................................................................................... 107
Figure 45: Add VC to VCG ................................................................................................................... 110
Figure 46: View VC Group .................................................................................................................... 112
Figure 47: VCG to VCG Cross connect ............................................................................................. 112
Figure 48: View DiffDelays .................................................................................................................... 115
Figure 49: LCAS Provisioning ............................................................................................................... 116
Figure 50: Enabling Auto-Discovery ................................................................................................... 118
Figure 51: Viewing Neighbor Information ......................................................................................... 119
Figure 52: Manually Configuring Trunks ............................................................................................ 121
Figure 53: Edit Network Interface Provisioning ............................................................................... 123
Figure 54: Provisioning ECC ................................................................................................................. 126
Figure 55: Static routes configuration .................................................................................................. 127
Figure 56: Creating Static Route............................................................................................................ 129
Figure 57: Creating Proxy ARP Neighbour ........................................................................................ 132
Figure 58: Creating OSPF Area ............................................................................................................. 133
Figure 59: Edit Network interface provisioning ................................................................................ 134
Figure 60: Serial port configuration ...................................................................................................... 135
Figure 61: Serial port configuration ...................................................................................................... 136
Figure 62: Nominating Timing References......................................................................................... 140
Figure 63: Enable License Feature........................................................................................................ 145
Figure 64: Failed License Features ........................................................................................................ 146
Figure 65: Active alarms .......................................................................................................................... 148
Figure 66: Viewing Suppressed Alarms ............................................................................................... 150
Figure 67: Provisioning Alarm Filter .................................................................................................... 151
Figure 68: Viewing Alarm Filter ............................................................................................................ 153
Figure 69: Event history .......................................................................................................................... 154
Figure 70: Alarm severity ........................................................................................................................ 155
Figure 71: Alarm severity ........................................................................................................................ 156
Figure 72: View STM Port Profile ........................................................................................................ 157
Figure 73: View STM Port Profiles ...................................................................................................... 158
Figure 74: Edit Internal External NNI ................................................................................................ 160
Figure 75: View Path Alarm Profile ..................................................................................................... 162
Figure 76: Provisioning Path Alarm Profile ....................................................................................... 164
Figure 77: Viewing Performance Statistics of Regenerator Section and Multiplex Section .... 168
Figure 78: Viewing Performance Statistics of Path........................................................................... 170
Figure 79: Viewing Performance Statistics of Tributary Unit ........................................................ 172
Figure 80: Performance Statistics of Transceiver .............................................................................. 174
Figure 81: Performance Attributes ....................................................................................................... 175
Figure 82: Performance Attributes ....................................................................................................... 177
Figure 83: Ethernet-Current interval statistics ................................................................................... 179
Figure 84: VCG Performance Statistics............................................................................................... 181
Figure 85: Viewing Input Voltage Statistics........................................................................................ 183
Figure 86: Edit Voltage Thresholds for InputPowerFeed_DPU .................................................. 184
Figure 87: View RADIUS ....................................................................................................................... 186
Figure 88: Provisioning RADIUS Server ............................................................................................ 187
Figure 89: Manage Users ......................................................................................................................... 188
Figure 90: Add New User ....................................................................................................................... 189
Figure 91: Security settings ..................................................................................................................... 194
Figure 92: Block a Service....................................................................................................................... 196
xi
Figure 93: Blocked Services .................................................................................................................... 197
Figure 94: Viewing Blocked IPs ............................................................................................................ 198
Figure 95: Block a IP ............................................................................................................................... 198
Figure 96: Regenerate Keys .................................................................................................................... 200
Figure 97: Provision Keys....................................................................................................................... 201
Figure 98: HMAC Selection ................................................................................................................... 201
Figure 99: Cipher Selection .................................................................................................................... 202
Figure 100: Audit Log.............................................................................................................................. 203
Figure 101: Collect Audit Logs Archive .............................................................................................. 204
Figure 102: Active HTTP Sessions ....................................................................................................... 205
Figure 103: Sessions History .................................................................................................................. 207
Figure 104: Invalid Login Sessions History ........................................................................................ 208
Figure 105: System settings .................................................................................................................... 210
Figure 106: System Upgrade History ................................................................................................... 211
Figure 107: Load Availability ................................................................................................................. 212
Figure 108: Reset and load management ............................................................................................. 214
Figure 109: Reset and load management ............................................................................................. 215
Figure 110: System Notes ....................................................................................................................... 216
Figure 111: Performing Loopback on STM Ports ............................................................................ 217
Figure 112: Performing Loopback on PDH Ports ........................................................................... 218
Figure 113: Port maintenance ETH Loopback ................................................................................. 219
Figure 114: Diagnostics OSPF .............................................................................................................. 220
Figure 115: Collect Micro-SD Statistics............................................................................................... 228
Figure 116: Backup configuration ......................................................................................................... 230
Figure 117: Restore configuration ........................................................................................................ 231
Figure 118: Initialize Node Parameters ............................................................................................... 234
Figure 119: Software Download ........................................................................................................... 237
Figure 120: Check Upgrade .................................................................................................................... 237
Figure 121: Load Upgrade ...................................................................................................................... 238
Figure 122: Invoke Upgrade................................................................................................................... 238
Figure 123: Commit Upgrade ................................................................................................................ 239
Figure 124: SSL Certificate Download ................................................................................................ 241
Figure 125: Firmware Download .......................................................................................................... 242
xii
List of Tables
Table 1: Typographical Conventions...................................................................................................18
Table 2: Mouse Operation .....................................................................................................................18
Table 3: Chapter Organization..............................................................................................................19
Table 4: Related documents ..................................................................................................................20
Table 5: System requirements ...............................................................................................................21
Table 6: Network Element Parameters ...............................................................................................25
Table 7: Visual Indicators on the Node Slot View pane .................................................................32
Table 8: Card Parameters .......................................................................................................................33
Table 9: Set Node Time..........................................................................................................................36
Table 10: Other Time Zone Parameters ...............................................................................................38
Table 11: Set Time Server ........................................................................................................................40
Table 12: Timing Manager Protection Request Parameters .............................................................48
Table 13: External commands.................................................................................................................49
Table 14: Parameters on the MSP/APS groups page ........................................................................50
Table 15: Commands Executable on Protection Provisioning ........................................................51
Table 16: View Connections Protection Requests .............................................................................52
Table 17: SNCP/UPSR parameters .......................................................................................................54
Table 18: External commands executable on SNCP/UPSR............................................................54
Table 19: MS-SPRing/BLSR parameters ..............................................................................................56
Table 20: Commands executable on MS-SPRing/BLSR Protection provisioning page............57
Table 21: View MSP/APS Groups ........................................................................................................61
Table 22: Provision Port Protection ......................................................................................................63
Table 23: Protection Provisioning ..........................................................................................................66
Table 24: MS-SP ring/BLSR parameters ..............................................................................................69
Table 25: View and Provision MS-SPRing parameters .....................................................................70
Table 26: Configure Bulk Squelch Table parameters .........................................................................72
Table 27: Add Cross-connects ................................................................................................................74
Table 28: Overhead Tunnel parameters ................................................................................................77
Table 29: Configure Overhead Tunnel parameters ............................................................................78
Table 30: SNMP Trap destination IP addresses .................................................................................80
Table 31: Provision Interface STM/OC parameters .........................................................................82
Table 32: TCA settings .............................................................................................................................85
Table 33: Provision AU4 parameters.....................................................................................................88
Table 34: TCA settings with AU4/STS3c for 15 minutes duration ...............................................91
Table 35: TCA settings with AU4/STS3c for one day duration .....................................................91
Table 36: TU/VT parameters .................................................................................................................93
Table 37: TCA settings with TU/VT for 15 minutes duration .......................................................95
Table 38: TCA settings with TU/VT for one day duration .............................................................95
Table 39: Provision Interface Parameters.............................................................................................97
Table 40: Provision Interface-E1/DS1 Parameters ...........................................................................99
Table 41: TCA Profile Parameters ...................................................................................................... 102
Table 42: Parameters For Ethernet Interface ................................................................................... 105
Table 43: Provisioning VCG parameters ........................................................................................... 108
xiii
Table 44: Add VC/VT to VCG........................................................................................................... 111
Table 45: VC/VT parameters............................................................................................................... 113
Table 46: View Diff Delays parameters ............................................................................................. 115
Table 47: LCAS parameters .................................................................................................................. 117
Table 48: Neighbor Information parameters .................................................................................... 120
Table 49: Network Interface Configuration parameters ................................................................ 122
Table 50: Edit Network Interface Parameters .................................................................................. 124
Table 51: Provision ECC Page Parameters ....................................................................................... 126
Table 52: Static routes configuration parameters............................................................................. 128
Table 53: Creating Static Route Parameters ...................................................................................... 130
Table 54: Creating Proxy ARP Neighbour Parameters .................................................................. 132
Table 55: View Serial port ..................................................................................................................... 136
Table 56: Serial Port Configuration Parameters ............................................................................... 137
Table 57: Synchronization state parameters ...................................................................................... 139
Table 58: Nominated timing reference parameters ......................................................................... 142
Table 59: Active alarms Parameters .................................................................................................... 149
Table 60: Suppressed Alarms Parameters .......................................................................................... 150
Table 61: Provision Alarm filter Parameters ..................................................................................... 152
Table 62: View Alarm Filter parameters ............................................................................................ 153
Table 63: STM Port Parameters........................................................................................................... 159
Table 64: Edit STM Port Parameters ................................................................................................. 161
Table 65: Path Alarm profile parameters ........................................................................................... 163
Table 66: Provision Path Alarm Profile parameters ........................................................................ 165
Table 67: Regenerator Section Performance Parameters in SDH/SONET mode.................. 169
Table 68: Multiplex Section performance parameters in SDH/SONET mode ....................... 169
Table 69: Path performance parameters in SDH/SONET mode ............................................... 171
Table 70: Tributary Unit performance parameters .......................................................................... 173
Table 71: Path Performance Parameters............................................................................................ 174
Table 72: E1 Line Performance Parameters ..................................................................................... 176
Table 73: E1 Path Performance Parameters ..................................................................................... 176
Table 74: E1/DS1 Line Performance Parameters ........................................................................... 178
Table 75: E1/DS1 Path Performance Parameters........................................................................... 178
Table 76: Ethernet Performance Parameters .................................................................................... 180
Table 77: VCG Performance Parameters .......................................................................................... 182
Table 78: Input Voltage Monitor Statistics ....................................................................................... 184
Table 79: Provision RADIUS Server .................................................................................................. 187
Table 80: User Account Parameters ................................................................................................... 190
Table 81: Locked Users parameters .................................................................................................... 193
Table 82: Security settings parameters................................................................................................ 195
Table 83: Audit Log page parameters ................................................................................................. 204
Table 84: HTTP Session Parameters .................................................................................................. 206
Table 85: Sessions History Page .......................................................................................................... 207
Table 86: Invalid Logins Sessions History Page............................................................................... 208
Table 87: System Setting Parameters .................................................................................................. 210
Table 88: System Upgrade History Parameters ................................................................................ 211
Table 89: Load Availability page Parameters .................................................................................... 212
Table 90: Loop-back mode parameters.............................................................................................. 216
Table 91: LoopBack Mode parameters .............................................................................................. 217
Table 92: PDH Port Loop-back Mode .............................................................................................. 218
xiv
Table 93: OSPF area parameters ......................................................................................................... 221
Table 94: OSPF Database Parameters ............................................................................................... 221
Table 95: OSPF interface parameters ................................................................................................. 222
Table 96: OSPF neighbors parameters .............................................................................................. 222
Table 97: OSPF LSA expansions parameters ................................................................................... 223
Table 98: OSPF AS externals parameters .......................................................................................... 224
Table 99: OSPF Routing table parameters ........................................................................................ 224
Table 100: OSPF Opaque-LSAs parameters....................................................................................... 225
Table 101: System menu parameters..................................................................................................... 226
Table 102: Routing Table parameters ................................................................................................... 226
Table 103: Configuration Backup Parameters .................................................................................... 231
Table 104: Restore Configuration Parameters .................................................................................... 232
Table 105: Unified upgrade parameters ............................................................................................... 240
Table 106: SSL Certificate Download parameters ............................................................................. 241
Table 107: Firmware download parameters ........................................................................................ 243
xv
Chapter 1
IN THIS CHAPTER
Who This Guide Is For.............................................................................. 17
What This Guide Covers ........................................................................... 17
Typographical Conventions ....................................................................... 18
Mouse Operation Conventions ................................................................. 18
Chapter Organization ................................................................................. 19
Using Tejas Product Documentation ....................................................... 20
Related Documents .................................................................................... 20
17
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Typographical Conventions
Before you start using this guide, it is important to understand the terms and typographical
conventions used in the document. The following kinds of formatting in the text identify special
information.
Convention Description
Click Refers to pressing and releasing a mouse button to select a screen object.
Double-click Refers to pressing and releasing a mouse button twice in succession while the cursor
is positioned over an object on-screen.
Drag Refers to the function of the mouse by which an element on the screen of a monitor
is moved with the cursor, while holding down the mouse button and moving the
mouse.
Right-click Refers to pressing the right button on a two-button mouse.
Wheel button Refers to the third (middle) button on the mouse.
18
Chapter 1 Using This Guide
Chapter Organization
Table 3: Chapter Organization
Chapter Scope
Getting Started with Network This chapter covers setting up Network Element application.
Element Application on page 21 Logging in and logging out from the application. The
Network Element user interface enables the user to provision
and monitor the node parameters.
Understanding User Interface on page This chapter describes the components of the User Interface.
27
Working with Node Slot View Pane This chapter describes the Node Slot View page, which
on page 31 provides the graphical representation of how the cards are
allotted to the slots of the chassis.
Working with System Time Menu on This chapter describes the System Time menu in the web
page 35 user interface.
Working with Inventory Menu on page This chapter covers the functions of Inventory menu. The
41 Inventory menu in the web user interface provides the
inventory of the modules, cards, and SFPs in the network
element.
Working with Protection Menu on This chapter describes the protection feature for a network
page 47 element.
Working with Configuration Menu on This chapter describes the configuration menu in the User
page 59 Interface.
Managing License on page 145 This chapter describes the license associated with this
product.
Managing Faults on page 147 Fault management deals with detecting and reporting faults
by the network element. Alarms are raised to alert the user
about fault conditions.
Working with Profiles on page 157 Profiles define the behavior of the ports in the event of an
alarm. This chapter describes the Profiles menu in the User
Interface.
Performance Monitoring on page 167 This chapter explains how you can monitor various
performance statistics.
Security Management on page 185 This chapter describes about users and their privileges to
access the network element. The network element provides
four different user access groups (ADMIN, OPERATOR,
OPERATOR2, and USER).
Maintenance Operations on page 209 The chapter describes the maintenance operations available
on the network element.
NOTE: This particular product release supports only SDH, all though the document may
indicate both SDH and SONET terms.
19
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Related Documents
Related documents need to be used in conjunction with the Customer Release Notes (CRN)
defining the scope of the release.
20
Chapter 2
IN THIS CHAPTER
System Requirements ................................................................................. 21
Refreshing Alarm Monitoring Pane Automatically.................................. 21
Accessing Web User Interface Using LAN .............................................. 22
Logging to the Network Application ........................................................ 23
Setting or Editing the Network Element Information ............................ 24
System Requirements
Before running the application, ensure that your system satisfies the following requirements.
System Requirements
Operating System Windows XP
Red Hat Linux 2.4 or 2.6
Memory 256 MB RAM or greater
Browser Firefox 1.7 and higher or Red Hat Linux 7.O and higher
Internet Explorer 7.0 and higher on Windows
21
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
CAUTION: During multiple administrative and diagnostic logins, ensure that actions
performed do not affect the work of other users. The commands are implemented on first-come-
first-serve basis.
WUI is accessible at the URL http://192.168.1.254 by default. If you are unable to access the
URL, ensure that
Ethernet connectivity to the network element is proper
Type of cable used is same (straight/cross)
Ethernet interface on the PC/terminal is provisioned
Correct URL entered to access the network element and
There is no malfunction of the network element software
NOTE: To access the Web User Interface of the network element using LAN, connect the
Ethernet interface of the craft PC/terminal to the LAN port of OAM Card.
An Ethernet cross cable is used for direct connectivity between the Ethernet interface of the PC
and the NMS port on the network element. An Ethernet straight cable connects the network
element and the PC terminal through an Ethernet hub or switch.
NOTE: Ensure that you are using Netscape Navigator version 4.75 or higher or Internet
Explorer version 5.0 or higher for setting up the network element software.
22
Chapter 2 Getting Started with Network Element Application
1. Open the web browser and enter the URL: http://<node IP>:20080. The login page appears
as shown below.
Figure 1: Login Page
23
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To log in as a different user, click Change User and re-enter the user name and password.
To exit the application, click Log Out option provided at the top right of the Title Area.
Using the Network Element Information pane, you can access and modify some basic
configuration information of a network element that includes Node name, Router ID, Ethernet
IP, Contact, and Location fields.
Editing the fields on the NE Information Pane is service non-disruptive. The software reboots
without affecting the commissioned traffic (warm reset) when Router ID or Ethernet IP is
changed. The network element does not reboot for any changes made in name or location.
Connectivity to the network element software is lost while rebooting.
1. Log in to the network element. For logging in, refer Logging to the Network Application.
The home page of the Network Element Application appears.
Figure 3: NE Information
2. Enter the parameter values and click Submit. A confirmation page is displayed.
3. Click Accept Valid Modifications. A "Successfully Modified” message is displayed. The NE
information is set.
24
Chapter 2 Getting Started with Network Element Application
NOTE: On NE Information page, node goes for a warm reboot once the Router ID and
Ethernet IP values are changed and submitted.
25
Chapter 3
When you delete, modify, or provision any feature; the system prompts for a confirmation and
the changes made are applicable only after you click on Confirm button. During confirmation,
the Cancel button is selected by default to avoid inadvertent submission of changes, as some
web browsers automatically submit the form when Enter key is pressed on the keyboard. On
confirming a change, system prompts for initiating a reboot and traffic disruption.
NOTE: The images displayed in this chapter are for reference purpose only.
IN THIS CHAPTER
Working with Network Element Information Pane................................ 27
Figure 4: NE Information
27
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
You can expand Navigation menu to access the nested sub-menus. On clicking an option, the
details appear in the preview pane.
Title Pane
The Title Pane is located at the top frame in the application window and includes the following:
NMS port IP Address of the network element
Network element name
Uptime (the time duration for which the node has been up)
Log out link
Company logo
Figure 5: Title Pane
Alarm Banner
The Alarm Banner displays the number of active alarms on the network element with severity
level. The Alarm area also displays the last refresh time of the network element. Alarm banner is
automatically refreshed. To disable automatic refresh of Alarm Banner, select the Disable Auto
Refresh check box.
28
Chapter 3 Understanding User Interface
The icon ( ) above the alarm banner indicates the order in which the alarms are displayed in the
banner:
Critical
Major
Minor
Warning
Based on the severity of alarms, color codes are assigned to them.
Red represents major and critical type of alarms.
Orange represents minor type of alarms.
Yellow represents warning type of alarms.
Navigation Pane
The Navigation Pane displays a nested menu items for accessing the various network element
functionalities, where you can access and review the card details.
Preview Pane
The Preview Pane displays the details of the menu items that are nested in the Navigation menu
and list the parameters required to configure the network element as desired. Using Preview
Pane you can perform all the configurations.
29
Chapter 4
IN THIS CHAPTER
Refreshing Node Slot View Page .............................................................. 31
Understanding Visual Indicators ............................................................... 32
Viewing Card Parameters........................................................................... 32
NOTE: The node slot view image here is a representation of the node slot of TJ1400. For
more information on cards for this product, refer Viewing Card Parameters.
31
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view the details in the preview pane, click one of the cards. The lower portion of the pane
displays the status of active alarms present on the card.
32
Chapter 4 Working with Node Slot View Pane
In Node Slot View page, click the required card to view its card parameters.
33
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The slot view shows all the cards physically present in the network element. The view
of the cards may or may not match with the physical orientation of the cards.
34
Chapter 5
IN THIS CHAPTER
Setting Date and Time of the Network Element..................................... 35
Setting Time Zone ...................................................................................... 36
Setting Time Server for the Network Element ........................................ 39
1. Click System Time > Set Time. Set Node Time pane is displayed. Current date and time is
selected by default.
Figure 10: Set Node Time
35
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Select the desired values and click Submit. A success message is displayed.
Table 9: Set Node Time
NOTE: Modifying the date and time does not affect any of the previously raised alarms.
However, all the new alarms are set with the new date and time. Similarly, the event history
does not change even after the date and time change reflects the change.
1. Click System Time > Set time zone. The Set Time Zone preview pane is displayed.
Figure 11: Set Time Zone
2. Select the desired time zone from the zone drop-down menu.
3. Click Submit. A successful message is displayed. Apply warm reboot to the network element.
The desired time zone is set.
36
Chapter 5 Working With System Time Menu
2. Select the desired time zone from the zone drop-down menu. If the desired time zone is not
listed in the Zone drop-down menu, click Other Time Zones.
3. Click Submit. The Other Time Zone preview pane is displayed.
Figure 12: Other time zone
37
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: When you select the Daylight Saving value as Enable, the below said parameters
appear.
DST Start The instance when DST starts. - Relevant time zone
(Month:Week:Day Month: January to December
:Hour:Min)
Week: 1st week - 4th week, Last week
38
Chapter 5 Working With System Time Menu
In case a network element has to be synchronized with a NTP server for date and time, the NTP
server address and synchronization interval for the network element should be set. Usually, the
NMS server is nominated as the NTP server.
1. Click System Time> Set time server in the Navigation menu. The Set Time Server pane is
displayed.
Figure 13: Set Time Server
39
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: In case the network elements in a network are synchronized to more than one NTP
server, ensure that the NTP servers are synchronized to a common clock. Non -synchronous
NTP servers may result in frequent reset of internal clock in the network elements, and it can
be frequent oscillations of internal clock. Up to five NTP servers can be nominated on the
network element.
NOTE: Timing server nominated must be of stratum level of 14 or less than 14. The network
element will not synchronize to the server if the stratum level is out of range.
40
Chapter 6
IN THIS CHAPTER
Viewing Node Inventory ........................................................................... 41
Performing Forced Switch Over ............................................................... 42
Port Group Configuration on SOT18 ...................................................... 42
Port Rate Configuration in Port Group……………………………. 43
CEF1-9P Card Configuration……………………………………….. 44
Configure E1 Mode.................................................................................... 45
Deleting Card Configurations.................................................................... 45
Deleting Pluggable Modules ...................................................................... 46
Working with Shelf Submenu.................................................................... 46
41
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The Node inventory does not refresh automatically. You need to manually refresh the
page or the pane to view any changes made to the node inventory.
NOTE: Forced switchover from WUI only, in case of slave ready for switchover option is
Yes. When a secondary cross-connect circuit pack is jacked-in, the “Equipment” status for the
circuit pack is changed to ‘Present’ and “Operational Status” is changed to ‘UP’ only after a
few minutes (time is taken for the software in the secondary circuit pack to come up).
After a redundant cross-connect circuit pack is jacked in, wait for the Operational status and
Equipment to “UP” and “Present” in the Node inventory page before performing forced
switchover.
1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which SOT18 circuit pack is present. The STM Port Group Card page is
displayed.
42
Chapter 6 Working with Inventory Menu
1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which SOT18 circuit pack is present. The STM Port Group Card page is
displayed.
3. Click PortGroups. The Port Group configuration-SOT18-<port number> page is displayed.
43
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
4. Under the column "Member Ports Set", click Ports in PORTGROUP-1-7-1. The Port Rate
configuration in PortGroup-1-7-1 page is displayed.
Figure 16: Port Rate Configuration in Port Group
1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. Click the Slot in which CEF1 9P circuit pack is present. The Intelligent Packet Processing
Card page is displayed.
Figure 17: CEF1-9P Port Configuration
44
Chapter 6 Working with Inventory Menu
Configure E1 Mode
To configure the E1 mode,
1. Click Inventory > Node Inventory in the navigation menu. The Node Inventory pane is
displayed.
2. From the Slot column, click the desired card type that you want to configure. The E1
Tributary Card pane is displayed.
3. Click Configure E1 mode. The E1 ports configuration pane is displayed.
4. Select the required Port Configuration from the drop-down menu.
5. Click Submit. A confirmation message is displayed.
6. Click Yes. The E1 mode is configured.
To delete a card, delete all the configurations on the card and then jack out the card.
To delete the configuration of the card that has been removed from the network element,
1. Click Inventory > Node Inventory. The Node inventory preview pane is displayed.
2. Click the Delete Cards link.
3. Select the cards whose configuration is to be deleted in the Delete column.
4. Click Submit.
5. Click Confirm Delete. The selected cards will be deleted from Inventory.
45
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: Lasers are specific to the interfaces. The ranges that a Laser can have are Long Reach,
Short Reach, and Intermediate Reach.
1. Click Inventory > Node Inventory in the Navigation menu. Node inventory pane is
displayed.
2. In the SFP section, click the Delete button in the Name column for the SFP to be deleted.
The Delete button allows you to delete the SFP. You do not require to physically remove the
SFP before deleting. The SFP will auto provision with the slotted SFP values. The Node
inventory pane displays modules pluggable status along with the chassis information.
NOTE: Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned
by clicking the Ports link provided on the respective panes.
46
Chapter 7
47
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Select Allows you to select the clock source.
Clock Source Displays the clock source assigned to the node.
Priority Displays the priority assigned to the clock.
Quality Level Displays the quality of the selected clock source.
Clock status Displays the status of the clock source.
Protection Request Displays if a protection request is made or not.
Release Clears the previous external request.
Forced Switch The network element switches to the selected clock source on forced switch
external request and cannot be switched to other clock sources unless the
external request is cleared. Forced switch has a higher priority over manual
switch.
Manual Switch The network element switches to the selected clock source on receiving an
external request for Manual Switch.
Lockout Source Lock out the selected clock source.
Clear Lockout Removes lockout request on the selected clock source.
NOTE: Quality Level field is displayed when QL Mode is enabled in the Synchronization State
page under Configuration menu.
48
Chapter 7 Working with Protection Menu
3. In the Select column, select the check box for the clock source on which the command is to
be issued.
4. Click the command to be issued. The command is successfully issued on the clock source.
Table 13: External commands
Parameter Description
Release Clears the previous external requests.
Forced Switch The network element switches to the selected clock source on an external request for
forced switch. The network element cannot be switched to other clock sources
unless the external request is cleared. Forced switch has a higher priority over
manual switch.
Manual Switch The network element switches to the selected clock source on an external manual
switch request.
Lockout Source Locks the clock source so that the network element is not synchronized to the clock
source.
Clear Lockout Removes lockout request on the selected clock source.
49
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Name Displays the name of the MSP/APS (MSP if node is configured in SDH mode and
APS if it is in SONET mode) group in the form of link. The first name is the work
port and protection port is separated by comma.
Working port Displays the working port.
Protection port Displays the protection port.
Current status Indicates the channel that is carrying the traffic currently.
Protection request Indicates whether any request for protection has been made.
Switch Status Indicates the switch status.
50
Chapter 7 Working with Protection Menu
1. Click Protection > MSP/APS groups. The MSP/APS groups Preview pane is displayed.
2. Click the MSP/APS group link in the Name column. The Protection Provisioning preview
pane is displayed.
Figure 21: Protection provisioning
Commands Description
Release Clears previously set command.
Lockout protection Prevents traffic from switching to protect path.
Forced Switch to Forces traffic to switch to the protect path regardless of signal fail or degrade
Protect condition existing on protect path.
Forced Switch to Forces traffic to switch to the work path regardless of signal fail or degrade
Working condition existing on the work path.
Manual Switch to Switches traffic to protect path only when it does not have signal fail or degrade
Protect condition existing on it.
Manual Switch to Switches traffic to work path when it does not have signal fail or degrade condition
Working existing on it. Manual Switch to Work is only applicable for non-revertive
connections.
51
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Managing Connections
The Connection menu allows you to execute external commands on SNCP/UPSR provisioned
cross-connections. These external commands cannot be applied to MSP/APS groups.
Parameter Description
Working port Lists all the ports having protected cross-connects. Select the port for which
you need to view the protected connections. By default 'All' is selected.
Select all Select the check box to select all the listed connections.
Connection(ID) Displays the name of the connection.
End Displays the end type
Working path Displays the work port.
Protection path Displays the protect port.
Protection status Displays the protection status.
Provisioned protection Displays any protection request provisioned on the connection.
request
Switch status Displays the switch status.
1. Click Protection > Connections in the Navigation menu. The Connection Protection
Requests Preview pane is displayed.
52
Chapter 7 Working with Protection Menu
2. Select the cross-connect on which the command is to be issued. Protection requests pane is
displayed.
Figure 22: Protection request page
53
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Source Protection/ If source or destination protection is enabled, it displays the Source or
Destination Protection destination protection channel name.
Destination Revertive Displays the reversion mode of the source or destination channel as
Revertive or non-revertive.
Destination WTR Time For revertive mode, this parameter displays the wait to restore time in
minutes, after which the traffic must revert to the work path after failure
clears.
Destination Protection Displays the status of the source or Destination channel as work or protect.
Status
Provisioned Destination Displays the external command provisioned for both source and
Protection request destination. This filed is applicable depending on whether source or
destination protection that is provisioned.
Displays the status of the protection switch in a source or destination
Destination Switch Status
channel.
Table 18: External commands executable on SNCP/UPSR
Parameter Description
Release Clears previously set commands.
Lockout Protection Prevents traffic from switching to protect path.
Forced Switch to Protect Forces traffic to switch to the protect path regardless of signal fail/degrade
condition existing on protect path.
Forced Switch to Working Forces traffic to switch to the work path regardless of signal fail/degrade
condition existing.
Manual Switch to Protect Switches traffic to protect path only when it does not have signal
fail/degrade condition existing on it.
Manual Switch to working Switches traffic to protect path when it does not have signal fail/ degrade
condition existing on it. Manual Switch is applicable only for non-revertive
connections.
54
Chapter 7 Working with Protection Menu
55
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
1. Click Protection > MS-SPRing/BLSR in the Navigation menu. The View MS-SPRing/BLSR
Preview pane is displayed.
2. Click the MS-SP ring/BLSR link in the View column. The MS-SP ring/BLSR Preview pane
is displayed.
3. Click the desired external command link to execute.
56
Chapter 7 Working with Protection Menu
Commands Description
NOTE: The Link Protection Group section is moved from this document to L2 Services
Guide. Refer TJ1400-12 L2 Services User Interface Guide (TPN: 140-DOC000016-E) for more
information on LPG.
Nested Protection
Nested Protection supported by TJ1400-12 offers unique advantages which include:
It provides SNC protection with MSP and MSSP referred to as MSP linear nesting and MSSP
linear nesting protection respectively.
In MSP linear nesting protection, there is a protection channel for each working channel and
the linear path provisioned for SNC protection.
In MSSP linear nesting protection, each fiber is divided into working and protect bandwidths.
When the work path is a failure, the traffic switches to the protection path. When the
protection path also fails, the traffic switches to SNC protect path.
57
Chapter 8
IN THIS CHAPTER
Managing MSP/APS Groups .................................................................... 59
Working with MS-SP/BLSR...................................................................... 67
Configure Bulk Squelch Table ................................................................... 71
Managing Cross-connects .......................................................................... 72
Managing Overhead Tunnels..................................................................... 76
Provisioning Environmental Alarm Input................................................ 79
Configuring SNMP Traps .......................................................................... 80
Managing Facilities ..................................................................................... 81
Managing NE Adjacency ......................................................................... 118
Managing DCN......................................................................................... 121
Synchronizing Network Element ............................................................ 138
NOTE: The local and remote network element must be provisioned with the same protection
configuration.
NOTE: Configure the MSP/APS group before creating the desired cross-connects on the
working port.
59
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
60
Chapter 8 Working with Configuration Menu
Parameter Description
NOTE: The MSP/APS group can be deleted if there are no cross-connects provisioned on the
ports which make up the MSP/APS group and when the traffic is on protect in Route
Diversity disabled mode.
1. Click Configuration > MSP/APS groups. The View MSP/APS groups preview pane is
displayed.
61
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click Create MSP/APS group. The Provision port protection preview pane is displayed.
Figure 25: Provision port protection
3. Select appropriate values and click Submit to create the MSP/APS group. A alert is displayed
prompting you confirm the operation.
4. Click Yes. A “Successfully Provisioned” message is displayed.
62
Chapter 8 Working with Configuration Menu
NOTE: On failure of work channel, VC12/VT-2 management channel goes down and comes
up only on restoring the work channel.
63
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The default value for the work port is the first available port (in the ascending order
either STM-N/OC-N interface). The default value for the protect port will be the first
available port, depending upon the type of interface chosen in the work port.
1. Click Configuration > MSP/APS groups. The View MSP/APS groups pane is displayed.
64
Chapter 8 Working with Configuration Menu
2. Click MSP/APS group link in the Name column. The Protection provisioning pane is
displayed.
Figure 26: Protection provisioning configuration
65
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
66
Chapter 8 Working with Configuration Menu
1. Click Configuration in the Main menu. The sub menu items are listed.
2. Click MSP/APS groups. The View MSP/APS groups pane is displayed.
3. Select the check box in the delete column of the MSP/APS group to be deleted.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Confirm Delete. A confirmation message is displayed.
NOTE: MS-SPRing/BLSR feature is a licensed feature. If you do not see the MS-
SPRing/BLSR option in Configuration menu, contact your sales coordinator.
67
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
68
Chapter 8 Working with Configuration Menu
Parameter Description
View Displays the existing MS-SP/BLSR rings as links.
East Port Displays the port facing East.
West Port Displays the port facing West.
Ring Type Displays the port facing West.
Ring Id Displays the ring identifier. All network elements within the same ring will
have the same Ring Id.
Node ID Displays the identification number of the node. The value can range from 0
- 15.
Ring WTR Specifies the time to wait in minutes, before switching traffic back to work
port from protect port, after the fault in work port has been rectified.
Node State Displays the current state of the network element — Switching State, bi-
directional, Full pass through, Idle state, K-byte pass through
Protection Switching Displays if the ring switch is active in the east working port.
Status- East Working Port
Protection Switching Displays if the ring switch is active in the west working port.
Status- West Working Port
Edit Click the edit link in a row to edit the information in the row.
Delete Select the check box in a row to delete the row.
Provisioning MS-SPRing/BLSR
To provision MS-SP/BLSR ring,
69
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Ring WTR The time to wait in minutes, before 05 Acceptable values range from
(Minutes) switching traffic back to work port 00 to 12 minutes.
from protect port, after the fault in
work port has been rectified.
NOTE: Cross-connects on the ring ports should be deleted before creating or deleting MS-
SPRing/BLSR.
70
Chapter 8 Working with Configuration Menu
Deleting MS-SPRing/BLSR
To delete MS-SP/BLSR ring,
NOTE: Before deleting the MS-SP/BLSR ring, ensure that all cross-connects in the MS-
SP/BLSR ring are deleted.
1. Click Configuration > Squelch Table in the navigation menu. The Configure Bulk Squelch
Table page is displayed.
Figure 28: Configure Bulk Squelch Table
71
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Managing Cross-connects
The Cross-connect option enables you to create cross-connects in a network element and
provision 1WAY, 2WAY, 3-WAY, 4-WAY, protected or unprotected cross-connects of different
capacities.
Adding Cross-Connects
To add cross-connects,
1. Click Configuration > Cross-connects in the Navigation menu. The Configure Cross-
connects pane is displayed.
72
Chapter 8 Working with Configuration Menu
73
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Circuit Identifier The name given for the cross- Tejas Networks Up to 40 alphanumeric and
connect. special characters.
Directionality The direction of the data flow 2 WAY 1WAY
in the cross-connect. 2WAY
Working Source The source port for work -- Physical & Logical E1
Port channel. All the available ports. ports.
Working The source port for the -- Physical & Logical E1
Destination Port destination channel. All the ports.
available ports.
Source Protection Parameter to enable or disable Disable Enable
/ Destination source protection. Disable
Protection Enable: The protection
path is enabled at the
source/destination.
Disable: The protection
path is disabled at the
source/destination.
Protection Source The source and the destination -- --
Port / Protection port for the protection channel.
Destination Port
Source Port The reversion mode of the Non-revertive Revertive
Revertive protection at source. Non-Revertive
Revertive: The traffic is
automatically switched to
the work path from the
protect path after the fault
in the work path is rectified.
Non-Revertive: The traffic
has to be manually switched
to the work path from the
protect path after the fault
in the work path is rectified.
Source WTR The time taken by the source to 5 1 to 12 minutes
74
Chapter 8 Working with Configuration Menu
Source Port The source port hold off time 0 The range is 10 - 100.
Holdoff(x100ms) defines the wait time for
reporting the alarms in the
interconnected rings when
failure condition exists on the
source port.
Destination Port The destination port hold off 0 The range is 10 - 100.
Holdoff(x100ms) time defines the wait time for
reporting the alarms in the
interconnected rings when
failure condition exists on the
destination port.
Filtering Cross-Connects
When you click on the Filter button, it filters cross-connect based on the selected criteria for
capacity, card, port number, etc. The filtered results are displayed in the Cross connects section
of the Configure Cross-connects preview pane.
Click Select all button to select all the filtered cross-connects and Deselect all button to clear all
the selected cross-connects.
To filter cross-connects,
75
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Editing Cross-Connects
To edit cross-connects,
Deleting Cross-Connects
To delete cross-connects,
NOTE: Bytes used for In-band communication cannot be used for configuring overhead
tunnel.
76
Chapter 8 Working with Configuration Menu
Parameter Description
Tunnel Name The Tunnel name. The Tunnel name is a combination of
the source and destination ports.
Source Port or Source Port Name The Source STM port.
Destination Port or Destination Port Name The Destination STM port.
Overhead Byte The overhead byte that is tunneled.
Delete Allows you to select the desired Tunnel name and delete.
77
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click Create Overhead tunnel. The Add Overhead Tunnel pane is displayed.
Figure 31: Add Overhead Tunnel
NOTE: You can provision a maximum of 30 overhead bytes for overhead tunneling.
1. Click Configuration > Overhead tunnel. The Configure overhead tunnels preview pane is
displayed.
2. In the delete field, select the check box for the entries to be deleted.
3. Click Delete.
78
Chapter 8 Working with Configuration Menu
2. Enter the string with which the alarms have to be identified in the Environmental Alarm
fields.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Yes. A "Successfully Created" message is displayed. The environmental alarm is
configured.
NOTE: The environmental alarm can be a set of alphanumeric characters. The maximum
number of characters allowed is 32.
79
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
SNMP allows network administrator to find and interpret network problems and plan network
growth. The TejNES SNMP is designed to provide asynchronous event notification to a
Network Management System (NMS).
1. Click Configuration > SNMP traps. The SNMP trap destination IP addresses preview pane is
displayed.
Figure 33: Provisioning SNMP Traps
NOTE: SNMP traps can be added manually or when a node is enrolled in EMS.
80
Chapter 8 Working with Configuration Menu
Managing Facilities
The Facilities option allows you to view and edit the attributes of optical ports, PDH ports,
Ethernet, and VCG ports.
1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port
interface configuration preview pane is displayed.
2. Click the desired STM/OC port link. The corresponding Provisioning Interface preview pane
is displayed.
3. Select or enter values referring to the Provision Interface STM/OC-N Parameters table.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Created" message is displayed.
81
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
82
Chapter 8 Working with Configuration Menu
83
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Miscellaneous
NOTE: Alarms are not reported by enabling B1 thresholds. All AUGs Mapping Structure
parameter is editable only when Operate on All AUGs checkbox is selected.
By default, the Threshold Crossing Alert (TCA) settings are not editable. To edit them, enable the
TCA settings first.
84
Chapter 8 Working with Configuration Menu
1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired STM/OC port. The Provisioning interface preview pane for that STM/OC
port is displayed.
To enable Set TCA for 15-min duration, click TCA Settings for 15-min duration
link. The TCA settings for 15-minute duration pane is displayed.
Figure 35: Provisioning TCA Settings for STM Ports
85
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To Set TCA for 1-day duration, click TCA Settings for 1-day duration link. The
TCA settings for 1-day duration pane is displayed.
3. Enter the threshold values in the respective text fields.
4. Click Submit. An alert is displayed prompting you to confirmation the operation.
5. Click Accept Valid Modifications. A success message is displayed.
Provisioning AUG
To provision AUG or to provision the mapping structure of the AUG/STS-3,
86
Chapter 8 Working with Configuration Menu
NOTE: In the MSP/APS configuration, the AUG parameters need to be provisioned only for
the working STM/OC-N port of the protection group. The provisioned values are
automatically propagated to the protection port.
NOTE: The signal label field is provisionable, but should not be edited as it will be
automatically assigned a value depending on the type of cross-connect provisioned. AUG can
be provisioned only if all its associated cross-connects are unprovisioned or deleted.
NOTE: Options available in the Mapping structure depends on the mapping selected while
initializing the network element. Refer Installation and Commissioning Guide (TPN: 140-
DOC000014-E) for more information.
Provisioning AU/STS
To provision AU/STS,
1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired AU/STS link. The corresponding Provision preview pane is displayed.
Figure 37: Provisioning AU4
87
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
88
Chapter 8 Working with Configuration Menu
89
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: Signal Label field will be automatically assigned a value depending on the type of
cross-connect provisioned. Transmit Trace Length and Expected Trace Length must be the
same.
1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click the desired AU/STS-1 link. The Provision AU/STS-1 preview pane is displayed.
3. Do one of the following:
To edit TCA settings for 1-day duration, click TCA Settings for 1-day duration.
To edit TCA settings for 15-min duration, click TCA Settings for 15-min
duration.
The corresponding TCA Settings preview pane is displayed.
Figure 38: Editing TCA Settings for AU4
90
Chapter 8 Working with Configuration Menu
4. Enter the required values and click Submit. An alert is displayed prompting you to confirm
the operation.
5. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.
NOTE: To reset the PM thresholds of AU/STS-1 to their default values, the Threshold field
(for TCA 15-min or 1-day) need to be set to default. To edit the AU/STS-1 PM thresholds,
set the Threshold field to enable. For details, refer Provisioning STM/OC Ports.
Provisioning TU
Tributary Units (TU) can be provisioned only after TU/VT cross-connects are created. It is
possible to retrieve or view the TU/VT parameters only when TU/VT is acting as a protecting
member for a connection.
NOTE: Presence of unprovisioned TU/VT on the far end network element leads to no
VCAT overhead transmission. The alarm raised due to the above consequence is Loss of
VCAT multiframe on TU/VT. If the STM/OC-N ports are provisioned in an MSP/APS
configuration, then you need to select the TU/VT for the corresponding work port in order
to edit the TU/VT parameters. The settings will be automatically propagated to the protection
TU/VT.
To provision TU,
1. Click Configuration > Facilities > STM/OC. The STM/OC Port interface configuration
preview pane is displayed.
2. Click on the desired AU4/STS3c. The Provision AU4/STS3c preview pane is displayed.
91
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Click on the desired TU/VT link. The Provision TU/VT preview pane is displayed.
Figure 39: Provisioning TU
4. Select or enter values in Provision TU/VT preview pane. Refer TU/VT Parameters table for
the values.
5. Click Submit. A confirmation preview pane is displayed.
6. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.
92
Chapter 8 Working with Configuration Menu
93
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The Signal Label, Extended Signal Label and Signal Label Mismatch action fields are
assigned a value depending on type of cross-connect provisioned. The Signal Label field is
made user provisionable to avoid the Signal Label Mismatch in case of connectivity between
network elements of multi vendor networks. The Extended Signal Label option is ignored for
TU-3/STS-1 and TU-12/VT-2 pass through cross-connects. The Transmit Trace fields are
editable only for add/drop cross-connects. The Transmit Trace is not editable for pass
through cross-connects.
94
Chapter 8 Working with Configuration Menu
1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port
interface configuration preview pane is displayed.
2. Click the desired AU/STS-1. The corresponding provisioning preview pane is displayed.
3. Click the desired TU/VT link. The Provision TU/VT preview pane is displayed.
4. Click TCA Settings for 15-min duration/1-day duration link to edit TCA settings for 15-min
duration. The corresponding TCA settings pane is displayed.
5. Enter the required values.
6. Click Submit. A confirmation preview pane is displayed.
7. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.
NOTE: To configure the TU/VT Performance monitoring thresholds, set the corresponding
Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM/OC-N port
preview pane.
Provision E1 Interface
To provision E1 interface,
1. Click Configuration > Facilities > E1. The E1 Interface configuration preview pane is
displayed.
95
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click the E1 interface to be provisioned. The Provision Interface E1 preview pane is displayed.
Figure 40: Provision Interface - E1
96
Chapter 8 Working with Configuration Menu
97
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Configuration > Facilities > E1/DS1. The E1/DS1 Interface Configuration preview
pane is displayed.
2. Click the desired E1/DS1 port. The Provision interface-E1/DS1 preview pane is displayed.
3. Select/Enter values referring to the provision interface-E1/DS1 parameters table.
4. Click Submit. A confirmation message is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The E1
port is provisioned.
98
Chapter 8 Working with Configuration Menu
99
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Configuration > Facilities > E1 in the Navigation menu. The E1 Interface
configuration preview pane is displayed.
2. Click the desired E1 port. The Provision interface preview pane for E1 port is displayed.
3. Click View TCA Profiles. The View TCA Profile preview pane is displayed.
100
Chapter 8 Working with Configuration Menu
4. Click Provision a new TCA Profile. The Provision New TCA Profile preview pane is
displayed.
Figure 42: Provision New TCA Profile
5. Enter values and click Create. An alert is displayed confirmation preview pane is displayed.
6. Click Yes. A "Successfully Created" message is displayed. The TCA profile is provisioned for
PDH port.
101
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
102
Chapter 8 Working with Configuration Menu
Threshold ES-TP Parameter to indicate the threshold 648 The acceptable values
(24hr) value of ES-TP. If the ES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold SES- Parameter to indicate the threshold 100 The acceptable values
TP (24hr) value of SES-TP. If the SES-TP count range from 0 to
crosses the set value, then TCA is 65535.
raised.
Threshold CV-TP Parameter to indicate the threshold 691 The acceptable values
(24hr) value of CV-TP. If the background range from 0 to
CV-TP count crosses the set value, 27561600.
then TCA is raised.
Threshold UAS- Parameter to indicate the Unavailable 10 The acceptable values
TP (24hr) Seconds (UAS) in the regenerator range from 0 to
section. 65535.
103
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Configuration > Facilities > Ethernet in the Navigation menu. The Ethernet
Interface configuration preview pane is displayed.
2. Click the desired Ethernet port to be provisioned. The Provision Ethernet Interface Port is
displayed.
Figure 43: Provisioning Ethernet Interface Port
3. Select or enter values referring to the parameters for Ethernet interface table.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
104
Chapter 8 Working with Configuration Menu
105
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: Auto negotiation Status, Link Partner Capabilities and Link Partner Flow Control
parameters are available only if Auto Negotiation is set to enable.
NOTE: The parameters Link Integrity, LinkFailureTimerValue, Link Integrity Status and
Threshold Enable for 15min/1-Day Interval are applicable for CEL card.
106
Chapter 8 Working with Configuration Menu
1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
Figure 44: Provisioning VCG Interface
107
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
108
Chapter 8 Working with Configuration Menu
VCG Circuit The identifier for the VCG. Tejas Networks Alphanumeric
Identifier characters. This field
can be left blank.
Threshold Performance monitoring thresholds for 15 Disable Disable
Enable for minute or 1 day interval. Default Profile
15min/1-Day
Interval
Number of The number of channels configured for the 0 (0 Mbps)
--
Channels group. Parameter not configurable.
Ignore RDI in Ignores the extra RDI generated by Ethernet Disable Enable
LFE cards in a uni-directional protection scheme. Disable
1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The corresponding Provisioning VCG Interface preview pane is
displayed.
109
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Click Add new VC link. The Add VC/VT to VCG preview pane is displayed.
Figure 45: Add VC to VCG
110
Chapter 8 Working with Configuration Menu
NOTE: The protection feature can be configured to function in the revertive mode, to enable
reversion of traffic from the protect fiber to the working fiber. This happens after a specified
time (wait to restore time).
1. Click Configuration > Facilities > VCG. The VCG Interface Configuration page is displayed.
2. Click the desired VCG. The Provisioning VCG Interface page is displayed.
111
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Click View VC/VT Group. The View VC/VT Group page is displayed.
Figure 46: View VC Group
112
Chapter 8 Working with Configuration Menu
Source Protection Status - The status of the source port (work or protect).
Destination Protection -
The status of the destination port (work or protect).
Status
Destination Protection - The STM/OCn channel (i.e., VCG, TU/VT values selected
for the STM/OCn port) to which the destination switches
on failure.
Working Port - The port on the working channel.
Protection Port - The port on the protection channel.
Revertive Revertive The reversion mode for the channel (revertive or Non-
revertive)
WTR - The WTR value for the channel. Only provisionable in
revertive mode
Tx Control - Transmitted LCAS control value on the associated Tx
channel.
Tx Channel MST - The transmitting member channel status.
Tx Seq - The transmitting member sequence number
Rx Control - The received LCAS control value on the associated Rx
channel.
Rx Channel MST - The receiving member channel status.
Rx Seq - The receiving member sequence number.
Channel Removed The reason for removing the channel.
-
Reason
Edit LCAS - Allows you to click the link and edit the LCAS parameters.
Edit Protection - Allows you to click the link and edit VCG Association.
113
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Deleting Channels
To delete the channels,
1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface pane is displayed.
114
Chapter 8 Working with Configuration Menu
Parameter Description
Destination The VCG port selected as Destination.
Capacity The rate of the VCG association.
Operational Status The operating status (working/down) of the channel.
Destination Protection
The status of the destination port (work or protect).
Status
Destination Protection The STM/OC channel (i.e., VCG, TU/VT values selected for the STM/OC
port) to which the destination switches on failure.
Diff Delay msec Differential Delays in milliseconds.
Tx Control Transmitted LCAS control value on the associated Tx channel.
Tx Channel MST The transmitting member channel status.
Tx Seq The transmitting member sequence number
Rx Control The received LCAS control value on the associated Rx channel.
Rx Channel MST The receiving member channel status.
Rx Seq The receiving member sequence number
115
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Provisioning LCAS
LCAS feature allows the adjustment of data capacity in real time without loss of data. It can be
defined as an adjustment scheme that increases or decreases the capacity of a container that is
transported SDH network using VC/VT.
To provision LCAS,
1. Click Configuration > Facilities > VCG. The VCG Interface configuration preview pane is
displayed.
2. Click the desired VCG. The Provisioning VCG interface preview pane is displayed.
3. Click View VC/VT Group. The View VC/VT Group preview pane is displayed.
4. Click the LCAS link in the edit LCAS column for the VC/VT you want to edit. The
corresponding Provisioning VCG Association preview pane is displayed.
Figure 49: LCAS Provisioning
5. Select Add for Transmit LCAS provision to enable the LCAS support. Select Remove for
Transmit LCAS provision to disable LCAS support.
6. Click Submit. A confirmation preview pane is displayed.
7. Click Accept Valid Modifications. A “Successfully Modified” message is displayed.
116
Chapter 8 Working with Configuration Menu
NOTE: LCAS support needs to be enabled or disabled at both the transmitter and receiver.
Parameter Description
VCG The name of the VC/VT Group to which the channel is associated.
Status The status of the channel as either up or down.
Direction The direction of VC/VT on VCG.
Transmit LCAS Provision Parameter to provision LCAS.
Add: Allows sending the data on a particular channel which is already
part of the VCG.
Remove: Disables sending the data on a particular channel which is
already part of the VCG.
Transmit Sequence number Displays the transmit sequence number.
Receive sequence number Displays the received sequence number.
Differential Delay
Displays the differential delay.
(Milliseconds)
Tx CTRL (Tx Channel) The Transmitted LCAS control value on the associated Tx channel.
Rx MST (Tx Channel) Displays the receive MST value for the transmit channel.
Rx CTRL (Rx Channel) The Received LCAS control value on the associated Rx channel.
Tx MST (Rx Channel) Displays the transmit MST value for the receive channel.
117
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Managing NE Adjacency
The NE Adjacency feature gives the information of neighbors immediate to the network
element. The Neighbor information provides the name of the physical device, address, router ID
and the status of the neighboring network elements. Auto-discovery is enabled on a port of the
network element and discovers the next hop neighbors. This feature eliminates the need to
manually create trunks on the nodes.
3. Select to enable or disable the Auto Discovery Status for the port and its containers.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
118
Chapter 8 Working with Configuration Menu
119
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Configuration > NE adjacency > Neighbour information in the Navigation menu.
The Neighbour information preview pane is displayed.
120
Chapter 8 Working with Configuration Menu
Managing DCN
DCN is an ECC (Embedded Communication Channel) on the network element.
121
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Edit Editing the respective interface.
Association The network interface name as used by the operating system.
Network interface The label of the interface.
short name
The administrative status of the interface.
Admin status Up: Sets the port in service.
Down: Sets the port out of service.
Layer 3 Protocol The Layer 3 protocol used for the interface.
Layer 2 Protocol The Layer 2 Protocol is MAC and is not editable.
Routing Protocol The routing protocol used for the interface.
IP Address The IP address of the interface.
MTU The maximum size of the packet that can be sent through the interface.
Handoff Interface Route IP address of the local machine.
Mgmt Vlan The interface on the remote node in the chassis-slot-port number format. This is
not applicable.
Delete Deleting the network interface.
1. Click Configuration > DCN > Network interface. The Network interface configuration
preview pane is displayed.
122
Chapter 8 Working with Configuration Menu
2. Click the Edit link in the Edit column for the entry to be updated. The Edit Network
Interface Provisioning preview pane is displayed.
123
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
124
Chapter 8 Working with Configuration Menu
1. Click Configuration > DCN > Network interface. The Network interface configuration
preview pane is displayed.
125
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Select or enter values referring to the Provision ECC Page Parameters table.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A success message is displayed.
Table 51: Provision ECC Page Parameters
126
Chapter 8 Working with Configuration Menu
To view provisioned static routes, click Configuration > DCN > Static route. The Static routes
configuration preview pane is displayed.
127
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
The table below describes Static route parameters and their default value.
Parameter Description
Client Type Displays the client type.
1. Click Configuration > DCN > Static route. The Static routes configuration preview pane is
displayed.
128
Chapter 8 Working with Configuration Menu
2. Click Add a new Static Route. The Creating Static Route is displayed.
Figure 56: Creating Static Route
129
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: Any invalid static route added on a point-to-point interface is added in the WUI but is
not added in the Kernel routing table.
NOTE: Any invalid static route added on a broadcast interface (eth) is blocked.
NOTE: The Next Hop IP Address has to be specified only when the static route is
provisioned on eth0. If it is ECC interface, the Next Hop IP Address need not be specified. If
the address is not specified or is invalid for eth0 interface, an error message is displayed on
submit.
130
Chapter 8 Working with Configuration Menu
1. Click Configuration > DCN > Static Route. The Static routes configuration preview pane is
displayed.
2. Select the check box in the Delete field for the static route to be deleted.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed. The static route is
deleted.
NOTE: If your PC and the network element is in a different subnetwork, communication will
be lost as a result of deleting the static route on the LAN interface.
NOTE: The user has to manually add all the IP addresses of the network elements for which
the Tejas network element has to respond. The Tejas network element sends a proxy ARP
response for all ARP requests that contain the IP address of an added network element
(regardless of whether that IP address is reachable or not from the Tejas network element).
The network element software supports viewing and adding of proxy ARP neighbors.
1. Click Configuration > DCN > Proxy ARP Neighbour. The Proxy ARP Neighbours
configuration preview pane is displayed.
131
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click Add a new Proxy ARP Neighbour. The Creating Proxy ARP Neighbour is displayed.
Figure 57: Creating Proxy ARP Neighbour
3. Select or enter values referring to Creating Proxy ARP Neighbour Parameters table.
4. Click Submit. A "Successfully Created" message is displayed. The proxy ARP neighbor is
added.
Table 54: Creating Proxy ARP Neighbour Parameters
NOTE: The maximum number of Proxy Address Resolution Protocol (ARP) neighbors in the
network element is 14. Ensure that the router ARP timers are set to less than 10 minutes to
limit the DCN outage to 10 minutes.
132
Chapter 8 Working with Configuration Menu
4. Click Confirm Delete. A "Successfully Deleted" message is displayed. The selected proxy
ARP neighbor is deleted.
NOTE: In the absence of static route, deleting Proxy ARP neighbours will result in loss of
communication to the remote network elements.
1. Click Configuration > DCN > OSPF > Area. The OSPF Area configuration preview pane is
displayed.
2. Click Add a new OSPF Area. The Creating OSPF Area preview pane is displayed.
Figure 58: Creating OSPF Area
NOTE: The default OSPF area 0.0.0.1 is the area address of the backbone.
Disabling OSPF
To disable OSPF area,
1. Click Configuration > DCN > Network Interface in the Navigation menu. The Network
interface configuration preview pane is displayed.
133
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click the edit link for the interface you want to edit. The Edit Network Interface Provisioning
preview pane is displayed.
Figure 59: Edit Network interface provisioning
CAUTION: Changing OSPF area may cause a loss of communication to the network
element.
134
Chapter 8 Working with Configuration Menu
To view serial port information, click Configuration > DCN > Serial port. The Serial port
configuration preview pane is displayed.
135
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Port Serial port nomenclature.
Application The application running on the serial interface.
Baud Rate The operating rate of serial interface.
Admin Status The administrative status of the Serial port.
Up: The port is in service
Down: The port is out of service.
Edit Edit the serial port configuration.
1. Click Configuration > DCN > Serial port. The Serial port configuration preview pane is
displayed.
2. Click the edit link in the Edit column for the port to be updated. The Serial port configuration
preview pane is displayed.
Figure 61: Serial port configuration
3. Edit required values referring to the Serial Port Configuration Parameters table.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The
serial port is edited with the required values.
136
Chapter 8 Working with Configuration Menu
137
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The AUG and AU fields are editable only if the F2 byte is selected for the Overhead
byte.
138
Chapter 8 Working with Configuration Menu
139
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE 1: Changes made to the WTR will not impact clocks that are already in WTR. The
changes to the clocks will be applied on the next switch.
BITSIN-1-10-2 - 2 MBits data in SDH mode, and 1.544 MBits Data in SONET
BITSIN-1-10-2 - 2 MBits data in SDH mode, and 1.544 MBits Data in SONET
1. Click Configuration > Synchronization > Nominate Timing Reference. The Nominate
timing references page is displayed.
140
Chapter 8 Working with Configuration Menu
2. Select the required values and click Submit. A "Successfully Created" message is displayed.
The timing reference is nominated.
141
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
The View nominated timing references preview pane lists all the nominated timing references.
The clock source tagged with an asterisk is the current active source.
1. Click Configuration > Synchronization > View Nominated Timing References. The View
nominated timing references page is displayed.
142
Chapter 8 Working with Configuration Menu
2. Click the desired clock source link in the Clock Source field. The Edit ClockSel page is
displayed.
3. Click ClearNonReversion.
4. Click Submit. A success message is displayed. You have completed the procedure.
NOTE: "ClearNonReversion" button is displayed only when the clock source is nominated
with Reversion mode as Manual in Synchronization state page and there is a failure on the
nominated timing reference.
1. Click Configuration > Synchronization > View Nominated timing references. The View
nominated timing references preview pane is displayed.
2. Click the Clock Source link to edit the clock source information. The View nominated timing
references preview pane is displayed.
3. Edit the required values.
4. Click Submit. A confirmation preview pane is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
1. Click Configuration > Synchronization > View Nominated timing references. The View
nominated timing references preview pane is displayed.
2. In the delete field, select the check box for the clock source to be deleted. The user should
manually switch away from the timing reference source to be deleted before proceeding with
the delete command.
3. Click Submit. A confirmation preview pane is displayed.
4. Click Yes. A "Successfully Deleted" message is displayed.
NOTE: If the network element is locked to a clock source that needs to be deleted, then
lockout the network element from the clock source before deleting the clock.
143
Chapter 9
Managing License
This chapter describes the License menu in the network element. The License menu allows you
to view or enable or disable the licensed features in the network element.
IN THIS CHAPTER
Enabling License Feature......................................................................... 145
Viewing Enabled License Features ......................................................... 146
Viewing Failed License Features ............................................................. 146
1. Click License > Enable License Feature. The Enable License Feature page is displayed.
Figure 63: Enable License Feature
2. Enter the LIC_TPN and click Submit. An alert is displayed prompting you to confirm the
operation.
3. Click Yes. A success message is displayed.
145
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
146
Chapter 10
Managing Faults
Fault management deals with detecting and reporting faults by the network element. Alarms are
raised to alert the user about fault conditions.
IN THIS CHAPTER
Understanding Alarms ............................................................................. 147
Viewing Active Alarms............................................................................. 148
View Suppressed Alarms.......................................................................... 150
Provision Alarm Filters ............................................................................ 150
View Alarm Filters.................................................................................... 153
Deleting Alarm Filters .............................................................................. 153
Viewing Event History............................................................................. 154
View Alarm Severity ................................................................................. 155
Setting Alarm Severity .............................................................................. 156
Understanding Alarms
Based on their severity, alarms are categorized as follows:
Critical
Major
Minor
Warnings
147
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
The active alarms are displayed in the Active Alarms pane. The list of active alarms is refreshed
after few seconds to include the new alarms raised on any object on the network element. A
Disable Auto Refresh checkbox is provided in the Active Alarms pane to stop the automatic
refreshing of the pane.
To view active alarms, click Faults > Active Alarms in the Navigation menu. The Active alarms
page is displayed.
148
Chapter 10 Managing Faults
Parameter Description
# Serial number of the alarm
Time Time when the alarm was raised according to the local time
Information Summary on the problem in the object
Severity Severity level of the alarm: Critical, Major, Minor, Warning
Object Object on which the alarm was raised.
Additional Information Displays the alarm description entered by the user while
provisioning.
NOTE: The Active alarms pane may not display the updated alarms on refreshing the Active
alarms pane in Internet Explorer versions 6.0.x on Windows XP and Windows 2000.
NOTE: To ensure display of the updated alarm list, set your browser settings as follows: On
the menu bar of your browser, click Tools > Internet Options > General. In the General
dialog box, click Settings in the Temporary Internet files section. In the Settings dialog box,
for “Check for newer versions of stored pane” select ‘Every visit to the pane’. Click OK to
close the Settings dialog box and click OK again to close the Internet dialog box.
149
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view suppressed alarms, click Faults > Suppressed Alarms in the Navigation menu. The
Suppressed Alarms page is displayed.
Parameter Description
# Serial number of the suppressed alarm
Time Time at which the alarm was raised
Alarm Information Suppressed alarm
Severity Severity of the suppressed alarm
Object Object on which the alarm was raised
Alarm Suppressor The reason why the alarm is being suppressed and not being reported on
the active alarms page
150
Chapter 10 Managing Faults
2. Click Provision a new Alarm Filter. The Provision New Alarm Filter pane is displayed.
Figure 67: Provisioning Alarm Filter
3. Select or enter values and click Create. An alert is displayed prompting you to confirm the
operation.
4. Click Yes. A successfully message is displayed.
151
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
152
Chapter 10 Managing Faults
To view provisioned alarm filters, click Faults > Alarm Filters in the navigation menu. The View
Alarm Filter preview pane is displayed.
Parameter Description
Alarm Filter Displays the name given to alarm filter.
Managed Object Displays the object on which alarm filter is applied.
Alarm Displays the suppressed alarm string.
Delete Check box that enables the user to delete the alarm filter provisioned.
1. Click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is
displayed.
2. Select the filters to be deleted in the delete field.
3. Click Delete. A confirmation page is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
153
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
The Next and Previous buttons displays the pane immediate to the current displayed pane. The
Show All Events link opens a new window, in which all the events are listed. The Back to
Node View link takes you to NE information pane. The Stop Refresh button, when clicked,
stops automatic refresh of the Event History pane and is displayed as Start Refresh. The Start
Refresh button when clicked starts the refresh of the Event History pane. The Last Refreshed
field indicates when the pane was refreshed last.
154
Chapter 10 Managing Faults
To view Alarm Severity, click Faults > Alarm Severity in the Navigation menu. The Alarm
Severity page is displayed.
155
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Faults > Alarm Severity in the Navigation menu. The Alarm Severity page is displayed.
Figure 71: Alarm severity
2. In the Severity field, for the alarm whose severity is to be changed, select the desired severity
level from the drop down menu.
3. Click Submit. The page refreshes with the changes made. The field modified is indicated by
an asterisk (*). Click Reset to reject the changes. Click Restore Defaults to bring back the
alarm severity levels to default values.
156
Chapter 11
IN THIS CHAPTER
Managing STM/OC Port Profiles........................................................... 157
Managing Path Alarm Profiles................................................................. 161
STM/OC port profile is non-provisionable, but can be customized to point to different path
profiles. The changes made will be applicable only for new connections. The existing connections
will remain unchanged.
157
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view STM Port Profiles, Click Profiles > STM Port Profile. The View STM Port Profile
preview pane is displayed.
1. Click the STM port profile provided by default:
Internal NNI: The Internal NNI profile indicates preferences within EMS
domains.
External NNI: The External NNI profile indicates preferences between different
management domains.
Figure 73: View STM Port Profiles
158
Chapter 11 Working with Profiles
Parameter Description
1. Click Profiles > STM Port Profile. The View STM Port Profile preview pane is displayed.
2. Do one of the following:
Click the View profile to be edited. Selected View profile preview pane is
displayed. Click on the Edit link
Click edit in the Edit column for the entry to be updated.
159
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Edit required values and click Submit. A confirmation preview pane is displayed.
4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
160
Chapter 11 Working with Profiles
161
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
162
Chapter 11 Working with Profiles
Parameter Description
TIM Action Displays the provisioned TIM Action settings for the profile.
Report TIM, No Downstream AIS: Reports the TIM alarm without affecting traffic.
Ignore TIM: No alarm is reported or traffic affecting action is taken on TIM.
Report TIM, Downstream AIS: Reports the TIM alarm and transmits downstream
AIS so that traffic is switched.
Suppress TIM: Reports the TIM alarm, but in the suppressed alarm page, and there
are no traffic affecting alarms.
Signal Label Displays the provisioned SLM Action settings for the profile
Mismatch Report SLM, No Downstream AIS: On Signal Label Mismatch (SLM), PLM alarm is
Action reported, but no downstream AIS is sent.
Ignore SLM: No action is taken on SLM.
Downstream AIS on SLM: Reports PLM alarm and sends AIS downstream (traffic
affecting) on SLM.
Suppress SLM: The SLM alarm is reported in the suppressed alarm page.
UNEQ Signal Displays the provisioned UNEQ Signal Label Action settings for the profile.
Label Action Report UNEQ, No Downstream AIS: Reports the UNEQ alarm without affecting
traffic.
Ignore UNEQ: No alarm is reported or traffic affecting action is taken on an UNEQ.
Downstream AIS on UNEQ: Reports the UNEQ alarm and transmits downstream
AIS. Traffic is affected.
Suppress UNEQ: Reports the UNEQ alarm in the suppressed alarm page. There is
no traffic affecting alarms.
Masked Displays this list of masked alarms.
Alarms List
or Select
Alarms for
Masking
NOTE: Default path for alarm profiles are marked with an asterisk and cannot be deleted.
1. Click Profiles > Path Alarm Profiles in the navigation menu. The View Path Alarm Profile is
displayed.
163
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
2. Click Provision a new Path Alarm Profile. The Provision New Path Alarm Profile is
displayed.
Figure 76: Provisioning Path Alarm Profile
164
Chapter 11 Working with Profiles
165
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: Default path for alarm profiles are indicated with an asterisk and cannot be deleted.
1. Click Profiles > Path Alarm Profiles. The View Path Alarm Profile preview pane is displayed.
2. Under Delete column, select the check box for the profiles to be deleted.
3. Click Delete. A confirmation message is displayed.
4. Click Confirm Delete. A 'Successfully Deleted' message is displayed. The selected path alarm
profile is deleted.
NOTE: Default path alarm profiles are indicated with an asterisk. Default path alarm profiles
cannot be deleted. A path alarm assigned to an AU/STS, TU/VT or STM/OC cannot be
deleted.
166
Chapter 12
Performance Monitoring
This chapter explains how you can monitor various performance statistics.
IN THIS CHAPTER
Viewing STM/OC Performance Statistics ............................................. 167
Viewing E1 Port Performance Statistics................................................. 174
Viewing PDH (E1/DS1) Port Performance Statistics .......................... 176
Viewing Ethernet Performance Statistics ............................................... 178
Viewing VCG Performance Statistics ..................................................... 181
Monitoring Input Voltage Statistics ........................................................ 183
Editing Voltage Thresholds for PSU ...................................................... 184
167
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
168
Chapter 12 Performance Monitoring
Reset options available under Multiplex section/Line are—Reset Multiplex Section/Line Current
15 Min Statistics, Reset Multiplex Section/Line Current Day Statistics, Reset Multiplex
Section/Line Current 15 Min (Far End), Reset Multiplex Section/Line Current Day (Far End).
Describes the Regenerator Section performance parameters when the network element is
operated in SDH/SONET mode.
Parameter Description
ES The errored second in the regenerator section.
SES The severely errored second in the regenerator section.
UAS The unavailable second in the regenerator section.
SEP The severely errored period in the regenerator section.
EB The errored blocks in the regenerator section.
BBE The background block errors in the regenerator section.
ESR The errored seconds ratio in the regenerator section.
SESR The severely errored seconds ratio in the regenerator section.
BBER The background block error ratio in the regenerator section.
SEPI The severely errored period intensity in the regenerator section.
Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval in the regenerator section. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 68: Multiplex Section performance parameters in SDH/SONET mode
Parameter Description
ES The errored second in the multiplex section.
SES The severely errored second in the multiplex section.
UAS The unavailable second in the multiplex section.
SEP The severely errored period in the multiplex section.
EB The errored blocks in the multiplex section.
BBE The background block errors in the multiplex section.
ESR The errored seconds ratio in the multiplex section.
SESR The severely errored seconds ratio in the multiplex section.
BBER The background block error ratio in the multiplex section.
SEPI Displays the severely errored period intensity in the multiplex section.
169
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Interval Valid Interval Valid is the validity of the interval and the validity of data during
that interval in the multiplex section. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
ES-FE The errored seconds at far end in the multiplex section.
SES-FE The severely errored seconds at far end in the multiplex section.
BBE-FE The background blocked errors at far end in the multiplex section.
UAS-FE The unavailable seconds at far end in the multiplex section.
SEP-FE The severely errored period at far end in the multiplex section.
Far End Displays the validity of data during that interval at far end in the multiplex
Interval Valid section. 1 indicates the data displayed during that interval is valid, while 0
indicates the data is not valid.
1. Click Performance.
2. Do one of the following:
To view performance statistics on current interval, click Current interval >
STM/OC. The STM/OC-Current interval statistics page is displayed.
To view performance statistics for 15min interval, click 15min interval >
STM/OC. The STM/OC-Interval statistics page is displayed.
To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Path. The STM/OC statistics page is displayed.
4. Click on the desired TU/VT. Performance Statistics of the Path is displayed.
Figure 78: Viewing Performance Statistics of Path
170
Chapter 12 Performance Monitoring
NOTE: The AU/STS hyperlink takes you to the corresponding performance statistics.
The reset options available for each port are—Reset All Current 15 Min Statistics, Reset All
Current Day Statistics, Reset All Current 15 Min (Far End), Reset All Current Day (Far End),
Reset AU Current 15 Min Statistics, Reset AU Current Day Statistics, Reset AU Current 15 Min
(Far End), Reset AU Current Day (Far End).
The current interval statistics of the Path is available for the current time interval, previous 15
minutes, current day and the previous day.
Parameter Description
ES The errored second.
SES The severely errored second.
UAS The unavailable second.
SEP The severely errored period in the path
EB The errored blocks.
BBE The background block errors.
PPJE The positive pointer justification events.
NPJE The negative pointer justification events.
ESR The errored seconds ratio.
SESR The severely errored seconds ratio.
BBER The background block error ratio.
SEPI The severely errored period intensity in the path.
Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval. '1' indicates the data displayed during that interval is valid, while '0'
indicates the data is not valid.
ES-FE The errored seconds at far end.
SES-FE The severely errored seconds at far end.
BBE-FE The background blocked errors at far end.
UAS-FE The unavailable seconds at far end.
SEP-FE The severely errored period at far end in the path.
Far End Interval Valid The validity of data during that interval at far end. '1' indicates the data
displayed during that interval is valid, while '0' indicates the data is not valid.
171
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
172
Chapter 12 Performance Monitoring
NOTE: The current interval statistics of the Tributary Unit is available for the current time
interval, previous 15 minutes, current day, and the previous day.
Reset options available for each TU/VT are—Reset All Current 15 Min Statistics, Reset All
Current Day Statistics, Reset All Current 15 Min (Far End), Reset All Current Day (Far End).
Parameter Description
ES The errored second.
SES The severely errored second.
UAS The unavailable second.
SEP The severely errored period.
EB The errored blocks.
BBE The background blocked error.
ESR The error seconds ratio.
SESR The severely error seconds ratio.
BBER The background blocked error ratio.
SEPI The severely errored period intensity.
Interval Valid The lower order path interval valid. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
ES-FE The error seconds at far end.
SES-FE The severely error seconds at far end.
BBE-FE The background blocked errors at far end.
UAS-FE The unavailable seconds at far end.
SEP-FE The severely errored period at far end.
Far End Interval The validity of data during that interval at far end. 1 indicates the data displayed
Valid during that interval is valid, while 0 indicates the data is not valid.
173
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view performance statistics for previous day, click Previous day > STM/OC.
The STM/OC-Previous day's history page is displayed.
3. Click Transceiver to view performance statistics for Transceiver. The performance statistics
of the Transceiver is displayed.
Figure 80: Performance Statistics of Transceiver
Parameter Description
Received Power (dBm) The value of the received power.
Transmit Power (dBm) The value of the transmitted power.
Laser Bias (mA) The Laser Bias value as received from the device.
Laser Voltage (Volts) The Laser Voltage as received from the device.
Laser Temperature The Laser Temperature as received from the device.
(degrees C)
Interval Valid Indicates the validity of the interval. 1 indicates the data displayed
during that interval is valid, while 0 indicates the data is not valid
Timestamp It contains the date and time in UNIX format.
174
Chapter 12 Performance Monitoring
4. To view performance statistics for previous day, click Previous day > E1. The E1-Previous
day's history page is displayed.
5. Click the desired port. The performance statistics of the port chosen is displayed.
Figure 81: Performance Attributes
175
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The frame status of the port is displayed on the performance statistics page.
Parameter Description
CV-L The coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more
anomalies and/or defects on the line.
SES-L The severely error seconds.
UAS-L The unavailable seconds on the line.
Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 73: E1 Path Performance Parameters
Parameter Description
EB-P The errored blocks on the path.
BBE-P The background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more
anomalies and/or defects on the path.
SES-P The severely errored seconds on the path.
UAS-P The unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during that interval
is valid, while 0 indicates the data is not valid.
176
Chapter 12 Performance Monitoring
5. Click the desired PDH port. The performance statistics of the PDH port chosen is displayed.
Figure 82: Performance Attributes
177
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: The frame status of the port is displayed on the performance statistics page.
Parameter Description
CV-L The coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more
anomalies and/or defects on the line.
SES-L The severely error seconds.
UAS-L The unavailable seconds on the line.
Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
Table 75: E1/DS1 Path Performance Parameters
Parameter Description
EB-P The errored blocks on the path.
BBE-P The background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more
anomalies and/or defects on the path.
SES-P The severely errored seconds on the path.
UAS-P The unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during that interval
is valid, while 0 indicates the data is not valid.
178
Chapter 12 Performance Monitoring
3. Click on the desired Ethernet port. The performance statistics of the selected Ethernet port is
displayed.
Figure 83: Ethernet-Current interval statistics
179
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Section Interval Valid Displays the section interval valid.
Ethernet Interval Valid Displays the valid interval on Ethernet interface.
Packets RX/TX 64 Bytes Count of number of 64 byte length packets.
Packets RX/TX 65-127 Bytes Count of number of 65-127 byte length packets.
Packets RX/TX 128-255 Bytes Count of number of 128-255 byte length packets.
Packets RX/TX 256-511 Bytes Count of number of 256-511 byte length packets.
Packets RX/TX 512-1023 Bytes Count of number of 512-1023 byte length packets.
Packets RX/TX 1024-1518 Count of number of 1024-1518 byte length packets.
Bytes
Packets RX/TX 1519-1522 Count of number of 1519-1522 byte length packets.
Bytes
Frames Received Count of number of valid frames received with correct FCS value.
Octets Received Count of number of bytes received.
Frames Transmitted Count of number of frames transmitted.
Octets Transmitted Count of number of bytes transmitted.
FCS Errors RX Count of number of received frames with incorrect FCS.
Frames Too Short RX Count of number of received frames less than 64 bytes, with a correct
FCS value. When in half-duplex mode, the actual Receive undersize
frame count is determined by TUND, TXCL and TLCL.
Pause Frames Received Count of number of pause frames received on the interface.
Broadcast Frames Received Count of number of broadcast frames received on the interface.
Broadcast Frames Transmitted Count of number of broadcast frames transmitted on the interface.
Multicast Frames Received Count of number of multicast frames received on the interface.
Multicast Frames Transmitted Count of number of multicast frames transmitted on the interface.
Frame Jabber RX Count of number of jabber frames received on the interface.
Discarded Rx packets Count of number of receive frames discarded.
Discarded Tx Packets Count of number of transmit frames discarded.
Ingress Other Discards Count of frames discarded apart from the ingress definitions.
MTU Discards Count of frames discarded based on MTU.
Packets RX/TX > 1522 (Jumbo Count of number of 1522-9600 byte length packets.
Frames)
180
Chapter 12 Performance Monitoring
181
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
BINNED COUNTERS
Idle Seconds The count of idle second in VCG traffic. An idle second is a second in which
no data frames or errored frames are received. This counter will be
incremented in a non-ES/non-SES/non-UAS second.
ES The count of Errored Seconds.
SES The count of Severely Error Seconds.
UAS The count of Un Available Seconds.
Valid Frames The count of valid frames transmitted count.
Transmitted
Valid Frames Received The count of valid frames received count.
Valid bytes Transmitted The count of valid bytes transmitted count.
Valid bytes Received The count of valid bytes Received count.
Core Header Single The GFP (Generic Framing Procedure as in G.7041) core header single errors
Error Corrections correction count.
Type Header Single The GFP type header single error correction count.
Error Corrections
Core Header CRC The GFP core header CRC error count.
Errors
Type Header CRC The GFP type header CRC error count.
Errors
Payload FCS Errors The payload FCS incorrect count.
VCG Interval Valid Indicates whether the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.
RUNNING COUNTERS
Section Interval Valid Interval Valid is the validity of the interval and the validity of data during that
interval.
Unacceptable Frame Count of frames discarded based on frame policy.
Type
CoS Queue 1 Enqueue Number of packets discarded in cos queue 0.
Discards
CoS Queue 2 Enqueue Number of packets discarded in cos queue 1.
Discards
CoS Queue 3 Enqueue Number of packets discarded in cos queue 2.
Discards
CoS Queue 4 Enqueue Number of packets discarded in cos queue 3.
Discards
182
Chapter 12 Performance Monitoring
Parameter Description
CoS Queue 5 Enqueue Number of packets discarded in cos queue 4.
Discards
CoS Queue 6 Enqueue Number of packets discarded in cos queue 5.
Discards
CoS Queue 7 Enqueue Number of packets discarded in cos queue 6.
Discards
CoS Queue 8 Enqueue Number of packets discarded in cos queue 7.
Discards
MTU Discards Count of frames discarded based on MTU.
Service Lookup Failure Count of ingress frames which does not match any of the FP definitions.
Ingress Other Discards Count of frames discarded apart from the ingress definitions.
Frames Received Count of number of valid frames received with correct FCS value.
Octets Received Count of number of bytes received.
Frames Transmitted Count of number of frames transmitted.
Octets Transmitted Count of number of bytes transmitted.
Discarded Rx packets Count of number of receive frames discarded.
Discarded Tx Packets Count of number of transmit frames discarded.
183
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Link Allows you to edit the required voltage thresholds for input power feed.
Card Name Displays the name of the card for which statistics is shown.
Index Displays the index value given.
Voltage Value (volts) Displays the default voltage value.
Current Voltage Value (volts) Displays the present voltage value.
Voltage high threshold (volts) Displays the value for high threshold voltage that is set.
Voltage low threshold (volts) Displays the value for low threshold voltage that is set.
Admin Status Displays whether the admin status is up or down.
1. Click Performance > input voltage monitor in the navigation menu. The Input Voltage
Statistics page is displayed.
2. Click Edit in Link column against the PSU. Edit Voltage Thresholds for InputPowerFeed
page is displayed.
Figure 86: Edit Voltage Thresholds for InputPowerFeed_DPU
3. Select or enter the values and click Submit. A success message is displayed.
184
Chapter 13
Security Management
This chapter describes about users and their privileges to access the network element. The
network element provides four different user access groups (ADMIN, OPERATOR,
OPERATOR2, and USER).
IN THIS CHAPTER
Working with RADIUS Server ................................................................ 185
Managing User Accounts ......................................................................... 188
Managing User-Lockout........................................................................... 192
Managing Security Settings ...................................................................... 194
Managing Audit Logs ............................................................................... 202
Managing User Sessions ........................................................................... 205
When RADIUS setting is enabled on the network element, the network element will use the
authentication details configured on a remote server rather than the authentication details present
on the network element.
185
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Security > RADIUS settings in the navigation menu. The View RADIUS pane is
displayed.
186
Chapter 13 Security Management
2. Click Provision a new RADIUS Server. The Provision New RADIUS Server pane is
displayed.
Figure 88: Provisioning RADIUS Server
3. Select or enter values and click Create. A "Successfully Created" message is displayed.
Table 79: Provision RADIUS Server
1. Click Security > RADIUS settings in the navigation menu. The View RADIUS page is
displayed.
2. Select Enable for RADIUS Authentication field, listed above the View RADIUS page.
187
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
3. Enter suitable value for RADIUS Cache Time out (Minutes) field, present above the View
RADIUS page.
4. Click Submit. A "Successfully Modified" message is displayed.
1. Click Security> RADIUS settings in the navigation menu. The View RADIUS page is
displayed.
2. Click the Edit link for the entry to be updated. The Edit RADIUS server page is displayed.
Or
Click the entry name. The Edit RADIUS server page is displayed.
3. Edit required values.
4. Click Submit. A confirmation page is displayed.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
To manage user accounts, click Security> Manage users in the navigation menu. The Manage
users page is displayed.
1. Click Security> Manage users in the navigation menu. The Manage Users page is displayed.
188
Chapter 13 Security Management
189
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
190
Chapter 13 Security Management
1. Click Security > Manage users in the navigation menu. The Manage Users page is displayed.
2. Click User Name of the user to be updated. A page for modifying the user account is
displayed.
3. Edit required values referring to table mentioned in Creating User Accounts.
4. Click Submit. A success message is displayed.
To modify password,
1. Click Security > Manage users in the navigation menu. The Manage Users page is displayed.
2. Enter a new password in the Password field. Re-enter the password in the Confirm Password
field.
3. Click Submit. A "Successfully Modified" message is displayed.
NOTE: For an administrator, the administrator should click the user name link in the user
name field to change the password.
1. Click Security > Manage Users in the navigation menu. The Manage Users page is displayed.
2. In the Delete field, select the check box of the entries to be deleted.
3. Click Submit. A confirmation page is displayed.
4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
NOTE: When a user account is deleted, other active sessions using this account will be
automatically closed or logged off and the user will be prompted to log back in with another
valid user account.
191
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Managing User-Lockout
The users with administrator privileges can disable a user account by setting the " User lockout "
parameter. When the user is locked out during an active session, the authentication information
stored in the cache is used for the session until the user logs out. The next time the user attempts
to log in to the network element, access is denied.
NOTE: In User lockout feature RADIUS users with ADMIN privilege can be locked through
debug interfaces, namely telnet, ssh, and ftp. The RADIUS user created with same name as
LOCAL user will not be locked out if the LOCAL user is an ADMIN user.
Configuring UserLock
To configure UserLock,
192
Chapter 13 Security Management
Unlocking Users
To view and unlock locked users,
193
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
194
Chapter 13 Security Management
Parameter Description
BlockedPorts Clicking on this link displays the list of ports Blocked.
BlockedIPs Clicking on this link displays the list of IPs Blocked.
CHAP Settings Allows you enable or disable CHAP settings.
CHAP Secret Allows you to enable or disable CHAP Secret.
Login Warning Allows you to enter the warning that is displayed in the Login
page.
Login Notice Allows you to enter the notice that is displayed in the Login page.
SNMP Agent Allows you to enable and disable SNMP Agent
SNMP Community Allows you to enter the SNMP community.
UserLock Settings Allows you to enable and disable UserLock Settings.
Local Auth on Fallback Allows you to enable or disable fall back to the local user
database if the RADIUS server fails during authentication.
Configure Ssh Allows you to turn on Secure Shell (Ssh) protocol. The protocol
secures the sessions using standard cryptographic mechanisms.
Regenerate Keys Allows you to regenerate keys. Clicking on this link allows you to
select the key type for Secure Shell (Ssh) from the following:
dsa
rsa
Provision Keys Clicking on this link allows you to provision Secure Shell (ssh)
keys. You can enter the location of the public and private key
files, and select the key type.
HMAC Selection Clicking on this link allows you to select the Hmac to be
supported. HMAC is used for calculating message authentication
code involving a cryptographic hash function(MD5 and SHA1) in
combination with a secret key. HMAC can verify the data
integrity and authenticity of a message. The size of the output for
Hmacs are as follows.
hmac-md5(128 bits)
hmac-md5-96(96 bits)
hmac-sha1(160 bits)
hmac-sha1-96(96 bits)
Cipher Selection Clicking on this link allows you to select the Cipher to be
supported. In Ciphers, “aes” and “des” are symmetric-key
encryption standards, and the number following specifies the key
size.
195
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Blocking Ports
The open ports to NE might be unused and can be vulnerable to attacks from outside. Port
scanners such as nmap utility can be used to determine the open ports on the NE. The hacker
can stop/affect NE functionalities by detecting the vulnerabilities in any of these open ports. The
administrator should block such vulnerable ports.
To block ports,
196
Chapter 13 Security Management
Unblocking Ports
To unblock a port,
1. Click Security > Security Settings. The Security settings preview pane is displayed.
197
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Blocking an IP
Admin can block the IP's so that it disallows complete access to Network Element from that
source IP. This is useful to block the IP Address from which invalid login attempts or
unauthorized access to Network Element is attempted.
To block an IP,
1. Log into the network element with admin access privilege.
2. Click Security > Security Settings.
3. Click BlockedIPs. The list of Blocked IPs preview pane is displayed.
4. Click Block a New IP. The Block an IP preview pane is displayed.
Figure 95: Block a IP
198
Chapter 13 Security Management
Unblocking an IP
To unblock an IP address,
To login,
1. Enter Username.
2. Select Domain as CHALLENGE.
3. Click Submit.
4. Enter Response.
5. Click Submit. Authentication result is displayed.
Configuring Ssh
To configure Ssh,
199
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Regenerate Keys
To create and check the keys on the network element,
1. Click Security > Security Settings. The Security settings preview pane is displayed.
2. Click Regenerate Keys. The Keytype option is displayed.
Figure 96: Regenerate Keys
Provision Keys
To validate the provisioned key pair,
1. Click Security > Security Settings. The Security settings preview pane is displayed.
200
Chapter 13 Security Management
3. Select from the pull down menu or enter the appropriate values in the corresponding fields.
4. Click Submit. The Validation of keys is successful on network element.
HMAC Selection
To select the HMAC listed on the network element,
1. Click Security > Security Settings. The Security settings preview pane is displayed.
2. Click HMAC Selection. The HMAC selection page is displayed.
Figure 98: HMAC Selection
201
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Cipher Selection
To configure the cipher algorithm to be supported or used by SSH server,
1. Click Security > Security Settings. The Security Settings preview pane is displayed.
2. Click Cipher Selection. The Cipher Selection page is displayed.
Figure 99: Cipher Selection
202
Chapter 13 Security Management
Viewing Logs
To view logs, click Security > Audit Logs. The Audit Log page is displayed.
203
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Field Description
Index Displays the Index number of the log.
Operation Displays the type of operation done
Add
Change
Delete
Object Displays the object ID on which the operation is done.
Attributes Displays the attributes associated with object.
Time Displays the date and time of the operation.
Session Displays the Session number.
Interface Displays the type of interface used for the operation.
User Displays the name of the user.
Domain Displays the domain address.
Host Displays the IP address of the Host.
LATEST Click link to display the latest set of audit log.
OLDER Click link to display the older set of audit log.
1. Click Security > Audit Logs. The Audit Log page is displayed.
2. Click Collect Audit Logs Archive. Collect Audit Logs Archive pane is displayed.
Figure 101: Collect Audit Logs Archive
204
Chapter 13 Security Management
205
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Parameter Description
Session Timeout The time duration after which the session times out.
(Minutes)
Maximum HTTP The maximum number of HTTP sessions allowed on the network element.
Sessions
Index The Index number assigned to the session.
User The user logged into the network element.
Host The remote IP address from which the network element is accessed.
Client Displays the Browser name at the Host IP which is being used for the HTTP
session.
Established The date and time when the session was established.
Last Activity The date and time when the session was closed.
Domain Displays domain name.
Connection Security Displays connection security.
Force-out The admin can terminate the HTTP session of the user or operator forcibly.
1. Click Security > HTTP Sessions. The information on the Active HTTP sessions is displayed.
2. Enter values for the HTTP Session Timeout and Maximum HTTP sessions.
3. Click Submit. A confirmation page is displayed.
4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The
HTTP session is configured.
NOTE: The acceptable value for Session Timeout is 0 to 300 minutes and the acceptable value
for Maximum HTTP Sessions is 1 to 30.
206
Chapter 13 Security Management
Parameter Description
Index Displays the Index number of the log.
Status Displays status of the link.
User Displays the name of the user.
Domain Displays domain name.
Connection Security Displays connection security.
Client Displays the client details.
Host Displays the IP address of the Host.
Established Displays the Date and Time at which the session was established.
Closed Displays date and time at which the session was closed.
207
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view InvalidLogins History, click Security > User sessions > InvalidLogins History. The
Invalid Login Sessions History preview pane is displayed.
Parameter Description
Index Displays index number.
User Displays user name.
Domain Displays domain name
Connection Security Displays Connection Security
Client Displays the client details.
Host Displays the Host
Established Displays the Established
LATEST Click LATEST link to view the history of the latest sessions.
NEXT Click NEXT link to view the next list of sessions history page.
PREVIOUS Click PREVIOUS link to view the previous list of sessions history page.
208
Chapter 14
Maintenance Operations
This chapter describes the operations available under Maintenance in the Navigation menu.
IN THIS CHAPTER
Editing System Settings ............................................................................ 210
Viewing System Upgrade History ........................................................... 211
Viewing Load Availability ........................................................................ 212
Rebooting Cards ....................................................................................... 213
System Restart options ............................................................................. 213
Adding System Notes ............................................................................... 216
Performing Loop-Backs........................................................................... 216
Diagnostics ................................................................................................ 219
Configuration management ..................................................................... 229
Upgrade Operations ................................................................................. 236
209
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Maintenance > System Settings in the navigation menu. The System Settings preview
pane is displayed.
Figure 105: System settings
2. Set values. Refer System Setting Parameters table for more information.
3. Click Submit. A "Successfully Modified" message is displayed.
Table 87: System Setting Parameters
210
Chapter 14 Maintenance Operations
To view system changes, click Maintenance > System Changes. The SYSTEM UPGRADE
HISTORY page is displayed.
Parameter Description
Operation Displays the operation performed on the node.
Time Displays the time of operation performed on the node.
Detail Displays the operation details of the event performed on the
node.
211
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
To view load availability, click Maintenance > Load availability. The Load Availability preview
pane is displayed.
Parameter Description
Software Image Displays the software release of the network element.
Firmware Image Displays the firmware release of the network element.
Documentation Image Displays the documentation bundle available for the software release.
Catalog Displays the catalog file name.
Unified Tarkit Available True indicates that Unified Tarkit is available.
False indicates that Unified Tarkit is not available.
212
Chapter 14 Maintenance Operations
Rebooting Cards
Cards need to be rebooted in case of FPGA upgrades.
Warm Reboot: Warm reboot is applicable only for the Processor Cards and reboots the cards
without any traffic disruption.
Cold Reboot: Cold reboot disrupts traffic on the card for the period while the card is
rebooting.
1. Click Maintenance > Warm Reboot Cards in the navigation menu. The Warm Reboot Cards
preview pane is displayed.
2. Select the cards to be rebooted in the Warm Reboot column.
3. Click Reboot. A confirmation message is displayed.
4. Click Yes. The warm reboot of cards is successful.
1. Click Maintenance > Cold Reboot cards in the navigation menu. The Cold Reboot cards
preview pane is displayed.
2. Select the cards to be rebooted in the Cold Reboot column.
3. Click Reboot. A confirmation message is displayed.
4. Click Yes. The reboot of cards is successful.
213
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load
management preview pane is displayed.
2. Click Warm restart. The network element restarts in the warm restart mode.
214
Chapter 14 Maintenance Operations
1. Click Maintenance > System Restart Options in the navigation menu. The Reset and load
management preview pane is displayed.
2. Click Cold restart. The network element restarts in the warm restart mode.
215
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Performing Loop-Backs
Loopbacks are performed to check the continuity on the ports. The ports can be configured for
facility loopback and terminal loopback. The exact location of failure can be detected using
loopbacks. You can perform facility and terminal loopbacks to test the electrical connectivity of
the network element. When a facility loopback is operated on Ethernet and optical ports, AIS is
sent downstream.
Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility Loopback Loopback is configured at the ingress.
Terminal Loopback Loopback is configured at the egress.
216
Chapter 14 Maintenance Operations
1. Click Maintenance > Loop-Backs > STM/OCn in the navigation menu. The STM/OCn Port
loopback preview pane is displayed.
2. Click the port on which you want to perform the loopback. The Port maintenance preview
pane is displayed.
Figure 111: Performing Loopback on STM Ports
3. Select the desired loopback operation from the LoopBack Mode drop-down menu.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Table 91: LoopBack Mode parameters
Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility LoopBack Loopback is configured at the ingress.
Terminal LoopBack Loopback is configured at the egress.
Transparent The traffic is looped back and a copy of the traffic is sent forward. This
Loopback allows loopbacks on optical ports without disrupting all the services in the
card.
217
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Maintenance > Loop-Backs > PDH in the navigation menu. The PDH Port loopback
preview pane is displayed.
Figure 112: Performing Loopback on PDH Ports
2. Click the port on which you want to perform the loopback. The Port maintenance preview
pane is displayed.
3. Select the desired loopback operation from the LoopBack Mode drop-down list.
4. Click Submit. An alert is displayed prompting you to confirm the operation.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Table 92: PDH Port Loop-back Mode
Parameter Description
Normal Operation Normal operation is configured on the Ethernet ports.
Facility LoopBack Loopback is configured at the ingress.
Terminal LoopBack Loopback is configured at the egress.
Transparent Loopback The traffic is looped back and a copy of the traffic is sent forward. This
allows loopbacks on optical ports without disrupting all the services in the
card.
1. Click Maintenance > Loop-Backs > Ethernet in the navigation menu. The Ethernet Port
loopback preview pane is displayed.
218
Chapter 14 Maintenance Operations
2. Click the desired Ethernet port. The Port maintenance ETH<port> preview pane is displayed.
Figure 113: Port maintenance ETH Loopback
Diagnostics
The Diagnostics menu enables the user to view the system diagnostics and the OSPF related
information.
The OSPF monitor enables monitoring the neighbors of a particular node and debugging the
routing information for the IBC (In Band Communication). The OSPF parameters can be
configured for all the embedded control channel interfaces and for the NMS port to enable
routing between these interfaces.
System diagnostics data comprises log files and dump files which provide information on faults.
The diagnostic data can be used for analyzing problems arising in any network element.
219
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
220
Chapter 14 Maintenance Operations
The following OSPF protocol member parameters can be accessed by clicking the respective
links shown in the preview pane above.
Areas
The Area indicates the Open Shortest Path First area to which an attached network belongs. The
area data structure contains all the information used to run the basic OSPF routing algorithm.
Each area maintains its own link-state database. A network belongs to a single area, and a router
interface connects to a single area. Each router adjacency also belongs to a single area.
Field Description
Area Displays the area ID, which is a 32-bit number identifying the area.
#Ifcs Displays the number of ECC interfaces which are part of the area.
#Routers Displays the number of reachable routers in the area.
#LSAs (Link Displays the total LSAs in the network pertaining to this area.
State
Advertisement)
Xsum Displays the checksum on the area database maintained by the node.
Comments Displays the description of the area capability—transit/stub/demand-capable/no-
import.
Database
The Database member displays the format and function of the LSA.
Field Description
The Interfaces member displays the type of physical network interface. Different interfaces are
eth, or ecc.
221
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Field Description
Phy Displays the name of physical network interface. Different interfaces are eth, hdlcppp,
ecc.
Addr Displays the address of the interface available.
Area Displays the area of the OSPF network to which interface belongs.
Type Indicates the type of the link. Types of links can be
BCast (Broadcast)
P-P (Point-to-Point)
State Displays the state of the OSPF process.
#Nbr Displays the number of neighbors on the link.
#Adj Displays the number of adjacencies maintained by the network element's OSPF
database.
Cost Displays the metric used to quantify links which the network element has with other
network elements.
Neighbors
The Neighbors member displays the name of the physical network interface, address, router ID
and state of the neighbors.
Field Description
Phy Displays the name of physical network interface. Different interfaces are eth, hdlcppp,
ecc.
Addr Displays the address of the neighboring network element.
ID Displays the OSPF router Id of the neighboring network element.
State Displays the state of the OSPF process.
Full: Indicates completion of the OSPF process, where the routing information
has been completely exchanged with the neighbor.
Exchange: Indicates that information exchange between the neighbors is
underway.
1-Way: Indicates traffic transmission is possible only from the network element to
its neighbor and not vice versa, due to some error/defect.
2-Way: Indicates that traffic transmission is possible from network element as
well as from its neighbor.
#DD Displays the number of database descriptor packets being received by the network
element.
#Req Displays the number of requests received by the network element for a database
description over that interface.
#Rxmt Displays the number of retransmissions of database descriptions requested by the
222
Chapter 14 Maintenance Operations
Field Description
neighbors due to errors/defects in the previous transmission.
Statistics
The Statistics member displays the checksum of number of external LSAs received by the network
element and the checksum of the Autonomous System (AS) externals.
OSPF statistics parameters
Field Description
Router ID Displays the 32-bit number assigned to each router running the OSPF protocol.
# AS-external- Displays the number of external LSAs received by the network element.
LSAs
ASE checksum Displays the checksum of the AS externals.
#ASEs originated Displays the number of external LSAs originated by the network element.
ASEs Displays the maximum number of AS-external-LSAs in the database.
(Autonomous
System External)
allowed
#Dijkstras Displays the number of times the dijkstra algorithm run on the LSA database.
#Areas Displays the number of areas the network element is a part of.
#Nbrs in Displays the number of #Nbrs undergoing a database exchange.
Exchange
MOSPF enabled Displays if multicast OSPF is enabled or not.
Inter-area Displays if Inter-area multicast is supported or not.
multicast
Inter-AS multicast Not supported.
In overflow state Displays if the number of external LSAs has exceeded the upper limit.
Ospfd version Displays the version of the OSPF software running in the network element.
LSA expansions
The LSA Expansion member allows to select the format and function of the LSA.
Field Description
Area ID Select the identity of set of networks grouped together by the OSPF.
LS Type Select the format and function of the LSA. The following formats are available:
router-LSA
network-LSA
summary-LSA
223
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Field Description
ASBR-summary-LSA
AS-external-LSA
group-membership-LSA
LS ID Enter the routing domain that is being described by the LSA.
Adv Rtr Enter the OSPF Router ID of the router originating the LSA.
AS externals
The AS externals member displays the number of LSAs in the database of the autonomous
system.
Field Description
LSA Type Displays the format and function of the LSA.
LS ID Displays the routing domain that is being described by the LSA.
Adv Rtr Displays the OSPF Router ID of the router originating the LSA.
LS Seqno Displays the signed 32-bit integer used to detect old and duplicate LSAs.
Xsum Displays the checksum of the complete contents of the LSA, excepting the LS age
field.
Length Displays the size in bytes of the LSA.
Age Displays the age of the LSA in seconds.
Routing table
The Routing Table member displays all the neighboring network element information indicat ing
the number of hops to reach any node.
Field Description
Prefix Displays the Prefix for the address.
Type Select the format and function of the LSA. The following formats are available:
router-LSA
network-LSA
summary-LSA
ASBR-summary-LSA
AS-external-LSA
group-membership-LSA
Cost Enter the routing domain that is being described by the LSA.
Ifc Enter the OSPF Router ID of the router originating the LSA.
Next-hop Displays the IP address of the next network element through the link.
224
Chapter 14 Maintenance Operations
Field Description
#Paths Displays the number of paths available to the destination network element/network
from the source network element.
Opaque-LSAs
The Opaque-LSA member displays the checksum of the complete contents of the Opaque LSAs.
Field Description
Phyint Displays the name of physical network interface.
If Address Displays the set of networks grouped together by the OSPF.
Area Displays the set of networks grouped together by the Area.
LS type Displays the piece of routing domain that is being described by the LSA.
LS ID Displays the OSPF Router ID of the router originating the LSA.
Adv. Rtr Displays the signed 32-bit integer used to detect old and duplicate LSAs.
LS Seqno Displays the checksum of the complete contents of the LSA, except the LS age field.
Xsum Displays the size in bytes of the LSA.
Length Displays the length of the LSA in seconds.
Age Displays the age of the LSA in seconds.
1. Click Maintenance > Diagnostic > DCN Monitor > System in the navigation menu.
2. Click on the desired System menu parameter to view the desired information.
225
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Field Description
ifconfig Displays the information about interfaces of the network element.
Routing Table Displays the information of IP routing of the network element discovered
automatically through OSPF protocol.
ARP Displays the Address Resolution Protocol (ARP). ARP is the method for finding a
link layer of the host (hardware) address when only the respective Internet Layer (IP)
or some other Network Layer address is known.
Ping Enables the user to know the reach ability of any adjacent network elements by
putting the IP address in the specified box.
Traceroute Displays the number of hops or distance to reach any other adjacent network element
in the network.
Netstat Netstat (network statistics) is a command-line tool that displays network connections
(both incoming and outgoing), routing tables, and a number of network interface
statistics.
Table 102: Routing Table parameters
226
Chapter 14 Maintenance Operations
NOTE: When two or more users try to collect data at the same time, only one of them will get
the data and the other user will receive a failure message.
1. Click Maintenance > Diagnostics > System Diagnostics. The Collect Debug Data page is
displayed.
2. Click Clean Up Data. The stored data is cleared.
NOTE: The Clean UP Data button appears after collect debug data procedure is executed.
227
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
1. Click Maintenance > Diagnostics > Micro-SD Statistics. The Micro-SD Read/Write Profile
preview pane is displayed.
2. Click Collect Micro-SD Statistics. The Collect Micro-SD Statistics preview pane is displayed.
Figure 115: Collect Micro-SD Statistics
228
Chapter 14 Maintenance Operations
Configuration management
The user interface provides options for configuration backup and storing it on a selected server.
The easiest way to save network element configuration is to use back up configuration. In back
up configuration, the existing snapshot of the configuration is copied and stored to the server
mentioned using the FTP protocol. In case of backup config failure- 'Database Save Failed” alarm
is raised. In this process, NE obtains the configuration using the FTP protocol from a remote
server, checks and accepts the configuration if applicable to the network element. In case of
failure, a restore failure alarm is raised.
You can restore the configuration by restoring from remote machine via FTP or from the local
machine using HTTP. The network element gives an error message for the cause of the failure.
The cause of the failure may be one of the following:
Username, password authentication failure
Unable to reach the server IP address
Incorrect permissions to transfer file
The network element can recover from restoration operation failures due to network
unavailability by using FTP timeout of 15 seconds.
The network element verifies the validity of the restored configuration. The activation of restored
configuration shall be non-service affecting for the unaffected configuration. If the verification
fails, the restored configuration is rejected and configuration restore failure alarm is raised.
The network element raises an alarm on detecting configuration corruption or version mismatch
without affecting traffic.
229
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
230
Chapter 14 Maintenance Operations
NOTE: The node configuration state is displayed at the bottom of the preview pane and is
refreshed for every few seconds. The Configuration state displayed is the last operation
performed with the configuration management.
Restoring Configuration
To restore configuration,
231
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
4. Locate the configuration file and click it. The configuration is restored on the network
element.
5. Click Commit for the restored configuration to take effect.
NOTE: The remote server should have an FTP server installed on it to carry out the Restore
configuration data command. For a Linux system, FTP server is inbuilt. For Windows system,
install any third party server such as 3com server along with the provided IIS server.
NOTE: Cold reboot the shelf after committing the configuration. The Node Configuration
state is displayed at the bottom of the preview pane.
232
Chapter 14 Maintenance Operations
1. Click Maintenance > Configuration Management > Restore Factory Defaults in the
navigation menu. The Restore factory defaults preview pane is displayed.
2. Enter the password in the field "Enter your password to proceed".
3. Edit required values.
4. Click Restore Factory Default. The network element is re-initialized.
NOTE: All configuration information, event history and performance data will be deleted on
restoring factory default settings. The Restore factory default operation brings down existing
traffic. Please attempt the action only if the network element needs to be re-initialized. A
power cycle is necessary after the operation. Restoring factory defaults does not delete
configured user names and profiles. To delete the user names and profiles, select the Also
delete All User Profiles check box.
Before downloading software from SLAT page, ensure that you have:
PC and an Ethernet crossover cable with RJ-45 connector.
Network element IP address information if the network element has already been
commissioned.
To download software from SLAT page,
1. Connect the laptop with static IP 192.168.1.x to the node so that, it can be accessed.
2. Launch the Internet Explorer 6.0/ Mozilla 2.0 browser and enter the URL
http://192.168.1.254:20080. The following page is displayed.
233
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Restore configuration can be performed from SLAT page. In case, the configuration backup is
already present, refer to Restoring Configuration on page 231 for restoring the configuration.
1. Click Initialize Node Parameters. The Initialize Node Parameters page is displayed.
Figure 118: Initialize Node Parameters
234
Chapter 14 Maintenance Operations
After setting the network element in PTN mode, execute the following activities in GUI:
Provision the Admin Status of the port as Up
Configure the Mac in Mac (MiM) Address for the system
Provision New Management VLAN interface
For provisioning the above given activities, refer "L2 Services User Interface Guide, Document ID: 140-
DOC000016-E".
NOTE: After restoring the new database, the network element requires a cold reboot for the
new configuration to take effect. You can verify the software Version from the description
field of the default WUI page. The software version is in the format x.y, where 'x' and 'y'
represents major and minor release respectively.
235
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Upgrade Operations
Users with ADMIN privileges can download software and firmware from either the local
machine using HTTP or a remote machine using FTP with all the upgrade binaries available on
the FTP server. The process of downloading and activating software does not affect services.
During the software download operation, existing functionality of the network element remains
unaffected, unless otherwise stated in the release notes.
A firmware upgrade involves the upgrade of boot loader, root file system, and operating system.
The firmware bundle is checked for checksum and the version. Firmware download is non-
service affecting and requires a warm restart to take effect.
NOTE: Only software image files (with extension .img) can be downloaded using HTTP,
where as firmware files, and software load can be downloaded using FTP.
236
Chapter 14 Maintenance Operations
Upgrading Software
To upgrade software,
1. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
Figure 119: Software Download
2. Enter or select the required values by referring to Unified upgrade parameters table.
3. Click Submit. The software download state is displayed at the bottom of the preview pane. A
Stop/Start Refresh button is provided to stop or start the refreshing of the software
download state.
4. Check for the Software download status. A success message is displayed.
5. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
6. Select Check Upgrade.
Figure 120: Check Upgrade
237
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
7. Click Submit. This step checks for the integrity of the build file downloaded.
8. Check for the Software download status. A success message is displayed.
9. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
10. Select Load Upgrade.
Figure 121: Load Upgrade
11. Click Submit. This step loads the downloaded file into the upgrade directory from which the
network element will load the new files.
12. Check for the Software download status. A success message is displayed.
13. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
14. Select invoke upgrade.
Figure 122: Invoke Upgrade
15. Click Submit. This step invokes the operating system to load the new file downloaded. This
is done over a reboot. The automatic FPGA upgrade option enable the user to upgrade the
238
Chapter 14 Maintenance Operations
software and the corresponding FPGA (the process is traffic affecting). However, only the
software can be upgraded without automatically upgrading the FPGA. The user can then
schedule the FPGA upgrade depending on the availability of the network element down-time.
The subsequent FPGA upgrade can be carried out by simply issuing a cold reboot to the
network element. After step4, the network element will be unreachable for a maximum of 5-7
minutes.
16. Login to the network element application. For logging in, refer the section Logging to the
Network Application.
17. Click Maintenance > Upgrade Operations > Unified Upgrade. The Software download
preview pane is displayed.
18. Select Commit Upgrade.
Figure 123: Commit Upgrade
19. Click Submit to complete the upgrade process. This option allows the user to confirm that
the upgrade has completed successfully. If the upgrade has failed, at this step the user would
get a message with the reason for the upgrade failure. The user also gets the option to cancel
the upgrade and revert to the earlier working software build.
239
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
NOTE: User name, Password, IP Address, FTP Port and Directory are present only when
the 'Deliver release from remote machine' is selected for Software Download Operation. For
'Deliver release from local machine', the File Name text field is displayed to enter the file
name.
NOTE: Linux system has an inbuilt FTP server. On windows, the IIS server available with
Windows can be used or any third party server such as 3Com server available at the following
URL can be used: http://support.3com.com/software/utilities_for_windows_32_bit.htm
240
Chapter 14 Maintenance Operations
1. Click Maintenance > Upgrade operations > SSL certificate in the navigation menu. The
SSL Certificate Download preview pane is displayed.
2. Enter or select the required values by referring to SSL Certificate Download parameters table.
3. Click Submit. The SSL certificate is downloaded.
Table 106: SSL Certificate Download parameters
Parameters Description
Username Allows you to enter the username of the system from where you are downloading the
certificate.
Password Allows you to enter the password of the system.
IP Address Allows you to enter the IP address of the system from where you are downloading the
certificate.
FTP Allows you to enter the FTP port number for accessing the remote server (It is an
port(Optional) optional field. If left blank, default port values 20 and 21 are used).
Directory Allows you to enter the source directory address to download the certificate.
File name Allows you to enter name of the certificate.
241
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
Upgrading Firmware
To upgrade firmware from remote machine,
1. Click Maintenance > Upgrade Operations > Firmware. The Firmware download preview
pane is displayed.
Figure 125: Firmware Download
242
Chapter 14 Maintenance Operations
NOTE: While doing firmware upgrade from user interface, the file needs to be downloaded
separately for primary and secondary XCC cards. Thereafter warm reboot to the secondary
card from the user interface and then a system warm restart needs to be done.
Fields Description
User name Enter the user name of the PC to be accessed.
Password Enter the password of the PC to be accessed.
IP Address Enter the IP address of the PC to be accessed.
FTP port (optional) Enter the FTP port number for accessing the remote server.(It is an optional
field)
Directory Enter the directory where the firmware file is located.
File name Enter the firmware file name.
Card Name Select the intelligent card for which firmware is to be downloaded.
243
Glossary of Terms
A DCC-R
APS Data Communication Channel Regenerator Section
Automatic Protection Switching (APS) schemes (DCC_R) are the bytes in SDH frame that
involve reserving a protection channel enable OAM communication between
(dedicated or shared) with the same capacity individual network elements as well as inter
as the channel or facility to be protected. network element communication. The bytes
D1-D3 in regenerator section are used to set
AU the DCC_R communication channel.
Administrative Unit (AU) is the information DCN
structure which provides adaptation between
the Higher-Order path layer and the Data Communication Network (DCN) is the
Multiplex Section layer. The Virtual SDH network that enables OAM
Container (VC) plus the pointers (H1, H2, communication between individual network
H3 bytes) is called the Administrative Unit elements as well as inter network element
(AU). communication.
AUG E
ELAN
Administrative Unit Group (AUG) is the
structure generated by combining several Emulated Local Area Network (ELAN) An
lower level administrative units into the next emulated LAN is a set of clients and servers
higher level administrative unit. connected by virtual circuits over a network.
D F
DCC FPGA
Data Communication Channel (DCC) are the Field Programmable Gate Array (FPGA) is a
bytes in SDH frame that enable OAM semiconductor device that can be configured
communication between individual network by the customer or designer after
elements as well as inter network element manufacturing hence "field-programmable".
communication.
H
DCC-M HTTP
Data Communication Channel Multiplex Hyper Text Transfer Protocol (HTTP) is a set of
Section/Line (DCC_M) are the bytes in SDH standards that allow users of the World
frame that enable OAM communication Wide Web to exchange information found
between individual network elements as well on web pages.
as inter network element communication.
The bytes D4-D12 in multiplex section are
used to set the DCC_M communication
channel.
245
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
I O
IP OAM
Internet Protocol (IP) is the primary protocol in Operation Administration Maintenance (OAM) is
the internet layer of the Internet Protocol a group of management functions that
Suite and performs the task of delivering provide node or network the functionality of
datagrams from the source host to the fault indication, performance monitoring,
destination host solely based on their security management and diagnostic
addresses. It is a 32-bit address assigned to functions. It is a popular framework among
host using TCP/IP. An IP address belongs service providers for their network
to one of five classes (A, B, C, D, or E) and management systems.
is written as 4 octets separated by periods
(dotted decimal format). Each address OSPF
consists of a network number, an optional Open Shortest Path First (OSPF) is a dynamic
sub-network number, and a host number. routing protocol for use in Internet Protocol
(IP) networks. It is used to allow routers to
L dynamically learn routes from other routers
LDCC and to advertise routes to other routers.
Line Data Communications Channel (LDCC) are OSPF selects the best routes by finding the
the bytes in SONET frame that enable lowest cost paths to a destination.
OAM communication between individual P
network elements as well as inter network
element communication. The bytes D10 - PDH
D12 are used to set the communication Plesiochronous Digital Hierarchy (PDH) is a
channel of capacity 192 kbps. technology used in telecommunications
networks to transport large quantities of
M data over digital transport equipment such as
MAC fibre optic and microwave radio systems. It
Media Access Control (MAC) is a unique is the conventional multiplexing technology
identifier assigned to network interfaces for for network transmission systems.
communication on the physical network S
segment. MAC addresses are used for
numerous network technologies and most SDCC
IEEE 802 network technologies, including Section Data Communications Channel (SDCC) is
Ethernet. MAC address is 48 bits long. The a SONET embedded operations channel at
MAC address is commonly written as a the section level to remotely manage the
sequence of 12 hexadecimal digits. network elements by using in-band
management channels.
246
Glossary of Terms
SDH STS
Synchronous Digital Hierarchy (SDH) is an Synchronous Transport Signal (STS) is the basic
international standard for high speed logical building block signal of SONET data
synchronous data transmission over rate.
optical/electrical networks which can
transport digital signals in variable capacities. V
It is a synchronous system which intend to VC
provide a more flexible and simple network
infrastructure. Virtual Container (VC) is a technique that
allows SDH circuits to be grouped into
SFP arbitrarily sized bandwidth increments for
more efficient transport of client protocols.
Small Form-factor Pluggable (SFP) is a compact
optical transceiver used in optical VCG
communications for both
telecommunication and data Virtual Concatenation Group (VCG) is a logical
communications applications. It interfaces a entity in which the VC channel bandwidth is
network device to a fiber optic cable. divided into smaller individual containers
and are grouped together to form a VCG.
SNCP
VT
Sub Network Connection Protection (SNCP) is a
path protection switching scheme that Virtual Tributary (VT) is a type of
supports uni-directional and dedicated type Synchronous Payload Envelope (SPE)
of protection. It is applied on an individual defined for a Synchronous Optical Network
basis to VC-n (both higher order and lower (SONET). It is a structure used to carry sub
order) signals. rate payloads across a SONET transport
network.
SNMP
W
Simple Network Management Protocol (SNMP) is
WTR
an application layer protocol that facilitates
the exchange of management information Wait To Restore (WTR) defines the wait time
between network management system and in minutes before switching traffic back to
the network devices. It enables network work port from protect port, after the fault
administrators to manage network in work port is rectified.
performance, find and solve network
problems, and plan for network growth.
SONET
Synchronous Optical Network (SONET) is an
American National Standards Institute
(ANSI) standard for high speed
communication over fiber-optic networks.
SONET uses time division multiplexing to
send multiple data streams simultaneously.
247
Index
A D
Accessing OSPF diagnostics data • 220 DCC • 245
Accessing Web User Interface Using LAN • DCC-M • 245
22 DCC-R • 245
Add a Proxy ARP Neighbour • 131 DCN • 245
Add Static Routes • 128 Delete Nominated Timing Reference • 143
Adding a Virtual Container (VC) to VCG • Delete Proxy ARP Neighbour • 132
109 Delete TCA Profile of a PDH Port • 104
Adding Cross-Connects • 72 Deleting a Static Route • 131
Adding Overhead Tunnel • 77 Deleting Alarm Filters • 153
Adding System Notes • 216 Deleting Card Configurations • 45
Alarm Banner • 28 Deleting Cross-Connects • 76
APS • 245 Deleting MSP/APS Groups • 67
AU • 245 Deleting MS-SPRing/BLSR • 71
AUG • 245 Deleting Overhead Tunnels • 78
Deleting Path Alarm Profile • 166
B
Deleting Pluggable Modules • 46
Backing Up Configuration Data • 230 Deleting User Accounts • 191
Blocking an IP • 198 Deleting VC/VT from VCG • 117
Blocking Ports • 196 Diagnostics • 219
C Disabling OSPF • 133
Downloading SSL Certificate • 241
CEF1-9P Card Configuration • 44
E
Changing Password of a Logged in User • 191
Chapter Organization • 19 Edit Serial Port • 136
Cipher Selection • 202 Editing Cross-Connects • 76
Cold Rebooting Cards • 213 Editing MSP/APS Group • 64
Cold Restarting a network element • 215 Editing MS-SP/BLSR Ring • 70
Collecting Audit Logs Archive • 204 Editing Network Interfaces • 122
Collecting Debug Data • 227 Editing RADIUS Settings • 188
Collecting Micro-SD Statistics • 228 Editing Selected Timing References • 143
Configuration management • 229 Editing STM/OC Port Profiles • 159
Configure Bulk Squelch Table • 71 Editing System Settings • 210
Configure E1 Mode • 45 Editing TCA Settings for AU4 • 90
Configure OSPF Area • 133 Editing TCA Settings for STM/OC Ports • 85
Configuring HTTP Sessions • 206 Editing TCA Settings for TU • 95
Configuring Parameters in SLAT Page • 233 Editing the Synchronization Status • 138
Configuring SNMP Traps • 80 Editing Voltage Thresholds for PSU • 184
Configuring Ssh • 199 ELAN • 245
Configuring UserLock • 192 Enable Auto-Discovery for STM/OC Port •
Creating User Accounts • 188 118
Enabling Challenge-Response Authentication
• 24, 199
249
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
250
Index
Regenerate Keys • 200 View TCA Profiles for PDH Ports • 100
Related Documents • 20 Viewing Active Alarms • 148
Restoring Configuration • 231, 234 Viewing Blocked IPs • 197
Restoring Factory Default Settings • 233 Viewing Card Parameters • 32
Viewing Diff Delays for a VCG Port • 114
S
Viewing E1 Port Performance Statistics • 174
SDCC • 246 Viewing Enabled License Features • 146
SDH • 247 Viewing Ethernet Performance Statistics • 178
Security Management • 19, 185 Viewing Event History • 154
Setting Alarm Severity • 156 Viewing Failed License Features • 146
Setting Date and Time of the Network Viewing HTTP Sessions • 205
Element • 35 Viewing InvalidLogins History • 208
Setting or Editing the Network Element Viewing Load Availability • 212
Information • 24 Viewing Logs • 203
Setting Time Server for the Network Element Viewing MSP/APS Groups • 50, 60
• 39 Viewing Neighbour Information • 119
Setting Time Zone • 36 Viewing Node Inventory • 41
SFP • 247 Viewing Path Alarm Profiles • 162
SNCP • 247 Viewing PDH (E1/DS1) Port Performance
SNMP • 247 Statistics • 176
SONET • 247 Viewing Performance Statistics of Path • 170
STS • 247 Viewing Performance Statistics of Regenerator
Synchronizing Network Element • 138 Section/Section and Multiplex Section/Line
System Requirements • 21 • 167
System Restart options • 213 Viewing Performance Statistics of Transceiver
• 173
T
Viewing Performance Statistics of Tributary
Title Pane • 28 Unit • 172
Typographical Conventions • 18 Viewing Provisioned MS-SP/BLSR Ring • 68
U Viewing Provisioned MS-SPRing/BLSR • 55
Viewing RADIUS Server • 186
Unblocking an IP • 199 Viewing Sessions History • 207
Understanding Alarms • 147 Viewing SNCP/UPSR Protection • 52
Understanding User Interface • 19, 27 Viewing STM/OC Performance Statistics •
Understanding Visual Indicators • 32 167
Unlocking Users • 193 Viewing STM/OC Port Profiles • 158
Upgrade Operations • 236 Viewing STM/OC Ports • 81
Upgrading Firmware • 242 Viewing System Information • 225
Upgrading Software • 237 Viewing System Upgrade History • 211
Using Tejas Product Documentation • 20 Viewing the Network Interfaces • 122
Using This Guide • 17 Viewing Timing Manager Protection Request •
V 48
Viewing VC/VT Group • 111
VC • 247 Viewing VCG Performance Statistics • 181
VCG • 247 VT • 247
View Alarm Filters • 153
View Alarm Severity • 155 W
View Overhead Tunnels • 77 Warm Rebooting Cards • 213
View Selected Timing References • 142 Warm Restarting a Network Element • 214
View Serial Port Information • 135 What This Guide Covers • 17
View Static Routes • 127 Who This Guide Is For • 17
View Suppressed Alarms • 150
251
TJ1400-12 User Interface Guide Document ID: 140-DOC000015-E
252