Manual Rad ETX-1
Manual Rad ETX-1
Manual Rad ETX-1
INSTALLATION AND
ETX-1
Ethernet Demarcation Switch
Version 1.2
ETX-1
Ethernet Demarcation Switch
Version 1.2
Installation and Operation Manual
Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the ETX-1 and any
software components contained therein are proprietary products of RAD protected under
international copyright law and shall be and remain solely with RAD.
The ETX-1 product name is owned by RAD. No right, license, or interest to such trademark is
granted hereunder, and you agree that no such right, license, or interest shall be asserted by
you with respect to such trademark. The RAD name, logo, logotype, and the terms EtherAccess,
TDMoIP and TDMoIP Driven, and the product names Optimux and IPmux, are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their
respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
ETX-1. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute,
license, or sell any product that supports substantially similar functionality as the ETX-1, based
on or derived in any way from the ETX-1. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the ETX-1 package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof.
Upon such termination by RAD, you agree to return to RAD the ETX-1 and all copies and portions
thereof.
For further information contact RAD at the address below or contact your local distributor.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-1 to be delivered hereunder shall be
free of defects in material and workmanship under normal use and service for a period of twelve
(12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-1, and in no event shall
RAD's liability exceed the purchase price of the ETX-1.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-1 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the ETX-1 are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-1 shall not
exceed the sum paid to RAD for the purchase of the ETX-1. In no event shall RAD be liable for
any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD
has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal waste at
the end of its life cycle. Upon termination of the units use, customers should
provide for its collection for reuse, recycling or other form of environmentally
conscientious disposal.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates
potential safety hazards regarding product operation or maintenance to
operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near
the optical transmitter. The laser warning symbol may be also attached.
Warning Please observe the following precautions:
Before turning on the equipment, make sure that the fiber optic cable is
intact and is connected to the transmitter.
Do not attempt to adjust the laser drive current.
Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
The use of optical devices with the equipment will increase eye hazard.
Use of controls, adjustments or performing procedures other than those
specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Attention Pour rduire les risques sincendie, utiliser seulement des conducteurs de
tlcommunications 26 AWG ou de section suprieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des
risques potentiels de scurit pour l'oprateur ou le personnel de service,
quant l'opration du produit ou sa maintenance.
Avertissement
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas,
Franais
une tiquette indiquant la classe laser ainsi que d'autres avertissements, le
cas chant, sera jointe prs du transmetteur optique. Le symbole
d'avertissement laser peut aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :
Avant la mise en marche de l'quipement, assurez-vous que le cble de
fibre optique est intact et qu'il est connect au transmetteur.
Ne tentez pas d'ajuster le courant de la commande laser.
N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans
terminaison et n'observez pas directement un rayon laser.
L'usage de priphriques optiques avec l'quipement augmentera le
risque pour les yeux.
L'usage de contrles, ajustages ou procdures autres que celles
spcifies ici pourrait rsulter en une dangereuse exposition aux
radiations.
ATTENTION : Le rayon laser peut tre invisible !
Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de
tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus
particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par
l'agence et conformes la rglementation locale de scurit laser pour les produits laser de
classe 1.
Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la
maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer
l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation,
d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou
l'utilisateur.
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de
court-circuit dpassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.
Glossary
Address A coded representation of the origin or destination of data.
AWG The American Wire Gauge System, which specifies wire width.
Balanced A transmission line in which voltages on the two conductors are equal
in magnitude, but opposite in polarity, with respect to ground.
Bandwidth The range of frequencies passing through a given circuit. The greater
the bandwidth, the more information can be sent through the circuit
in a given amount of time.
Best Effort A QoS class in which no specific traffic parameters and no absolute
guarantees are provided.
Bridge A device interconnecting local area networks at the OSI data link layer,
filtering and forwarding frames according to media access control
(MAC) addresses.
Channel A path for electrical transmission between two or more points. Also
called a link, line, circuit or facility.
CIR (Committed A term, which defines the information rate that the network is
committed to provide to the user, under any network conditions.
Information Rate)
Circuit Emulation New technology for offering circuit emulation services over packet-
Service switched networks. The service offers traditional TDM trunking (at n x
64 kbps, fractional E1/T1, E1/T1 or E3/T3) over a range of transport
protocols, including Internet Protocol (IP), MPLS and Ethernet.
Congestion A state in which the network is overloaded and starts to discard user
data (frames, cells or packets).
EIR Excess Information Rate. The rate that exceeds a specified threshold
(CIR) for brief periods of time.
Ethernet A local area network (LAN) technology which has extended into the
wide area networks. Ethernet operates at many speeds, including data
rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps
(Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
Ethernet OAM Ethernet operation, administration and maintenance (OAM) are a set
of standardized protocols for measuring and controlling network
performance. There are two layers of Ethernet OAM: Service OAM
(provides end-to-end connectivity fault management per customer
service instance, even in multi-operator networks) and Link or
Segment OAM (detailed monitoring and troubleshooting of an
individual physical or emulated link).
Flow Unidirectional traffic entity that connects two physical or logical ports
Framing At the physical and data link layers of the OSI model, bits are fit into
units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame, plus
information about the integrity of the frame. All other information,
such as network protocols and the actual payload of data, is
encapsulated in a packet, which is encapsulated in the frame.
L2CP Set of Layer-2 control (slow) protocols that operate across a number
of access and aggregation network technologies
Latency The time between initiating a request for data and the beginning of
the actual data transfer. Network latency is the delay introduced
Load Balancing A technique that distributes network traffic along parallel paths in
order to maximize the available network bandwidth while providing
redundancy.
Master Clock The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
NTP The Network Time Protocol, a protocol for synchronizing the clocks of
computer systems over packet-switched, variable-latency data
networks. NTP uses UDP on port 123 as its transport layer.
Parameters Parameters are often called arguments, and the two words are used
interchangeably. However, some computer languages such as C define
argument to mean actual parameter (i.e., the value), and parameter
to mean formal parameter. In RAD CLI, parameter means formal
parameter, not value.
Physical Layer Layer 1 of the OSI model. The layer concerned with electrical,
mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.
Policing A method for verifying that the incoming traffic complies with the
users service contract.
Prioritization Also called CoS (class of service), classifies traffic into categories such
as high, medium, and low. The lower the priority, the more drop
eligible is a packet. When the network gets busy, prioritization
ensures critical or high-rated traffic is passed first, and packets from
the lowest categories may be dropped.
Routing The process of selecting the most efficient circuit path for a message.
SONET (Synchronous A North American standard for using optical media as the physical
Optical Network) transport for high speed long-haul networks. SONET basic speeds
start at 51.84 Mbps and go up to 2.5 Gbps.
SSH (Secure Shell) A network protocol that allows data to be exchanged over a secure
channel between two computers. Encryption provides confidentiality
and integrity of data.
SVI A logical port used for binding flows to bridge ports, router interfaces
or Layer-2 TDM pseudowires
Telnet The virtual terminal protocol in the Internet suite of protocols. It lets
users on one host access another host and work as terminal users of
that remote host. Instead of dialing into the computer, the user
connects to it over the Internet using Telnet. When issuing a Telnet
session, it connects to the Telnet host and logs in. The connection
enables the user to work with the remote machine as though a
terminal was connected to it.
Traffic Management Set of actions and operations performed by the network to guarantee
the operability of the network, exercised in the form of traffic control
Traffic Policing Mechanism whereby any traffic which violates the traffic contract
agreed to at connection setup, is detected and discarded.
Traffic Shaping A method for smoothing the bursty traffic rate that might arrive on an
access virtual circuit so as to present a more uniform traffic rate on
the network.
Trunk A single circuit between two points, both of which are switching
centers or individual distribution points. A trunk usually handles many
channels simultaneously.
VLAN-Aware A device that is doing the Layer 2 bridging according to the VLAN tag
in addition to the standard bridging parameters. A VLAN-aware device
will not strip or add any VLAN header.
VLAN Stacking A technique that lets carriers offer multiple virtual LANs over a single
circuit. In essence, the carrier creates an Ethernet virtual private
network to tunnel customer VLANs across its WAN; this helps avoid
name conflicts among customers of service providers who connect to
the carrier. Stacking works by assigning two VLAN IDs to each frame
header. One is a "backbone" VLAN ID used by the service provider; the
other one has up to 4,096 unique 802.1Q VLAN tags.
Notes The number of available Ethernet ports depends on the options you
purchased.
Lock the wire latch of each SFP module by lifting it up until it clicks into place.
For additional information, refer to Chapter 2.
Connecting to a Terminal
To connect the unit to a terminal:
1. Connect the mini-USB connector of the cable supplied by RAD to the control
connector.
2. Connect the other side of the cable to the ASCII terminal equipment.
Configuring SVI
SVI 1 must be administratively enabled in order to administratively enable the
corresponding flows and router interface.
Configuring Router
The router must be configured with a router interface that is bound to the SVI
used for the management flows, and assigned an IP address. In addition, a static
route must be set up for the default gateway.
This section illustrates the following configuration:
Router interface 1:
Bound to SVI 1
IP address 192.168.99.238 with mask 255.255.255.0
Router: Static route associated with IP address 192.168.99.1 (default
gateway).
configure router 1
interface 1
bind svi 1
# IP address 192.168.99.238 with mask 255.255.255.0
address 192.168.99.238/24
no shutdown
exit
# Default gateway 192.168.99.1
static-route 0.0.0.0/0 address 192.168.99.1
exit all
Saving Configuration
Type save in any level to save your configuration in startup-config.
1.1 Overview
ETX-1 is a carrier Ethernet demarcation device owned and operated by the service
provider and installed at the customer premises, which delivers SLA-based
Ethernet business services to the customer premises over native Ethernet access.
It serves as a clear demarcation point between the user and operator networks.
Incoming customer traffic is classified and mapped according to port-based
(all-to-one) bundling, or by user port and CE VLAN-ID, VLAN priority, DSCP, IP
precedence, MAC, IP address, and Ethertype. This offers operators the flexibility
to differentiate services using different kinds of classification methods, police the
traffic, and enforce SLA per service.
ETX-1 supports powerful bandwidth profiles such as CIR/CBS for differentiated
Ethernet services and includes comprehensive Ethernet OAM (Operation,
Administration, and Maintenance) functionality together with SLA monitoring.
The network ports support configurable static LAG link aggregation. At the
physical layer, ETX-1 supports auto-negotiation and fault propagation.
The unit can be managed via a local terminal port, or via a dedicated out-of-band
Ethernet port. Additionally, ETX-1 can be managed inband, via a user or network
port.
Product Options
The basic port type is Fast Ethernet, which can be optionally increased to Gigabit
Ethernet.
Network ports Up to two SFP-based fiber optic or electrical, depending on
whether port 2 is configured as network or user port.
User ports Up to four electrical, or five if port 2 is configured as user port.
Applications
ETX-1 delivers Ethernet services as defined by the MEF standards.
Packet
Switched
ETX-1 Network ETX-1
CPE CPE
CPE
ETX-1
PSN
ETX-2
CPE
ETX-1
CPE
Features
Service Types
ETX-1 provides port-based and flow-based services.
Port-Based Service
In a typical port-based (all-to-one bundling) application ETX-1 receives different
services via different network ports (Figure 1-3). This method achieves clearer
service separation, it does not require any marking for CoS, and provides
straightforward SLA measurement.
Ethernet FE VoIP
PE Aggregator
Packet GbE FE Premium
Switched Network Data
(ETH, IP or MPLS)
ETX-1
FE Best Effort
Data
Flow-Based Service
In a typical flow-based application different services are assigned to different
Ethernet flows received by the same network port (Figure 1-4). This provides a
cheaper, more scalable solution, with the possibility of mixing different types of
service.
Ethernet
PE Aggregator
Fast Ethernet (FE)
Packet GbE Premium Best Effort
Switched Network VoIP
Data Data
(ETH, IP or MPLS)
ETX-1
Flow Classification
The ingress user traffic is mapped to the Ethernet flows using the following list of
per-port classification criteria. In the classifications, VLAN refers to the service
provider (outer) VLAN, previously referred to as SP-VLAN, while inner VLAN refers
to the Customer Entity VLAN, previously referred to as CE-VLAN.
vlan
p-bit
ip-precedence
ip-dscp
src-mac/ dst-mac
src-mac + to-src-mac (Source MAC address to source MAC address)/dst-mac +
to-dst-mac (Destination MAC address to destination MAC address)
src-ip/ dst-ip
src-ip + to-src-ip (Source IP address to source IP address)/dst-ip + to-dst-ip
(Destination IP address to destination IP address)
ether-type
untagged
non-ip
all
vlan + inner-vlan
vlan + p-bit
vlan + ip-dscp
vlan + src-mac/dst-mac
vlan + src-ip/dst-ip
vlan + ether-type
vlan + non-ip
vlan + src-ip + to-src-ip
vlan +dst-ip + to _dst_ip
vlan +src_mac + to_src_mac
vlan +dst_mac + to_dst_mac
vlan + inner-vlan + p-bit
vlan + ip-precedence
ETX-1 supports up to 32 Ethernet flows. Flows are unidirectional. Flow
classification variant is limited to only one or one same combination for the same
interface. On same Ethernet port, cannot accept different flow classification
combination, except VLAN and untagged, IP and non-IP.
Traffic Prioritization
Once traffic is classified to a flow, it can be mapped to Strict (Strict Priority)
queues or WRR (Weighted Round Robin):
Strict: Strict Priority strictly complies with the priority sequence from high to
low, and it sends packets in the high-priority queue first. When that queue is
empty, strict priority begins to send packets in lower priority queue. By
putting the key service packets in the high priority queues, you can ensure
that they can always be served first. At the same time, the common service
packets can be put in the low priority queues and transmitted when there are
no key service packets waiting for transmission.
WRR: Weighted Round Robin is a scheduling algorithm that uses weights
assigned to queues to determine how much frames will be sent from a queue
before moving to the next queue.
Ethernet OAM
ETX-1 provides OAM to monitor and troubleshoot an Ethernet network and
quickly detect failures:
CFM OAM (End-to-end OAM) based on IEEE 802.1ag and Y.1731 for continuity
check, non-intrusive loopback, and Frame loss, frame delay and frame delay
variation measurement.
EFM OAM (Link OAM) according to IEEE 802.3-2005 (formerly IEEE 802.3ah)
for remote management and fault indication, including dying gasp, and MIB
parameter retrieval.
Link Aggregation
ETX-1 supports static link aggregation (LAG) without the LACP protocol according
to 802.3-2005.
Note ETX-1 supports only one ring protection for network port 1 and 2.
L2CP Handling
ETX-1 can be configured to pass through Layer-2 control frames (including other
vendors L2CP frames) across the network, to peer-supported protocols
(IEEE 802.3-2005), or to discard L2CP frames.
Fault Propagation
The unit provides the following types of fault propagation:
Network-to-user fault propagation mechanism on the port and OAM CFM
levels When fault propagation is enabled, the user port shuts itself down or
an OAM CFM indication of failure is sent when a link failure is detected at the
network port or when an OAM CFM indication of failure is received.
Management
ETX-1 can be managed as follows:
Local management via ASCII terminal connected to the V.24/RS-232 DCE
control port based on a mini-USB connector.
Local management via dedicated out of band (OOB) management port.
Remote management via an Ethernet port using Telnet SSH or an
SNMP-based management system. ETX-1 supports the SNMP version 3 entity,
providing secure access to the device by authenticating and encrypting
packets transmitted over the network.
Security
To ensure client-server communication privacy and correct user authentication,
ETX-1 supports the following security protocols:
SSH
SNMPv3
SFTP
RADIUS (client authentication)
TACACS+ (client authentication)
Syslog
The syslog protocol is a client/server-type protocol, featuring a standard for
forwarding log messages in an IP network. It supports up to four syslog servers. A
syslog sender sends a small text message of less than 1024 bytes to the syslog
server. Syslog messages are sent via UDP in cleartext.
SFTP
SFTP (Secure File Transfer Protocol) is supported, to provide secure encrypted file
transfer using SSH.
Statistics Collection
ETX-1 collects performance statistics for the physical layers of the network/user
ports, and Radius.
Diagnostic Tools
ETX-1 offers several types of diagnostic procedures:
Ping test Check IP connectivity by pinging remote IP hosts.
Trace route Quickly trace a route from ETX-1 to any other network device
Loopback tests:
Layer-1 loopback performed at the PHY of the physical ports. When the
loopback is active the data forwarded to a port is looped from the Tx
path to the Rx path, thereby disrupting the traffic. This loopback cannot
pass through Ethernet bridges.
ETX-1 OAM is compatible with other RAD products that support standard OAM
functionality.
ETX-1
Queue Manage Reassign per flow port/queue. Traffic not classified to flows
will go to port/queue according to DA/CoS
Network Interface Number of Ports Up to 2 (RJ-45 or fiber optic SFPs). The second port
can be configured as a network or user port.
Caution Insert the SFP gently. Using force can damage the connecting pins.
Caution Do not remove the SFP while the fiber optic cables are still connected. This may
result in physical damage (such as a chipped SFP module clip or socket), or cause
malfunction (e.g., the network port redundancy switching may be interrupted)
Connecting to AC Power
AC power should be supplied via a 1.5 m (5 ft) standard power cable terminated
by a standard 3-prong socket. A cable is provided with the unit.
External AC Power:
AC power is supplied with the external AC power adapter provided with the unit.
To connect AC power:
1. Connect the power adapter output cable to the power connector on the
ETX-1 rear panel.
2. Connect the power adapter to the main outlet.
The unit turns on automatically upon connection to the mains.
Internal AC Power:
To connect AC power:
1. Connect the power cable to the power connector on the ETX-1 rear panel.
2. Connect the power cable to the main outlet.
The unit turns on automatically once connected to the mains.
3.2 Indicators
The unit's LEDs are located on the front panel (see Figure 3-1). Table 3-1 lists the
functions of the ETX-1 LED indicators.
ETX-1
Note The number of network and user ports and their corresponding LEDs depends on
the hardware configuration.
3.3 Startup
Configuration Files
The following files contain configuration settings:
factory-default-config Contains the manufacturer default settings
rollback-config Serves as a backup for startup-config. At startup,
rollback-config is loaded if it exists and is valid, and if startup-config is
missing or invalid.
running-config Contains the configuration that the device is currently
running
startup-config Contains saved non-default user configuration. This file is
not automatically created. You can use the save or copy command to create
it. At startup, startup-config is loaded if it exists and is valid.
user-default-config Contains the default user configuration. This file is not
automatically created. You can use the copy command to create it. At
startup, startup-config is loaded if it exists and is valid.
Refer to Chapter 10 for details on file operations.
Loading Sequence
At startup, the device attempts to load configuration files in the following
sequence until a valid one is found:
startup-config
rollback-config
user-default-config
factory-default-config.
If an error is encountered while loading a file, the default is to ignore the error
and continue loading. You can use the on-configuration-error command to
change this behavior, either to stop loading the file and go to the next
configuration file, or to reject the file and reboot.
To display the parameter values after startup, use the command info
[detail].
Note By default, the terminal, Telnet (SSH), and SNMP management access methods
are enabled. Refer to the section on Controlling Management Access for details
on enabling/disabling a particular method.
7. Select a PC COM port to be used to communicate with ETX-1, and click <OK>.
The COM Properties dialog box is displayed.
After a few more seconds, the login prompt user>_ is displayed. Refer to
Login for details on logging in.
Login
To prevent unauthorized modification of the operating parameters, ETX-1
supports two access levels:
Superuser can perform all the activities supported by the ETX-1 management
facility, including defining new users.
User access rights (full control or read only) are defined by the superuser.
Users are not allowed to create new users.
To enter as superuser:
1. At the User prompt (user>), enter su and press <Enter>.
The Password prompt (password>) appears.
2. Enter 1234 as password and press <Enter>.
The base prompt ETX-1# appears.
Superuser allows you to configure all parameters of ETX-1 and to change the su
and user passwords.
To enter as user:
1. Enter user as user name and press <Enter>.
2. Enter 1234 as password and press <Enter>.
The base prompt ETX-1# appears.
Note To use show commands without navigating, type show followed by the level
name(s) and the rest of the show command.
In the following example, the levels and command were typed together and
therefore no navigation was performed, so the prompt has not changed.
ETX-1#
ETX-1# configure port ethernet 1 loopback local
ETX-1# show configure port ethernet 1 loopback
Loopback : Local Forever
ETX-1#
Figure 4-6. Commands Without Level Navigation
In the following example, the levels were typed separately and the navigation is
reflected by the changing prompt.
ETX-1#
ETX-1# configure
ETX-1>config# port
ETX-1>config>port# ethernet 1
ETX-1>config>port>eth(1)# loopback local
ETX-1>config>port>eth(1)# show loopback
Loopback : Local Forever
ETX-1>config>port>eth(1)#
Figure 4-7. Commands With Level Navigation
You can type only as many letters of the level or command as required by the
system to identify the level or command; for example, you can enter
config manag to navigate to the management level.
In addition to being the default prompt, the character # also indicates a static
entity (such as a port) or already configured entity. The character $ indicates a
new dynamic entity (such as a flow) that takes several commands to configure.
The dynamic entity is created as inactive. After the configuration is completed, it
is activated by using the no shutdown command, as shown in the following
example.
ETX-1#
ETX-1# configure flows flow flow1
ETX-1>config>flows>flow(flow1)$ ingress-port ethernet 3
ETX-1>config>flows>flow(flow1)$ egress-port ethernet 1 queue 0 block 0/1
ETX-1>config>flows>flow(flow1)$ classifier Classifier1
ETX-1>config>flows>flow(flow1)$ no shutdown
ETX-1>config>flows>flow(flow1)$ exit
ETX-1>config>flows#
Figure 4-8. Creating and Activating Flow
Command Tree
At the CLI root, the following categories are available:
configure
file
admin
global-commands.
Each category is detailed in the tables below.
Command Description
Command Description
| | | show bind
| | | spanning-tree
| | spanning-tree
Command Description
Command Description
Command Description
Command Description
Command Description
| | | | | | | clear-statistics Clear the OAM CFM statistics for the MEP service
Command Description
Command Description
Command Description
| | | | profile Define the queue block profile for the queue block
| reporting
Command Description
| | show brief-alarm-log Display alarms in brief alarm and event history log,
optionally according to specified criteria
| | show brief-log Display brief alarm and event history log, optionally
according to specified criteria
Command Description
| | interval-duration
Command Description
Command Description
Command Description
Command Description
Command Description
2. Log into the device as explained in Login. Refer to Using the CLI and
Command Tree for details on using the CLI commands.
Assigning device name name <name-of-device> The name of the device (up to 255 characters,
case-sensitive)
Specifying location location < location-of- The location of the device (up to 255 characters,
device> case-sensitive)
Specifying contact person contact The name of the contact persion (up to 255
<contact-person> characters, case-sensitive)
Standards
The supported SNMP versions are based on the following standards:
RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working
Group.
RFC 1902, Structure of Management Information for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group.
Benefits
The SNMP protocol allows you to remotely manage multiple units from a central
workstation using a network management system.
The SNMPv3 protocol allows data to be collected securely from SNMP devices.
Confidential information such as SNMP commands can thus be encrypted to
prevent unauthorized parties from accessing them.
Functional Description
In an SNMP configuration, one or more administrative computers manage a group
of hosts or devices. Each managed system continuously executes a software
component called agent, which sends reports via SNMP to the managing
workstations.
Factory Defaults
The following is the default configuration of the SNMP parameters (refer to
Setting SNMP Parameters for explanations of the parameters):
to configure SNMPv3:
1. Set SNMP engine ID if necessary
2. Add users, specifying authentication protocol and privacy protocol
3. Add groups, specifying security level, protocol and view
4. Connect users to groups
5. Add notification entries with assigned traps and tags
6. Configure target parameter sets to be used for targets
7. Configure targets (SNMPv3 network management stations to which ETX-1
should send trap notifications), specifying target parameter sets and
notification tags, and trap synchronization groups if applicable
To configure SNMPv3 parameters:
1. Navigate to configure management snmp.
The config>mngmnt>snmp# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Note When you enter password parameters, they should contain at least eight
characters.
Setting SNMP snmp-engine-id mac [<mac-address>] snmp If you use the mac option
engine ID, as MAC snmp-engine-id ipv4 [<ip-address>] and do not specify the MAC
address or IP address, the SNMP engine ID
snmp-engine-id text <string>
address or string is set to the device MAC
address.
If you use the ipv4 option
and do not specify the IP
address, the SNMP engine ID
is set to the device IP
address.
Setting user privacy privacy [ password <password> ] snmp>user no privacy disables privacy
password and [ key <key-change> ] protocol.
optional key for
changes
Defining how to context-match {exact | prefix} snmp>access-group exact Match the entire
match the context context
sent in frames by prefix Match the first part
the NMS of the context.
Note: ETX-1 automatically
identifies the NMS context,
therefore you can configure
exact match. prefix is
typically used for devices
with multiple instances.
Setting read view of read-view <name> snmp>access-group
group
Assigning trap to bind {trap-list} snmp>notify You can assign more than
notification one trap to a notification, in
separate commands.
Connecting security security-to-group {snmpv1 | snmpv2c | usm} snmp When using no security-to-
name to group (e.g. sec-name <security-name> group
connecting user or {snmpv1|snmpv2c|usm} sec-
community to name <security-name>
group) removes security-to-group
entity, group name should
be set before set to no
shutdown.
Specifying SNMP version { snmpv1 | snmpv2c | usm} snmp> target-params usm for SNMPv3 version.
version to be used
when generating
SNMP messages for
the set of target
parameters
Assigning tag(s) to tag-list <list> snmp>target If you specify more than one
target tag, the space-separated list
is enclosed within double
quotes.
Specifying trap trap-sync-group <group-id> [import-trap- snmp>target If the group does not
synchronization masking] exist, it is created.
group If you specify the
import-trap-masking
parameter, the
managers trap masking
is imported from the first
manager in the group.
Enter no trap-sync-group
to remove the manager
from the group. If the
manager was the last in
the group, the group is
deleted.
Specifying tags (the tag-list <list> snmp>trap-sync-group To remove the tag list, enter
tag(s) must be no tag-list.
defined in
notification entries)
Example
To create SNMPv3 user and connect it to group:
User named MD5_priv:
Security level MD5 authentication, DES privacy
Group named "SecureGroup":
All security levels
Contains set of views named "internet" (from default configuration).
To create notifications:
Notification named TrapPort:
Tag = Port
Bound to ethLos, sfpRemoved.
Notification named TrapPower:
Tag = Power
Bound to powerDeliveryFailure, systemDeviceStartup.
To create communities, target parameters, and target for devices in network that
are working with SNMPv2c :
Community read:
Name: public
Security name: v2_read (defined in default configuration)
Community write:
Name: private
Security name: v2_write (defined in default configuration)
Community trap:
Name: public
Security name: v2_trap (defined in default configuration)
Target parameters named snmpv2:
Message processing model SNMPv2c
Version SNMPv2c
Security name: v2_write
Security: level no authentication and no privacy
Target named NMSsnmpv1:
Target parameters snmpv2
Tag list = unmasked
IP address 192.5.6.7.
Factory Defaults
By default, access is enabled for all the applications.
Factory Defaults
By default, authentication is via the locally stored database (1st-level local)
Specifying authentication method auth-policy 1st-level radius [2nd-level If su (Superuser) does not exist
preferably via RADIUS, then optionally tacacs+ [3rd-level {local | none}]] in the RADIUS server database or
TACACS+, then optionally local the system loses the connection
to the RADIUS server, ETX-1
uses the local authentication
database to authenticate the
user, if 2nd-level is set to local
Specifying authentication method auth-policy 1st-level radius [2nd-level If su (Superuser) does not exist
preferably via Radius, then optionally {local | none}] in the Radius server database or
local the system loses the connection
to the Radius server, ETX-1 uses
the local authentication
database to authenticate the
user, if 2nd-level is set to local.
Specifying authentication method auth-policy 1st-level tacacs+ If su (Superuser) does not exist
preferably via TACACS+, then [2nd-level radius [3rd-level {local | in the TACACS+ and RADIUS
optionally RADIUS, then optionally none}]] server databases or the system
local loses the connection to the
TACACS+ and RADIUS servers,
ETX-1 uses the local
authentication database to
authenticate the user, if
2nd-level is set to local.
Specifying authentication method auth-policy 1st-level tacacs+ If su (Superuser) does not exist
preferably via TACACS+, then [2nd-level {local | none}] in the TACACS+ server database
optionally local or the system loses the
connection to the TACACS+
server, ETX-1 uses the local
authentication database to
authenticate the user, if
2nd-level is set to local.
To configure management flows for ETX-1 not using ERP and RSTP:
1. Configure the Classifier Profiles:
ETX-1-SyncE# configure port svi 1
ETX-1-SyncE>config>port>svi(1)$ no shutdown
ETX-1-SyncE>config>port>svi(1)$ exit all
2. Create a profile that accepts untagged traffic:
ETX-1-SyncE# configure flows
ETX-1-SyncE>config>flows# classifier-profile untagged match-any
ETX-1-SyncE>config>flows>classifier-profile(untagged)$ match untagged
ETX-1-SyncE>config>flows>classifier-profile(untagged)$ exit
3. Create a profile that accepts only traffic tagged with mng VLAN (For example
management VLAN: 3079):
flow mn_in
classifier v4
ingress-port bridge-port 7
egress-port svi 1 queue 5
vlan-tag pop vlan
no shutdown
exit
flow mn_out
classifier untagged
ingress-port svi 1
egress-port bridge-port 7
vlan-tag push vlan 4 p-bit fixed 7
no shutdown
exit all
4. Configure the router:
configure router 1 interface 1
bind svi 1
address 192.168.100.142/24
no shutdown
exit all
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS)
RFC 2618, RADIUS Authentication Client MIB
Benefits
The RADIUS protocol allows centralized authentication and access control,
eliminating the need to maintain a local user data base on each device on the
network.
Functional Description
When a login attempt occurs at ETX-1, it submits an authentication request to
the RADIUS server. The RADIUS server checks the database and replies with either
Access Rejected or Access Accepted.
Factory Defaults
By default, four RADIUS servers are defined, they are configured as shown below.
Assigning an IP address to the server address <ip-address> Possible IP addresses range from
1.1.1.1 to 255.255.255.255
Defining a non-disclosed string (shared key <string> [hash] The shared secret is a secret key
secret) used to encrypt the user consisting of free text known to
password. the client and the server for
encryption. It is hashed if
specified.
Defining the UDP port to be used for auth-port <udp-port-number> Range 165535
authentication
Example
To define a RADIUS server:
Server IP address: 192.168.99.206
Key: RAD_server1.
ETX-1# configure management radius
ETX-1>config>mngmnt>radius# server 1
ETX-1>config>mngmnt>radius>server(1)# address 192.168.99.206
ETX-1>config>mngmnt>radius>server(1)# key RAD_server1
ETX-1>config>mngmnt>radius>server(1)# no shutdown
ETX-1>config>mngmnt>radius>server(1)# information detail
address 192.168.99.206
key "574006ED9DDAD436E4915E482F2C7B09" hash
retry 3
timeout 3
auth-port 1812
no shutdown
Standards
RFC 1492, An Access Control Protocol, Sometimes Called TACACS
Benefits
The TACACS+ protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network. The TACACS+ server encrypts the entire body of the packet but leaves a
standard TACACS+ header.
Functional Description
When a login attempt occurs at ETX-1, it submits an authentication request to
the TACACS+ server, which checks the database and then grants or refuses
access.
Factory Defaults
By default, no TACACS+ servers are defined. When a TACACS+ server is first
defined, it is configured as shown below.
Note If you intend to use TACACS+ for authentication, verify that TACACS+ is selected
as level-1 authentication method (see Defining Access Policy).
Bind TACACS+ server to a group group <group-name> no group deletes the group.
Defining a non-disclosed string key <string> [hash] The shared secret is a secret key
(shared secret) used to encrypt the consisting of free text known to
user password the client and the server for
encryption. It is hashed if
specified.
Note You can enter any combination of shell, system, and commands, but you must
enter at least one of them.
ETX-1>config>mngmnt>tacacsplus>group(TAC1)$ exit
ETX-1>config>mngmnt>tacacsplus# server 192.168.99.208
ETX-1>config>mngmnt>tacacsplus>server(192.168.99.208)# group TAC1
ETX-1>config>mngmnt>tacacsplus>server(192.168.99.208)# info detail
key "244055BF667B8F89E4915E482F2C7B09" hash
retry 1
timeout 5
authentication-port 49
accounting-port 49
group "TAC1"
no shutdown
Factory Defaults
By default, data rate is set to 9,600 bps.
Specifying the desired data rate baud-rate {300bps | 1200bps | The default data rate is 9,600
2400bps | 4800bps | 9600bps | bps.
19200bps | 38400bps | 57600bps |
115200bps}
Specifying the number of rows length <number-of-rows> The number of rows can be 0,
to display to indicate no limit on the
number of lines displayed. The
number of rows can be 0-255.
The default is 20.
Notes User passwords are stored in a database so that the system can perform
password verification when a user attempts to log in. To preserve
confidentiality of system passwords stored in text configuration files, the
password verification data is typically stored after a one-way hash function is
applied to the password, in combination with other data. When a user
attempts to log in by entering a password, the same function is applied to the
entered value and the result is compared with the stored value.
A cryptographic hash function is a deterministic procedure that takes an
arbitrary block of data and returns a fixed-size bit string, the (cryptographic)
hash value, such that any change to the data changes the hash value.
Factory Defaults
By default, the following users exist, with default password 1234:
su
tech
user
oper
ETX-1>config>mngmnt# logout
exiting cli
ETX-1>config>mngmnt#
CLI session is closed
user>staff2
password>****
ETX-1>config>mngmnt#
Chapter 5
Services
ETX-1 provides flow-based and port-based services. This section shows the
configuration steps for both.
2) Bridge port
Net 1 Ethernet 1
Net/User 2 Ethernet 2
User 3 Ethernet 3
User 4 Ethernet 4
User 5 Ethernet 5
User 6 Ethernet 6
MNG-ETH - Ethernet 101
Note ETX-1 supports SFP, but fiber optical interface needs to disable auto-negotiation
when using MiTop and MIRICI.
Setting maximum advertised capability max-capability {10-full-duplex | 10-full-duplex 10M full duplex
(highest traffic handling capability to 100-full-duplex | 1000-full-duplex} 100-full-duplex 100M full duplex
be advertised during the
1000-full-duplex 1000M full duplex
autonegotiation process)
Note: This parameter applies only if
autonegotiation is enabled.
Setting data rate and duplex mode of speed-duplex {10-full-duplex | 10-full-duplex 10M full duplex
the Ethernet port, when 100-full-duplex | 1000-full-duplex} 100-full-duplex 100M full duplex
autonegotiation is disabled
1000-full-duplex 1000M full duplex
Data flow control method based on flow-control no flow-control disables the data flow
Ethernet Pause frames. If the flow control.
control is enabled, ETX-1 received the
Pause frames sent by the peer device,
slowing its transmission rate.
Setting the VLAN tagged frame ETH II tag-ethernet-type <ether-type> Only network port can configure the value.
frame Ethertype (tag protocol The range is 0x0000-0xFFFF, the default is
identifier) 0x8100.
Setting the interval for performance pm-collection interval <seconds> no pm-collection disables PM data
monitoring data collection collection.
Note: Please enable the global PM function
before setting this command.
Associating a queue group profile with queue-group profile You can associate a network port with a
the port <queue -profile-name> queue group profile containing one queue
block with up to 6 queues, but a user port
can be associated with a queue group
profile containing one queue block with up
to 4 queues.
Setting port to function as network or functional-mode {network | user} Applicable to second network interface
user only
See Setting Second Network Interface as
Network or User Port for more
information
Note When you change the functional mode, all flows related to the port are deleted.
The port must be administratively disabled before you can change the functional
mode.
To change the second network interface functional mode to user port, configure
the following:
ETX-1# configure port ethernet 2
ETX-1>config>port>eth(2)# shutdown
ETX-1>config>port>eth(2)# functional-mode user
ETX-1>config>port>eth(2)# no shutdown
ETX-1>config>port>eth(2)#
ETX-1>config>port#
Administrative Status : Up
Operation Status : Down
Connector Type : SFP In
Auto Negotiation : Complete
MAC Address : 00-20-D2-50-00-D6
SFP
-----------------------------------------------------------------------------
Connector Type : LC
Manufacturer Name : EOPTOLINK INC
Manufacturer part number : EOLS131210DRAD
Typical Maximum Range (Meter) : 10000
Wave Length (nm) : 1310 Laser
Fiber Type : SM
ETX-1>config>port>eth(1)#
Network User
Interface Interface
ETX-203A
ETX-36
Network User
Interface Interface
ETX-203A
ETX-1
Example
Running
-----------------------------------------------------------------------------
Rx Tx
Total Frames : 0 0
Total Octets : 0 0
Total Frames/Sec : 0 0
Total Bits/Sec : 0 0
Minimum Bits/Sec : 0 0
Maximum Bits/Sec : 0 0
Unicast Frames : 0 0
Multicast Frames : 0 0
Broadcast Frames : 0 0
Dropped Frames : 0
CRC Errors : 0 --
Error Frames : 0
CRC Errors/Sec : 0 --
Oversize Frames : 0 0
64 Octets : 0 0
65-127 Octets : 0 0
128-255 Octets : 0 0
256-511 Octets : 0 0
512-1023 Octets : 0 0
1024-1518 Octets : 0 0
1519-Max Octets : 0 0
SFP
-----------------------------------------------------------------------------
Minimum Maximum
RX Power (dBm) : -36.9 dBm -36.9 dBm
TX Power (dBm) : -5.1 dBm -5.0 dBm
Laser Bias (mA) : 5.7 mA 6.1 mA
Laser Temperature (Celsius) : 42.0 C 51.0 C
ETX-1>config>port>eth(1)#
Parameter Description
Parameter Description
Window Remain Time [Min.] Amount of time remaining in statistics sampling window
Total Frames Total number of frames received/transmitted
Total Octets Total number of bytes received/transmitted
Total Frames/Sec Number of frames received/transmitted per second
Total Bits/Sec Number of bits received/transmitted per second
Minimum Bits/Sec Minimum number of bits received/transmitted per second
Maximum Bits/Sec Maximum number of bits received/transmitted per second
Unicast Frames Total number of unicast frames received/transmitted
Multicast Frames Total number of multicast frames received/transmitted
Broadcast Frames Total number of broadcast frames received/transmitted
Error Frames Total number of frames with errors received
Dropped Frames Total number of frames dropped
CRC Errors Total number of frames received that are an integral number of octets in
length, but do not pass the Frame Check Sequence (FCS) check. This count
does not include frames received with Frame-Too-Long or Frame-Too-Short
error.
CRC Errors/Sec Number of frames per second received that are an integral number of octets
in length, but do not pass the Frame Check Sequence (FCS) check. This count
does not include frames received with Frame-Too-Long or Frame-Too-Short
error.
Oversize Frames Total number of oversized frames received/transmitted
64 Octets Total number of received/transmitted 64-byte packets
65127 Octets Total number of received/transmitted 65 to 127-byte packets
128255 Octets Total number of received/transmitted 128 to 255-byte packets
256511 Octets Total number of received/transmitted 256 to 511-byte packets
5121023 Octets Total number of received/transmitted 512 to 1023-byte packets
10241518 Octets Total number of received/transmitted 1024 to 1518-byte packets
1519Max Octets Total number of received/transmitted packets with 1519 bytes and up to
maximum
Clearing Statistics
Note ETX-1 can creates up to eight SVIs, but ETX-1 supports up to two valid
management interface (router interfaces).
Benefits
ETX-1 can use the load balance to increase the bandwidth.
Functional Description
The two network Ethernet ports can be operated as a single logical interface,
using link aggregation in accordance with IEEE 802.3-2005. The two ports must
be connected to the same switch/router.
Factory Defaults
By default, no LAG is configured.
Configuring LAG
This section explains how to define a link aggregation group (LAG). ETX-1
supports one LAG.
Assigning an admin key to the admin-key {fast-ethernet | You must define admin key
giga-ethernet}
LAG to indicate the port speed before binding ports to the
LAG
Adding a port to the LAG bind ethernet <port > Using no before bind removes
a link from the LAG
Example
To define LAG 1:
LAG members Ethernet ports 1 and 2
ETX-1>config>port# lag 1
ETX-1>config>port>lag(1)$ bind ethernet 1
ETX-1>config>port>lag(1)$ bind ethernet 2
ETX-1>config>port>lag(1)$ no shutdown
ETX-1>config>port>lag(1)$
Links
-----------------------------------------------------------------------------
Port Admin Oper Redundancy
-----------------------------------------------------------------------------
1 Up Down Standby
2 Up Down Standby
ETX-1>config>port>lag(1)#
Standards
IEEE 802.1ag, ITU-T Y.1731
Benefits
You can ensure packets are being sent via links that have not failed. Failures are
propagated end-to-end via OAM CFM messages.
Functional Description
Network-to-user fault propagation mechanism on the port and OAM CFM levels:
When fault propagation is enabled, the user port shuts itself down or an OAM
CFM indication of failure is sent when a link failure is detected at the network
port or when an OAM CFM indication of failure is received.
User-to-network fault propagation mechanism on the port and OAM CFM levels:
When fault propagation is enabled, an OAM CFM indication of failure is sent to
Network port once a failure is detected on User port.
You can enable fault propagation to be triggered by failure detection on a
network/user interface, which causes a user-configurable action (such as
deactivation or OAM CFM failure message sent) to be performed on a
user/network interface. You can enable fault propagation in the network-to-user
direction, for a pair of interfaces such as Ethernet ports.
You can define the following when you enable fault propagation for a pair of
interfaces:
Trigger:
If the interface where failure is detected is an Ethernet port:
LOS Link down detected
If the interface where failure is detected is a MEP:
OAM CFM AIS Alarm indication signal detected
OAM CFM LOC Loss of continuity detected
OAM CFM RDI Remote defect indication detected
OAM CFM Interface status TLV Remote port failure detected
Action to take when fault propagation is triggered:
If the interface where action is performed is an Ethernet port:
Interface deactivation
If interface where action is performed is a MEP:
Send OAM CFM alarm indication signal to indicate failure
or
Send OAM CFM interface status TLV to indicate failure.
Wait-to-restore time The time to wait until enabling the shut-down
interface or ceasing to send OAM CFM interface status once the failed
interface has been restored.
Factory Defaults
By default, no fault propagation is configured. When you configure fault
propagation for a particular interface pair, the default configuration is as follows:
No trigger defined for fault detection
No action defined to be performed when fault is detected
Wait-to-restore time = 0.
Specifying the trigger { los | oam-cfm-loc | oam-cfm-rdi Typing no before the command
trigger(s) | oam-cfm-if-status-tlv | oam-cfm-ais} removes the specified trigger
Note: The los trigger is allowed only if
the from-interface is an Ethernet port.
The OAM CFM triggers are allowed only
if the from-interface is a MEP.
Example
ETX-1>config>fault>fp(port/ethernet/4/to/mep/2/3/3)$
ETX-1>config>fault>fp(port/ethernet/1/to/port/ethernet/3)$
ETX-1>config>fault>fp(mep/1/1/1/to/mep/1/2/2)$
Standards
ITU-T G.8032-2010
Benefits
G.8032 revertive rings provide sub-50 ms protection for Ethernet traffic and
prevent loops at the Ethernet layer.
Functional Description
Ethernet Ring Protection technology provides scalable solution for low-cost traffic
protection and rapid service restoration, with SDH/SONET-type resilience. It is
built on traditional Ethernet MAC (IEEE 802.3) and bridging (IEEE 802.1) functions.
It is independent of any physical-layer technologies and can be utilized in any
carriers network.
In ERP there is one node designated as RPL, which periodically sends R-APS
messages, defining ring state and operation. When a link failure occurs, it is
detected via LOS. Upon failure, node forwarding information is recalculated to
ensure that data traffic reaches its destination, using alternative path.
Ring Topology
ETX-1 supports single ring topology.
Ring node A
East Port
(RPL Owner)
West Port
(Neighbor)
Ring node C
R-APS Messaging
Ethernet ring protection is achieved by means of a dedicated protocol,
Automated Protection Switching (APS). Every ring link is bound by two adjacent
nodes. At any time, traffic flows on all, but one of the ring links. This link is called
the ring protection link (RPL). Under normal conditions this link is blocked. RPL is
controlled by a single node called an RPL owner, which prevents traffic from using
the RPL. When a failure is detected, the RPL owner unblocks the RPL port,
allowing the RPL to be used for traffic. The other Ethernet Ring Node adjacent to
the RPL, the RPL Neighbor Node, may also participate in blocking or unblocking its
end of the RPL.
R-APS messages require a designated transmission channel (R-APS channel),
which is separated from the service traffic channel. An R-APS channel is
configured using a separate dedicated VLAN to enable the R-APS messages to
handled differently from the service traffic. An R-APS channel and service traffic
blocking is performed via VID filtering by the bridge.
Mechanism of Operation
Every failure along the ring triggers an R-APS (SF) (R-APS Signal Fail) message
along both directions from the nodes adjacent to the failed link. Before sending
the R-APS, these nodes block the ports facing the failed link. On receiving these
messages, the RPL owner unblocks the RPL port. An SF message is triggered even
if only one node adjacent to the failed link recognizes the failure.
During a recovery phase, when a failed link is restored and a node detects a Clear
SF continually it sends R-APS (No Request, NR) and keeps the failed port blocked.
When receiving the R-APS (NR), the RPL owner starts its Wait-To-Restore (WTR)
timer. When that timer expires it blocks the RPL port and sends RAPS (NR, RB) (R-
APS no request, root blocked) messages along both direction of the ring. Nodes
receiving the R-APS (NR, RB) message flush their learning table, unblock their
blocked ports and return back to idle state.
Timers
The following timers are used to facilitate ERP operation:
Wait-to-Restore (WTR) Period of time used by RPL owner to verify that the
ring has stabilized before blocking the RPL after signal recovery.
Guard Period of time during which all received A-RPS messages are ignored
by the ERP mechanism. This prevents the ring nodes from receiving outdated
A-RPS messages circulating the network.
Hold-off Period of time during which the underlying Ethernet layer attempts
to filter out intermittent link faults before reporting them to the ERP
mechanism.
Administrative Commands
If there is a need to intervene into ERP operation for maintenance or any other
reason, the operator can issue forced or manual switch command.
Forced switch command forcefully blocks a particular ring port. It can be
issued even if an SF condition exists on the ring.
Manual switch command manually blocks a particular ring port with manual
switch command. It can be overridden by SF condition or a force switch
command.
Clear command clear all existing force and manual switch command on the
ERP.
Note The manual and forced switch are temporary commands and they do not change
the location of the RPL permanently.
Factory Defaults
No Ethernet protection ring is configured in the system by default.
Configuring ERP
To configure ERP:
1. In the configure>protection# prompt, enter erp 1 and ring type (major).
An ERP instance with is created and the config>protection>erp(ring-
number)# prompt is displayed.
2. Configure the ERP as illustrated and explained below.
Defining bridge port as an East east-port <bridge_port_number> Only support Net Port
port of ERP node
Defining bridge port as a West west-port <bridge_port_number> Only support Net Port
port of ERP node
Defining node port type in port-type {east|west} {node- node-port regular node port,
relation to RPL owner port|rpl|neighbor|next-neighbor} which is not connected to RPL
owner
rpl RPL owner
neighbor port directly
connected to RPL owner
next-neighbor Current
software version unsupported
Configuring dedicated VLAN for r-aps [vlan <14094>] [vlan-priority R-APS settings must be same for
R-APS messages <07>] [mel <07>] all ring members
Configuring the revertive mode revertive This mode is relevant to the RPL
owner node.
In the revertive mode, after
the condition causing the switch
is cleared, traffic is blocked at
the RPL owner and restored to
the working state.
After the node has entered the
pending state in non-revertive
mode, use the Clear command
to exit the state.
no revertive enables
non-revertive mode.
Defining guard and hold-off timers [guard<102000>] [holdoff<0 Guard timer is used by the ERP
periods in msec 10000>] mechanism to prevent ring
nodes from receive outdated R-
APS messages. While the guard
timer is active, all received R-APS
messages are ignored by the
node. The guard timer is
configured in 10-ms steps.
Hold-off timer is used by
Ethernet layer to filter out
intermittent faults. Faults are
reported to the ERP mechanism
only after the hold-off timer
expires. The Hold-off timer is
configured in 100-ms steps.
Blocking the East or West port of forced-switch {east-port | west-port } The forced switch can be applied
a ring node to any number of nodes in the
ring.
West Port
----------------------------------------------
R-APS Message Rx Frames Tx Frames
SF 0 0
NR 0 0
NR,RB 0 0
Total Valid 0 0
Total Errors 0 0
Counter Description
R-APS SF Message Tx/Rx Total number of R-APS Signal Fail (SF) messages received or transmitted
by East/West port.
Received R-APS Signal Fail message indicates a failed port in the ring.
Transmitted R-APS Signal Fail message indicates a failed port in the
node.
R-APS NR Message Tx/Rx Total number of R-APS No Request (NR) messages received or
transmitted by East/West port.
Received R-APS No Request message indicates absence of failed ports in
the ring.
Transmitted R-APS No Request message indicates that the node fixed its
failed port.
R-APS NR, RB Tx/Rx Total number of R-APS No Request (NR), RPL Blocked (RB) messages
received or transmitted by East/West port.
Received R-APS No Request, RPL Blocked message indicates that RPL
port is blocked and all other not-failed blocked ports are unblocked in
the ring.
Transmitted from the RPL No Request, RPL Blocked message indicates
that RPL port is blocked.
Total Valid Rx/Tx Total number of valid R-APS messages received or transmitted by
East/West port
Total Errors Rx/Tx Total number of errored R-APS messages received or transmitted by
East/West port
Example
Figure 7-1 (please refer to In ERP there is one node designated as RPL, which
periodically sends R-APS messages, defining ring state and operation. When a link
failure occurs, it is detected via LOS. Upon failure, node forwarding information is
recalculated to ensure that data traffic reaches its destination, using alternative
path.
Ring Topology) and the following configuration is about Ring node A and Ring
node B.
Note
R-APS settings must be the same for other Ring nodes.
Only one port can be configured as RPL owner in the Ring.
Bridge ports are used in the Ring, they should be configured as ingress-filtering.
#************************ Configuring_the_Ring*******************************
config protection erp 1 major
port-type east rpl
port-type west node-port
bridge 1
east-port 1
west-port 2
r-aps vlan 1234 vlan-priority 1 mel 1
data-vlan 2
no shutdown
exit all
2. Ring node B configuration:
#************************ Configuring_the_Ring*******************************
config protection erp 1 major
port-type west neighbor
port-type east node-port
bridge 1
east-port 1
west-port 2
r-aps vlan 1234 vlan-priority 1 mel 1
data-vlan 2
no shutdown
exit all
Standards
IEEE 802.3
Benefits
Layer 2 Control Protocol traffic can be passed or filtered to Ethernet virtual
connections.
Factory Defaults
ETX-1 provides a default L2CP profile named L2cpDefaultProfile, configured as
follows:
For MAC hex byte 0x00 through 0x2f, action = tunnel
When a new L2CP profile is created, it has the same configuration as the
L2cpDefaultProfile. You can define up to 5 L2CP profiles in addition to the
L2cpDefaultProfile.
Specifying the L2CP action for mac <mac-addr-last-byte-value-list> discard L2CP frames are
MAC addresses (discard, {discard | tunnel | peer} discarded
tunnel, or peer) tunnel L2CP frames are
forwarded across the network as
ordinary data
peer ETX-1 peers with the user
equipment to run the protocol.
L2CP frames are forwarded to the
ETX-1 CPU. Unidentified L2CP
frames are forwarded across the
network as ordinary data. Only
0x00 and 0x02 are effective
no mac
<mac-addr-last-byte-value-list>
removes the action for the
specified MAC address
Example
To add L2CP profile named layer2ctrl1 with discard action for hex byte 0x01 and
0x03:
ETX-1# configure port
ETX-1>config>port# l2cp-profile layer2ctrl1
ETX-1>config>port>l2cp-profile(layer2ctrl1)$ mac 0x01 discard
ETX-1>config>port>l2cp-profile(layer2ctrl1)$ mac 0x03 discard
ETX-1>config>port>l2cp-profile(layer2ctrl1)$ info detail
mac 0x00 tunnel
mac 0x01 discard
mac 0x02 tunnel
mac 0x03 discard
mac 0x04 tunnel
mac 0x05 tunnel
mac 0x06 tunnel
mac 0x07 tunnel
mac 0x08 tunnel
mac 0x09 tunnel
mac 0x0a tunnel
mac 0x0b tunnel
mac 0x0c tunnel
mac 0x0d tunnel
mac 0x0e tunnel
mac 0x0f tunnel
mac 0x20 tunnel
mac 0x21 tunnel
mac 0x22 tunnel
mac 0x23 tunnel
mac 0x24 tunnel
mac 0x25 tunnel
mac 0x26 tunnel
mac 0x27 tunnel
mac 0x28 tunnel
mac 0x29 tunnel
mac 0x2a tunnel
mac 0x2b tunnel
mac 0x2c tunnel
mac 0x2d tunnel
mac 0x2e tunnel
mac 0x2f tunnel
ETX-1>config>port>l2cp-profile(layer2ctrl1)$
Standards
The following standards are supported:
IEEE 802.1ad
IEEE 802.1Q.
IEEE 802.1w
Factory Defaults
The default configuration of the bridge is as follows:
VLAN-aware Enabled
Filtering Enabled
Aging time 300 seconds
Port 1-6 named BRIDGE PORT 1-6
Bind: Ethernet 1-6
Ingress filtering Disabled
Accept-frame-type All
Port VID 1, Priority 0
Spanning-tree
Path cost 0
Priority 128
Admin-edge false
Auto-edge true
Mcheck false
Admin status shutdown
Port 7 named BRIDGE PORT 7
Port VID 1, Priority 0
Spanning-tree
Operation mode rstp
max-age 20
forward-time 15
hello-time 2
priority 32768
tx-hold-count 3
Functional Description
An Ethernet bridge joins two or more LAN (Local Area Network) connections,
thus creating a larger LAN. It is a device that can modulate the traffic passing
between different local area networks.
ETX-1 supports RSTP which can be used to prevent loops in Layer 2 networks and
provides rapid convergence of the spanning tree.
Transmitting tagged frames for tagged-egress <bridge-port-list> If port numbers are sequential,
the VLAN indicate by using ".."; e.g., 1..5.
If not sequential, indicate by using
","; e.g.,1,3
Transmitting untagged frames for untagged-egress <bridge-port-list> If port numbers are sequential,
the VLAN indicate by using ".."; e.g., 1..5.
If not sequential, indicate by using
","; e.g.,1,3
Adding the MAC address to the static-mac <vlan-id> <mac-address> The available numbers of MAC
specified VLAN ID <bridge-port> addresses depends on the VLAN
ID. Configure the VLAN ID to add
more than one MAC address and
vice versa. You can add up to 64
static MAC.
Defining ingress VLAN tag ingress-tag push vlan <sp-vlan> p- Configurable on user port only
handling behavior bit fixed <pbit-value> sp-vlan range is 14094,
ingress-tag push vlan <sp-vlan> p- pbit-value range is 07
bit copy
no ingress-tag
Note
ERP and RSTP should not be configured at the same time
RSTP and LAG should not be configured at the same time
To configure RSTP:
1. At the config>bridge(1)>spanning-tree# prompt, enter:
spanning-tree
The config>bridge(1)>spanning-tree# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Management Host IP
192.168.100.144
ETH 1 ETH 2
ETH 4
ETH 1 ETH 2
ETH 6
ETH 2 ETH 1
Management Host IP
192.168.100.142
To configure RSTP:
1. Configure device A:
a. Configure the second port to be the user port:
configure port ethernet 2
shutdown
functional-mode user
no shutdown
exit all
b. Configure the physical interface management flow:
flow mn_out
classifier untagged
ingress-port svi 1
egress-port ethernet 5 queue 0 block 0/1
no shutdown
exit all
vlan 4
tagged-egress 1..4,6..7
untagged-egress 5
exit all
d. Configure PVID for port 5:
configure bridge 1 port 5
pvid 4 priority 7
exit all
e. Configure the spanning tree:
#******************** Configuring_spanning tree for bridge ******************
configure bridge 1 spanning-tree
priority 12288
exit all
configure bridge 1
port 1
spanning-tree
cost 8213818
priority 192
no shutdown
exit
exit
port 2
spanning-tree
cost 12345678
priority 224
no shutdown
exit all
1. Configure device B, C and D:
a. Configure the second port to be a user port:
configure port ethernet 2
shutdown
functional-mode user
no shutdown
exit all
b. Configure the bridge management flow:
#******************** Configuring_svi ***************************************
configure port svi 1
no shutdown
exit all
classifier-profile v4 match-any
match vlan 4
exit all
configure flows
flow mn_in
classifier v4
ingress-port bridge-port 7
egress-port svi 1 queue 5
vlan-tag pop vlan
no shutdown
exit
flow mn_out
classifier untagged
ingress-port svi 1
egress-port bridge-port 7
vlan-tag push vlan 4 p-bit fixed 7
no shutdown
exit all
vlan 4
tagged-egress 1..7
exit all
d. Configure the spanning tree:
#******************** Configuring_spanning tree for bridge ******************
Bridge spanning tree for device B:
configure bridge 1 spanning-tree
priority 20480
exit all
Bridge spanning tree for device D (this device is the ROOT device because it
has the highest priority):
configure bridge 1 spanning-tree
priority 0
exit all
port 2
spanning-tree
cost 65432
priority 80
no shutdown
exit
exit
port 6
spanning-tree
cost 66666
priority 176
no shutdown
exit all
port 2
spanning-tree
cost 666666
priority 96
no shutdown
exit all
port 2
spanning-tree
cost 1
priority 48
no shutdown
exit
exit
port 4
spanning-tree
cost 22
priority 0
no shutdown
exit all
To define VLAN:
VLAN ID: 5
name: VLAN5
tagged-egress: bridge port 2 and bridge port 3
untagged-egress: bridge port 4
Tagged Ports : 0
Untagged Ports : 1..6
1 00-20-D2-34-F0-A9 5 Dynamic
1 00-20-D2-35-1B-25 5 Dynamic
1 00-20-D2-36-9C-69 5 Dynamic
1 00-20-D2-50-17-56 5 Dynamic
1 00-24-1D-1D-7E-12 5 Dynamic
1 00-24-23-72-7F-0D 5 Dynamic
1 00-25-64-9A-C5-92 5 Dynamic
1 00-25-64-A3-25-D0 5 Dynamic
1 00-25-64-A7-54-91 5 Dynamic
1 00-25-64-B7-E8-99 5 Dynamic
1 00-25-64-C1-BB-08 5 Dynamic
1 00-25-64-C1-BB-EA 5 Dynamic
1 00-25-64-C2-34-10 5 Dynamic
1 00-25-64-C2-35-41 5 Dynamic
1 00-25-64-C2-3F-50 5 Dynamic
1 00-26-2D-F0-36-B5 5 Dynamic
1 00-30-18-A2-0D-87 5 Dynamic
1 00-50-56-E3-48-BB 5 Dynamic
1 02-50-56-C0-00-00 5 Dynamic
1 08-10-75-15-91-2B 5 Dynamic
1 0C-74-C2-ED-8D-97 5 Dynamic
1 40-16-9F-E1-CE-0E 5 Dynamic
1 44-2A-60-F5-46-EC 5 Dynamic
1 58-94-6B-84-C7-0C 5 Dynamic
1 5C-26-0A-47-B6-BF 5 Dynamic
1 5C-AC-4C-80-14-0F 5 Dynamic
1 78-A3-E4-73-D3-8E 5 Dynamic
1 7A-7A-C0-A8-D2-FE 5 Dynamic
1 8C-7B-9D-79-47-F6 5 Dynamic
1 BC-30-5B-AC-B4-AC 5 Dynamic
1 BC-30-5B-B6-C0-D9 5 Dynamic
1 BC-30-5B-B6-D1-51 5 Dynamic
1 BC-30-5B-B6-DC-21 5 Dynamic
1 BC-30-5B-B6-DD-C0 5 Dynamic
1 BC-30-5B-B6-DF-76 5 Dynamic
1 C8-3A-35-CC-F5-1F 5 Dynamic
1 C8-3A-35-D4-4A-D8 5 Dynamic
1 CC-08-E0-F6-7C-35 5 Dynamic
1 E0-05-C5-74-65-67 5 Dynamic
1 E0-05-C5-7B-E0-7B 5 Dynamic
1 F0-DE-F1-37-EB-EF 5 Dynamic
Standards
The following standards are supported:
IEEE 802.1p
IEEE 802.1Q.
Benefits
QoS allows you to optimize bandwidth, eliminating the need to ensure the
necessary bandwidth for traffic with different speed and quality requirements.
Factory Defaults
Refer to the following sections for the specific defaults of each type of QoS.
Functional Description
To differentiate traffic, the IEEE 802.1p standard specifies eight classes of service
per user-defined queue map profile. These classes of service are associated with
priority values, from 0 to 7, using the 3-bit user priority field in an IEEE 802.1Q
header added to VLAN-tagged frames within an Ethernet frame header. The way
traffic is handled when assigned a specific priority value is only generally defined
and left to implementation. The general definitions are as follows:
0 Best effort
1 Background
2 Spare
3 Excellent effort
4 Controlled load
5 Video
6 Voice
7 Network control
Factory Defaults
Note The second port has 6 queues and uses net-profile regardless of being a
network port or a user port.
Factory Defaults
By default, ETX-1 has two CoS mapping profiles, which are configured as follows:
cos-map-profile "pbit-profile" classification p-bit
map 0 to-cos 7
map 1 to-cos 6
map 2 to-cos 5
map 3 to-cos 4
map 4 to-cos 3
map 5 to-cos 2
map 6 to-cos 1
map 7 to-cos 0
cos-map-profile "dscp-profile" classification ip-dscp
map 0..7 to-cos 7
map 8..15 to-cos 6
map 16..23 to-cos 5
map 24..31 to-cos 4
map 32..39 to-cos 3
map 40..47 to-cos 2
map 48..55 to-cos 1
map 56..63 to-cos 0
Note ETX-1 supports only two CoS mapping profiles pbit-profile and dscp-profile.
These profiles cannot be removed, but can be modified.
Example
Bandwidth Profiles
ETX-1 supports the following bandwidth profiles:
Shaper profile Applied to queue group or queue blocks
Policer profile Applied to flows
You can control the bandwidth utilization by defining the committed information
rate (CIR) and committed burst size (CBS) in shaper and policer profiles.
CIR: Defines the Committed Information Rate for the current profile. The CIR
specifies a bandwidth with committed service guarantee.
CBS: Defines the Committed Burst Size for the current profile. The CBS specifies
the maximum guaranteed burst size.
Compensation: You can specify the amount of bytes that the policer can
compensate for the layer 1 overhead (preamble and IFG) and the overhead for
the added VLAN header in case of stacking.
Factory Defaults
ETX-1 provides default bandwidth profiles, as specified in the following table.
compensation 0
Specifying the CIR bandwidth [cir <cir-kbit- no bandwidth removes the bandwidth limits
(kbps) and CBS sec>] [cbs {2048 |4096 | CIR allowed values: 321,000,000
(bytes) bandwidth 8192 | 16384 | 32768 |
The granularity is 32 kbps for CIR. If you specify a CIR
limits 131072 | 524288}]
that is not a multiple of 32 kbps, the device rounds it
down; for example if you specify 170 kbps, the device
operates as if you specified 160 kpbs.
Example
Note
No more than 28 shaper profiles and 32 policer profiles can be activated
simultaneously.
Specifying the CIR bandwidth [cir <cir-kbit-sec>] no bandwidth removes the bandwidth limits
(kbps) and CBS [cbs {4096 | 32768 | 131072 | CIR allowed values: 321,000,000
(kbytes) bandwidth 524288 | 2097152 | 8388608 |
The granularity is 32 kbps for CIR. If you specify a
limits 33554432}]
CIR that is not a multiple of 32 kbps, the device
rounds it down; for example if you specify
170 kbps, the device operates as if you specified
160 kpbs.
Example
Note If one of the internal queues is configured to WRR, queues with a higher queue ID
cannot be configured to Strict. Shaper per queue or per port cannot be set at the
same time.
Factory Defaults
ETX-1 provides a default queue block profile named DefaultQueue1, which
defines queues 05 as follows:
Scheduling method: WRR
Depth: 8192
Setting scheduling method scheduling { strict | wrr <wrr-weight>} The weight range is 131
Specifying queue depth (in bytes) depth <value> The queue lengthes
cannot exceed 15360.
The depth granularity is
1024 bytes.
Example
Assigning a shaper profile shaper profile <shaper-profile-name> Only for queue blocks in
level 0. This is used to define
shaping per port.
Note
Normally there is no need for you to enter the bind command. When you add a
queue block in level 0 to the profile, bind is done automatically.
Example
Note This example uses the shaper profile and queue block profile created in the
examples in the preceding sections.
8.4 Flows
ETX-1 supports up to 32 unidirectional Ethernet flows, which can be used to
provide E-Line or E-LAN service delivery over Metro Ethernet networks. Each
Ethernet flow is unidirectional and connects two ports.
This section explains how to define the flows according to specific criteria such as
VLAN. You can use classifier profiles to specify the criteria for flows. The
classification is per port and is applied to the ingress port of the flow.
Standards
IEEE 802.3x
Benefits
The user traffic can be classified into different Ethernet flows (EVC.CoS) to
provide services in a flexible manner.
Functional Description
Packets can be classified by means of their VLAN IDs and other criteria, as
specified in Table 8-3.
Classifications that apply to the same port are allowed only one or one same
combination. NNI indicates ingress network port, UNI indicates ingress user port.
p-bit 07 Both
ip-precedence 07 Both
untagged - Both
non-ip - Both
all - Both
vlan + inner-vlan Single value (0-4094) for VLAN and range Both
(0-4094) for inner VLAN
vlan + inner-vlan + p-bit Single value(0-4094) for VLAN, range (0- Both
4094) for inner VLAN
0-7 for p-bit
Note The VLAN may be a single value or a range for setting a classification or the same
combination classification. When setting the same combination classification with
VLAN and inner VLAN, the VLAN should be a single value.
The p-bit may be a single value or a range for setting a classification or the same
combination classification. When setting p-bit range, it should contain all values,
the following is valid: p-bit range: 0..7
The ip-precedence may be a single value or a range for setting a classification or
the same combination classification. When setting ip-precedence range, it should
contain all values, the following is valid: ip-precedence range: 0..7
The ip-dscp may be a single value or a range for setting a classification or the
same combination classification. When setting ip-dscp range, it should contain all
values, the following is valid: ip-dscp range: 0..63
If you apply the same combination classification with IP address range, the
following is valid:
1. For IP address range: the starting IP address is X.X.0.0, the end address is
X.X.255.255 or the starting IP address is X.X.X.0, the end address is X.X.X.255
2. The starting address and the end address must be in the same subnet.
For example:
IP address range: 10.10.10.0 10.10.10.255; If you apply the same combination
classification with MAC address range, the following is valid:
1. For MAC address range: the starting MAC address is XX-XX-XX-00-00-00, the
end address is XX-XX-XX-FF-FF-FF or the starting MAC address is XX-XX-XX-XX-
00-00, the end address is XX-XX-XX-XX-FF-FF or the starting MAC address is XX-
XX-XX-XX-XX-00, the end address is XX-XX-XX-XX-XX-FF
2. The prefix of the starting MACaddress and the end MACaddress must be same.
For example: IP address range: 66-66-66-66-66-00 66-66-66-66-66-FF
ETX-1 supports up to 32 Ethernet flows. Flows are unidirectional. One Ethernet
port can support one or same type classification combination. Two different flow
classification combinations are not allowed, except VLAN and untagged, IP and
non-IP.
When you configure the flow, if QinQ status is disabled (configure>bridge 1>port
(port-number)>no ingress-tag), please perform the VLAN action according to the
following rules:
Table 8-4, Table 8-5 and Table 8-6 show valid action combination rules on ingress
frame tags and the resulting egress frame tags and p-bits, according to whether
the ingress frame is untagged, contains one VLAN, or is double-tagged.
When you configure the flow, if QinQ status is disabled (configure>bridge 1>port
(port-number)>no ingress-tag), please perform the VLAN action according to the
following rules:
When you configure the flow, if QinQ status is enabled (configure>bridge 1>port
(port-number)>ingress-tag) and the flow direction is from net port to user port,
please perform the VLAN action according to the following rules:
Inner- p-bit D
When you configure the flow, if QinQ status is enabled (configure>bridge 1>port
(port-number)>ingress-tag) and the flow direction is from user port to net port,
please perform the VLAN action according to the following rules:
Factory Defaults
By default, no flows exist.
To create classifier profile with criteria VLAN 20 and inner VLAN 30:
ETX-1# configure flows classifier-profile v20_inner_30 match-any
ETX-1>config>flows>classifier-profile(v20_inner_30)$ match vlan 20 inner-vlan
30
ETX-1>config>flows>classifier-profile(v20_inner_30)$ exit all
ETX-1#
Configuring Flows
To configure flows:
1. Navigate to config>flows.
2. Enter flow <flow-name>.
Specifying the egress port, egress-port ethernet <port> [queue If a queue mapping profile is used, it
and defining its queues <queue-id> block <level_id/queue_id>] must be compatible with the
egress-port ethernet <port> [queue- classification criteria of the flow;
map-profile <queue-map-profile-name> e.g., if the classification is according
block <level_id/queue_id>] to DSCP, then the queue mapping
should not be according to p-bit.
egress-port bridge-port <port-number>
For network port, the range of
egress-port svi <port-number> [queue
<queue-id> is 05. For user port,
<queue-id>]
the range of <queue-id> is 03.
egress-port svi <port-number> [queue-
map-profile <queue-map-profile-
name>]
Adding VLAN ID with p-bit vlan-tag push vlan <sp-vlan> p-bit fixed
set to specific value, and <fixed-p-bit> [inner-vlan <inner-sp-vlan>
optionally adding inner p-bit fixed <inner-fixed-p-bit>]
VLAN ID with p-bit set to
specific value
The following marking actions can be performed in the mark level, at the
config>flows>flow(<flow-name>)>mark# prompt.
Overwriting VLAN ID with a new vlan <vlan> no vlan removes the overwriting of VLAN
value ID
Overwriting inner VLAN ID with a inner-vlan <inner-vlan> no inner-vlan removes the overwriting of
new value inner VLAN ID
Overwriting p-bit with a new value p-bit <p-bit> no p-bit removes the overwriting of p-bit
Overwriting inner p-bit with a new inner-p-bit <inner-p-bit> no inner-p-bit removes the overwriting of
value inner p-bit
Name : f10_out
Admin Status : Up
Oper Status : Up
Test : Off
Classifier : v10
Name : f100_in
Admin Status : Up
Oper Status : Up
Test : Off
Classifier : v100_inner_v10
2. Set up a flow using the previously defined classifier profile, with ingress at
ETH 3 and egress at bridge port 3:
ETX-1# configure flows
ETX-1>config>flows# flow master_flow
ETX-1>config>flows>flow(master_flow)$ classifier v100
ETX-1>config>flows>flow(master_flow)$ ingress-port ethernet 3
ETX-1>config>flows>flow(master_flow)$ egress-port bridge-port 3
ETX-1>config>flows>flow(f10_out)$ no shutdown
ETX-1>config>flows>flow(f10_out)$ exit all
ETX-1#
OAM CFM messages transparently, responding only to OAM link trace (LTM) and
unicast OAM loopback (LBM). MIPs can be configured automatically or manually.
Standards
IEEE 802.1ag, ITU-T Y.1731
Benefits
Ethernet service providers can monitor their services proactively and guarantee
that customers receive the contracted SLA. Fault monitoring and end-to-end
performance measurement provide tools for monitoring frame delay, frame delay
variation, and frame loss and availability.
Functional Description
OAM enables detection of network faults and measurement of network
performance, as well as distribution of fault-related information. OAM
functionality ensures that network operators comply with QoS guarantees, detect
anomalies before they escalate, and isolate and bypass network defects. As a
result, operators can offer binding service-level agreements.
In packet-switched networks, ETX-1 provides the following OAM (CFM) functions:
End-to-end Connectivity Fault Management (CFM) per IEEE 802.1ag:
Continuity check (CC)
Non-intrusive loopback, used to detect loss of bidirectional continuity
Link Trace for fault localization
End-to-end service and performance monitoring per ITU-T Y.1731:
Loss measurement
Delay measurement
Note OAM messages are always mapped to the queue with the lowest priority.
Factory Defaults
By default, there are no MDs, MAs, or MEPs.
The default MIP configuration mode is manual.
When a maintenance domain is created, it has the following default
configuration.
md-level 3
name string "MD<mdid>" For example, the default name for maintenance
domain 1 is MD1.
classification vlan 0
name string "MA<maid>" For example, the default name for maintenance
association 1 is MA1.
classification vlan 0
bind no bind
client-md-level 4
dest-addr-type ccm multicast pm unicast Destination address type for CCM messages
multicast
Destination address type for performance
measurement messages unicast
direction down
ccm-priority 0
ais no ais
classification priority-bit 0
dmm-interval 1s
lmm-interval 1s
remote mac-address
00-00-00-00-00-00
Defining MIP policy mip-policy {explicit | default} Refer to the explanation of MIP policy in Configuring
Maintenance Associations for a description of the
parameters. You do not need to configure the MIP
policy at the MD level, unless the MIP policy in the MA
level is set to defer
Note: This command is available only if mip-assign is
set to automatic.
Associating the MA with classification vlan <vlan-id> Verify that the VLAN is the same as the VLAN
a VLAN associated with the MEP.
Note: If a classifier profile is associated with at the
MEP, the VLAN should be set to 0.
Configuring MEP for the mep <mepid> Refer to Configuring Maintenance Endpoints
MA
Defining MIP policy mip-policy Explicit MIP is automatically created for ports
{explicit | default | defer} corresponding to VLAN classification of MA, only
if a corresponding MEP exists at a lower MD
level
Default MIP is automatically created for ports
corresponding to VLAN classification of MA
Defer MIP policy is inherited from the MD MIP
policy.
Note: This command is available only if MIP
assignment is set to automatic.
Note For every MEP, you must configure a flow with the same classification as the MEP.
Binding the MEP to an bind ethernet <port> To unbind the MEP, enter no bind
Ethernet port
Specifying the priority of ccm-priority <priority> The allowed range for <priority> is 07
CCMs and LTMs
transmitted by the MEP
Associating the MEP with classification vlan <vlan-id> Verify that the VLAN is the same as the VLAN
a classifier profile or classification profile associated with the MA
VLAN <profile-name>
Defining the MAC dest-addr-type [ccm If the MAC address type for PM messages is
address type sent in {unicast|multicast}] unicast, then the MAC address for the
OAM continuity check [pm {unicast|multicast}] transmission of PM messages is determined by
messages (CCM) and the configuration of the destination NE. If a
performance remote MAC address is configured for the
measurement messages destination NE, that MAC is used. Otherwise if
(PM) a remote MEP ID is configured for the
destination NE, the remote MAC address is
learned from CCM messages. Refer to
Configuring Destination NEs for details.
Defining a unicast MAC dest-mac-addr <mac-addr> MAC address is in format xx-xx-xx-xx-xx-xx
address if you defined
unicast MAC address
type for CCM messages
with the dest-addr-type
command
Defining remote MEP remote-mep <remote-mep-id> Allowed range for remote MEP is 18191
with which the MEP The MEP ID and the remote MEP ID must be
communicates different. You can define up to 100 remote
MEPs for the local MEP if the destination
address type is multicast, otherwise you can
define only one remote MEP.
To delete a MIP:
At the config>oam>cfm>md(<mdid>)# prompt enter: no mip <mip-id>
The maintenance intermediary point is deleted.
To configure a MIP:
1. Navigate to configure oam cfm maintenance-domain <mdid> mip <mip-id> to
select the MIP to configure.
The config>oam>cfm>md(<mdid>)>mip(<mip-id>)# prompt is displayed
2. Enter all necessary commands according to the tasks listed below.
Binding the MIP to an bind ethernet <port> To unbind the MIP, enter no bind
Ethernet port
To configure a MIP:
Configure MIP assignment to automatic (refer to Setting MIP Configuration
Mode).
Verify that you have flows configured between ETX-1 and the device(s)
acting as MEP(s) (refer to Flows for information on defining flows).
Configure the MA classification to the same classification that is used by the
flows.
Configure MIP policy to default.
Examples
MEP ID 1:
Bind Ethernet 1 (The bound Ethernet port must be the port that is used
by the flows)
Remote MEP ID 2
Classification VLAN 100.
MD Name : MD1
MA Name : MA1
Cross Connect Status : OK
Associating this service with a classification priority-bit <p-bit> The allowed range is 07
priority Note: Only one service can be
defined on each p-bit.
Activating the MEP service no shutdown You can activate a service only
if the corresponding MEP is
active and you have defined at
least one destination NE
The prompt
config>oam>cfm>md(<mdid>)>ma(<maid>)>mep(<mepid>)>service(<serviceid
>)>dest-ne(<dest-ne-index>)# is displayed.
2. Enter all necessary commands according to the tasks listed below.
Defining the MAC address of remote mac-address <mac> If the MAC address is
the destination NE 00-00-00-00-00-00, the
statistic counters for the
destination NE do not
increment
Example
event Specifies the type of event reporting none The event is not reported
log The event is reported via the
event log
trap An SNMP trap is sent to
report the event
logandtrap The event is reported
via the event log and an SNMP trap
Example
Near End Frame Loss Ratio Log and trap 1e-9 1e-10
In this example, an SNMP trap and an event are generated as notification of the
rising threshold if during an 8-second sample interval, four DMM packets or more
exceed the 10-milliseconds delay threshold of this service. The alarm is cleared
(falling threshold) if ETX-1 detects an 8-second sample interval in which two or
fewer packets cross the thresholds.
A rising or falling threshold event is generated if a specific ratio is exceeded. For
example, an SNMP trap is sent if the far end Frame Loss Ratio (from ETX-1 to the
network) exceed 10^-4, i.e. more than one frame out of 10,000 LMMs sent for
this service are lost.
Note The service for which you wish to view the statistics must be active. If the service
is not active, the commands to view statistics are not recognized.
Viewing running show statistics The statistics are displayed as shown in Displaying Running
statistics running Statistics; refer to Table 8-8, Table 8-9 and Table 8-10
Viewing statistics show statistics The statistics for the current interval are displayed as shown in Far
for the current current End TX Frames : 161495
interval Far End RX Frames : 161464
Far End Lost Frames : 31
Far End Unavailable Seconds (Sec) :0
Viewing running show statistics all The statistics are displayed as shown in Displaying Running
statistics, Statistics,
statistics for the
current interval,
statistics for all
intervals
Viewing statistics show statistics all- The statistics for all intervals are displayed as shown inDisplaying
for all intervals intervals Interval Statistics; refer to Table 8-8, Table 8-9 and Table 8-10
Clearing the clear-statistics All statistics data for the service or destination NE are cleared,
statistics for the including the stored interval data, except for the elapsed time
service or since the start of the current interval
destination NE
Parameter Description
Far End Tx Frames Total number of frames transmitted from local service to remote
service since the service was activated
Far End Rx Frames Total number of frames received by remote service since the service
was activated
Far End Lost Frames Total number of frames lost from local service to remote service since
the service was activated (Far End Tx Frames - Far End Rx Frames)
Far End Frame Loss Ratio (%) Far End Lost Frames divided by Far End Tx Frames
Near End Tx Frames Total number of frames transmitted from remote service to local
service since the service was activated
Near End Rx Frames Total number of frames received by local service since the service was
activated
Near End Lost Frames Total number of frames lost from remote service to local service since
the service was activated (Near End Tx Frames - Near End Rx Frames)
Near End Frame Loss Ratio (%) Near End Lost Frames divided by Near End Tx Frames
Current Delay (mSec) Current delay received in the last Delay Measurement Reply (DMR)
Current Delay Variation (mSec) Difference between the current delay value and the previous current
delay value
Average Two Way Delay (mSec) Average of all frame delay values received in DM frames
Average Two Way Delay Var (mSec) Average difference between the frame delay values received in DM
frames
Frames Above Delay Threshold Number of DM frames whose delay value exceeded the delay
threshold configured for the service
Frames Above Delay Variation Number of DM frames whose delay variation exceeded the delay
Threshold variation threshold configured for the service
Elapsed Time (sec) Time (in seconds) elapsed since the service was activated
Parameter Description
Far End Tx Frames Total number of frames transmitted from local destination NE to
remote destination NE since the service was activated (the type of
frames counted is synthetic, according to the method configured by
the loss single-ended command)
Far End Rx Frames Total number of frames received by remote destination NE since the
service was activated (the type of frames counted is synthetic,
according to the method configured by the loss single-ended
command)
Parameter Description
Far End Lost Frames Total number of frames lost from local destination NE to remote
destination NE since the service was activated (Far End Tx Frames -
Far End Rx Frames) (the type of frames counted is synthetic,
according to the method configured by the loss single-ended
command)
Far End Frame Loss Ratio (%) Far End Lost Frames divided by Far End Tx Frames
Far End Unavailable Seconds (Sec) Number of seconds the remote destination NE is considered
unavailable. The definition of unavailability differs according to
synthetic measurement mode, as configured by the loss single-ended
command:
Synthetic mode The destination NE is considered unavailable
after 3.5 consecutive seconds with no reception of synthetic
frames; the 3.5 seconds are part of the unavailable time. The
destination NE is considered available again when a synthetic
frame is received.
Near End Tx Frames Total number of frames transmitted from remote destination NE to
local destination NE since the service was activated (the type of
frames counted is synthetic, according to the method configured by
the loss single-ended command)
Near End Rx Frames Total number of frames received by local destination NE since the
service was activated (the type of frames counted is synthetic,
according to the method configured by the loss single-ended
command)
Near End Lost Frames Total number of frames lost from remote destination NE to local
destination NE since the service was activated (Near End Tx Frames -
Near End Rx Frames) (the type of frames counted is synthetic,
according to the method configured by the loss single-ended
command)
Near End Frame Loss Ratio (%) Near End Lost Frames divided by Near End Tx Frames
Near End Unavailable Seconds (Sec) Number of seconds the local destination NE is considered unavailable.
Refer to the description of Far End Unavailable Seconds for the
definition of unavailability.
Current Delay (mSec) Current delay received in the last Delay Measurement Reply (DMR)
Current Delay Variation (mSec) Difference between the current delay value and the previous current
delay value
Average Two Way Delay (mSec) Average of all frame delay values received in DM frames
Average Two Way Delay Var (mSec) Average difference between the frame delay values received in DM
frames
Frames Above Delay Threshold Number of DM frames whose delay value exceeded the delay
threshold configured for the destination NE
Frames Above Delay Variation Number of DM frames whose delay variation exceeded the delay
Threshold variation threshold configured for the destination NE
Elapsed Time (sec) Time (in seconds) elapsed since the service was activated
Parameter Description
Examples
-----------------------------------------------------------------------------
: Transmitted
LMMs : 80344
DMMs : 80344
: Received
LMRs : 80344
DMRs : 80344
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# dest-ne 3
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)>dest-ne(3)# show
statistics running
Running Counters
-----------------------------------------------------------------------------
Far End TX Frames : 161495
Far End RX Frames : 161464
Far End Lost Frames : 31
Far End Unavailable Seconds (Sec) : 0
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# dest-ne 3
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)>dest-ne(3)# show
statistics current
Current
-----------------------------------------------------------------------------
Far End Tx Frames : 908
Far End Rx Frames : 908
Far End Lost Frames : 0
Far End Frame Loss Ratio (%) : 0.0000%
Far End Unavailable Seconds (Sec) : 0
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)# dest-ne 3
ETX-1>config>oam>cfm>md(1)>ma(1)>mep(1)>service(1)>dest-ne(3)# show statist
interval 1
Interval
-----------------------------------------------------------------------------
Valid Data :
Time Stamp : 27-05-2013 16:07:41
Duration (Sec) : 900
Specifying remote MEP by MAC lbm address <mac-address> repeat MAC address is in the
address <repeat-num> format <xx-xx-xx-xx-xx-xx>
Specifying remote MEP by MEP ID lbm remote-mep <mep-id> repeat Allowed range of
<repeat-num> repeat-num is 150
Specifying remote MEP by MAC linktrace address <mac-address> MAC address is in the
address [ttl <ttl-value>] format <xx-xx-xx-xx-xx-xx>
Specifying remote MEP by ID linktrace remote-mep <mep-id> Allowed range for ttl-value
[ttl <ttl-value>] is 164. This parameter
specifies the number of
hops. Each unit in the link
trace decrements the TTL
until it reaches 0, which
terminates the link trace.
OAM EFM
This section describes the monitoring of the Ethernet links using OAM EFM (OAM
Ethernet at the First Mile)
ETX-1 can act as the active or passive side in an IEEE 802.3-2005 application.
When link OAM (EFM) is enabled for a port, you can view its status by displaying
the port status (show oam-efm). You can also display the OAM (EFM) parameters
and OAM (EFM) statistics.
Standards
IEEE 802.3ah
Benefits
Ethernet OAM (EFM) provides remote management and fault indication for the
Ethernet links. Remote link failure can be detected via OAM (EFM).
Functional Description
The OAM (EFM) discovery process allows a local data terminating entity (DTE) to
detect Ethernet OAM capabilities on a remote DTE. Once Ethernet OAM support is
detected, both ends of the link exchange state and configuration information,
such as mode, PDU size, and it can make a remote device perform loopback
function, if the remote device supports loopaback function. If both DTEs are
satisfied with the settings, OAM is enabled on the link. However, the loss of a link
or a failure to receive OAMPDUs for five seconds may cause the discovery process
to restart.
DTEs may either be in active or passive mode. DTEs in active mode initiate the
ETH-OAM (EFM) communications and can issue queries and commands to a
remote device. DTEs in passive mode generally wait for the peer device to initiate
OAM communications and respond to commands and queries, but do not initiate
them.
A flag in the OAMPDU allows an OAM entity to convey the failure condition Link
Fault to its peer. Link Fault refers to the loss of signal detected by the receiver; A
Link Fault report is sent once per second with the Information OAMPDU.
Factory Defaults
By default, OAM EFM is not enabled for the Ethernet.
Enabling link OAM (EFM) efm descriptor <efm-descriptor- The EFM descriptor must exist
index> before you can assign it to a port
For proper functioning of link
OAM (EFM), the relevant Ethernet
port must be associated with an
L2CP profile that specifies peer
action for MAC 0x02.
Displaying link OAM (EFM) show oam-efm Relevant only if link OAM (EFM) is
parameters enabled.
Displaying link OAM (EFM) statistics show oam-efm-statistics Relevant only if link OAM (EFM) is
enabled.
Example
To enable active link OAM (EFM) for Ethernet port 1 and display the status:
ETX-1# configure port l2cp-profile mac2peer
ETX-1>config>port>l2cp-profile(mac2peer)# mac 0x02 peer
ETX-1>config>port>l2cp-profile(mac2peer)# exit all
ETX-1# configure oam efm
ETX-1>config>oam>efm# descriptor 1 active
ETX-1>config>oam>efm# exit all
ETX-1# configure port ethernet 1
ETX-1>config>port>eth(1)# l2cp profile mac2peer
ETX-1>config>port>eth(1)# efm descriptor 1
ETX-1>config>port>eth(1)>efm# exit
ETX-1>config>port>eth(1)# show oam-efm
Administrative Status : Enabled
Operational Status : Link Fault
Loopback Status : Off
ETX-1>config>port>eth(1)#
8.6 Router
The router in ETX-1 is used to interconnect internal Layer-3 support modules
such as management. Any flow related to management must be via an SVI that is
bound to a router interface.
Benefits
The router provides Layer-3 (IP) connectivity.
Factory Default
By default, the router is configured as shown in the following.
Functional Description
Any management-related flow entering or exiting the device must be via an SVI
that is bound to a router interface. A router interface can be associated via
binding to only one SVI. If a flow is used for management purposes, the router
interface corresponding to the SVI must be enabled for management access.
Enabling the static route and the next static-route The next hop must be a subnet of
gateway (next hop) using the next <IP-address/mask> address one of the router interfaces.
hops IP address <IP-address> [metric To set the default-gateway,configure
<metric>] static route of address 0.0.0.0/0 to
next hop default gateway address.
Providing host name to DHCP server host-name name <string> Specify a name, or use sys-name to
host-name sys-name indicate that the system name will be
used as the host name
Binding router interface to logical bind svi <port-number> You can bind one SVI to a router
port interface
Providing client ID to DHCP server client-id id <string> Specify an ID, or use mac to indicate
client-id mac that the device MAC address will be
used as the client ID
Factory Defaults
The default configuration of the SNTP parameters is:
No SNTP servers defined
Polling interval set to 15 minutes.
When an SNTP server is defined, its default configuration is:
IP address set to 0.0.0.0
Not preferred
Administratively disabled (shutdown).
Setting UDP port for NTP udp port <udp-port> Allowed range is 123, 1024
requests, to a specific UDP port udp default 65535
or to default UDP port (123)
Example
Defining the time zone relative zone utc [<[{+|-}]hh[:mm]>] Allowed range of values:
to Universal Time Coordinated -12:00 to +12:00, in
30-minute increments
Benefits
You can monitor the installed components and hardware/software revisions.
You can display additional information for each installed inventory component by
entering the inventory level using the corresponding inventory component index.
The index corresponds to the row in the output of show summary-inventory; it
therefore changes according to the specific components installed in the unit.
Parameter Description
Description Description of component type, in the form:
<device-name>.< Physical Class>, e.g. ETX-1.Ethernet 1
Contained In Index of the component that contains the component for which information is being
displayed. This is 0 for the chassis, as it is not contained in any component, and 1 for
all other components, as they are all contained in the chassis.
Physical Class Class of component
Possible values: Chassis, CPU, Power Supply, Port
Relative Position Contains the relative position of this component among other similar components
(with the exception of the relative positions for the chassis, management Ethernet
port).
Possible values for the various component types:
Chassis 4294967295
CPU 1
Power Supply 1
Network Port 1 or 2
User Port 3, 4, 5, 6
Management Ethernet 101
RS-232 Control Port 11
Name Name of component
Possible values (according to component type):
<device-name> Chassis
CPU
Power Supply
Ethernet <n>
MNG Port
RS-232 Control Port
HW Rev Hardware revision (relevant only for chassis)
SW Rev Software revision (relevant only for chassis)
FW Rev Firmware revision (relevant only for chassis)
Serial Number Serial number (blank if unknown for component)
MFG Name Manufacturer name (blank if unknown for component)
Model Name Model name (blank if unknown for component)
Alias Alias name for component
FRU Indicates whether the component is a field replaceable unit (can be replaced on-site).
For ETX-1 this is normally true only for the chassis.
Assigning user-specific asset identifier asset-id <id> no asset-id removes the asset
to the component (usually for ID.
removable physical components)
Example
To display the following inventory information:
Inventory table
Inventory information for the following components:
Chassis
Power Supply
User Port 1.
ETX-1>config>system# inventory 1
ETX-1>config>system>inventor(1)# show status
Description : ETX-1.Chassis
Contained In : 0
Physical Class : Chassis
Relative Position : 4294967295
Name : ETX-1 - Chassis
HW Ver : 2.0A(2.0)
SW Ver : 1.2.0(0.34)
FW Ver : 0.4
Serial Number : 00-20-D2-50-1A-13
MFG Name : RAD
Model Name :
Alias :
Asset ID :
FRU : True
ETX-1>config>system>inventor(1)# exit
ETX-1 >config>system# inventory 3
ETX-1>config>system>inventor(3)# show status
Description : ETX-1 {AC} Power Supply
Contained In : 1
Physical Class : Power Supply
Relative Position : 1
Name : Power Supply
HW Ver : 2.0A(2.0)
SW Ver : 1.2.0(0.34)
FW Ver : 0.4
Serial Number :
MFG Name :
Model Name :
Alias : POWER-SUPPLY
Asset ID :
FRU : False
ETX-1>config>system>inventor(3)# exit
ETX-1>config>system# inventory 6
ETX-1>config>system>inventor(6)# show status
Description : ETX-1 Ethernet 3
Contained In : 1
Physical Class : Port
Relative Position : 3
Name : Ethernet 3
HW Rev :
SW Rev :
FW Rev :
Serial Number :
MFG Name :
Model Name :
Alias :
Asset ID :
FRU : False
ETX-1>config>system>inventor(6)# exit
ETX-1>config>system#
2. Enter:
show environment
The information is displayed as shown in the example below.
The status of the power supply and fan indicates whether the unit is
present and functioning properly, or is absent (does not exist), or has
failed.
ETX-1# configure chassis
ETX-1>config>chassis# show environment
Power Supply Type Status
-----------------------------------------------------------------------------
1 AC-PFOK
FAN Status
-----------------------------------------------------------------------------
ETX-1>config>chassis#
ETX-1# file
ETX-1>file# show sw-pack
Name Version Creation Time Actual
-----------------------------------------------------------------------------
sw-pack-1 1.2.0(0.15) 2013-05-09 08:35:15 previous active
sw-pack-2 1.2.0(0.16) 2013-05-09 08:35:15 active
ETX-1>file#
ETX-1>config>system#
VLAN 64 100 Unused, except for three buffers that are used for
internal functions
Downloading/Uploading Files
You can download or upload files to the ETX-1 unit via SFTP/TFTP. Typically,
configuration files and software files are copied
The software files can also be downloaded to ETX-1 via the Boot Manager, using
XMODEM, FTP, or TFTP. For details on upgrading the device software, refer to
Chapter 12.
SFTP Application
The SFTP protocol provides secure file transfers via the devices Ethernet
interface. SFTP is a version of FTP that encrypts commands and data transfers,
keeping your data secure and your session private. For SFTP file transfers, an
SFTP server application must be installed on the local or remote computer.
Various third-party applications offer SFTP server software. For more information,
refer to the documentation of these applications.
ETX-1
ETX-1
5. Make sure port 22 appears in the exceptions list. If it does not, click Add Port
and add it to the list of exceptions.
TFTP Application
TFTP protocol is typically used for remote IP-to-IP file transfers via the device's
Ethernet interface. It can also be used, however, for local file transfer, as the
transfer rate of the Ethernet interface is much faster than that of the RS-232
interface.
For TFTP file transfers, a TFTP server application must be installed on the local or
remote computer. The TFTP server waits for any TFTP file transfer request
originating from the device, and automatically performs the request.
Various third-party TFTP applications allow instant creation of a TFTP server on a
client computer. For more information, refer to the documentation of these
applications.
ETX-1
ETX-1
5. Make sure port 69 appears in the exceptions list. If it does not, click Add Port
and add it to the list of exceptions.
Example
Source file name running-config
Destination file name startup-config
ETX-1# copy running-config startup-config
ETX-1# file
ETX-1>file# dir
Codes: C-Configuration S-Software L-License LO-Log O-Other B-Banner
running-config has been modified since last time it was equal to startup-config
show startup-config
show user-default-config
The contents of the specified configuration file are displayed.
Deleting Files
You can delete the following files:
sw-pack-<n>
restore-point-config
rollback-config
startup-config
user-default-config
zero-touch-config-xml
To delete a file:
At the file# prompt, enter:
delete <file-name>
You are prompted to confirm the deletion.
6. Confirm the deletion.
ETX-1# file
ETX-1>file# delete startup-config
! The file will be erased. Are you sure? [yes/no] _ yes
10.9 Reset
ETX-1 supports the following types of reset:
Reset to factory defaults
Reset to user defaults
Overall reset (restart) of the device.
To restart ETX-1:
1. At the admin# prompt enter:
reboot.
A confirmation message is displayed:
Device will reboot. Are you sure? [yes/no]
2. Enter yes to confirm the reset.
The unit restarts.
LEDs
A red LED usually indicates a hardware problem. Check the port associated with
the LED to further investigate the problem. Refer to Chapter 3 for a description
of the LEDs.
Statistic Counters
Statistic counters provide information on possible abnormal behavior and failures.
You can collect statistics on the following:
Ethernet ports
RADIUS server
For further information, refer to the relevant sections in Chapter 6-10 and the
relevant sections in the troubleshooting chart.
Note All traps are maskable, by masking the corresponding alarm/event via the
alarm-source-attribute / alarm-source-type-attribute commands, or by masking
the corresponding alarm per severity via the mask-minimum-severity command.
For details, refer to Configuring Alarm and Event Properties.
11.3 Syslog
ETX-1 uses the Syslog protocol to generate and transport event notification
messages over IP networks to Syslog servers. The Syslog operation is compliant
with the RFC 3164 requirements.
Parameter Description
11.4 Troubleshooting
This section contains a general troubleshooting chart that lists possible failures
and provides workarounds.
Troubleshooting Chart
Use this chart to identify the cause of a problem that may arise during operation.
For detailed description of the LED indicators functions, refer to Chapter 3.
To correct the reported problem, perform the suggested corrective actions. If a
problem cannot be resolved by performing the suggested action, please contact
your RAD distributor.
The unit is dead No power Verify that both ends of the power cable are properly
(POWER LED is off) connected.
Blown fuse Disconnect the power cable from both ends and replace
the fuse with another fuse of proper rating.
The event log reports a View the inventory file by entering show inventory at
fan or power supply the config>system prompt.
error. Restart the unit.
In case of failure, replace the entire unit.
The unit is unreachable Incorrect Using a local serial connection, enable the relevant
management management access type by entering telnet, snmp,
settings and/or ssh at the config>mngmnt>access prompt.
View the list of enabled management access types and
settings by entering info detail at the config>mngmnt
prompt
Verify that a router interface has been configured with
management access set to allow all, assigned an IP
address, and bound to an administratively enabled SVI.
Verify that management flows have been set up
to/from the SVI, and that the flows are enabled
Verify that the default gateway is configured in the
router.
Ethernet LINK LED Ethernet cable Check the Ethernet cable to see whether a cross or
is off problem straight cable is needed
Check/replace Ethernet cable
Verify that the range is within the limits
Check the port by connecting the remote end of the
cable to a different switch
Send the unit for repair.
To ping an IP host:
1. In any level, start pinging the desired host specifying its IP address, optionally
the number of packets to send and the size of the payload in bytes:
ping <ip-address> [number-of-packets <packets>] [payload-size <bytes]
Allowed value: ip-address - 1.1.1.1255.255.255.255
packets 1-10000
bytes - 32-1450
To trace a route:
In any level, start the trace route and specify the IP address of the host to
which you intend to trace route:
trace-route <ipaddress>
Allowed value: ip-address - 1.1.1.1255.255.255.255
12.2 Impact
ETX-1 resets automatically after the software upgrade, resulting in up to
two minutes of downtime.
Upgrading to a new version does not affect any user settings after saving the
user settings.
12.3 Prerequisites
Before starting the upgrade, verify that you have the following:
For upgrade via SFTP/FTP/TFTP:
Operational ETX-1 unit with valid IP parameters configured
Connection to a PC with an SFTP/FTP/TFTP server application and a valid IP
address
Software image file stored on the PC. The image file (and exact name)
can be obtained from the local RAD business partner from whom the
device was purchased.
ETX-1
ETX-1
Use the following procedure to download new release to ETX-1 via CLI.
1. Verify that the image file is stored on the PC with the SFTP/TFTP server
application.
2. Verify that the ETX-1 router has been configured with valid IP parameters.
3. Ping the PC to verify the connection.
4. Activate the SFTP/TFTP server application.
5. Download the image file from the PC to ETX-1.
Pinging the PC
Check the integrity of the communication link between ETX-1 and the PC by
pinging the PC from ETX-1.
12-2 Upgrading the Device Software via CLI ETX-1 Ver. 1.2
Installation and Operation Manual Chapter 12 Software Upgrade
Note Choose an index that is not being used by the active software or by a software
pack that you do not want to overwrite.
ETX-1 Ver. 1.2 Upgrading the Device Software via CLI 12-3
Chapter 12 Software Upgrade Installation and Operation Manual
Installing Software
After software is downloaded to ETX-1, it must be installed via the install
command as the active software. When you install software, ETX-1 by default
creates a restore point, so that you can perform a rollback to the previous
software pack if there is a problem with the new software pack.
Note The file startup-config must exist before you can install software with creation of
a restore point.
The next time ETX-1 reboots and loads new software, it starts a confirmation
timer. The next procedure has more details on the confirmation.
Note If startup-config does not exist, you must install the software pack without
creating a restore point.
Note While the confirmation timer is running, ETX-1 does not allow any commands that
change its configuration.
12-4 Upgrading the Device Software via CLI ETX-1 Ver. 1.2
Installation and Operation Manual Chapter 12 Software Upgrade
Caution The Boot menu procedures are recommended for use only by authorized
personnel, because this menu has many additional options that are intended for
use only by technical support personnel.
The following software downloading options are available from the Boot menu:
Downloading using the XMODEM protocol. This is usually performed by
downloading from a PC directly connected to the CONTROL DCE port of the
unit.
ETX-1
ETX-1
ETX-1 Ver. 1.2 Upgrading the Device Software via the Boot Menu 12-5
Chapter 12 Software Upgrade Installation and Operation Manual
Note If you miss the timing, ETX-1 performs a regular reboot process (this process
starts with Loading and ends with the login screen).
System Boot
12-6 Upgrading the Device Software via the Boot Menu ETX-1 Ver. 1.2
Installation and Operation Manual Chapter 12 Software Upgrade
[boot]: ?
Commands:
?/help - print this list
p - print boot parameters
c [param] - change boot parameter(s)
v - print boot logo with versions information
run - load active sw pack and execute
delete <FileName> - delete a file
dir - show list of files
show <index> - show sw pack info
download <index> [,<FileName|x>] - download a sw pack to specific index (x -
by Xmodem)
set-active <index> - Set a sw pack index to be the active
application
control-x/reset - reboot/reset
Figure 12-4. Displaying Boot Commands
Note Choose an index that is not being used by the active software, or by a software
pack that you do not want to overwrite.
ETX-1 Ver. 1.2 Upgrading the Device Software via the Boot Menu 12-7
Chapter 12 Software Upgrade Installation and Operation Manual
Using FTP
Use the following procedure to download new release to ETX-1 via FTP.
Note Choose an index that is not being used by a software pack that you do not want
to overwrite.
If no errors are detected, the downloading process starts, and the file is
downloaded via FTP.
3. Refer to Activating Software for instructions on activating the downloaded
software.
Using TFTP
Use the following procedure to download new release to ETX-1 via TFTP.
Note Choose an index that is not being used by a software pack that you do not want
to overwrite.
If no errors are detected, the downloading process starts, and the file is
downloaded via TFTP.
3. Refer to Activating Software for instructions on activating the downloaded
software.
12-8 Upgrading the Device Software via the Boot Menu ETX-1 Ver. 1.2
Installation and Operation Manual Chapter 12 Software Upgrade
Activating Software
To activate a software pack, you need to designate it as active and load it.
Site B Site A
ETX-1 ETX-1
192.168.100.56 192.168.100.57
Host Host
PC Server
192.168.100.99
4. ETX-1 boots up. When the startup process is completed, you are prompted to
press <ENTER> to receive the login prompt.
5. Enter the user name for Super User and the associated password. The default
user name is su and the default password is 1234.
6. The device prompt appears:
ETX-1#
You can now type the necessary CLI commands.
Configuring SVI
SVI 1 must be administratively enabled in order to administratively enable the
corresponding flows and router interface.
Configuring Router
The router must be configured with the router interface 1 that is bound to the
SVI 1 used for the management flows, and assigned the IP address
192.168.100.57 with mask 255.255.255.0.
Enter the following commands:
configure router 1
interface 1
bind svi 1
address 192.168.100.57/24
no shutdown
exit all
Saving Configuration
Type save in any level to save your configuration.
Saving Configuration
Type save in any level to save your configuration.
Configuring SVI
SVI 1 must be administratively enabled in order to administratively enable the
corresponding flows and router interface.
Configuring Router
The router must be configured with the router interface 1 that is bound to the
SVI 1 used for the management flows, and assigned the IP address
192.168.100.56 with mask 255.255.255.0.
Saving Configuration
Type save in any level to save your configuration.
Saving Configuration
Type save in any level to save your configuration.
User
Equipment
Management Host IP
192.168.100.3
ETX-1 (D)
Management Host IP
192.168.100.5
GbE1-East Port
User GbE2-West Port
Equipment
Equipment List
The following equipment is required to set up a typical ring application:
Four ETX-1 units
PC
Four straight Ethernet cables with RJ-45 connectors.
Ring Link
ETX-1 (A) 2 1
(RPL owner RPL port: Net1)
ETX-1 (D)
Ring Protection Link
(RPL)
2 1
ETX-1 (B)
Ring Link
2 1
Ring Link
ETX-1 (C)
Net1-East Port
Net2-West Port 2 1
Configuration Sequence
The following configuration steps are needed when deploying the ETX-1 units in a
ring topology:
1. Configuring the management flow
2. Configuring bridge port
3. Defining the VLAN
4. Configuring ERP parameters and enabling the ring functionality
Configuring VLAN
Create VLAN 4 for management flows and VLAN 12 for bridge traffic.
config bridge 1 vlan 12
tagged-egress 3..6
exit
vlan 4
exit all
Note R-APS settings must be the same for other Ring nodes.
Only one port can be configured as RPL owner in the Ring.
1 A+ B+
2 A- B-
3 B+ A+
4 C+ D+
5 C- D-
6 B- A-
7 D+ C+
8 D- C-
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail [email protected]
www.rad.com