Documente Academic
Documente Profesional
Documente Cultură
Operating Guide
EDA2530 Access Hub Release 4.21
Operating InstDRAFT01s
Copyright
Disclaimer
Trademark List
Revision History
The guide is valid for EDA 2530 R4.21. Other product versions, with functions
not described in this guide, may be available.
Version A
First Issue.
Contents
1 Preliminary Information 7
1.1 Conventions Used In Handbook 8
1.2 Hardware and Software Requirements 8
1.3 Application Software Installation 9
1.4 Connecting the Personal Computer to the Equipment 13
2 Operating Instructions 14
2.1 Introduction 15
2.2 Application Software Activation 16
2.3 Main Window Description 18
2.4 Main Menu 21
2.4.1 File Menu 21
2.4.1.1 Refresh Equipment View 21
2.4.1.2 Log off 21
2.4.1.3 Exit 21
2.4.2 Application Options Menu 21
2.4.3 Alarm Browsers Menu 24
2.4.3.1 Active Alarms 24
2.4.3.2 Historical Alarms 25
2.4.4 Trace 27
2.4.5 Configuration menu 27
2.4.6 Card/Port Protection 28
2.4.7 Alarms 29
2.4.7.1 Alarms and Event Notifications 29
2.4.7.2 Configuring the Traps Target Table 30
2.4.7.3 Configuring the Traps LT Table 30
2.4.7.4 Configuring the Traps EM Table 31
2.4.7.5 Input Alarms Table 32
2.4.8 SHDSL Profiles and Setup 33
2.4.9 xDSL Profiles 39
2.4.9.1 xDSL Line Profile Application 39
2.4.9.2 xDSL Alarm Profile application 43
2.4.9.3 ADSL PSD Profile application 45
2.4.9.4 VDSL PSD Profile application 49
2.4.10 Line Bonding Management 51
2.4.11 xDSL Line Activation 52
2.4.12 PSTN National Mapping 53
2.4.13 POTS/ISDN Profiles 57
2.4.14 IP and Ethernet Management 60
2.4.14.1 Browse & Configure xDSL Bridge 60
2.4.14.2 xDSL Bridge Survey 85
2.4.14.3 IP-CP Static Forwarding Database 89
2.4.14.4 IP-CP Static VLAN 91
2.4.14.5 Current Forwarding Database Surveillance 94
2.4.14.6 RSTP/MSTP Configuration 95
2.4.14.7 Ethernet Link Aggregation 102
2.4.14.8 Bridging Parameters 104
1 Preliminary Information
This Section provides the basic elements for the use of the control application.
The following topics are dealt:
• Conventions used in the Handbook;
• Hardware and Software Requirements;
• Application Software Installation;
• Connecting the Personal Computer to the Equipment.
SAFETY No particular actions are required on the equipment after a manual switch
off. The standard switch on operation restores the current configuration.
Software Requirements
The minimum software requirements are:
• Microsoft Windows 2000®, Windows XP® and Windows Vista®;
• Java® 2 Runtime Environment standard Edition v1.5 (JRE 1.4.0) or
higher;
• ITCL/ITK (Ericsson distribution);
• Adobe Reader 6.0 or higher.
NOTICE All the programs (Java, ITCL, Adobe Reader and Local Terminal) must be
installed from a user with Administrator privileges.
Before installing the Local Terminal software package, any previous version of
this software must be removed. After the removal, the personal computer has to
be restarted, in order to update the Windows Operating System registry.
Before starting the set-up installation, it is suggested to close any other running
application.
Java Installation Procedure
Java Runtime Environment provided with the release of Local Terminal software,
can be also downloaded from the http://java.sun.com Internet site. In this handbook,
there is a brief explanation of the Java Runtime Environment set-up procedure,
supplying the minimum information needed in order to install the program. For a
detailed description and troubleshooting procedures, please refer to the product's
official documentation, available from the indicated Internet site. The following
procedure describes the installation of the software delivered with the
equipment.
Inside most of the windows that will be described, the BACK pushbutton will be
used to return to the previous window, and the CANCEL to abort the set-up.
1. Start the JRE software installation from the CD ROM.
2. The welcome screen is then shown, carefully read its content and press YES.
3. The subsequent window allows the selection of the folder where to store the
Java software. Press NEXT to continue.
4. It is suggested to confirm the default selection of the following windows by
clicking the NEXT button, to continue the set-up without changing any
parameter.
5. The software download to the PC will start. Successfully completion of the
download process is indicated on the screen, stating that the Java download is
completed. Press the FINISH button to terminate the operation.
6. It is suggested to delete the installation file from the desktop.
Also in this case, from most of the windows that will be described, the BACK
pushbutton will be used to return to the previous window, and the CANCEL to
abort the set-up.
1. Locate the Setup.exe program contained by the ITCL inside the software CD.
2. Select the Setup.exe file and then press the OPEN button.
3. The welcome screen is then shown, carefully read its content and press NEXT.
4. Subsequent window allows the selection of the folder containing the ITCL software.
This software package MUST be installed under the default directory c:\itcl3.3.
5. The subsequent window will summarize the previous selections. If all the data
are correct, press NEXT to start the file installation.
NOTICE The Add-On Package contains a few plug-in applications used by LCT to
fully manage Equipments. It is mandatory to install the Add-On package for
this Local Craft Terminal version, to support the IP/Ethernet Management
features and other functionalities.
2. Connect the equipment Ethernet interface to the LAN through an Ethernet Hub,
by means of a straight twisted pair Ethernet cable mated with RJ45 connectors.
3. Configure the Personal Computer IP address and the Net mask value, in order
the have them in the same IP network.
The Personal Computer is now connected to the Equipment, and the Operator,
after the login is able to use the Equipment. If an Ethernet Hub is not available, it
is possible to connect the PC directly to the equipment Ethernet interface
through a cross-over (MDI-X) Ethernet cable.
2 Operating Instructions
This Section gives detailed instructions on how to use the Local Craft Terminal
(LCT) application. The following topics are dealt:
• Introduction;
• Application Software Activation;
• Main Window Description;
• Main Menu;
• Graphical Area;
• Unit Configuration;
• Maintenance Functions.
2.1 Introduction
The control software application is the operator’s interface towards the
equipment and permits interaction with the firmware installed on the units.
This section gives step-by-step operating instructions to run the control
application, understanding the meaning of the elements present in the main and
in the additional windows and using the various menu items.
1. Insert the Equipment Address (IP address) or the Equipment Name in the
relevant text field. By clicking on the scroll bar buttons, the history of the last
eight inserted IP address (or Equipment names) will appear.
2. Click on the Logon button, or hit the return key while the input cursor is over the
Equipment Address field (or Equipment name), to start the working session.
3. Check the Connect in READ ONLY mode box to entry in read only mode.
4. In order to change the SNMP parameters, press the arrow on the right.
The following window is shown:
b
c
d
The items of the main menu bar, and the pertinent secondary items, are
described in a dedicated Chapter within this section. The items displayed with
light grey color cannot be selected. This color indicates that the item is not
applicable in the selected context.
Error Messages Display (c)
This part of the window is used by the program to display the last error message
occurred. Using the C button, located on the left side, it is possible to cancel the
displayed message.
Toolbar (d)
The toolbar contains shortcut buttons for the direct access to the most common
functions. When the cursor is positioned above the buttons, a short help string
will be displayed. Some buttons are only shortcut of pop-up menu options, while
some other buttons are available only from the toolbar.
Protection button: it displays access to the protection management facility.
Alarm Browser button: it gives access to the Alarm table management facility.
By clicking on the string with the right button of the mouse, it is possible to
display the equipment properties.
2.4.1.3 Exit
Then select the menu Application Conf to display the relevant window.
2. Set the Backup Timeout. This parameter is used in the Backup procedure that
is run by the command: Start Æ Programs- Æ AXH-EDA Local Terminal Æ
Backup & Restore procedure. Configure the timeout for the phase of creation
of the DBM backup file in the equipment's memory. This value, in minutes, is not
comprehensive of the time of transfer of the backup file on the user's disk.
Default value is 20 minutes. Increase this value if the operation of backup's
equipment fails.
3. Set the Restore Timeout. This parameter is used in the Restore procedure that
it is run by the command Start->Programs-> AXH-EDA Local Terminal->
Backup & Restore procedure. Configure the timeout for the restore of the
DBM backup file on the equipment. This value, in minutes, is comprehensive of
the time of transfer of the backup file from the user's disk to equipment's
memory, but it is not comprehensive of the time of the reboot of the equipment.
Default value is 40 minutes. Increase this value if the operation of restore's
equipment fails.
4. Press SAVE button to store the new configuration, LOAD to refresh the window
and DONE to close it.
2. The MA SNMP port text field is used for the Management Application
3. The SNMP Time Out (sec.) value defines in seconds, the maximum waiting
time for the Equipment answer messages.
4. The SNMP Retry stated the number of tentative that may be performed within
the SNMP Time Out.
5. Press SAVE button to store the new configuration, LOAD to refresh the window
and DONE to close it.
2. Choose by means of the relevant scroll list the color to be associated to an alarm.
3. Press SAVE button to store the new configuration, LOAD to refresh the window
and DONE to close it.
4. Press File->Refresh Equipment view and the alarm view of the equipment will
be automatically updated.
The Alarm table and Last Alarm Received windows will be displayed.
The last received item is emphasized using a different background color and it is
positioned at the bottom of the list. Using the scroll bar on the right, it is possible
to scroll the window and display all the lines.
The Last Alarm Received window, displays only the most recent alarm or
event, received from the equipment. The above-mentioned windows provide
information about.
• Alarm type: It may be Alarm ON or Alarm OFF;
• Alarm severity;
• Alarm cause;
• Physical position of the alarm source and event parameters;
• Alarm source Identification;
• Alarm date;
• Alarm time.
2.4.4 Trace
This item is reserved for factory use only.
This window is used to manage the card protection (1:1 scheme) for the
Common Part Unit (CP-IP). For the line protection (RSTP, LAG etc) please
refer to the relevant paragraphs.
List of PROTECTING Cards area shows if the protection unit is available
indicating the Subrack, Slot and Protecting Card. If the protection unit is
available it is displayed as in the window above.
Protection Group CARD Entry area shows administrative and operational
status of the protection scheme. AdminStatus is always enabled while
OperStatus could be enabled or disabled. If it is disabled, protection scheme is
not working and the reason why it is displayed in CARD Protection Units area.
CARD Protection Units area shows the status of the protected card and the
protecting one via the following parameters:
• Subrack: it identifies the subrack number (always 1)
• Slot: it is the position of the unit inside the subrack (1 or 22)
• Role: it is the role of the protection unit (protected, unit is configured as
a worker unit; protecting, unit is configured as backup or standby unit).
• Admin: indicates administrative status of the unit. It is always enabled.
• Protection Status: indicates the state of the unit. The field can assume
different values in depending on the unit's role:
NOTICE The Activate and Deactivate button of this window are not used.
Press the Refresh button to update the information of this window and Close to
exit from the window.
2.4.7 Alarms
PATH: (Configuration -> Alarms)
This item contains some services to manage the consequent actions related to
Equipment alarm(s) and event(s) detection.
PATH: (Configuration -> Alarms ->Trap Target table or Trap LT table/Trap EM table)
The Operator can configure the messages notification towards the Managers,
towards the Local Terminal and towards the Element Manager using different
kinds of tables:
• Trap Target table: it is used to enable or disable the alarm and event
traps reporting towards the Manager.
• Trap LT table: it is used to enable or disable the alarm and event
reporting towards the Local Terminal.
• Trap EM table: it is used to enable or disable the alarm and event
reporting towards the Element Manager.
The section on the left of the table is used to add or remove IP addresses to a
list saved on the Equipment. When the IP address of an AXH-EDA Local
Terminal is inside the list, it will be considered by the NE as destinations where
to send the notifications (events or alarms).
The section on the middle of the table is used to display the equipment IP
address identified as alarm source. The section on the right of the table is used
to globally enable or disable the sending of alarm or event notifications.
The section on the left of the table is used to add or remove IP addresses to a
list saved on the Equipment. When the IP address of an Element Manager is
inside the list, it will be considered by the NE as destinations where to send the
notifications (event or alarms).
The section on the middle of the table is used to display the equipment IP
address as alarm source. The section on the right of the table is used to globally
enable or disable the sending of alarm or event notifications.
• Wire Interface: this field defines if the SHDSL line profile is composed
by two, four, six or eight wires.
• Min Line Rate bps (0..4294967295): this field configures the minimum
transmission rate for the associated SHDSL Line in bits-per-second (bps).
• Max Line Rate bps (0..4294967295): this field configures the maximum
transmission rate for the associated SHDSL Line in bits-per-second (bps).
• PSD Type: this read-only field displays the use of the PSD (Power Spectral
Density) Mask for the associated SHDSL Line.
• Tx Mode this read-only field displays regional setting.
• Remote Manage Enabling: this read-only field displays the possibility to
have the support for remote management of the units in a SHDSL line
from STU-R.
• Power Feeding: this read-only field displays the power feeding present in
the line.
• DownstCurrCond SNRMargin(dB): this field specifies the downstream
current condition target SNR margin for a SHDSL line. SNR margin is
the difference between the desired SNR and the actual SNR. Possible
values are in the range from -10 to 21.
• DownstWorstCase SNRMargin(dB): this field represents the SNR
margin between the desired SNR and the actual one in downstream
direction in worst condition. Possible values are in the range from -10 to 21.
• UpstCurrCond SNRMargin (dB): this field specifies the upstream
current condition target SNR margin for a SHDSL line. SNR margin is
the difference between the desired SNR and the actual SNR. Possible
values are in the range from -10 to 21.
• UpstWorstCase SNRMargin (dB): this field specifies the upstream
worst-case target SNR margin for a SHDSL line. SNR margin is the
difference between the desired SNR and the actual SNR. Possible
values are in the range from -10 to 21.
• Used SNR Target Margins: this field indicates whether a target SNR
margin is enabled or disabled. This field can assume one or more of the
following values:
currCondDown: current condition downstream target SNR margin enabled.
worstCaseDown: worst case downstream target SNR margin enabled.
currCondUp: current condition upstream target SNR margin enabled.
worstCaseUp: worst case upstream target SNR margin enabled.
In order to set the value double click in the field, the window Used Target
Margins will be displayed in which you will be able to check or to uncheck
the single values.
• Reference Clock: this field represents the reference clock used by the
STU-C interface. The values are the following:
localClk: Mode-1 per G991.2.
networkClk: Mode-2 per G991.2.
dataOrNetworkClk: Mode-3 per G991.2.
• Line Probe Enabling: this read-only field displays if the interface performs
line probing to find the best line rate.
• Date & Time: Date & Time when the Command is launched. This is
read-only field.
• Ip Address: IP Address that launches the command. This is read-only field.
• Command: possible commands are:
- Create: it creates a new configuration profile for SHDSL lines on the
equipment.
- Modify: it modifies an existing configuration profile for SHDSL lines on the
equipment
- Delete: it deletes an existing configuration profile.
- Skip: it skips the current line and it does not execute any commands on the
equipment.
• Result: this field displays the result of the command that can be OK or
ERROR. It is read-only field
• Error Message: Error description, the error type. This is read-only field.
• Annotations: it is used to write some note about the operation. This is
read-only field.
Alarm Profiles
This application supports the definition of alarm configuration profiles for SHDSL
lines. Each individual row in the table defines a single alarm profile that it is
identified by the field "Profile Name". The configuration parameters in a profile
are applied to those lines referencing that profile. The parameters that you will
find in this application are:
• Ne Name: IP Address of the equipment.
• Profile Name (max 32 chars): name of the SHDSL alarm profile.
It must be an alphanumeric string with a maximum of 32 chars.
• LoopAttenuation (dB -127..128): this field represents the threshold
used to rise up an alarm in case of loop attenuation worst than this
threshold.
• SNR Margin (dB, -127..128): this field represents the threshold used to
rise up an alarm in case of SNR Margin worst than this threshold.
• ES Thresh. (secs, 0..900): this field represents the minimum time
required to rise up an alarm in case of Errored Seconds condition.
• SES Thresh. (secs, 0..900): this field represents the minimum time
required to rise up an alarm in case of Severely Errored Seconds
condition.
• CRC Anomalies: this field configures the threshold for the number of
CRC anomalies.
• LOSWS Thresh. (secs, 0..900): this field represents the minimum time
required to rise up an alarm in case of Loss of Synchronization Word
condition.
• UAS Threshold (secs, 0..900): this field represents the minimum time
required to rise up an alarm in case of Unavailable Seconds condition.
• Date & Time: Date & Time when the Command is launched. This is
read-only field.
• Ip Address: IP Address that launches the command. This is read-only field.
• Command: possible commands are:
Create: it creates a new configuration profile for SHDSL lines on the
equipment
Modify: it modifies an existing configuration profile for SHDSL lines on
the equipment
Delete: it deletes an existing configuration profile
Skip: it skips the current line and it does not execute any commands on the
equipment
• Result: this field displays the result of the command that can be OK or
ERROR. It is read-only field
• Error Message: Error description, the error type. This is read-only field.
• Annotations: it is used to write some note about the operation. This is
read-only field.
Stack Profiles
This application manages the protocol stack profiles for SHDSL line.
Each individual row in the table defines a protocol stack profile that it is identified
by the field "Profile Name". Each defined protocol is intended to be associated to
one or more lines by a dedicated application, other than this one.
The parameters that you will find in this application are:
• Ne Name: IP Address of the equipment.
• Profile Name: Name of the profile; it must an alphanumeric string.
• Profile Service: this field defines the SHDSL working method and possible
values are the following: ipdslamAtmShdsl, ipdslamEthernetShdsl.
• Profile E1: this field is grey colored because it is not used.
• SHDSL TC layer: this field defines the Transmission Convergence layer
over SHDSL frame. This must be configured congruently with the protocol
stack profile service. Possible values are the following: atmByteAligned and
efm6465.
• ATM TC alfa: this field is grey colored because it is not used.
• ATM TC beta: this field is grey colored because it is not used.
• ATM TC Cell Scrambling: this field is grey colored because it is not used.
• ATM TC HEC correction: this field is grey colored because it is not used.
• Date & Time: Date & Time when the Command is launched. This is
read-only field.
• Ip Address: IP Address that launches the command. This is read-only field.
• Command: possible commands are:
- create: it creates a new configuration profile for SHDSL lines on the
equipment.
- modify: it modifies an existing configuration profile for SHDSL lines on the
equipment.
- delete: it deletes an existing configuration profile.
- skip: it skips the current line and it does not execute any commands on the
equipment.
• Result: this field displays the result of the command that can be OK or
ERROR. It is read-only field
• Error Message: Error description, the type of the error. This is read-only field.
• Annotations: it is used to write some note about the operation. This is
read-only field.
Bonding
This application allows aggregating a higher bandwidth for an end user by
bonding more physical lines together into one channel. The xDSL line
configuration must be done per line and the traffic configuration must be done
on the main line only. The bonding specific parameters apply to the line index
(User Port <subrack>/<slot>/line) for the line, that is denoted main line within
specific group. The individual line configuration is independent from the bonding
service configuration.
The GUI is an all-in-one editor/browser/writer tool, with more than one folder.
Each tabbed card contains an editable spreadsheet-like table for a consistent
set of parameters. The tables are strictly related to one another, and they can be
seen as sections of a one big table. Each table's row has its continuation in the
tables located at its right or left hand. The data displayed in each row of the
subsequent tables are always related to the equipment referred to. Some fields
may be of read-only type: such fields are displayed when reading from
equipment but not used when configuring this service on it.
The application is composed by the following folders:
• xDSL Bonding Configuration;
• IMA-specific Bonding;
• Application Control.
xDSL Bonding Configuration folder:
• NE Name: IP Address of the equipment.
• Card Type: this field shows the unit type. This is read-only field.
• User Port (sh/sl/ln): this field defines which user port (indicated with
subrack/slot/line notation) is included in the bonding configuration.
• Group Admin Status: this field defines the desired status of the
bonding group. The possible values are: up and down.
• Max Ds Rate bps: this field defines the maximum downstream rate for
the bonding group. This field is not available yet, for future use.
• Min Ds Rate bps: this field defines the minimum downstream rate for
the bonding group. This field is not available yet, for future use.
• Max Us Rate bps this field defines the maximum upstream rate for the
bonding group. This field is not available yet, for future use.
• Min Us Rate bps: this field defines the minimum upstream rate for the
bonding group. This field is not available yet, for future use.
• Atuc Qual. Threshold bps: this field specifies the line quality alarm
threshold for the bonding group. This field is not available yet, for future use.
• Atur Qual. Threshold bps: this field specifies the line quality alarm
threshold for the bonding group. This field is not available yet, for future use.
• Atur No Wait: this field controls bonding mode behavior. Possible
values are: true and false. If set to true allows the bonding group to be
active as soon as least on line is in Showtime. This field is not available
yet, for future use.
• Group Members: this field indicates which lines should be bonded in
this bonding group. Include main line and ordinary member lines to be
bonded. The following rules must be respected:
Min number of lines >=2 or none.
Max number of lines <=8.
The lines are adjacent to each other.
In order to set the field the operator must:
- double click in the field and the window Group Members will be displayed.
- select the lines and after click on Close button.
• Bonding Protocol: this field defines bonding protocol user. Possible
values are atmBonding, efmPaf, atmIma.
The subsequently fields are read-only fields and they display the Line Bonding
Status.
• OperStatus: This field displays the operational state of the bonding
group. When operational state is down, no data traffic can be passed. If
the total group rate does not match the minimum value configured for
the group, OperStatus will be down even though the Group Admin
Status is up. Note that when all lines in the group have been down,
OperStatus will not change to up until all lines in the group are up.
• DsActualRate: this field displays the actual downstream rate for the
bonding group.
• UsActualRate: this field displays the actual upstream rate for the
bonding group.
IMA Specific Bonding folder
This folder is not available for this release; for this reason it is grey colored.
Application Control folder
This folder provides the fields to control the application itself that are:
• Command: this field specifies the configuration operation to perform.
The possible commands are: create, modify, setadmin.
• Result: In this field is displayed the result of the command that can be:
OK or ERROR.
• Error Message: Error description, the type of the error.
• Date&Time: Date & Time when the Command is launched.
• IP address: IP Address that launches the command.
• Annotations: it is used to write some note about the operation.
The GUI is an all-in-one editor/browser/writer tool, with more than one tabbed
card. Each tabbed card contains an editable spreadsheet-like table for a
consistent set of parameters. The tables are strictly related to one another, and
they can be seen as sections of a one big table. Each table's row has its
continuation in the tables located at its right or left hand. The data displayed in
each row of the subsequent tables are always related to the equipment referred
to. Some fields may be of read-only type: such fields are displayed when
reading from equipment but not used when configuring this service on it.
This application allows the network operator to create, delete and modify ADSL
and VDSL Line Profiles. It is composed by the following folders:
• Channel;
• Line Spectrum;
• Power Management;
• Action.
Channel folder
This folder is composed by the following fields:
• NE Name: the NE IP address.
• Profile Identifier: this field specifies the name of the profile. It can be
an alphanumeric string the which length cannot exceed 32 chars.
• XTU-C/XTU-R Min/Max Rate: The data rate in each direction is set by
the Minimum Data Rate and Maximum Data Rate parameters. The
range for the downstream parameters is 32 kbps (32000bps) to 8128
kbps (8128000bps). The range for the upstream parameters is 32 kbps
to 4096 kbps.
• XTU-C/XTU-R Max Int. Delay: The Data rate has also relations to
Maximum Interleave Delay and Impulse Noise Protection settings. The
Maximum Interleaved Delay improves the error correction capabilities of
the ADSL connection. The Interleaved delay determines the
improvement of the error correction: long delay improves more than
short delay. For real time application, set the Interleave delay to zero.
The Interleaved delay value is the maximum permitted value. The exact
value that will be used is determined automatically during line
initialization. The higher the data rate, the lower is the interleaved delay.
The interleave delay settings have relations to the Maximum Achievable
Data Rate and the Impulse Noise protection settings. This value must be
expressed in ms.
• XTU-C/XTU-R Min Imp. Noise Prot: The Impulse Noise Protection
(INP) is the ability of the ADSL transmission to withstand corruption of
data due to noise impulses. This parameter sets a requirement to the
transmission, and it is related to the data rate and the interleave delay
parameters. The minimum value for INP is DMT symbols, which is
equivalent to 250 uS in ADSL, ADSL2 and ADSL2+. Setting INP min to
½ DMT will cause the transmission to withstand (correct errors due to) a
noise pulse with 125 uS duration, one DMT will withstand a pulse of 250.
Possible values are: noINP, halfDmtSymbolINP, oneDmtSymbolINP,
twoDmtSymbolINP, fourDmtSymbolINP, eightDmtSymbolINP,
sixteenDmtSymbolINP.
Line Spectrum folder
This folder is composed by the following fields:
• Transmit PSD (Power Spectral Density) defines in which way the
Equipment will use the transmit power capabilities. When the line is
initialized during training, the IP DSLAM can be configured for 2
optimization modes: fixed transmit PSD, re-initialize PSD level. The IP
DSLAM will use the configured priority as a guideline during the training.
Note that the Transmit PSD will not change during Showtime.
• PSD Optim Config scroll list controls the selected PSD optimization
modes. Possible values are: noOptimisation,
optimizeForPsdMaskFilling, optimizeShapeForPerformance.
• PRM Protection, this field is used for 12/16 kHz Private Metering (PRM)
support for DSL line. Possible values are:
disablePrmProtect (Default) - it disables the PRM pulse signaling for the
DSL line.
enablel2kHzPrmProtect - it enables 12 kHz PRM signaling for the DSL line.
The range for each direction is between zero and the specified
Maximum data rate.
• xTU-C/R Bitswap. Bitswap, if enabled, allows the IP DSLAM to
dynamically change the bit allocation per carrier during showtime. The
general effect of this function is a more stable line that is resistant to
temporary interference. However, this function can be disabled (by un-
checking the checkboxes) if interoperability problems with the CPE are
encountered. Possible values are: enableDownstreamBitswaps,
disableDownstreamBitswaps.
• Downshift DMT Carrier Mask, DMT Carrier Mask Downstream: defines
which carries (tones) can be used in the downstream direction.The Mask
is represented as a list of 64 bytes (512 bits), where each bit represents
a tone. The first byte represents carrier 0-7, the second byte represents
carriers 8-15, etc. The last byte represents carriers 504-511.
• Upshift DMT Carrier Mask, DMT Carrier Mask Upstream: defines which
carries (tones) can be used in the upstream direction. The Mask is
represented as a list of 8 bytes (64 bits), where each bit represents a
tone. The first byte represents carrier 0-7, the second byte represents
carriers 8-15, etc. The last byte represents carriers 56-63.
Power Management folder
This mode only affects ADSL2 and ADSL2+, and the parameters are ignored if
the line is VDSL2. While in L2 power mode the IP DSLAM continues to lower
the power in steps (power trims) as long as the target SNR and minimum L2 bit
rate can be maintained. The following parameters can be configured:
• Power Management State Enabling: The ADSL line has 2 possible
power management states: disableL2AndL3 - Synchronized, this Line
state (L0) is when the Line has full transmission (i.e. showtime).
enableL2 - Power down data transmission, this line state (L2) is when
there is transmission on the line but the net data rate is reduced (e.g.
only for OAM and higher layer connection and session control).
• Minimum L2 bit rate is the minimum bit rate when the line is in L2
mode. This value is also used as entry criterion for L2 power mode. This
value must be less than the maximum L2 bit rate (4000 Kbps). The
default value of Minimum L2 bit rate is 2000 Kbps. The range is 0 to the
configured downstream minimum data rate (at L0).
• Mintime in L0 is the minimum interval between exit from L2 power and
the next entry to L2 power mode. The default value is 10 s. The range is
0 to 65535s.
• Mintime in L2 is the minimum interval between entry to L2 power mode
and the first L2 power trim, as well as between consecutive power trims.
The default value is 10 s. The range is 0 to 65535s.
• xTU-C L0 to L2 threshold time, the time interval for L2 entry.
• Max ATPR. Aggregate Transmit Power Reduction per power trim. Defined
the maximum allowed reduction of power per power trim. The range is 0 to
Maximum L2 ATPRT, in 1 dB units. The default value is 3 dB.
• Max ATPRT. Total Aggregate Transmit Power Reduction. When the power
reduction reaches this value no further power trims will be performed.
The range is 0 to 31 dB, in 1 dB units. The default value is 12 dB.
The following figure illustrates the Power and Time L2 Parameters.
Action folder
This folder provides the fields to control the application itself. By means of the
To Do scroll list is possible to create, modify, and delete the configured xDSL
line profile. Result and Error fields give a feedback of the configuration.
This application allows the network operator to create, delete and modify ADSL
and VDSL Alarm Profiles.
General folder
In this folder is possible to enable/disable the trap relevant to different alarms,
choose a name for the profile and assign the NE IP address.
interval. Setting a threshold value to 0 (zero) disables the alarm. The range for
15 Minutes interval is 0 – 900. The range for 24 Hours interval is 0 - 86.400.
These data establish the limits which cause the SNMP agent of the equipment
to send the relative trap. The possible configurable thresholds are:
SES: The number of Severely Errored Seconds encountered by an xDSL
interface within of the data collection period.
UAS: The number of Unavailable Seconds encountered by an xDSL interface
within of the data collection period.
ES: The number of Errored Seconds encountered by an xDSL interface
within of the data collection period.
LOS: The number of Loss of Signal Seconds encountered by an xDSL interface
within of the data collection period.
LOF: The number of Loss of Frame Seconds encountered by an xDSL interface
within of the data collection period.
LOL: The number of Loss of Link Seconds encountered by an xDSL interface
within of the data collection period.
LOP: The number of Loss of Power Defects encountered by an xDSL interface
within of the data collection period.
Action folder
This folder provides fields to control the application itself. By means of the To Do
scroll list is possible to create, modify, and delete the configured xDSL line
profile. Result and Error fields give a feedback of the configuration.
This application allows creating, deleting and modifying ADSL Power Spectral
Density profile.
• Protocol Type: defines on which ADSL modes the PSD shape will be
applied. Annex A/B/M (for G.992.3), Annex A/B/M (for G.992.5),
Annex L (for G.992.3).
Possible values are: ADSL2, ADSL2+, ADSL2+ AND ADSL2, ADSL2 L,
Action folder
This folder provides fields to control the application itself. By means of the To Do
scroll list is possible to create, modify, and delete the configured xDSL line
profile. Result and Error fields give a feedback of the configuration.
This application allows creating, deleting and modifying VDSL Power Spectral
Density profiles.
Note that this parameter should be equal to or less than the power
defined in the standard for the selected profile.
• Limit Mask that will be used. The limit masks define band plan and PSD
shape. The following limit masks are supported:
Standard masks (G.993.2 annexes and amendments):
The GUI is an all-in-one editor/browser/writer tool, with more than one folder.
Each tabbed card contains an editable spreadsheet-like table for a consistent
set of parameters. The tables are strictly related to one another, and they can be
seen as sections of a one big table. Each table's row has its continuation in the
tables located at its right or left hand. The data displayed in each row of the
subsequent tables are always related to the equipment referred to. Some fields
may be of read-only type: such fields are displayed when reading from
equipment but not used when configuring this service on it. The application is
composed by the following folders:
• Line Bonding Configuration;
NOTICE Do not forget to open a TFTP Server session on the PC before running the
application. TFTP features are required.
Each National Mapping code consists of a single compressed file containing all
the files needed to the VoIP line cards to implement the National Mapping.
Two different mechanisms are possible in the Equipment to download the
National Mapping files to the voice line cards:
• A manual download directly controlled and triggered by management.
• An automatic download to update those VoIP line cards that have a
National Mapping mismatching with the desired one.
In order to manually download to the line cards the National Mapping
information the following steps are needed from the management interface:
• Configuration of the desired National Mapping with the file to be
downloaded for each slot position (applicable only if in that slot position
a voice line card is hosted).
• Configuring the URL containing the TFTP/FTP server IP address and
directory path where the National Mapping files are stored.
Export DB
With this application it is possible to export the local DB configurations. You can
easily access this tool by clicking the Export DB button on the EDA National
Mapping Editor mask.
Import DB
With this application it is possible to import the local DB configurations. You can
easily access this tool by clicking the Import DB button on the EDA National
Mapping Editor mask.
• Jitter Buffer Size initial (ms): this field specifies the JitterBufferSize
initial value. Initial value indicates how much payload data should be
there in jitter buffer to start parsing. It is the initial fill level before starting
the play-out.
Action folder
This folder provides fields to control the application itself.
• ToDo: This field allows to create/modify/delete a profile via the
corresponding commands.
• Result: Display the result of the executed command.
• Error: This read only field shows the type of the error.
PATH: (Configuration -> IP / Ethernet Management -> Browse and Configure xDSL Bridge)
This application allows configuring the bridge features in the Equipment. It is
composed by several applications and each one contains several folders as
shown in the window below:
validated to identify the correct recipient and to disallow data flow to end-users
for which the data is not intended. The bridge filtering of the IP-DSLAM is
configurable per end-user and per-PVC for a specific end-user. A PVC
(Permanent Virtual Circuit) has a pair of ATM VCL identifiers VPI, VCI
associated to it. On the base of the class of service and other parameters, the
data is classified and bridged in different paths. Each classification is considered
as a distinct flow.
To obtain a full configuration of the PVC set, at least two more applications,
respectively intended for configuration of downstream and upstream flows, have
to be used, and they can indeed be run from within this one. Besides, one more
application has to be used to configure the set of user lines and even more
applications should be run to complete the configuration of an EDA object with
ACLs (Access Control Lists ), Multicast Filters and Subscriber IP Filters.
This application provides a number of folders that all together make up one big
logical table for PVC configuration:
• CONTROL;
• Bridge PVC;
• QUEUES&ATM;
• PROTOCOLS;
• GATEWAY;
• DHCP, PPPoX, AGENTS;
• FILTERS.
Therefore, the rows having the same row index in each folder, all together,
make up one logical big entry for specific PVC, and each entry is indexed by:
• Line Path <sh>/<sl>/<ln>
• PVC Index
Control folder
This application is composed by following folders:
• Access Node: the IP address of the Equipment.
• Line Path: indication (subrack/slot/line) of the line involved in the PVC.
• PVC Index: the index for the Permanent Virtual Circuit.
• PVC Status Summary: the status of the PVC. The following statuses
are possible: Failed, createFailed, notUsed, success, testDisabled,
testing, ok, failedF5etoe, lineDown, awaitCreation.
• Date&Time: the timestamp (time that is printed to a file or other location
to help keep track of when data is added, removed, sent, received)
referred to the inventory operation.
• Ip Address: IP address of the Equipment.
• Command: the command to be performed.
- enable: bring the PVC to visibility;
- modify: change some properties for an exposed PVC;
- bdlCkdEnable: enable PVC only after a successful bundling
consistency check;
- bdlCkdModify: modify PVC only after a successful bundling
consistency check;
-
- disable: makes a PVC unavailable;
- setmacfilter: special command to set the Subscriber MAC Filter value;
('modify' has no effect on it);
- skip: does nothing with this row (enable, disable, modify, skip).
- restorePvcDefault: restore default values for the specified PVC. When
the restorePvcDefault command is issued, the Logical Channel is
automatically disabled by setting peakCellRate = 0, then all its
parameters are restored to default values so that a subsequent 'enable'
will re-create it with default values.
• Result column shows response for the operations executed (OK, NOK).
• Error Message column shows the type of the error.
• Annotations column is used to write some note about the operation.
Bridge PVC folder
• Access Method: This field determines how the end-user device
interacts with the IPDSLAM, it will therefore take the following into
account:
- If and how the end user device obtains an IP address.
- How authentication of the customer's IP address is achieved.
- How the address of the default IP gateway is specified.
- The underlying encapsulation protocol to be used.
The possible values are:
• dhcp: when DHCP is selected, the DHCP protocol is used to
authenticate, assign and renew the end-user's IP address. The address
of the IP gateway is also provided by means of the DHCP protocol. The
encapsulation protocol is IP over Bridged Ethernet.
• staticIp: when Static IP is selected, the IP address of the end-user as
well as the default gateway must manually be specified. This information
is furthermore used to authenticate traffic from the end user device. The
encapsulation protocol is IP over Bridged Ethernet.
• transparentLan: all traffic from the end-user device passes transparently
to the network. No IP address is provided by the IPDSLAM itself. No
authentication is performed and furthermore no gateway is specified.
When this option has been activated, all filtering of end-user packets is
disabled. The encapsulation protocol is Bridged Ethernet.
• pppoe: when PPPoE is selected, the PPP protocol is used to setup PPP
sessions. Once a session has been setup, all traffic is encapsulated
within PPP packets, until the session is torn down. Once a session is
established, an IP address is assigned to the end-user, which is also
used to authenticate the end-user's traffic. The address of the IP
gateway is also provided as the start of the PPP session.
• pppoa: when PPPoA is selected, the encapsulation of all traffic between
the IPDSLAM and the end user device is Routed PPP over AAL5
frames. These so-called PPP over ATM packets are converted to
PPPoE before being passed to the access network.
The VLAN that is added is the first VLAN in the first range specified in
the downstream VLAN ID ACL.
• S-VLAN Id: (outer): This field specifies the VLANID to be used for the
Ethernet traffic (accordingly to 802.1Q) from and to the specified PVC.
The value can be between 0 and 4095.
• S-Priority (outer): This field specifies the priority value to be used when
VLAN Operation is set to addonetag/addtwotags. This field specifies the
priority (accordingly to 802.1Q) that should be used for the Ethernet
frames to and from the specified PVC. It is only used when VLAN
Operation" field is set to "addonetags" or "addtwotags". The value can
be between 0 and 7 (where 7 is the highest priority).
• S-VLAN Tag: (outer): This field defines the VLAN tag type applied on
upstream traffic. In case of two VLAN tags applied then this VLAN tag
type is applied to the outer VLAN tag. The possible values are:
* qtag: Q/QinQ VLAN tagging. (Ethernet Type 0x8100)
* vmantag: VMAN VLAN tagging. (Ethernet Type 0x88A8)
* extremevmantag: Extreme VMAN VLAN tagging. (Ethernet Type 0x9100).
• C-VLAN Id: (inner): This field represents the VLAN identifier that is to
be used if vlan Operation field is configured to "addtwotags". This is the
inner Vlan used on traffic from and to the specified PVC. The value can
be between 0 and 4095. 65535 is a nil-value indicating that inner VLAN
is not in use the outer-tag VLANID used for the Ethernet frames to and
from the specified PVC.
• C-Priority (inner): This field represents the VLAN priority that is to be
used if vlan Operation field is configured to "addtwotags". This priority is
associated with "C-VLAN Id (inner)" accordingly to 802.1Q. The value
can be between 0 and 7 (where 7 is the highest priority). 255 is a nil
-value indicating that inner VLAN is not in use.
• C-VLAN Tag: (inner): this field defines the inner VLAN tag type applied
on upstream traffic. The possible values are:
- qtag: Q/QinQ VLAN tagging. (Ethernet Type 0x8100)
- vmantag: VMAN VLAN tagging. (Ethernet Type 0x88A8)
- extremevmantag: Extreme VMAN VLAN tagging. (Ethernet Type 0x9100).
• VLAN filterBits: This field defines the types of VLAN tagging a user is
allowed to use on upstream traffic. The upstream traffic passes a VLAN
filter and if the outermost VLAN tag in the received packet is not allowed
the packet is discarded. The possible values are:
- untag: it allows untagged traffic.
- qtag: it allows Q-tagged traffic
- vmantag: it allows VMAN-tagged traffic.
- extremevmantag: it allows Extreme VMAN-tagged traffic.
By activating multiple bit positions, multiple ethertypes will be accepted. By
activating no bit positions, no ethertypes will be accepted.
• L2CP Tunneling: this field is used to enable Layer 2 Protocol
Tunneling. The Layer 2 Control Protocol tunneling feature is only
available when Access Method field is "transparentLan". The possible bit
positions are:
- stp: when set Layer 2 Control Protocol tunneling is enabled for
Spanning Tree Protocol (destination MAC = 01:80:c2:00:00:00)
- pvst: when set Layer 2 Control Protocol tunneling is enabled for Per
VLAN Spanning Tree Protocol, a Cisco specified extension to STP
(destination MAC = 01:00:0c:cc:cc:cd).
- cdp: when set Layer 2 Control Protocol tunneling is enabled for Cisco
Discovery Protocol (destination MAC = 01:00:0c:cc:cc:cc)
- vtp: when set Layer 2 Control Protocol tunneling is enabled for Virtual
Trunking Protocol (destination MAC = 01:00:0c:cc:cc:cc). The default
setting is 0 for all bits.
Queues & ATM folder
• ATM Service Category: this field determines which atm service
category to use for the PVC. The possible values are:
- ubr: Unspecified bit rate. This is typically used for data applications
- vbrNrt: Variable bit rate - non real-time. (such as VBR RT, except that
CDV (cell delay variance) is not taken into account)
- vbrRt: Variable bit rate - real-time. This is typically used for multimedia
applications.
- cbr: Constant bit rate. This is typically used for telephony applications.
• Schedule Scheme: this field specifies how packets on the ATM PVC
should be scheduled from the queues (strictPriority, deficitRoundRobin,
modifiedDeficitRoundRobin, none)
• Schedule Scheme B1: this field specifies how packets on the ATM PVC
should be scheduled from the queues for downstreamFlows 5 - 8
(strictPriority deficitRoundRobin, modifiedDeficitRoundRobin, none).
• Downstream PCR: This field represents the peak downstream PVC
rate. It specifies in bits per second the peak rate at which bits are to be
sent on this PVC.
• Downstream SCR: this field represents the average downstream PVC
rate. It specifies in Kbits per second the average rate at which bits are to
be sent on this PVC. SCR means Sustainable Cell Rate.
• Downstream MBS: This field represents the maximum number of cells
in a burst in the downstream direction.
Protocols folder:
• Local Switch: This field controls the local switching of the ethernet
packets on the IP DSLAM. The possible values are:
* enabled: it enables local switching on this connection.
* disabled: it disables local switching on this connection.
• Allow Broadcast: this field specifies how broadcast traffic towards the
end-user should be handled. The possible values are:
* true: to forward broadcast traffic to the end-user.
* false: to drop all broadcast traffic.
• ICMP Security: This field is used to allow the IPDSLAM to drop certain
ICMP messages coming on this PVC in the upstream direction. The
purpose of this is to avoid denial of service attacks from the end-users.
PVC1 and PVC2, then all multicast packets received from PVC1 with a
destination address in this range are flooded on PVC2.
• Anonymous McastSubscriber: This field determines whether MAC and
IP address validation is performed when an end-user sends multicast
frames upstream in the network. The possible values are:
* true: end-user source IP and MAC addresses are not validated.
* false: end-user source IP and MAC addresses are validated.
• Virtual MAC: This field is used to activate the function that exchanges
the MAC addresses in the frames that pass, so that only virtual MAC
addresses, chosen by the access network are used within the access
network. The possible values are:
* mat-1-1: 1:1 (one-to-one) MAC address translation
* disabled: Original MAC addresses are used within the access network
(the use of virtual MAC addresses is disabled)
* mat-N-1: N:1 (many-to-one) MAC address translation
* mat-N-1-withLB: Like above but extra virtual MAC addresses may be
used to provide better load balancing for the Ethernet switches in the
aggregation network.
• PVC max MACs: limit for the number of MAC addresses concurrently in use.
• Downst. Flooding: Frames received from the aggregation network will
be forwarded on this PVC if the destination MAC address is unknown to
the DSLAM. The frame must be received in the same VLAN as
associated with the PVC. The possible values are:
* true: this PVC will receive ethernet frame if destination MAC is unknown.
* false: this PVC will not receive ethernet frame if destination MAC is unknown.
Gateway folder:
• Gtw MAC Filter direction: This field specifies on which traffic the
Gateway Mac filtering needs to be done. The possible values are:
* upstream: filter the gateway MAC in the upstream direction only.
* upDownstream: filter the gateway MAC in both the upstream and
downstream direction.
• Gtw Fixed Forwarding: This field specifies on which traffic the Gateway
Mac filtering needs to be done. The possible values are:
* upstream: Filter the gateway MAC in the upstream direction only.
* upDownstream: Filter the gateway MAC in both the upstream and
downstream direction.
• Gtw IP address: the ip address of the gateway.
DHCP, PPPoX, Agents folder
• PPPoE Behaviour on Link Failure: This field decides how the PPPoE
behavior should be when DSL line state changes. This field is only valid
if the "Access Method" field is set to PPPoE or PPPoX and if PPPoE is
used on uplink. Possible values are in the following range: 0...255:
* 0: PPPoE session termination message will be sent immediately.
* 255: PPPoE session termination message will never be sent.
* For any other value in the range a timer with duration of the value per
10 seconds will be started.
WRED
The WRED Application contains the main configuration parameters for a
downstream flow WRED for one VLAN priority and one end-user connection.
Each individual entry is made of User Port, PVC Index, Priority Index, Buffer
Limit and Drop Probability fields. The IP-DSLAM flow implementation allows
multiple VLAN priorities to be mapped to the same downstream flow queue
(downstream flows are configured with Downstream Flow Config Application).
Parameters in the Downstream Flow Wred Application are used to configure the
discard probability of packets with different VLAN priority in the same
downstream flow. The mechanisms Weighted Random Early Discard (WRED)
is implemented to allow configuration of discard probability of packet with
different VLAN priority. The WRED mechanism works as an extension to the
other flow mechanisms in the IP-DSLAM.
• Ne Name: the name of the equipment.
• User Port: the physical line which is mapped to the end-user line.
• PVC Index: It is the logical channel index.
• Down Flow Index: this field represents the index of the traffic queues
(from 1 to 4).
• VPI: this field represents the Virtual Path Identifier (VPI) for the specified
PVC of an end-user line. The VPI and VCI (Virtual Channel Identifier)
identifies the PVC (Permanent Virtual Circuit). The value can be
between 0 and 15; the VPI involved in the PVC.
• VCI: This field represents the Virtual Channel Identifier for the specified
PVC of an end-user line. The VCI and VPI identify the PVC (Permanent
Virtual Circuit).The value can be between 0 and 255.
• S-VLAN: This field specifies the VLAN ID to be used for the Ethernet
traffic (accordingly to 802.1Q) from and to the specified PVC. The value
can be between 0 and 4095.
• Identifying Values: the value of this field is given as a string of octets
separated by spaces. Each octet represents a matching value, that is, a
packet that contains at least one of these values is classified as
belonging to the referred flow.
• Priorities: This value can be between 0 and 7 (where 7 is the highest
priority). It is applicable for the amber and green thresholds.
• Buffer Limit: drop limit is specified as a percentage of the total
queue length (dfcMaxQueueBuffers) for the flow. For example, if the
flow queue can contain 100 packets and wredBufferLimit is set to
70%, then the IPDSLAM's WRED mechanism will start dropping
packets with the specific VLAN priority when more than 70 buffers from
the queue is in use. It is applicable for the amber and green thresholds.
• Drop Probability: This is used to specify the probability that a packet
with a specific VLAN priority will be dropped if the Buffer Limit has been
exceeded.The attribute itself is configured as a percentage of all packets
received with the VLAN priority. For example, if 80% drop probability has
been specified, 4 out of 5 packets with this VLAN priority will be dropped
when Buffer Limit has been exceeded. This parameter is applicable for
the amber and green thresholds.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Command: possible commands are: modify / skip.
• Result: OK | ERROR.
• Error Message: it is an error explanation, if the result was ERROR.
When the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
• Press Apply Selected Rows to confirm the choices to the rows involved
in the command.
• Press Apply Selection to confirm the choices to the rows involved in the
command.
• Press Exit to close.
The application displays a button Check WRED Table that does a check of the
data shown in table without reading the Equipment. So, to check the
consistency of the WRED data already configured into an Equipment, first do a
Read network and then do Check WRED Table.
Upstream Flows
The Upstream Flow Configuration section includes parameters to specify which
packets are to be put in this flow and control details of policing and scheduling in
this direction of flow. This application provides only one folder: Upstream Flows
management. Fields relevant in a provisioning operation in each table's row are
described below.
Upstream Flows Management folder
• Ne Name: The name of the equipment.
• User Port: <shelf>/<slot>/<line> (<slot> is always 1).
• PVC Index: An index for the PVC.
• Flow Index: index of the flow.
• Identifying Values (Octets): according to the flow identification criteria
selected for the PVC, (e.g. a list of p-bit (CoS) or DSCP values in the
incoming packets), the value of this field is given as a string of octets
separated by spaces. Each octet represents a matching value, that is, a
packet that contains at least one of these values is classified as
belonging to the referred flow.
• Policing: Specifies whether this flow should be policed or not (not to be
confused the ATM-level policing of cells). When done, the policing is
based upon the value of the subsequent fields.
• Sustainable Data Rate (Kbps): To carry telephone over IP, at least 192
Kbps are needed and the DSL line must be configured to at least 192
Kbps (192000 bps). Value range: 0 or 32..196608 (Kbps).
• Max Burst: the maximum allowed number of bytes in a burst. A
minimum of 250 bytes are needed to allow a complete telephony over IP
packet in one burst. Value range: 64...16777215.
• Peak Rate Kbps: This field represents the maximum allowed Peak data
rate for the flow in question. When 2 Rate 3 Color Limiter functionality is
enabled the value of this field should be greater than the value specified
in Sustainable Data Rate. The rate must be lower than or equal to the
configured line rate and needs to be configured in steps of 32000 bps. A
value of zero for this object is valid only when ufcRemarkingPbit is set to
-1, this means that 2 Rate 3 Color Limiter is disabled and remarking will
not be done. If ufcRemarkingPbit is set to a value other than -1 then
ufcPeakDataRate value should be greater than ufcSustainableDataRate
otherwise the flow configuration is considered to be an invalid
configuration.
• Peak Burst bytes: This field represents the maximum allowed number
of bytes in a peak burst. When 2 Rate 3 Color Limiter functionality is
enabled the value of this object should be greater than the value
specified in Max Burst.
• Remark Pbit: For 2 Rate 3 Color Rate Limiter, this fields specifies the
VLAN priority that will be written in the upstream traffic forwarded by this
flow, whose data rate is greater than Sustainable Data Rate and less
than Peak Data Rate. Allowed values are:
-1: 2 Rate 3 Color Limiter functionality is disabled and traffic with data
rate greater than ufcSustainableDataRate is dropped.
0-7: VLAN priority in the redirecting traffic is overwritten with the value
specified. Note that Remarking Pbit can not be set to the same value as
the flow Index of the current flow.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Command: modify, skip.
• Result: OK | ERROR.
• Error Message: An error explanation, if the result is ERROR.
• Annotations column is used to write some note about the operation.
Lines
The Lines application contains the main configuration parameters for a downlink
line. Each individual entry in line Entry is indexed with User Port: the end-user's
physical line. This application provides only one folder: Lines management.
Lines Management folder:
• Ne Name: The name of the equipment.
• User Port: <shelf>/<slot>/<line> (<slot> is always 1).
• Broadcast Storm Control (BSC): A broadcast storm means that your
network is flooded with constant broadcast or multicast traffic. Broadcast
storms can eventually lead to a complete loss of network connectivity as
the packets proliferate. This field allows enabling the BSC
(limitToThreshold) or disabling it.
• Broadcast Storm Control Threshold: It a numeric value in the range
1...500 expressed in broadcast packets/sec. When this value is passed
and the field ""Broadcast Storm Control" is enabled, all broadcast traffic
is limited to this value Broadcast traffic above is dropped.
• Multicast Storm Control: This field is the Multicast Storm Control
(MSC) function. The possible values are:
disable: MSC is disabled.
limitToThreshold: MSC is enabled that is multicast is limited to Multicast
Storm Control Threshold field
• Multicast Storm Control Threshold: It a numeric value in the range
1..500 expressed in multicast packets/sec. When this value is passed
and "MultiCast Storm Control" field is enabled, all multicast traffic is
limited to this value. Multicast traffic this value is dropped.
• ATM Traffic Separator Only: this field is used to enable a QoS (Quality
of Service) model where ATM is only used as a separation for the traffic
opposed to the ordinary ATM functionality where also QoS is handled.
The Possible values are:
false: The standard ATM QoS model is used.
true: ATM QoS is disabled and ATM is only used for traffic separation.
This model is used where multiple PVCs are used towards a CPE and
an Ethernet scheduling mechanism is desired. This field can only be
changed if all PVCs on this line are disabled.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Command: modify
• Result: OK | ERROR.
• Error Message: An error explanation, if the result was ERROR. When
the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
Multicast Filters
The Multicast Filter Application contains multicast filter information for PVC.
Each entry describes a range of consecutive multicast group addresses which
are allowed or disallowed, depending on the value of Filter Type, to be
forwarded on the PVC. Each individual entry is made of User Port, PVC Index,
the First Address of a multicast group Internet address range, the Last Address
of the multicast group and VLAN ID and VLAN Priority fields. This application
provides only one folder: Multicast Filters.
Multicast Filters folder:
• Ne Name: IP address of the equipment.
• User Port: <shelf>/<slot>/<line> (<slot> is always 1).
• PVC Index: index of the logical channel that the traffic in question is
coming from. The logical channel contains service-specific settings such
as the type of access method to support and multicast settings.
• Filter Type: This field specifies whether the multicast filter is positive or
negative. If this field is positive, the managed device is allowed to
forward multicast group Internet addresses. If this field is negative, the
• First IP Address: This field represents the first address in the end-user
Internet address range.
• Last IP Address: This field represents the last address in the end-user
Internet address range. This value must be a equal to or higher than of
the value of the field "First IP Address
• Date & Time: Date & Time when the Command is launched.
• Ne Ip Address: IP Address that launches the command.
• Command: enableSubsIpFilter, disableSubsIpFilter, addAddressRange,
deleteAddressRange
• Result: OK | ERROR.
• Error Message: An error explanation, if the result was ERROR. When
the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
VLAN ACL
Access Control Lists (ACLs) provides a mechanism to support enhanced and
flexible filtering criteria on a per flow basis (PVC). Each ACL is made up of a list
of ACL rules which contains multiple parameters to be matched against the
packet contents.
The VLAN ACL (VACL) is an ACL that specifies traffic parameters based on
Layer 3 and above information that is applied to a Layer 2 VLAN or in some
instances a Layer 2 interface. These lists offer a benefit over traditional router
access lists of being applied in hardware and therefore being faster than
traditional ACLs. They also add the capability to filter traffic within an IP subnet
and beyond the IP subnet.
The possible actions currently defined are forward or drop the packet. If no rule
matching the packet is found within the ACL the packet is discarded.
Each row in the application's table is a Rule of an ACL. This application shows
both ACLs with rules attached to them and ACLs without any attached rule. The
latter case may be that of an ACL from which all attached Rules have been
removed. Removing all the Rules attached to an ACL does not automatically
remove the ACL. This application provides only one folder: VLAN ACL.
VLAN ACLs folder
• Ne Name: the name of the equipment.
• Subrack/Slot: subrack/slot of the XDSL card where the specific Vlan
Access Control List is applied.
• ACL id: index of this Access Control List. Value provided by user.
• Rule id: The index of the Rule in ACL that specifies the position. The
order of the rules is very important. The rules are processed in a top
down order. Once a match is found, no further rules are processed. If no
match is found, the packet is dropped.
• Match Action: Only “permit” filtering is allowed.
• Vlan IdMin: This field is used to set the VLAN ID to be permitted.
• Vlan IdMax: This field is not used.
• Date & Time: Date & Time when the Command is launched.
The filtering is not indicated by the values Source Ip Addr Min and Source Ip
Addr Max, but from the range indicated in Source Ip Actual Range field. This
value is evaluated automatically from LCT.
• Destination Ip Addr Min: The first elements of the intended IP source
address range. IP packets from hosts in that range will be filtered,
depending on the value of the action field.
• Destination Ip Addr Max: the last element of the intended IP source
addresses range. IP packets from hosts in that range will be filtered,
depending on the value of the action field.
• Destination Ip Actual Range: the actual element of the intended IP
source address range. IP packets from hosts in that range will be
filtered, depending on the value of the action field.
• Source Port Operator: how a packet's source TCP/UDP port number is
to be compared. The possible values are:
noOperator: no comparison is to be made with source TCP/UDP port number.
equal: equal to comparison.
range: range-based comparison.
• Source Port: the source port number of the TCP or UDP protocol, the
starting port number of the port range.
• Source Port Range: the closing source port number of TCP or UDP protocol.
• Destination Port Operator: how a packet's destination TCP/UDP port
number is to be compared. The possible values are:
- noOperator: no comparison is to be made with destination TCP/UDP port number.
- equal: equal to comparison.
- range: range-based comparison.
• Destination Port: the destination port number of TCP or UDP protocol.
• Destination Port Range: the closing destination port number of the
TCP or UDP protocol.
• Tcp Flags: the value of the TCP Control code/flags. The various bit
positions are:
1 - F, FIN End of data flag.
2 - S, SYN Synchronize sequence numbers flag.
3 - R, RST Reset connection flag.
4 - P, PSH Push flag.
5 - A, ACK Acknowledgment number valid flag.
6 - U, URG Urgent pointer valid flag.
• Tcp Flags Mask: This object represents value of the TCP Control
code/flags mask. The Tcp Flags Mask specifies which of the TCP
Control flags specified in Tcp Flags to match.
The various bit positions are:
1 - F,FIN End of data flag.
2 - S,SYN Synchronize sequence numbers flag.
3 - R,RST Reset connection flag.
4 - P,PSH Push flag.
5 - A,ACK Acknowledgment number valid flag.
• Host MAC Address: the MAC address of the host which is a member of
the Multicast Group.
• Source Filter IP Address: IGMP Version 3 (IGMPv3) adds support for
'source filtering', which enables a multicast receiver host to explicitly signal
sources from which they want to receive traffic. This field is specified in the
IGMPv3 Membership Reports and indicates the source address from which
traffic is expected. Groups for which IGMPv1/v2 Membership Reports are
received are considered to have a this field of 0.0.0.0.
• IGMP Msg Type: the type of IGMP messages that are transmitted and
received for the Multicast Group.
• IGMP Msg Up Time: the time elapsed since the "IGMP Msg Type" was
first received/transmitted.
• Date & Time: Date & Time when the Command is launched.
• Access Node Ip Address: IP Address of the equipment.
Subscriber Info Survey
This application is used to have a look at the Subscriber's Info table. Each line
contains a list of end-user information that the IP-DSLAM has dynamically
learnt. From the list it is possible to get the relationship between end-user MAC
and IP addresses.
• Ne Name: the name of the equipment.
• User Port: the end-user's physical line, which is mapped to the end-user line.
• PVC Index: It is the logical channel index.
• MAC address: MAC address of the end user learnt by the IPDSLAM.
• IP address: For StaticIP, DHCP and DHCPIP over ATM access
methods, relationship between MAC address of the end-user and IP
address of the end-user is maintained in the IP-DSLAM. For these three
access methods, this field will contain the IP address of the end-user.
For other access methods, this field will contain 0.0.0.0 value.
• Virtual Mac: virtual MAC address of end-user generated by IP-DSLAM.
• DHCP Lease Time: it represents the IP address lease time for the
subscriber when DHCP is used as access method.
• GTW Fixed Forwarding: it indicates whether the PVC is configured to
use Fixed Forwarding. There are two possible values:
true: fixed forwarding is enabled.
false: fixed forwarding is disabled.
• Gateway Ip: IP address of the gateway used by the end-user.
• Gateway MAC: MAC address of the gateway used by the end-user
which is learned by the IP-DSLAM.
• Date & Time: Date & Time when the Command is launched.
• Access Node Ip Address: IP Address of the equipment.
In the FDB Unicast Setting folder, the following fields are present:
1. Insert in the Ne Name the name or the IP address of the Equipment.
2. Insert in the Fdb Id (VLAN) an identifier for the database.
3. Insert in the Static Unicast Address an address in hexadecimal format. (e.g.
0A:0B:0C:0D:0E:0F).
4. Insert in the Receive Port Interface Name a name for the unicast address.
5. Insert in the Allowed to go to Interface Names a name for each bridge port, In
order to fill this field the following table must be compiled by clicking in the
"Allowed to Go to Interface Names.
In order to import the data click on Read NE button select the desired ports and
click on Accept selected entries button.
6. Insert in the Static Unicast Status the type of connection. (permanent,
deleteOnReset, deleteOnTimeout, invalid)
7. Data&Time column displays the data and time.
8. IP Address displays the IP address of the Equipment.
9. Result and Error Message columns are used to have a feedback about the
configuration.
10. In order to apply the modifications select the line with the right mouse button and
select Apply.
In the FDB Multicast Setting the following fields are present:
In order to import the data click on Read NE button, detect the ports that you do
not want select, delete them and click on Accept selected entries to confirm, or
Close to exit. Other buttons are present to clear /read information.
6. Insert in the Forbidden Ports Interface Names a name for each bridge port,
not yet configured. In order to fill this field the following table must be compiled
by clicking in the Forbidden Ports Interface Names cell.
In order to import the data click on Read NE button select the desired ports and
click on Accept selected entries button.
7. Desired Status displays the type of connection. (Permanent, deleteOnReset,
deleteOnTimeout, invalid).
8. Data&Time column displays the data and time.
9. Display in the IP Address the IP address of the Equipment.
10. Result and Error Message columns are used to have a feedback about the
configuration.
11. In order to apply the modifications select the line with the right mouse button and
select Apply.
1. Insert in the Ne Name column the name or the IP address of the Equipment.
2. Insert in the S-VLAN Id column an identifier for the VLAN.
3. Insert in the S-VLAN Name column the name of the VLAN.
4. Choose in the Learn scroll list if the Equipment learns the MAC address.
Possible values are 'true' and 'false'.
5. Select in the Command column field the action to be executed. The possible
actions are: create, destroy, set learning and none.
6. Data&Time column displays the data and time when a retrieve operation has
been performed.
7. Display in the IP Address column the IP address of the Equipment.
8. The Result and Error Message columns are used to have a feedback about
the configuration.
9. The Annotations column is used to write some note about the operation.
10. Press Apply Selected Rows to confirm the choices.
11. Press Exit to close.
Ports application
This is a tool to find out an/or change the static VLAN port membership setup on
a EDA class device
1. Insert in the Ne Name column the name or the IP address of the Equipment.
2. Insert in the S-VLAN Id field, the VLAN-ID of the VLAN attached to the egress
port displayed in the User Port Interface Name column.
3. Insert in the S-VLAN Name column the name of the VLAN.
4. Insert in the User Port Interface Name column a port which is permanently
assigned to the egress list for this VLAN by management. Every port in this list
is an existent bridge port. In order to fill this field, the following table must be
compiled by clicking in the User Ports Interface Names cell.
In order to import the data click on Read NE button, select the port and then
click on Accept selected entries button to confirm, press Close to exit from this
application and coming to the VLAN user port membership.
5. In the Tagging field is possible to specify if the referred port should transmit
egress packet for this VLAN as untagged. Possible values are yes or no.
6. Insert in the Command column field the action to be executed. (addPort, delete
Port, setTagging).
7. Data&Time column displays the data and time.
8. Display in the IP Address column the IP address of the Equipment.
9. Result and Error Message columns are used to have a feedback about the
configuration.
10. Annotations column is used to write some note about the operation.
11. Press Apply selected lines to confirm the choices.
12. Press Exit to close.
Static VLANs Management buttons
In the upper window three buttons are displayed:
Read Network Info: the VLAN's data are obtained by the Equipment
Read Local Info: the same data are taken from the local cache.
Look VLANs: it allows you to select which VLANs to read from beforehand.
• invalid (2) - this entry is no longer valid (e.g., it was learned but has
since aged out), but has not yet been flushed from the table.
• learned (3) - the value of the corresponding instance of Fdb Port was
learned and is being used.
• self (4) - the value of the corresponding instance of Fdb Mac Address
represents one of the device's addresses. The corresponding instance of
Fdb Port indicates which of the device's ports has this address.
• mgmt (5) - the value of the corresponding instance of Fdb Mac Address
is also the value of an existing instance of dot1qStaticAddress.
5. Port: the port number of the port on which a frame having a source address
equal to the value of the corresponding instance of MAC Address has been
seen. A value of 0 indicates that the port number has not been learned but that
the device does have some forwarding/filtering information about this address.
6. Data and Time: the data and the time obtained from the Inventory.
7. IP Address: the IP address of the Equipment.
8. Annotations column is used to write some note about the operation.
9. Press Exit to close the application.
10. Read Network: the data are obtained by the Equipment
11. Read Local Info: the data are taken from the local cache.
• Bridge Hello Time (100-1000): The value that all bridges use for Hello
Time when this bridge is acting as the root.
• Bridge Forward Delay (400-3000): The value that all bridges use for
Forward Delay when this bridge is acting as the root.
• Version: version of Spanning Tree Protocol, the bridge is currently running.
• Command: possible commands are: modify / none.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Result: OK | ERROR.
• Error Message: it is an error explanation, if the result was ERROR.
When the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
RSTP Ports
RSTP Bridge is an application useful to manage RSTP Protocol Bridge
parameters on the NE.
• NE: name or IP address.
• Bridge Index: Bridge Group Id.
• Port Name: the type of interface (for example ethG//1/1/1).
• Port Id: The port number of the port for which this entry contains
Spanning Tree Protocol management.
• Priority: The cost of the path to the root as seen from this bridge.
• Port State: The port's current state as defined by application of the
Spanning Tree Protocol. This state controls what action a port takes on
reception of a frame.
• Port Role: Operational role of the interface, as calculated by STP/RSTP
procedures.
• Port Enabling: The enabled/disabled status of the port.
• Designated RootBridge: The unique Bridge Identifier of the Bridge
recorded as the Root in the Configuration BPDUs transmitted by the
Designated Bridge for the segment to which the port is attached.
• Designated Port Path cost: The contribution of this port to the path
cost of paths towards the spanning tree root which include this port.
• Designated Bridge: Bridge Identifier of the bridge which this port
considers to be the Designated Bridge for this port's segment.
• Designated Port: The Port Identifier of the port on the Designated
Bridge for this port's segment.
• Forward Transitions: The number of times this port has transitioned
from the Learning state to the Forwarding state.
• Admin Edge Port: The administrative value of the Edge Port parameter.
A value of YES (1) indicates that this port should be assumed as an
edge-port and a value of NO (2) indicates that this port should be
assumed as a non-edge-port.
• Oper Edge Port: The operational value of the Edge Port parameter. The
object is initialized to the value of foreStpPortAdminEdgePort and is set
NO on reception of a BPDU.
• Admin p2p Port: The administrative point-to-point status of the LAN
segment attached to this port. A value of yes (1) indicates that this port
should always be treated as if it is connected to a point-to-point link. A
value of no (2) indicates that this port should be treated as having a
shared media connection. Comment: A value of auto (3) is not
supported in this release.
• Oper p2p Port: The operational point-to-point status of the LAN
segment attached to this port. It indicates whether a port is considered
to have a point-to-point connection or not
• Admin Path Cost: The administratively assigned value for the
contribution of this port to the path cost of paths towards the spanning
tree root.
• Command: possible commands are: modify / none.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Result: OK | ERROR.
• Error Message: it is an error explanation, if the result was ERROR.
When the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
MSTP Configuration
The Multiple Spanning Tree Protocol (MSTP) has been developed to provide an
efficient means of supporting the multiple instances of Spanning Tree Protocol
(STP) required for deploying numerous VLANs in a switched Ethernet LAN.
Instead of a separate instance of STP for each VLAN (as PVSTP does), MSTP
provides for a grouping of VLANs to share a common instance of STP. So,
several VLANs can be mapped to a small number of STP instances. This mainly
allows the MSTP to provide a traffic load balancing depending on the VLANs the
traffic belongs to. Moreover it assures, as the RSTP does, the path reliability. Its
behavior is almost the same of that foreseen by the RSTP with the following
difference: MST allows the user to map multiple VLANs to the same MST
instance, but a VLAN can be mapped to one and only one MST instance. This
management application allows the network operator to view and modify the
configuration and status for Multiple Spanning Tree Protocol running in each
bridge group.
• NE: name or IP address.
• Bridge Id: Bridge Group Id.
• Forced Version: the Spanning Tree Protocol which runs on the bridge group.
• Admin Status: it specifies if MSTP procedures are enabled or disabled
on a particular bridge group.
MSTP Instances
This application allows viewing and modifying the configuration and status for
Multiple Spanning Tree Protocol instances running on a particular Bridge Group.
It is composed by the following folders: MSTP inst and Vlan Mapping.
MSTP inst
This folder is composed by the following fields:
• NE: name or IP address.
• Bridge Id: Bridge Group Id.
• MSTP Index: STP Instance ID.
• Bridge Priority: Bridge Priority for this particular instance.
• Designated Root: The bridge identifier for the root of the spanning tree
calculated by this MST Instance.
• Root Cost: The cost of path from this bridge to the root bridge.
• SNMP bridge Index: SNMP Index for the bridge interface which has
been designated as root port for this particular instance.
• Number of topology changes: Number of topology changes on this
MST Instance, since the last start of MSTI.
• Number of mapped VLANs: Number of VLANs which have been
mapped to this instance of MSTI.
• Command: possible commands are: create / modify / delete / none.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Result: OK | ERROR.
• Error Message: it is an error explanation, if the result was ERROR.
When the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
VLAN Mapping
This folder is composed by the following fields:
• NE: name or IP address.
• MSTP Inst: An integer with values ranging from 0 to 64 that identify a
the CIST/MSTI instance to which this VLAN is mapped.
• VLAN Id: The VlanId for which this entry contains the instance mapped.
• Command: possible commands are: create / modify / delete / none.
• Date & Time: Date & Time when the Command is launched.
• Ip Address: IP Address that launches the command.
• Result: OK | ERROR.
• Error Message: it is an error explanation, if the result was ERROR.
When the error log is a multi-line text, this field shows the last line of it.
• Annotations column is used to write some note about the operation.
MSTP Ports
This application allows viewing and modifying the configuration and status for
each bridge interface within in particular Bridge Group. Interfaces may have
different configuration and states for different instances of MST.
• NE: name or IP address.
By clicking Read Network – Active Page you can retrieve information from
equipment depending on selected tabbed panel.
By clicking Read Network –All Pages you can retrieve information from all
tabbed panels.
Link Aggregator folder
This folder is composed by the following columns:
The fields shown in grey (e.g. MAC Address) are not editable.
1. Select the NE by means of the relevant scroll list. Logical Name is relevant only
if the Operator use a Network Management System.
2. Display the value in the MAC Address Selection Mode (auto or manual).
MAC address, MAC Address Selection Mode and Interface Name fields are
not editable.
3. Define the aggregator priority in the Actor System Priority.
Actor System ID represents an identifier for the System that contains this
Aggregator. This field is not editable.
4. LAC Enable field specifies, if the protocol is supported (true) or not (false).
5. Actor Admin Key identifies in a univocal way the Link Aggregation Group entry.
It is used to separate the ports of the switch into separate groups (LAG) of
aggregated ports.
6. Actor Oper Key field is the current operational value of the Key for the
Aggregation Port.
7. Partner System Id is the identifier for the current protocol Partner of this
Aggregator. This field is not editable.
8. Partner System Priority indicates the priority value for the partner system.
9. Partner Oper Key identifies which ports may be aggregated together.
Actor Oper Key, Partner System Id, Partner System Priority, Partner Oper
Key are not editable fields.
10. Status and Error Descr help the Operator to have more information about the
operation executed
Link Aggregator Port folder
1. Select the NE by means of the relevant scroll list.
The Logical Name is relevant only if the Operator use a Network Management
System.
Interface Name field is the interface name of the port and can assume the
values: none, browse.
2. Command field allows executing the action. Possible values are:
* create
* modify
* delete
3. Actor Admin Key field is the current administrative value of the Key for the
Aggregator. The administrative Key value may differ from the operational Key
value.
4. Actor Oper Key field is the current operational value of the Key for the
Aggregation Port.
Actor Oper Key field is not editable.
5. Actor Admin State is used to define the administrative value of priority
associated with the Partner's System ID. This parameter can assume the
following values: none or update
If you choose Update a new window will appear and you can select one or more
of the following values: LACP_Activity, LACP_Timeout, Aggregation,
Synchronization, Collecting, Distributing, Defaulted, Expired.
6. Actor Oper State is the current operational values of Actor_State as transmitted
by the Actor in LACPDUs.
1. Lower Interface Name column specifies the textual name of the interface.
2. SubInterface Name column specifies the name of the subinterface. The
Subinterface is automatically created from the equipment
3. C-VID column specifies the C-VLAN id for this VLAN subinterface. This value
must be set by the operator.
4. S-VID column specifies the S-VLAN Id for this VLAN sub interface. This value
must be set by the operator.
5. SubInterface Number column specifies the index for the VLAN Sub interface. It
can be set by the operator or it can be chosen by the equipment automatically.
2. Specify in the field Lower Interf Name the type of interface (BVI)
3. In the C-VLAN ID selects a number that specifies the C-VLAN id for this VLAN
subinterface. A value in the range 1...4094 indicates a specific C-VLAN id to be
configured for this subinterface. A value of 0 indicates the no C-VLAN, i.e. this
VLAN carries traffic with S-VLAN tag only.
4. S-VLAN ID specifies the S-VLAN Id for this VLAN subinterface. The C-VLAN
and S-VLAN values must be unique among subinterfaces configured.
5. In the SubInterface Number write a number that specifies the index of the
VLAN-SubInterface. If the operator does not fill this field an index will be created
automatically by the equipment.
The fields SubInterface If-Index and Table Indexes report internal tables and
they have debugging purpose.
6. Click on Create button in order to create a new VLAN subinterface.
7. Click on Refresh button in order to update the "Property Details" window.
8. Click on Close Details button in order to exit.
3. Insert in the Route mask field the Route Mask for the IP address inserted.
4. Insert in the Route Gateway field the Route gateway address.
5. Oper Status shows the actual state of the Route.
6. Press Create to insert the data before configured in the table.
2. Insert the IP Interface Name by selecting it in the list. You can refresh the list of
available IP interfaces by clicking on the round button.
3. In the IP Address field is possible to read the interface IP address.
4. IP If-Index: an index automatically associated to the IP address.
5. Display in the field L2 Interface Name the type of interface.
6. L2 If-Index is the index of lower interface of which PPPoE client interface is bound.
7. In the Target IP address insert the IP address of the target system.
8. Insert the Target Phys Address insert the MAC address of the target system.
9. Specify the Mapping Type. The type mapping that can be:
- static: it indicates that the mapping is statically configured.
- dynamic: it indicates that the IP address to physical addresses mapping has
been dynamically resolved.
- invalid: it has the effect of invalidating the corresponding entry.
- other.
10. The field Table Indexes reports internal tables and they have debugging purpose.
11. Click on Create button in order to create a new entry.
12. Click on Modify button in order to modify the entry.
13. Click on Refresh button in order to update the entry.
1. Creation of a static entry in the ARP Cache Table, in order to associate a MAC
address to the specific IP address to be pinged. This operation must be
executed by the Configuration->IP/Ethernet Management-> ARP Table
configuration window. This operation is not mandatory; if you do not execute it
the ping operation automatically will execute it.
2. Start the Ping request and read the Ping results.
3. In the Owner Name scroll list is possible to insert the user involved in the test.
4. In the Test Name scroll list is possible to insert the name of the test.
5. In the Target IP Address field is possible to insert the IP address of the
Equipment involved in the test.
6. Min RTT (msec) gives a response about minimum ping round trip time received.
7. Max RTT (msec) gives a response about maximum ping round trip time received.
8. Average RTT (msec) gives a response about the current average ping round
trip time received.
9. Probe Responses gives a response about the number of ping received.
10. Probe Sent gives a response about the number of ping sent.
11. Last Good Probe gives a response about the data and time of the last ping.
12. Press Refresh Ping Table in order to update the ping table.
13. Press Refresh Current entry to update the entries.
14. Press Send Ping to start the operation.
15. Press Delete Current entry to cancel the entries.
16. Press Cancel to exit.
In many cases, DHCP clients and server(s) are not belonging to the same IP
sub-network. This occurs especially in Access Network in which users are
directly connected to access DSLAM, while the DHCP servers are located in the
core IP network, behind the users’ IP default gateway, far away (from IP point of
view) from the users themselves.
In such cases, a DHCP Relay Agent device is required to transfer DHCP
messages between clients and servers.
The tool is composed by 4 applications, according to the L3 DHCP part of
configuration to be performed.
The L3 DHCP Profile Application provides the parameters for the configuration
of L3 DHCP Relay Agent. One entry in this table reflects a profile defined by a
manager which can be used to configure the L3 DHCP Relay Agent. It is
composed by the following folders:
• L3 DHCP profiles;
• Action.
4. Subnet Mask: the subnet mask associated with the IP address specified in IP
Address field. The value of the mask is an IP address with all the network bits
set to 1 and all the hosts bits set to 0.
5. Default Gateway: the IP address of the default gateway to be used.
6. Dscp: this field defines the DSCP (Differentiated Services CodePoint) for DHCP
messages.
7. Priority Tag: the Ethernet Priority tag to be used for DHCP messages.
8. Server Policy: this field is used to define the policy followed by the DHCP Relay
Agent to select the DHCP servers. Possible values are:
- byPriority: the DHCP Relay Agent sends a unicast message to highest priority
DHCP Server and if it does not respond within a fixed timeout it tries with DHCP
Server having priority 2 (if existing) and so on.
- allListedServers: the DHCP Relay Agent sends a unicast message to each
DHCP Server listed in the table at the same time.
Action folder:
This folder provides fields to control the application itself.
1. To Do: the command to be applied: create, modify, delete.
2. Result: result of command (OK, ERROR).
3. Error: in case of error a description of it.
The L3 DHCP Server Profile Application provides the list of DHCP Servers that
are relayed by the L3 DHCP Relay Agent.
The L3 DHCP VLAN Application provides the parameters for the configuration
of L3 DHCP Relay Agent per VLAN.
L3 DHCP Interface lists the interfaces on which L3 DHCP Relay Agent is enabled
for specifics S-VLAN. To enable a certain interface on more than one VLAN, add
additional entries using the same interfaces (or port) and different VLANs.
1. Admin Status: the administrative status of the interface. It can assume the
values enabled or disabled.
2. Oper Status: The operational status of the interface. It can assume the values
up or down.
3. Command: it specifies the configuration operation to perform:
- create: it provisions the parameters to the equipment.
- delete: it removes the gateway information.
- modify: it changes the configuration parameters
- setAdmin: it set the admin status.
4. Result: it shows the response for the operations executed (OK, ERROR).
5. Error: This read only field shows the type of the error.
6. Date&Time: the timestamp (time that is printed to a file or other location to help
keep track of when data is added, removed, sent, received) referred to the
inventory operation.
7. Ip Address: IP address of the Equipment.
8. Annotations: it is used to write some note about the operation.
IGMP Interface
This folder is used for enabling/disabling the IGMP Protocol. The following
parameters are defined:
1. Insert the IP address of the Equipment in the Ne Name.
2. Interface Name is the interface used in the Equipment (EthG, lag, ipoE)
3. Insert the identifier for the VLAN in VLAN Id.
4. Admin Status: the administrative status of the interface. It can assume the
values enabled or disabled.
5. Command: it specifies the configuration operation to perform:
- create: it provisions the parameters to the equipment.
- delete: it removes the gateway information.
- modify: it changes the configuration parameters
- setAdmin: it set the admin status.
6. Interface Type is the type of interface used in the Equipment.
7. Oper Status: The operational status of the interface. It can assume the values
up or down.
8. Querier IP address: The address of the IGMP Querier on the IP subnet to
which this interface is attached. Read only field.
9. Querier Up Time: The time since Querier IP address was last changed, in time
ticks i.e. hundredth of seconds. Read only field.
10. Querier Expiry Time: The amount of time remaining, in time ticks i.e. hundredth
of seconds, before the Other Querier Present Timer expires. If the local system
is the querier, the value of this object is zero. Read only field.
11. Wrong Version Queries: The number of queries received whose IGMP version
does not match the equivalent IGMP version parameter. Both IGMP requires
that all routers on a LAN be configured to run the same version, thus, if any
queries are received with the wrong version, this indicates a configuration error.
Read only field.
12. Joins: The number of times a group membership has been added on this
interface; that is, the number of times an entry for this interface has been added
to the cache table. This parameter gives an indication of the amount of IGMP
activity. Read only field.
13. Groups: The current number of entries for this interface in the router cache
table. Read only field.
14. V1 Querier Timer: The time remaining, in time ticks i.e. hundredth of seconds,
until the host assumes that there are no IGMPv1 routers present on the
interface. While this is non-zero, the host will reply to all queries with version 1
membership reports. This variable applies to IGMPv2 or 3 hosts that are forced
to run in v1 for compatibility with v1 hosts or routers present on the interface.
Read only field.
15. V2 Querier Timer: The time remaining, in time ticks i.e. hundredth of seconds,
until the host assumes that there are no IGMPv2 routers present on the
interface. While this is non-zero, the host will reply to all queries with version 1 or
2 membership reports. This variable applies to IGMPv3 hosts that are forced to
run in v2 for compatibility with v2 hosts or routers present on the interface. Read
only field.
16. Result column shows the response for the operations executed (OK, ERROR).
17. Error Message column shows the type of the error.
18. Data and Time: the data and the time obtained from the Inventory.
19. IP Address: the IP address of the Equipment
20. Annotations column is used to write some note about the operation.
Static Multicast
1. Insert the IP address of the Equipment in the Ne Name.
2. Interface Name: This is the textual name of the interface on which configuring
the static multicast address. The following possibilities are available:
- intLag//1/slot (e.g. intLag//1/5);
- ethG//1/slot/port (e.g. ethG//1/1/3);
- lag//slot/group (e.g. lag//1/2);
- ipoEnumber (e.g. ipoE2).
3. Insert the identifier for the VLAN in VLAN Id.
4. Multicast IP Address: the value of the multicast destination address coming
from the network.
5. Command: it specifies the configuration operation to perform:
- create: it provisions the parameters to the equipment.
- delete: it removes the gateway information.
- modify: it changes the configuration parameters
-setAdmin: it set the admin status.
6. Result column shows the response for the operations executed (OK, ERROR).
7. Error Message column shows the type of the error.
8. Data and Time: the data and the time obtained from the Inventory.
9. IP Address: the IP address of the Equipment.
10. Annotations column is used to write some note about the operation.
5. Last Reporter: the IP address of the source of the last membership report
received for this IP multicast group address on this interface. If no membership
report has been received, this object has the value 0.0.0.0.The Output format is
decimal dotted notation (x.y.z.t)
6. Up Time: the time elapsed since this entry was created.
7. Expiry Time: The minimum amount of the time remaining before this entry will
be declared expired.
8. Version 1 Host Timer: The time remaining until the local router will assume that
there are no longer any IGMP version 1 members on the IP subnet attached to
this interface.
9. Version 2 Host Timer: The time remaining until the local router will assume that
there are no longer any IGMP version 2 members on the IP subnet attached to
this interface.
10. Data&Time column shows data and time when this information has been taken.
11. Ne IP Address column shows the IP address of the Equipment.
12. Annotations column is used to write some note about the operation.
13. Press Exit to close.
Mcast Host Cache
This is a tool to get info about the IGMP Host Cache table contents. To get data
from live equipments you must be sure that the IP address is inserted into the
"NE addr" field. Then, press [Read Network] to find data on the NE. The result of
the search is displayed in "MCast Host Cache Table".
1. Ne Name: This is the IP address of the equipment.
2. VLAN Id: identifier for the VLAN.
3. Multicast IP Address: IP multicast group address for which this entry contains
information. Output format: decimal dotted notation (x.y.z.t).
4. Interface Name: the interface for which this entry contains information for an IP
multicast group address (EthG, lag, ipoE).
5. Last Reporter: the IP address of the source of the last membership report
received for this IP multicast group address on this interface. If no membership
report has been received, this object has the value 0.0.0.0.The Output format is
decimal dotted notation (x.y.z.t).
6. Up Time: the time elapsed since this entry was created.
7. Data&Time column shows data and time when this information has been taken.
8. IP Address column shows the IP address of the Equipment.
9. Annotations column is used to write some note about the operation.
10. Press Exit to close.
7. Data&Time column shows the data and time when this information has been
taken from each device.
8. IP Address column shows the actual IP address used to access each device.
9. Annotations column is used to write some note about the operation.
10. Press Exit to close.
By using the relevant scroll lists, choose which equipment behavior you want for
VoIP application. This selection is possible for H248 and SIP protocol.
The upper part of the window contains some icons that allow opening the
relative application (H248 Virtual Gateways, H248 Terminations, etc...) with an
amount number of folder associated to it. The graphic is an all-in-one
editor/browser/writer tool, with more than one folder. Each folder contains an
editable spreadsheet-like table for a consistent set of parameters. The folders
are strictly related to one another, and they can be seen as sections of a one big
table. Each table's row has its continuation in the folders located at its right or left
hand. The equipment’s or IP address is the first field that you come across in the
first folder. The data displayed in each row of the subsequent folders are always
related to the equipment referred to. Some fields may be of read-only type: such
fields are displayed when reading from equipment but not used when
configuring this service on it. Cells related to such parameters are yellow
colored. Cells related to mandatory parameters are ivory colored and cells
related to parameters not yet supported by the equipment are grey colored.
H248 Virtual Gateways
This application is composed of several folders and allows to read or configure
(create and delete too) a Virtual Gateways with their parameters for H248
protocol. In the following there is the description of every folder.
Gateway1 folder
• NE Name: the IP address of the Network Element.
• Identifier: It is an integer value that univocally identifies the Virtual Gateway.
• Domain Name: It is the domain name associated with The Virtual Gateway;
the domain name of each Virtual Gateway is unique inside equipment.
• IP Address: local IP address used by Virtual Gateway for H.248 messages.
• UDP Port: The local UDP port number used by the Virtual Gateway for
H.248 messages.
• Subnet Mask: It is the subnet mask associated with the IP address
specified in "Signaling Gateway Default GW" parameter; the value of the
mask is an IP address with all the network bits set to "1" and all the
hosts’ bits set to "0".
• Default GW: IP address of the default gateway for the Virtual Gateway.
• Outer Ether Type: It is the value of Ether Type field (i.e. Tag Protocol
Identifier) for tagged frames. Possible values are 8100, 9100 and 88a8.
• Outer VLAN Id Tag (-1..4094); this field defines the Ethernet VLAN Id
tag for signaling data on current Virtual Gateway. If this value is 0, no
VLAN is assigned. If this value is -1 no tagging is performed, Outer
VLAN will always be applied.
• Outer Prior. Tag (0..7): This field defines the Ethernet Priority tag for
signaling data on current Virtual Gateway. This field is only meaningful
when the "Signaling Gateway Outer VLAN Id Tag" parameter is different
from -1.
• Inner Ether Type: The value of the Ether Type field i.e. Tag Protocol
Identifier, for tagged frames, this VLAN tag type is applied to the inner
VLAN tag. Possible values are 8100, 9100 and 88a8.
• Inner VLAN Id Tag (-1..4094): This defines Vlan Id tag used in the layer
2 VLAN Tag header for signaling data on current Virtual Gateway. If this
value is 0, no Inner Vlan Id tag is assigned. If this value is -1, no tagging
is performed. InnerVlan is optional.
• Inner Prior. Tag (0..7): This field defines the Ethernet Priority tag in the
layer 2 VLAN Tag header for signaling data on current Virtual Gateway.
This field is only meaningful when “Signaling Gateway Inner VLAN Id
Tag “parameter is different from -1.
• Signalling Dscp (0..63): This field defines DSCP field (Differentiated Services
Code Point) for IP packets of signaling data on current Virtual Gateway.
• Termin Address Format Options: the addressing format method for
the Terminations in the Virtual Gateway (etsiWithPhysicalLocation,
• Def Phys Term Event Detection: style of event priming present in the
default events descriptor for an analogue termination, which can be no
event detection (empty) or one of various combinations of hook state
events (on, of) which can be detected either on the basis of an actual
state transition (Exct) or additionally when the hook state indicates that
that transition has previously already occurred (Stat). The default events
descriptor is applied when the line is initially unblocked, and when the
line is placed back into the NULL context by a H.248 Subtract command.
• Def Phys Term Event Reporting: style of event reporting that the
gateway uses when the default events descriptor matches a hook event.
• Call Type Discriminator Timer: the value of the Call Type Discriminator
Timer (expressed in milliseconds). The timer is used to discriminate the
call type (event calldisres for package ctyp).
• Emergency Digit Map Name: the Emergency Digit Map name.
• Default digit Map Name: the Default Digit Map name.
Gateway3 folder
The list of the fields below is displayed in the third folder for each Virtual
Gateway entry found on each investigated Network Element.
• NE Name: the IP address of the Network Element.
• Identifier: index of the signaling gateway.
• Normal Calls Threshold: This field is used to set the threshold of the
normal calls ETSI-NR package). The value is in the range: 0-65536.
• Emergency Calls Threshold: This field is used to set the threshold of
the emergency calls (ETSI-NR package).The value is in the following
range: 0-65536.
• Rate Increment Period: This field is used to set the Rate Increment
Period (ETSI-NR package). The value, in the range 0-1000, is
expressed in milliseconds.
• Max Leak Rate: This field represents the Max Leak Rate (ETSI-NR)
package. The value is in the range: 0-100.
• Leak Rate Growth: This field represents the Leak Rate Growth Factor
(ETSI-NR) package. The value in the range: 0-100.
• Long Timer (10ms): Long digit map timer (interdigit timeout).
• Short Timer (10ms): Short digit map timer (multiple pattern match timeout).
• Start Timer (10ms): Start digit map timer (digit map activation timeout).
• Long Threshold (10ms): Time threshold for Long digit detection.
• Ringing Tones (10ms): Provisioned default timeout for ringing.
• Dial Tone (10ms): Provisioned default timeout for dial tone.
• Ring Tone (10ms): Provisioned default timeout for ring tone.
• Busy Tone (10ms): Provisioned default timeout for ringing.
• Equipment Engaged Tone (10ms): control of the provisioned default
timeout for equipment engaged tone.
parameters for H248 protocol. In the following there is the description of every
folder.
Termination folder
The list of the fields below is displayed in the Termination folder.
• NE Name: the IP address of the Network Element.
• User Port: info relevant to the physical port. This string must is
displayed in the following way: subrack (sr) / slot (sl) / module (mod) /
port number (port).
• Virtual GW Index: This field is the identifier of the Virtual Gateway to
which current physical port belongs.
• Virtual GW Name: This field is the gateway domain name associated
with the virtual gateway.
• Media Local IP Address (4.21 only): This field is the local IP address
used by the termination for media.
• Admin Status: The operator sets this parameter to command the
block/unblock of the termination. Possible values:
- forcedBlock: The user port is taken out of service immediately, even if
busy.
- block: The user port is taken out of service only if it is not busy.
- unblock: The user port is brought into service.
• Termination Name (4.11 only): The complete descriptive name that
describes this termination and its use. This is a unique identifier that is
assigned to the termination and it is used in the protocol messages that
are sent from the gateway.
• Status: It represents the operational status of the termination
• Busy Status: the status of the application use of the termination (null,
idle, busy).
• Inner Prior. Tag: This object defines the Ethernet Priority tag in the
layer 2 VLAN Tag header for signaling data on current Virtual Gateway.
This object is only meaningful when “Signaling Gateway Inner VLAN Id
Tag “parameter is different from -1.
• Signalling Dscp: This object defines the DSCP field (Differentiated Services
Code Point) for IP packets of signaling data on current Virtual Gateway.
• Max Concurrent Active Calls: The maximum number of calls (incoming or
outcoming) that may be active at the same time for a given VoIP card. It
may be inserted to reduce the Maximum Number of Concurrent Active Calls
in order to limit the overall power consumption for the Network Element.
• Longhand Format: this value allows reading the enabling/disabling of
the longhand format of the H.248 notation. When set to 'true' the format
is longhand. When set to 'false' the format is shorthand. In case of SIP:
When set to 'true' the format is generic one; when set to 'false' the
format is 'compact form
• Dial Map: dial map that establishes the expected numbers and pattern
of digits for telephone numbers. Patterns are separated by '|' sign.
• Dial Map Emergency: a dial map that establishes the expected
numbers and pattern of digits for emergency telephone numbers.
Patterns are separated by '|' sign.
• Local Transport Protocol: This field represents the preferred local
Transport Protocol used by the Virtual Gateway for SIP messages.
Possible values: udp, tcp.
• Protocol Profile Index: This field describes the protocol profile chosen
in the configurable download mapping file.
• Service Profile Index: This field describes the service profile chosen in
the configurable download mapping file.
• Supported Codecs: this value represents the bitmap of supported
codec. The possible values are:
unknown
g71164kAlaw Æ G.711 64 kbit/s A-law
g71164kmulaw Æ G.711 64 kbit/s mu-law
g71156kAlaw Æ G.711 56 kbit/s A-law
g71156kmulaw Æ G.711 56 kbit/s mu-law
g722 Æ G.722 (SB-ADPCM)
g7231 Æ G.723.1
g7231AnnexA Æ G.723.1 Annex A (silence suppression)
g726 Æ G.726 (ADPCM)
g727 Æ G.727 (Embedded ADPCM)
g728 Æ G.728
g729 Æ G.729 (CS-ACELP)
g729AnnexB Æ G.729 Annex B (silence suppression)
• SIP Protocol Version: This is the version of SIP protocol. It follows the
same format as SIP version information contained in the SIP messages
generated by this SIP entity.
Registrars/Proxies folder
The list of properties below is displayed in the second table for each Virtual
Gateway entry found on each investigated Network Element.
• NE Name: the IP address of the Network Element.
• Identifier: value that univocally identifies the virtual gateway.
• Registrar IP Address: this is the IP address of Registrar server.
• Registrar Port: this is the port of Registrar server.
• Registrar KeepAlive Timer: Timer for checking Registrar availability.
0 means checking is disabled. Timer is expressed in seconds.
• Registrar Expires (secs): this is the time indicating how long the
registration is valid. The value is expressed in seconds (default: 3600).
• Backup Registrar IP Address: IP address of backup registrar server.
• Backup Registrar Port: backup registrar port.
• OutBound Proxy Domain Name: name of the Out Bound Proxy server.
• Outbound Proxy IP Address: this is the IP address of Out Bound
Proxy server.
• Outbound Proxy Port: this is port used by Out Bound Proxy server.
• OutBound Proxy Keepalive Timer: Timer for checking Outband proxy
availability.
• Bck OutBound Proxy IP Address: IP address of backup Outband proxy server.
• Bck OutBound Proxy Port: Port used by backup Outband proxy server.
• Interdigit Timer: If no DialMap defined, INVITE is sent after timer
expiration during dialing (seconds).
Timers folder
The list of properties below is displayed in the third table for each virtual gateway
entry found on each investigated Network Element.
• NE Name: the IP address of the Network Element.
• Identifier: value that univocally identifies the virtual gateway.
• TimerA (100..1000): this object reflects the initial value for the retransmit
timer for the INVITE method. The retransmit timer doubles after each
retransmission, ensuring exponential back offing network traffic. This
object represents the initial time a SIP entity will wait to receive a
provisional response to an INVITE before resending the INVITE request.
• TimerB (32000..300000): This object reflects the maximum time a SIP
entity will wait to receive a final response to an INVITE. The timer is
started upon transmission of the initial INVITE request.
• TimerC (180000..300000): This object reflects the maximum time a SIP
Proxy Server will wait to receive a provisional response to an INVITE.
The timer C MUST be set for each client transaction when an INVITE
request is proxied
• TimerD (0..300000): This object reflects the amount of time that the
server transaction can remain in the 'Completed' state when unreliable
transports are used. The default value MUST be greater than 32000 for
UDP transport and its value MUST be 0 for TCP/SCTP transport
• TimerE (100..1000): This object reflects the initial value for the
retransmit timer for a non-INVITE method while in 'Trying State'. The
retransmit timer doubles after each retransmission until it reaches T2 to
ensure an exponential back off in network traffic. This object represents
the initial time a SIP entity will wait to receive a provisional response to
the request before resending the non-INVITE request.
• TimerF (32000..300000): This object reflects the maximum time a SIP
entity will wait to receive a final response to a non-INVITE request. The
timer is started upon transmission of the initial request.
• TimerG (0..1000): This object reflects the initial value for the retransmit
timer for final responses to INVITE requests. If timer G fires, the
response is passed to the transport layer once more for transmission,
and timer G is set to fire in MIN(2*T1, T2) seconds.
From then on, when timer G fires, the response is passed to the
transport again for transmission, and timer G is reset with a value that
doubles, unless that value exceeds T2, in which case it is reset with the
value of T2. The default value MUST be T1 for UDP transport and its
value MUST be 0 for reliable transport like TCP/SCTP.
• TimerH (32000..300000): This object reflects the maximum time a
server will wait to receive an ACK before it abandons retransmitting the
response. The timer is started upon entering the 'Completed' state
• TimerI (0..10000): This object reflects the maximum time a SIP entity
will wait to receive additional ACK message retransmissions. The timer
is started upon entering the 'Confirmed' state. The default value MUST
be T4 for UDP transport and its value MUST be 0 for reliable transport
like TCP/SCTP.
• TimerJ (32000..300000): This object reflects the maximum time a SIP
server will wait to receive retransmissions of non-INVITE request. The
timer is started upon entering the 'Completed' state for non-INVITE
transactions. When timer J fires, the server MUST transition to the
'Terminated' state.
• TimerK (0..10000): This object reflects the maximum time a SIP client
will wait to receive retransmissions of responses to non-INVITE
requests. The timer is started upon entering the 'Completed' state for
non-INVITE transactions. When timer K fires, the server MUST transition
to the 'Terminated' state. The default value MUST be T4 for UDP
transport and its value MUST be 0 for reliable transport like TCP/SCTP.
• TimerT1 (200..10000): This object reflects the T1 timer for a SIP entity.
T1 is an estimate of the round-trip time (RTT) between the client and
server transactions.
• TimerT2 (200..10000): This object reflects the T2 timer for a SIP entity.
T2 is the maximum retransmit interval for non-INVITE requests and
INVITE responses. It's used in various parts of the protocol to reset other
Timer* objects to this value.
• TimerT4 (200..10000): This object reflects the T4 timer for a SIP entity.
T4 is the maximum duration a message will remain in the network. It
represents the amount of time the network will take to clear messages
between client and server transactions. It's used in various parts of the
protocol to reset other Timer objects to this value.
EDA4.11 Only folder
This folder is contains fields that are valid only for EDA 2530 R4.11.
• NE Name: the IP address of the Network Element.
• Identifier: Value that univocally identifies the virtual gateway.
• Binding Card <shelf>/<slot>: This parameter is used to associate a
virtual gateway to a specific hardware. It is necessary to specify the shelf
and the slot where the card is lodged. The 'none' value with the 'modify'
command is used to unbind the virtual gateway from the card.
• Media Local IP Address: This is the local IP address used by the
Virtual Gateway for media. If this is left empty (0.0.0.0) then the same
local IP address is used for Media and Signaling and it is the one
specified in "Virtual Gw Ip Address" field of the folder “Gateways”.
• Media Subnet Mask: This is the subnet mask associated with the Media
Default Gateway specified in “Media Default GW” parameter. The value
of the mask is an IP address with all the network bits set to 1 and all the
hosts bits set to 0.
• Media Default GW: This is the IP address of the primary default
gateway used for media of current Virtual Gateway. If this is left empty
(0.0.0.0) then the same Default Gateway is used for Media and
Signaling and it is the one specified in “Signaling Gateway Default GW”
parameter.
• Media Dscp: this field defines the DSCP (Differentiated Services Code
Point) parameter for IP packets of media data on the current Virtual
Gateway.
• Media VLANId Tag: This field defines the Ethernet Vlan Id tag for media
data on current Virtual Gateway. If this value is 0, no Vlan Id tag is
assigned. If this value is -1, no tagging is performed.
• Media Priority Tag: This field defines the Ethernet Priority tag for media
data on current Virtual Gateway. This object is only meaningful when
“Media VLAN Id Tag” parameter is different from -1.
• Fixed Forwarding: This parameter enables/disables forwarding traffic
between users, through users Default Gateway. In case it is enabled the
traffic is sent from a user to another through sending users Default
Gateway. Otherwise (disabled) the traffic is sent from a user to another
following the standard IP/Ethernet rules. The possible values are:
* enabled: it enables sending traffic to the sending users Default Gateway.
* disabled: it - uses standard IP/Ethernet forwarding rules.
App.Control folder
This folder provides the fields to control the application itself that are:
• NE Name: the IP address of the Network Element.
• Identifier: index of the signaling gateway.
• Admin Status: the administrative state of the Virtual Gateway.
(OutOfService: out-of-service state, ForcedOutOfService: immediate
transition to the out of service state, InService: set the virtual gateway in
to the in service state).
• Oper Status: this value allows reading the operational status of the
virtual gateway. Possible values are: notConfigured, inService,
outOfService, disconnected, restarting.
• Command: it specifies the configuration operation to perform:
- create: it provisions the parameters to the equipment.
- delete: it removes the gateway information.
- modify: it changes the configuration parameters
- setAdmin: it set the admin status.
• Result: it shows the response for operations executed (OK, ERROR).
• Error: This read only field shows the type of the error.
• Date&Time: the timestamp (time that is printed to a file or other location
to help keep track of when data is added, removed, sent, received)
referred to the inventory operation.
• Ip Address: IP address of the Equipment.
• Annotations: it is used to write some notes about the operation.
SIP Terminations
This application allows setting up a user service by creating from scratch,
deleting and modifying VOICE over IP Terminations tied to Virtual Gateways. It
is composed by the following folders:
• Termination
• Application Control
Termination folder
• NE Name: the IP address of the Network Element.
• User Port: info relevant to the physical port. This string must is
displayed in the following way: subrack (sr) / slot (sl) / module (mod) /
port number (port).
• Termination index: This is an incremental index to be assigned to each
sub-termination attached to the same physical line.
• Virtual GW Index: This field is the identifier of the Virtual Gateway to
which current physical port belongs.
• Virtual GW Name: identifier for the Virtual Gateway.
• Media Local IP Address (4.21 only): This is the local IP address used
by the termination for media.
• Phone Number: the phone number on the port. The phone number can
start with '+' and contains only numeric characters. This field is
mandatory for SIP terminations.
• UserName: the username associated to the phone number.
• Clear Views: this option allows canceling the data containing in the
tables.
• Open Form for Advanced Query: this option allows finding some data
using a SQL query form.
It is possible to use this tool only if a Read Network operation has been made.
The Exact match check button allows performing a search in the specified field.
The Replace button inserts the data of the search in the table erasing the old
value. The Add button allows viewing the result of the old search and the new
data.
Clear cache, this option allows canceling data containing in the cache tables.
From the View menu, the following menus are listed:
• Restore default colors: to restore the normal table's colors, removing
any color tag that may have been put there to flag the success or failure
of an operation.
• Collapse column: this menu allows Operator to collapse the column selected.
• Expand column: this menu allows the Operator to expand the column
before collapsed.
• Show NE address line: this menu shows the address line to the Operator.
• Show format toolbar: this menu allows the Operator to displays some
useful toolbars for the data formatting (e.g. to change a field to normal to
bold, to change its font…). Moreover it allows displaying the Rows
spinner in order to add the rows.
• Flat buttons look: to display the button in flat mode (no borders
highlighted)
• Set columns visibility: only for UNIX systems.
• Draw stripes: this menu improves the visibility, filling (in violet) odd lines.
• Clear stripes: this menu allows clearing before filling by means of the
Draw stripes menu.
From the Options menu, the following items are listed:
• Stop on Error: to stop applying the configuration sheet at the first error
• Enable Report mode: to produce a report file containing all the I/O data
(including result codes and error descriptions), at the end of each
configuration run.
Termination Search Criteria, this option allows to find the desired voice
terminations. Reading terminations from network can be restricted to a subset
based on a selection of values for:
• shelf (1..4);
• slot (1..21,all);
• or for particular termination name (physical indication in term of
shelf/slot/port).
H248 Gateway Search Criteria, this option allows to find the desired virtual
gateways. Reading from network can be restricted to a single Network
Element's gateway. To do so, check the "By Identifier" radio-button from the
Gateway Search Criteria frame.
• Searching by Identifier;
• Requires exactly typing the Identifier of a Virtual Gateway.
1. Select Add Peer to display the link ADD NTP Peer window.
2. Insert the new address on the NTP Peer IP Address field.
3. Select Apply to confirm and Close to exit the window.
The SCTS has the purpose to extract a Network Timing Reference (NTR) from
the line symbol timing of any traffic interface able to carry a NTR and to
distribute it to all the interface cards to make all the outgoing traffic streams
synchronous with such NTR.
This function is used to manage the SCTS (Simplified Centralized Timing
Source), to select different timing sources options (up to eight sources) to be
used by the centralized equipment synchronization.
The SCTS module will use automatically the synchronization source configured
with the highest priority if the parameter “Quality Level Mode” is disabled or if
this parameter is enabled it will use the source with the better quality level and
highest priority.
Inside the "Configure SCTS Service" window, two sections are shown:
1. Synchronization Parameters section: This section allows viewing or modifying
the parameters that the synchronization process uses, to determine the Master
Line. There are two different methods:
• Locked Out: the column states that the source has been locked-out by
an operator command.
• Rx Quality Level: the column represents the quality level received from
this synchronization source.
• Rx QL Override: the value in this column is used to overwrite the quality
level of each synchronization source.
• Tx Quality Level: the value in this column provides the SSM/TM
message.
• Available: this column shows if the synchronism source is candidate for
a possible nomination to become the clock reference. If the source is in
WTR status or if the interface is faulty, the synchronism source will not
be available. When the synchronism source is used as Synchronization
Master, the index "YES-MASTER" will be shown.
SETG Compliance field shows the characteristics of the Synchronous
Equipment Timing Generator (G.813 Option 1, G.813 Option 2, Stratum 3, and
Stratum 4).
SETG Status (Synchronous Equipment Timing Generator) field indicates the
synchronization status of the Equipment (locked-free running).
Synchronisation Master field indicates which synchronization source listed in
the table is Master. If the Equipment is not locked to a synchronization source
this field has none value, instead if the Equipment is locked and then
synchronized this field has the Index of the synchronization source.
Reset Clock Degrade button is active when a condition of alarm is present in a
synchronization source (Clock Degrade field in alarmed state). By pressing this
button is possible to delete the alarm.
Index: this number represents the row, to identify a synchronism source with a
unique number.
1. In the Interface Type NTP Engine scroll list is possible to choose between:
Line, the Synchronization Source is a card inserted in the Equipment.
Station, the Synchronization Source is an external line (2Mbit or 2MHz).
NTP Engine, the Synchronization Source is an external NTP service.
2. The Station Interface ID field represents the address of the Station Interface
(external line).
This parameter is shown only when the Interface Type is configured as
Station.
3. The Station Interface Type indicates the type of stream used (2MHz, E1
Structured, and E1 Unstructured).
4. The Station Interface Sa Bits Config allows configuring which Sa bit of the E1
frame is used to convey the SSM message.
This parameter is applicable only if the Interface Type is Station and when the
Station Interface Type is E1 Structured or E1 Unstructured.
5. Insert in the Slot field the physical slot position where the unit is lodged.
6. Insert in the Port field the number of the port.
The parameters Slot and Port are meaningful only when the Interface Type is
configured as Line.
7. By means of the relevant spinners insert the Wait to Restore (WTR) Time
(min.). This value represents the time (from 0 to 12 minutes in 1 minute step)
while a synchronism source that has been declared unavailable can be
considered for the selection process again. It represents a waiting time to avoid
intermittent switches of the synchronism source
8. By means of the relevant spinners insert the Priority Level. This value
represents the priority level of the synchronism source nominated to become the
clock reference. The value "1" represents the highest priority; the value "8"
represents the lowest one.
9. In the Locked Out field is possible to lock a nominated source.
10. The Overriding Rx SSM/TM field is used to enable/disable the overwriting of
the synchronization source quality level.
11. The SSM/TM override value field is used to overwrite the quality level of each
synchronization source.
12. Press Apply to confirm.
1. Insert in the Connection Module Type scroll list the type of Connection Module
used.
2. Press Apply to confirm this operation.
3. By means of the 60 check boxes, is possible to choose which line will be
associated to an external device. The Operator must check only the line to be
connected as external device.
4. Press Apply to confirm this operation.
The section relevant to the check boxes is valid only for cm-adslpotsx60-PPB
connection module type.
5. Press Refresh to update or Close to exit.
PATH: (Configuration-> Line Test -> POTS/ISDN Line Test Input Profiles)
This application allows the operator to create, delete, and modify VCP Test
Profiles. The GUI is an all-in-one editor/browser/writer tool, with one folder. This
folder contains an editable spreadsheet-like table for a consistent set of
parameters. The equipment name (or IP address) is the first field. The data
displayed in each row are always related to the equipment referred to. The fields
"Result" and "Error" are of read-only type: such fields are displayed when
reading from equipment. A default profile, named DEFVAL, is furnished by the
equipment.
none : no filter
filter3KHz : 3 KHz Filter
filterCMSG : C-Message Filter
filter15KHz : 15 KHz Filter
filter3dot4KHz : 3.4 KHz Filter
filterD : D-Filter
• Test Type: the REN measurement technique used and it can have the
following values:
regularPhone: regular phone REN test.
electronicPhone: electronic phone REN test
• Threshold Power: the minimum signal power (in tenths of dBm0) that
must be observed for at least 178 ms for this test to return a meaningful
result. If no signal is seen meeting this requirement within 8 seconds,
then the test times-out and returns a zero-power result.
• Break Percent: the length of the break (open-circuit) period for a single
pulse and is specified as a percentage of the pulse (make plus break)
period. The make period is therefore 100% minus break Percent of the
pulse period. This input must be greater than 20% and less than 80%.
The actual break period may be further limited by the switching
characteristics of the test circuit.
• Pulse Per Second: the duration of each pulse (make plus break) period
and is specified as a pulse rate (pulses per second). This input must be
greater than 7 and less than 13. The maximum pulse rate may be further
limited by the switching characteristics of the test circuit.
• Dtmf Digit: the expected value of the decoded DTMF digit. Possible
values from digit0 to digit9.
• Tone Frequency: the frequency (specified in Hertz) of the tone
generated during the Trans Hybrid Loss test. Possible values:
hz200(0) : 200 Hz
hz400(1) : 400 Hz
hz1020(2): 1020 Hz
hz3500(3): 3500 Hz
• Tone Power Level: the tone generated during the Trans Hybrid Loss
test. The tone power level is specified in tenths of dBm referenced to the
zero transmission level point, or dBm0.
• Signal Power: 1010 Hz signal output during Signal to Noise Ratio Test.
• Command: the operation to perform: create, delete, modify
• Result: it shows the response for operations executed (OK, ERROR).
• Error: This read only field shows the type of the error.
PATH: (Configuration Æ Line Test -> POTS/ISDN/SHDSL Line and Interface Test)
This option allows the Operator to perform line test on the POTS/ISDN/SHDSL
cards.
The tests performed over each line are configurable by means of the Test
Mask, Test Extension Mask and Tone Profile fields. The extension tests (that
are configurable by the column Test Extension Mask) require setting a Test
Profile also. The management of the Test Profiles is executed in an external
application (Configuration Æ Line Test Æ POTS/ISDN Line Test Input Profiles).
The extension tests are only in manual mode.
The application is divided in two different folders: Tests, which set the line test
parameters and Result to display the result of the test.
1. Select a row from the table, and then double click to write in the table.
2. Insert a name for the line test.
3. Select the NE from the relevant scroll list. For the AXH/EDA-LCT, only one NE
will be accessible.
4. Choose the type of test:
Automatic, this test is available only for the POTS cards.
Manual, test performed port by port. Operator must choose the port to test.
5. If the test is manual, specify the Subrack, slot and port.
Only the slot with an inserted card will be shown. The Card field is automatically
filled with the type of the card relevant to the slot number inserted by the
Operator.
6. In the Test Mask field the Operator is able to choose:
All,all the tests are chosen and enabled.
Update, it allows to enable some items among a set of test already enabled
by default.
New, it allows enabling a set of line tests to perform among all the possible
tests, in order to create a new profile that can be saved.
Test Mask field is used to assign a name to a profile, the Select All button
enables the selection of the entire test while Reset erases the entire test before
checked.
Set As Default check box allows the Operator to configure that profile as
default.
OK button applies the modifications, Close allows to exit without changing the
parameters.
The possible basic tests to be started are:
• DC Voltage A to B, this test measures the Continuous Voltage between
A and B
• DC Voltage A to Gnd, this test measures the Continuous Voltage
between A and ground
• DC Voltage B to Gnd, this test measures the Continuous Voltage
between B and ground
• AC Voltage A to B, this test measures Alternate Voltage between A and B
• AC Voltage A to Gnd, this test measures the Alternate Voltage A and
ground
• AC Voltage B to Gnd, this test measures the Alternate Voltage between
B and ground
• Resistance A to B, this test measures the Resistance between A and B
• Resistance A to Gnd, this test measures the Resistance between A and
ground
• Resistance B to Gnd, this test measures the Resistance between B and
ground
• Capacitance A to B, this test measures the Capacitance between A and B,
i.e. Continuity Loop
• Capacitance A to Gnd, this test measures the Capacitance between A
and ground
• Capacitance B to Gnd, this test measures the Capacitance between B
and ground
• Battery Feed Voltage, this test measures the Battery Feed Voltage
• Loop Current, this test measures the Loop Current
• Reverse Polarity Resistance A to B, this test measures the Reverse
Polarity Resistance A and B
• Ring Voltage – loaded, this test measures the Ring Voltage with load
• Off-Hook Detection, this test measures the Off-Hook Detection
• Dial-Tone Test, this test measures the Dial Tone Test
When the Operator enable a Test Extension Mask the following mask will
appear.
The Test Extension Mask field is used to assign a name to a profile, the Select
All button enables the selection of the entire test while Reset erases the entire
test before checked.
The Set as Default check box allows the Operator to configure that profile as
default.
The OK button applies the modifications, Close allows to exit without changing
the parameters. Possible extension tests are:
• Resistance A to B with offset, this test measures Resistance A to B with
offset
• Resistance A to battery, this test measures the Resistance A and battery
• Resistance B to battery, this test measures the Resistance B and battery
• Active Noise, this test measures the sum of the line circuit active noise
and the subscriber loop noise using one of selected weighing filters
• Distance To Open, this test diagnoses a line to locate a cable cut
• Passive Noise, this test measure the sum of the line circuit passive noise and
the subscriber loop noise using one of the selected weighing filters
• Ringer Equivalency Number Test, this test calculates the Ringer
Equivalency Number for the telephone attached to the line
• Arbitrary Single Tone Measurement, this test measures the frequency
and power of a single arbitrary tone between 0 and 4000 Hz
• DC Feed Self Test, this test verifies the capability of the SLIC to drive
currents into a load and to measure the voltage developed across it
(using dummy load)
• On/Off Hook Self Test, this test verifies the capability of the line card
circuitry to detect a simulated on-hook and off-hook event
• Ringing Self Test, this test verifies the capability of the line card circuitry
to generate a ringing voltage at reduced amplitude and to perform ring
trip upon a simulated off-hook event
• Metering Self Test, this test verifies the capability of the line card
circuitry to generate a metering pulse at reduced amplitude
• Dialing Self Test, this test verifies the capability of the line card circuitry
to detect pulse dialing and DTMF dialing; tones and pulses are
generated by the interface itself.
• Transmission Test, this test verifies that the line card can pass signals
in the digital to analog and analog to digital direction; it measures trans-
hybrid loss open-circuit and a load impedance applied to the line; these
trans-hybrid loss results are checked against expected values to
generate a pass/fail result
• Trans Hybrid Loss, this test measures the Trans Hybrid Loss of the line
circuit by generating a tone and measuring the reflected signal (the
subscriber loop is always connected)
• Signal to Noise Ratio, this test measures the signal to noise ratio
due to circuit noise and quantization distortion while applying a 1000 Hz
test tone to the loop
• ISDN Pattern Injection Test with Loopback 1, this test executes a pattern
injection test with loopback in LT towards the ET (i.e. local loop).
Injected pattern is a fixed one and cannot be chosen and also the test is
fixed. Only for ISDN boards. It has not effect on other kind of boards.
• ISDN Pattern Injection Test with Loopback 2, this test executes a pattern
injection test with loopback in NT (i.e. remote loop). Injected pattern is a
fixed one and cannot be chosen and also the test is fixed. Only for ISDN
boards. It has not effect on other kind of boards.
Results folder is used to read the results of the test.
Each parameter has values for downstream, and values for upstream. The
following parameters are included in the Loop diagnostics:
Line parameters
• Loop attenuation: defined in G.997.1 as Line Attenuation (LATN).
Defined as difference between the total transmitted power and total
received power (dB). All sub carriers are used in the calculation.
• Signal attenuation: defined in G.997.1 as Signal Attenuation (SATN).
Defined as difference between the total transmitted power and total
received power (dB). Only sub carriers that are used as bearer are part
of the calculation.
• Signal to noise ratio: defined in G.997.1 as Signal-to-Noise-Ration-
Margin (SNRM). This parameter gives the maximum noise that can be
induced on the line while still meeting the targeted Bit Error Rate (BER)
on all sub carriers (dB).
• Attainable net data rate: defined in G.997.1 as Maximum Attainable Data
Rate (ATTNDR). This parameter gives the maximum attainable net data
rate (without ADSL coding) that can be achieved, while still meeting
targeted SNR and BER, and accounting for available coding and
latency. The unit for this exported parameter is bps (bits per second).
• Transmit power: defined in G.997.1 as Actual Aggregated Transmit
Power (ACTATP). This parameter gives the total amount of transmit
power (dBm).
Sub-carrier parameters
• Transfer function: This parameter is not directly defined in the standard.
G.992.3 defines CCF-ps as the Channel Characteristic Function H (f)
per sub carrier as a complex transfer function per sub carrier.
• Attenuation (log): defined in G.997.1 as the logarithmic representation of
the transfer function in dB (HLOGps). This parameter contains only the
real part of the complex transfer function value.
• Quiet Noise: Quiet Line Noise PSD per sub carrier is defined in G.992.3
as the noise present in a particular sub carrier when no signal is present
(QLN-ps). The unit of this parameter is dBm/Hz.
• SNR margin: Signal-to-Noise-Ratio per sub carrier (SNRps) is defined in
G.992.3 as the ration between the received signal and the received
noise for a particular sub carrier (dB).
Most parameters have a special value (defined in the standard) indicating out of
range or not measurable. These values are exported as “Out of range” text.
• Load.
Save utility (File -> Save) saves precompiled lines (and results) to file in CSV
format (and automatically in .raw format). In a second while you can import them
with Load option (from CSV and raw format) and execute them again. These
lines are saved in CSV format file so you can also import and modify them with
an ASCII editor (VI, notepad) or with Excel application (setting separator char=’;’
in Control Panel -> Regional Setting -> Number -> List Separator).
• Cancel: it allows breaking the command on a line and the session test
continues on the subsequently line.
• Abort: it allows to break the whole session test.
• Exit: it allows to close this application.
* unknown
The CPE presence can be detected without training the line. If the line is
configured for Annex B, only CPE modem of Annex B type can be
detected.
• Reliability: it specifies the reliability of the results. Possible values are :
* reliable
* modReliable
* notReliable
* newMeasReq
* unsupportedHw
* shortLineReliable
* cpeDetected
The test results will be always displayed also when the results are unreliable (for
example if the line is too long).
• Estimated Length (m): Estimated line length in meters between the IP
DSLAM and the subscriber termination point.
• Loop Attenuation @ 300kHz (dB): Estimated loop attenuation at
300kHz expressed in dB.
• Attenuation @ 300kHz (dB): it specifies the maximum
measurable/reliable attenuation at 300 KHz expressed in dB.
• Mean Upstream Noise Level (dBm/Hz): Average value of noise power
spectrum density in upstream direction.
• Mean Downstream Noise Level (dBm/Hz): Average value of noise
power spectrum density n downstream direction.
• ADSL deployment: Indicator intended as guidance for ADSL service
deployment. Indications: Possible, Uncertain or Not Possible. This result
is based on the estimated length and attenuation @ 300 KHz.
The following parameters are measured by the application.
The descriptions below describe the parameters of the test results, which can be
seen graphically or exported as raw data text files from AXH/EDA LCT (export
file and data collection tool):
• TDR: Time Domain Reflectometry (TDR) impulse diagram equivalent in
decibel. Each value is spaced 1/ (1024*4312.5) seconds in time. The
value spacing can be interpreted in a length unit equal to (x meter),
where x = 0.5*velocity of propagation*10000*1/ (1024*4312.5)
corresponding to one-way physical length fraction, that is, the physical
length from CO to customer/breakpoint. The "Velocity of propagation"
value can be specified from the folder "Tests" in the appropriate column.
Velocity of propagation is the speed at which an electric signal passes
through a cable.
• Echo Frequency Response: Magnitude (absolute value) of the Echo
Frequency Response of the line per sub carrier in decibel.
• Input Impedance: Estimated Input Impedance of the line including far-
end termination per sub carrier in Ohm.
• Insertion Loss: Line Insertion Loss (attenuation) of the line per sub
carrier in decibel.
• Noise Ne: The measured near-end line noise per sub carrier in the
upstream band in unit dBm/Hz.
• Noise Fe: The estimated far-end line noise per sub carrier in the
downstream band in unit dBm/Hz.
• SNR Ne: Signal to Noise Ratio per sub carrier in the upstream band.
The SNR is calculated based on: maximum allowed transmit power,
insertion loss of the line and the line noise.
• SNR Fe: Signal to Noise Ratio per sub carrier in the downstream band.
The SNR is calculated based on: maximum allowed transmit power,
insertion loss of the line and the line noise.
• Bitloading NE: Estimation of the maximum attainable load of bits per
sub carrier in Upstream band. The Bit loading is calculated based on the
SNR with an assumed SNR margin of 6 dB.
• Bitloading FE: Estimation of the maximum attainable load of bits per
sub carrier in downstream band. The Bit loading is calculated based on
the SNR with an assumed SNR margin of 6 dB.
The SELT test range and reliability depend on the type of cable characteristics
such as attenuation, and line termination. In addition, any DSL CPE modem
connected to the line under test must be turned off (if test results other than CPE
Modem presence are desired).
A new window will be displayed with the graph. It is possible to save the graph
to a file. In order to execute this operation the user must execute the following
steps:
1. To select the folder (Echo Frequency Response, Insertion Loss, Noise FE/NE,
SNR FE/NE, Bit Loading FE/NE, TDR, Input Impedance)
2. Select the row;
3. Double Click right mouse button;
4. To select the command Export Tests To Graph.
5. Select the Yes button when the following question is displayed Export Tests to
file in graph format?
6. Fill the File Name field (for default the file is stored in
<installDir>\data\Graph\EdaSelt directory).
7. Click on Save button.
• ICMP Stats
• ICMP MSG Stats
• VOIP Stats
• MSTP Bridge Stats
• MSTP Instance Stats
• MSTP Port Stats
• MCAST IGMP Instance Stats
• MCAST IGMP Port stats
• MCAST Content Stats
• DHCP L3 Counters
RSTP – Bridge Stats
This window reports the following information:
• Conf BPDUs Transmitted
• Conf BPDUs Received
• Conf TCN BPDUs Transmitted
• Conf TCN BPDUs Received
• Expired BPDUs
• Topology Change Num
• Last Topology Change Time [centisec]
• Tot Topology Change Num
RSTP – Port Stats
This window reports the following information:
• Conf BPDUs Transmitted
• Conf BPDUs Received
• Expired BPDUs
• Topology Change Num
• Last Topology Change Time
• Ongoing Topology Change Num
• Tot Topology Change Num
Ethe MAC Stats
This window reports the following information:
• NE
• Logical Name
• Record Time
• Interface Name
• Incoming Octets
• Incoming Frames
• Incoming Discarded Frames
• Incoming Errored Packets
• Outgoing Octets
• Outgoing Frames
• Outgoing Discarded Frames
• Outgoing Errored Packets
• Incoming Multicast Packets
• Incoming Broadcast Packets
• Outgoing Multicast Packets
• Outgoing Broadcast Packets
IP Stats
This window reports the following information:
• NE
• Logical Name
• Record Time
• IP Version
• Total Incoming IP Datagrams
• Discard Incoming IP Datagrams
• Discarded Incoming IP Datagrams (Unknown Protocol)
• To be Forwarded Incoming IP Datagrams
• Incoming IP Fragments
• Reassembled IP Fragments
• NotReassembled IP Fragments
• Discarded Incoming IP Datagrams (Invalid Address)
• Discarded Incoming IP Datagrams
• Successfully Delivered Incoming IP Datagrams
• Outgoing Request IP Datagrams
• Discarded Outgoing IP Datagrams
• Successfully Delivered Outgoing IP Datagrams
• Failed Fragmented Outgoing IP Datagrams
• Outgoing Generated Datagram Fragments
ICMP Stats
This window reports the following information:
• NE
• Logical Name
• Record Time
• IP Version
• Total Incoming ICMP Messages
• Discarded Incoming ICMP Messages
• Total Outgoing ICMP Messages
• Discarded Outgoing ICMP Messages
ICMP MSG Stats
This window reports the following information:
• NE
• Logical Name
• Record Time
• IP Version
• Type
• Incoming Per-Type ICMP Messages
• Outgoing Per-Type ICMP Messages
VOIP Stats
This window reports the following information:
• NE
• Logical Name
• Record Time
• Virtual Gateway Id
• Successful Controller Commands
• Failed Controller Commands
• Successful Gateway Commands
• Failed Gateway Commands
• Retransmitted Commands
• Active Terminations Number
• Active Contexts Number
• Ephemeral Terminations Number
• Total Incoming SIP Request Messages
• Total Incoming SIP Response Messages
• Total Outgoing SIP Request Messages
• Total Outgoing SIP Response Messages
• Total Retransmitted SIP Request Messages
• Total Retransmitted SIP Response Messages
• IUADUA Layer 3 traffic messages from the Gateway to the MGC
• IUADUA Layer 3 traffic messages from the MGC to the Gateway
MSTP-Bridge Stats
This panel allows user to collect MSTP counters (bridge/group level) and reports
the following information:
• Conf BPDUs Transmitted
• Conf BPDUs Received
• Topology Change BPDUs Transmitted
• Topology Change BPDUs Received
• Received Errored Packets
MSTP-Instance Stats
This panel allows user to collect MSTP counters (instance level) and reports the
following information:
• Conf BPDUs Transmitted
DHCP L3 Counters
This window reports the following information:
• Upstream DHCP Discovery Packets(toward DHCP servers).
• Upstream DHCP Request Packets (toward DHCP servers).
• Received DHCP Packets encapsulated on Ethernet V2 frames.
• Received DHCP Packets encapsulated on Ethernet 802.3 frames.
• Received Unknown DHCP Packets.
• Received DHCP Discovery Packets.
• Received DHCP Offer Packets.
• Received DHCP Broadcast Request Packets.
• Received DHCP Ack Packets.
• Received DHCP Unicast Request Packets.
• Received DHCP Release Packets.
To start a collection:
• Insert the Slot and the Port to be monitored.
• Press Read Network - Active Page or Read Network – All Pages
according to the measurement.
You can also collect counters continuously using Read Mode panel:
1. Select Continuous checkbox.
2. Specify Polling Time [sec] (e.g. 10).
3. Select Scrolling checkbox to scroll automatically to the latest collected values.
To graph a collection
When you enable continuous collection, you can graph collected values
selecting a line and clicking Right mouse button -> Graph.
With Save/Load utility you can save and import old collected values and graph
them offline (clicking Right mouse button -> Graph Offline).
This tool allows starting performance and raw data collection on the NE and
seeing the collected results. The tool is structured in two folders:
• Sink Jobs where you can specify collection parameters (a Job entry).
• Reports where you can see the collected results.
To compile a new Job entry it is necessary to click right mouse button and select
New Job item or select Edit menu and New Job item.
A new row is inserted in Job Table and compiles every cell double clicking on it.
Select the NE address from a menu list (or LogicalName).
Select Primary and Secondary Url where data collected (.gz files) are moved via
tftp protocol. Possible syntax is “tftp://xxx.yyy.hhh.zzz/PerfSink/” where
xxx.yyy.hhh.zzz= tftp server ip address.
NOTICE TFTP Server must be in running. If you have any problems of transfer file
please check the following conditions:
- TFTP server is running;
- home directory of the TFTP Server is set correctly. You can verify in the
windows Tftpd32 that the field Current Directory is set as the field Base
Directory in the Tftpd32:Settings window;
- access's permissions (you can verify in the Tftpd32:Settings window that
the Read Only field us not checked.
If you modify the TFTP configuration in order to apply the new settings you
will have to close and to restart the TFTP protocol and this tool
Specify a Transfer Delay (in seconds from 0 to 600) to specify a minimal delay
before NE will send data via tftp (so it is useful to avoid network congestion
balancing tftp transfers). A special value Random (obtained specifying “” in
Transfer Delay field) is useful to choose a random value from 0 to 600.
Start the performance Job (start a collection and a transfer operation on NE) so
that every 15 minutes (plus the specified Transfer Delay ) a .gz file is sent by
NE to tftp server machine
NOTICE The performance collection can be started only if an NTP (Network Time
Protocol) server is active on the network. If such requirement is not fulfilled
the counters on the equipment cannot be started.
When the number of performance collections is enough stop the job. If needed
check the job status to see the current transfer state.
After a transfer operation is completed successfully it is possible to Load in the
Report tab the collected records contained in .gz file/files.
It is possible to browse the collected records and save them in new file with
different format [.csv (ascii), .html, .perfo].
2.4.27.2 Utilities
There are to available utilities to save, load and see precompiled Job lines
• Save Job Order
• Load Job Order
Equipment Alarm Status section shows the following type of alarms for each
Subrack:
• Subrack Connection: it indicates alarms in the connection among the
subracks.
• Power Supply: it indicates a fault in the power supply subrack.
• Temperature: The temperature has risen above normal operative range.
• Cooling Fans: There is a fault inside a least one cooling fan. Clicking on
the Details button for more information.
• CTS Timing: it indicates SCTS alarms in one of the Subracks. Click on
the Details to have a report of the alarms.
Active Input Contacts section shows the Input Ground Contacts (if this feature
is available). In order to display details about the Input Contact status click on
Details button.
In this area the operator can activate a pop up menu by clicking on any slot. The
cursor is displayed with a hand, the "finger" icon indicates which mouse button
must be clicked to display the slot menu. The menu permits accessing the unit
configuration functions.
When a unit is configured, its name is displayed on the front panel while an
empty slot indicates a not equipped unit. When the unit inserted is different from
the one configured, the front panel is drawn outside the Sub Rack.
The unit border of an empty slot is displayed in grey color. When the unit
inserted is different from one configured, the unit border is displayed in red color.
On the top of the area there is a string, which identifies the Sub Rack and on the
top of each slot there is a LED, indicating the alarm status:
• Red: One or more alarms are detected inside the unit (or the color
specified in Application General Configuration/LED Colors window);
• Green: There are no alarms (or the color that it has been specified in the
Application General Configuration/LED Colors window);
• Grey: The slot is empty.
Under each slot is indicated the relevant position number. There are three
different colors of background field:
• Grey: when the relevant unit is not involved in any active protection scheme;
• Red: when the relevant unit is involved in an Automatic Protection switch;
• Blue: when the relevant unit is involved in a Manual Protection switch.
3. Select the unit type, by clicking on the relevant item in the scroll list.
emptySlot
displays a reserved slot;
cp-2530-4xGbEth
Common Part Card with on board up to 4 Gigabit Ethernet interfaces;
cp-2530-4xGbEth-NTP
Common Part Card with on board up to 4 Gigabit Ethernet interfaces
and NTP Synchronization feature;
adslx64-NP
ADSL card with 64 lines over POTS (Not Protectable);
adsl-isdnx64-NP
ADSL card with 64 lines over ISDN (Not Protectable);
vdslx32-NP
VDSL card with 32 lines (Not Protectable);
shdslx32-MultiServices
SHDSL card with 32 lines;
potsx60-NP
POTS card with 60 lines (Not Protectable);
potsx64-NP
POTS card with 64 lines (Not Protectable);
isdnx32-SIP-4B3T-NP
32xISDN (4B3T line code) for VoIP SIP unit (Not Protectable);
isdnx32-SIP-2B1Q-NP (not used)
32xISDN (2B1Q line code) for VoIP SIP unit (Not Protectable);
Pressing an alphabetical key, a "Quick Search" popup window is displayed,
which allows to enter a pattern-matching string to help searching the wished unit
name in the list.
NOTICE For the unit code number, see the chapter "Composition" of the System
Description handbook.
According to the configured units and to the allowed equipment
configurations, some selections for the selected position are not allowed and
error messages will be notified.
Proceed as follows:
1. Move the cursor over the slot corresponding to the unit to be removed and
display the floating menu by a right click of the mouse.
2. Select the Delete item to display the confirmation window.
3. Click the YES button to confirm, or click the NO button if you refuse the
operation.
NOTICE A warning window will show up if the unit to be deleted is involved in a cross-
connection or there are active lines present. In this case the delete
command will be refused.
2.6.1.1 About
The About item shows a window text that contains a brief description about the
interfaces lodged on board of the equipment.
This item shows a text window, indicating the type of unit inserted, its alarm
status and the alarm severity associated to the slot.
This item displays the hardware and software information about the unit.
Through this window, the operator can check the active memory bank, the
software and the hardware release of each unit.
There are two sections inside the window, the Software and the Hardware
Inventory.
The Software Inventory window provides information about:
• Boot memory;
• Bank1 memory;
• Bank2 memory;
• Monitor.
The fields above are described with the following labels:
Code, this label shows the Software Code;
Release, this label shows the Software Release;
Date, the label shows the update date;
Valid, this label shows the downloaded software status:
Yes: The downloaded software does not have any problem;
No: equipment detected some problem in the software downloaded.
Running, this label shows the software running status:
Yes: The equipment software is running;
No: The equipment software is not active.
The Hardware Inventory window provides information about the Base Board
with the following fields:
Card Type, this field shows the code number of the unit;
Serial, this field shows the Factory Unit Serial Number;
Use the Refresh button to update and Close button to exit the window.
2.6.1.4 Refresh
2.6.1.5 Delete
This item permits to delete the unit from the selected slot.
This item permits to perform the software and hardware reset or reset to factory
default of the unit.
Reset to Factory Default choice is available for all units except the Common
Part Unit.
DANGER ! The unit reset procedure could cause the traffic interruption. A warning
window will ask to confirm the operation.
This window allows to display/to configure the SFP module on a CP-IP card.
The SFP (Small Form factor Pluggable transceivers) technology essentially
allows to choose the characteristics of the transceiver of a port of a card already
in service (“hot-pluggability”), by simply inserting (or removing) the SFP
transceiver directly from the front panel of the housing motherboard, then
optimizing card application flexibility and CAPEX cost. The SFP types basically
fall in two categories:
• SFP able to provide the hosting card processor with useful information
about its inventory data, contained in an EEPROM; usually such devices
are named SFP without digital monitoring interface;
• SFP able to provide the hosting card processor with both useful
information about its inventory data (such information are contained in
an EEPROM) and digital monitoring functions; usually such devices are
named SFP with digital monitoring interface; the digital monitoring
functions are the capability to provide the following real time measures:
- Internal SFP temperature;
- SFP Supply Voltage;
- SFP Bias Current;
WARNING The pluggable optical module approved by Ericsson for use with Ericsson
equipment have been certified and labeled appropriately by their respective
manufacturers then verified for use in Ericsson products. The use of any
pluggable optical module not approved by Ericsson invalidates the
compliance certification of this equipment, including, but not limiting to,
safety, EMC and functional performances characteristics. If this is done
Ericsson accepts no liability or responsibility for such action, and the person
or organization performing such action is deemed to have accepted full
responsibility for the system.
• SFP Frame type column displays the type of SDH or Ethernet frame that
it has been configured in the "Configure SFP" window (in the
The window is divided in 2 sections. In the upper section you can modify the
configuration of the "SFP module" for the selected port.
3. Set "the SFP MONI-tagged required" parameter (false => a not MONI tagged
SFP is allowed to be provisioned in the relevant SFP slot; true => only "MONI'
tagged SFP are allowed to be used).
4. Set the "SFP Frame Type" parameter that specifies the frame type (SDH or
Ethernet) with the SFP will be provisioned (stm1, stm4, stm16, eth10, eth100,
eth1000).
5. Set the "SFP Medium Type" parameter that specifies the characteristics of the
transmission medium with the SFP will be provisioned (electrical, dualFibre,
undefined).
6. Set the "SFP Laser Wave Length" parameter that specifies the wavelength of
the SFP expected to be provisioned into the relevant SFP slot.
7. Set the "SFP connected to Y-Coupler" parameter that specifies if the SFP is
connected towards the Y-coupler (true), or if this SFP is not connected towards
a Y-coupler (false).
8. Click on the Apply button.
2. Click on Login button to confirm the action. The following picture will be
displayed.
Proceed as follows:
1. In the graphical area, select the CP IP unit slot and click over it with the right
button to display the floating menu.
2. Select the Ethernet Lines item.
3. Select Configure button, to display all the line parameters. It displays the
Configuration folder page where the Line parameters can be configured.
2. In Line Oper Status field it is possible to see the status of the line.
3. Y-Coupler field indicates if the SFP is connected towards the Y Coupler (true)
or not (false).
4. Physical Address field displays the interface’s address (e.g. MAC address).
5. Speed (bit/s) field displays the interface’s current bandwidth.
6. Connector present field specifies if there is the presence of a connector or not.
7. Link Aggregator field shows if the Ethernet line belongs to a Link Aggregator
and its Admin Key
8. Press Refresh to update the window.
Ethernet MAU Parameters
This item allows displaying the CP-IP Ethernet MAU parameters.
1. The MAU folder displays the status of MAU parameters. This folder is divided in
two different sections: MAU Status (it displays the status of the MAU
parameters) and MAU Auto Negotiation (it is used to set the auto negotiation
parameters)
2. In the MAU Default Type field the default administrative baseband of the
interface is displayed.
3. In the MAU Type field the type of the interface is displayed.
4. In the MAU Media Available field the media available (fiber type, coax etc...) is
displayed.
5. By means of the relevant scroll list, in the MAU Status, is possible to configure
the current status of the MAU, among these possible values: Operational,
Standby, Shutdown, Reset.
6. In the MAU Jabber State the proper value for the Jabber State is displayed.
Possible values are: Unknown, NoJabber, Jabbering, Other.
7. MAU Auto Neg Supp field indicates whether or not auto-negotiation is
supported on this MAU.
The following parameters can be set in the MAU Auto Negotiation section.
8. Set in the Admin Status scroll list, if the auto negotiation is enabled or not.
9. Set in the Restart scroll list, the possibility to force auto negotiation to begin link
renegotiation (restart).
10. By means of the Config it is possible to read the status of auto negotiation process.
11. In the Capability Bits it is possible to read the set of capabilities of the local
auto negotiation.
12. In the Cap. Advertised Bits it is possible to identify the set of capabilities
advertised by the local auto negotiation.
13. By pressing of Details button, it is possible to change the bits association
between Advertised Capability Bits corresponding to check Cap Bits. In order to
perform the changes, check your choice press OK in this window and then
Apply in the MAU folder (Ethernet lines).
14. Remote Fault Advertised is a value that identifies any local fault indications
that this MAU has detected and will advertise at the next auto-negotiation
interaction.
15. In the Remote Fault Received it is possible to read any fault indication received
from a far end of a link by the local auto negotiation.
16. Press Refresh to update the window, press Apply to set a new auto
negotiation.
2. In the Incoming Octets field, the total number of the octets received on the
interface is displayed.
3. In the Incoming Frames field, the number of the packets delivered from a sub
layer to a higher one including frames characters is displayed.
4. In the Incoming Discarded Frames, the number of inbound packets which
were chosen to be discarded even through no errors had been detected to
prevent their being deliverable to a higher layer protocol. One possible reason
for discarding such a packet could be free up buffer space.
5. In the Incoming Errored Frames, the number of inbound packets that
contained errors preventing them from being deliverable to a higher protocol.
6. In the Incoming Multicast Pkts field, the number of the packets delivered from
a sub layer to a higher one (for multicast packets) is displayed.
7. In the Incoming Broadcast Pkts field, the number of the packets delivered
from a sub layer to a higher one (for broadcast packets) is displayed
8. In the Outgoing Octets field, the total number of the octets transmitted out of
the interface is displayed.
9. In the Outgoing Frames field, the number of packets requested to be
transmitted is displayed.
10. In the Outcoming Discarded Frames, the number of outbound packets which
were chosen to be discarded even through no errors had been detected to
prevent their being transmitted. One possible reason for discarding such a
packet could be free up buffer space.
11. In the Outcoming Errored Frames, the number of outbound packets that could
not been transmitted because of errors.
12. In the Outgoing Multicast Pkts field, the number of packets requested to be
transmitted. (for multicast packets) is displayed
13. In the Outgoing Broadcast Pkts field, the number of packets requested to be
transmitted. (for broadcast packets) is displayed.
14. Press Refresh to update the window.
Priority Traffic Class
1. Select the Priority Traffic Class folder.
2. Assign, for each priority assigned, a type for a Traffic Class, choosing among
the values stored in the relevant spinners.
This item allows configuring the Frontal Ethernet lines over the CP card.
Proceed as follows:
1. In the graphical area, select the CP IP unit slot and click over it with the right
button to display the floating menu.
2. Select the Frontal Ethernet Line item.
3. Select the Configure button, to display all the line parameters. The program
displays the Configuration / Status folder page where the following parameters
can be configured:
2. In the MAU Admin Status is possible to set the current status of the MAU
3. In the MAU Type field the type of the interface is displayed.
4. In the MAU Media Available field the media available (fiber type, coax etc.) is
displayed.
5. MAU Auto Neg Supp field indicates whether or not auto-negotiation is
supported on this MAU.
6. In the MAU Jabber State the proper value for the Jabber State is displayed.
Possible values are: Unknown, NoJabber, Jabbering, Other.
The following parameters can be displayed in the MAU Auto Negotiation
section.
7. In the Default Type field is possible to set the default administrative baseband
of the interface.
8. Set in the Admin Status scroll list, if the auto negotiation is enabled or not.
9. In the Capability Bits it is possible to read the set of capabilities of the local
auto negotiation.
10. In the Cap. Advertised Bits it is possible to identify the set of capabilities
advertised by the local auto negotiation.
11. Set in the Restart scroll list, the possibility to force auto negotiation to begin link
renegotiation (restart).
12. By means of the Config it is possible to read the status of the auto negotiation
process.
13. Remote Fault Advertised is a value that identifies any local fault indications
that this MAU has detected and will advertise at the next auto-negotiation
interaction.
14. In the Remote Fault Received it is possible to read any fault indication received
from a far end of a link by the local auto negotiation.
15. Press Refresh to update the window, press Apply to set a new auto
negotiation.
Proceed as follows:
1. In the graphical area, select the CP IP unit slot and click over it with the right
button to display the floating menu.
2. Select the Link Aggregator Lines item.
3. Select the Configure button, to display all the line parameters. The program
displays the Configuration folder page where the Line parameters can be
configured.
4. Set the Line identifier (if desired). In the Line Identifier field is possible to insert
an alphanumeric string (ASCII characters) to identify the line. Use the Refresh
button to update the field and Apply button to confirm the action.
5. The Admin Key parameter is the current administrative value of the key for the
Aggregator.
6. By means of Accept. Frame field is possible to display if the untagged or
Priority Tagged frames received on this port, are discarded or not. Only value
accepted is AdmitAll.
7. Ingress Filter scroll list. When this parameter is set to "true" the device will
discard incoming frames for VLAN which do not include this port in its member
set; when it is set to "false" the port will accept all incoming frames scroll list is
possible to discard or not the untagged incoming frames. False option is not
supported.
8. Insert the Num Traff Classes, the number of egress traffic classes supported
on this port.
9. The Bridge Port field is used to read the port associated to the bridge if this is a
L2 bridged interface. If the value is 0, a bridge port isn't associated with this
bridged L2 interface.
10. Insert the PVID, the VLAN ID assigned to untagged frames or Priority –Tagged
received on this port.
11. Set the priority by means of Def User Priority spinner. This parameter is the
default ingress User priority for this port. This only has effect on media, such as
Ethernet, that do not support native User Priority.
12. Ports in LAG shows the interface name of Ethernet ports inserted in this Link
Aggregation Group (LAG)). If the list is empty it means that no Ethernet ports
are assigned to this group
13. Press Apply button to confirm or Refresh to update the window.
Priority Traffic Class (LAG)
This window allows mapping, for the selected line, a Traffic Class Priority to a
Traffic Class.
1. Select Priority Traffic Class folder.
2. Assign, for each priority assigned, a type for a Traffic Class, choosing among
the values stored in the relevant spinners.
Proceed as follows
1. Select the slot of the 64xADSL unit to be configured and click over it using the
right mouse button, to display the floating menu.
2. Select the Lines item, to display the 64xADSL configuration window.
An icon represents each traffic line, displaying the actual operating status as
follows:
- Grey, indicates that the line is not configured;
- Yellow, indicates that the line is configured, but the line's status is not active
because the carrier is missing;
- Green, indicates that the line is configured and the line's status is active. The
carrier is present.
3. Press Refresh All Lines button to update the operating status of the lines.
ADSL Lines Configuration
This item allows configuring the ADSL lines of the 64xADSL Unit.
1. Select the icon of the line (from 1 to 64) to be configured.
2. Select the Configure button to display all the line parameters. It is also possible
to select or deselect multiple lines by pressing SHIFT and CONTROL (read the
procedure below). Multiple lines selection is relevant only for the
Configuration folder, and may be used to apply an identical configuration to
a set of ADSL lines.
2. Use the Enable or the Disable button, to enable or disable the ADSL link. If the
start-up procedure will be successfully completed, the Carrier on message will
be displayed; conversely the Carrier off indication will not change.
CAUTION The Enable and Disable button's status depends on the line status.
1. In the Current Relay position field is possible to display the current status of
the TAM (Test Access Matrix) status for the line chosen.
End-to-end connectivity tests are used for verify that the path between the
CPE modem, IPDSLAM is OK.
End-to-end connectivity test is split in two independent tests: ATM PVC TEST
and PPP over Ethernet Test.
End-to-end connectivity test can be executed only on lines that have been
enabled.
In the ATM PVC test a number of "ATM OAM F5 end-to-end loopback' cells are
sent on each PVC created on the subscriber line. The CPE modem must return
a reply within 5 seconds.
In order to run the test the user must press the button Start Test. The result of
the test is displayed in the column RESULT.
PPP over Ethernet Test is executed on each PVCs with the Access Method
set to PPPoE. The test is a PADI packet broadcasted on the Ethernet through
the Bridge/Filter for this line). The test succeeds when at least one "Access
Concentrator" server replies with a PADO socket.
In order to run the test the user must press the button Start Test.
The result of the test is displayed in the column RESULT.
Proceed as follows
1. Select the slot of the 32xVDSL unit to be configured and click over it using the
right mouse button, to display the floating menu.
2. Select the Lines item, to display the 32xVDSL configuration window.
An icon represents each traffic line, displaying the actual operating status as
follows:
- Grey, indicates that the line is not configured;
- Yellow, indicates that the line is configured, but the line's status is not active
because the carrier is missing;
- Green, indicates that the line is configured and the line's status is active. The
carrier is present.
3. Press Refresh All Lines button to update the operating status of the lines.
VDSL Lines Configuration
This item allows configuring the VDSL lines of the 32xVDSL Unit.
1. Select the icon of the line (from 1 to 32) to be configured.
2. Select the Configure button to display all the line parameters. It is also possible
to select or deselect multiple lines by pressing SHIFT and CONTROL (read the
procedure below). Multiple lines selection is relevant only for the
Configuration folder, and may be used to apply an identical configuration to
a set of ADSL lines.
13. In the Transmission Mode Type section, is possible choose the actual
transmission mode with which the line was activated.
14. Select Refresh to re-read the current line configuration, Apply to confirm the
choices.
VDSL Lines Status
This item allows to display and to manage the state of VDSL lines.
1. Select the Status folder, to display lines status window.
2. Use the Enable or the Disable button, to enable or disable the VDSL link. If the
start-up procedure will be successfully completed, the Carrier on message will
be displayed; conversely the Carrier off indication will not change.
CAUTION The Enable and Disable button's status depends on the line status.
(ATU-R) Alarms
The current state of the remote ADSL interface by clicking over Details
button, the alarm details will be displayed.
In the Downstream and Upstream direction, the following information can be
detected:
(ATU-C) Actual Channel Rate (kbps)
This parameter displays the actual bit rate [kbit/s] of the Downstream
path over the line.
(ATU-R) Actual Channel Rate (kbps)
This parameter displays the actual bit rate [kbit/s] of the Upstream path
over the line.
(ATU-C) Previous Channel Rate (kbps)
This parameter displays the bit rate [kbit/s] of the Downstream path
over the line. Previous transmit rate on this channel, i.e. the transmit
rate before the last activation of the line.
(ATU-R) Previous Channel Rate (kbps)
This parameter displays the bit rate [kbit/s] of the Upstream path over
the line. Previous transmit rate on this channel, i.e. the transmit rate
before the last activation of the line.
(ATU-C) Attainable Rate (kbps)
This parameter indicates the maximum transmit net data rate currently
attainable for the Downstream path.
(ATU-R) Attainable Rate (kbps)
This parameter indicates the maximum transmit net data rate currently
attainable for the Upstream path.
(ATU-C) Interleav. Delay (msec)
This parameter displays the value of the buffer-delay over the
Downstream path.
(ATU-R) Interleav. Delay (msec)
This parameter displays the value of the buffer-delay over the Upstream
path.
(ATU-C) SNR Margin (dB)
This parameter displays the noise margin measured at the ATU-C side
of a SNR (Signal to Noise Ratio) with a BER higher then 1x10-7.
(ATU-R) SNR Margin (dB)
This parameter displays the noise margin measured at the ATU-R side
of a SNR (Signal to Noise Ratio) with a BER higher then 1x10-7.
(ATU-C) Previous SNR Margin (dB)
The previous SNR for ATU-C.
(ATU-R) Previous SNR Margin (dB)
The previous SNR for ATU-R.
(ATU-C) Attenuation (dB)
This parameter is the measured difference, in dB, in the total power
transmitted by the ATU-R and the total power received by the ATU-C
measured at initialization time.
Current relays position: This field is used to indicate the TAM status for the
current line.
End-to-end connectivity tests are used for verify that the path between the
CPE modem, IPDSLAM is OK.
The End-to-end connectivity test is split in two independent tests: ATM PVC
TEST and PPP over Ethernet Test.
End-to-end connectivity test can be executed only on lines that have been
enabled.
In the ATM PVC test a number of "ATM OAM F5 end-to-end loopback' cells are
sent on each PVC created on the subscriber line. The CPE modem must return
a reply within 5 seconds.
In order to run the test the user must press the button Start Test. The result of
the test is displayed in the column RESULT.
PPP over Ethernet Test is executed on each PVCs with the Access Method
set to PPPoE. The test is a PADI packet broadcasted on the Ethernet through
the Bridge/Filter for this line). The test succeeds when at least one "Access
Concentrator" server replies with a PADO socket.
In order to run the test the user must press the button Start Test.
The result of the test is displayed in the column RESULT.
Proceed as follows:
1. Select the slot of the 32xSHDSL unit to be configured and click over it using the
right mouse button, to display the floating menu.
2. Select the Lines item, to display the 32xSHDSL configuration window.
An icon represents each traffic line, displaying the actual operating status as
follows:
- Grey, indicates that the line is not configured;
- Yellow, indicates that the line is configured, but the line's status is not active
because the carrier is missing;
- Green, indicates that the line is configured and the line's status is active. The
carrier is present.
3. Press Refresh All Lines button to update the operating status of the lines.
SHDSL Lines Configuration
This item allows configuring the SHDSL lines of the 32xSHDSL Unit.
1. Select the icon of the line (from 1 to 32) to be configured.
2. Select the Configure button to display all the line parameters. It is also possible
to select or deselect multiple lines by pressing SHIFT and CONTROL (read the
procedure below). Multiple lines selection is relevant only for the
Configuration folder, and may be used to apply an identical configuration to
a set of SHDSL lines.
10. Select Refresh to re-read the current line configuration, Apply to confirm the
choices.
32xSHDSL Lines Status
This item allows to display and to manage the state of SHDSL lines.
1. Select the Status folder, to display lines status window.
2. Use the Enable or the Disable button, to enable or disable the Protocol Stack
Admin Status and the Line Admin Status. If the start-up procedure will be
successfully completed, the Carrier on/up message (Line Oper Status and Prot
Oper Status) will be displayed; conversely the Carrier off/down indication (Line
Oper Status and Prot Oper Status) will not change.
CAUTION The Enable and Disable button's status depends on the line status.
This parameter displays the actual payload bit rate [bit/s] transmittable over the
SHDSL frame (net bandwidth).
Attainable Payload Rate (bps)
This parameter displays the maximum payload bit rate [bit/s] transmittable over
the SHDSL frame (net bandwidth).
STU-C/R Unit Status
This parameter displays the status of the status of the STU-C/R devices
(alarmed or not)
STU-C/R Attenuation (db)
This parameter displays the line attenuation (db) measured in STU-C/R side.
STU-C/R SNR Margin (db)
This parameter displays the Signal-noise ratio of the line (db) measured in STU-
C/R side.
32xSHDSL Maintenance
This item allows to display and to manage the launch operations of maintenance
of 32xSHDSL lines.
1. Select the Maintenance folder, to display lines maintenance window.
2. In the Current Relay position field is possible to display the current status of
the TAM (Test Access Matrix) status for the line chosen.
Vendor ID
According to the modem used, this parameter can be codified following the ITU-
T G.994.1 or ANSI T1.413 specifications. If the Vendor ID is codified as ANSI
T1.413 the field "Vendor Name" is displayed otherwise a "Not available" text
string will be displayed.
EOC Version
This field displays the version of the Embedded Operation Channel
Version number
Vendor assigned number. The field describes the NT associated to ADSL Line.
SHDSL standard
This field displays the SHDSL standard implemented by the STU-C/R device.
Supported Regional Settings
This field displays the SHDSL regional setting implemented by the STU-C/R
device.
2. Use the Refresh button to update the window.
3. Use the Close button to exit the window.
32xSHDSL Connectivity Test
End-to-end connectivity tests are used for verify that the path between the
CPE modem, IPDSLAM is OK.
The End-to-end connectivity test is split in two independent tests: ATM PVC
TEST and PPP over Ethernet Test.
End-to-end connectivity test can be executed only on lines that have been
enabled.
In the ATM PVC test a number of "ATM OAM F5 end-to-end loopback' cells are
sent on each PVC created on the subscriber line. The CPE modem must return
a reply within 5 seconds.
In order to run the test the user must press the button Start Test. The result of
the test is displayed in the column RESULT.
PPP over Ethernet Test is executed on each PVCs with the Access Method
set to PPPoE. The test is a PADI packet broadcasted on the Ethernet through
the Bridge/Filter for this line). The test succeeds when at least one "Access
Concentrator" server replies with a PADO socket.
In order to run the test the user must press the button Start Test.
The result of the test is displayed in the column RESULT.
Proceed as follows
1. Select the slot of the POTS unit to be configured and click over it using the right
mouse button, in order to display the floating menu.
2. Select the POTS Lines item, to display the POTS Lines Configuration
window.
An icon represents each traffic line, displaying the actual operating status as
follows:
- Grey, indicates that the line is not configured;
- Yellow, indicates that the line is configured, but the line's status is not active
because the carrier is missing;
- Green, indicates that the line is configured and the line's status is active. The
carrier is present.
POTS Lines Configuration
This item allows configuring the POTS lines of the POTS Unit.
2. Choose the desired AC Profile, DC Profile, Metering Profile and CLI (Calling
Line Identification) Profile via using the relevant scroll lists. The parameters
available are taken from the national mapping files downloaded into the
equipment. A brief explanation of the profiles is given in the following:
AC Profile defines the transmission characteristics, e.g. voice termination gain
block and filter block commands and data. Each AC Profile is designed for
specific requirements of different market segments and standards. The profile is
also specific to the actual HW.
DC Profile defines feed characteristics, e.g.: constant current, resistive feed and
loop supervision. Each DC Profile is designed for specific requirements of
different market segments and standards. The profile is also specific to the
actual HW.
Metering Profile defines the metering characteristics, e.g. signal frequency,
cadence and level. Each Metering Profile is designed for specific requirements
of different market segments, standards and/or subscriber metering device.
The profile is also specific to the actual HW.
CLI Profile defines the Calling Line Identification characteristics, e.g. signal
frequency, cadence and level. Each CLI Profile is designed for specific
requirements of different market segments and/or standards. The profile is also
specific to the actual HW.
3. Choose the desired ToIP profile and RTP profile. Use the clockwise arrow
icons to update the list of profiles. By pushing View/Change ToIP Profile and
View/Change ToIP Profile it is possible to gain access to the relevant profiles
manager windows. A brief explanation of the profiles is given in the following:
ToIP Profile defines the Telephony over IP parameters for a line. The
characteristics include echo cancellation, audio codec, packet size and jitter
buffer configuration. Each Profile is designed for specific requirements of
different market segments and standards.
RTP Profile defines the Transport Protocol for Real-Time Applications
parameters for a line. The characteristics include VLAN ID, VLAN priority, layer
3 IP ToS field, local RTP IP address and default gateway address. Each Profile
is designed for specific requirements of different market segments and
standards.
4. Insert the line parameters to adapt the line characteristic to the customer
requirements. The parameters are the following:
Automatic Gain Control: This parameter is used to enable or disable the
Automatic Gain Control (AGC) of a POTS line. Possible values are enabled and
disabled.
Howler Tone: This parameter is used to enable or disable the Howler Tone
for a POTS line. Possible values are enabled and disabled.
Line Type: This parameter is used to configure the behavior of the physical line,
supervisory and control signals for current entry. Possible values:
- Simplex: normal POTS line
- Loop Calling PABX: loop calling Private Automatic Branch Exchange
- Earth Calling PABX: earth calling Private Automatic Branch Exchange
RTP Local IP Address: This parameter is the Local RTP IP Address for the line
termination. This address must be coherent with the field "Default Gw IP Addr"
that it is have been defined in the RTP POTS Profiles. When configuring a VoIP
In the upper section is possible enabling or disabling one or a set of lines POTS
by pressing the buttons.
In Line Oper Status field, the Operator is able to see the current operational
status of the interface (the value will be enabled or disabled).
In Line Status area, there is the possibility to have an indication of the real
status of the physical line via the following fields:
• Additional Status Info: This parameter displays additional info on the
operational status of the line. This parameter can assume the following
values:
no add info: no additional information
Testing: line is in testing mode
Foreign Voltage: Foreign voltage detected on line
Disabled by management: Disabled by management system
Thermal fault: Disabled due to high temperature
Battery fault: Battery failure on card
DC Fault: DC fault detected on line
AC Fault: AC fault detected on line
Ground Key Fault: Ground Key Fault detected on line.
• Last Change: This parameter indicates hour and date when the
associated user port entered in its current operational status. If the
current status was entered prior to the last re-initialization of the local
network management subsystem, then this object contains a zero value.
• Call Status information: This parameter indicates the call related status
information for the POTS line. This state information is intended for
testing and error tracking purpose. It is state information collected on the
POTS line side i.e. it is not reflecting states in the call control. This
parameter can assume the following values :
Idle: Line is not in use - loop is open (On hook)
Dialing: Line is in use and dialing is possible
Ringing: Cadenced ringing is applied to the line
Busy: Line is in active call - speech path established
On hold: Line is busy, but speech path is put on hold
Failure: Line is not in service. Call attempt will be rejected.
T.38: Line is busy in T.38 operation mode.
Modem: Line is busy with modem call detected
Parked: Line is in reduced battery feeding mode
N.A: State information not available
• Battery Level: This parameter allows the manager to read the current
selected battery level. This parameter can assume the following values:
High
Low
Medium
N.A. (not available)
• Tx Power Level: This parameter indicates the Current transmit nominal
voice level set on line when the Automatic Gain Control (AGC) is
enabled. The value is in the range from -8 to 6, it is expressed in dBr
Proceed as follows
1. Select the slot of the ISDN unit to be configured and click over it using the right
mouse button, in order to display the floating menu.
2. Select the ISDN Lines item, to display the ISDN Lines Configuration window.
An icon represents each traffic line, displaying the actual operating status as
follows:
- Grey, indicates that the line is not configured;
- Yellow, indicates that the line is configured, but the line's status is not active
because the carrier is missing;
- Green, indicates that the line is configured and the line's status is active. The
carrier is present.
2. Select the Configure button to display all the line parameters. It is also possible
to select and deselect multiple lines at the same time using the SHIFT and
CONTROL keys (read below the procedure). Multiple lines selection is used to
apply an identical configuration to a set of ISDN lines.
This window displays the status of the ISDN line. In the upper section of the
window it is possible to enable/disable the single line or enable/disable all
selected lines by pressing the corresponding buttons.
If the start-up procedure will be successfully completed, the Enabled message
will be displayed; conversely the Disabled indication will not change.
CAUTION The Enable and Disable button's status depends on the line status.
In the lower part of the window it is possible to display the following parameters:
Line Status
Line code: it shows the line code of the ISDN line. Possible values:
• 2B1Q line code (2 binary,1 quaternary)
• 4B3T line coding (code mapping 4 bits into 3 ternary symbols, also
known as MMS 43).
Remote Power Feeding Status: It shows the status of the remote power feeding
of the line. Possible values are Activated and Deactivated.
Alarm status: it shows the alarms present in the ISDN line
Manual Line Activation Status: It shows if the line has been manually activated
or deactivated
Loopback status: it shows if some loopbacks are present on the ISDN line
(noLoop, Loopback1, Loopback2)
ISDN Q921 Terminations Status
Status: It shows the overall status of the datalink and the dependency for
failures.
Related IDIdentity: it shows the IUA interface associated to this ISDN interface
MGC Link Man Status: it shows whatever the Media Gateway Controller has
blocked the data link
Data Link Status: it shows the data link status. This information is only applicable
when the access mode is point To Point. The possible status is:
• N.A.: means the data link cannot be returned to service.
• Established: means the operational state is enabled.
• Remote Related: means the other end-user has disconnected the data
link (i.e. a 'Disconnect' frame has been received).
• Protocol Error: means the data link internal behavior has resulted in a
data link disconnection.
• Released: means that 'Release other' has been received from the MGC.
• Establishing: means that the Gateway is in the process of trying to
establish the data link.
Automatic TEI Count: It shows the number of dynamic TEIs assigned on this
termination. This information is only applicable when the access mode is point
To Multipoint. Zero will always be returned for the point To Point case.
Estab. Data link Count: It shows the number of established Data Links on this
termination.
ISDN Maintenance
This item is used to manage the maintenance of the ISDN Lines.
• Pattern Injection Test (with Loopback 1, Loopback 2 and with Loopback 1+2).
In order to perform these operations, check with the left mouse button the
operation to apply and then press the button Send Cmd.
In case of Pattern Injection Test, choose the type of test and then press Send
Pattern. Afterwards press Get results to display the results of the test.
It is important to remember that Loopback 1 is applied in the local interface and
the traffic is looped locally while Loopback 2 is applied in the Network
termination connected to the interface. This loopback forward back the traffic to
the ISDN interface of the equipment.
Two folders are available inside the ISDN Performance Management window;
the first is used for the Performance configuration and the latter one for the
Performance Data retrieving.
4. Select the field Historical, if available, and choose a value from the list.
5. To read performance data it is provided a scrollbar for each monitored field .
6. The first two fields inside the performance data area, are always Time Elapsed
and Suspect Data.
Time Elapsed value indicates the time (in seconds) elapsed from the activation
of the performance monitoring. When historical data are requested, this field
shows when the performance monitoring was activated.
Suspect Data value gives information relevant to the validity of the retrieved
data. This field can show the following values:
Valid, the data has been correctly collected.
Invalid, the data collected are not correct. There are few reasons why it was
not possible to collect data:
- Reset (rst), the data collection was reset;
- Time, there was a clock adjustment during the data collection;
- Near, there was a problem about the collection of the data.
Using the Historical field you can select how many previous time intervals you
want to start the data retrieving: the time interval dimension is selected using
"Previous" option from the Data Type field.
Moreover from the About menu is possible to display the Third Party License
Agreements manual, by clicking the relevant button. This document contains
the license agreements for all third-party products software used in EDA.
PATH: (Help ->User Guide)
This selection will start the Acrobat Reader software in order to open the on Line
User Guide of the AXH-EDA Local Terminal software.
3. Fill the TFTP Server Identification fields, indicating a proper IP address and
the path where the software is stored.
4. Insert in File Transfer Protocol the type of ftp used.
5. Insert in FTP User the ftp user account.
6. Insert in FTP password the ftp password.
7. Load a new configuration using the Software Table Management facility: click
on New Conf button to load a new configuration file. A new window will pop up.
8. Inside the new window, browse your hard disk in order to indicate the new
configuration file location and press the OK button. Use the Filter button to filter
the files with a different extension than the default one (*.sdc): it is necessary to
modify the extension in the Filter field before using the Filter button.
The .sdc configuration file is used to simplify the download of the new software
in the equipment. To create a configuration file use a text file editor and insert a
single line for each downloadable software file, as illustrated in the example
below:
The first field indicates the unit involved in the software download. The second
field indicates the software serial code and the software version. The last field is
the file name.
ALERT If the new software downloaded in the equipment uses a different type of
database version than the existing one, a forced switch must be performed.
In this case the configuration database will be erased with the consequent
loss of the equipment configuration.
9. After the selection of a new configuration file, it is possible to start the download
process with a click on the download button. A warning window will ask for
confirmation.
10. Click on the YES button to proceed with the software download
The System Software Download in progress window will pop up.
During the connection to the TFTP server the Idle label will be displayed and
during the download process the Downloading… label will be visible.
11. If the download process has been successfully completed, the label displayed
inside the System Software Download in progress window changes to
Download successful and two new buttons will be visible: the Switch
Software Bank and the Close button.
NOTICE Scratch DB checkbox must be not checked. This feature is not used in the
EDA2530 release 4.21. It must be checked only if required by the Ericsson
support.
12. Press the Close button to complete the software download and not to switch to
the new software.
Press Switch Software Bank and follow the Switch Software Bank procedure
(later described in this chapter) to perform the bank switch software.
In case of errors, the Download Failed label will be visible. The System Software
Download Status window will resume the problems encountered during the
software download. Close the windows and go back to the System Software
Download.
13. After the download, an automatic check of the new software is performed, to
verify the compatibility between the database used for the current software
version and the one used for the previous software version. If they are
incompatible, the label Download successful but incompatible databases
will warn the operator
14. By pressing the Close button, the window goes back to the System Software
Download. By pressing the Switch Forced Software Bank button, a new
window will warn the user about the loss of the equipment configuration
NOTICE Scratch DB checkbox must be not checked. This feature is not used in the
EDA2530 release 4.21. It must be checked only if required by the Ericsson
support.
3. At the end of the switch process, the Switching label changes to Switch
successful. Press the Close button
After the software download it is not required to perform immediately a software
bank switch and the operation could be performed later.
By accessing the Software Download facility, the equipment is able to recognize
the presence of newer software inside the inactive software bank and a pop up
window will asks the operator to switch to the newer version.
Note Software download on 20 ADSL cards, 2 IP CP could take a lot of time. The
units with the same card type can be downloaded, in group of 5 units at
once.
Enter the name of the file that will contain the equipment configuration (Warning:
if the file exists, it will be overwritten) and click the Backup button.
The file transfer from the equipment to the local system may take few minutes.
The creation of the backup file in the equipment's memory is controlled by the
parameter "Backup Timeout". This parameter is configurable in "Application
General Configuration" window. The default is 20 minutes. Increase this value if
the backup fails.
ALERT This operation will overwrite the active configuration with the configuration
stored in the file saved on the computer's hard disk. Any configuration
change performed after the last configuration backup will be lost. The
operation may take few minutes. A reboot will be automatically done by the
equipment after the restore completion.
The configuration restore operation is performed using the Trivial File Transfer
Protocol (TFTP) and requires a running TFTP Server. If you use the TFTP
Server released by this AXH-EDA LCT you can configure the timeout of the
"TFTP Server" by means the button "Settings". The default value is 3 seconds.
3. Browse your hard disk to find the new configuration file and press the
RESTORE button
When all tasks are completed, the label Continue will appear on the button. The
restore of the backup file in the equipment's memory is controlled by the
parameter "Restore Timeout". This parameter is configurable in "Application
General Configuration" window. The default is 40 minutes. Increase this value if
the restore fails.
.