Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
What’s inside...
New in this release and documentation roadmap
Data communications planning
Comms setting management procedures for D-Series and S-Series
Comms setting management procedures for T-Series
Contents 0
6500 network element (NE) IPv6 supported protocols and applications 1-71
6500 network element (NE) IPv6 comms feature support and GNE support 1-73
Data communications with shelf processor/control and timing module (CTM)
redundancy 1-74
Data communications support with shelf processor/CTM redundancy 1-74
COLAN alarms with SP/CTM redundancy 1-75
Craft communications 1-75
IPv4 external DCN connectivity 1-78
General DCN network design considerations 1-78
Best practices 1-78
Internal Communications Requirements 1-79
Address Resolution (AR) and Topology Resolution (TR) 1-79
Wavelength re-routing 1-80
DCN design for manual wavelength re-routing during failures 1-80
COLAN use for external DCN connectivity 1-82
Stretched spans 1-82
Stretched spans with SLDD/IISIS 1-83
IPv4 external DCN connectivity—Public IP address model 1-84
IPv4 external DCN connectivity—Private-IP address model 1-85
RADIUS gateway 1-87
Reverse Port NAT 1-87
TL1 Gateway 1-89
TIDc member shelf GNE support 1-91
IPv6 external DCN connectivity 1-96
GNE configurations 1-96
General DCN provisioning rules 1-97
IPv4 route redistribution and summarization 1-98
IPv6 route redistribution 1-100
Provisioning the DCN parameters 1-102
IPv6 planning and provisioning guidelines 1-105
TID consolidation (TIDc) 1-107
Comms within a consolidated node 1-108
Gateway Network Element (GNE) for a consolidated node 1-108
Consolidated node engineering guidelines 1-109
OSC for shelf interconnect (TIDc over OSC) 1-114
SONET/SDH, OTN, and Photonic Control Plane considerations 1-115
In-band communications for SONET/SDH Control Plane 1-115
In-band communications for OTN Control Plane 1-116
Photonic Control Plane data communications 1-116
PKT/OTN cross-connect circuit pack and CTM communications
considerations 1-119
Redundant OSPF configuration with multiple OSPF areas (Photonics only) 1-121
Opaque LSAs 1-130
OSPF Opaque Link State Advertisement parameter 1-130
DCN scalability and opaque LSAs 1-131
Opaque LSA engineering guidelines 1-131
Database Replication Service (DBRS) (D-Series/S-Series shelf IPv4 only) 1-132
OSPF Opaque LSA flooding Control (OOLFC, IPv4 only) 1-137
Site-Level Data Distribution (SLDD) 1-142
Service and Photonic layer interoperability (SPLI) 1-146
List of procedures
3-1 Retrieving communications settings 3-6
3-2 Editing the communications settings 3-7
3-3 Editing the Site Level Data Distribution 3-9
3-4 Migrating an MD5 key 3-11
3-5 Adding a new entry in the communications settings 3-12
3-6 Deleting an entry in the communications settings 3-14
3-7 Using the 6500 CLI ping and trace commands 3-16
Communications management parameters 3-21
Comms Setting Management options 3-21
Routers tab 3-24
Interfaces tab 3-49
Services tab 3-66
Issue 1
The following section details what’s new in 6500 Data Communications
Planning and User Guide, 323-1851-101, Standard Issue 1 for Release 12.6.
Supporting WaveLogic Photonics 6500 Data 6500 Control Plane Submarine Networking
Documentation Coherent Select Application Guide Application Guide Application Guide
(323-1851-980) (NTRN15BA) (NTRN71AA) (NTRN72AA)
6500 Photonic Common 6500 - 5400 / 8700 Fiber Node Return 6500 AC Rectifier
Layer Guide Photonic Layer Interworking Solution Configuration (323-1851-900)
(NTRN15DA) Technical Publications (323-1851-160) (323-1851-985)
Overview
This chapter provides an overview of 6500 Packet-Optical Platform (6500)
network data communications. Table 1-1 on page 1-2 lists the topics covered
in this chapter.
For related procedure and parameter information for T-Series shelves, refer to
Chapter 3, “Comms setting management procedures for T-Series”.
6500 Release 11.0 introduced the T-Series shelf. 6500 Release 11.1
introduced IP version 6 (IPv6). Where certain features/functions/support of
IPv6 and 6500 T-Series diverge from IPv4 and D-Series/S-Series shelves,
these are noted. For more information on T-Series datacomms, refer to the
“Datacomms” chapter in the T-Series Packet-Optical Shelf - Guide,
323-1851-103.
Table 1-1
Topics in this document
Topic
“6500 network element (NE) IPv6 supported protocols and applications” on page 1-71
“Data communications with shelf processor/control and timing module (CTM) redundancy” on page 1-74
“IPv4 external DCN connectivity” on page 1-78
“Redundant OSPF configuration with multiple OSPF areas (Photonics only)” on page 1-121
Table 1-1
Topics in this document (continued)
Topic
“Encryption OTR key management communications (does not apply to T-Series shelves)” on
page 1-393
“Preserving comms data when saving and restoring provisioning data” on page 1-421
ID Identifier
IP Internet protocol
MS Multiplex section
OSPFv2 Open shortest path first, version 2 (refers to OSPF for IPv4)
OSPFv3 Open shortest path first, version 3 (refers to OSPF for IPv6)
OTM Optical transport module
PC Personal computer
RS Regenerator section
SP Shelf processor
Note that in certain Photonic configurations the inter-shelf local area network
(ILAN) ports can be used to connect to the Customer DCN.
Figure 1-1
6500 OAM data communication interfaces for D-Series/S-Series shelves
Craft RS232
(LAN 15 &16) DTE
10/100BT Modem
COLAN A
10/100BT
Carrier SONET SDCC/LDCC
Access SDH RS/MS Embedded
DCN 6500 G.709 GCC0/1 DCC/GCC/OSC
Network Element OSC Remote
COLAN X Access
10/100BT
PPP/LAPD
Embedded Customer
DCN Site Traffi c
Interconnect
Used between
shelves at a site
Used for 10BT
customer traffic
between sites
Figure 1-2
6500 OAM communications architecture for T-Series shelves
COLAN A Point-to-point
100/1000BT protocol
Carrier Embedded
Access COLAN X DCN Remote
DCN 100/1000BT 6500 Access
Network Element GCCx/OSC
Used between
Used for external Wayside sites
DCN access Used for 10/100BT
customer traffic
6 ILAN ports (10/100/1000BT) between sites
ILAN-IN1/2/3, ILAN-OUT1/2/3
Used between
shelves at a site Embedded DCN Site Customer Traffic
Interconnect
LAN ports
The 6500 shelf supports the following Ethernet ports:
• COLAN-X
— This is the port used to connect to the external DCN in most cases. In
dual SP/CTM configurations, it is automatically switched in hardware
to the active SP/CTM. In some cases, if available, this port can also be
used for inter-shelf communications, similar to an ILAN.
• COLAN-A
— This port can also be used to connect to the external DCN. However,
since it offers a reduced set of functionality versus COLAN-X,
COLAN-X is the preferred port for DCN connectivity. On 6500-7
packet-optical, 32-slot, and T-Series shelves, COLAN-A is
automatically switched in hardware to the active SP/CTM. On 14-slot
shelves, if the SP in slot 16 is active, the connection from COLAN-A is
tunneled through the SP in slot 15, and therefore requires the slot 15
SP to be present. Connectivity to COLAN-A can also be disrupted
temporarily on SP switch-overs or if SP-15 restarts.
— If some cases, if available, this port may also be used for inter-shelf
communications, similar to an ILAN.
• ILAN-IN and ILAN-OUT (for D-Series/S-Series shelves); and
ILAN-IN1/2/3 and ILAN-OUT1/2/3 (T-Series shelves)
— These ports are used to interconnect collocated shelves. In some
special cases, ILAN may also be used to connect to the external DCN.
In dual SP/CTM configurations, ILANs are automatically switched in
hardware to the active SP/CTM.
ILAN-IN is not supported on the 2-slot shelf (NTK503MAE5 and
NTK503NAE5 variants), and is not supported on the 2-slot Type 2 shelf when
equipped with an SPAP circuit pack (NTK555LA). Use COLAN-X in its place.
— Throughout this document, where references to ILAN-IN/OUT exist,
note that they apply equally to ILAN-IN1/IN2/IN3/OUT1/OUT2/OUT3
on T-Series shelves.
• Craft port
— Located on each SP/CTM faceplate, this port provides access to the
local shelf, and if craft reach-through is provisioned, to other shelves
in the network. Although the craft port is functional on both active and
inactive SP/CTM, the craft port on the inactive SP/CTM is for Ciena
debug access only.
Table 1-2 on page 1-10 summarizes the LAN ports supported on the 6500.
Table 1-2
Supported LAN and physical interface ports
LAN port Shelf
• ILAN-1N3 (MDI)
Table 1-2
Supported LAN and physical interface ports (continued)
Table 1-2
Supported LAN and physical interface ports (continued)
Note 1: Only supported on 2-slot Type 2 shelf if an SPAP-2 w/2xOSC is equipped in slot 15.
Note 2: Supported as a virtual interface for shelf processor in slot 16 if the respective shelf processor
in slot 15 is available to perform tunneling.
Note 3: On the 2-slot shelf (NTK503MAE5 and NTK503NAE5 variants), where ILAN-IN is not
supported, COLAN-X can be used in place of ILAN-IN.
Note 4: Supported in the 7 -slot shelf NTK503PAE5 variant when equipped with an SP-2 shelf
processor circuit pack. Not supported in the 7-slot optical Type 2 shelf (NTK503KA).
Note 5: Supported when the shelf is equipped with an SP-2 circuit pack.
Note 6: Use of the 100BT setting on RLA modules (T-Series shelf only), SRA, SAM, ESAM, 2xOSC,
and SPAP-2 w/2xOSC circuit packs requires use of traffic policing to limit the rate to 40 Mb/s. Refer to
“Wayside channel (WSC) interface” on page 1-31.
Note 7: The Ethernet Wayside port on T-Series shelves support 10/100BT, half-/full-duplex.
The 10/100BT ports support both Ethernet 2 (IP) and IEEE Std 802.3 (OSI).
Each LAN port is configurable as half-duplex 10 Mbit/s, half-duplex 100 Mbit/s,
full-duplex 10 Mbit/s, full-duplex 100 Mbit/s, or Automatic. If you set the
configuration to Automatic, auto-negotiation is enabled. Auto-negotiation
automatically senses the speed (10BT/100BT) and mode (half-/full-duplex)
settings of the link.
The 100/1000BT ports support both Ethernet 2 (IP) and IEEE Std 802.3 (OSI).
Each LAN port is configurable as full-duplex 100 Mbit/s, full-duplex 1000
Mbit/s, or Automatic. If you set the configuration to Automatic,
auto-negotiation is enabled. Auto-negotiation automatically senses the speed
(100BT/1000BT) settings of the link.
If the configuration is set to Automatic, the LAN ports, including Wayside ports,
automatically detect the correct MDI/MDI-X setting to use, so either straight or
crossover cables can be used. If the configuration is not set to Automatic, then
use a straight cable to connect MDI to MDI-X interface types, and a crossover
cable to connect MDI to MDI and MDI-X to MDI-X interface types.
Serial/RS-232 ports
The 6500 shelf supports the following RS-232 ports:
• an RS-232 DTE port located on the access panel intended for a
permanent modem connection. The DB9 RS-232 DTE port is a switched
interface. This interface is switched to the active SP/CTM automatically by
hardware. The 2-slot, 7-slot, and 6500-7 packet-optical shelves do not
have an DB9 RS-232 DTE access port.
ATTENTION
The 6500 32-slot shelf is equipped with two USB faceplate ports on the SP
instead of the DB9 RS-232 DCE port.
The serial/RS-232 parameters cannot be edited and are set to the default
settings.
The OSC and the wayside channel (WSC) have a combined total bandwidth
of 100 Mb/s in each direction. Therefore, WSC traffic reduces the available
bandwidth on the OSC up to certain limits (refer to “Wayside channel (WSC)
interface” on page 1-31 for details). If the wayside channel is used in a
particular network deployment, this should be taken into account when
engineering the number of devices subtended over OSC.
DCC/GCC interface
Communications between 6500 adjacent sites can be realized using
OCn/STMn section/regenerator section (RS) DCC or the line/multiplex section
(MS) DCC available on each OCn/STMn optical port. Communications
between 6500 adjacent sites can also be supported using the general
communication channel 0 (GCC0) and the general communication channel 1
(GCC1) interface available on each OTM1 (GCC0 only), OTM2, OTM3, OTM4,
or OTMC2 optical port (except on the 10G AM1/AM2 OTM2 optical port).
Each DCC interface can support either PPP (IP-based DCC datalink layer),
LAPD (OSI-based DCC datalink layer), or Transparent (HDLC-based DCC
datalink layer). Each GCC interface can support only PPP. The GCC interface
on the SuperMux (GFP-T and GFP-F variants) and 20G (2+8)xOC-n/STM-n
LO circuit packs also supports LAPD.
DCC transparency is not supported on the 40G and 100G interface circuit
packs. Transparency is not supported on GCC interfaces.
For more information about DCC Transparency, see “6500 DCC transparency”
on page 1-330.
Facilities on which the OTN Control Plane is enabled are required to have the
GCC1 or GCC2 allocated for Control Plane communications. If GCC1 is used
by the OTN Control Plane, then GCC2 cannot be used for OAM
communications. If OAM communications is required, then GCC0 or GCC1
should be used for OAM and GCC2 should be used for the OTN Control Plane.
Refer to “Lower layer GCC implementation rules” on page 1-21, and to the
Control Plane Application Guide, NTRN71AA, for more information.
ATTENTION
When using OSPF on the DCC/GCC channels, IS-to-IS Hello (IIH) topology
auto-discovery does not function across the DCC/GCC channels. IIH-based
auto-discovery does function across DCC/GCC channels when using IISIS.
ATTENTION
Ports 1 and 3 and ports 2 and 7 share the same Section/RS DCC
and Line/MS DCC, as both ports cannot be provisioned at the same
time.
• For 8xOC-n/STM-n circuit packs, Section/RS DCC and Line/MS DCC are
supported on all eight ports.
For additional details, refer to Table 2-34 on page 2-85 and Table 3-24 on
page 3-59.
The supported options for the different network element types are as follows:
• 6500
— Supported Carriers: section/RS, line/MS
— L2 frame size: 512 to 1492 (default 1304) (for LAPD only)
— L2 side role: automatic (default)
• OM 4000
The DCC supported is dependent on the circuit pack type, refer to the
OM 4000 documentation for details.
— L2 frame size: 512 (default, not configurable)
— L2 side role: automatic (default, not configurable)
• OM 3000
— L2 frame size: 512 to 1492 (default 1304)
— L2 side role: network, user, or automatic
• Optical Cross Connect HDX/HDXc
The DCC supported is dependent on the circuit pack type, refer to the
Optical Cross Connect HDX/HDXs documentation for details.
— L2 frame size: 512 to 1492 (default 1304)
— L2 side role: network, user, or automatic (default)
• Optical Cross Connect DX
The DCC supported is dependent on the circuit pack type, refer to the
Optical Cross Connect DX documentation for details.
— L2 frame size: 512 to 1492 (default 1304)
• 6110 (supported using IISIS/OSPF routing)
— Two DCCs needs to be provisioned (working and protection), one per
optical port: section/RS, line/MS, or off (default)
— L2 frame size (PPP protocol): MTU size 240 to 1518 (default 1510 - IP
level, 1518 - PPP level)
— L2 protocol PPP: Standard PPP, RFC1661/PPP (default), or HDLC
Framing
— L2 side role: automatic (default, cannot be changed)
Table 1-3
GCC support
Table 1-3
GCC support (continued)
(1+8)xOTN Flex OTM1 and OTM2 line OTM1 and OTM2 line
MOTR facilities facilities
Table 1-3
GCC support (continued)
Table 1-3
GCC support (continued)
40G OTN XCIF OTUTTP associated If used for MCN, FTTP facility FTTP facility
with the mated pair supported on ODUTTP
(40G OCLD or or ODUCTP facility
40G OCI)
Table 1-3
GCC support (continued)
100G PKT/OTN OTUTTP associated If used for MCN, FTTP facility FTTP facility
XCIF with the mated pair supported on ODUTTP
(100G OCLD or OCI) or ODUCTP facility
10x10G OTU2 OTUTTP facility ODU2 OTUTTP facility OTUTTP
PKT/OTN I/F on ports 1 to 10 ODUTTP/ODUCTP on ports 1 to 10 facility on
facility on ports 1 to 10 ports 1 to 10
Table 1-3
GCC support (continued)
20x10G SFP+ I/F OTU2 OTUTTP ports 1 ODU2 OTUTTP ports OTUTTP
module to 20 ODUTTP/ODUCTP 1 to 20 ports 1 to 20
ports 1 to 20
2x100G CFP2 I/F OTU4 OTUTTP ports 1 ODU4 OTUTTP ports OTUTTP
module and 2 ODUTTP/ODUCTP 1 and 2 ports 1 and 2
ports 1 and 2
2x100G WL3n I/F OTU4 OTUTTP ports 1 ODU4 OTUTTP ports OTUTTP
module and 2 ODUTTP/ODUCTP 1 and 2 ports 1 and 2
ports 1 and 2
40x10G SFP+ I/F OTU2 OTUTTP ports 1 ODU2 OTUTTP ports OTUTTP
to 40 ODUTTP/ODUCTP 1 to 40 ports 1 to 40
ports 1 to 40
Table 1-3
GCC support (continued)
5x100G/12x40G • OTU4 OTUTTP ports • ODU4 ODUTTP ports OTUTTP ports OTUTTP
I/F 2,3, 7,8 and 12 2,3, 7,8 and 12 1 to 12 ports 1 to 12
• OTU3 OTUTTP ports • ODU3 ODUTTP ports 1
1 to 12 to 12
Note 1: When encryption mode is 'segregated', used to access encryption cards on remote shelves.
Up to 4 GCC2 supported per card.
Note 2: Either GCC0 or GCC1 may be provisioned, but not both.
The following rules must be observed when implementing lower layer GCC:
• The following facilities and equipment support the GCC0 transparency,
where the GCC0 bytes in the OTU2 overhead are passed transparently
through the equipment when the OTU Overhead on-Terminating setting
includes GCC0:
— OTM2 facilities on 2x10G OTR, 4x10G OTR, 40G MUX OCI, 10x10G
MUX, and 100G WL3n MOTR, with the exception of OTM2 mapping
layer facilities.
• The Auto GCC0 Provisioning parameter in the Site Manager Node
Information application System sub-tab (or ED-SYS TL-1 command and
the GCC0 MODE parameter) defines whether a GCC0 PPP circuit (with
IP address of 0.0.0.0) and an associated IISIS or OSPF circuit are
automatically created when the OTM1/OTM2/OTM3/OTM4/OTMC2/OTM
facility is provisioned. By default, the Auto GCC0 Provisioning parameter
is set to Disabled. The 20G (2+8)xOC-n/STM-n LO and SuperMux circuit
packs do not autoprovision GCC0.
For additional details, refer to Table 2-34 on page 2-85 and Table 3-24 on
page 3-59.
Facilities on which the OTN Control Plane is enabled are required to have the
GCC1 or GCC2 allocated for Control Plane communications. The GCC
channel requires the following parameters:
• Carrier = GCC1 or GCC2
• Network domain = OTNCP
Table 1-4 on page 1-29 shows the supported comms channels on the
SuperMux (GFP-T and GFP-F variants) circuit packs.
Table 1-4
Supported comms channels on the SuperMux circuit packs
GCC0 1 No Yes, up to 1
GCC1 1 No Yes
GCC2 0 No No
Table 1-5 on page 1-29 shows the supported channel configurations on the
SuperMux circuit packs.
Table 1-5
Supported channel configurations on the SuperMux circuit packs
Table 1-6 on page 1-30 shows the supported channel configurations on the
20G (2+8)xOC-n/STM-n LO circuit packs.
Table 1-6
Supported datacomm channels on the MRO circuit packs
Circuit pack Comms Max number Ports
channel supported
You must observe the following rules when you add manual area addresses:
• You must have at least one manual area address, you cannot delete a
manual area address if it is the only one in the list.
• The default manual area address is 490000.
• Up to three manual area addresses can be provisioned.
• If a new manual area address is provisioned, it is recommended that the
default manual area address of 490000 is deleted if not required.
Table 1-7 on page 1-31 shows the WSC-to-OSC port associations used for
Ethernet connectivity.
Table 1-7
WSC-to-OSC port associations for Ethernet connectivity
One important characteristic of these flows is that they enter the system
through one wayside port and exit the system through another wayside port.
They are not allowed to terminate at any element within the system. Wayside
ports can be bridged externally through an Ethernet cable to maintain wayside
connectivity between OSC facing directions. Pass-through packets that are
virtual local area network (VLAN) tagged in the following range: 256-4094 are
supported on the wayside channel.
The OSC and the wayside channel (WSC) have a combined total bandwidth
of 100Mb/s in each direction. Therefore WSC traffic reduces the available
bandwidth on the OSC up to certain limits as described in the following
paragraphs.
In 6500 releases prior to Release 7.0, the wayside channel ports can be set
to 10Base-T (Half or Full duplex). That is, wayside traffic over OSC is limited
to 10Mb/s. 10Base-T is the recommended setting for most network
applications as it reserves most of the bandwidth of the OSC for optical control
and OAM messaging.
In Release 7.0 and later, the wayside channel ports can also be set to
Full duplex 100BT, Half duplex 100BT, or Automatic (in the Site Manager
Comms Setting Management application Interfaces tab, Interface type
LAN). The default setting is Full Duplex 10Base-T for D-Series/S-Series
shelves. The default setting is Automatic for T-Series shelves.
Auto-negotiation automatically senses the speed (10BT/100BT) and mode
(half-/full-duplex) settings of the link. If the configuration is set to Automatic,
the Wayside ports automatically detect the correct MDI/MDI-X setting to use,
so either straight or crossover cables can be used. If the configuration is not
set to automatic, then since the Wayside ports are MDI-X type use a straight
cable to connect to a MDI interface or a crossover cable to connect to a MDI-X
interface.
The Automatic and 100Base-T settings can only be used in conjunction with
traffic policing which ensures that a maximum of 40 Mb/s of data is sent over
the wayside channel. (Note that the rate may vary somewhat depending on
the packet frame size.) When the 6500 software detects the traffic rate
exceeds 40 Mb/s, wayside traffic is limited to avoid OSC link congestion. OSC
link congestion can cause packet delays, loss on the 6500 internal traffic and
network management traffic, OSC comms loss, failure of optical control (DOC
adjacency failure alarms), and loss of association on network management
systems. To avoid wayside channel limiting, it is recommended to control the
traffic at the traffic sources. This can be done by setting up external traffic
management policies on the routers that are connected to wayside ports. The
traffic management policies need to set the limit of the wayside traffic to be
lower than 40 Mb/s. 6500 automatically terminates the wayside channel
squelching and traffic resumes when it detects that the wayside channel traffic
rate is lower than 40 Mb/s.
The wayside access ports on the RLA modules (T-Series shelf only), SRA,
SAM, ESAM, 2xOSC, and SPAP-2 w/2xOSC circuit packs for customer use
(IP over 10/100Base-T Ethernet data communications for unspecified use by
the customer) are provided by two 10/100Base-T ports (RJ-45 MDI-X
connectors). The wayside access ports are referred to as WSC ports.
Figure 1-3
Photonic system Ethernet wayside port usage example
WSC4 WSC3
WSC3 WSC4
Subtending L2
or L3 device Photonic
Layer
L1/L2 Service and other L0 circuit packs
are not shown.
WSC4 is unused in this example.
Terminal Site
Wayside (WSC) ports are MDI-X.
Legend
Type of cable dependent on subtending Ethernet port type
Cross-over cable
Figure 1-4
Generic VoIP based orderwire solution
Wayside Wayside
ports ports
The submarine wayside channel is associated with the ODUTTP facility on the
line-side port of WLAi MOTR/WLAi FOTR circuit packs. It passes
transparently through regen sites, since it operates in the ODU layer.
Figure 1-5
Submarine wayside channel access example
Restrictions
If a LAN port is used for wayside access, it cannot be used for other purposes.
For information on IPv6, refer to “6500 network element (NE) IPv6 addressing”
on page 1-42. IP versions are enabled/disabled/edited using the options in the
IP Versions Configuration service type (Services tab). Refer to Procedure 2-3,
“Editing the IP Version”.
Single Public IP
Starting in 6500 Release 5.0, you can provision the shelf with only one IP
address. If the NE is a remote NE (in a GNE configuration) then this IP
address is provisioned as the SHELF IP address. If the NE is a GNE, then this
IP address is provisioned as the SHELF IP address (with netmask of
255.255.255.255) and as the COLAN-X IP address (with appropriate
netmask).
— if the network element connects to the DCN using OSPF and the Craft
IP addresses are from a Private-IP address range, Private-IP
addresses can be advertised to the DCN. To avoid this, you can:
– filter out the Private-IP addresses at the gateway router level
– use public IP addresses
– use IISIS as the internal routing protocol and configure the route
redistribution so the Craft Private-IP addresses are not advertised
to the DCN
If the ILAN ports are provisioned with Private-IP addresses in a dual GNE
using proxy ARP/NAT configuration (refer to “DCN example 9—6500 GNE
configuration - redundant NAT GNE configuration” on page 1-215):
— the ILAN IP addresses must be included in the proxy ARP entries (only
the actual IP address assigned, not the whole ILAN subnet range)
— the NAT tables must include entries which map the ILAN IP addresses
to the allocated network element public IP address. The Prime
parameter for the ILAN entries must be set to No.
— When connecting to a collocated OSI device, an IP address is not
required. However, an IP address (un-numbered or numbered) is
required before an IISIS circuit can be provisioned on the port.
• When using OSPF on the ILAN ports to connect to collocated 6500
network elements or collocated CPL network elements, a ring connection
of the ILAN ports is recommended.
• ILAN can also be used to connect the NE to the external DCN network in
certain configurations.
• Opaque LSAs are enabled by default on ILAN ports. They can be disabled
if required for specific configurations (for example, if the ILAN is used to
connect the NE to the external DCN network).
• Opaque LSAs are disabled by default on COLAN ports. They can be
enabled if required for specific configurations.
• Opaque LSAs are required for Photonic applications (for example, DOC)
and for TID Consolidation shelf discovery.
IP address notation
IPv6 addresses use the following notation:
• IPv6 addresses are represented as eight groups of four hexadecimal
digits, sometimes referred to as ‘hextets’, with the groups separated by
colons (for example, 2001:11b:d068:0042:0000:6a32:3b1c:0092).
• The hex numbers are not case sensitive. For example, ‘d06a’ is equivalent
to ‘D06A’.
• Subnets are indicated using prefix notation, similar to IPv4 CIDR notation.
For example, 2001:11b:d068::/48 indicates there are 48 network bits and
80 host bits.
• Addresses can be abbreviated:
— Leading zeros can be omitted (for example, in a given hextet, ‘0’ is
equivalent to ‘0000’).
— Trailing zeros cannot be omitted (for example, in a given hextet, ‘17’ is
not equivalent to ‘1700’).
— A contiguous block of zeros can be represented by ‘::’ (double colon).
For example, 2001:0db8:0000:130f:0000:0000:087c:140b is
abbreviated as 2001:0db8:0:130f::87c:140b.
— ‘::’ (double colon) can only appear once in a given address.
— An all-zeros address is represented by ‘::’ (double colon).
6500 implementation
6500 supports a dual-stack implementation, meaning IPv4 and IPv6 operate
independently. This has the following implications:
• IPv4 and IPv6 have no direct interaction with each other.
• Provisioning of the protocols is completely independent. This includes the
IP address itself, the GNE configuration and routing protocols (for
example, the IPv4 GNE configuration could be Private-IP and the IPv6
GNE configuration could be OSPF.)
• One or both protocols can operate at any given time. IPv6 is disabled by
default, but can be enabled concurrently with IPv4 or instead of IPv4.
• A given interface can be provisioned with an IPv4 address, an IPv6
address, or both.
Figure 1-6
6500 dual stack
Addressing
6500 supports end-to-end visibility of all shelves by requiring all shelves to be
assigned a DCN-routable IPv6 address. There is no support for any network
address translation (NAT) models.
As per IPv4, 6500 supports a ‘single shelf IP’ mode where the COLAN and
shelf IP can be assigned the same IPv6 address in order to simplify
assignment and tracking of addresses. This is supported in a ‘DCN drop’
configuration (all shelves directly connected to DCN) and ND Proxy
configuration.
As per IPv6 standards, link-local IPv6 addresses are assigned to all interfaces
automatically. In Site Manager, link-local addresses are not displayed with the
routable IPv6 addresses but are retrievable in a specific ‘link local’ screen
found under the 'services' tab of the Comms Setting Management application
in Site Manager.
The shelf loopback interface is always /128, just as in IPv4 it is always /32
(255.255.255.255). The shelf loopback interfaces for all shelves in a given
network segment can be assigned from a common /64 subnet.
In keeping with best common practices for IPv6, it is recommended that LAN
interfaces are assigned a minimum /64 subnet.
For more information about the relationship between routing protocols refer to
“IPv4 route redistribution and summarization” on page 1-98.
IISIS can be used as the internal 6500 routing protocol and is available on all
interfaces except Auto-tunnel, OSC interfaces and the RS-232 ports. The
IISIS router allows the shelf processor to route messages across any LAN or
DCC/GCC port (except Auto-tunnel interfaces, OSC, and RS-232 ports).
• When adding a redistribution list for an IISIS router, you must set the
metric (cost) of any OSPF or static route distribution entries to between 1
and 63. For more information on Route redistribution, refer to “IPv4 route
redistribution and summarization” on page 1-98.
• The IISIS router requires an upper layer DCC MAA. The default MAA is
490000 and is autoprovisioned.
CAUTION
Configuring LAN ports
Unnumbered connections can only be used for point-to-point
links. IISIS is the only routing protocol that can be configured
to run over LAN ports without an IP address assigned.
ATTENTION
All Comms (for example, COLAN-X) Ethernet ports are auto-sensing.
Table 1-8 on page 1-47 shows the valid values of the NPSOVERRIDE
parameters for the supported interfaces types and layer-2 protocols.
Table 1-8
NPSOVERRIDE valid values
IP (IPONLY) X X X
Note 3 Note 3
OSIONLY ÷ ÷ ÷
LAN_OSIONLY ÷ X X
OFF ÷ ÷ X
Note 1: Site Manager value shown. Equivalent TL-1 value is shown in brackets for
cases where it differs from the value shown in Site Manager.
Note 2: X indicates that value is not allowed.
Note 3: Setting is not supported. May be set to this value but behaves as if
parameter was set to OFF.
Table 1-9
NPSOVERRIDE behavior
NPSOVERRIDE Description
(TL-1) Note
OFF IISIS functions normally on the interface, i.e. IISIS attempts to form both OSI and
IP adjacencies over the interface.
Note: Site Manager value shown. Equivalent TL-1 value is shown in brackets for cases where it differs
from the value shown in Site Manager.
• Use the circuit default metric parameter to represent the speed of the
circuit. Recommended settings are:
— COLAN and ILAN ports: 4
— SHELF IP: 4
— Line/MS DCC: 5
— GCC0/GCC1: 5
— Section/RS DCC: 6
These are the default settings.
• When provisioning an IISIS circuit on an ILAN, COLAN, or optical DCC
port (running LAPD) connected to OSI managed networks elements (for
example, OM 3000 and OM 4000), you must ensure that neighbor protocol
supported override parameter is set to OSI. For ILAN ports,
LAN_OSIONLY can be used for the neighbor protocol supported override
parameter.
• You must create an IISIS circuit on the SHELF IP.
• When provisioning an IISIS circuit on an ILAN or optical DCC/GCC port
(running PPP) connected to another 6500 network element, you must
ensure that neighbor protocol supported override parameter is set to Off.
• If the circuit packs interop with 6500 Photonic Layer or CPL line, set GCC0
Mode to DISABLED or OSPF.
• You can not provision an IISIS circuit for a Transparent DCC.
• You must delete the associated IP static route before deleting an IISIS
circuit or OSPF circuit
• Ensure that the non-routing mode is set to Off before adding IISIS circuits
to LAN ports.
• If both GCC0 and GCC1 comms channels are provisioned on the shelf
with IISIS circuits using Circuit Default Metric, GCC1 comms channel will
be preferred over the GCC0 comms channel.
CAUTION
Configuring LAN ports
Unnumbered connections can only be used for point-to-point
links.
ATTENTION
All Comms (for example, COLAN-X) Ethernet ports are auto-sensing.
— OTU3/ODU3 GCC: 19
— OTU4/ODU4 GCC: 12
ATTENTION
As the GCC is lower bandwidth than the OSC, it is important to set
the OSPF cost of the GCC channel to ensure that the OSC channel
is the preferred route in a homogeneous OSPF routing domain. Note
that the total OSPF route cost, for a given route between any two
NEs is the sum of the OSPF route cost for each intermediate hop in
that route.
ATTENTION
Use special care if provisioning OSPF circuits in the backbone area
(0.0.0.0), either through auto-provisioning or manual provisioning.
Creating a partitioned backbone can cause connectivity problems.
For example, if a backbone exists in the external DCN and a
backbone OSPF circuit is created in the 6500 internal network, some
NEs may become unreachable. In most cases, 6500 OSPF circuits
should be provisioned in non-backbone areas.
• The 6500 supports null, simple, and MD5 authentication types for OSPF
protocol exchanges. The authentication type is configurable on a
per-interface basis. All devices connected to a common subnet require the
same authentication settings for adjacencies to form. The supported
authentication types are described in “OSPF authentication” on
page 1-54.
• The following parameters are normally left at the default settings for most
network applications:
— Area default cost: 1 (default)
— Dead interval: 40 (default)
OSPF authentication
The following are the supported OSPF authentication types:
• Type 0: null authentication (default)—protocol exchanges are not
authenticated.
• Type 1: simple authentication—a simple alphanumeric password is used
for authentication. This “clear” password consists of 1 to 8 alphanumeric
characters (case sensitive) and special characters and is included in the
OSPF packet that is transmitted.
The SHELF IP address generally needs to be visible in each area the shelf
participates in, for applications such as OAM management, consolidated
nodes, and Domain Optical Control (DOC), for example. Since the SHELF IP
address interface can only participate in one OSPF area, this can necessitate
the addition of static routes and associated route redistributions in order to
provide the required IP visibility of this SHELF IP into each area. This can add
provisioning complexity and, further, since these static routes are associated
with a specific interface, if the interface goes down, the route may disappear
from the OSPF routing domain.
Configuration
Shelf IP redistribution can be enabled on a per-shelf basis using the Shelf IP
Redistribution parameter associated with the OSPF router instance. It is
disabled by default. Refer to Table 2-8 on page 2-45 to Table 2-11 on
page 2-52 for parameter details.
Engineering guidelines
This feature should only be used in configurations where there is no OSPF
backbone in the OSPF autonomous system.
Each shelf with the shelf IP redistribution feature enabled originates one
OSPF Type-5 LSA.
Figure 1-7
Example network: NEs in multiple non-backbone OSPF areas but no connection to OSPF
backbone
External DCN
Shelf1 Shelf2
SiteID 2
Shelf1 shelf IP visible in Areas A and B Shelf2 shelf IP visible in Areas B and C
Legend
COLAN-X
6500 ROADM shelf
COLAN-A
ILAN-IN
ATTENTION
Use special care if provisioning OSPF circuits in the backbone area
(0.0.0.0). Creating a partitioned backbone can cause connectivity
problems. For example, if a backbone exists in the external DCN and
a backbone OSPF circuit is created in the 6500 internal network,
some NEs may become unreachable. In most cases, 6500 OSPF
circuits should be provisioned in non-backbone areas.
Other protocols
IISIS for IPv6 is not supported.
Next-hop provisioning
For D-Series/S-Series shelves running IPv4, static routes may be defined as
follows:
• Specify interface and next-hop: This type of static route specifies both the
interface through which the next-hop is found and the IP address of the
next-hop itself. This method is used for numbered interfaces, such as
numbered LAN interfaces that are connected to broadcast networks. The
next-hop is part of the adjacent subnet in this case.
• Specify interface only: This type of static route specifies only the interface
through which the next-hop is found. This method is used for unnumbered
point-to-point interfaces, such as GCC/DCC/OSC and unnumbered LANs,
since there is only one device at the far-end of the link and it has no
interface IP address.
Beginning in Release 11.1 (for IPv6 and T-Series shelf), this additional method
may be used to specify a static route:
• Specify next-hop only: This type of static route specifies only the next-hop.
The interface is not specified and is determined through the forwarding
table, and therefore has the possible advantage of providing increased
resiliency to faults—if one path to the next-hop fails and another path
exists, the static route is still valid and usable. In this case, the next-hop
should not be part of an adjacent subnet. This method is sometimes
referred to as a ‘floating’ static route.
In IPv6, multiple static routes to the same destination are supported. In such
a case, the handling of the routes is as follows: the lowest cost route is used.
If multiple equal-cost routes exist, one is chosen and used.
For a T-Series shelf, multiple static routes to the same destination are
supported. In such a case, the handling of the routes is as follows: the lowest
cost route is used. If multiple equal-cost routes exist, since ECMP is
supported, the routes are shared.
In the public-IP model, the SNTP client on each 6500 node is typically
configured to synchronize with external SNTP servers.
The GNE synchronizes its own Time of Day via an external SNTP server on
the customer DCN.
Secure HTTP
The Secure HTTP service builds upon the standard HTTP server currently
available on the 6500. Integration of the Standard SSL library, FIPS compliant,
with the existing standard HTTP server provides the level of security needed
for the Secure HTTP service.
The 6500 supports both the standard HTTP server and the Secure HTTP
server. The Secure HTTP server runs on port 443.
ATTENTION
In Photonic networks, do not disable the standard HTTP or Secure HTTP
servers on NEs that were upgraded to 6500 Release 10.1 or higher until all
NEs have been upgraded to Release 10.1 or higher. Disabling HTTP servers
before all NEs are upgraded will affect DOC behavior.
Using Site Manager or TL-1 commands, you can perform the following:
• Enable/disable the standard and/or secure HTTP server
• Retrieve settings for both the standard and secure HTTP servers
• Force NE host key re-compute SSL and security certificate regeneration
• TL-1 commands also allow to retrieve SSL public key information
Only SSL certificate key size of 1024 is supported. Entering a key size of 512
will be rejected.
The standard and Secure HTTP servers allow Site Manager to retrieve the NE
SNMP MIBs from the MIB browser.
When you connect to the server with a fresh browser session (a session that
never connected to the server), a warning message appears indicating that
the certificate being sent from the server to the browser. You must accept this
certificate for the connection to be completed.
Note that when you connect to the server for the first time, the connection can
take up to one minute to complete. However, in Private-IP configuration, a
connection to the RNE with a fresh browser, can take more than one minute.
DHCP
6500 supports a dynamic host configuration protocol (DHCP) server on the
Craft Ethernet interface on the SP/CTM (LAN-15/16/41/42). The DHCP
server:
• eliminates the need for the Craft user to manually assign an IP address to
the Craft PC when it is connected to the Craft Ethernet port
• facilitates moving the craft PCs to a Craft port on a different network
element, without re-assigning an IP address to the craft PC
DHCP relay agent for Zero Touch Provisioning (not applicable to T-Series)
Zero Touch Provisioning (ZTP) is a feature that simplifies the initial
commissioning of a shelf from the perspective of the installer by allowing the
shelf to retrieve its provisioning information and subsequently provision itself
automatically. Depending on the requirements of a given customer’s
operations, the provisioning information can range from the minimal amount
required to make the shelf visible on the network (for example, basic shelf and
data comms provisioning) to a larger set of commands including equipment
and services provisioning. If the shelf receives the minimal amount of
provisioning information, the remainder of the provisioning can be performed
remotely via Site Manager or the network management system (NMS).
ZTP, the DHCP relay agent and DHCP relay agent interfaces are managed
using the Comms Setting Management application. For information on:
• equipment requirements and detailed procedures related to ZTP and the
DHCP relay agent, refer to Commissioning and Testing, 323-1851-221
• ZTP parameters refer to “Zero Touch Provisioning parameters” on
page 2-99
• DHCP relay agent parameters refer to “DHCP Relay Agent parameters”
on page 2-94
• DHCP relay agent interface parameters, refer to “DHCP RA Interfaces
parameters” on page 2-95
FTP
File transfer protocol (FTP) is a standard Internet protocol used for transferring
files across a network. This protocol uses a client/server architecture. Both an
FTP client and server are supported on the shelf processor/control and timing
module (CTM) of the 6500.
The FTP protocol is used on the 6500 platform to handle all file transfers within
the network element, between network elements, and between the network
element and the management system. The user can enable/disable the FTP
server and can configure the time before an idle FTP session is disconnected.
The FTP server has the following characteristics:
• disabled by default
• “put” only allowed to the “/loadmgmt/craft” directory
• only binary supported
PPP is not supported over the serial ports in the current release, therefore
FTP and HTTP over the serial ports is not supported. For FTP and HTTP
access (for example, when performing database backup and restore
operations), use the LAN ports. For information on SFTP, refer to “Secure shell
and SFTP” on page 1-64.
SSH and SFTP are employed to secure the network management traffic. SSH
client/server solutions provide secure replacements for Telnet, rlogin, FTP,
etc. SSH connections provide highly secure authentication, encryption, and
data integrity to combat password theft and other security threats.
6500 supports:
• SSH/SFTP authentication with a DSA key type and 512 or 1024 bit key
size
• SSH/SFTP authentication with a RSA key type and 1024, 2048 or 3072 bit
key size
• SSL certificates with an RSA key type (1024, 2048, and 3072 bit key size),
and SHA1 and SHA256 hash fingerprint type. RSA and ECDSA
certificates may be uploaded to replace the self signed certificates.
SSH/SFTP configuration
The SSH/SFTP client and server must each be enabled and configured in
each of the required applications/platforms prior to use.
ATTENTION
If both SSH and Telnet servers are enabled, the total maximum number of
SSH and Telnet sessions combined cannot exceed 21. For example, if SSH
is enabled with 16 maximum sessions, you cannot have more than five
enabled Telnet sessions. To increase the maximum number of Telnet
sessions, you must reduce the maximum number of SSH sessions.
SSH re-keying
When an SSH session is established, a secret key is negotiated to encrypt
communication between the client and server. The re-keying feature forces a
renegotiation of the session key after one hour of the session or 1 GB of data
transfer.
Table 1-10
SSH/SFTP port numbers
Note: The NE uses, in a sequential fashion, ports between 20004 and 20030 (for example, the first
session uses 20004, the second one 20005, and so on). The destination port defaults to 22, but you can
provision it to be anything between 1 and 65535, inclusive.
Table 1-11
SSH/SFTP encryption parameters
Encryption The encryption cipher indicates which • AES-128 (CBC) (Note 1, Note 3)
algorithm is used to encrypt the SSH • AES-192 (CBC) (Note 1, Note 3)
messages.
• AES-256 (CBC) (Note 1, Note 3)
• 3DES (Note 2)
• AES-128 (CTR) (Note 1, Note 4)
• AES-192 (CTR) (Note 1, Note 4)
• AES-256 (CTR) (Note 1, Note 4)
• 3DES
NETCONF
Release 12.6 adds support for the Network Configuration Protocol
(NETCONF), an XML-based network management protocol specification. You
can use NETCONF to install, manipulate, and delete network device
configurations, and to provision and activate network services.
NETCONF works with YANG modules (which define the configuration data,
state data, and the capabilities available on a 6500 node) to perform tasks on
a 6500.
To use the NETCONF server on 6500, the server must be enabled. The
NETCONF server is disabled by default. Use Site Manager or the
ED-NETCONF TL-1 command to enable or disable the NETCONF server.
PPP
Point-to-point protocol (PPP) is a data link layer protocol used to pass data
between two systems on behalf of the IP network layer protocol.
For 6500, only the magic number support PPP parameter can be edited
(default On), the remaining parameters are set to the default settings. For
details of the default settings, refer to Table 2-36 on page 2-87 and Table 3-26
on page 3-62.
PPP is not supported over the serial ports in the current release, therefore
FTP and HTTP over the serial ports is not supported. For FTP and HTTP
access (for example, when performing database backup and restore
operations), use the LAN ports.
Telnet
Telnet is a user command and an underlying TCP/IP protocol for accessing
remote computers. A Telnet client is supported on the shelf processor/control
and timing module (CTM) of the 6500 which allows login to other network
elements. The user can configure the maximum number of concurrent Telnet
sessions allowed and the time before an idle Telnet session is disconnected.
ATTENTION
The Telnet server can be disabled if the SSH server is enabled.
Only one OSI rlogin session can originate from the 6500 at a time.
OSI rlogin allows you to log in using Site Manager and TL-1 to the 6500 from
the OM 3000 platform. The rlogins connecting to the 6500 network element
count towards the maximum number of concurrent Telnet sessions.
The OSI rlogin is accessed from the CLI on the ports listed in Table 1-10 on
page 1-66 when breaking out from a TL-1 session.
You can use a OM 3500 Site Manager (in stand alone or consolidated craft
mode) connected to a 6500 network element to OSI rlogin to an OM 3500
network element to allow the OM 3500 network element to be managed using
Site Manager and not just TL-1 (requires the Requires Manual
Connection/Secure Modem at Gateway Node option to be selected on the
Login window).
GRE
Generic routing encapsulation (GRE) provides a standard method for
transporting one arbitrary network layer protocol over another arbitrary
network layer protocol (tunneling). A tunnel is effectively a point-to-point
connection which allows packets to be enclosed/encapsulated within another
packet.
ATTENTION
Auto-tunnels are dynamically created as needed. They are different from
GRE tunnels. There is no hard-coded limits on Auto-tunnels.
Exclusions
The following features and functions are not supported on 6500 with IPv6:
• RTRV-NODES: This impacts Site Manager ‘visible NE information’, Add
Node, and Find Node dialogs.
• Network-level duplicate address detection
• Access to Encryption OTR circuit packs
6500 network element (NE) IPv6 comms feature support and GNE
support
For IPv6, the following IPv6 comms features are supported:
• Static routing
• OSPFv3
• COLAN, ILAN, shelf, craft, DCC, GCC and OSC interfaces
• IPv6 static routes
• Firewall
On T-Series shelves, there is a generic 'LAN link failure alarm' used for all LAN
failures, including COLANs and ILANs, with the applicable interface specified
by the AID. The alarm is generated regardless of which CTM Is active.
Craft communications
Craft communications on the active SP/CTM and the standby SP/CTM (for
14-slot, 32-slot, and T-Series shelves with SP/CTM redundancy) work
independently.
When connecting a Craft PC to the craft port on the active SP/CTM, the PC
has access to the following functions:
• DHCP is available to assign IP address to the Craft PC
• Access to all TL-1 commands including Site Manager support
• Access to debug interface (Ciena personnel only)
• Craft reach-through capability
ATTENTION
Craft reach-through capability is only available on the active SP/CTM when
the IP address is changed from default to a unique IP address in the internal
network. The user must be authenticated on the local NE before
reach-through access is granted to other NEs.
When connecting a Craft PC to the craft port on the standby SP/CTM (for
14-slot, 32-slot, and T-Series shelves), the PC has access to limited functions:
• DHCP is available to assign IP address to the Craft PC
• Access to debug interface (Ciena personnel only)
The IPv4 DHCP on the LAN-15 and LAN-41 ports is defaulted as:
• Server state: ENABLED
• Server IP Address: 10.0.0.1
• Subnet Mask: 255.255.255.252
• IP Address for client: 10.0.0.2
• Server Pool End Address: 10.0.0.2
• Gateway IP Address: 10.0.0.1
• Default Lease Time: 600
• Maximum Lease Time: 7200
The IPv6 DHCP on the LAN-15 and LAN-41 ports is defaulted as:
• Server state: disabled
• Server IPv6 address: fd00:238a:6500:a::1/64
— If using non-default addresses, the user may specify only the upper 64
bits (that is, the /64 prefix). The least-significant 64 bits must be ::1.
The client address will always have the same upper 64 bits as the
server and have a least-significant 64 bits of ::2.
• Client IPv6 address: fd00:238a:6500:a::2/64
• Gateway IPv6 address (as seen by craft PC): the link-local address of the
LAN-15/41 port. This value is visible from within Site Manager Comms
Setting Management/Services/LinkLocal.
• Preferred lifetime: 600 seconds
• Valid lifetime: 600 seconds
Note: Certain newer versions of macOS may not work with the IPv6
DHCP server when connected to the craft port. In this case, it is suggested
to use IPv4 DHCP to access the craft port.
The IPv4 DHCP on the LAN-16 and LAN-42 ports is defaulted as:
• Server state is: ENABLED
• Server IP Address: 10.0.0.5
• Subnet Mask: 255.255.255.252
• IP address for client: 10.0.0.6
• Gateway IP Address: 10.0.0.5
The IPv6 DHCP on the LAN-16 and LAN-42 ports is defaulted as:
• Server state: disabled
• Server IPv6 address: fd00:238a:6500:b::1/64
— If using non-default addresses, the user may specify only the upper 64
bits (that is, the /64 prefix). The least-significant 64 bits must be ::1.
The client address will always have the same upper 64 bits as the
server and have a least-significant 64 bits of ::2.
• Client IPv6 address: fd00:238a:6500:b::2/64
• Gateway IPv6 address (as seen by craft PC): the link-local address of the
LAN-16/42 port. This value is visible from within Site Manager Comms
Setting Management/Services/LinkLocal.
• Preferred lifetime: 600 seconds
• Valid lifetime: 600 seconds
Note: Certain newer versions of macOS may not work with the IPv6
DHCP server when connected to the craft port. In this case, it is suggested
to use IPv4 DHCP to access the craft port.
6500 supports two basic DCN models, a public IP address model and a
Private-IP address model. The following sections provide general information
about these basic DCN models. Subsequent sections provide general
provisioning guidance and examples of DCN configurations.
Segment the OSPF network: reduce area size, avoid use of an OSPF
backbone, implement non-OSPF boundary sites using iISIS (for routing) and
SLDD (for AR/TR distribution).
Minimize the number Type-11 LSAs, and the AR and TR records contained
therein. Since Type-11 LSAs have AS-wide flooding scope, reduced OSPF
area size and use of SLDD at area boundary sites is a recommended
approach. OOLFC may also be used to reduce Type-11 LSA count in
all-OSPF configurations. In some cases, OOLFC can be used in conjunction
with SLDD.
Minimize churn
Consider churn from external destinations which could impact 6500, for
example through OSPF flooding.
Minimize the ‘impact radius’ of failures. Strategies such as reduced area size,
network segmentation and route filtering can help to reduce the impact of
failures in one area, such as flapping links, on other areas.
The general scope requirements for both AR and TR are site and domain:
• Shelves within a given site, determined by the Site-ID parameter, require
each other’s AR and TR records.
• Shelves within a given Photonic domain, determined by the OSID
parameter, require each other’s AR and TR records.
Wavelength re-routing
If the L0 Photonic Control Plane is used to re-route wavelengths, re-routing is
initiated autonomously and completes before topology times-out. It is
recommended to use the L0 Photonic Control Plane for wavelength re-routing.
If not using an OSPF GNE configuration (that is, for ARP, Private IP, NAT, DCN
Drop configurations), it is not possible to provide a diverse OSPF flooding path
through the external DCN.
Figure 1-8
Use of GRE tunnels with intra-area OSPF for diverse flooding
Stretched spans
Normally OSC is used to carry Photonic communications traffic between sites
due to its relatively high bandwidth and low latency, and this is the
recommended method whenever available. However, in some applications,
such as submarine, the large distances and associated fiber losses mean that
OSC cannot be used due to link budget exhaustion. These are referred to as
‘stretched spans’. In stretched spans, it is recommended to use a
high-bandwidth GCC0 channel, such as that provided by 100G circuit packs,
as an alternative to OSC. This helps to minimize latency versus, for example,
using a communications path through the external DCN which could have
larger and/or more variable latency. It is also recommended to limit the
number of nodes communicating across the link by making the stretched span
a single-section domain and limiting the number of amplifiers in the domain
that contains the stretch span. Contact Ciena for assistance.
Whenever possible, it is recommended that more than one channel across the
stretched span be configured with the GCC0 workaround for redundancy.
OSPF costs of the GCC0 links and within the Photonic network should be
carefully engineered to avoid internal traffic traversing the external DCN or the
use of the lower bandwidth GCC0 link for customer DCN traffic under normal
operating conditions. GNE placement with respect to the stretched span
should also be considered to limit the number of nodes that may be isolated
under a fiber cut scenario.
First channel turn-up and recovery from fiber cuts need to be performed
manually. The workaround only applies to one stretched span per optical path
and there must be only one stretched span in the link.
For DOC to operate across the stretched span, the shelves with the DOC
instances require IP visibility and AR/TR of each other and every device
between them in the domain, implying they must be in the same OSPF area.
Since SLDD and IISIS are used to provide a seam from an OSPF perspective,
it is necessary for the circuit packs providing GCC across the span to exist on
the same ‘side’ of the SLDD/IISIS seam. It is recommended, and in many
cases necessary, that the circuit packs providing GCC be in the same shelf as
the SLTE OTS. Figure 1-9 on page 1-83, illustrates such a configuration.
Figure 1-9
Stretched span with SLDD/IISIS
SLTE OTS
OSPF
iISIS
SLDD/IISIS
GCC0
Legend
COLAN-X
COLAN-A
ILAN-IN/ILAN-1
ILAN-OUT/ILAN-2
For Private-IP GNE, however, there are engineering limits on the number of
RNEs that can be supported due to the additional processing required on the
GNE for TL1 Gateway, RPNAT and NAPT. Refer to the “DCN engineering
guidelines” on page 1-404 for more information on these limits, and to “TIDc
member shelf GNE support” on page 1-91 for a mitigation strategy.
With Private-IP, public DCN and private 6500 network routing information is
not shared. Though the internal address space within the private network is
private, this space must not overlap with any address space in the DCN. This
is because packets within the private network need to be sent to the DCN,
based on the DCN IP addresses. Separate Private-IP networks can have
overlapping address spaces.
In 6500, each GNE needs to be configured with one or more static routes to
the external DCN, which in turn need to be redistributed into the internal
OSPF or IISIS network to provide DCN reachability to the RNEs. This allows
the RNEs to originate connections and send packets to the DCN IP
addresses.
RADIUS gateway
When using RADIUS, RNE login authentication is provided by the RADIUS
client on the RNE which accesses the DCN RADIUS servers via the RADIUS
gateway on the GNE, which acts as a proxy.
RADIUS clients on RNEs are configured to point to the GNE(s). Generally any
access to the GNEs within the Private-IP network should be using the
Private-IP addresses.
Dynamic port ranges (ED-NAT) should not overlap with other local GNE port.
Private-IP supports FTP client, FTP server, active and passive FTP, SFTP,
SNMP, SSH, Telnet, HTTP, CLI, and Secure HTTP (via mapping of Public IP
address and port to Private-IP address).
The 6500 FTP server supports both passive and active FTP. However, the
client only supports active FTP. Load deliveries, backups and restores use the
FTP client.
For SNMP and SAOS-based CLI access to eMOTR circuit packs on RNEs,
Reverse Port NAT entries must be added to map unique GNE ports to the
appropriate service ports on the RNEs. For SNMP, this is UDP port 161. For
SAOS-based CLI, this is port 10010 or 10020 for Telnet, or port 20002 for
SSH. For consolidated nodes (TIDc) containing eMOTR circuit packs,
Reverse Port NAT entries are only required for access to the primary shelf of
the TIDc, since access to eMOTR circuit packs on member shelves is
provided through SNMP proxy and CLI proxy functions on the primary shelf.
Ports that are present in the Reverse Port NAT table can be detected by port
scanning software.
Table 1-12 shows the ports that can be added to the Reverse Port NAT table
on a Private-IP GNE.
Table 1-12
Reverse Port NAT ports
22 SSH TCP
23 Telnet TCP
80 HTTP TCP
Note: Only if using external FTP client to access RNEs (not needed for load
deliveries or backup and restore operations).
Port filtering
For further details on port filtering, refer to “Provisionable port filtering” on
page 1-388.
TL1 Gateway
The TL1 Gateway applies to the 6500 network GNE. This feature provides a
TL-1 connectivity abstraction layer for customer initiated TL-1 connections to
network elements that subtend a 6500 GNE.
The TL1 Gateway removes the need to have multiple and individual
connectivity to each local or remote node to be managed by the Operations
System (OS or OSS). The gateway provides TL-1 session multiplexing where
multiple TL-1 sessions between a TL1 Gateway NE and an RNE (Remote
Network Element) can be multiplexed into a single TL-1 session between OS
and TL1 Gateway NE.
The OSI and IP TL1 Gateways facilitate TL-1 connectivity from an IP-based
Customer DCN to third-party OSI based network elements or 6500 network
elements subtending the 6500 TL1 Gateway. You can then perform one or
multiple simultaneous TL-1 logins to subtending third-party OSI based
network elements or subtending 6500 network elements via Telnet from the
DCN into the 6500 TL1 Gateway.
The TL1 Gateway feature supports the two flavors described below.
For non-Ciena third-party network elements, there may not be an entry in the
TARP data cache. A third-party NE that sends out a TARP type IV message
will be in the TARP data cache, but if the TL1 Gateway NE restarts, the TARP
data cache will be empty. In this case, the first TL-1 command sent to that NE
will be denied and the TL1 Gateway will send a TARP request to fill its TARP
data cache.
If the network element is in the network and responds to the TARP request,
the next TL-1 command will complete as expected.
ATTENTION
TARP on the 6500 only supports upper-case TIDs. For example, TARP would
interpret OTTAWA and Ottawa to be the same TID. If mixed-case TIDs are
provisioned, unexpected results will occur.
IP TL1 Gateway
The IP TL1 Gateway facilitates TL-1 connectivity from an IP based Customer
DCN to 6500 or CPL (Release 5.0 and above) network elements subtending
the 6500 GNE. Via Telnet from the DCN into the 6500 GNE, the customer can
then perform one or multiple simultaneous TL-1 logins to any subtending 6500
or CPL network elements. See Figure 1-11 on page 1-91.
In each case, it is possible to have multiple Telnet sessions to the GNE, then
for each Telnet session, the user can perform multiple ACT-USERs to the
RNE. Note that in order for different users (accounts) to reach the same RNE,
separate Telnet sessions will be needed. Only one user can be supported per
Telnet.
Figure 1-10
6500 OSI TL1 Gateway
OS T-TD NE
TL1/TCP - TL1/OSI
TL1 Translation Function TL1
Initiator Responder
TL1 Initiator
and responder
Figure 1-11
6500 IP TL1 Gateway
OS T-TD NE
Member shelf GNE support can also help to off load processing from the TIDc
primary shelf, which retains responsibility for managing the TID from a TL-1
perspective (all TL-1 to the TID is managed by the TIDc primary shelf).
Figure 1-12 on page 1-92 illustrates a simple example where a member shelf
GNE is used in a ROADM TIDc.
Figure 1-12
TIDc member as GNE
ROADM 1
ILAN ring G R R
Legend
R = Remote NE
To create a new subnet from a TIDc node, the following steps would need to
be followed:
• provision one of the member shelves as a GNE
• add a DCN drop to the GNE COLAN-X interface
• add the subtending RNEs to the GNEs span of control
The RNEs can then be managed using the TL1 Gateway function through the
newly promoted member/GNE shelf.
The following section describes the various combinations of settings for the
above attributes as it applies to a TIDc member shelf.
• GNE=ENABLED, RNE=ENABLED
— ACT-USER command to the TID of the TIDc will login the user into the
primary shelf.
— Since the RNE function is enabled, this node can act as an RNE as
well.
• GNE=DISABLED, RNE=ENABLED
— This setting disables the TL1 Gateway forwarding function and can be
used to get local access to a TIDc member shelf. Note that all the
RNEs managed through this GNE shelf will go into the LOA state.
— Since the RNE function is enabled, this node can act as an RNE.
• GNE=ENABLED, RNE=DISABLED
— ACT-USER command to the TID of the TIDc will login the user into the
primary shelf.
— Since the RNE function is disabled, this node cannot act as an RNE.
• GNE=DISABLED, RNE=DISABLED (default setting)
— This setting disables the TL1 Gateway forwarding function and can be
used to get local access to a TIDc member shelf. Note that all the
RNEs managed through this GNE shelf will go into the LOA state.
— Since the RNE function is disabled, this node cannot act as an RNE.
Note that the default setting of both the “GNE” and “RNE” parameters is
DISABLED. In a public-IP GNE configuration, where TL1 Gateway is not used,
the defaults can be left as-is. In a Private-IP system where TL1 Gateway is
used, Table 1-13 on page 1-94 shows the minimum functions which must be
enabled for the various roles a shelf may have in order to provide full access
to all shelves in the network.
Table 1-13
GNE and RNE attribute minimum requirements in a private-IP system
Engineering considerations
• GNE/TL1 Gateway must be a Photonics shelf
• refer to “TID consolidation (TIDc)” on page 1-107 and “Consolidated node
engineering guidelines” on page 1-109 for more specific limits on TIDc
and Private-IP GNE configurations.
Figure 1-13
Example of asymmetric spans of control
RNE-D
RNE-E
GNE-3
Exclusions
These GNE configurations are not supported in IPv6:
• Private-IP
• Redundant NAT
• Redundant ARP
OSPF or IISIS can be used as the internal routing protocol for 6500 network
elements. However, Photonic applications (for example, DOC) and TID
consolidation require that OSPF be used as the internal routing protocol. IISIS
can be used on DCC/GCC to provide data communications to remote OSI
network elements.
For systems with Photonic equipment, the OSC channel can be set up to
provide data communication between 6500 sites as Photonic applications
require it. GCC/DCC channels are not usually used. However in certain
scenarios such as Single Stretch Spans (SSS) they can be required. Refer to
“Stretched spans” on page 1-82 and “Stretched spans with SLDD/IISIS” on
page 1-83 for more information on stretched spans. If OSI is required for a
remote network element (for example, OM 3000), IISIS can be set up on a
DCC.
If redistributing into OSPF, the metric-type parameter is not used. Routes are
always redistributed as type-1 external LSAs (internal metric is considered in
determining the cost to external destinations).
Table 1-14 on page 1-99 illustrates an example of how routes are redistributed
from routing-domain 1 to routing-domain 2 using the redistribution entry at a
router in domain 2. Two cases are shown, one with route summarization off,
one with summarization on. The redistribution entry (1.0.0.0/8) specifies that
the first octet must be '1'.
When summarization is off, routes with a first octet of '1' are distributed into
routing domain 2 as-is. When summarization is on, the presence of any route
in routing domain 1 with a first octet of '1' results in the distribution of the
summarized route 1.0.0.0/8 into domain 2.
Table 1-14
Route Summarization
Route Summarization = OFF Route Summarization = ON
1.3.4.0 255.255.255.0
1.16.0.0 255.255.0.0
Figure 1-14
Add IPv6 Static Route dialog box
Table 1-15
IPv6 route redistribution examples
6 Provision the IISIS or OSPF circuits against each comms port provisioned
on the network element.
If using IISIS as the internal routing protocol or if the comms port will
connect to an OSI-managed network element, provision the IISIS circuits.
— Select the Routers tab and select IISIS Circuit as the Router type.
Add an IISIS circuit to each comms port provisioned on the network
element that requires IISIS routing (COLAN, ILAN, SHELF,
OC-n/STM-n DCC ports, OTM1/OTM2/OTM3/OTM4/OTMC2/OTM
GCC ports, and GRE tunnels) (see “IISIS circuits (IPv4 only)” on
page 1-46).
If using OSPF as the internal routing protocol or using OSPF between
gateway and external DCN, provision the OSPF circuit.
— Select the Routers tab and select OSPF Circuit as the Router type.
Add the OSPF circuit to each comms port provisioned on the network
element that requires OSPF routing (COLAN, OSC, ILAN, SHELF,
OC-n/STM-n DCC ports, and
OTM1/OTM2/OTM3/OTM4/OTMC2/OTM GCC ports) (see “OSPFv2
circuits (for IPv4)” on page 1-52).
The Auto OSC/OSPF Provisioning parameter in the Site Manager Node
information application System sub-tab (or ED-SYS TL-1 command and
the OSCMODE parameter) defines whether the OSC will be provisioned
or not when the SFP on the RLA modules (T-Series shelf only), SRA,
SAM, ESAM, 2xOSC, and SPAP-2 w/2xOSC circuit packs is provisioned.
By default, the OSC autoprovisions and the associated OSPF circuit is
autoprovisioned in Area 0.0.0.0.
7 Provision manual area addresses (MAA) (if interworking with other OSI
products using different MAAs).
Select the Routers tab and select Upper Layer DCC as the Router type.
Add/delete the necessary manual area addresses (see “Upper layer DCC
implementation rules (does not apply to T-Series shelves)” on page 1-30).
The 6500 has a default MAA of 490000. It is recommended that the default
MAA of 490000 is deleted if not required (you cannot delete it if it is the
only MAA).
8 Provision GRE tunnels (if using tunnels between gateway network
element and management system or between network elements).
Select the Interfaces tab and select GRE as the Interface type. Add the
OSI over IP or IP over OSI tunnels (GRE-IP-1 to 4, GRE-OSI-1 to 4) (see
“GRE” on page 1-69).
IPv6 can only be disabled on a shelf, and subsequently removed, if all IPv6
provisioning is removed first.
ATTENTION
6500 network elements must be de-enrolled from OneControl server before
TID consolidation is performed. For more information, refer to the “Network
management” chapter in the OneControl Unified Management System
Manager for 6k, OM5k and CPL Standard Operations Guide, 450-3241-301.
If a 2-slot shelf TIDc primary is also a GNE, only one LAN port is available to
connect to other shelves in the TIDc. As a result, the TIDc configuration will
not be fully redundant. Refer to the “Consolidated node engineering
guidelines” on page 1-109 for details on when a 2-slot shelf can act as the
primary shelf of a TIDc. This restriction does not apply to a 2-slot optical
Type 2 shelf equipped with an SPAP-2 w/2xOSC circuit pack.
Table 1-16
Supported TIDc member shelf types
Shelf processor variant of PECs Supported TIDc member shelf types
primary shelf
2-slot shelf with integrated SP • NTK503MAE5 • 6500 2-slot shelf with integrated SP
(Note) • NTK503NAE5 • 6500 2-slot optical Type 2 shelf equipped with SPAP
Note: If the primary shelf is also a GNE, only one LAN port is available to connect to other shelves in
the TIDc. As a result, this TIDc configuration is not fully redundant.
Table 1-17
TIDc maximum number of shelves
Mixed 6500 and CPL Refer to Table 1-16 on • Maximum of 36 shelves if SP-2 is equipped on the
page 1-111 primary shelf. Maximum of 16 shelves if SPAP-2 is
equipped on the primary shelf.
• The primary shelf requires a combined 6500 and CPL
network element software load.
• Only Transponder and Photonic services are
supported.
• MSPP cross-connect circuit packs are not supported.
• Integrated ISIS (IISIS) is not supported on CPL.
Therefore, if DBRS runs between 6500 and CPL
shelves within a TIDc, static routes must be used to
provide IP connectivity within the TIDc. Static routes
do not provide routing redundancy.
Note: Mixed consolidated nodes that include CPL
Channel Access node (OADM) member shelves are not
supported.
This capability can be used for shelves that are TID consolidated, or for
shelves in separate TIDs but at the same site (for example, for SPLI).
Configuration
This configuration requires a dedicated pair of fibers to connect each pair of
OSC ports. The OSC port is not part of an OTS (optical transport section).
From a data communications perspective, each OSC port is configured as it
would be when used in a traditional optical line application (that is, part of an
OTS) in that it is unnumbered and requires an OSPF circuit.
Engineering guidelines
The following are the OSC for shelf interconnect engineering guidelines:
• The OSC for shelf-interconnect capability is supported on 2xOSC and
SPAP2 w/2xOSC circuit packs only.
• Up to three ports on a given shelf are supported for shelf-interconnect
purposes.
• The NTTP04BF and NTTP04CF SFPs are recommended for this purpose,
since they are intended for short-reach applications. However, other SFP
variants supported by the 2xOSC and SPAP-2 w/2xOSC circuit packs can
also be used, but may require padding/attenuation to avoid overloading
the pluggable Rx interface.
• Compared to ILAN, the following features are not supported on the OSC:
IISIS, DBRS, SLDD, OOLFC, numbered interfaces.
Note: When GCC1 and GCC2 are used for OTN control plane,
RTRV-LLSDCC always shows the OPER_CARRIER as
DISCONNECTED. This is different than GCC0 and GCC1 in the MCN
domain, which shows “GCC0” and “GCC1”, respectively, if the link is UP.
Prior to Release 12.1, a control-IP address was required in most cases for
communications between the TIDc primary shelf and member shelves. As of
Release 12.1, the control-IP is only required for OOB OSRP communications.
Detailed provisioning information and guidelines for the control IP address are
given below:
• The control IP address is a host address (/32) that is distinct from the
SHELF IP address but can otherwise be treated similarly. It has an AID of:
CONTROL-shelf#-GROUP0.
• The control IP is provisioned on the primary shelf of a TIDc.
— A warm restart of CPU2 on the active SP-2 Dual CPU circuit pack
(NTK555FAE5) is required to activate changes in the control IP
provisioning.
— The control IP requires an OSPF circuit and requires that the
Autonomous System Border Router parameter be set to ON for the
OSPF router. For details, refer to:
– For D-Series and S-Series shelves: Table 2-10 on page 2-50 and
Table 2-11 on page 2-52
– For T-Series shelves: Table 3-6 on page 3-32
Figure 1-15
OOB configuration example: Photonic line with Release 12.0 (and above) CPL ROADM shelf at
one end
Primary Primary
Out-of-band OSRP
messaging
CPL
TID-1 TID-2
Domain/Area A
Legend
COLAN-X/1
6500 ROADM shelf
COLAN-A
ILAN-IN
CPL ROADM shelf
ILAN-OUT
Accessing the PKT/OTN cross-connect circuit pack from the Craft port
The SAOS-based CLI on the PKT/OTN cross-connect circuit pack can be
accessed from the Craft interface port by specifying the control IP address as
the destination. The default control IP address is 169.254.46.146, but is
overwritten by the public IP address that is assigned when commissioned.
If the control IP address is changed, all open SAOS-based CLI sessions to the
PKT/OTN cross-connect circuit pack will hang and eventually timeout. A new
SAOS-based CLI session must be started following a change in the control IP
address. Ensure all configuration data is saved prior to editing the control IP
address. Failure to do so may result in loss of unsaved configuration data.
Accessing the SAOS-based CLI from the Craft interface port of the active shelf
processor also requires:
• HOSTONLY must be provisioned to OFF on the Craft port of the active
shelf processor. For further details, refer to the “Provisioning craft access”
procedure in Commissioning and Testing, 323-1851-221.
• the device used for login must be on the same subnet as the Craft port
(control IP address does not need to be on the same subnet).
• the user first opens a TL-1 session by specifying the Craft port IP address
as the destination. This login session must remain actively connected until
the next step is completed.
• the user then opens a SAOS-based CLI session using Telnet or SSH login
(using the same userID) by specifying the control IP address as the
destination.
To use SSH to log into the SAOS-based CLI through the Craft interface, the
CLI SSH server must be set up to accept the login client IP address (using the
ssh server add command). For syntax and usage of the ssh server add
command, refer to the SAOS-based Packet Services Command Reference,
323-1851-610.
Large networks
For a network with more than 32 Photonic or Broadband shelves, with
redundant OSPF DCN with multiple areas, it is recommended to use an
external router for ABR, area summarization, route aggregation, and filtering
as needed to allow the network to scale. See Figure 1-17 on page 1-124.
In the example shown the DCN router as the ABR (Area Border Router) can
be set up to:
• Filter routes advertised from backbone into non-backbone area.
• Use Summarization to reduce the number of LSA advertised into the
backbone and/or use summarization to reduce the number of LSAs
advertised into the internal 6500 comms network.
ATTENTION
When you are setting up a multiple OSPF configuration, set the OSCMODE
(parameter of the ED-SYS) command to DISABLED (default value is OSPF).
Otherwise, equipping/insertion of an OSC circuit pack will cause OSPF
circuits to be automatically created in area 0.0.0.0 and this can result in an
isolated area 0.0.0.0 and can cause loss of comms.
Small networks
For a network with less than 32 Photonic or Broadband shelves, with
redundant OSPF DCN with multiple areas, you can use the ABR feature built
into the 6500 at area boundaries. See Figure 1-16 on page 1-123.
The 6500 shelves that have OSPF circuits provisioned in more than one area,
behave as ABRs, provided they have at least one interface that is configured
to be in area 0.0.0.0 (backbone area).
Each 6500 OSPF area needs to be a resilient comms network. This will allow
for area aggregation to be provisioned on the ABRs at a later date when this
feature becomes available (area aggregation may be used to reduce routing
table and LSA database size).
At a 3-way branch site COLAN is used to connect the NE to the customer DCN
Router (in some earlier releases it may be necessary to use the ILAN, instead
of the COLAN to connect to the DCN router; this is because opaque LSAs
were used to pass internal data and opaque LSAs were blocked form COLAN.
This is now provisionable).
Figure 1-16
Redundant OSPF configuration with multiple OSPF areas (Photonics)
Customer DCN
OSPF area 0.0.0.0
(backbone)
COLAN
connections to
Customer DCN
in area 0.0.0.0
(backbone)
6500 6500
Shelf Shelf
6500
Shelf
TIDC
6500 6500 6500 6500
Shelf Shelf Shelf Shelf
6500
6500 Shelf 6500
Shelf Shelf
6500 6500
6500 ILAN Shelf
Shelf OSPF in 6500 Shelf
6500 Shelf
area
Shelf
0.0.0.0
(backbone)
OSPF area 0.0.0.2 OSPF area 0.0.0.3 OSPF area 0.0.0.4
Redundant
connections to OSC OSC
backbone - to OTS OTS
guard against
isolated area Shelf 1
0.0.0.0 in case of
COLAN failure
Same
TID
LEGEND
Shelf 2
= COLAN
= ILAN in area 0.0.0.0 Shelf 3
= Comms OSPF connection can be Shelf 4
ILAN, OSC or DCC/GCC
Figure 1-17
Redundant OSPF configuration with multiple OSPF area configuration at a 3-way branching site
Customer DCN
OSPF area 0.0.0.0
R4
R1
R2 R3
6500
Customer
Shelf
routers are
6500 DOC 2 6500 ABRs
Shelf OSPF Area B Shelf
6500
6500 6500 Shelf
Shelf Shelf
DOC 3
6500 6500
OSPF Area C
Shelf Shelf
6500
Shelf 6500 6500
Shelf Shelf
6500 6500
6500 Shelf DOC 1 Shelf
interconnected OSPF Area A
via OSPF circuits
6500 6500
Shelf Shelf
Figure 1-18
Connectivity at 3-way branch site
DOC 2
>2 6500
OSPF Area B
CP
L
X
L
0C CP
65
X X
X
65
0C
65
0C
65
0C
65
0C DOC 3
X X
2 6500
X X OSPF Area C
X X
0C CP
L
X 65
X
DOC 1
1 6500
Customer DCN
OSPF Area A
Router R2
IPv6 configurations
6500 provides support for the following network deployments:
• Homogeneous IPv4 deployments
• Homogeneous IPv6 deployments.
• Mixed IPv4/IPv6 deployments.
IPv6 exclusions
The following features and functions are not supported on 6500 with IPv6:
• Consolidated nodes (TIDc): IPv6/OSPFv3 can be overlaid for north/south
management communications, but TIDc still requires IPv4/OSPFv2.
• Photonics
Figure 1-19
IPv6 for north-south communications, with IPv4 for internal communications
See Figure 1-21 on page 1-128 and Figure 1-22 on page 1-129 for high-level
examples of mixed IPv4/IPv6 configurations. Figure 1-21 on page 1-128
shows how an IPv6 ring could be added into an existing IPv4 deployment.
Figure 1-22 on page 1-129 shows how an IPv6 shelf could be added to an
existing IPv4 ring. Also refer to “Migration from IPv4 to IPv6” on page 1-420
for a high-level description of the steps to migrate a network from IPv4 to IPv6.
Figure 1-20
Homogeneous IPv6 deployment with redundant GNEs
Figure 1-21
Augment of existing IPv4 configuration with new IPv6 ring
Figure 1-22
Augment of existing IPv4 ring with new IPv6 shelf
Opaque LSAs
This section gives a brief background on OSPF Opaque Link State
Advertisement (LSA) to assist with the understanding of the sections that
follow.
Opaque LSAs are described in RFC2370. There are three types of opaque
LSAs: types 9, 10 and 11, each of which has a different flooding scope. This
section focuses on Type-11 LSAs, as they are used by the 6500 and CPL.
OSPF Type-11 opaque LSAs are flooded throughout the AS by OSPF. Their
flooding scope is equivalent to the AS-External (type 5) LSA.
The 6500 and CPL use Type-11 opaque LSAs for distributing Address
Resolution (AR) and Topology Resolution (TR) records (one record per LSA).
AR and TR records are used by various applications including Photonics (for
example, Domain Optical Control), Service-Photonic Layer Interoperability,
and others (for example, Private-IP span of control) to determine the network
addresses and topology information. This information is stored in databases
on the 6500 and CPL shelves after being exchanged by OSPF.
Opaque LSAs are an OSPFv2 feature. They do not apply to OSPFv3, and
therefore associated mechanisms to manage opaque LSA flooding (DBRS,
OOLFC) do not apply to OSPFv3.
Also, since AR and TR information are flooded using opaque LSAs, any
applications that require AR (such as TIDc, SPLI, and Photonics) require
OSPFv2 to be provisioned.
The possible opaque LSA flooding scopes that can be created are defined
below:
• OSPF autonomous system-wide: Opaque LSAs are flooded throughout
the OSPF autonomous system (AS). The OSPF AS could be a single area
or hierarchical with multiple OSPF areas connected via a backbone. This
is the normal scope of a Type-11 opaque LSA.
• Disabled at GNEs: With this solution, the GNEs do not flood opaque LSAs
on the interfaces connected to the customer DCN. This only applies to
configurations in which an OSPF GNE solution (standalone or redundant)
is used. For other GNE solutions, there is no flooding of any kind of OSPF
LSAs to the customer DCN since OSPF is not used.
ATTENTION
The following discussion purposefully avoids using the term OSPF AS
(autonomous system) in the context of DBRS. The generic term “OSPF
network” is henceforth used in the DBRS context to describe a contiguous
OSPF network, consisting of network elements and routers, in which opaque
LSAs are flooded using OSPF.
An OSPF network:
• may or may not correspond to an OSPF autonomous system.
• can describe a single OSPF area or a hierarchical OSPF network
including a backbone area (0.0.0.0)
• may or may not include customer DCN equipment depending on whether
opaque LSAs are enabled on the interfaces connected to the customer
DCN (as described above).
Each 6500 and CPL shelf generates one AR record. Each channel access
OTS generates one TR record. Each pair of amplifier OTSes generates one
TR record.
Figure 1-23
AR/TR exchange between adjacent OSPF networks
The DBRS connection point between two OSPF networks is referred to as the
DBRS gateway. A DBRS gateway exchanges its own AR/TR data with the
adjacent DBRS gateway. A DBRS gateway does not exchange AR/TR data
that originated from another DBRS gateway.
DBRS configuration
DBRS can be configured on 6500 and CPL equipment. DBRS can only be
configured to run between network elements. The network elements must be
in different domains (i.e. different OSID). All network elements in the same
domain/OSID must be in the same OSPF network. Optical directions
contained within the same 6500 shelf must be in the same OSPF network.
DBRS is supported between 6500 and CPL Release 5.0 and above.
Engineering guidelines of both products must be considered, and if
differences exist, the lower/more restrictive values must be used.
DBRS is supported over ILAN and COLAN links. A typical configuration uses
ILAN-to-ILAN links between DBRS gateways.
6500 GCC/DCC channels that cross between OSPF networks must not share
OSPF data between the networks. Either the GCC/DCC must be disabled or
IISIS used but not redistributed into OSPF.
Routing between the DBRS gateway SHELF IPs can be achieved using either
static routes or IISIS.
• 6500 supports both static routes and IISIS.
• CPL supports static routing only
DBRS redundancy
A maximum of two DBRS links can be configured between any two given
OSPF networks in order to provide redundancy for the exchange of AR and
TR records. The following redundancy configurations are supported, as
shown in Figure 1-24 on page 1-135 and Figure 1-25 on page 1-136:
• link redundancy, where two links connect a pair of DBRS gateway shelves.
This provides protection against a single link failure, but not an NE failure.
• NE redundancy, where two NEs in each OSPF network are DBRS
enabled, and they connect to two NEs in another network. This provides
protection against a link failure and an NE failure.
Figure 1-24
Link redundancy
Network-1 Network-2
DBRS DBRS
Gateway Gateway
Figure 1-25
NE redundancy
DBRS DBRS
Network-1 Gateway Gateway Network-2
DBRS DBRS
Gateway Gateway
For example, in Figure 1-23 on page 1-133, Network-2 would contain the
AR/TR records for Network-1, Network-2 and Network-3.
OSPF Network-1, on the other hand, would contain AR/TR records from only
Network-1 and Network-2. From a Photonic application perspective, this is
sufficient to be able to manage the services across Network-1 through
Network-2 to Network-3, since these applications require AR/TR from the
'next hop' network only.
Use of OOLFC is illustrated in Figure 1-26 on page 1-139 and Figure 1-27 on
page 1-140. Figure 1-26 on page 1-139 consists of an external OSPF
backbone area (0.0.0.0) and subtending non-backbone areas, with a single
Photonic domain per OSPF area. The external routers act as Area Border
Routers, as the COLAN-X ports on the 6500 GNEs are configured to be in
their respective non-backbone OSPF areas. The shelves at each site form a
consolidated node (TIDc). Since Type-11 opaque LSAs have an AS-wide
scope, all LSAs exist in the OSPF backbone. However, with OOLFC enabled
on the GNE shelves, LSAs not belonging to the siteID or OSPF area of the
GNE are discarded, thus reducing the number of LSAs in each non-backbone
area.
Figure 1-26
Example network: OSPF GNEs connected to an external backbone
Area 0.0.0.0
ABR
ABR
ABR Accept = SiteID 3, Area B
COLAN interfaces are
Accept = SiteID 1, Area A
in their respective
non-backbone areas.
Accept = SiteID 2, Area B
Accept = SiteID 2, Area A
Domain/Area A Domain/Area B
These shelves contain AR/TR of shelves in SiteID 1, These shelves contain AR/TR of shelves in SiteID 2,
Domain/Area A and SiteID 2, but not Domain/Area B Domain/Area B and SiteID 3, but not Domain/AreaA
or SiteID 3. or SiteID 1.
Legend
COLAN-X
6500 ROADM shelf Ingress OSPF filter on the respective
COLAN-A interface (that is, filtering is done
within the shelf).
ILAN-IN
Figure 1-27
Example network: OSPF-based networks that do not have an OSPF backbone
External DCN
SiteID 2
These shelves contain AR/TR of shelves in These shelves contain AR/TR of shelves in
Domain/Area A and SiteID 2, but not Domain/Area C. Domain/Area C and SiteID 2, but not Domain/Area A.
Legend
COLAN-X
6500 ROADM shelf Ingress OSPF filter on the respective
COLAN-A interface (that is, filtering is done
within the shelf).
ILAN-IN
Configuration
OOLFC may be enabled on a per-shelf basis using the Opaque Filter
parameter associated with the OSPF router instance. OOLFC is enabled in
the OSPF router settings and supports two filtering modes: LAN-only (COLAN
and ILAN) and ALL (all interfaces). For parameter details, refer to:
• for D-Series and S-Series shelves: Table 2-8 on page 2-45 and Table 2-9
on page 2-48
• for T-Series shelves: Table 3-6 on page 3-32
If using OOLFC, all shelves in a network can have the feature enabled. The
feature may also be enabled only at strategic points in the network, such as
on the GNE shelves in Figure 1-26 on page 1-139.
Engineering considerations
In a given network, use of OOLFC is intended to be mutually exclusive with
DBRS. At the nodal level, it is not possible to enable OOLFC if DBRS is
already configured.
The accept criteria listed in the feature description are sufficient to satisfy the
requirements of all NE applications. However, the reduced scope of the AR
and TR records has some design considerations listed below:
• OOLFC effectively reduces the scope of the address and topology
information available on any given shelf. Some components of Site
Manager use this information and are affected as follows:
— The Visualization tool uses topology information as input. Therefore,
the scope of the visualization may be reduced as a result.
— The Login Dialog “Find” feature uses AR information to determine
visible nodes. The scope of visible nodes may be reduced as a result
of OOLFC.
• Private-IP GNEs use AR to define the span of control and to translate
TID-to-IP for TL1 Gateway connections to remote NEs. When designing
networks with Private-IP GNEs and OOLFC, the span of control cannot
include remote NEs that are outside the locally filtered AR scope.
• Prior to Release 12.0, OOLFC supported only OFF/ON settings. Starting
in Release 12.0, OOLFC supports OFF, ALL and LAN-only settings. Over
an upgrade from a release prior to Release 12.0 to Release 12.0 and
above, the settings are handled as described in Table 1-18 on page 1-141.
Table 1-18
OOLFC settings over upgrade to Release 12.0
OFF OFF
ON ALL
SLDD considerations
The following are SLDD considerations:
• SLDD may be deployed at strategic locations to manage overall network
size. This is at the discretion of the network engineer, and should consider
network topology, OSPF engineering guidelines, and operational factors.
Refer to Figure 1-28 on page 1-144 for an SLDD example.
• At a site that is designated as an SLDD site, SLDD must be enabled on all
shelves at that site. Generally, interfaces with SLDD enabled use a
non-OSPF routing protocol for intra-site IP connectivity, as the goal is to
segment the network from an OSPF perspective. Integrated-ISIS is
recommended for this purpose.
• When SLDD is enabled, by default it is active on ILAN-IN/OUT (6500-type
shelves) and ILAN-IN1/OUT1 (T-Series shelves). Depending on the
specific intra-site connectivity details, additional ports may need to be
enabled.
Figure 1-28
SLDD example
SLDD prerequisites
For SLDD to operate, the following conditions must be satisfied:
• The shelf IP address must be provisioned.
• SLDD-enabled interfaces must be provisioned at Layer-2 (ENT-LAN) and
Layer-3. The IP address can be numbered or unnumbered (0.0.0.0).
• At the nodal level, the feature is mutually exclusive with DBRS. Therefore,
DBRS must not be enabled on the SLDD-enabled node.
• If a particular network design requires OSPF on an SLDD-enabled
interface for intra-site connectivity, SLDD does not preclude this but OSPF
opaque LSAs must be disabled on that interface. Generally,
Integrated-ISIS is recommended for intra-site IP connectivity.
Table 1-19
SLDD operational states
State Description
Active – Interface up The feature is enabled, the interface is fully provisioned and the
SLDD adjacency is up.
Un-provisioned – Interface Down The feature is disabled, or the interface is not fully provisioned.
Fault detected – Adjacency down The SLDD adjacency on this interface is down.
Fault detected – Link down The physical link (for example, ILAN) is down
With OMA, the shelf-IP address can still only be configured in a single OSPF
area, since it is a stub interface (refer to RFC5185). However, a point-to-point
interface connecting two shelves (with shelf-IPs in different areas) can have
two areas provisioned. This extends each area to its neighbor shelf thereby
allowing each to have visibility into the neighboring area and thus to the
neighboring shelf-IP. Refer to Figure 1-29 on page 1-147.
Table 1-19 on page 1-145 outlines factors to consider when considering use
of OMA versus RFC 2328-compatible ABR when designing a network.
Figure 1-29
Overlapping OSPF areas using OSPF Multi-Area Adjacency
OSPF-A
OSPF-B
Shelf- Shelf-
IP A IP B
Shelf-A Shelf-B
OSC
OSPF-A extended to shelf-B and OSPF-B extended to shelf-A using OSPF Multi-area Adjacency
on OSC
• Shelf-A can see shelf-IP of shelf-B through OSPF-B.
• Shelf-B can see shelf-IP of shelf-A through OSPF-A.
Provisioning
OSPF Multi-Area Adjacency is provisioned simply by adding more than one
OSPF circuit to a given AID according to the rules and restrictions below.
"ILAN-8-IN1:LAN_OSPF_NETA_DN,TC,12-27,00-08-14,NEND,NA,,,:\"OSPFv2
NETAREA Adjacency
Down\",NONE:0800000000-7013-1985,:YEAR=1990,MODE=NONE,ADDITIONALINFO
=\"Netarea: 1.2.3.4\""
"ILAN-8-IN1:LAN_OSPF_NETA_UP,TC,12-27,00-08-54,NEND,NA,,,:\"OSPFv2
NETAREA Adjacency
Up\",NONE:0800000000-7017-1990,:YEAR=1990,MODE=NONE,ADDITIONALINFO=\
"Netarea: 1.2.3.4\""
RFC 2328-compatible ABR mode is suited to networks that have some or all
of these characteristics: multiple non-backbone OSPF areas that are relatively
small (for example, an OSPF area per site and an area per Photonic
direction), small number of ABRs between any two given areas (two or fewer
areas), and a small number of ASBRs in any given area (two or more areas).
With RFC 2328-compatible ABR mode, a shelf configured with two or more
non-backbone OSPF areas acts as an ABR and generates summary LSAs,
allowing the shelf-IP address to be visible in adjacent OSPF areas. Refer to
Figure 1-30 on page 1-150. The summary LSAs are flooded into adjacent
areas only. Refer to Figure 1-31 on page 1-151.
According to RFC 2328, an ABR can only process backbone summary LSAs.
The T-Series shelf implementation allows processing of non-backbone
summary LSAs to address networks with multiple non-backbone areas. See
the associated restriction below. This behavior is compatible with RFC 2328.
Table 1-19 on page 1-145 outlines factors to consider when considering use
of OMA versus RFC 2328-compatible ABR when designing a network.
Provisioning
RFC 2328-compatible ABR mode is enabled/disabled in the OSPF routing
settings.
Figure 1-30
OSPF RFC 2328-compatible ABR
ABR
Figure 1-31
Scope of summary LSAs with RFC 2328-compatible ABR mode
No additional provisioning on
line amps
line amp
Table 1-20
Factors influencing use of OSPF Multi-area Adjacency (OMA) versus RFC 2328-compatible ABR
Nodes per area Large Small In RFC 2328-C mode, Type-3 summary LSAs
are generated in proportion to the number of
nodes in the area (number of nodes multiplied
by number of ABRs).
Therefore, RFC 2328-C is better suited to
small areas.
ASBRs per area Large Small In RFC 2328-C mode, Type-4 summary LSAs
are generated in proportion to the number of
ASBRs in the area (number of ASBRs
multiplied by number of ABRs).
Therefore, RFC 2328-C is better suited to
smaller numbers.
Line amps in spans Small Large In Release 12.0, OMA is not supported on
6500 line amplifiers. However, it can be used
on spans without line amps, or RFC
2328-compatible ABR can be used.
• DCN example 23—using OSPF with two 6500 gateway network elements
connected to OSPF backbone with collocated CPL network elements.
Used for redundant 6500 networks with two gateway network elements
into the OSPF backbone area with CPL network elements collocated with
the 6500 network elements.
• DCN example 24—Voice over IP (VoIP) orderwire. Illustrates how to use
IP telephony to provide orderwire communication between 6500 network
elements.
• DCN example 25—DBRS use in a mesh network. Outlines the DBRS and
IP routing provisioning required for a site within a mesh network.
• DCN example 26—IPv6 DCN LAN drop to every shelf. Illustrates how to
use IPv6 with a DCN LAN drop to every shelf.
• DCN example 27—IPv6 statically routed GNE configuration. Illustrates
how to use IPv6 with a statically routed GNE configuration.
• DCN example 28—IPv6 ND Proxy GNE configuration. Illustrates how to
use IPv6 with an ND Proxy GNE configuration.
• DCN example 29—IPv6 redundant OSPF GNEs with IPv4 redundant
OSPF GNEs. Illustrates how to use IPv6 with redundant OSPF GNEs with
IPv4 redundant OSPF GNEs.
For DCN interworking between the 6500 and 6110/6130/6150, refer to the
6110/6130/6150 planning guide.
This configuration avoids the use of routing protocols between the 6500
network elements and the external DCN, but requires configuration changes
in the external DCN router and does not provide redundant access to the 6500
network in case of DCN or COLAN failure.
ILAN ports can be used to connect collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
Addressing
In this example, each 6500 network element is assigned a SHELF IP address
from the same subnet. This allows a single static route on the external router
to cover the whole subnet. The COLAN interface on the gateway network
element is assigned an IP address in the same subnet of the router port
connected to the gateway network element.
The example shows the case where the GNE shelf and COLAN IP addresses
are different. This provides consistency in the shelf IP addressing for the
network elements. However, it is also possible for the shelf and COLAN
interfaces on the GNE to be set to the same value (single-public-IP
configuration).
Routing
The internal routing protocol can be either OSPF or IISIS. OSPF is required
for Photonic applications (for example, DOC) and TID consolidation. IISIS is
required in applications that need IIH topology auto-discovery across
DCC/GCC channels, or that require OSI traffic to be routed through the
network.
For networks without Photonic equipment, DCC and/or GCC channels can be
configured to provide inter-site communications if required.
For parameters not listed, use the default settings or leave blank.
Figure 1-32
DCN example 1 diagram—Standalone static
RADIUS X terminal
10.11.12.171 10.11.12.170
Subnet: 10.11.12.160
Subnetmask: 255.255.255.224
Broadcast: 10.11.12.191
OneControl Optical
10.11.12.168 Network
Manager
10.11.12.161
10.11.12.172/27
ROUTER
10.6.1.1/30
10.5.17.2/32
Subnet: 10.5.17.0
NE2 Subnetmask: 255.255.255.248
6500
NE1 NE3
COLAN-X
10.6.1.2/30
10.5.17.1/32 10.5.17.3/32
NE4
/27 is 255.255.255.224 10.5.17.4/32
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-21
DCN example 1—6500 DCN provisioning details
Table 1-21
DCN example 1—6500 DCN provisioning details (continued)
Table 1-21
DCN example 1—6500 DCN provisioning details (continued)
Table 1-21
DCN example 1—6500 DCN provisioning details (continued)
Table 1-21
DCN example 1—6500 DCN provisioning details (continued)
ILAN ports can be used to connect collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
Addressing
The single-public-IP mode, where shelf interface and COLAN-X interface are
set to the same value, is supported and recommended in this configuration.
The IP must be unique and must belong to the same subnet as the router to
which the shelf is connected.
Routing
The internal routing protocol can be either OSPF or IISIS. OSPF is required
for Photonic applications (for example, DOC) and TID consolidation. IISIS is
required in applications that need IIH topology auto-discovery across
DCC/GCC channels, or that require OSI traffic to be routed through the
network.
For networks without Photonic equipment, DCC and/or GCC channels can be
configured to provide inter-site communications if required.
For parameters not listed, use the default settings or leave blank.
Figure 1-33
DCN example 2 diagram—Individual LAN drops from customer DCN
OneControl
47.1.1.1/29
R4
DCN
R1 R3
R2
COLAN-X
47.1.1.22/30
NE2
COLAN-X COLAN-X
47.1.1.18/30 47.1.1.26/30
NE3
NE1
6500
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-22
DCN example 2—6500 DCN provisioning details
Table 1-22
DCN example 2—6500 DCN provisioning details (continued)
Table 1-22
DCN example 2—6500 DCN provisioning details (continued)
Table 1-22
DCN example 2—6500 DCN provisioning details (continued)
ATTENTION
This configuration is only supported if the internal routing protocol is IISIS.
Photonic applications (for example, DOC) and TID consolidation require that
OSPF be used as the internal routing protocol. Networks requiring this
functionality can not use this configuration. For dual GNEs with OSPF as the
internal routing protocol refer to Figure 1-82 on page 1-344.
Each 6500 network element is assigned a SHELF IP address from the DCN
address space. The COLAN interface on the gateway network elements are
assigned an IP address in the same subnet of the router port connected to the
gateway network element. Each SHELF IP address is visible within the
external DCN.
ILAN ports can be used to connect to collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
PPP is used as the data link layer across the DCC/GCC for communication
between the 6500 network elements.
For parameters not listed, use the default settings or leave blank.
For more information, see “Craft LAN port IP address configuration rules” on
page 1-39.
Figure 1-34
DCN example 3 diagram—Redundant OSPF GNE configuration (each GNE in different OSPF area)
RADIUS OneControl
47.1.1.2/29 47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
R3
Note:
IP addresses in DCN
Router DCN Network backbone not shown.
OSPF Backbone Area 0.0.0.0
R2
R1
47.1.1.17/30 47.1.1.21/30
NE1 NE4
47.1.1.32/32 47.1.1.35/32
Table 1-23
DCN example 3—6500 DCN provisioning details
Table 1-23
DCN example 3—6500 DCN provisioning details (continued)
Table 1-23
DCN example 3—6500 DCN provisioning details (continued)
Table 1-24
DCN example 3—additional provisioning when using LAN-15/LAN-41 to access other network
elements
Table 1-25
DCN example 3—additional provisioning when using LAN-16/LAN-42 to access other network
elements
The overall design must ensure that only packets meant for the 6500 network
elements are routed over the DCC/GCC and not other DCN traffic. The 6500
network elements send/receive all routes to/from the DCN. If the internal
routing is IISIS, the 6500 network elements send all routes to the DCN using
IISIS to OSPF redistribution and receive all routes from the DCN using OSPF
to IISIS redistribution.
Each 6500 network element is assigned a SHELF IP address from the DCN
address space. The COLAN interface on the gateway network elements are
assigned an IP address in the same subnet of the router port connected to the
gateway network element. Each SHELF IP address is visible within the
external DCN.
The internal routing protocol can be either IISIS or OSPF. When the internal
routing protocol is OSPF, OSI traffic cannot be routed through the network
element.
Photonic applications (for example, DOC) and TID consolidation require that
OSPF be used as the internal routing protocol. IISIS can be used on
DCC/GCC to provide data communications to remote OSI network elements.
For added redundancy you can create a tunnel between R1 and R2 and
enable OSPF on the tunnel with the same non-backbone area (Area 0001).
ILAN ports can be used to connect to collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
When the internal routing is IISIS, the gateway network elements are
configured as an OSPF autonomous system boundary router (ABSR) as they
are located between the OSPF autonomous system and a non-OSPF area
(IISIS). When the internal routing is OSPF, the gateway network elements are
configured with the OSPF ABSR set to Off as they are located in an OSPF
area.
For systems without Photonic equipment, PPP is used as the data link layer
across the DCC/GCC for communication between the 6500 network
elements.
For systems with Photonic equipment, the OSC channel must be set up to
provide data communication between 6500 sites as Photonic applications
require it. OSPF runs on the OSC, IISIS is not supported on the OSC. If OSI
is required for a remote network element (for example, OM 3000 series), IISIS
can be set up on a DCC.
For parameters not listed, use the default settings or leave blank.
Figure 1-35
DCN example 4 diagram—Redundant OSPF with two 6500 gateway network elements connected
to the OSPF backbone
RADIUS OneControl
47.1.1.2/29 47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
R1 Note:
IP addresses in DCN
backbone not shown.
Router DCN Network
OSPF Backbone Area 0.0.0.0
COLAN-X COLAN-X
47.1.1.18/30 47.1.1.22/30
NE1 NE4
47.1.1.32/32 47.1.1.35/32
Figure 1-36
DCN example 4 diagram—Redundant OSPF with two 6500 gateway network elements connected
to the same non-backbone OSPF area
RADIUS OneControl
47.1.1.2/29 47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
R3
NOTE:
IP addresses in DCN
Router DCN Network backbone not shown.
OSPF Backbone Area 0.0.0.0
R2
R1
47.1.1.17/30 47.1.1.21/30
NE1 NE4
47.1.1.32/32 47.1.1.35/32
Table 1-26
DCN example 4—6500 DCN provisioning details
Table 1-26
DCN example 4—6500 DCN provisioning details (continued)
Table 1-26
DCN example 4—6500 DCN provisioning details (continued)
Table 1-26
DCN example 4—6500 DCN provisioning details (continued)
Table 1-26
DCN example 4—6500 DCN provisioning details (continued)
In this example, two 6500 network elements are connected to the external
DCN and act as gateway network elements for the other 6500 network
elements. OSPF is used on the COLAN interface of gateway network
elements for integration with the external DCN. As the tunnels are on the
external routers, the routing mechanism on the 6500 can be any of the
supported mechanisms (for example, static routing), see the other examples
in this chapter for details.
Each 6500 network element is assigned a SHELF IP address from the same
subnet. The COLAN interface on the gateway network element is assigned an
IP address in the same subnet of the router port connected to the gateway
network element. Each SHELF IP address is visible from the management
LAN but is not visible from the router DCN. The customer must assign unique
IP addresses to the network elements from the Private-IP addressing range.
The internal routing protocol can be either IISIS or OSPF. When the internal
routing protocol is OSPF, OSI traffic cannot be routed through the network
element.
Photonic applications (for example, DOC) and TID consolidation require that
OSPF be used as the internal routing protocol. IISIS can be used on
DCC/GCC to provide data communications to remote OSI network elements.
ILAN ports can be used to connect to collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
VPN tunnels (for example, GRE, IPSec, or MPLS) are used between routers
connected to the management systems (for example, OneControl) and the
routers connected to the 6500 gateway network elements. All traffic to/from
the 6500 network elements and the management systems are in the tunnels.
In this example, NE2 and NE3 cannot ping R1 and R2 without redistributing
10.6.1.30 and 10.6.1.5 into IISIS.
OSPF areas 1 and 2 are interconnected through the backbone area with R3
acting as the ABR. Alternatively, R1 and R2 can be ABRs with the tunnel
interfaces in the backbone area; this is the configuration assumed for this
example.
For systems without Photonic equipment, PPP is used as the data link layer
across the DCC/GCC for communication between the 6500 network
elements.
For systems with Photonic equipment, the OSC channel must be set up to
provide data communication between 6500 sites as Photonic applications
require it. OSPF runs on the OSC. IISIS is not supported on the OSC. GCC
and DCC channels should not be provisioned to provide a data
communication path between 6500 sites. If OSI is required for a remote
network element (for example, OM 3000), IISIS can be set up on a DCC.
For parameters not listed, use the default settings or leave blank.
Figure 1-37
DCN example 5 diagram—Redundant OSPF using DCN tunnels
RADIUS OneControl
10.11.12.1/29 10.11.12.2/29
Subnet: 10.11.12.0/29
R3 10.11.12.3/29
Any OSPF area
47.3.3.1/30 or other protocol
Router DCN
Network
47.1.1.1/30 47.2.2.1/30
R1 R2
10.6.1.1/30 10.6.1.5/30
NE1 NE4
10.5.1.1/32 10.5.1.4/32
NE2 NE3
/29 is 255.255.255.248
/30 is 255.255.255.252
10.5.1.2/32 10.5.1.4/32
/32 is 255.255.255.255
Table 1-27
DCN example 5—6500 DCN provisioning details
Table 1-27
DCN example 5—6500 DCN provisioning details (continued)
Table 1-27
DCN example 5—6500 DCN provisioning details (continued)
Table 1-27
DCN example 5—6500 DCN provisioning details (continued)
• R3 configuration
— tunnel 1
– source: 47.3.3.1
– destination: 47.1.1.1 (R1 public LAN port)
— tunnel 2
– source: 47.3.3.1
– destination: 47.2.2.1 (R2 public LAN port)
Each 6500 network element is assigned a SHELF IP address from the same
subnet. The COLAN-X interface on the gateway network element is assigned
an IP address in the same subnet of the router port connected to the gateway
network element. Each SHELF IP address is visible within the external DCN.
The subnet on the DCN router port that connects to the COLAN-X port of the
gateway network elements must be large enough to support the COLAN-X
port and the SHELF IP address of every network element for which the
gateway network element will proxy ARP. It is recommended that the GNE
COLAN IP address and SHELF IP address be the same. Proxy ARP is set to
On for the COLAN-X interface.
The ILAN ports can be used to connect to collocated network elements. For
more information, see “ILAN port IP address configuration rules” on
page 1-40.
The internal routing protocol can be either IISIS or OSPF. When the internal
routing protocol is OSPF, OSI traffic cannot be routed through the network
element.
Photonic applications (for example, DOC) and TID consolidation require that
OSPF be used as the internal routing protocol. IISIS can be used on
DCC/GCC to provide data communications to remote OSI network elements.
This example does not provide redundant access to the 6500 network in case
of DCN failure.
For systems without Photonic equipment, PPP is used as the data link layer
across the DCC/GCC for communication between the 6500 network
elements.
For systems with Photonic equipment, the OSC channel must be setup to
provide data communication between 6500 sites as Photonic applications
require it. OSPF runs on the OSC, IISIS is not supported on the OSC. GCC
and DCC channels should not be provisioned to provide a data
communication path between 6500 sites. If OSI is required for a remote
network element (for example, OM 3000), IISIS can be set up on a DCC.
For parameters not listed, use the default settings or leave blank.
Figure 1-38
DCN example 6 diagram—Standalone ARP
RADIUS OneControl
47.1.1.2/29 47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
DCN
Network
Subnet A
47.114.242.x/24
47.114.242.1/24
COLAN-X
47.114.242.2/24
NE2 NE3
/24 is 255.255.255.0
/29 is 255.255.255.248
47.114.242.3/32 47.114.242.4/32
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-28
DCN example 6—6500 DCN provisioning details
Table 1-28
DCN example 6—6500 DCN provisioning details (continued)
Table 1-28
DCN example 6—6500 DCN provisioning details (continued)
Table 1-28
DCN example 6—6500 DCN provisioning details (continued)
In this example, the proxy ARP GNE will proxy for the subtending RNEs and
the DCN-visible ILAN IP addresses. All of these addresses belong to the DCN
router subnet 47.134.10.0/24.
The key to this configuration is that the GNE COLAN-X interface must be
assigned a smaller subnet than the corresponding default gateway. However,
the COLAN-X subnet must be large enough to include the default gateway.
The numbered ILAN interface(s) must fall outside the COLAN-X subnet.
Details on this configuration follow.
Referring to Figure 1-39 on page 1-204, GNE1 would normally have a subnet
mask of 255.255.255.0 (/24) corresponding to the DCN router it is connected
to, but is instead given a mask of 255.255.255.128 (/25). This allows the
ILAN-OUT IP subnet of 47.134.10.220/30 to be assigned without causing
overlap, since it is outside the range of the COLAN-X port (47.134.10.0 to
47.134.10.127). Both the GNE1 COLAN-X subnet (47.134.10.126/25) and the
ILAN-OUT subnet still fall within the larger subnet of the DCN router interface
- 47.134.10.1/24. The COLAN-X subnet is large enough to include the DCN
router interface (default gateway).
If using numbered ILANs at non-GNE sites, the only requirement is that the
addresses belong to the DCN router subnet. In this example, the addresses
fall within the COLAN-X subnet of the GNE.
Table 1-29 on page 1-203 illustrates how the subnets are configured in this
example. The top line shows the entire DCN router subnet. By assigning the
smaller subnet mask to the COLAN-X interface, it belongs to the lower half of
the DCN router subnet. The ILAN subnet at Site-1, which includes the GNE
ILAN interface, belongs to the upper half of the DCN router subnet. The ILAN
subnet at Site-2 belongs to the COLAN-X subnet. (Note that this diagram is
not to scale.)
Table 1-29
DCN example 7—Subnet configuration
GNE1 is configured to proxy ARP for all RNE SHELF IP addresses and
the ILAN interface IP addresses (not the subnet or broadcast addresses).
Operationally, this configuration will result in non-standard traffic flows in
some cases. Specifically, if egress traffic from the GNE is trying to reach
the 47.134.10.128/25 subnet other than the ILAN subnets, it will first be
forwarded to the default gateway (DCN router interface) rather than being
sent directly to the destination host.
The internal routing protocol is not shown as it is not important for this
example. It could be IISIS or OSPF, or both. The default static route must
be distributed to the RNEs so that destination IP addresses located
externally can be reached.
Note that the same approach can be applied to a redundant ARP GNE
configuration if DCN-visible IP addresses are required on the GNE ILAN
interfaces.
Figure 1-39
DCN example 7 diagram—Subnet configuration
GNE1 RNE3
Shelf IP: 47.134.10.2/32 Shelf IP: 47.134.10.123/32
COLAN-X IP: 47.134.10.2/25
Site 1
ILAN-OUT IP
47.134.10.221/30
RNE1
Shelf IP: 47.134.10. 57/32 RNE2
Shelf IP: 47.134.10.122/32
Site 2
ILAN-OUT IP
47.134.10.101/30
Table 1-30
DCN example 7—6500 DCN provisioning details
ATTENTION
Spanning Tree does not handle uni-directional failures very elegantly. It is
highly recommended that an additional functionality be configured to cover
this deficiency (for example, VLACP).
• GNEs use proxy ARP and gratuitous ARP to notify external routers of the
RNE IP addresses for which they are providing gateway services.
• A GNE negotiates master/backup responsibilities for each IP in its proxy
IP table, individually. That is, the GNE may become master for one of the
IPs in its proxy list but may be backup for another IP in its Proxy list. A GNE
that is master for an IP provides DCN comms access to the RNE. A GNE
will always attempt to become master of its own COLAN IP.
ATTENTION
The Redundant ARP GNE configuration does not detect L2 failures (on your
L2 network), other than the COLAN port to the GNE being down.
• A static route must be provisioned at each GNE and the routing distributed
to the RNEs.
• The Redundant ARP GNE solution is designed to provide full comms DCN
availability when deployed in conjunction with a fully redundant external
customer DCN network. Thus ensuring that management systems (for
example, OneControl or Site Manager) maintain comms to the 6500
network under single failure conditions. The following are the
recommended network connections:
— Connect each GNE, of a managed section, to an Ethernet switch or
layer 2 network, that is connected to two routers on the Ethernet
domain. The routers and the GNEs are connected to the same IP
VLAN or LAN, with the two routers using VRRP (Virtual Router
Redundancy Protocol) or HSRP (Hot Standby Routing Protocol) to
provide a redundant default gateway for the GNEs.
— Use Auto-Negotiation on all COLAN Ethernet connections as this may
assist in detecting uni-directional failures of the Ethernet connection.
The ILAN ports can be used to connect to collocated network elements. For
more information, see “ILAN port IP address configuration rules” on
page 1-40.
The GNE that is the current master sends one L2 CARP message every 2 or
3 seconds for each RNE it is managing. In addition, each GNE sends one
CARP L2 message, for itself, every 1 second.
Every GNE must be configured with a default (or static) route with the next hop
as the gateway IP. This default route must be distributed to the RNEs using
OSPF. This route provides the comms path from the 6500 NEs to your DCN.
It should be noted that the RNEs receive the distributed default routes from all
the GNEs within the network (that is, not just the GNEs of their own managed
sections). The RNE store all these routes in its LSA database but the routing
table will select the one with the lowest cost. Generally, costs should be setup
to ensure that the outgoing packets stay on the same L2 network. This is
particularly important if you have IP filtering configured on your routers
(configured to reject packets that originate from unknown source IPs such as
source IPs from outside the expected subnet).
Within section B, NE4 and NE7 are provisioned with a default route pointing
to the customer DCN. These default routes are then distributed to the RNEs.
If NE4 is the preferred GNE, then it is desirable to provision the costs of the
redistributed default routes such that the one originating from NE4 always
gives the lowest cost and is therefore the preferred route. Under normal
operating conditions packets from section B are routed to NE4 and out the
COLAN of NE4 to your DCN.
Figure 1-40
Managed sections example 1
Customer DCN
Router configured to
only allow subnet Y
addresses through
Subnet Y Subnet X
Section A Section B
In the case when the COLAN of NE4 loses connectivity. NE4 detects link down
on the COLAN port and the default route associated with this interface is no
longer redistributed to the RNEs. The routing tables of the RNEs select the
next default route with the lowest cost. If the default route received by NE5
from NE3 is a lower cost than the one received at this same NE (NE5) from
NE7, then NE5 will route its outbound packets to NE3 and over subnet Y.
In Figure 1-41 on page 1-210, when the COLAN port to NE4 is down, NE5
selects the default route from NE3 because this route has a lower cost than
the route from NE7. The default route cost is the sum of the costs as
redistributed and the cost of links it must travel over. This will cause a problem
if the customer router connected to the COLAN of NE3 rejects packets that
originate from IP addresses that are outside the required subnet. One way to
avoid this scenario is to set the cost of the link between the two managed
sections high. For example, setting the link cost between NE3 and NE4 to 200
ensures NE5 always selects the default route from NE4 or NE7. This helps in
achieving the objective of containing comms internal messaging within a
managed section.
Figure 1-41
Managed sections example 2
Subnet Y Subnet X
10 10 10 10
NE3 NE4 NE5 NE6 NE7
Legend
10 = Link cost
= Outbound packet
flow from NE5
DOC considerations
DOC sends messages within a domain. When setting high link costs, ensure
that the overall cost of messaging within a DOC domain is not so high that
messages are routed out the COLAN using the customer DCN. DOC domains
are limited to 32 NEs.
Wayside as L2 network
When wayside is used as the L2 network, it needs to be configured such that
the number of L2 messages that are received by a GNE is contained at a
reasonable level (around 50 messages). This can be achieved by either:
• limiting the span of each wayside segment
• implementing VLANs
For parameters not listed, use the default settings or leave blank.
Figure 1-42
DCN example 8 diagram—Redundant ARP
RADIUS OneControl
47.1.1.2/24 47.1.1.1/24
Subnet: 47.1.1.0/24
47.1.1.3/24
DCN Network
47.2.1.4/24
47.1.1.4/24
L2 Network L2 Network
Section A Section B
Table 1-31
DCN example 8—6500 DCN provisioning details
Table 1-31
DCN example 8—6500 DCN provisioning details (continued)
2-slot shelves are not recommended as a NAT GNEs. Contact Ciena if you
require a 2-slot shelf to be configured as a NAT GNE.
ILAN ports can be used to connect to collocated network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
The internal routing protocol can be either IISIS or OSPF. When the internal
routing protocol is OSPF, OSI traffic cannot be routed through the network
element.
Photonic applications (for example, DOC) and TID consolidation require that
OSPF be used as the internal routing protocol. IISIS can be used on
DCC/GCC to provide data communications to remote OSI network elements.
Each GNE requires two public IP addresses - one for the COLAN port and one
allocated for access using its counterpart GNE. The management system
accesses a GNE by either using the COLAN port or the allocated SHELF IP
address through the other GNE. The management system must support two
IP addresses per network element.
Each remote network element is also allocated one public IP address for each
gateway network element (one for subnet A and one for subnet B). These IP
addresses are allocated but not provisioned. The NAT table is provisioned to
map these allocated IP addresses to the actual private SHELF IP addresses.
The NAT at the gateway network elements translates:
• the public IP addresses to private addresses (incoming packets)
• the Private-IP addresses to public IP addresses (outgoing packets)
CAUTION
SHELF IP address
The NAT tables and the proxy ARP range must not include
the SHELF IP address of the gateway network element on
which the NAT table and the proxy ARP range are
provisioned (but must include the other gateway network
element).
For systems without Photonic equipment, PPP is used as the data link layer
across the DCC/GCC for communication between the 6500 network
elements.
For systems with Photonic equipment, the OSC channel must be setup to
provide data communication between 6500 sites as Photonic applications
require it. OSPF runs on the OSC, IISIS is not supported on the OSC. GCC
and DCC channels should not be provisioned to provide a data
communication path between 6500 sites. If OSI is required for a remote
network element (for example, OM 3000), IISIS can be set up on a DCC.
• The 6500 NAT does not support a mixed configuration of nodes that use
NAT and those that do not use NAT. If NAT is used on the gateway network
element, all the subtending nodes from the gateway network element must
be added to the NAT table on the gateway network element. If a node is
not included in the NAT table, connections originated from that node to the
external DCN will fail.
ATTENTION
6500 NAT does not support provisioning of COLAN-A interface.
• 6500 NAT does not support passive FTP sessions where the client is the
subtending network element and the server is in the external DCN. If using
a dual GNE with NAT configuration, you must ensure that all subtending
network elements use active FTP only.
• The Prime parameter indicates whether the remote SHELF IP address is
used for mapping of incoming packets. Select Yes (default) if SHELF IP
address is used. Select No if IP addresses on other interfaces are used for
mapping of incoming packets (for example, an ILAN interface provisioned
with an IP address).
• If a 6500 network element has an ILAN port with a numbered IP address,
the NAT table must contain two entries. One entry maps the SHELF IP
address to the allocated external IP address, the other entry maps the
ILAN IP address to the same allocated external SHELF IP address. NAT
entries are not required for un-numbered ILAN ports (0.0.0.0).
• If intrusion detection is set to Source Based on certain comms
configuration (TL1 Gateway, Proxy ARP/NAT, and Private-IP) and
repeated intrusion attempts occur, the user with valid user IDs and
passwords can be locked out of the NEs. To avoid this, set the intrusion
detection to User Based instead of Source Based.
For parameters not listed, use the default settings or leave blank.
Figure 1-43
DCN example 9 diagram—Redundant NAT GNE configuration
OneControl
47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
Subnet A Subnet B
47.114.242.x/24 47.114.244.x/24
DCN
Network
COLAN-X 47.114.244.1/24
47.114.242.1/24 COLAN-X
47.114.242.2/24
47.114.244.2/24
GNE A with GNE B with
ARP proxy for ARP proxy for
IP addresses IP addresses
47.114.242.29 to NE1 NE4 47.114.244.28 to
47.114.242.31 47.114.244.30
NAT table for GNE A 20.2.1.2/32 20.2.1.5/32 NAT table for GNE B
47.114.242.29 -> 20.2.1.3 47.114.244.30 -> 20.2.1.2
47.114.242.30 -> 20.2.1.4 47.114.244.29 -> 20.2.1.3
47.114.242.31 -> 20.2.1.5 47.114.244.28 -> 20.2.1.4
NE2 NE3
/24 is 255.255.255.0
20.2.1.3/32 20.2.1.4/32
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-32
DCN example 9—6500 DCN provisioning details
Table 1-32
DCN example 9—6500 DCN provisioning details (continued)
Table 1-32
DCN example 9—6500 DCN provisioning details (continued)
Table 1-32
DCN example 9—6500 DCN provisioning details (continued)
This example (see Figure 1-44 on page 1-225) illustrates a redundant NAT
GNE configuration with a subtending shelf that includes a PKT/OTN XC circuit
pack (either single or pair). Refer to the generic redundant NAT example
(“DCN example 9—6500 GNE configuration - redundant NAT GNE
configuration” on page 1-215) for more general information on the redundant
NAT configuration. This example focuses on the Packet services aspects of
this GNE configuration.
Nodes running Packet services have two IP addressable entities: the shelf
interface and the PKT/OTN cross-connect. (The IP address pertains to the
PKT/OTN cross-connect entity, and not necessarily a specific XC circuit pack
in the dual XC case.) In a redundant NAT GNE configuration, these nodes
therefore require two private IP addresses and four public IP addresses (two
per GNE). Each GNE requires the corresponding NAT entries to translate
between the public and private addresses, and the Proxy ARP entry for the
public addresses. In terms of the GNE configuration, a PKT/OTN
cross-connect can be thought of as another subtending node in the network.
For syntax and usage of the interface route add command, refer to the
SAOS-based Packet Services Command Reference, 323-1851-610.
For parameters not listed, use the default settings or leave blank.
Figure 1-44
DCN example 10 diagram—Redundant NAT GNE configuration with nodes running Packet
services
Table 1-33
DCN example 10—6500 DCN provisioning details
Table 1-33
DCN example 10—6500 DCN provisioning details (continued)
Table 1-33
DCN example 10—6500 DCN provisioning details (continued)
Table 1-33
DCN example 10—6500 DCN provisioning details (continued)
2-slot shelves are not recommended as a NAT GNEs. Contact Ciena if you
require a 2-slot shelf to be configured as a NAT GNE.
ATTENTION
TL1 Gateway can be used to gain access to RNEs in order to make
provisioning changes and retrieve them. In order to do this, the Span of
Control (SOC) needs to be provisioned. The SOC is setup on the GNE (using
ENT-NE-LIST TL-1 command), and the TID of every RNE that the GNE can
connect to, is entered in the SOC.
The shelf IP addresses are private. The COLAN interface on the GNE has a
public address. The GNE distributes the static route to the RNEs.
Figure 1-45
DCN example 11 diagram—6500 Private-IP address
47.3.3.3 47.4.4.4
DCN
47.1.1.1
COLAN-X
GNE
Shelf
10.1.1.1
6500
RNE1 RNE2
Shelf Shelf
10.1.1.3 10.1.1.4
Legend
= Subnet 1: private IP, includes all NEs
Table 1-34
DCN example 11—6500 DCN provisioning details
Table 1-34
DCN example 11—6500 DCN provisioning details (continued)
Table 1-34
DCN example 11—6500 DCN provisioning details (continued)
Table 1-34
DCN example 11—6500 DCN provisioning details (continued)
Table 1-35
DCN example 11—6500 Reverse Port NAT provisioning parameters
Parameters (Note 1)
1 Provision Reverse Port NAT at GNE1
Port Type TCP TCP TCP
DCN Port (Note 2) 52052 52053 52054
RNE IP 10.1.1.2 10.1.1.3 10.1.1.4
RNE Port 23 23 23
Note 1: The example above is for Telnet access to remote NEs using Reverse Port NAT.
Reverse Port NAT entries also need to be created for any ports the user wants to access on
the remote NEs from the DCN. For a complete list of ports used by network elements see
Table 1-12 on page 1-88.
Note 2: These DCN port values assume the default NATBASEPORT value of 50000 is used.
Refer to “Reverse Port NAT” on page 1-87 or more information.
Table 1-36
DCN example 11—6500 TL1 Gateway provisioning parameters
Parameters GNE1 RNE1 RNE2
1 Provision TL1 Gateway
GNE Enable Disable Disable
RNE Disable Enable Enable
2-slot shelves are not recommended as a NAT GNEs. Contact Ciena if you
require a 2-slot shelf to be configured as a NAT GNE.
ATTENTION
TL1 Gateway can be used to gain access to RNEs in order to make
provisioning changes and retrieve them. In order to do this, the Span of
Control (SOC) needs to be provisioned. The SOC is setup on the GNE (using
ENT-NE-LIST TL-1 command), and the TID of every RNE that the GNE can
connect to, is entered in the SOC.
The shelf IP addresses are private. The COLAN interfaces on the GNEs have
public addresses. Both GNEs distribute the static route to the RNEs.
Figure 1-46
DCN example 12 diagram—6500 Private-IP address
Management
47.3.3.3
DCN
47.1.1.1 47.2.2.2
Private
Shelf
10.1.1.1
Shelf
Each GNE 10.1.1.2
distributes DCN
reachability info OSPF/iISIS
to the RNEs in
the private
network RNE1 RNE2
Shelf Shelf
10.1.1.3 10.1.1.4
Table 1-37
DCN example 12—6500 DCN provisioning details
Table 1-37
DCN example 12—6500 DCN provisioning details (continued)
Table 1-37
DCN example 12—6500 DCN provisioning details (continued)
Table 1-37
DCN example 12—6500 DCN provisioning details (continued)
Table 1-38
DCN example 12—6500 Reverse Port NAT provisioning parameters
Parameters (Note 1)
1 Provision Reverse Port NAT at GNE1
Port Type TCP TCP TCP
DCN Port (Note 2) 52052 52053 52054
RNE IP 10.1.1.2 10.1.1.3 10.1.1.4
RNE Port 23 23 23
2 Provision Reverse Port NAT at GNE2
Port Type TCP TCP TCP
DCN Port (Note 2) 52051 52053 52054
RNE IP 10.1.1.1 10.1.1.3 10.1.1.4
RNE Port 23 23 23
Note 1: The example above is for Telnet access to remote NEs using Reverse Port NAT.
Reverse Port NAT entries also need to be created for any ports the user wants to access on the
remote NEs from the DCN. For a complete list of ports used by network elements see Table 1-12
on page 1-88.
Note 2: These DCN port values assume the default NATBASEPORT value of 50000 is used.
Refer to “Reverse Port NAT” on page 1-87 or more information.
Table 1-39
DCN example 12—6500 TL1 Gateway provisioning parameters
2-slot shelves are not recommended as a NAT GNEs. Contact Ciena if you
require a 2-slot shelf to be configured as a NAT GNE.
ATTENTION
TL1 Gateway can be used to gain access to RNEs in order to make
provisioning changes and retrieve them. In order to do this, the Span of
Control (SOC) needs to be provisioned. The SOC is setup on the GNE (using
ENT-NE-LIST TL-1 command), and the TID of every RNE that the GNE can
connect to, is entered in the SOC.
Figure 1-47
DCN example 13 diagram—6500 Private-IP address
47.3.3.3 47.4.4.4
DCN
47.1.1.1
COLAN-X
GNE
Shelf
10.1.1.1
6500
RNE1 RNE2
Shelf Shelf
10.1.1.3 10.1.1.4
Legend
= Subnet 1: private IP, includes all NEs
Table 1-40
DCN example 13—6500 DCN provisioning details
Table 1-40
DCN example 13—6500 DCN provisioning details (continued)
Table 1-40
DCN example 13—6500 DCN provisioning details (continued)
Table 1-40
DCN example 13—6500 DCN provisioning details (continued)
Table 1-41
DCN example 13—6500 reverse port NAT provisioning parameters
Parameters (Note 1)
1 Provision reverse port NAT at GNE1
Port Type TCP TCP -
DCN Port (Note 2) 52052 52053 -
RNE IP 10.1.1.2 10.1.1.3 -
RNE Port 23 23 -
Note 1: The example above is for FTP access to the DCN for remove NEs. Reverse Port NAT entries
also need to be created for any ports the user wants to access on the remote NEs from the DCN. For a
complete list of ports used by network elements see Table 1-12 on page 1-88.
Note 2: These DCN port values assume the default NATBASEPORT value of 50000 is used. Refer to
“Reverse Port NAT” on page 1-87 for more information.
Table 1-42
DCN example 13—6500 TL1 Gateway provisioning parameters
DCN example 14—using single 6500 GNE with IISIS through 6500 network
to reach remote 6130 network elements
In this example (refer to Figure 1-48 on page 1-250 and Figure 1-49 on
page 1-251), a single 6500 network element is used as the GNE to establish
communication between the external DCN and the 6130 and the 6500
network elements.
The remote 6130 NEs are provisioned as proxy ARP neighbors at the 6500
GNE.
ATTENTION
For parameters not listed, use the default settings.
Figure 1-48
DCN example 14 diagram—Single 6500 GNE with IISIS to remote 6130 NEs
OneControl R1 IP
IP and R2
OSI DCN
61x0
C
Legend
= iIS-IS/OSI/LAPD/DCC
= iIS-IS/IP/PPP/DCC
= OSPF/IP/PPP/DCC
= IP/GRE/OSI
= OSI
= Static IP route/IP/PPP/DCC
61x0 = 6110 or 6130
Figure 1-49
DCN example 14 diagram—IP logical view
Legend
= IP connection
= Static/Default routing
Table 1-43
DCN example 14—6130 DCN provisioning details
Table 1-44
DCN example 14—6500 DCN provisioning details
Table 1-44
DCN example 14—6500 DCN provisioning details (continued)
Table 1-45
DCN example 14—Router and OneControl DCN provisioning details
Parameters Router 1 Router 2 OneControl
1 Set up IP address
Interface: - - -
IP address 47.1.1.1 47.1.3.1 -
Netmask /29 /29 -
Interface: - - -
IP address - - 47.1.1.5
Netmask - - /29
Default gateway - - 47.1.1.1
Circuitless IP:
IP address 47.1.1.128 47.1.1.129 -
Netmask /32 /32 -
2 Set up IP routing
Global OSPF enable Yes Yes -
OSPF area 0.0.0.0 0.0.0.0 -
Ethernet OSPF enable Yes Yes -
OSPF area 0.0.0.0 0.0.0.0 -
DCN example 15—using single 6500 GNE with IISIS to reach remote 6130
network elements in a SNCP/UPSR ring configuration with generic
SDH/SONET equipment
In this example (see Figure 1-50 on page 1-256, Figure 1-51 on page 1-257,
and Figure 1-52 on page 1-258), a single 6500 network element is used as the
GNE to establish communication between the external DCN and the 6130
within a SNCP/UPSR ring with generic SONET/SDH equipment (such as
OM 3000, OM 4000, and TN-1C network elements).
The remote 6130 NEs are provisioned as proxy ARP neighbors at the 6500
GNE.
ATTENTION
For parameters not listed, use the default settings.
Figure 1-50
DCN example 15 diagram—Single 6500 with IISIS to reach remote 6130 NEs in SNCP/UPSR with
generic SDH/SONET equipment
OSI and
OneControl R1 IP DCN
IP
R2
IP
OSI area (for example, 0002)
6500
61x0 H
A
XXX
F
6500
61x0
RS DCC G
B
XXX
C
Legend
= iIS-IS/OSI/LAPD/DCC
= iIS-IS/IP/PPP/DCC
= OSPF/IP/PPP/DCC
= IP/GRE/OSI
= OSI
= Static IP route/IP/PPP/DCC
61x0 = 6110 or 6130
Figure 1-51
DCN example 15 diagram—IP logical view
61x0 A
6500 H
61x0 B
Legend
= IP connection
= Static/Default routing
Figure 1-52
DCN example 15 diagram—IISIS / ISIS logical view
OneControl R1
OSI
OSI and R2
IP DCN
6500
H
61x0
RS DCC A XXX
F
6500
G
61x0
B
XXX
C
Legend
= OSI connection
= iISIS/ISIS routing between NEs
61x0 = 6110 or O6130
Table 1-46
DCN example 15—6130, 6500, and OSI NE DCN provisioning details
Static routing 1
Address 0.0.0.0 0.0.0.0
Netmask /0 /0
Next hop IP address 0.0.0.0 0.0.0.0
Next hop interface AGRE AGRE
Advertise No No
3 Set up IISIS (nodal level)
IISIS Enable: Enable Enable
MAA 1 490000 490000
MAA 2 - -
MAA 3 - -
4 Set up DCC
Interface 1: STM/OC P1 STM/OC P1 S-5-1 S-5-1 S-5-1 S-5-1
Protocol LAPD PPP LAPD LAPD LAPD PPP
MTU 512 1518 512 512 512 1500
IISIS Enable Enable Yes Yes
Interface 2 STM/OC P2 STM/OC P2 S-6-1 S-6-1 S-6-1 S-6-1
Protocol PPP LAPD LAPD LAPD PPP LAPD
MTU 1518 512 512 512 1500 512
IISIS Enable Enable Yes Yes
Interface 3 - - - S-1-1 - -
Protocol - - - LAPD - -
MTU - - - 512 - -
Interface 4 - - - S-2-1 - -
Protocol - - - LAPD - -
MTU - - - 512 - -
Table 1-46
DCN example 15—6130, 6500, and OSI NE DCN provisioning details (continued)
Table 1-47
DCN example 15—Router and OneControl DCN provisioning details
In this example, The EC-1 management site is used to tunnel the OSI data
over IP to the single gateway 6500 network element. The gateway 6500
network element de-encapsulates the OSI packets which are then routed
through the other 6500 network elements as native OSI packets to the
OM 4000 network elements.
ATTENTION
Refer to the appropriate EC-1 engineering guidelines in the “24xDS3/EC-1
working and protection” section of the “Electrical circuit packs and I/O
panels” chapter in Electrical Circuit Packs, 323-1851-102.2, to verify the
number of tunnels supported and the number of subtended NEs supported
by a tunnel.
Each 6500 network element is assigned a SHELF IP address from the same
subnet. The COLAN interface on the gateway network element is assigned an
IP address in the same subnet of the router port connected to the gateway
network element. Each SHELF IP address is visible within the external DCN.
The example assumes all network elements are in the default 49000 MAA.
The DCC interfaces between the 6500 network elements are configured for
PPP. The DCC interfaces on the 6500 network element connecting to the
OM 4000 network elements are configured for LAPD, as OSI is used.
For parameters not listed, use the default settings or leave blank.
Figure 1-53
DCN example 16 diagram—Managing OM 4000 through 6500 with IP only external DCN
EC-1
OneControl
48.1.1.2/29
Tunnel Terminating IP
48.1.1.1/29 Addresses (EC-1 and 6500)
IP 48.1.1.2 and 48.1.1.13
R2
48.1.1.3/29
48.1.1.9/30
IP Only DCN
OSPF Area 0
R1
48.1.1.14/30
OSPF
COLAN Area 1
48.1.1.13/30
NE1
48.1.1.41/32
iISIS routing 48.1.1.43/32
of IP and CLNP
NE2 over DCC
NE3 NE5
NE4 NE6
OM4000
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-48
DCN example 16—6500 DCN provisioning details
Table 1-48
DCN example 16—6500 DCN provisioning details (continued)
Table 1-48
DCN example 16—6500 DCN provisioning details (continued)
Table 1-48
DCN example 16—6500 DCN provisioning details (continued)
In the example, NE2 (47.1.3.2) identifies that there is an OSI only network
portion between it and the destination network element. If an IP packet
destined for NE4 (47.1.3.4) arrives at NE2, NE2 encapsulates (auto-tunnels)
the IP information in an OSI PDU. The OSI PDU destination address will be
the OSI of NE4. All intermediate OM 4000 network elements and 6500
network elements will route the packet using IISIS routes to the destination.
Similarly, IP packets forwarded toward NE2 from NE4 will have an OSI PDU
destination address of NE2.
This example uses the flat DCN model therefore public IP addresses are used
for the 6500 SHELF addresses which are visible in the external DCN.
The DCC interfaces between the 6500 network elements are configured for
PPP. The DCC interfaces on the 6500 network element connecting to the OM
4000 network elements are configured for LAPD, as OSI is used.
Table 1-49 on page 1-269 details the DCN parameters for the 6500 network
elements in the DCN for this DCN example configuration. For general
provisioning guidelines, see “General DCN provisioning rules” on page 1-97.
For parameters not listed, use the default settings or leave blank.
Figure 1-54
DCN example 17 diagram—Managing 6500 through non-6500 network
OneControl EC-1
47.1.1.1/24 47.1.1.2/24
DGW 471.1.254/24 DGW 47.1.1.254/24 OSI
IP OSI Area A
OSPF 47.1.1.254/24
Area 39.x..x.000A
0000 R3 L2 47.1.2.3/32
L2 L2
47.1.2.1/32 L1/L2 47.1.2.2/32
39.x..x.000B L2
L2 L2 39.x..x.000B Dual homed
R1 R2 leased bandwidth
47.1.2.4/32 47.1.2.5/32
39.x..x.000B L1 R4 R5 L1
39.x..x.000B
47.1.2.18/28 47.1.2.34/28
OSI OSI
OSPF
Area IP IP
0001
COLAN-X COLAN-X
47.1.2.17/28 47.1.2.33/28 COLAN-A
COLAN-A OSI Area B
NE1 L1 NE3
L1 L1
47.1.3.1/32 47.1.3.3/32
39.x..x.000B iISIS routing 39.x..x.000B
of IP and CLNP
6500 over DCC
NE2
L1
47.1.3.2/32
OM4000 39.x..x.000B ISIS routing
(or any OSI based NE) of CLNP over DCC.
IP is tunneled. L1 39.x..x.000B
OSI Area B
/24 is 255.255.255.0
L1
/28 is 255.255.255.240 39.x..x.000B
L1
/29 is 255.255.255.248
/32 is 255.255.255.255 NE4
39.x..x.000B L1 39.x..x.000B
47.X.X.X = IP address
39.x.x.0000 = OSI area address
47.1.3.4/32
Table 1-49
DCN example 17—6500 DCN provisioning details
Table 1-49
DCN example 17—6500 DCN provisioning details (continued)
Table 1-49
DCN example 17—6500 DCN provisioning details (continued)
In this example, the OM 3500 head-end network element with the network
processor (NP) is collocated with the gateway 6500 network element (NE1)
which also has a COLAN connection to the external DCN.
The 6500 network elements forward the OSI only traffic between the OM 3500
head-end network element and the OM 3500 network element subtended
from the 6500 network element (NE3).
To provide address isolation in this example, DCN tunnels are used between
routers connected to the management systems (for example, OneControl)
and the routers connected to the 6500 gateway network element. All traffic
to/from the 6500 network elements and the management systems are in the
tunnels. Private-IP addresses are used for the 6500 SHELF IP addresses
which are not visible in the external DCN. The ILAN interface used to connect
to the OM 3500 head-end network element does not require an IP address.
The DCC interfaces between the 6500 network elements are configured for
PPP. The DCC interfaces on the 6500 network element connecting to the
OM 3000 network elements are configured for LAPD, as OSI is used.
For parameters not listed, use the default settings or leave blank.
Figure 1-55
DCN example 18 diagram—Managing OM 3500 through 6500
MOA
OneControl
10.6.1.2/29
10.6.1.1/29
Subnet: 10.6.1.0/29
10.6.1.3/29 R2
48.3.3.1/30
Carrier
Access
DCN
48.2.2.1/30
48.1.1.14/29 R1
COLAN
NE1 48.1.1.15/29
COLAN ILAN ILAN
OM3500
48.1.1.13/29 with NP
10.5.1.1/32
iISIS routing 10.5.1.3/32
of IP and CLNP
NE2 over DCC
NE3
OM3500
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-50
DCN example 18—6500 DCN provisioning details
Table 1-50
DCN example 18—6500 DCN provisioning details (continued)
Table 1-50
DCN example 18—6500 DCN provisioning details (continued)
DCN example 19—6500 MSPP and Photonics with OM 3500, using both
OSPF and IISIS
This example (refer to Figure 1-56 on page 1-279), illustrates how a network
consisting of 6500 MSPP and Photonics, along with OM 3500 network
elements, is configured using both OSPF and IISIS to provide the required
management visibility and support the internal Photonics applications.
The OM 3500 head-end network element (NE1) with the network processor
(NP) is connected with the gateway 6500 network element (NE1) over DCC,
and NE1 also has a COLAN connection to the external DCN. 6500 NE1 is
configured as a proxy-ARP GNE (optional, but used in this example) to
support IP communications to the subtending 6500 shelves. The OM 3500 NP
provides access to the subtending OM 3500 NE2 via TL1 Gateway.
IISIS is configured on the OC-192 links that form the five node ring, which
includes 6500 NE1, 6500 NE2, 6500 Photonic AMP, 6500 MSPP, and
OM 3500 NE2; and on the link between OM 3500 NE1 and 6500 NE1. (If the
6500 and OM 3500 NEs are co-located, then ILAN could be used instead of
IISIS.) This forms an OSI network, which supports the OM 3500, allowing
access to OM 3500 NE2 from the NP on OM 3500 NE1 via TL1 Gateway.
Since the OM 3500 supports only LAPD, SDCC links between the 6500 and
OM 3500 are configured with LAPD. 6500-to-6500 links are configured with
PPP.
OSPF is configured on 6500 NE1, 6500 NE2 and the 6500 Photonic AMP, and
runs across the OSC to support Photonics. The SHELF IP addresses for 6500
NE1 and 6500 NE2 each require both an OSPF and an IISIS circuit.
At both 6500 NE1 and 6500 NE2, the SHELF IP address of the 6500 Photonic
AMP is redistributed into IISIS to provide resilient communications between
those shelves and the amplifier shelf in case of fiber breaks.
For parameters not listed, use the default settings or leave blank.
Figure 1-56
DCN example 19 diagram—Mixed routing protocol (OSPF and IISIS) in same shelf
Table 1-51
DCN example 19—6500 DCN provisioning details
Table 1-51
DCN example 19—6500 DCN provisioning details (continued)
Table 1-51
DCN example 19—6500 DCN provisioning details (continued)
Table 1-51
DCN example 19—6500 DCN provisioning details (continued)
Table 1-51
DCN example 19—6500 DCN provisioning details (continued)
Table 1-51
DCN example 19—6500 DCN provisioning details (continued)
Each 6500 network element is assigned a SHELF IP address from the same
subnet. The COLAN interface on the gateway network element is assigned an
IP address in the same subnet of the router port connected to the gateway
network element.
The default gateway of the OM 3500 NP must be in the same subnet as the
OM 3500 NP COLAN IP address. In this example, the OM 3500 COLAN IP
address and default gateway are in the same subnet as the 6500 network
element connected to it. The COLAN port and IP address of the NP must be
provisioned before the GRE tunnel.
In this example, OSPF routing is used to connect to the OSPF backbone area
(0.0.0.0). OSPF in different areas, static routes, static routes with proxy ARP,
and static routes with proxy ARP/NAT can also be used if required. Refer to
the relevant examples in this chapter for more information on these other
configurations. Proxy ARP can be used on 6500 NE1 instead of a static route
on R1 to advertise the OM 3500 to the DCN if OSPF is not used.
The DCC interfaces between the 6500 network elements are configured for
PPP. The DCC interfaces on the 6500 network element connecting to the
OM 3000 network elements are configured for LAPD, as OSI is used.
For parameters not listed, use the default settings or leave blank.
The GRE tunnel must be provisioned with the destination address of the
NSAP of the 6500 network element (490000006038DF9B3E00 in the
example in Figure 1-57 on page 1-287).
Figure 1-57
DCN example 20 diagram—Managing OM 3500 through 6500 using a GRE tunnel
MOA
OneControl
10.6.1.2/29
10.6.1.1/29
Subnet: 10.6.1.0/29
10.6.1.3/29 R2
Carrier
Access
DCN
48.1.1.14/29 R1
NE1
COLAN
48.1.1.13/29
IP over OSI
GRE tunnel
10.5.1.1/32 4900000060
iISIS routing 38df9b3e00 OM3500
of IP and CLNP with NP
COLAN
NE2 over DCC 10.5.1.4/29
NE3
4900000000
10.5.1.3/32 75de3d9a00
10.5.1.2/32
iISIS routing
6500 of CLNP
over DCC
OM3500
/29 is 255.255.255.248
/30 is 255.255.255.252
/32 is 255.255.255.255
Table 1-52
DCN example 20—6500 DCN provisioning details
Table 1-52
DCN example 20—6500 DCN provisioning details (continued)
Table 1-52
DCN example 20—6500 DCN provisioning details (continued)
Figure 1-58
DCN example 21 diagram—Auto-tunneling over DCC
EMS
47.1.1.1/24
DGW 47.1.1.254/24
47.1.1.254/24
R2 47.1.2.3/32
OSPF
COLAN-X Area
47.1.2.17/28 0001
NE1 DCC
47.1.3.1/32
OSI
Network Element
6500
DCC DCC
/24 is 255.255.255.0 iISIS
/28 is 255.255.255.240
/32 is 255.255.255.255
Figure 1-59
DCN example 21 diagram—Auto-tunneling over the LAN
EMS
47.1.1.1/24
DGW 47.1.1.254/24
47.1.1.254/24
R2 47.1.2.3/32
R1 47.1.2.1/32
47.1.2.18/28
IP and OSPF
OSPF
COLAN-X Area
47.1.2.17/28 0001
NE1 ILAN 47.1.2.19/28
47.1.3.1/32
OSI
Network
Element
6500
DCC DCC
/24 is 255.255.255.0 iISIS
/28 is 255.255.255.240
/32 is 255.255.255.255
IP over OSI
Autotunnel NE2
47.1.3.2/32
For OSI Area 1, the DCC from/to the 6500 gateway network element is
transparently connected on the HDX (which is in OSI Area 2) to the
subtending 6500 rings. A separate OCn/STMn connection is available on the
6500 gateway network element to each subtending ring, therefore the DCC is
transparently connected directly through the HDX.
For OSI Area 2, the 6500 network elements are in the same OSI area as the
HDX therefore IP over OSI auto-tunnels are created over the LAN and the
DCC (see “DCN example 21—auto-tunneling” on page 1-291 for details).
For OSI Area 3, the DCC from/to the 6500 gateway network element is
transparently connected on the HDX (which is in OSI Area 2) to the
subtending 6500 rings. As there is not an separate OCn/STMn connection
from the 6500 gateway network element to each of the subtending rings, the
DCC is daisy-chained between the subtending rings on the HDX so that all the
6500 network elements have DCC connectivity to the 6500 gateway network
element.
Figure 1-60
DCN example 22 diagram—6500/HDX interworking using HDX DCC transparency and multiple OSI
areas
EMS
47.1.1.1/24
DGW 47.1.1.254/24
R2 47.1.1.254/24
47.1.2.3/32
R1
47.1.2.18/28
OSI 1
OSI 2 OSI 3
OSPF IP
Area
0001 COLAN-X
COLAN-X COLAN-A
47.1.2.20/28 47.1.2.21/28
COLAN-X COLAN-A COLAN-A
47.1.2.17/28 47.1.4.2/32
39...0002
NE1 ILAN NE2 47.1.5.3/32
47.1.3.1/32 39...0003
39...0001 HDX
39...0002 NE3
OC-n/STM-n connection Single OC-n/STM-n
to HDX required for each connection to HDX
subtended ring required with DCC
daisy-chained between
rings on HDX
47.1.5.9/32
47.1.3.4/32 39...0003
39...0001
NE4 NE9
47.1.5.8/32
47.1.3.5/32 39...0003
NE5 39...0001 47.1.4.6/32 47.1.4.7/32 NE8
39...0002 39...0002
NE6 NE7
6500
/24 is 255.255.255.0
DCC over optical /28 is 255.255.255.240
/32 is 255.255.255.255
IP over OSI autotunnel
Transparent DCC connection
DCN example 23—using OSPF with two 6500 gateway network elements
connected to OSPF backbone with collocated CPL network elements
In this example (see Figure 1-61 on page 1-297), two 6500 network elements
are connected to the OSPF backbone and act as the gateway network
element for the other 6500 network elements. The gateway network elements
look like OSPF routers in the DCN. OSPF is used on the COLAN interface of
gateway network elements for integration with the external DCN. The COLAN
ports must be in the same area and have the same configuration as the DCN
router. For more information on 6500 and CPL interworking, see “DCN design
examples” on page 1-153.
ILAN ports are used to connect to collocated CPL network elements. For more
information, see “ILAN port IP address configuration rules” on page 1-40.
In this example, the internal routing protocol is OSPF. When the internal
routing protocol is OSPF, OSI traffic cannot be routed through the network
element.
The overall design must ensure that only packets meant for the 6500 network
elements are routed over the DCC/GCC and not other DCN traffic. The 6500
network elements send/receive all routes to/from the DCN.
Each 6500 network element is assigned a SHELF IP address from the DCN
address space. The COLAN interface on the gateway network elements are
assigned an IP address in the same subnet of the router port connected to the
gateway network element. Each SHELF IP address is visible within the
external DCN. The ILAN IN ports are assigned an IP address in the same
subnet as the ILAN port on the CPL to which it is connected.
PPP is used as the data link layer across the DCC/GCC for communication
between the 6500 network elements or between the 6500 network elements
and the CPL network elements.
For parameters not listed, use the default settings or leave blank.
Figure 1-61
DCN example 23 diagram—Using OSPF with two 6500 gateway network elements connected to
the OSPF backbone with collocated CPL network elements
RADIUS OneControl
47.1.1.2/29 47.1.1.1/29
Subnet: 47.1.1.0/29
47.1.1.3/29
ILAN1 ILAN1
47.114.239.229/30 47.114.239.238/30
ILAN2 ILAN1
47.114.239.233/30 47.114.239.234/30
NE7 NE8
47.114.249.117/32 47.114.249.118/32
6500
/29 is 255.255.255.248
/30 is 255.255.255.252 CPL
/32 is 255.255.255.255
Table 1-53
DCN example 23—6500 DCN provisioning details
Table 1-53
DCN example 23—6500 DCN provisioning details (continued)
Table 1-53
DCN example 23—6500 DCN provisioning details (continued)
The example in Figure 1-62 on page 1-303 only details the IP telephony
requirements and does not detail the management requirements which must
be set up as required using the other examples in this chapter as a basis.
The ILAN-IN interfaces on the remote 6500 network elements are connected
to the IP telephone and are assigned Private-IP addresses in the same subnet
as the IP telephone. Static routes are provisioned on the remote 6500 network
elements to the IP telephones, the static routes are redistributed in the IISIS
router.
At the VoIP server, static routes are provisioned to each of the 6500 network
elements.
Signaling traffic is routed between each IP telephone and the VoIP server
whilst the voice traffic is routed between the IP telephones used in the call.
ATTENTION
It is recommended that only one telephone call be made on the network at
the same time.
Table 1-54 on page 1-304 details the DCN parameters for the 6500 network
elements in the DCN for the configuration outlined in this DCN example. For
general provisioning guidelines, see “General DCN provisioning rules” on
page 1-97.
For parameters not listed, use the default settings or leave blank.
ATTENTION
The following example configuration is for information only. Contact your
Ciena account prime if information is required on engineering a real-life VoIP
solution.
Figure 1-62
DCN example 24 diagram—VoIP orderwire
VoIP server
10.10.12.0 (VoIP server)
Static routes:
10.0.1.0/24 next hop 10.10.11.5
IP telephone A 10.0.2.0/24 next hop 10.10.11.5
Ext: 19148
10.10.11.1 10.0.3.0/24 next hop 10.10.11.5
IP: 10.0.3.4
Gateway: 10.0.3.2
10.10.11.5/24
IP: 10.0.3.3 Static route:
IP router
10.10.12.0/32
IP telephone B IP: 10.0.3.2 next hop 10.10.11.1
Ext: 19146 RIP:
IP: 10.0.1.3 10.0.3.0/24
Gateway: 10.0.1.1 10.10.11.0/24
ILAN
10.0.1.1/24 COLAN-X
10.0.3.1/24
NE2 NE1
NE3
ILAN
10.0.2.1/24
IP telephone C /24 is 255.255.255.0
Ext: 19147 /32 is 255.255.255.255
IP: 10.0.2.3
Gateway: 10.0.2.1
Table 1-54
DCN example 24—6500 DCN provisioning details
ATTENTION
The following example purposefully avoids using the term OSPF AS
(autonomous system) in the context of DBRS. The generic term “OSPF
network” is henceforth used in the DBRS context to describe a contiguous
OSPF network, consisting of network elements and routers, in which opaque
LSAs are flooded using OSPF. An OSPF network:
• may or may not correspond to an OSPF autonomous system.
• can describe a single OSPF area or a hierarchical OSPF network,
including a backbone area (0.0.0.0).
• may or may not include customer DCN equipment depending on whether
opaque LSAs are enabled on the interfaces connected to the customer
DCN.
Figure 1-63
DCN example 25 diagram—Mesh network
network-2 network-4
network-1 network-3
In this example, the DCN designer has determined that using a single
multi-area OSPF network to provide a solution is not appropriate for this
network/customer. Therefore this design uses DBRS at each site that has
more than one OSPF network so that AR and TR data can be shared between
the networks. A maximum of three OSPF networks can be provisioned at a
DBRS-enabled site. In this case, Site A has three OSPF networks.
The provisioning data for Site A within the example network is given below.
Figure 1-64
DCN example 25 diagram—Site A details
OSPF
Network 1
Shelf 1
DB
RS RS
DB
OSPF iISIS OSPF
Network 3 Shelf 3 Shelf 2 Network 2
DBRS
Each shelf has two unnumbered ILAN connections running IISIS and with
DBRS enabled.
In this example, the external DCN connectivity is not shown; and therefore
assumes that the external DCN connectivity solution does not support the
shelf-to-shelf communications required at branching sites. Therefore, IISIS on
the ILAN ports provides IP routing redundancy between the shelves in the
TIDc. The SHELF IP address on each shelf is redistributed into IISIS so that
it is visible at the other shelves. This provides connectivity at the TIDc.
However, since there is only a single DBRS link between any two OSPF
networks and since DBRS only exchanges AR and TR data with adjacent
networks, there is no DBRS redundancy.
Table 1-55
DCN example 25—DBRS provisioning details
Parameters Shelf 1 Shelf 2 Shelf 3
SHELF IP
Address 10.6.1.1 10.6.2.1 10.6.3.1
Subnet mask 255.255.255.255 255.255.255.255 255.255.255.255
ILAN IN IP
Address 0.0.0.0 0.0.0.0 0.0.0.0
Subnet mask 255.255.255.255 255.255.255.255 255.255.255.255
ILAN OUT IP
Address 0.0.0.0 0.0.0.0 0.0.0.0
Subnet mask 255.255.255.255 255.255.255.255 255.255.255.255
OSPF Router
Router ID 10.6.1.1 10.6.2.1 10.6.3.1
Router redistribution none none none
OSPF Circuits
SHELF-1: Network Area 0.0.0.1 NA NA
OSC-1-x-1: Network Area 0.0.0.1 NA NA
SHELF-2: Network Area NA 0.0.0.2 NA
OSC-2-x-1: Network Area NA 0.0.0.2 NA
OSC-2-x-2: Network Area NA 0.0.0.2 NA
SHELF-3: Network Area NA NA 0.0.0.3
OSC-3-x-1: Network Area NA NA 0.0.0.3
OSC-3-x-2: Network Area NA NA 0.0.0.3
IISIS Router:
Router level Level-1 Level-1 Level-1
L1 priority 64 64 64
Router summarization On On On
Router redistribution OSPF distribution OSPF distribution OSPF distribution
IP subnet 10.6.1.1 10.6.2.1 10.6.3.1
Subnet mask 255.255.255.255 255.255.255.255 255.255.255.255
IISIS Circuits:
ILAN-x-IN Default values Default values Default values
ILAN-x-OUT Default values Default values Default values
Database Replication:
ILAN-x-IN
Address resolution Enabled Enabled Enabled
Topology resolution Enabled Enabled Enabled
ILAN-x-OUT
Address resolution Enabled Enabled Enabled
Topology resolution Enabled Enabled Enabled
Since this example includes a consolidated TID and since it is assumed that
DOC (domain optical control) is running across the optical line, IPv4
provisioning is also required for internal communications. However, IPv4 is not
required on the COLAN interfaces as IPv6 is used for north-south
management communications.
Only the IPv6 provisioning is shown in the diagram for simplicity, but the
provisioning matrix shows example IPv4 provisioning.
For illustrative purposes, the OSPFv2 and OSPFv3 area IDs are shown with
different values in the provisioning matrix. They could also be configured with
the same values, as OSPFv2 and OSPFv3 have no interaction. The OSPFv2
and v3 router IDs are set to the same value as a recommended best practice
to allow for easier planning and tracking of a given shelf.
Table 1-56 on page 1-309 details the DCN parameters for the 6500 network
elements in the DCN for the configuration outlined in this DCN example. For
general provisioning guidelines, see “General DCN provisioning rules” on
page 1-97.
For parameters not listed, use the default settings or leave blank.
Figure 1-65
DCN example 26 diagram—DCN LAN drop to every shelf
Table 1-56
DCN example 26—6500 DCN provisioning details
Table 1-56
DCN example 26—6500 DCN provisioning details (continued)
Table 1-56
DCN example 26—6500 DCN provisioning details (continued)
Redistribution NA NA NA NA
Type
Since this example includes a consolidated TID and since it is assumed that
DOC (domain optical control) is running across the optical line, IPv4
provisioning is also required for internal communications. However, IPv4 is not
required on the COLAN interfaces as IPv6 is used for north-south
management communications.
Only the IPv6 provisioning is shown in the diagram for simplicity, but the
provisioning matrix shows example IPv4 provisioning.
One or more static routes are added to the router in the external DCN to reach
remote network elements through the GNE. If shelf IP addresses are
assigned from a common prefix (for example, /64), only a single static route
pointing to that prefix is necessary.
Likewise, one or more static routes are added on the GNE pointing to external
management destinations and are redistributed into the internal routing
domain.
This configuration avoids the use of routing protocols between the 6500
network elements and the external DCN, but requires configuration changes
in the external DCN router and does not provide redundant access to the 6500
network in case of DCN or COLAN failure.
For illustrative purposes, the OSPFv2 and OSPFv3 area IDs are shown with
different values in the provisioning matrix. They could also be configured with
the same values, as OSPFv2 and OSPFv3 have no interaction. The OSPFv2
and v3 router IDs are set to the same value as a recommended best practice
to allow for easier planning and tracking of a given shelf.
Table 1-57 on page 1-313 details the DCN parameters for the 6500 network
elements in the DCN for the configuration outlined in this DCN example. For
general provisioning guidelines, see “General DCN provisioning rules” on
page 1-97.
For parameters not listed, use the default settings or leave blank.
Figure 1-66
DCN example 27 diagram—Statically routed GNE configuration
Table 1-57
DCN example 27—6500 DCN provisioning details
Table 1-57
DCN example 27—6500 DCN provisioning details (continued)
Table 1-57
DCN example 27—6500 DCN provisioning details (continued)
Since this example includes a consolidated TID and since it is assumed that
DOC (domain optical control) is running across the optical line, IPv4
provisioning is also required for internal communications. However, IPv4 is not
required on the COLAN interfaces as IPv6 is used for north-south
management communications.
Two IPv6 static routes are defined on the GNE shelf, one for each of the
management subnets, and redistributed into OSPF. Note that for IPv6, the
redistribution is specified as part of the IPv6 static route provisioning, unlike
IPv4 where it is done via a separate provisioning step.
Only the IPv6 provisioning is shown in the diagram for simplicity, but the
provisioning matrix shows example IPv4 provisioning.
For illustrative purposes, the OSPFv2 and OSPFv3 area IDs are shown with
different values in the provisioning matrix. They could also be configured with
the same values, as OSPFv2 and OSPFv3 have no interaction. The OSPFv2
and v3 router IDs are set to the same value as a recommended best practice
to allow for easier planning and tracking of a given shelf.
Table 1-58 on page 1-317 details the DCN parameters for the 6500 network
elements in the DCN for the configuration outlined in this DCN example. For
general provisioning guidelines, see “General DCN provisioning rules” on
page 1-97.
For parameters not listed, use the default settings or leave blank.
Figure 1-67
DCN example 28 diagram—IPv6 ND Proxy GNE configuration
Table 1-58
DCN example 28—6500 DCN provisioning details
Parameters Site 1, Shelf-1 Site 2, Shelf-1 Site 2, Shelf-2 Site 3, Shelf-1
IPv4 IPv6 IPv4 IPv6 IPv4 IPv6 IPv4 IPv6
1 GNE provisioning
Configuration Standalone
Access ND Proxy
2 Set up IP address
COLAN 2001:db8:
1234:aaaa
::2/64
Shelf 192.168.93. 2001:db8: 192.168.95. 2001:db8: 192.168.62. 2001:db8: 192.168.63. 2001:db8:
1/32 1234:aaaa 12/32 1234:aaaa 16/32 1234:aaaa 10/32 1234:aaaa
::2/128 ::abc2/128 ::abc3/128 ::abc4/128
OSC ::/128 ::/128 ::/128 ::/128
ILAN-IN 0.0.0.0/32 ::/128
ILAN-OUT 0.0.0.0/32 ::/128
Table 1-58
DCN example 28—6500 DCN provisioning details (continued)
Parameters Site 1, Shelf-1 Site 2, Shelf-1 Site 2, Shelf-2 Site 3, Shelf-1
IPv4 IPv6 IPv4 IPv6 IPv4 IPv6 IPv4 IPv6
3 OSPF router provisioning
OSPF router 192.168.93.1 192.168.93.1 192.168.95. 192.168.95 192.168.62. 192.168.62 192.168.63. 192.168.
ID 12 .12 16 .16 10 63.10
Route ON NA ON NA ON NA ON NA
Summarization
Autonomous OFF NA OFF NA OFF NA OFF NA
System Border
Router
Opaque Filter OFF NA OFF NA OFF NA OFF NA
Shelf OFF NA OFF NA OFF NA OFF NA
Re-distribution
Table 1-58
DCN example 28—6500 DCN provisioning details (continued)
Parameters Site 1, Shelf-1 Site 2, Shelf-1 Site 2, Shelf-2 Site 3, Shelf-1
IPv4 IPv6 IPv4 IPv6 IPv4 IPv6 IPv4 IPv6
ILAN-OUT
Area 0.0.0.1 1.2.3.4
Cost 10 10
Opaque ON
ON/OFF
5 Static route provisioning
IP destination 2620:db8:
1234:1111
::/64
Mask (IPv4)
Next hop 2001:db8:
1234:aaaa
::1
Cost 100
Circuit ID COLAN-X
Redistribution See Route OSPFv3 See Route OFF See Route OFF See Route OFF
(IPv6) Redistribution Redistribution Redistribution Redistribution
(IPv4) (IPv4) (IPv4) (IPv4)
Redistribution Internal
Type (IPv6)
IP destination 2620:db8:
1234:2222
::/64
Mask (IPv4)
Next hop 2001:db8:
1234:aaaa
::1
Cost 100
Circuit ID COLAN-X
Redistribution See Route OSPFv3 See Route OFF See Route OFF See Route
(IPv6) Redistribution Redistribution Redistribution Redistribution
(IPv4) (IPv4) (IPv4) (IPv4)
Redistribution Internal
Type (IPv6)
6 ND proxy entries
Entry 1 2001:db8:
1234:aaaa
::abc2
Entry 2 2001:db8:
1234:aaaa
::abc3
Entry 3 2001:db8:
1234:aaaa
::abc4
DCN example 29—IPv6 redundant OSPF GNEs with IPv4 redundant OSPF
GNEs
The example in Figure 1-68 on page 1-321 shows a configuration where two
shelves are acting as GNEs, each running both OSPFv2 and OSPFv3 on the
COLAN-X to form adjacencies with the external DCN routers. In both cases,
it is assumed that an OSPF backbone area (0.0.0.0) exists in the external
DCN, and that DCN routers R1 and R2 act as Area Border Routers (ABRs).
Route summarization and filtering can be configured on those routers in
multi-area networks to reduce the amount of routing information advertised
into the 6500 network for scalability purposes.
Within the 6500 network, this example shows the OSPFv2 and OSPFv3 area
IDs with different values (0.0.0.1 and 1.2.3.4, respectively) in the provisioning
matrix, although they could also be set to the same value since the two
protocols are independent. The router IDs are set to the same value to simplify
planning and tracking.
The OSPFv2 circuits are all configured with opaque LSAs enabled, except on
the shelf IP interface where the value is not relevant. Having opaque LSAs
enabled on the COLAN ports allows the backbone to provide a resilient path
for opaque LSAs as well as for IP routing.
In terms of addressing, the COLAN ports of the GNE are assigned IPv6
addresses from the same /64 subnet as the external DCN routers (R1 and
R2). In line with recommended best practices, the /128 shelf IP addresses are
assigned from a separate common /64 subnet. Likewise, the IPv4 addresses
for the COLAN ports are from the respective IPv4 COLAN subnets, and the
shelf IP addresses are assigned from a common IPv4 subnet.
Note that only the IPv6 provisioning is shown in the diagram for simplicity, but
the provisioning matrix shows example IPv4 provisioning.
Table 1-59 on page 1-321 details the DCN parameters for the 6500 network
elements in the DCN for the configuration outlined in this DCN example. For
general provisioning guidelines, see “General DCN provisioning rules” on
page 1-97.
For parameters not listed, use the default settings or leave blank.
Figure 1-68
DCN example 29 diagram—IPv6 redundant OSPF GNEs with IPv4 redundant OSPF GNEs
Table 1-59
DCN example 29—6500 DCN provisioning details
Table 1-59
DCN example 29—6500 DCN provisioning details (continued)
Line/MS DCC provides a faster link than section/RS DCC. If an optical facility
is taken out-of-service, line/MS DCC is lost but section/RS DCC remains up.
Make sure that the settings at each end of the DCC channels are the same.
Figure 1-69
6500 DCC interworking with IP-managed network elements
NEs across
Managing
6500 NE
IP-managed NEs
Carrier
Access
DCN
6500 IP-Managed NE
DCC
COLAN DCC
Figure 1-70 on page 1-325 shows the 6500 interworking with OSI-managed
network elements. The configuration in Figure 1-70 on page 1-325 assumes
that the gateway network element is not acting as a TL1 Gateway. The
gateway network element will pass through OSI management traffic but
cannot be used to access the OSI based network elements.
Figure 1-70
6500 DCC interworking with OSI-managed network elements
NEs across
Managing
6500 NE
OSI-managed NEs
Carrier
Access
DCN
6500 OSI-Managed NE
DCC
COLAN DCC
OSI System Ids are derived automatically from the 6500 shelf MAC address.
The 6500 supports three configurable manual area addresses (MAAs). A
default MAA of 49000 is assigned to a network element.
DCC protection
6500 supports the following protection schemes for the DCC interfaces:
• protected DCC (route diversity Off) where DCC comms follows traffic
• unprotected DCC (route diversity On) where DCC comms does not follow
traffic
Protected DCC (route diversity off) is not supported on PPP DCC channels
(only supported for LAPD DCC channels). You cannot set route diversity to off
if either of the DCCs in the 1+1/MSP linear protection scheme is set to PPP.
Protected DCC
Protected DCC (route diversity off) is only supported on 1+1/MSP linear
protection schemes. If the 1+1/MSP linear protection is unidirectional, the
DCC follows traffic regardless of the facility traffic is on, thus DCC traffic can
be on different facilities for the transmit and receive direction.
For protected DCC (route diversity off), you must provision two DCC channels,
one for each port of the 1+1/MSP protection pair. DCC is sent on both working
and protection ports but only the receive DCC of the active port is selected.
With route diversity off, only the DCC associated with the active port is
alarmed.
Unprotected DCC
For unprotected DCC (route diversity on), you can provision one or two links
for the 1+1/MSP protection pair. If you provision DCC on both working and
protection ports, DCC is transmitted and received on both ports. With route
diversity on, the DCC associated with the each port is alarmed separately.
The bridging of FTP to FTAM is done using a one step process. In this
process, FTAM Responder on the 6500 NE translates the request for an FTP
file to an FTP request over the DCN to the OSS, with the retrieved file being
passed back to the FTAM Initiator on the RNE that made the request. See
Figure 1-71 on page 1-328.
This feature is designed only for managing third-party RNEs. The 6500 cannot
not act as an FTAM RNE, as its load delivery and Backup and Restore file
transfers are done only over FTP. There are no 6500 TL-1 commands that
initiate FTAM file transfers.
The TL1 Gateway allows customers to manage the OSI-based RNEs from
their OSS through TL-1. The FTP/FTAM Bridge requires the file transfer to be
initiated from the RNE, so the FTP/FTAM Bridge is dependent on the TL1
Gateway feature.
Note that FTTD and the TL1 Gateway can run on different NEs.
The FTP/FTAM Bridge on the 6500 can also be invoked by RNEs that do not
support COPY-RFILE, but have their own proprietary command for file
transfers. The following is an example for this case:
• without an FTP/FTAM Bridge, i.e. simple FTAM write to a GNE, the
command looks as follows:
SAV-PROV:::X::ADMIN,ADMIN:DESTTYPE=TID,DESTADDR=GNET
ID,DIR="/loadmgmt/backups",CHKALM=N;
• with an FTP/FTAM Bridge, write to a Remote destination over the DCN via
GNETID
SAV-PROV:::X::ADMIN,ADMIN:DESTTYPE=TID,DESTADDR=GNET
ID,DIR="ftp://user:PWD@47.128.16.168/home/loadmgmt/backups",
CHKALM=N;
Figure 1-71
6500 FTP-FTAM FTTD
FTP Client
DCN
Buffer
FTP
FTAM Responder
GNE
6500
FT-TD TL1-TD
FTAM
OSI RNE
The FTAM Responder authenticates its users from the generic 6500 User
Database (same as ACT-USER or the FTP server).
For an RNE to access the 6500 FTAM Responder, from anywhere in the OSI
Network, it is necessary for that RNE to be present in the 6500’s OSI Routing
table (RTVR-RTG-TBL).
The FTAM Responder does not allow direct FTAM write to the 6500 (only write
over an FTP Bridge). Direct FTAM read from the 6500 is allowed, only from
the “/loadmgmt” directory (or subdirectories).
Limitations
• The FTP-FTAM Bridge feature does not interwork with Ciena OM 3000 SP.
The OM 3000 SP supports a proprietary file transfer mechanism called
ALFTAM. ALFTAM uses a 4 layer OSI stack. The FTP-FTAM Bridge
feature on 6500 supports a full 7 layer OSI stack.
• The FTP-FTAM Bridge feature does not interwork with Ciena OM 3000 NP.
The OM 3000 NP supports non standard FTAM addressing (used when
NP does backup and restore of files to an OPC). The 6500 FTP-FTAM
Bridge feature complies to the GR-253-CORE FTAM addressing (Note:
file transfers between 6500 SP and an OM 3000 NP can be achieved via
an IP GRE tunnel).
• The FTP-FTAM Bridge feature supports only FTAM-3 (binary) file types.
FTAM-1 (text) file types are not supported.
• For the FTP/FTAM Bridge feature, the RNE must provide, in the FTP URL,
an IP address for the hostname. A domain name does not work, as the
6500 does not have the DNS services to resolve it to an IP address. The
FTP/FTAM Bridge feature does not comply with NSIF-033-1999 R7-99,
which requires the FT-TD to access a DNS server and determine the IP
address of a host.
ATTENTION
GCC Transparency is not supported.
In the SONET/SDH DCC, 6500 uses the HDLC (High-Level Data Link Control)
protocol to encapsulate Layer 2 protocol data. HDLC frames contain a Frame
Check Sequence (FCS) that can be 16-bit or 32-bit in length computed over
the Address, Control, and Information fields. It provides a means by which the
receiver can detect errors that may have been induced during the
transmission of the frame, such as lost bits, flipped bits, and extraneous bits.
The 6500 HDLC FCS can be either 16-bit or 32-bit when setting up a DCC
Transparent connection.
Interworking requirements
• DCC Transparency provides transparency between two NEs at the
datalink layer.
• DCC Transparency only supports transparency of HDLC based datalink
protocols.
• DCC Transparency does not translate between different datalink
protocols. For example, if one end NE uses PPP and the other end NE
uses LAPD, putting them though the DCC Transparency will not make
them inter-operate.
• DCC Transparency applies to SONET, SDH, and SDH-J protocols.
• DCC Transparency supports transparency of packets that are less than
approximately 1530 bytes.
• DCC Transparency is not reliant on any provisioned datalink (or higher)
parameters on the far-end/connecting NEs, except for not exceeding the
maximum packet size.
• DCC Transparency connectivity does not affect any protection capabilities
on the port.
• DCC Transparency is not affected by OSI areas or domains (that is,
connections for NEs belonging to different OSI areas or domains on the
same 6500).
Limitations
• When configuring DCC Transparency across two 6500 nodes or more, a
path for each side of the ring or linear span must be configured to provide
protection.
• When configuring DCC Transparency across two 6500 nodes or more, the
DCC Transparency replaces the DCC normally used for these node to
communicate to each other. Thus each 6500 requires an individual LAN
drop.
ATTENTION
If two nodes are interconnected by another ring or linear span where DCC
can be enabled, then an individual LAN drop is not necessary.
Figure 1-72
Example of DCC transparency across two 6500 nodes
OM3000 Site
Manager
+ OM3000
6110 MS-MOA
WEB UI
PC-1
LAN
Section DCC
LAPD Section DCC
OM3500 LAPD 3500
Section or Line
TDCC path 1
NP
OC-48
Linear
OC-192 Ring
Section Section
DCC DCC
GRE GRE
Tunnel Tunnel
Section or Line
TDCC path 2
6500 6500
Legend
= OC-48 Interfaces
= OC-192 Interfaces
= OC-3 or 12 Interfaces
Note that for CPL, the parameter specifying the destination IP must also be
set.
OSPF runs on the CPL OSC and the ILAN ports interconnecting the 6500 to
the CPL shelves. The GCC channels run IISIS or OSPF as the routing
protocol.
6500 Release 9.1 and CPL Release 5.0 supports a mixed TIDc configuration.
Refer to “TID consolidation (TIDc)” on page 1-107 for details.
For CPL OSC and ILAN communication ports speed, refer to the “Data
communications” chapter in Part 2 of the Common Photonic Layer Planning
Guide, NTT840FV.
Figure 1-73 on page 1-334 to Figure 1-78 on page 1-338 shows the typical
interworking between 6500 and CPL.
Figure 1-73
6500/CPL interworking: Homogeneous OSPF network
OSC/PPP/OSPF OSC/PPP/OSPF
GCCO/PPP/OSPF GCCO/PPP/OSPF
ATTENTION
As the GCC is lower bandwidth than the OSC, it is important to set the OSPF
cost of the GCC channel to ensure that the OSC channel is the preferred
route in a homogeneous OSPF routing domain. Note that the total OSPF
route cost, for a given route between any two NEs is the sum of the OSPF
route cost for each intermediate hop in that route.
In cases where both the OSPF and IISIS routing protocols are used within the
network, each 6500 node should be configured such that any given interface
participates in only one routing domain (that is, on any given 6500 NE, any
given interface should be configured with either an OSPF circuit, OR an IISIS
circuit, not both at the same time.)
Figure 1-74
6500/CPL interworking: OSPF preferred route
OSC/PPP/OSPF OSC/PPP/OSPF
GCCO/PPP/IISIS GCCO/PPP/IISIS
Figure 1-75
6500/CPL interworking: IISIS preferred route
OSC/PPP/OSPF OSC/PPP/OSPF
GCCO/PPP/IISIS GCCO/PPP/IISIS
For example, if cost of the OSC and ILAN links is 10 and there are 10 hops to
get to a remote CPL, then the cost over the OSC channel to reach the remote
CPL is 100. If you have a GCC cost set to 75 and an ILAN cost set to 10 with
three hops (CPL to 6500 over ILAN=10, 6500 to 6500 over GCC =75 and 6500
to CPL over ILAN=10), then the cost to reach the remote CPL is 95. In this
case the channel over the GCC is a lower cost and will be the selected path
which is not recommended.
The GCC cost should be changed from the default to guarantee that the cost
is lower for the ILAN/OSC path than that of the GCC path. In this example, you
should set the GCC to at least 85, to get a total cost of 105. This ensures that
the CPL system uses the ILAN and OSC connections and does not route over
the lower bandwidth GCC to a remote site unless there is an OSC failure. This
applies to all links in the network.
Combined Internal DCN for CPL and 6500 provides the following advantages:
• Highest Bandwidth Solution
— provides a 100+Mbps DCN capability shared with DOC traffic (for
example, 50 Mbps for DCN)
• Lowest Latency
— lower per OSC link as 155Mbps clocking
• Simplify the In-Band Design and Maximizes Resilience
— DCN is provided as part of the CPL layer, then the 6500 connectivity
is not required to provide comms or redundancy
Figure 1-76 on page 1-337 shows the 6500 and the CPL Combined In-Band
Comms with internal OSPF and no SSS link.
Figure 1-76
6500/CPL interworking: Optimal DCN Configuration—no SSS
DCN DCN
L L L CP L L L CP
CP CP CP L CP CP CP L
00 00 00 00
65 65 65 65
Legend
= Fiber with OSC
= Fiber without OSC (Single Stretch Span)
= Ethernet NE - NE (OSPF Routing)
= Ethernet NE - DCN (OSPF Routing)
= Global Communications Channel (GCC)
Figure 1-77 on page 1-337 shows the 6500 and the CPL Combined In-Band
Comms with internal OSPF and SSS link.
Figure 1-77
6500/CPL interworking: Optimal DCN Configuration—with SSS
SSS Link
Comms over
DCN OSC should DCN
not be used
L L L CP L CP
CP CP CP L CP L
GCC GCC
00 00 00 00
65 65 65 65
DCN Design
ensures that the
GCC communications
is used
Legend
= Fiber with OSC
= Fiber without OSC (Single Stretch Span)
= Ethernet NE - NE (OSPF Routing)
= Ethernet NE - DCN (OSPF Routing)
= Global Communications Channel (GCC)
Figure 1-78 on page 1-338 shows the 6500 and the CPL Combined In-Band
Comms with Ethernet connectivity at non-GNE sites.
Figure 1-78
6500/CPL interworking: Optimal DCN configuration—Ethernet connectivity
1 x 6500 2 x 6500
X X
L CP CP L
CP L L CP
X X X X
00 00 00
65 X 65 X 65
>2 x 6500
L CP
CP L
00 X 00
65 65
X X
X X
00 00
65 X 65
For an example of interconnecting the 6500 and the CPL network elements,
see “DCN example 23—using OSPF with two 6500 gateway network
elements connected to OSPF backbone with collocated CPL network
elements” on page 1-296.
Figure 1-79
6500/CPL interworking: OSC communications (example)
Figure 1-80 on page 1-341 shows the typical interworking between the 6500
and the 5100/5200.
Figure 1-80
6500 and 5100/5200 interworking (Broadband services)
Regen
OTU2 client
5100/5200 5100/5200
GCC1/2 (OSPF)
Figure 1-81 on page 1-343 shows the interworking between the 6500 and the
5100/5200 (single GNE using Proxy ARP).
Figure 1-81
6500 and 5100/5200 interworking (single GNE using Proxy ARP)
OneControl
OSPF area 1
CPL CPL Craft
DCN Subnet
C
Subnet
A 6500
6500
OSPF Regen
Regen OSPF
area 1
area 1
5100/ 5100/
5200 5200
Subnet
B
LEGEND
= COLAN = ILAN
= GCC0 = OSC
= GCC1 = Craft connection
Figure 1-82 on page 1-344 shows the interworking between the 6500 and the
5100/5200 (Dual GNE using OSPF).
Figure 1-82
6500 and 5100/5200 interworking (Dual GNE using OSPF)
OneControl
Regen site
DCN DCN
OSPF area 1
CPL CPL CPL CPL
LEGEND
= COLAN = ILAN
= GCC0 = OSC
= GCC1 = Craft connection
Each 6500 and 5200 network element is assigned a public SHELF IP address
from the same subnet. The 6500 COLAN-X interface on the gateway network
element is assigned an IP address in the same subnet of the router port
connected to the gateway network element. Each SHELF IP address is visible
within the external DCN. The subnet on the DCN router port that connects to
the COLAN-X port of the gateway network elements, must be large enough to
support the COLAN-X port and the SHELF IP address of every network
element for which the gateway network element will proxy ARP for. The GCC
link between 6500 shelves is unnumbered to conserve IP addresses.
The 5200 2X and 6500 ILAN-IN Ethernet ports are cabled to an Ethernet hub
to connect the collocated network elements. Private-IP addresses are
assigned on the 2X-ILAN interfaces to conserve public IP addresses.
The internal routing protocol for the 6500/5200 network is OSPF. When the
internal routing protocol is OSPF, OSI traffic cannot be routed through the
network element.
Figure 1-83
Example of 6500/5200 network
Site
SMI
Manager
LAN
DCN/WAN
2X ILAN subnet:
default addresses
10.2.1.Shelf ID/24 Ethernet Hub
Legend
Numbered Ethernet
Un-numbered Ethernet
5000-series comms channel
6500 comms channel
• 6500 OSPF circuits for internal circuits (ILAN-to-ILAN, DCC, and GCC)
can be chosen as per existing 6500 guidelines, with the exception of the
OSPF area, which must be set to the same value as the 5200 network.
See Table 1-61 on page 1-350 for the recommended OSPF circuit
settings.
• 5200 external time of day synchronization is not supported when the 6500
is configured as the GNE.
Table 1-60
6500 ILAN-2X and SHELF OSPF circuit parameters
Parameter Value
Priority 6
Password authentication On
Table 1-61
6500 ILAN-ILAN and GCC OSPF circuit parameters
Parameter Value
Priority 1 (default)
Note: Recommended values. Actual values can be changed to suit network requirements
For parameters not listed, use the default settings or leave blank.
Table 1-62
Example of 6500 commissioning data
Table 1-62
Example of 6500 commissioning data (continued)
Table 1-62
Example of 6500 commissioning data (continued)
Table 1-62
Example of 6500 commissioning data (continued)
For parameters not listed, use the default settings or leave blank.
Table 1-63
Example of 5200 commissioning data
Table 1-64
6500 commissioning worksheet
Table 1-64
6500 commissioning worksheet (continued)
Table 1-64
6500 commissioning worksheet (continued)
Table 1-64
6500 commissioning worksheet (continued)
Carrier
Protocol
IP Address
Subnet Mask
Routing Protocol
Network Area
Cost
Dead Interval
Hello Interval
Retransmit Interval
Transmit Delay
Priority
Area Default Cost
Area Virtual Link
Area
Password Authentication
Password
10 Static routes provisioning
Add static IP route (gateway
network element only):
IP Address
Subnet Mask
Next Hop
Circuit
Cost
11 OSPF - routes distribution
Add Static Redistribution
(GNE only)
IP Address
Subnet Mask
Metric
Metric Type
Distribution List
Note: The ILAN-IN OSPF Circuits for the ILAN-2X connection on 6500-1 and 6500-3 must be edited
using Site Manager to ensure the Opaque Link State Advertisement is properly set to OFF. The 6500
NSAT tool does not allow you to set this value and it will default to ON.
Table 1-65
5200 commissioning worksheet
5200 commissioning NE1 NE2 NE3 NE4
Network Name
Site Name (CLLI)
Shelf Name
Shelf Description
Site ID
Shelf Identifier 1 2 3 4
Shelf is DCN Gateway No No No No
External Routing Mode NONE NONE NONE NONE
Shelf Address
Primary Shelf Address
Subnet Mask 255.255.255.255 255.255.255.255 255.255.255.255 255.255.255.255
DHCP Address 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
Default Gateway Address 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
Shelf Type
Ethernet Hubbing Group
10Base-T 1X ENABLED ENABLED ENABLED ENABLED
10Base-T 2X ENABLED ENABLED ENABLED ENABLED
Set TID to SHELF NAME Yes Yes Yes Yes
Additional provisioning steps
Set Internal OSPF Area ID
Preliminary conditions
The following are pre-conditions and information that should be gathered
before starting the migration.
• All 5200 network elements must be running a committed software load of
release 10.1 or later.
• All 6500 network elements must be running a committed software load of
release 5.21 or later.
• Ensure that the IP addressing plan for the 6500 shelves has been
prepared prior to starting the migration procedure. Since both the 5200
and 6500 shelves will be managed through a proxy ARP GNE, these
addresses (one per shelf) must be allocated from the DCN subnet to
which the GNE is attached.
• Ensure that the OSPF area of the existing 5200 network is known. If set to
0.0.0.0 (default), the OSPF area is set to be the same value as the IP
address of the 5200 primary shelf.
• Ensure that the hubbing-group at each 5200 site where 6500 shelves will
be interconnected is known.
• Ensure that the current 5200 GNE and the new 6500 GNE-to-be are
located at the same site. Therefore, the 6500 COLAN-X port will be
connected to the same subnet that the 5200 GNE was.
Limitations
It is recommended to use Private-IP addresses on the 2X-ILAN subnets.
When the 6500 NEs interconnected to the 5200 network and an 5200 GNE is
being used (interim step), some functionality is limited. In general, any
applications that initiate communications from the interconnected 6500
shelves out to the DCN will have limited functionality. These applications
include:
• FTP: affects load delivery, backups and restores
• SNTP: affects TOD synchronization to external sources. TOD may still be
synchronized to the 5200 primary shelf.
• RADIUS: affects centralized authentication to external servers
Once the GNE functionality is switched to the 6500, the limitations described
above no longer apply.
ATTENTION
There can be some temporary connectivity issues from the DCN to some
shelves due to stale ARP cache entries in the DCN router. These ARP cache
entries will time-out automatically and the duration will depend on how the
router is configured. The router may have its ARP cache flushed manually if
necessary.
ATTENTION
The 6500 GNE should not be connected to the DCN subnet until the 5200
GNE is fully decommissioned as a GNE and disconnected from that subnet
to avoid any potential conflicts.
Configuration example
The following configuration example is referred to throughout this document to
help illustrate the steps. It shows the target network configuration (i.e. after the
migration is complete), with one 6500 GNE and one 6500 interconnected to
the 5200 network at each site.
Figure 1-84
Network example
SMI
LAN
DCN/WAN
Private IPs
10.2.1.shelf ID/24 Hub High OSPF
cost
2X 2X In Out In COLAN-X
Site 1 5000 NE1 5000 NE2 6500 NE1 6500 NE2 GNE
(HG 1)
Site 2
(HG 2) 5000 NE3 5000 NE4 6500 NE3 6500 NE4
2X 2X In Out In
High OSPF
Private IPs Hub
cost
10.2.2.shelf ID/24
Legend
Numbered Ethernet
Un-numbered Ethernet
5000-series comms channel
6500 comms channel
Configuration notes
It is expected that:
• There will be two interconnection sites to provide a redundancy between
the 5200 communication network and the 6500 communication network.
• The ILAN-IN port will be used to connect to the 5200 2X port(s). Note that
ILAN-IN and ILAN-OUT are identical so either could be used, but for
simplicity in this and the following procedures, it is assumed ILAN-IN is
used.
• All interfaces on the 6500s use unnumbered links except for the ILAN-IN
ports connected to the 5200s.
• The collocated 5200 and 6500 shelves will have their Ethernet-2X and
ILAN-IN/OUT ports connected directly or through an Ethernet hub. If more
than one 6500 shelf is collocated with the 5200, only one 6500 shelf
ILAN-IN/OUT port is required to be connected to the Ethernet hub. The
other 6500 shelves will be daisy-chained together (ILAN-IN to ILAN-OUT)
using unnumbered links.
• Interconnected shelves will use the 5200 default private addresses for the
Ethernet-2X and ILAN-IN/OUT ports, following the scheme of
10.2.hubbing-group.shelfID. Since the 6500 shelves will be assigned an
5200 shelfID and those shelfIDs must be unique within the 5200/6500
network, this guarantees uniqueness of the IP addresses. (Note:
hubbing-group is an 5200-only parameter assigned at commissioning
time. All shelves at the same site are assigned the same hubbing-group.)
• The 6500 OSPF circuit cost for the ILAN-IN/OUT port connected to the
collocated 5200 shelves should be set very high (10000) so that only
inter-shelf traffic (5200 primary to and from 6500 shelves) uses the
interconnection links.
• Redundant GCCs exist within the 6500 wavelengths to provide a fault
tolerant communication path between 6500 shelves.
Figure 1-86 on page 1-368 shows the configuration once the 6500 shelves
are connected into the network. 6500-1 and 6500-3 are connected to the
same hub as the collocated 5200 shelves. 6500-1 and 6500-2 are
daisy-chained using unnumbered ILAN links, as are 6500-3 and 6500-4. The
6500-1 and 6500-3 ILAN-IN links are assigned 10.2.hubbing-group.shelfID IP
addresses; the cost of OSPF circuits on those links is set very high (10000).
Figure 1-85
Existing 5200 network
SMI
LAN
DCN/WAN
Private IPs
10.2.HG.shelf ID/24
1X 2X 2X
GNE 5000 NE1 5000 NE2
Private IPs
10.2.HG.shelf ID/24
Legend
Numbered Ethernet
5000-series comms channel
Figure 1-86
6500 shelves interconnected
SMI
LAN
DCN/WAN
1X 2X 2X In Out In COLAN-X
2X 2X In Out In
unnumbered
Private IPs
10.2.HG.shelf ID/24 High OSPF cost
Legend
Numbered Ethernet
Unnumbered Ethernet
5000-series comms channel
6500 comms channel
The high-level steps for adding the 6500 shelves to an existing 5200 network
are outlined below:
• Commission the 6500s: shelf IP address, 5200 shelf OSPF circuits, GCC
links, GCC OSPF circuits, ILAN links and ILAN OSPF circuits
(daisy-chain).
• If connecting to the 5200, provision the 6500 ILAN-IN port with an IP
address following the 10.2.hubbing-group.shelfID scheme. Provision an
OSPF circuit according to existing configuration guidelines. Note that the
OSPF cost of this link should be set much higher than the cost of the
longest path in the network. A value of 10,000 or higher is suitable for
small to medium size networks.
• Connect the collocated 6500s together using the ILAN-OUT/IN ports in a
daisy-chain fashion. Use unnumbered IP addresses on these ILAN ports
and add OSPF circuits.
• At each interconnection site, connect the ILAN-IN port of one 6500 shelf
to the Ethernet hub in which the 5200 2X ports are connected.
ATTENTION
The 6500 GNE will be configured in this procedure but should not be
connected to the DCN at this time. It will be connected to the DCN once the
existing 5200 GNE is decommissioned as the GNE.
• Using Site Manager, login to the 6500 that is to become the GNE.
• Add a LAN interface for the COLAN-X port of the GNE. See Figure 1-87
on page 1-370. Under Comms setting management/interfaces:
— select LAN
— click Add
— choose the COLAN-X interface
— Configuration - Automatic
— click OK
ATTENTION
A “COLAN-X port failure” alarm will be raised and will stay active until the
port is connected to the DCN LAN in a later phase.
Figure 1-87
Add LAN parameters
Figure 1-88
Add IP parameters
• Add a static default route. See Figure 1-89 on page 1-372. Under Comms
setting management/Routers:
— select IP Static Route
— click Add
— IP subnet - 0.0.0.0
— Subnet mask - 0.0.0.0
— Next Hop - IP address of next-hop DCN router
— Cost - set to desired cost for link
— Circuit Id - COLAN-shelf#-X
— click OK
Figure 1-89
Add IP static route parameters
• Redistribute the default static route into OSPF. See Figure 1-90 on
page 1-373. Under Comms setting management/Routers:
— select OSPF Router
— under Redistribution, select Add
– Route redistribution - Static Distribution
– IP subnet - 0.0.0.0
– Subnet mask - 0.0.0.0
– Metric - select an appropriate metric. This is the OSPF cost that
will be associated with the redistributed static route. Note that the
route will be redistributed as a Type-1 external LSA (internal cost
is considered in routing calculation)
– Metric type - Internal
– click OK
Figure 1-90
Add OSPF redistribution parameters
Figure 1-91
Add GNE parameters
• Add all 5200 and 6500 non-GNE shelf IP addresses to the Proxy ARP
table so that the GNE will proxy for these addresses. See Figure 1-92 on
page 1-374. Under Comms setting management/Interfaces:
— select Interface type: ARP Proxy
— click Add
— enter each shelf IP address as a single entry, or if the addresses are
contiguous, as a range. Do not enter any IP addresses that are not
contained within this 5200/6500 network.
— click OK
Figure 1-92
Add ARP proxy parameters
In the example network of Figure 1-86 on page 1-368, 6500-2 will become the
GNE and has the COLAN-X configured as per the above steps.
ATTENTION
If using a PC, you need to execute the ipconfig/release and ipconfig/renew
commands on the PC connected to the 2X port of 5200 while it is being
deprovisioned.
You must click the Renew DHCP Lease button in the System Preferences
on the Mac connected to the 2X port of 5200 while it is being deprovisioned.
Figure 1-86 on page 1-368 shows the configuration once the 6500 shelves
are connected into the network. 6500-1 and 6500-3 are connected to the
same hub as the collocated 5200 shelves. 6500-1 and 6500-2 are
daisy-chained using unnumbered ILAN links, as are 6500-3 and 6500-4. The
6500-1 and 6500-3 ILAN-IN links are assigned 10.2.hubbing-group.shelfID IP
addresses; the cost of OSPF circuits on those links is set very high (10000).
Figure 1-93
Port control settings
Optionally, the 1X-Ethernet port may be disabled in the Port Control Settings
window if craft access through this port is not required.
• From the Shelf Configuration window, edit the communication settings as
follows (refer to Figure 1-94 on page 1-377):
— uncheck Shelf is DCN Gateway
— set the Subnet Mask to 255.255.255.255
— click OK
— allow shelf to restart (non-service affecting restart)
Figure 1-94
Shelf configuration
Remove the cable from the GNE 1X-Ethernet port. Since this shelf is no
longer a GNE, the 1X port should not be connected to the DCN.
• Connect the COLAN-X port of the 6500 GNE to the DCN subnet. Once the
cable is connected, verify that the link LED of the COLAN-X port is
illuminated.
• Ping all 6500 and 5200 shelf IP addresses from a PC or workstation in the
DCN. Verify that each shelf is reachable (see Note below).
• From a command prompt on a PC, perform a trace route to each 6500 and
5200 shelf to verify that the path is as expected.
ATTENTION
There can be some temporary connectivity issues from the DCN to some
shelves due to stale ARP cache entries in the DCN router. These ARP cache
entries will time-out automatically and the duration will depend on how the
router is configured. The router may have its ARP cache flushed manually if
necessary.
The PBE requires OSI communications between the head-end amp-site of the
LH1600G system and all 6500 shelves housing AM2-capable transmitters to
be adjusted.
Interworking between Optical Long Haul 1600G and 6500 is only required to
support single stretch span, that is, when the OSC is not available due to an
unrepeatered link. In this case, the OSI traffic between two Optical Long Haul
1600G network elements traverse the GCC channel. The OSI packets are not
IP encapsulated but are transmitted natively in a PPP packet.
Since IISIS is used as the internal routing protocol on 6500, the 6500 network
elements appear in the OSI routing table on the Optical Long Haul 1600G
network elements. The Optical Long Haul 1600G network elements appear in
the OSI routing table on the 6500 network elements.
6500 cannot be a head end (or GNE) for an Optical Long Haul 1600G. The
Optical Long Haul 1600G must have its own DCN drop through an OPC.
The Broadband network element and Long Haul network element can be
connected together using an Ethernet cable (LH MI Ethernet port to
Broadband ILAN port). This will provide a method such that the Broadband
network element TID is displayed in the Long Haul user interface.
Figure 1-95 on page 1-379 shows the typical interworking between the 6500
and the Optical Long Haul 1600G.
Figure 1-95
6500 and Optical Long Haul 1600G interworking
ISIS/OSI/Ethernet ISIS/OSI/Ethernet
ILAN MI MI ILAN
OSC - ISIS/OSI/LAPD
6500 1600G 1600G 6500
GCC0/1 - ilSIS/OSI/PPP
Figure 1-96 on page 1-380 and Figure 1-97 on page 1-381 show the TIDc
Configuration without Private-IP and PBE where any GNE configuration can
be used except Private-IP.
The ILAN interface must be provisioned to have both OSPF and IISIS
protocols running on them. OSPF is required for TIDc functionality and IISIS
is required for PBE server functionality. The ILAN interface must be numbered
for this application.
In Figure 1-96 on page 1-380 any GNE configuration can be used as long as
it is not a Private-IP.
Figure 1-96
TIDc configuration without Private-IP and PBE
DCN
Primary shelf
with public
SHELF IP
OSPF&iISIS OSPF&iISIS
ILAN ILAN
OSPF&iISIS MI OSPF&iISIS
LH LH MI card acts
as a HUB
Legend
ILAN IP address, must be numbered public IP
(DCN address)
Figure 1-97
TIDc configuration without Private-IP and PBE
DCN
Primary shelf
with public
SHELF IP
OSPF OSPF
iISIS
MI MI
LH LH MI card acts
as a HUB
Legend
ILAN IP address, maybe be un-numbered
(0.0.0.0) or numbered public (DCN address)
The ILAN interface must be provisioned to have both OSPF and IISIS
protocols running on them. OSPF is required for TIDc functionality and IISIS
is required for PBE server functionality. The ILAN interface must be numbered
for this application.
In Figure 1-98 on page 1-382 any GNE configuration can be used as long as
it is not a Private-IP.
Figure 1-98
TIDc configuration with Private-IP and PBE
DCN
Primary shelf
with public
SHELF IP
OSPF&iISIS OSPF&iISIS
ILAN ILAN
OSPF&iISIS MI OSPF&iISIS
LH LH MI card acts
as a HUB
Legend
ILAN IP address, must be private
(non DCN)
Dial-up connectivity
The 6500 also supports connectivity to the 6500 network element using
dial-up. Dial-up access allows for remote access to the 6500 network using an
analog line. Dial-up access is also required in order to receive proper
assistance from Ciena support teams. Dial-up access is only available to
access the local network element, you cannot directly reach other network
elements on the DCN from the RS-232 port. You can reach remote network
elements using the nested Telnets functionality available from the command
line interface (CLI), which is accessible when breaking out from a TL-1
session.
You can switch between TL-1 and the 6500 CLI by typing Ctrl+B when
connected using the serial port.
If you are telneting into a shelf and need to toggle between the TL-1 and CLI
on that session, you have to Telnet into the CLI ports first, then Telnet into the
other sessions.
Set the modem to assert CD “carrier detect” only when modem is connected.
(When carrier detect goes down due to phone call loss, serial sessions get
logged out immediately instead of waiting for the timeout).
Firewalls
The firewall is supported in both IPv4 and IPv6.
Table 1-66 on page 1-384 shows which ports must be passed through any
firewall between the management systems and the 6500 network.
Table 1-66
Port filtering ports
20 FTP server FTP server FTP TCP FTP data connection (active FTP mode).
21 FTP server NE FTP TCP FTP control connection (active FTP
mode).
80 NE External web HTTP TCP HTTP port used for web browser access
browser to NE. The following applications are
available:
• Site Manager web launch
• SLAT wizard
• MIB definitions
• Site Manager self description download
(as part of Site Manager discovery) for
releases other than Release 12.6
123 SNTP NE SNTP UDP SNTP port used for time-of-day
server synchronization.
Table 1-66
Port filtering ports (continued)
161 NE External SNMP UDP SNMP port used for accessing MIBs on
SNMP-based 6500. This port is disabled by default.
manager
162 SNMP trap NE SNMP UDP SNMP trap destination port.
receiver
443 NE External web HTTPS TCP Secure HTTP port used for secure web
browser browser access to NE.
1812 RADIUS NE RADIUS UDP RADIUS server port used for RADIUS
server authentication.
1813 RADIUS NE RADIUS UDP RADIUS Accounting server port used for
Accounting RADIUS accounting.
Server
2122 OneControl OneControl FTP TCP Used to initiate the FTP data connection
from OneControl to the network element.
8443 NE REST client REST over TCP REST interface for 6500
HTTPS
8888 NE External Telnet TCP Used for remote debug access to 6500
Telnet client by Ciena.
8889 NE External Telnet TCP Used for remote debug access to 6500
Telnet client by Ciena.
10001 NE OneControl Telnet/TL-1 TCP Raw TL-1 (no echo) port used by the
OneControl to manage the 6500.
Table 1-66
Port filtering ports (continued)
28888 NE External SSH SSH TCP SSH port used for remote debug access
client to 6500 by Ciena.
See Table 2-13 on page 2-54/Table 3-9 on page 3-38 and Table 2-14 on
page 2-55/Table 3-10 on page 3-39 for TCP and UDP ports/ranges open by
default that can be blocked or unblocked. If you attempt to block a port or port
range which is not in the above lists, the command will be denied with an error
message.
When a user enters a block request for a specified interface, a new filtering
rule is created for this interface. Packets that arrive on this specified
port/interface are blocked. A port that is blocked can be unblocked by deleting
the associated block filter rule.
Up to 10 filters can be defined. Each filter specifies one TCP/UDP port, and
can be applied to COLAN-X and/or COLAN-A.
GNE filtering applies to shelf types equipped with the SPAP-2 w/2xOSC
(NTK555NA/NB) shelf processor or SP-2 shelf processor
(NTK555CA/NTK555EA/NTK555FA), or CTM.
In Site Manager, GNE filtering is provisioned through the Interfaces tab of the
Comms Setting Management application. Refer to “Editing the
communications settings” on page 2-9/“Editing the communications settings”
on page 3-7 and “GNE Port Filter parameters” on page 2-72/“GNE Port Filter
parameters” on page 3-52 for provisioning details.
Refer to “Accessing the PKT/OTN cross-connect circuit pack from the Craft
port” on page 1-119 for further details on accessing the PKT/OTN
cross-connect circuit pack SAOS-based CLI from the Craft port.
RADIUS enhancements
6500 supports the following enhancements to the 6500 RADIUS client and
gateway:
• RADIUS Proxy server (Authentication and Accounting) provisioning can
be performed on member shelves of a consolidated node (TIDc) by using
the Shelf drop-down list in the Centralized Security Administration Site
Manager application. For related procedures, refer to the centralized
security administration procedures in the “User account management and
administration” chapter in Administration and Security, 323-1851-301.
• The RADIUS gateway and Centralized Security Administration (CSA)
mode provisioning dependencies are removed. This allows the gateway to
be enabled on the TIDc member shelf while disallowing direct login to the
member.
• The Centralized Security Administration Site Manager application
RADIUS provisioning support the Auto generate shared secret
parameter, which automatically generates a shared secret. For
provisioning steps, refer to the “Provisioning the primary or secondary
RADIUS authentication server” and “Provisioning the RADIUS proxy
server settings” procedures in Administration and Security, 323-1851-301.
The shared secret is derived from the IP address of the RADIUS server.
This allows the management system to automatically provision the
RADIUS proxy and remote NEs without requiring an explicit shared secret
to be provided by the user.
Note: Auto generate shared secret is only supported when the RADIUS
server or proxy is another 6500 NE. Third-party RADIUS servers are not
supported.
TACACS+
6500 supports TACACS+ for centralized authentication, authorization and
accounting (AAA). For more information on TACACS+, refer to the
“Centralized Security Administration (CSA)” section in Administration and
Security, 323-1851-301.
When using TACACS+, both GNE and RNE shelves communicate directly
with external TACACS+ servers regardless of GNE configuration (that is, both
DCN-routable IP addressing configurations and non-DCN-routable
('Private-IP') addressing configurations). This is somewhat different than
RADIUS where, in a Private-IP GNE configuration, RNEs communicate with
a RADIUS gateway application on the GNEs (GNEs communication with
external RADIUS servers).
IP access control
The IP access control list (ACL) feature adds filtering to any ingress traffic on
a given physical interface. The filtering rules are used to determine whether
incoming DCN traffic is allowed or denied based upon a combination of IP
address and subnet provisioning. This functionality adds an additional layer of
security and lowers the potential of unauthorized network element access.
These solutions are mutually exclusive at both the nodal level and at the
network level. Mixing the two solutions in the same network or the same shelf
is not supported. Furthermore, there is no support for in-service migration
from one configuration to the other.
A maximum of five concurrent HTTPS proxy sessions are supported per shelf.
Figure 1-99
Non-segregated (L3) solution for encryption card key management communications
Table 1-67
Port mappings for encryption card access in Non-segregated (L3) solution
Figure 1-100
Segregated (L2) solution for encryption card key management communications
CAUTION
Risk of communication loss on GCC2 link
A loss of remote access to the 4x10G OTR encryption cards
can occur if GCC2 is used to provide remote access to the
4x10G OTR encryption cards, and the GCC2 is routed through
a 5400 network that uses GCC2 in any of the following ways:
• GCC2 squelching is used on any link
• GCC2/GCC12 is enabled for 5400 OSRP
• GCC2/GCC12 is enabled to provide IpOverGCC
communication channel(s)
Figure 1-101
GCC2 access to remote encryption cards
Figure 1-102
Two head-end shelves with a single GCC2 to two different encryption cards on a remote shelf
Figure 1-103
Single head-end shelf, single remote shelf, two pairs of encryption cards
Figure 1-104
Single head-end shelf to four remote shelves
Figure 1-105
Two GCC2 links between head-end shelf encryption card and remote encryption card
Figure 1-106
Two head-end shelves providing redundant access to remote encryption card
Figure 1-107
Unsupported configuration—two encryption cards on head-end connected to same encryption
card on remote shelf
Figure 1-108
Unsupported configuration—GCC2 between two head-end shelves
For further details, refer to the “Provisioning the Encryption Comms for
HTTPS Proxy Solution (Layer 3)” procedure in Encryption and FIPS Security
Policy Overview and Procedures, 323-1851-340.
For further details, refer to the “Provisioning the Encryption Comms for the
Layer 2 (Segregated) Solution” procedure Encryption and FIPS Security
Policy Overview and Procedures, 323-1851-340.
Provisioning rules
For the segregated solution, the following rules exist:
• The encryption card IP address can be entered only after the encryption
access mode is set to segregated.
• The encryption card IP address must be deleted before changing the
mode from segregated to either non-segregated or off.
• Setting the network domain to ENCRYP is only allowed if the carrier is set
to GCC2 and only on encryption OTR cards.
TIDc considerations
The non-segregated (L3) solution has no TIDc restrictions or limitations. Each
shelf has a DCN-routable IP address, allowing access from the external DCN
directly to the shelf processor on both primary and member shelves.
In the segregated solution, each shelf of the TIDc, both primary and members,
requires a dedicated LAN port for access to encryption cards on that shelf or
remote shelves connected to it via GCC2.
Troubleshooting
The following section provides some DCN troubleshooting information for
some common scenarios. For information and procedures for the DCN
troubleshooting tools, refer to Procedure 2-11, “Using the 6500 CLI ping and
trace commands” and Procedure 2-11, “Using the 6500 CLI ping and trace
commands”.
Telnet and ping will fail if the SHELF IP address is a Private-IP address.
Telnet and ping will fail if the SHELF IP address is a Private-IP address.
Verify:
• the DCC/GCC (or ILAN) provisioning and use the IP Routing Table to
ensure that the SHELF IP addresses are learned over the IISIS or OSPF
• the route distribution to IISIS or OSPF on the head-end and attempt a ping
from 6500 to 6500 network element
For the 6500 service metric scalability rules refer to Table 1-75 on page 1-417.
ATTENTION
For configurations that exceed the following guidelines, contact Ciena for
assistance.
• IISIS
— Maximum of 150 ISs and ESs nodes per OSI area.
— Maximum of 200 L1 LSPs per OSI area.
— Average of 10 adjacencies per L1 IS.
— Maximum of 80 adjacencies per L1 IS.
— Recommended IISIS circuit metrics:
– LAN: 4
– Line/MS DCC: 5
– Section/RS DCC: 6
– GCC0/GCC1: 5
– 40G GCC0/GCC1: 4
– 40G UOCLD GCC0/GCC1: 4
– 100G GCC0/GCC1: 4
— Maximum 160 routes redistributed into IISIS (80 static routes and 80
OSPF routes)
• OSPFv2
The guidelines in Table 1-68 on page 1-405 are not intended as design
goals, but rather as absolute maximums. Network designs should aim to
minimize OSPF load. Refer to “Best practices” on page 1-78 for guidance.
Table 1-68
OSPFv2 guidelines
OSPFv2 element Maximum
Number of routes redistributed into OSPF 160 (80 static and 80 IISIS)
Note 1: Individual maximums per LSA type shown, but combined LSA maximum (all types) still applies.
In other words, (Type-1 + Type-2 + Type-3 + Type-4 + Type-5 + Type-11) must be less than or equal to
the combined LSA maximum).
Note 2: Since there is one Type-1 LSA per router, this defines the maximum number of routers per area.
Note 3: It is highly recommended that the number of Type-11 LSAs is minimized through appropriate
network design incorporating OSPF segmentation and SLDD and/or OOLFC Type-11 control
mechanisms.
Note 4: Maximum number of opaque LSAs for SP-2/CTM is 1600 (only supported if entire OSPF
network is SP-2/CTM). Maximum number of opaque LSAs for non-SP-2 is 1200.
• OSI
— Maximum of 150 OSI routes (NSAP) in the L1 routing table.
• IP
— The 6500 IP routing table supports 500 IP routes in total.
— Maximum of 90 hops from OneControl to 6500.
• Private-IP
— If the GNE is equipped with an SP-2 circuit pack (NTK555CAE5,
NTK555EAE5, and NTK555FAE5), a maximum of 12 MSPP RNE
shelves can subtend the GNE, or a maximum of 36 Photonic and/or
Broadband RNE shelves can subtend the GNE.
— Maximum of 512 reverse port NAT entries.
— If the GNE is a reverse port NAT, configure the map ports on the GNE
to be within the 52050 to 54099 range (if possible).
• TL1 Gateway
— The recommended maximum number of northbound management
sessions per 6500 TL1 Gateway is four (for example, from OneControl,
Site Manager, or other management platform).
— The maximum number of subtending shelves supported by a
Private-IP GNE is provided in the Private-IP engineering guidelines
above.
— The maximum number of TL1 Gateway sessions can be found using
the formula (maximum # of northbound sessions x maximum #
subtending shelves). For example, with four northbound sessions and
a maximum of 36 subtending shelves, the maximum number of TL1
Gateway sessions is 4 x 36 = 144.
— The TL1 Gateway sessions can be a mix of IP TL1 Gateway and OSI
TL1 Gateway.
— The maximum number of OSI devices managed through TL1 Gateway
is 24.
• Redundant ARP
— Maximum of 150 shelves subtending the redundant ARP GNEs.
— The last octet of each IP address must be unique.
• Physical (DCC/GCC/OSC)
— Maximum of two Line/MS DCCs per OCn/STMn or MXC circuit pack.
— Maximum of 80 DCCs per shelf (on a 32-slot shelf, the maximum is
128 DCCs).
— A maximum of 60 GCC channels are supported.
— Maximum of one GCC0 and one GCC1 per WT circuit pack.
— For the SuperMux NTK535EA/NTK535EB variant, maximum two line
DCCs, or, one line DCC and one of GCC0/GCC1 per SuperMux
(GFP-T and GFP-F variants) circuit pack.
— For the SuperMux NTK535FA variant, there are no limits. GCC0 and
GCC1 on OTM2 are supported simultaneously, 11 LDCC and 11
SDCC on OC-n/STM-n facilities are supported.
— Maximum of two dual-OSCs or four OSC channels, per shelf.
— Maximum of two Section/RS or Line/MS DCCs per
5G 16xOC-n/STM-n circuit pack (NTK512FAE5 and NTK513FAE5).
— Maximum of 16 Section/RS or Line/MS DCCs per
10G 16xOC-n/STM-n circuit pack (NTK512GAE5 and NTK513GAE5).
— Maximum of 16 DCC channels (eight Section/RS DCC and eight
Line/MS DCC) on the 8xOC-n/STM-n (NTK511AA) circuit pack.
It is also necessary to consider the network topology and the traffic being
routed through the various interfaces and Network Elements. It is important to
consider these under normal conditions as well as failure conditions. For
example in a dual Gateway NE (GNE) subsystem it is necessary to design the
network such that a single GNE can forward all traffic for the entire subsystem.
The main applications which generate traffic in the DCN are described below:
• OAM&P traffic: Operations, Administration, Maintenance & Provisioning
traffic flows are between the User (craft PC/Management System) and the
Network Element, typically via a GNE. Where TID consolidation (TIDc) is
used the following traffic flow must be additionally understood:
— TID consolidation (TIDc): With TIDc the OneControl forwards all
OAM&P traffic towards the TIDc primary. The TIDc primary forwards
the OAM&P traffic to the appropriate TIDc member shelf. Typically
TIDc traffic between the primary and member shelves will use local
Ethernet connectivity at the site; however, in failure conditions TIDc
traffic may use additional communication interfaces (Internal or
External) to maintain comms between member shelves.
• Photonic applications: For detailed information on Photonic concepts,
applications, and engineering rules supported for 6500, refer to 6500
Packet-Optical Platform Photonic Layer Guide, NTRN15DA. A summary
of the main traffic flows associated with Photonic applications are as
follows:
— Domain Optical Control (DOC): DOC traffic flows between Network
Elements. Typically DOC traffic will utilize the internal communication
interfaces (OSC, Ethernet (and GCC in Single Stretch Span
solutions)) however in some topologies it may be beneficial to use the
External DCN as a backup for DOC traffic.
DOC can delete or auto-delete channels that traverse a faulted span
as long as the topology remains available. This is the case for domains
that are upstream of the faulted span, downstream of the faulted span,
and for the domain that contains the faulted span. For example, If there
6500 NE throughput
The 6500 supports hardware and software forwarding. It is important to
establish which forwarding mechanism is being used to determine which
throughput figure to use when performing the DCN bandwidth dimensioning.
Hardware forwarding is used in all other cases. This includes GNEs in the
following configurations:
• Proxy ARP
• Static routing
• IISIS routing
• OSPF routing
Table 1-70 on page 1-409 provides the NE throughput values for the 6500.
Table 1-70
6500 NE throughput
Note 1: Typically the sum of the available Communication Interface bandwidth will
determine the maximum throughput of a 6500 NE when using Hardware forwarding.
Note 2: The 6500 software forwarding achieves approximately 550 packets per
second. The actual throughput depends on the packet size. The value stated has
been calculated from an average packet size of 192 bytes which is an expected
standard profile for most applications.
Note 3: If using Private-IP GNE mode, refer to the “Private-IP” “DCN engineering
guidelines” on page 1-404 for the maximum number of RNEs that can subtend the
GNE.
Table 1-71
Network element minimum link speeds
Network Element Minimum Link Speed
The per-NE bandwidth provides an average bandwidth figure per-NE that can
be used to dimension the DCN. The per-NE bandwidth is dependent on the
NE type and the operational characteristics of the network. The following
operational characteristics of a network influence the per-NE bandwidth
figures:
• Craft operations and the number of users: The amount of provisioning
(changed facilities and changed cross connects per second).
• Status of Network: Number of alarms per second.
• OneControl: The number of OneControl servers that an NE is enrolled to,
PM collection, backup and restore.
• One-time Operations: Software downloads.
For all scenarios in Table 1-72 on page 1-411 it is assumed that 15 minute PM
collection and bulk provisioning are not used with less than 5 NE backups
per-NE per day.
Table 1-72
Per-NE bandwidth requirements
Note 1: These figures assume a 6500 NE configuration of 6500 MSPP with LO/HO XC and Photonic
equipment. This 6500 NE type is has the highest bandwidth requirement. Subsequent releases will
provide a breakdown of the bandwidth requirements per 6500 NE configuration.
Note 2: Refer to the 61x0 planning guide for additional engineering guidelines which need to be
considered for 61x0 deployments such as NE throughput and hop count.
Figure 1-109
6500 MSPP with 6130 (IISIS routing)
00 00 5 * 6130
65 65
5 * 6130 Ring (iISIS)
Ring (iISIS)
GNE1 NE4
00 00
65 65
Legend
00
65 = 6500 MSPP L0/H0 XC
NE throughput
IP comms between the 6500 GNE and the other 6500 NEs will use hardware
forwarding. Each remote 6130 will auto tunnel IP packets towards the External
DCN therefore software forwarding must be considered for each 6130 NE.
Table 1-73
GNE throughput requirements
NE throughput Minimum Typical bandwidth Maximum bandwidth
bandwidth (kbit/s) (kbit/s)
(kbit/s) for
non-OneControl Single Dual Single Dual
managed OneControl OneControl OneControl OneControl
solutions
Note: 6130 throughput assumes 6130 NEs are in a ring and the worst case fiber failure is present.
The GNE does not exceed its software forwarding capabilities in the minimum
and typical Bandwidth operational models. If the Maximum bandwidth model
must be applied to this network additional GNEs should be considered. It is
worth noting that the NE throughput must be considered at all NEs not just the
GNE.
Table 1-74
Worst case Line/MS DCC bandwidth loading
As can be seen from Table 1-74 on page 1-413 the operational models
resulting in minimum and typical bandwidth requirements do not exceed the
Line/MS DCC. If the operational model results in the maximum bandwidth
usage the Line/MS DCC bandwidth between GNE1 and NE2 may become
congested during busy periods, with the possibility of sub-optimal
performance under this worst case failure scenario.
• DSM support
— 6500 only network with direct IP access
– no limit on the number of DSMs in the GNE subsystem
– section/RS, line/MS, and GCC bandwidth (see “Physical
(DCC/GCC/OSC)” on page 1-406) should consider each 6500
network element with one to eight DSMs as the equivalent of two
6500 network elements and each 6500 network element with nine
to sixteen DSMs as the equivalent of three 6500 network elements
– a single network element can support a maximum of 16 DSMs.
— 6500 only network with NAT or Private-IP on GNE
– maximum of 80 DSMs in the GNE subsystem
– when considering DCN throughput (see “Physical
(DCC/GCC/OSC)” on page 1-406), each 6500 network element
with one to eight DSMs should be considered the equivalent of two
6500 network elements, each 6500 network element with nine to
16 DSMs should be considered the equivalent of three 6500
network elements. For example, if you have two network elements
with 16 DSMs and two network elements with eight DSMs, this is
equivalent to 10 network elements (2x3 + 2x2), which would allow
another two subtended 6500 network elements (from the 12 limit
for 6500 network elements with low-order cross-connects) if these
did not have DSMs connected.
• Telnet sessions
— When considering DCN engineering guidelines, a maximum of 18
Telnet sessions per network element should be used.
If both SSH and Telnet servers are enabled, the total maximum
number of SSH and Telnet sessions cannot exceed 18.
— All 6500 network elements with IP configured
No limit on the number of sessions per 6500 GNE subsystem except
for limit on the section/RS, line/MS, or GCC bandwidth (see “Physical
(DCC/GCC/OSC)” on page 1-406).
— All 6500 network elements with IP configured and using NAT
Maximum of 54 Telnet sessions with autonomous output (AO)
message reporting enabled for a GNE subsystem. This maximum can
be increased if OM 3000/OM 4000/6110 network elements are
substituted for the 6500 network elements (maximum of two
TL-1/CLUI sessions per OM 3000/OM 4000/6110 network element).
For example, a GNE subsystem with one gateway 6500 network
element, eleven subtending 6500 network elements, and nine
OM 3000/OM 4000/6500 network elements can have a maximum of
62 Telnet sessions (four Telnet sessions for each of the eleven 6500
network elements and two TL-1/CLUI sessions for each of the nine
OM 3000/OM 4000/6500 network elements).
— If more than four Telnet sessions per 6500 network element are
required, AO message reporting must be disabled for the additional
Telnet sessions. The additional Telnet sessions must be through local
connections on the network element or a COLAN connection and not
through a DCC/GCC or ILAN connection.
The OM 3000 and OM 4000 do not use Telnet (OM 3000 uses TL-1
sessions and OM 4000 uses CLUI sessions) except for the Telnet
sessions between the OM 3000 and the NP. The TL-1 and CLUI sessions
and the Telnet sessions used when GRE tunneling from the 6500 to the
OM 3000 NP should be used for calculating the maximum number of
Telnet sessions.
To inhibit and allow AO message reporting on 6500, use the TL-1
INH-MSG-ALL and ALW-MSG-ALL commands. The INH-MSG-ALL
command disables AO message reporting only for that Telnet session.
Each Site Manager session in 6500 opens a Telnet session (which must
be counted towards the maximum number of Telnet sessions). To inhibit
AO message reporting from Site Manager, clear the Auto Refresh check
box in the Active Alarms application and run the INH-MSG-ALL command
from the TL1 Command Builder application. To enable AO message
reporting from Site Manager again, run the INH-MSG-ALL command from
the TL1 Command Builder application and select the Auto Refresh check
box in the Active Alarms application if real-time monitoring of alarms is
required.
Table 1-75 on page 1-417 summarizes the scalability rules for the 6500.
Optical Service Channel (OSC) 576 kbps MOR, MOR Plus and 1600 amplifiers.
Optical Service Channel (OSC) 100 Mbps CPL, 6500: Ethernet over OC3/STM1
SONET/SDH.
Only supports OSPF.
SDCC and LDCC supported packet sizes 512 to 1492 For 6500, refer to “Lower layer DCC
(default 1304) implementation rules” on page 1-17.
Maximum number of GCCs per network element 60 Refer to “Lower layer DCC
implementation rules” on page 1-17.
Table 1-75
6500 service metrics (continued)
Maximum number of GCC0 and one GCC1 per 1 Refer to “Lower layer DCC
WT circuit pack implementation rules” on page 1-17.
Maximum line DCCs per SuperMux circuit pack 2 No GCC. Refer to “Lower layer DCC
implementation rules” on page 1-17
Maximum number of line DCC and of 1 each One line DCC and one of
GCC0/GCC1 per SuperMux circuit pack GCC0/GCC1 per SuperMux circuit
pack. Refer to “Lower layer DCC
implementation rules” on page 1-17.
Maximum number of OSCs per network element 4 Refer to “Lower layer DCC
implementation rules” on page 1-17.
NE throughput
IISIS
Maximum number of nodes in an area 150 Refer to “IISIS router implementation
rules” on page 1-45.
Maximum routes redistributed into IISIS 160 Refer to “IISIS router implementation
rules” on page 1-45.
Maximum OSI routes (NSAP) in the L1 routing 150 Refer to “IISIS router implementation
table rules” on page 1-45.
OSPF
Maximum OSPF routers per OSPF area 150 Refer to “OSPFv2 router
implementation rules” on page 1-51.
Table 1-75
6500 service metrics (continued)
General IP NA
Maximum number of opaque LSAs for non-SP-2 1200 Refer to “DCN engineering
guidelines” on page 1-404.
Maximum of opaque LSAs for SP-2/CTM (only 1600 Refer to “DCN engineering
supported if entire OSPF network is SP-2/CTM) guidelines” on page 1-404.
GNE
Support for migration from IPv4 to IPv6 is available from Ciena professional
services.
If the new network elements have different configurations than the cloned
(golden) network element, the DCC/GCC comms may not be preserved on
the network elements. To completely preserve the DCC/GCC comms, the new
network elements must have the same equipment (same PECs) and facilities
as the golden network element for all slots and ports (and be functioning the
same).
If the new network elements do not have the same equipment (same PECs)
and facilities as the golden network element, the database is still cloned to the
new network element but circuit pack mismatch alarms are raised. After the
restore, you must manually correct mismatches by deleting/provisioning
equipment to clear mismatches and DCC/GCC failures. All provisioning data
is restored on matching equipment.
When saving and restoring the provisioning data, the user has the option of
selecting the Do not backup or restore the Comms settings and Shelf
Data option. When this option is selected, the comms-related information is
not saved or restored. The Do not backup or restore the Comms settings
and Shelf Data option must be used in pairs, both the save and restore
operation must have the option selected or deselected otherwise the restore
operation fails.
To use this feature to clone network elements with the same provisioning data
except comms-related information:
• provision a network element with the required provisioning data and save
the provisioning data with the Do not backup or restore the Comms
settings and Shelf Data option selected to a chosen location (golden
database)
• provision the comms-related information on the new network elements
• restore the provisioning data from the golden database to the new network
elements with the Do not backup or restore the Comms settings and
Shelf Data option selected
Appendix A
The following sections contain background information on:
• “IP networks, addressing, and masks” on page 1-422
• “IP routing protocols” on page 1-426
• “Subnetting and supernetting - IP addressing examples” on page 1-438
The next section shows the bit significance of the dotted decimal notation.
Example: 10010001
• 10000000 is represented by 128
• 00010000 is represented by 16
• 00000001 is represented by 1
• Total 145
An IP address contains a 32-bit address field and a 32-bit subnet mask. The
mask defines which part of the address is a network address and which is a
device address. The mask thus allows a router to decide whether the address
of the packet is destined for one of the subnets to which it is connected.
Circuitless IP interface
A circuitless IP interface (SHELF IP interface on 6500) is a virtual interface
that exists in software only. The special property of this interface is that it
always exists and is therefore always included in the routing tables. Ethernet
and serial interfaces cease to exist if a connector falls out, or if the device at
the other end of the cable fails for any reason. The interface then shuts down
and is removed from the routing tables.
Some manufacturers use other terms for the circuitless IP interface (for
example, loopback interface).
Having an interface that always exists within a router is very useful for the
following reasons:
• If a tunnel is set up between two router interfaces and one of the interfaces
fails, the tunnel fails. However, when the tunnel is set up between two
circuitless IP interfaces, if the normal route fails, the tunnel is re-routed if
another route exists and does not fail.
• If during a Telnet session on a router the interface to which the session is
connected goes down, then the session is lost. Another connection using
the IP address of an alternative interface must be made. If Telnet sessions
are set up to connect to the router using the circuitless IP interface, then
loss of one interface is not a problem, providing the router has at least one
working IP interface.
IP routing protocols
The primary function of IP, which resides at the network layer (3) of the OSI
(Open Systems Interconnect) model, is to receive data from the higher layer
protocols (TCP [Transmission Control Protocol] or UDP [User Datagram
Protocol] layers) on a source host, create a datagram and route the datagram
through a network to a destination host. Secondary functions of IP include
fragmentation and reassembly of the datagram, and packet lifetime control.
The most important IP routing protocols are explained in the following
sections.
ARP
ARP (Address Resolution Protocol) is used to map IP addresses to LAN
(Local Area Network) hardware addresses. When a host wishes to send a
packet to a host on another network, it sends the packet to its gateway for
forwarding. It can also do the same for a packet destined for a host within the
same network but it leads to excessively high traffic levels, especially if a large
number of hosts are on the LAN. Therefore, in order to reduce the traffic on a
LAN, a node uses ARP with another node when it determines that the
destination address is on a directly attached network. The node can
determine if the host is local by comparing the network portion of its own IP
address (including the subnet) with the target address.
Therefore, in order to avoid using the gateway, the originating host must
determine the destination host’s local data link layer address. It achieves this
by sending out an ARP request message containing its own IP address and
data link layer address, and the IP address of the destination host. This
message is sent using the gateway. The destination host then responds with
an ARP reply message containing its own data link layer address and uses the
originating host’s data link layer address as the destination address. Thus the
reply does not need to go using the gateway. The originating host and
destination host store the learned network and data link layer address pairing
in their ARP caches for future use, thus avoiding the use of the gateway
altogether. The rest of the hosts on the LAN build up similar caches, thus
reducing LAN traffic.
TARP
The TID address resolution protocol (TARP) is used by TL1-based network
elements to convert target identifiers (TID) into network service access points
(NSAP). An NSAP is used internally in a SONET/SDH communications
network as a means of addressing a network element.
ATTENTION
TARP on the 6500 only supports upper-case TIDs. For example, TARP would
interpret OTTAWA and Ottawa to be the same TID. If mixed-case TIDS are
provisioned, unexpected results will occur.
Proxy ARP
Proxy ARP allows a gateway network element to respond to an ARP request
from a locally attached host or end station for a remote destination. It does so
by sending an ARP response back to the local host with its own MAC address
of the network element interface for the subnet on which the ARP request was
received. The reply is generated only if the network element has an active
route to the destination.
OSPF
OSPF (Open Shortest Path First) is an open protocol, as defined in Request
For Comments (RFC) 2328. It is based on the Dijkstra’s “Shortest Path First”
algorithm, which is a link state routing mechanism.
The topology of each OSPF area is invisible to entities outside the area. This
area partitioning system speeds up routing, because all packets with
destinations within an area are contained within that area; packets destined
for another area are sent to the backbone area for redirection.
A router (boundary router) must always be used as the interface between the
two networks. There can be more than one router performing this role.
The rules for area use within OSPF networks contrast with the way areas are
implemented in OSI in the following ways:
• There is no requirement for a backbone area within OSI.
• The border between OSI areas is between routers (that is, a OSI router
can only reside in one area), whereas the border between OSPF areas
runs through a router (that is, an OSPF router can be in more than one
area).
Routes are redistributed into OSPF using Type-5 External LSAs with either a
Type-1 or Type-2 external metric. Type-1 external metrics consider the units of
the external AS to be comparable to those of the OSPF AS and therefore
routing calculations include both the internal and external metrics. Type-2
external metrics are considered an order of magnitude greater than the
internal metrics and therefore only the external metrics are used in routing
calculations (internal metrics may, however, be used to break ties).
For more information related to ASBR settings, refer to “OSPF Router ASBR
setting” on page 1-433. For information on when ASBR functionality is
required in 6500 configurations, refer to “6500 configurations requiring ASBR
set to ON” on page 1-434. For more information on route redistribution and
summarization, refer to “IPv4 route redistribution and summarization” on
page 1-98.
The “OSPF NSSA Option (RFC 1587)” and “OSPF Database Overflow (RFC
1765)” are not supported for 6500.
RFC 5250 is not supported for 6500. In particular, section 5, which deals with
inter-area considerations, is not followed. 6500 originates Type-11 opaque
LSAs but may have the ASBR parameter associated with the OSPF router
instance set to OFF (default). Refer to “OSPF Router ASBR setting” on
page 1-433, “Opaque LSAs” on page 1-130, and “Database Replication
Service (DBRS) (D-Series/S-Series shelf IPv4 only)” on page 1-132 for more
information.
Terms
Some terms associated with OSPF are:
• Costs: Routes have a cost associated with them. The higher the cost the
less favorable the route.
• Policy filters: This parameter only applies when an OSPF network uses
external routes. An announce filter acts on the outward advertisements
form the OSPF area and the accept filter acts on inward advertisements.
As the LSPs are modified by the filter and the resultant used to produce a
routing table, it follows that policy filters must be applied to all routers in
the OSPF network and not just to the boundary router.
• Link state: is the status of a link between two routers.
• Cost of a link: is computed from bandwidth, real cost, availability,
reliability and other link metrics.
• OSPF area: is a collection of connected routers which exchange link state
updates.
• Adjacencies database: lists all a router’s neighbors.
• Link State Database: is a list of link states from all other routers in the
OSPF area. All routers have identical link state databases.
• OSPF routing table: is produced from the OSPF link state database.
• Routing table (forwarding table): The best routes are chosen from all
protocol routing tables. Note that each router has a different routing table.
• Backbone area: Area to which all other OSPF areas are connected. It is
referred to as area 0.0.0.0 or area 0.
• Standard area: Area which is not the backbone area but which receives
all link state updates from external networks.
• Stub areas: These are areas which can have more than one interface, but
by definition do not carry transit data and do not receive link state updates
from external networks. All routers in a stub area must be set to be stub
routers. How this is implemented varies between router manufacturers.
• Totally stubby areas: Stub areas which do not receive summary LSAs.
• NSSA (Not So Stubby Areas): Stub areas which receive certain link state
updates from external networks (this feature is not supported because of
its incompatibility with opaque LSAs).
• Router ID: This is the number by which each router is known to OSPF. On
a Bay router, the default is the IP address of the first configured interface.
On Cisco, the default is the highest configured IP address. On both routers
it must be manually configured to be the same as the circuitless
IP/loopback address.
• Border router: A router which is in the backbone area and one or more
other OSPF areas.
Topology considerations
An OSPF network has to be planned out in areas to take full advantage of the
protocol. With OSPF packets destined for an area outside the current area are
sent to area 0. Thus it can be inferred that all areas must have a connection
to area 0. There can be more than one connection between an area and area
0 but there must be no inter-area connections. It can be concluded that OSPF
networks are tree structures which lend themselves to hierarchical addressing
schemes using variable length subnet masks.
The designated router on a LAN in a network running OSPF has a very high
processor utilization. It can be that some routers are unsuitable for this role
and so must be allocated a priority of 0.
Wherever possible the DCN network must be fitted into one area (area 0). This
gives the benefit of OSPF speed and versatility without the restrictions on
topology.
Figure 1-110
OSPF areas
Area 1
Area 2
Area 0
(Backbone)
Area 3
Area 4
Advantages of OSPF
OSPF is link state technology as opposed to the distance vector technology
and OSPF addresses the requirements of large scalable networks. Issues
addressed by OSPF are:
• Speed of convergence: With OSPF convergence is quicker because
routing changes are flooded throughout the network and new routing
tables computed in parallel.
• Variable length subnet masks: OSPF supports variable subnet masking
and advertises varying levels of subnets.
• Route summarization: OSPF supports route summarization which is the
consolidation of multiple routes into one single advertisement. It requires
a hierarchical network but has the advantage of confining topology
changes to within an area and so significantly reduces the workload on
routers in other areas.
Figure 1-111
Route summarization
In the context of 6500, a network element can import static routes and IISIS
routes into OSPF, and does so if the following conditions are met:
• the ASBR parameter associated with the OSPF router instance is set to
ON. The default is OFF.
• one or more OSPF redistribution policies are defined and met.
Setting the ASBR parameter to ON results in the E-bit being set in the router
LSA regardless of whether routes are actually being imported into OSPF by
that router, and ABRs in the network would generate Type-4 summary LSAs
for that router. Therefore, to minimize the number of Type-4 LSAs and the
overall OSPF database size, it is recommended that the ASBR parameter be
set to ON only for NEs that are truly acting as ASBRs. For all other NEs, the
ASBR parameter should be set to OFF.
ATTENTION
In 6500 releases prior to Release 7.0, the default ASBR setting was ON and,
as a result, some NEs in existing networks may have the parameter enabled
unnecessarily. Ciena recommends that for larger networks the parameter be
disabled if not required. Contact Ciena technical support for information on
how this can be performed.
Router LSA
Each OSPF router in an OSPF area will generate a router LSA with intra area
flooding scope (flooded to all OSPF routers in the OSPF area). In DCN
solutions the total number of router LSAs in an OSPF area is the sum of the
External DCN routers in the OSPF area and the number of OSPF enabled
Network Elements in the OSPF area. The router LSA describes the router's
OSPF interfaces to an area and will increase in size with the number of OSPF
interfaces configured in the area.
ATTENTION
A router LSA generated from a 6500 with multiple GCC channels using
OSPF will be significantly larger than the LSA generated from an NE with
OSC/Ethernet OSPF interfaces. If large router LSAs will be present it may be
necessary to assign a value of 2 or 3 (depending on number of OSPF
interfaces) to each LSA when counting the total LSAs for engineering
purposes.
Network LSA
A Network LSA will be generated for each numbered Ethernet LAN in the
OSPF area and has intra area flooding scope.
AS-External LSA
Autonomous System Boundary Routers (ASBRs) advertise routes to
destinations which are outside the OSPF autonomous system (AS) using AS
External LSAs. One AS-External LSA will be generated for each IP route
advertised into the OSPF AS. AS-External LSAs are flooded throughout the
OSPF AS. It is important to consider how many AS-External LSAs are being
advertised into the OSPF autonomous system by ASBRs. A router distributing
either a static or default route into the OSPF autonomous system is an ASBR.
A router distributing a route learned from another routing protocol (BGP, IISIS,
EIGRP, RIP, or other OSPF AS) is an ASBR.
To provide scalability ABRs are typically able to control the number of Network
Summary LSAs that are advertised into the non-backbone OSPF areas. It is
important to understand the number of Network Summary LSAs (if any) that
are advertised in by the ABRs.
Each ABR will advertise an ASBR Summary LSA into the non-backbone
OSPF areas for each ASBR in the OSPF AS. ABRs will not advertise an
ASBR Summary LSA into a non-backbone area for an ASBR which is part of
that non-backbone area (the router LSA received from the ASBR is used
instead).
Each ABR for an OSPF area will advertise Network Summary LSAs
(depending on route summarization and filtering configuration) and ASBR
Summary LSAs. Typically two ABRs are required as a minimum to provide
resilience, therefore each Network Summary LSA will be advertised into the
non-backbone area twice (once from each ABR). In some situations it is
necessary to have more than two ABRs; the impact on the number of LSAs in
the area should be considered in these scenarios.
By default, in 6500 R7.0 and above and CPL4.02 and above, ASBR
functionality is disabled when the OSPF router is created. Leaving the ASBR
parameter disabled on network elements, where ASBR functionality is not
required, will reduce the number of ASBR Summary LSAs generated by Area
Border Routers (ABRs) into the non-backbone OSPF area(s). Refer to “OSPF
Router ASBR setting” on page 1-433.
Route preference
All routing protocols are assigned a preference which allows the router to
select routes when different protocols each report a path to the same network.
It could be considered as a measure of availability. For 6500, the preferences
are as follows:
Most specific Route -> Local configured interfaces -> Static routes -> ISIS
(Internal) -> OSPF (Internal) -> OSPF (External, learned) -> IISIS (External,
learned).
Default routes are a form of static routes in that they provide a catch-all for
destinations not contained in routing tables. In effect they provide a static
route to a large network rather than a specific IP address or subnetwork. In
the case of the subnetwork attached to an external DCN, the intermediate
router on the border has a default route to the external DCN advertised into
the subnetwork.
Figure 1-112 on page 1-437 provides an example of the way that static routes
and default routes are used.
Figure 1-112
Default and static routes
Host numbering would start 000001, 000010, 000011, ..., but network
numbering would start at 100000, 010000, 110000, ... .
Figure 1-113 on page 1-439 provides an example of two routers within a DCN.
Figure 1-113 on page 1-439 is only an example used to illustrate the general
principles of IP addressing allocation.
Figure 1-113
Example IP addressing for two routers within a DCN
Between them, the two routers shown in Figure 1-113 on page 1-439 have the
following interfaces:
• router 1, serial 0
• router 1, serial 1
• router 1, Ethernet 0
• router 1, circuitless IP
• router 2, serial 0
• router 2, serial 1
• router 2, Ethernet 0
• router 2, circuitless IP
Seven separate subnetworks are required. These are the networks connected
to R1 Ethernet 0, R1 circuitless IP, R2 Ethernet 0, and R2 circuitless IP, and
the three serial links. In order to provide seven subnetworks, three bits are
required.
If four bits are used for the subnetwork addresses, it provides provisioning for
up to 14 subnetworks; subnets 0000 and 1111 are reserved. This leaves four
bits that are used for the host ID.
However, not all the subnetworks must be the same size. Only two devices are
on a WAN point-to-point link, so a mask of 255.255.255.252 would suffice,
giving four combinations (host ID of 00 and 11 not allowed). SHELF IP
addresses are singularities and in general can have a mask of
255.255.255.255. In the following examples, one subnet has been further
subnetted for the serial links and another for the circuitless IP interfaces.
Four bits gives 16 combinations. The host IDs of 0000 and 1111 are reserved.
The Ethernet port of the router usually has host ID 0001. Therefore 0010 to
1110 are available for up to 13 other devices.
Subnetwork Host ID
• in decimal: 255.255.255.240
Therefore, the following addresses can be allocated for the Ethernet ports
(see Figure 1-114 on page 1-442):
• R1 Ethernet 0
— subnetwork 192.168.7.16 (192.168.7.0 is reserved)
— IP address 192.168.7.17, subnetwork mask 255.255.255.240
— host ID for other devices connected to R1 Ethernet 0: 192.168.7.18 to
192.168.7.30
• R2 Ethernet 0
— subnetwork 192.168.7.32
— IP address 192.168.7.33, subnetwork mask 255.255.255.240
— host ID for other devices connected to R2 Ethernet 0: 192.168.7.34 to
192.168.7.46
Figure 1-114
Allocation of IP addresses
Overview
This chapter provides procedures and parameter information related to the
6500 Packet-Optical Platform (6500) network data communications for
D-Series and S-Series shelves.
ID Identifier
IP Internet protocol
IPv4 Internet protocol version 4
IPv6 Internet protocol version 6
IISIS Integrated ISIS
ISIS Intermediate system to intermediate system
LAN Local area network
LAPD Link access protocol on the D-channel
LLDCC Lower layer DCC
LSA Link state advertisement
MAC Media access control
MD5 Message digest 5 algorithm
MDIX Medium-dependent interface cross-over
MS Multiplex section
NAT Network Address Translation
NDP Neighbor discovery protocol (refers to Ciena topology feature),
Neighbor discovery (ND) proxy (refers to IPv6 protocol)
NET Network entity title
NSAP Network access service point
NSSA Not so stubby area
OAM Operations, administration, and maintenance
OCI Optical Channel Interface
OCLD Optical Channel and Laser Detector
OSC Optical service channel
OSI Open systems interconnect
OSPF Open shortest path first
OSPFv2 Open shortest path first, version 2 (refers to OSPF for IPv4)
OSPFv3 Open shortest path first, version 3 (refers to OSPF for IPv6)
OTM Optical transport module
OTN Optical transport network
OTU Optical channel transport unit
PAP Password authentication protocol
PC Personal computer
PPP Point-to-point protocol
RS Regenerator section
SDH Synchronous digital hierarchy
SDH-J Synchronous digital hierarchy-Japan
Opening window
Edit command
Comms Setting “Editing the communications settings” on page 2-9
Management Procedure 2-3, “Editing the IP Version”
Procedure 2-4, “Editing the Site Level Data Distribution”
Procedure 2-5, “Migrating an MD5 key”
Add command
Comms Setting Procedure 2-6, “Adding a new entry in the communications settings”
Management
Delete command
Comms Setting Procedure 2-10, “Performing a trace route using Site Manager”
Management
Command line Procedure 2-11, “Using the 6500 CLI ping and trace commands”
interface Note: You must use the command line interface and not the Site Manager to
perform this procedure.
Associated procedures
Some procedures require the user to perform procedures relating to other
topics. Before performing a procedure, if necessary ensure that the
information about the associated procedures is available.
All procedures assume that the user is logged in to the network element (see
Administration and Security, 323-1851-301).
Procedure 2-1
Retrieving communications settings
Use this procedure to retrieve the provisioned parameters associated with the
DCN. For more information on these parameters and how they apply to the
DCN, refer to Chapter 1, “Data communications planning”.
The first time you login to Site Manager and access the Comms Setting
Management application, the IPv4 tab is displayed by default.
The IPv4/IPv6 context is held per NE basis from the Site Manager. For
example, if you switch to IPv6 for IP and then access the OSPF application,
the IPv6 context will be maintained. You can switch between IPv4 and IPv6 at
any time.
IPv4 and IPv6 tabs will be enabled/disabled according to the state of the NE.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
• Interfaces
ARP/ND Proxy, ARP/ND Table, DSM OAM Link, Encryption Access,
GNE, GNE Port Filter, GRE, IP, LAN, Lower Layer DCC/GCC, NDP, PPP,
Serial/RS232, TL1 Gateway Connections, USB
The ARP/ND Proxy, ARP/ND Table, GNE, and IP windows contain two
tabs: IPV4 and IPV6.
• Services
IP Version Configuration, Database Replication, DHCP, DHCP Relay
Agent, DHCP RA Interfaces, FTP, SSH/Telnet, NETCONF, HTTP/
HTTPS, TEST-PING, Zero Touch Provisioning, NAT Configuration,
Traceroute, LinkLocal
Step Action
5 If the IPv4 tab and IPv6 tab are shown, select the desired tab.
Note 1: The Comms Setting Management parameters that display on Site
Manager for the Routers, Interfaces, and Services windows will change
depending on the enabled IP version(s). If the NE is set to IPv6 = Enable and
IPv4 = Administratively Disabled, the Site Manager applications that are only
for IPv4 will be removed and/or grayed out.
Note 2: The first time you login to Site Manager and access the Comms
Setting Management application, the IPv4 tab will be displayed by default.
Note 3: If an IPv6 tab is not displayed, that means the application is either
independent of the Internet protocol or it does not support IPv6 (for example,
NAT Configuration only has a single tab).
Note 4: The IPv4/IPv6 context is held per NE basis from the Site Manager.
For example, if you switch to IPv6 for IP and then access the OSPF
application, the IPv6 context will be maintained. You can switch between IPv4
and IPv6 at any time.
Note 5: IPv4 and IPv6 tabs will be enabled/disabled according to the state of
the NE.
The information about the selected comms is displayed. See
“Communications management parameters” on page 2-31 for information
about the options available. For tables, the number of items in the table is
displayed on the right above the table.
—end—
Procedure 2-2
Editing the communications settings
Use this procedure to edit the provisioned parameters associated with the
DCN. For more information on these parameters and how they apply to the
DCN, refer to Chapter 1, “Data communications planning”.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
Note: You can edit the static route for IPv6 only. You cannot edit it for
IPv4.
• Interfaces
— “ARP/ND Table parameters” on page 2-68
Note: You can edit ND Proxy list items, but you cannot edit Proxy ARP
list items.
— “DSM OAM Link parameters” on page 2-69
— Encryption Access, refer to Encryption and FIPS Security Policy
Overview and Procedures, 323-1851-340
— “IP parameters” on page 2-74
— “LAN parameters” on page 2-77
— “GNE parameters” on page 2-70
Note: You can edit GNE for IPv4 only. You cannot edit it for IPv6.
— “Lower Layer DCC/GCC parameters” on page 2-79
Note: The Edit button for the lower layer DCC/GCC parameters is only
applicable to LAPD parameters.
— “NDP parameters” on page 2-86
— “PPP parameters” on page 2-87
— “USB parameters” on page 2-92
Step Action
• Services
— “IP Version Configuration parameters” on page 2-97. For the
procedure, refer to Procedure 2-3, “Editing the IP Version”.)
— “Database Replication Service” on page 2-93
Note: The Database Replication Service window contains a Disable
button and an Enable button instead of an Edit button.
— “DHCP parameters” on page 2-94
— “DHCP Relay Agent parameters” on page 2-94
— “FTP parameters” on page 2-96
— “NETCONF parameters” on page 2-96
— “HTTP/HTTPS parameters” on page 2-96
— “SSH/Telnet parameters” on page 2-100
— “Zero Touch Provisioning parameters” on page 2-99
— “NAT Configuration parameters” on page 2-99
10 Click OK.
—end—
Procedure 2-3
Editing the IP Version
Use this procedure to edit the IP version. 6500 supports IPv4 and IPv6. One
or both protocols can operate at any given time. IPv4 is enabled by default.
IPv6 is disabled by default, but it can be enabled concurrently with IPv4 or
instead of IPv4. The IPv4 addresses and IPv6 addresses work independently
and simultaneously.
The IPv6 version setting must be turned on before the corresponding IPv6
provisioning commands will be accepted. For example, to provision an IPv6
address (in the Site Manager or TL1), IPv6 must be turned on. Prior to
disabling IPv6, the IPv6 provisioning must be deleted. IPv6 is not supported
on CPL.
The IPv4 Version setting does not need to be turned on before the
corresponding IPv4 provisioning commands will be accepted. The IPv4
Version setting has an administrative enable/disable option. This setting only
determines if the IPv4 options are displayed/available in Site Manager. The
provisioned IPv4 settings do not need to be removed before administratively
disabling IPv4.
For details about IPv4 and IPv6 support, refer to “IPv4 external DCN
connectivity” on page 1-78 and “IPv6 external DCN connectivity” on
page 1-96. For details about the IPv4 and IPv6 parameters, refer to “IP
parameters” on page 2-74. For more information on these parameters and
how they apply to the DCN, refer to Chapter 1, “Data communications
planning”.
Prerequisites
To perform this procedure you must:
• use an account with a level 3 UPC or higher
• remove all previously configured IPv6 addresses from the NE prior to
disabling IPv6
Step Action
Procedure 2-4
Editing the Site Level Data Distribution
Use this procedure to edit the Site Level Data Distribution. For details, refer to
“Site Level Data Distribution (SLDD) parameters” on page 2-58. For more
information on these parameters and how they apply to the DCN, refer to
“Site-Level Data Distribution (SLDD)” on page 1-142.
The P and/or G in suffix(es) displayed next to the shelf number denote(s) the
Primary shelf and/or a GNE.
Prerequisites
To perform this procedure
• You must use an account with a level 3 UPC or higher.
• SLDD interface provisioning shall be blocked if an OSPF circuit with
Opaque = ON exists against the interface.
• DBRS and SLDD are mutually exclusive on ILAN and COLAN interfaces.
The DBRS feature will block provisioning any interfaces if the SLDD
feature is enabled. The SLDD feature will block provisioning if DBRS is
enabled.
• A port and circuit must be provisioned for the SLDD interface to enter into
an active state.
Step Action
Step Action
8 At the Configuration drop-down list, in most cases, select Auto (the default
value), in which case the Scope-ID is automatically set to be the same value
as the Site ID of the shelf, and then go to step 10.
If the configuration is set to Manual, the Scope-ID must be specified in the
next step. It is recommended to consult with Ciena before setting to Manual.
9 At the SLDD Scope ID parameter, enter the scope ID. This parameter can be
edited only if the Configuration is Manual. Only shelves with the same Scope
ID will exchange information. It is recommended to consult with Ciena before
setting a manual Scope ID.
10 Click OK.
Adding an interface to the SLDD List
11 Select the required network element in the navigation tree.
12 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
13 Select the Routers tab.
14 Select SLDD from the Router Type drop-down list.
15 Select the required shelf from the Shelf drop-down list.
16 Click Add.
17 At the Name parameter, select the interface from the drop down list.
18 Click OK.
Deleting an item from the SLDD List
19 Select the required network element in the navigation tree.
20 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
21 Select the Routers tab.
22 Select SLDD from the Router Type drop-down list.
23 Select the required shelf from the Shelf drop-down list.
24 Select the interface in the table you want to delete.
25 Click Delete.
—end—
Procedure 2-5
Migrating an MD5 key
Use this procedure to migrate an IPv4 OSPF adjacency from one MD5 key
(older) to another MD5 key (newer). It covers the OSPF circuits at both ends
of the adjacency. For more information on MD5 authentication, refer to
Chapter 1, “Data communications planning”.
This procedure applies to 6500 to 6500 OSPF adjacencies. Similar steps can
be followed for 6500 to third party adjacencies, taking into consideration the
specifics of the third party device.
Prerequisites
To perform this procedure
• the OSPF circuits must be provisioned with the MD5 authentication type.
• you must use an account with a level 3 UPC or higher.
Step Action
Procedure 2-6
Adding a new entry in the communications settings
Use this procedure to add a new entry (interface, circuit, router) in the
communications settings. For more information on these parameters and how
they apply to the DCN, refer to Chapter 1, “Data communications planning”.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
• Interfaces
— “ARP/ND Proxy parameters” on page 2-67
— Encryption Access, refer to Encryption and FIPS Security Policy
Overview and Procedures, 323-1851-340
— “GNE parameters” on page 2-70
— “GNE Port Filter parameters” on page 2-72
— “GRE parameters” on page 2-72
— “IP parameters” on page 2-74
— “LAN parameters” on page 2-77
— “Lower Layer DCC/GCC parameters” on page 2-79
— “NDP parameters” on page 2-86
For the Add IISIS Router Parameters and the Add IPv4 OSPF Router
Parameters dialogs, you have the option of adding distribution lists. To add a
distribution list, use the Add button in the Redistribution section (lower
section). A maximum of 80 distribution lists can be added for each type of list.
To delete a distribution list, select the distribution list in the Redistribution
section (lower section) and select Delete.
• Services
— “DHCP Relay Agent parameters” on page 2-94
— “DHCP RA Interfaces parameters” on page 2-95
9 If Then
the dialog allows more than one entry to be click Apply. Go to step 8
added and you want to add another entry
otherwise go to step 10
10 Click OK.
After the manual area addresses are added/changed, perform a warm restart
of the shelf processor.
—end—
Procedure 2-7
Deleting an entry in the communications settings
Use this procedure to delete an entry (interface, circuit, router) in the
communications settings. For more information on these parameters and how
they apply to the DCN, refer to Chapter 1, “Data communications planning”.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
• Interfaces
— “ARP/ND Proxy parameters” on page 2-67
— “GNE parameters” on page 2-70
— “GNE Port Filter parameters” on page 2-72
— “GRE parameters” on page 2-72
— “IP parameters” on page 2-74
— “LAN parameters” on page 2-77
— “Lower Layer DCC/GCC parameters” on page 2-79
— “NDP parameters” on page 2-86
For the Add IISIS Router Parameters and the Add IPv4 OSPF Router
Parameters dialogs, you have the option of adding distribution lists. To add a
distribution list, use the Add button in the Redistribution section (lower
section). A maximum of 80 distribution lists can be added for each type of list.
To delete a distribution list, select the distribution list in the Redistribution
section (lower section) and select Delete.
• Services
— “DHCP Relay Agent parameters” on page 2-94
— “DHCP RA Interfaces parameters” on page 2-95
8 If you want to delete Then in the table, select
one circuit/port/entry the circuit/port/entry you want to delete from the
list of circuits/ports/entries
some but not all circuits/ select the first circuit/port/entry in the list and hold
ports/entries down the Ctrl key while individually clicking on
each required circuit/port/entry
all circuits/ports/entries select the first circuit/port/entry in the list and hold
down the Shift key while clicking once on the last
circuit/port/entry in the list.
or
select any circuit/port/entry in the list and then
Ctrl+A (Ctrl and A keys together) to select all
circuits/ports/entries
Bulk deletion is supported for some circuits/ports/entries in this release. For
the list of supported circuits/ports/entries, refer to “Communications
management parameters” on page 2-31.
9 Click Delete.
10 Click Yes to close the warning box.
—end—
Procedure 2-8
Displaying link local information
Use this procedure to display the IPv6 link local address for interfaces.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
Procedure 2-9
Performing a ping using Site Manager
Use this procedure to perform a ping using the TEST-PING option in Site
Manager. This procedure is applicable for IPv4 or IPv6.
If you perform another ping without clearing the screen, the old ping
information will be cleared and the most recent ping will be displayed. The
window displays only one result at a time, but the Comms log contains all of
the attempts.
The ping details are not shown in real time (meaning for every attempt/count
it does, the screen doesn't update). It waits for the ping to be complete.
Depending on the response time of the network, it could take some time to
display anything.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
Performing a ping
1 Select the required network element in the navigation tree.
2 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
3 In the Services tab, select the required shelf from the Shelf drop-down list.
4 Select TEST-PING from the Service Type drop-down list.
5 Click Ping.
6 Enter the IP Address, Count, Packet Size, and Timeout values. Refer to
“TEST-PING parameters” on page 2-103.
7 Click OK.
This completes the procedure.
Step Action
Clearing a ping
8 Select the required network element in the navigation tree.
9 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
10 In the Services tab, select the required shelf from the Shelf drop-down list.
11 Select the TEST-PING from the Service Type drop-down list.
12 Click Clear to clear the ping results.
—end—
Procedure 2-10
Performing a trace route using Site Manager
Use this procedure to trace a route using the Traceroute option in Site
Manager. This procedure is applicable for IPv4 or IPv6.
If you perform another trace route request, the old trace route information will
be cleared and the most recent trace route information will be displayed. The
window displays only one result at a time, but the Comms log contains all of
the attempts.
The trace route details are not shown in real time (meaning for every attempt/
count it does, the screen doesn't update). It waits for the trace route to be
complete. Depending on the response time of the network, it could take some
time to display anything.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
Performing a ping
1 Select the required network element in the navigation tree.
2 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
3 In the Services tab, select the required shelf from the Shelf drop-down list.
4 Select Traceroute from the Service Type drop-down list.
5 Click Traceroute.
6 Enter the IP Address, Hop Limit, number of Probes per hop, and TimeOut
values. Refer to “Traceroute parameters” on page 2-103.
7 Click OK.
—end—
Procedure 2-11
Using the 6500 CLI ping and trace commands
Use this procedure to test for network connectivity using IP and OSI ping and
trace commands. These commands are available in the 6500 command line
interface (CLI) when using Telnet or a terminal session.
Note: The user ID and password input in the command line interface is
not case-sensitive and is converted to uppercase unless enclosed by
double quotes ("). User IDs and passwords containing lowercase
characters can be entered by enclosing them in double quotes. The
challenge/response input is case-sensitive and does not require double
quotes.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
When you use the CLI port number (10010 or 10020) or SSH port (20002) for
a Site Manager terminal session or Telnet access, you access the CLI directly.
2 At the login prompt, enter the user ID by entering:
<user ID>
See Note at the beginning of this procedure.
3 At the password prompt, enter the password by entering:
<password>
See Note at the beginning of this procedure.
Step Action
Step Action
Step Action
Step Action
Step Action
Routers
IISIS Circuit Displays information about the IISIS circuits. See “IISIS Circuit Yes (Note 1) No
parameters” on page 2-35.
IISIS Router Displays information about the IISIS routing. See “IISIS Router Yes (Note 2) No
parameters” on page 2-38.
IP Static Route Displays information about the IP Static Route. See “IP Static Yes (Note 1) No
Route parameters” on page 2-39.
Static NAT Displays information about the Static Network Address Yes (Note 1) No
Translation (NAT). See “Static NAT parameters” on page 2-42.
Reverse Port Display the information about mapping the TCP/UDP port of Yes (Note 1) No
NAT external requests to other internal port numbers and use a single
external IP address to access service in the internal network. See
“Reverse Port NAT parameters” on page 2-43.
OSPF Circuit Displays information about the OSPF circuits. See “OSPF Circuit Yes No
parameters” on page 2-44.
OSPF Router Displays information about the OSPF routers. Supported on all Yes (Note 2) No
Ethernet, GCC channels, and static tunnels but not the craft LAN
port on the shelf processor. See “OSPF Router parameters” on
page 2-50.
Port Filter Displays information about the port filtering. It applies to IP Yes No
packets that are being forwarded from a private interface to a
public one, on the GNE. See “Port Filter parameters” on
page 2-53.
Upper Layer Displays information about the manual area addresses used in Yes No
DCC OSI addressing. See “Upper Layer DCC parameters” on
page 2-56.
SLDD Displays information about the Site Level Data Distribution Yes Yes
(SLDD). See “Site Level Data Distribution (SLDD) parameters” on
page 2-58.
IISIS Routing Displays the routing table. See “IISIS Routing Table parameters” No No
Table on page 2-61.
Table 2-1
Comms Setting Management options (continued)
Interfaces
ARP/ND Proxy Displays information about the ARP Proxy IP address. See “ARP/ Yes (Note 1) No
ND Proxy parameters” on page 2-67.
ARP/ND Table Displays information about the ARP table. See “ARP/ND Table No No
parameters” on page 2-68.
DSM OAM Link Displays information about the DSM OAM link status for OC3 No Yes
facilities. See “DSM OAM Link parameters” on page 2-69.
Encryption Refer to Encryption and FIPS Security Policy Overview and Yes Yes
Access Procedures, 323-1851-340.
GNE Displays GNE information used for tunneling on all interfaces Yes (Note 1) No
“GNE parameters” on page 2-70.
GNE Port Filter Displays information about the GNE port filtering interface. See Yes (Note 1) No
“GNE Port Filter parameters” on page 2-72
GRE Displays GRE information used for tunneling on all interfaces Yes (Note 1) No
except the RS-232 port. See “GRE parameters” on page 2-72.
IP Displays information about the IP on the LAN and RS-232 serial Yes Yes
ports. See “IP parameters” on page 2-74.
LAN Displays information about the six external LAN interfaces. “LAN Yes Yes
parameters” on page 2-77.
Lower Layer Displays information about the DCC/GCC communication on the Yes Yes
DCC/GCC OC-n/STM-n/STM0J/STM1J/STM4J and GCC communication
on the OTMn ports, and for specific circuit packs, the submarine
wayside channel. See “Lower Layer DCC/GCC parameters” on
page 2-79.
NDP Displays the admin state of the NDP feature and the facilities with Yes Yes
NDP enabled. See “NDP parameters” on page 2-86.
Table 2-1
Comms Setting Management options (continued)
Serial/RS-232 Displays information about the serial RS-232 ports. See “Serial/ No Yes
RS-232 parameters” on page 2-88.
TL1 Gateway Displays information about the TL1 Gateway Connections. See No No
Connections “TL1 Gateway Connections parameters” on page 2-91.
USB Displays the status of the SP2 USB ports. See “USB parameters” No Yes
on page 2-92.
Services
DHCP Displays information about the DHCP service used for local PC No Yes
access. See “DHCP parameters” on page 2-94.
DHCP Relay Displays information about the Relay Agent server. See “DHCP Yes Yes
Agent Relay Agent parameters” on page 2-94.
Note: For detailed DHCP Relay Agent related procedures, refer
to Commissioning and Testing, 323-1851-221.
DHCP RA Displays information about the DHCP RA interfaces. See “DHCP Yes No
Interfaces RA Interfaces parameters” on page 2-95.
Note: For detailed DHCP RA Interfaces related procedures, refer
to Commissioning and Testing, 323-1851-221.
FTP Displays information about the file transfer protocol (FTP) service No Yes
used for transferring files to/from the network element. See “FTP
parameters” on page 2-96.
SSH/Telnet Displays information about SSH and Telnet used for remote No Yes
access to/from remote computers. See “SSH/Telnet parameters”
on page 2-100.
TEST-PING Enables the user to perform a ping. See “TEST-PING N/A N/A
parameters” on page 2-103.
Table 2-1
Comms Setting Management options (continued)
Zero Touch Displays information about Zero Touch Provisioning. See “Zero No Yes
Provisioning Touch Provisioning parameters” on page 2-99.
NAT Displays information about NAT configuration. See “NAT No Yes
Configuration Configuration parameters” on page 2-99.
Traceroute Enables the user to trace the route. See “Traceroute parameters” N/A N/A
on page 2-103.
LinkLocal Displays the link local addresses for all interfaces. See “LinkLocal N/A N/A
parameters” on page 2-98.
Note 1: Bulk deletion is supported for this Comms Setting Management option. Refer to Procedure 2-7,
“Deleting an entry in the communications settings” for more information on how to perform a bulk
deletion.
Note 2: Bulk deletion is supported for the redistribution section of this Comms Setting Management
option. Refer to Procedure 2-7, “Deleting an entry in the communications settings” for more information
on how to perform a bulk deletion.
Routers tab
IISIS Circuit parameters
ISIS is a routing protocol based on the OSI intra-domain routing protocol with
IP-specific extensions as specified in RFC1195. IISIS allows IP and OSI to
coexist in a single routing domain, allowing IP-only routers, OSI-only routers,
and dual IP/OSI routers to be effective in routing in a single network.
The IISIS Circuit option is only applicable for IPv4. The IISIS Circuit option has
a single table. Use the Add button to provision new IISIS circuits and the
Delete button to delete existing IISIS circuits. You must create an IISIS circuit
on each provisioned interface you want IISIS to run on (except Auto-tunnels
and the RS-232 ports).
For OTMn ports (except for OTM2 ports on 1xOC-192/STM-64, 2x10G OTR,
or SuperMux circuit packs, and OTM3 ports on 40G OCI circuit packs), a
GCC0 or GCC1 PPP circuit (with IP address of 0.0.0.0) and an associated
IISIS circuit are automatically created when the OTMn facility is provisioned if
the default auto GCC0 mode or GCC1 mode parameter is set to IISIS in the
System tab of the Node Information application and if the Shelf IP has been
provisioned on the NE.
When provisioning both GCC0 and GCC1 with default IISIS metrics on a shelf,
Comms over GCC1 is preferred as opposed to GCC0.
Table 2-2
IISIS Circuit parameters
Parameter Options Description Addable/
Editable
Unit • SHELF-shelf Displays the available ports for an IISIS circuit. Yes
• LAN-shelf-15 Only OC-n/STM-n/STM0J/STM1J/STM4J/
• LAN-shelf-41 OTMn ports and OTUTTP/ODUTTP/ODUCTP
AID with lower layer DCC/GCC0/GCC1
• LAN-shelf-16 (or 42) provisioned are available for selection.
• COLAN-shelf-A IISIS over the GRE interfaces is not supported in
• COLAN-shelf-X this release.
• ILAN-shelf-IN
• ILAN-shelf-OUT
• GRE-shelf-IP-1 to 4
• OC-n/STM-n/STM0J/
STM1J/STM4J/OTMn
ports
• OTUTTP/ODUTTP/
ODUCTP AID
Carrier • Section/RS Displays the DCC channel used, section/RS, Yes
• Line/MS Line/MS, GCC used, GCC0 or GCC1 (options
available depend on circuit pack type and
• GCC0 function).
• GCC1
Table 2-2
IISIS Circuit parameters (continued)
Table 2-3
IISIS Router parameters
Router table
Router Level Level 1 Sets the IISIS router level. Level 2 not supported in this No
release, option is always disabled.
L1 Priority 1 to 127 Sets the level 1 router priority. The L1 router assigned Yes
(default 64) the highest priority becomes the L1 designated router
for that LAN segment.
L2 Priority 1 to 127 Sets the level 2 router priority. The L2 router assigned No
(default 64) the highest priority becomes the L2 designated router
for that LAN segment.
Not supported in this release, option is disabled.
Route • On (default) Sets whether routes (Off) or route summaries (On) are Yes
Summarization • Off redistributed.
Redistribution table
Route • OSPF Sets the IISIS router distribution list entries for the Yes
Redistribution/ Distribution selected IISIS router.
List • Static
Distribution
(default)
IP Subnet Standard dot Sets the IP subnet address of the distribution list entry Yes
notation for the selected IISIS router.
Table 2-3
IISIS Router parameters (continued)
Subnet Mask Standard dot Sets the subnet mask of the distribution list entry for the Yes
notation selected IISIS router.
Metric 1 to 63 Sets the metric (cost) of the distribution list entry for the Yes
selected IISIS router.
Metric Type • External Sets the metric type of the distribution list entry for the Yes
(default) selected IISIS router.
• Internal
The IP Static Route option has a single table which displays static entries. Use
the Add button to add a static entry and Delete button to delete an existing
static entry. The IPv6 tab also contains an Edit button for this option. Use the
Check button to start a netmask provisioning check on all the IP static routes
in order to let you know if the next hop IP for each IP static route is within the
subnet of the Circuit ID IP.
Table 2-4
IPv4 Static Route parameters
IP Subnet Standard dot notation Sets the destination IP subnet of the static route Yes
entry.
Subnet Mask Standard dot notation Sets the subnet mask of the table entries. Yes
Next Hop Standard dot notation Sets the IP address of the next hop. Yes
Note: The Next Hop IP for each IP Static Route must
be within the subnet of the Circuit ID IP (see “IP
parameters” on page 2-74).
Table 2-4
IPv4 Static Route parameters (continued)
Circuit ID • COLAN-shelf-A Sets the circuit identifier of the port used to get to the Yes
• COLAN-shelf-X next hop.
• ILAN-shelf-IN
• ILAN-shelf-OUT
• GRE-shelf-IP-1 to 4
• GRE-shelf-OSI-1 to
4
• LAN-shelf-15
• LAN-shelf-41
• LAN-shelf-16
• LAN-shelf-42
• OC-n/STM-n/
STM0J/STM1J/
STM4J/ OTMn/
OTUTTP/ ODUTTP/
ODUCTP port
• OSC-shelf-slot- port
• SERIAL-shelf-X
Carrier • Section/RS Selects the DCC channel used, section/RS or Line/ Yes
• Line/MS MS, GCC used, GCC0 or GCC1 (options available
depend on circuit pack type and function).
• GCC0
• GCC1
Status • FORWARDING Displays the status of the route. No
• REJECTED • FORWARDING
Forwarding means the route is active in the routing
table and its next hop is reachable.
• REJECTED
Note: Rejected means that the route is not in the
routing table and its next hop is not reachable
Description alphanumeric Sets the character string from 1-64 characters used Yes
to label the static route.
Table 2-5
IPv6 Static Route parameters
Parameter Options Description Addable/
Editable
Instance Id STATICRT-<shelf>-1 Specifies the index-based AID of the static route. Yes
to 80
IP Subnet Eight groups of four Specifies the IPv6 destination subnet of the static Yes
hexadecimal digits, route entry. The full length can be used or the
separated by ':' reduced length version can be used (removing the
(colon) leading zeros and the intermediate block of 0000).
Prefix 0 to 128 Specifies the IPv6 prefix of the destination subnet. Yes
Next Hop Eight groups of four Specifies the IPv6 address of the next hop. The full Yes
hexadecimal digits, length can be used or the reduced length version can
separated by ':' be used (removing the leading zeros and the
(colon) intermediate block of 0000.
Note: The Next Hop IP for each IP Static Route must
be within the subnet of the Circuit ID IP (see “IP
parameters” on page 2-74).
Cost 1 to 65535 Specifies the cost associated with the static route. Yes
Circuit ID pull-down menu Specifies the circuit identifier of the port used to get Yes
to the next hop.
If the Next Hop is provisioned, the Circuit ID is
optional.
Carrier • Section/RS Specifies the DCC channel used, section/RS or Line/ Yes
• Line/MS MS, GCC used, GCC0 or GCC1 (options available
depend on circuit pack type and function).
• GCC0
• GCC1
Redistribute • OFF Specifies whether this static route is redistributed into Yes
• OSPFv3 OSPFv3. If redistributed, the metric is the same as
the cost specified in the static route and the
metric-type is specified through the RD Type
parameter, above. OSPFv3 refers to OSPF for IPv6.
Description alphanumeric Sets the character string from 1-64 characters used Yes
to label the static route.
Table 2-6
Static NAT parameters
Prime • Yes (default) Sets the prime. The Prime parameter indicates which of the Yes
• No RNE IP address (A RNE shelf may have more than one IP
e.g. shelf, ILAN-In,...) is used for mapping of incoming
packets. It is recommended that the prime is set to Yes for
the entries which RNE is a shelf-IP address
Note 1: The Add button will be disabled for Private IP configuration of the GNE. The Add button is
enabled when the GNE is in “Redundant' and “NAT” Configuration.
Note 2: If multiple entries need to be deleted, select multiple entries and click on Delete button for bulk
deletion.
The Reverse Port NAT option is only applicable for IPv4.The Reverse Port
NAT entry has a single table. Use the Add button to provision a new Reverse
Port NAT entry and the Delete button to delete an existing Reverse Port NAT
entry. The Add button is disabled when Static NAT entries exist.
Table 2-7
Reverse Port NAT parameters
DCN IP Address Standard dot notation Displays the active public IP of the GNE. No
DCN Port (NATBASEPORT + 2050) to Sets the external port which is being Yes
(Note 1) (NATBASEPORT + 4099) mapped.
The default value of
NATBASEPORT is 50000.
Remote NE IP Standard dot notation Identifies the Private IP of the remote NE. Yes
Address
• FTP
• NETCONF
• NNCLI (Telnet)
• NNCLI (SSH)
• TL1 (Telnet)
• TL1 (SSH)
• SNMP
• Other
Table 2-7
Reverse Port NAT parameters (continued)
Remote NE Port 1 to 65535 Displays the internal port which is being Yes
(Note 2) mapped.
Note 1: NATBASEPORT can be modified in Site Manager under 'NAT configuration' in the Comms
Setting Management/Services tab. The default range of dynamic NAT ports that are opened on the NE
are 50000 to 50511. This range can be changed by editing the NAT configuration parameters.
Note 2: For a selected service in the Remote NE Service parameter, the remote NE port field is
populated with the port number for that service, except for the “Other” service. Only for the “Other”
service, the remote NE port field is provisionable.
Note 3: For the SNMP service, the Protocol is always UDP. For the rest of the Remote NE Service
options except “Other”, the Protocol is always TCP. Only for the “Other” service, the Protocol parameter
is provisionable. For Ciena support access to debug ports 8888, 8889, and 28888, choose TCP.
OSPFv2 refers to OSPF for IPv4. OSPFv3 refers to OSPF for IPv6.
The OSPF Circuit option has a single table which displays information about
the OSPF circuit. Use the Add button to add an OSPF circuit or the Edit
button to edit an existing OSPF circuit. Use the Delete button to delete an
existing OSPF circuit.
An OSPF circuit cannot be provisioned against a lower layer DCC with its
Protocol parameter set to LAPD.
Note 1: Do not add OSPF circuits to LAN ports provisioned with the
non-routing mode set to On.
Note 2: Do not create an OSPF circuit on the COLAN interfaces if the
interface is not connected to external DCN running OSPF.
The OSPF circuits will automatically create for IPv4 as follows: For IPv4, for
OTMn ports (except for OTM2 ports on 1xOC-192/STM-64, 2x10G OTR, or
SuperMux circuit packs, and OTM3 ports on 40G OCI circuit packs), a GCC0
or GCC1 PPP circuit (with IP address of 0.0.0.0) and an associated OSPF
circuit are automatically created when the OTM2 facility is provisioned if the
default auto GCC0 mode or GCC1 mode parameter is set to OSPF in the
System tab of the Node Information application and if the Shelf IP has been
provisioned on the NE.
Table 2-8
IPv4 OSPF Circuit parameters
Parameter Options Description Addable/
Editable
• GCC1
Network Area Standard dot notation Sets the area (defaults to backbone area of Yes
0.0.0.0).
Table 2-8
IPv4 OSPF Circuit parameters (continued)
Cost 1 to 65535 Sets the cost of the route (reflects speed of Yes
interface). Defaults are as follows:
• SHELF: 0 (read only)
• LAN-shelf-15/LAN-shelf-41,
LAN-shelf-16LAN-shelf-42, COLAN, ILAN: 10
• GCC0/1 on OTM1: 303
• GCC0/1 on OTM2: 75
• GCC0/1 on OTM3: 19
• GCC0/1 on OTUTTP/ODUTTP/ODUCTP: 75
• Section/RS DCC: 520
• Line/MS DCC: 174
Area Default 1 to 16777215 Sets the cost of the route to the next area. No
Cost (default 1) Note: It is not supported in this release.
Dead Interval 1 to 65535 Sets the interval (in seconds) at which hello Yes
(default is 40) packets must not be seen before neighbors
declare the router down.
Hello Interval 1 to 65535 Sets the interval (in seconds) between the hello Yes
(default is 10) packets that the router sends on the interface.
Retransmit 1 to 3600 (default is 5) Sets the interval (in seconds) required between No
Interval link-state advertisement retransmissions.
Note: It is not supported in this release.
Transmit Delay 1 to 3600 (default is 1) Sets the estimated time (in seconds) it takes to No
transmit a link state update packet over this
interface.
Note: It is not supported in this release.
Priority 0 to 255 (default is 1) Sets the router priority value used in multi-access Yes
networks for the election of the designated router
(0 indicates that router is not eligible to become
designated router).
Area • Off (default) Sets whether the router is in a not so stubby area Yes
• NSSA (NSSA) or stub area. NSSA and Stub not
supported in this release.
• Stub
Table 2-8
IPv4 OSPF Circuit parameters (continued)
Opaque Link • On (default) Sets whether opaque link state advertisement Yes
State • Off performs on the OSPFv2 circuit. Default Off for
Advertisement COLAN, ILAN, and LAN ports. Default On for all
other ports.
Authentication • Null (default) Sets the authentication type. Null means no Yes
Type • Simple authentication.
• MD5
MD5 Identifier 1 0 to 255 Sets the identifier for the first MD5 key. Must be Yes
unique on an OSPFv2 interface.
MD5 Key 1 string of up to 16 Sets the password for the first MD5 key. Yes
characters
Table 2-8
IPv4 OSPF Circuit parameters (continued)
MD5 Identifier 2 0 to 255 Sets the identifier for the second MD5 key. Must Yes
be unique on an OSPFv2 interface.
MD5 Key 2 string of up to 16 Sets the password for the second MD5 key. Yes
characters
Table 2-9
IPv6 OSPF Circuit parameters
Carrier • Section Sets the DCC or GCC channel. Options depend Yes
• Line on the circuit pack type and function.
• GCC0
• GCC1
Cost 1 to 65535 Sets the cost of the route (reflects speed of Yes
interface). Defaults are as follows:
• SHELF: 0 (read only)
• LAN-shelf-15/LAN-shelf-41,
LAN-shelf-16LAN-shelf-42, COLAN, ILAN: 10
• GCC0/1 on OTM1: 303
• GCC0/1 on OTM2: 75
• GCC0/1 on OTM3: 19
• GCC0/1 on OTUTTP/ODUTTP/ODUCTP: 75
• section/RS DCC: 520
• Line/MS DCC: 174
Table 2-9
IPv6 OSPF Circuit parameters (continued)
Dead Interval 1 to 65535 Sets the interval (in seconds) after which router is Yes
(sec) (default 40) declared down if no hello packets are received.
Hello Interval 1 to 65535 Sets the interval (in seconds) between the hello Yes
(sec) (default 10) packets that the router sends on the interface.
Network Area Standard dot notation Sets the area to which the interface is assigned Yes
(defaults to backbone area of 0.0.0.0).
Priority 0 to 255 (default 1) Sets the router priority value used in multi-access Yes
networks for the election of the designated router
(0 indicates that router is not eligible to become
designated router). Used in the designated router
election algorithm.
Retransmit 1 to 3600 (default 5) Sets the interval (in seconds) required between No
Interval (sec) link-state advertisement retransmissions.
Note: It is not supported in this release.
Transmit Delay 1 to 3600 (default 1) Sets the estimated time (in seconds) it takes to No
(sec) transmit a link state update packet over this
interface.
Note: It is not supported in this release.
For the IPv4 tab, the OSPF Router option has two tables.
• The upper Router table displays information about the OSPFv2 router.
Use the Add button to add an OSPF router. Use the Edit button to edit an
OSPFv2 router. Use the Delete button to delete an existing OSPFv2
router.
• The lower Redistribution table displays information about the redistribution
lists provisioned for the OSPFv2 router. Use the Add button to add
OSPFv2 redistribution list parameters. Use the Delete button to delete a
redistribution list.
For IPv4, if not already created, an OSPF router is automatically created when
an OTMn facility is provisioned (except for OTM2 ports on 1xOC-192/STM-64,
2x10G OTR, or SMUX circuit packs, and OTM3 ports on 40G OCI circuit
packs) if the default GCC0 and/or GGC1 mode is set to OSPF in the System
tab of the Node Information application and if the Shelf IP has been
provisioned on the NE.
For the IPv6 tab, the OSPF Router option has a single table. The Router table
displays information about the OSPFv3 router. Use the Add button to add an
OSPFv3 router. Use the Edit button to edit an OSPFv3 router. Use the Delete
button to delete an existing OSPFv3 router.
Table 2-10
IPv4 OSPF Router parameters
Router
OSPF Router Standard dot Sets the router ID for the OSPFv2. Yes
Id notation It is recommended that the SHELF address (if
provisioned) is used as the OSPFv2 Router ID.
Link State • External (default) Sets the type of link state announcement used. Yes
• Router This parameter is not used and can be left at the
• Summary default value (External).
Table 2-10
IPv4 OSPF Router parameters (continued)
Route • ON (default) Sets whether routes (off) or route summaries (On) are Yes
Summarization • OFF redistributed.
Autonomous • ON (default) Sets the autonomous system border router (ASBR). Yes
System Border • OFF ASBR identifies whether an OSPFv2 router can
Router accept input (route redistribution) from another
autonomous system such as IISIS, or static routes.
Opaque Filter • All Disables the OSPF Opaque LSA Flooding Control Yes
• LAN (OOLFC), or enables for LAN, or enables for all.
ABR • RFC 3509 (default) Selects the Area Border Router. Yes
• RFC 2328
Compatible
Redistribution
Route • IISIS Distribution Sets the origin of the route(s) to be redistributed. Yes
Redistribution/ • Static Distribution
List (default)
IP Subnet Standard dot Sets the IP subnet address for redistribution. Yes
notation
Table 2-10
IPv4 OSPF Router parameters (continued)
Subnet Mask Standard dot Sets the subnet mask for redistribution. Yes
notation
Metric Type • External (default) Sets the metric type for redistribution. Yes
• Internal
Table 2-11
IPv6 OSPF Router parameters
OSPFv3 Standard dot Sets the router ID for the OSPFv3. Yes
Router Id notation The OSPFv3 Router ID is automatically filled in/
entered. Because it uses the standard dot notation,
Site Manger will auto fill the IP with the IPv4 Shelf IP
if it is provisioned when you click the Add button.
It is recommended to use the IPV4 SHELF IP as the
OSPFv3 Router ID.
Table 2-12
Port Filter parameters
Filtering Location • Ingress Sets the location of the filter rule for the Yes
• REMFORWARDOUT provisioned port.
Destination Start 1 to 65535 Sets the start of the blocked or permitted port of Yes
Port the protocol type.
Destination End 1 to 65535 Sets the end of the blocked or permitted port of Yes
Port the protocol type.
Note: You are allowed the provisioning of the Port filtering on the GNE when it is configured in Private
IP mode.
Table 2-13
TCP ports/ranges open by default
Port Description
20, 21 FTP
22 SSH (TL1)
23 Telnet (TL1)
80 HTTP
830 NETCONF
Table 2-14
UDP ports/ranges open by default
Port Description
67-68 DHCP
123 SNTP
161-162 SNMP
1024 reserved
1812 RADIUS
4321 TEAS
4322 RAS
33434-33946 Traceroute
Use the Add button to add new manual area addresses to an unprovisioned
entry.
CAUTION
Loss of data communications
The deleting of existing manual addresses can cause a loss of
OSI data communications to the network element. IP based
data communications will be unaffected unless the network
element is being accessed through another OSI-based node.
To edit an existing manual area address, add a new manual area address to
an empty entry to support other equipment then delete existing manual area
address.
Note: If you are moving this network element to a new area, the manual
area address must be added to all network elements before you delete the
old manual area address.
When editing an address, you can either enter the complete address in the
Area address field or enter the individual components of the address in the
Area Address Components fields.
If you enter an Address Format ID (AFI) and Initial Domain ID (IDI) of 39840F
(either in the Area address field or the Address format ID and Initial domain ID
fields), it is recognized as the country code for the United States and the
Domain specific part (DSP) field is replaced with fields for the individual
components of the DSP. For other AFI and IDI entries in the AFI and IDI fields,
you must enter all components of the DSP in either the Area address field or
the Domain specific part (DSP) field.
Table 2-15
Upper Layer DCC parameters
Parameter Options Description Addable/
Editable
•3
Manual Area 6 to Sets the manual area addresses. When editing an address, Yes
Address 26-hexadecimal the user can enter:
number • a free form manual area address or a manual area
address. The manual area address must be less than or
equal to 26 hexadecimal characters. The number of
characters must be even.
• the individual components of the address in the Area
Address Components fields:
— Address format ID (2 hexadecimal characters)
— Initial domain ID (4 hexadecimal characters, pad with
‘F’ hexadecimal characters if less than four characters)
— Domain specific part (up to 20 hexadecimal characters)
— DSP format ID (2 hexadecimal characters, default value
is 80)
— Organization ID (6 hexadecimal characters)
— Domain (4 hexadecimal characters)
— Area (4 hexadecimal characters).
The domain specific part field is replaced by the DSP format
ID, Organization ID, Domain, and Area fields if the Address
format ID and Initial domain ID fields are 39840F.
The SLDD option has a single table. Use the Edit button to change the SLDD
admin state (enable/disable). When the SLDD feature is first enabled, the
ILAN interfaces will be added to the list.
The configuration should, in most cases, be set to Auto (the default value).
This forces the Site-ID to be used as the SLDD Scope ID.
Use the Add and Delete buttons to add or delete interfaces to the list of
interfaces on which SLDD will be active. This will be determined by knowing
which interfaces are used for the physical intra-site connectivity in a given site.
ILAN interfaces are added to the list by default, but can be removed if
necessary. COLAN interface(s) can also be added. Interfaces can be added
or deleted from the list regardless of the SLDD admin state.
Table 2-16
Site Level Data Distribution parameters
Parameter Options Description Addable/
Editable
Configuration • Auto (default) Selects the configuration mode for the Scope ID. Yes
• Manual Note: Select Auto (the default value) for most
configurations. This will allow the Site-ID to be used
to scope SLDD data. In some special
circumstances, it may be necessary to override use
of the Site-ID to a manually set SLDD Scope ID. In
this case, choose Manual and set the SLDD Scope
ID parameter, below. The shelves will only
exchange data if they have the same SLDD Scope
ID. It is recommended to contact Ciena support
before using a manual SLDD Scope ID.
SLDD Scope integer Sets the Site Level Data Distribution Scope ID. This Yes
ID is only required, and can only be edited, if setting
Configuration to Manual (see above). The format is
0-65535. The default is 0. This parameter is
read-only when Configuration = Auto and defaults
to the Site-ID.
Each row lists the address information required to communicate with that
network element. The name column can be used to identify the network
element being queried. The Visible NE Information is a dynamic list that is
updated each time a network element or circuit is added in the network. Use
the Refresh button each time a change is made.
Table 2-17
Visible NE Information parameters
Parameter Options Description Addable/
Editable
Name Character string (up to Displays the system identifier (name) of the network No
20 characters) element.
Network Standard dot notation Displays the IP address of the network element. No
Address
Type Character string Displays the network element equipment type (for No
example, 6500).
Supported • Yes Displays whether network element is supported by No
• No Site Manager (only 6500 currently supported).
Note: If the Static NAT feature is being used for head-ending the network, the displayed IP addresses
in Visible NE Information application are the remote IP addresses of the NEs and not the DCN IP
addresses.
The IISIS Routing Table supports a maximum of 150 nodes in a level 1 area.
A Routing Table Overflow alarm is raised if the 150 limit is exceeded.
Each row lists route information required to reach that network element. The
row with a cost of 0 and adjacency of 00:00:00:00:00:00 is the accessed
network element.
The IISIS Routing Table is a dynamic list that is updated each time a network
element or circuit is added in the network. Use the Refresh button each time
a change is made.
Table 2-18
IISIS Router Table parameters
Cost 0 to 1023 Displays the OSI cost values (0 is the accessed network No
element).
IPv4 and IPv6 are not compatible with each other and as a result have
completely separate (non-interacting) routing tables.
The IP Routing Table option has a single table which displays the static routing
information. The table is read-only.
The IP Routing Table is a dynamic list that is updated each time a network
element or circuit is added in the network. Use the Refresh button each time
a change is made.
Table 2-19
IP Routing Table parameters for IPv4
IP Subnet Standard dot notation Displays the destination IP subnet of the static entry. No
Subnet Mask Standard dot notation Displays the subnet mask of the table entries. No
Next Hop Eight groups of four Displays the IPv6 address of the next hop. No
hexadecimal digits,
separated by ':' (colon)
Table 2-19
IP Routing Table parameters for IPv4 (continued)
Circuit ID • SHELF-shelf Displays the circuit identifier of the port used to get to No
• COLAN-shelf-A the next hop.
• COLAN-shelf-X
• ILAN-shelf-IN
• ILAN-shelf-OUT
• GRE-shelf-IP-1 to 4
• GRE-shelf-OSI-1 to 4
• LAN-shelf-15
• LAN-shelf-41
• LAN-shelf-16
• LAN-shelf-42
• OC-n/STM-n/STM0J/
STM1J/STM4J/
OTMn ports
• SERIAL-shelf-X
Carrier • Section/RS Displays the carrier selected for the Section/RS DCC, No
• Line/MS Line/MS DCC and GCC circuit, or GCC0 or GCC1.
• GCC1
Owner • Static Displays the owner of the entry. No
• Local
• IISIS
• OSPF
Note: The metric (cost) that is advertised for an external route can be one or two types. Type 1 metrics
are comparable to the link state metric. The type 2 metrics are assumed to be larger than the cost of any
intra-AS path. In this case, the external cost value will be shown in the External Cost parameter while
the regular link state metric cost value will be shown in the Cost parameter.
Table 2-20
IP Routing Table parameters for IPv6
IP Subnet Eight groups of four Displays the destination IP subnet of the static entry. No
hexadecimal digits,
separated by ':' (colon)
Prefix 0 to 128 Specifies the IPv6 prefix. Yes
Next Hop Standard dot notation Displays the IP address of the next hop. No
Circuit ID • SHELF-shelf Displays the circuit identifier of the port used to get to No
• COLAN-shelf-A the next hop.
• COLAN-shelf-X
• ILAN-shelf-IN
• ILAN-shelf-OUT
• GRE-shelf-IP-1 to 4
• GRE-shelf-OSI-1 to 4
• LAN-shelf-15
• LAN-shelf-41
• LAN-shelf-16
• LAN-shelf-42
• OC-n/STM-n/
STM0J/STM1J/
STM4J/OTMn ports
• SERIAL-shelfX
Table 2-20
IP Routing Table parameters for IPv6 (continued)
Carrier • Section/RS Displays the carrier selected for the Section/RS DCC, No
• Line/MS Line/MS DCC and GCC circuit, or GCC0 or GCC1.
• GCC0 Only applicable to OC-n/STM-n/OTMn ports.
• GCC1
Owner • Static Displays the owner of the entry. No
• Local
• IISIS
• OSPF
Note: The metric (cost) that is advertised for an external route can be one or two types. Type 1 metrics
are comparable to the link state metric. The type 2 metrics are assumed to be larger than the cost of
any intra-AS path. In this case, the external cost value will be shown in the External Cost parameter
while the regular link state metric cost value will be shown in the Cost parameter.
The OSPF Neighbors table is a dynamic list that is updated each time
neighbor information is changed in the network. Use the Refresh button each
time a change is made.
Table 2-21
OSPF Neighbors parameters
Parameter Options Description Addable/
Editable
• ILAN-shelf-IN
• ILAN-shelf-OUT
• LAN-shelf-15/ 41
• LAN-shelf-16/42
• SHELF-shelf
• CONTROL-shelf- GROUP0
• CONTROL-shelf- GROUP1
• OSC-shelf-slot- port
• OC-n/STM-n/STM0J/STM1J/STM4J/OTMn ports
• OTUTTP/ODUTTP/ ODUCTP AID
• EXCHANGE
• EXCHANGESTART
• FULL
• INITIALIZING
• LOADING
• TWOWAY
• OTHER
• GCC0
• GCC1
Interfaces tab
ARP/ND Proxy parameters
The ARP/ND Proxy option contain two tabs: IPV4 and IPV6. The IP versions
are enabled/disabled/edited using the options in the IP Versions Configuration
service type (Services tab).
The ARP/ND Proxy option has a single table. Use the Add button to provision
a new ARP/ND Proxy IP address. Use the Delete button to delete an existing
ARP Proxy IP address. The ND Proxy option also contains an Edit button.
Table 2-22
IPv4 ARP Proxy parameters
Parameter Options Description Addable/
Editable
Address range Address range, Single Determines if either an address range or a single Yes
or Single address address is added.
address
First address Standard dot notation Sets the first ARP Proxy IP address. Yes
Only applicable when Address range is selected.
Last address Standard dot notation Sets the last ARP Proxy IP address. Yes
Only applicable when Address range is selected.
Address Standard dot notation Enter the ARP Proxy IP address. Yes
Only applicable when Single address is selected.
Table 2-23
IPv6 ND Proxy parameters
IP Address Eight groups of four hexadecimal Sets the IPv6 Proxy IP address. Yes
digits, separated by ':' (colon). The full length can be used or the
reduced length version can be used
(removing the leading zeros and
the intermediate block of 0000).
The ARP/ND Table option has a single table which displays the dynamic
routing information. This table is read-only. The read-only ARP time out field
is displayed above the dynamic routing information table on the IPv4 tab.
Table 2-24
ARP/ND Table parameters
MAC Address 12-hexadecimal characters Displays the hardware MAC address of the No
destination host.
IP Address Standard dot notation (IPv4) Displays the IP address of the destination No
or eight groups of four host.
hexadecimal digits (IPv6) For IPv6, the full length can be used or the
reduced length version can be used
(removing the leading zeros and the
intermediate block of 0000).
OC-3 facilities that meet the following criteria are displayed in the table:
• have DS1TM equipment provisioned
• do not have DS1TM equipment provisioned and the lower layer DCC/GCC
is provisioned as Section DCC with LAPD and L2 frame size of 1304
• do not have DS1TM equipment provisioned and the lower layer DCC/GCC
is not provisioned
• are unprotected
OC-3 facilities that do not meet these criteria are not displayed.
Use the Enable or Disable to set the DSM OAM link status of the selected
OC-3 facility. Setting the state to Enable provisions the lower layer DCC/GCC
and IISIS circuit to the following parameters required to host DS1TM
equipment:
• lower layer DCC/GCC: Carrier = Section, Protocol = LAPD, L2 Frame Size
= 1304
• IISIS circuit: Circuit Default Metric: 6, Neighbour Protocols Supported
Override = OSI
The Enable and Disable buttons are disabled if the DSM OAM link is in use.
Table 2-25
DSM OAM Link parameters
Parameter Options Description Addable/
Editable
State • Disabled Sets the status of the DSM OAM link. A facility is Yes
• Enabled automatically disabled if:
• no layer DCC has been provisioned on the facility or a
lower layer DCC/GCC has been provisioned as LAPD and
the L2 frame size is not equal to 1304
• the IISIS circuit is configured and the parameters are not:
— circuit default metric: 6
— neighbor protocols supported override: OSI
In Use • Yes Displays whether the facility is in use for DSM OAM comms No
• No (DS1TM equipment provisioned on the port).
GNE parameters
The GNE option contain two tabs: IPV4 and IPV6. The IP versions are
enabled/disabled/edited using the options in the IP Versions Configuration
service type (Services tab).
The GNE option has a single table. The GNE pairs provide redundant DCN
comms access to remote nodes within the section. Use the Add button to
provision a new comms access and Delete button to delete an existing one.
Table 2-26
IPv4 GNE parameters
Parameter Options Description Addable/
Editable
Unit SHELF-shelf Displays the access identifier (AID) of the GNE. Yes
Group (Note 1 Integer value between 1 Specifies the redundancy group that the GNE Yes
and Note 2) and 255 belongs to for master/backup negotiation.
Primary • Yes Sets the GNE as being the preferred MASTER. Yes
(Note 2) • No (default)
GNE Subnet string of up to 36 Sets a unique name for the GNE. Yes
Name (Note 3) alphanumeric characters
Table 2-27
IPv6 GNE parameters
AID SHELF-shelf Displays the access identifier (AID) of the GNE. Yes
Table 2-28
GNE Port Filter parameters
GRE parameters
The GRE option has a single table. Use the Add button to provision a new
static tunnel. Use the Delete button to delete an existing static tunnel. This
option is only applicable for IPv4.
Table 2-29
GRE parameters
Unit • GRE-shelf-IP-1 to 4 Displays the possible static tunnel configurations (four Yes
• GRE-shelf-OSI-1 to for each network layer protocol, IP or OSI).
4
Table 2-29
GRE parameters (continued)
Source Standard dot notation Sets the IP address of the source device on the tunnel. Yes
Address (IP) Note: Only applicable to GRE-shelf-IP-1 to 4. Not
applicable to GRE-shelf-OSI-1 to 4.
Destination • Standard dot Sets the IP or OSI address of the destination device on Yes
Address notation (IP) the tunnel (Note).
• NSAP (OSI)
Note: The NSAP is up to 40 characters depending on the first 2 characters (AFI). For example, for an
AFI of 49, the range is 20 characters (6 characters for area address, 12 characters for system id, and 2
characters for network selector). The network selector (NSEL, last 2 bytes of NSAP) of the provisioned
NSAP destination address must be set to ‘00’ (6500 internally automatically sets the NSEL to support
the required transport service).
IP parameters
The IP option contains two tabs: IPv4 and IPv6. The IP versions are enabled/
disabled/edited using the options in the IP Versions Configuration service type
(Services tab).
The IP option has a single table which displays all the provisioned ports. Use
the:
• Add button to add an entry
• Delete button to delete an existing entry
• Edit button to edit the parameters of an existing entry
Note 1: Make sure the shelf IP address is different from the loopback
interface IP address configured through the SAOS CLI.
Note 2: Following an edit of the Control IP address on the primary shelf,
all member shelves of the TIDc must also be restarted. Otherwise, an
OSRP “Remote Node Unreachable” alarms can be raised against OSRP
links passing through these member shelves.
Note 3: ADJPEER provisioning allows one OTS to have multiple “virtual”
neighbors. In some cases, IP addresses become stale when downstream
neighbor nodes are updated. These stale IP addresses can be removed
from the database. Contact Ciena technical support for assistance if you
are editing the shelf IP address of a submarine Branching Unit (BU) link
with ADJPEERs facilities.
Table 2-30
IPv4 parameters
Parameter Options Description Addable/
Editable
• GCC1
IP Address Standard dot notation Sets the IP address for the selected port. Yes
Broadcast Standard dot notation Displays the IP broadcast address derived from the IP No
Address address and the subnet mask. Read-only.
Netmask Standard dot notation Sets the subnet mask for the selected port. Yes
SHELF netmask must be 255.255.255.255.
For the LAN-shelf-15/41 and LAN-shelf-16 (or 42)
ports, the netmask is restricted to 255.255.255.252.
For un-numbered ILAN, the netmask is restricted to
255.255.255.255.
Default 1 to 255 (default 90) Sets the number of hops before a packet is dropped. Yes
Time to Live (Note)
Table 2-30
IPv4 parameters (continued)
Non-routing • On Sets the non-routing mode. When on, routing updates Yes
Mode • Off (default) are not propagated but packets are forwarded
through the interface.
ARP Proxy • On Sets the support for proxy ARP on the interface. Yes
• Off (default) This parameter is only visible when the Unit (facility
AID) is COLAN-X.
Note: It is only editable for SHELF AID in Add and Edit dialog in this release. Not editable for other AID.
Table 2-31
IPv6 parameters
Circuit Pull-down menu Specifies the interface associated to which the IPv6 Yes
address is assigned.
Carrier • Section/RS Selects the DCC or GCC channel. The options Yes
• Line/MS depend on the circuit pack type and function.
• GCC0
• GCC1
IP Address Eight groups of four Specifies the IPv6 address. Yes
hexadecimal digits,
separated by ':'
(colon)
LAN parameters
The LAN option has a single table which displays all the provisioned LAN
ports. Use the:
• Add button to add an entry
• Edit button to edit the parameters of an existing entry
• Delete button to delete an existing entry
MAC Address 12-hexadecimal Displays the unique MAC address assigned to the No
characters LAN port.
Table 2-32
LAN parameters (continued)
WSC Enabled • unchecked (default) Sets whether the Wayside channel is enabled No
• checked (checked) or disabled (unchecked) on the LAN port.
Enabling WSC provisions the LAN port as a WSC
port. This selection is made in the Add dialog.
Note: Only applies to D-Series and S-Series
shelves. Refer to “WLAi submarine wayside
channel (not applicable to T-Series)” on page 1-34
for further details.
Note: If you set the LAN port configuration to Automatic (default), auto-negotiation is enabled.
Auto-negotiation automatically senses the speed/mode settings of the link. Use a straight-through when
connecting a PC to LAN-shelf-15/41 or LAN-shelf-16 (or 42). Use a cross-over cable to connect 6500
NEs together with ILAN. Use a straight-through when connecting COLAN port to the LAB LAN (It is
subject to change depending on what is connected to and what is configured). For WSC ports, the
default is Full duplex 10BT, and both 10BT and 100BT (Half or Full duplex) are supported. If the WSC
port is set to 10BT, the green and amber LED will be active. If set to 100BT, only the amber LED will be
active. If the port configuration is set to 100BT for the WSC port, the actual traffic rate over the wayside
channel should not exceed 40Mb/s. If the 6500 detects that the traffic rate exceeds this, wayside traffic
is rate-limited to avoid OSC link congestion. Refer to the 6500 Packet-Optical Platform Photonic Layer
Guide, NTRN15DA for details.
For information on GCC support on the circuit packs, refer to Table 2-33 on
page 2-81.
Use the Add button to provision new DCC/GCC circuits and the Delete button
to delete existing DCC/GCC circuits. The Edit button is only enabled for
editing the LAPD parameters.
For more information about the Layer 1 control plane communications, refer
to Part 2 of 6500 Packet-Optical Platform Control Plane Application Guide,
NTRN71AA.
Table 2-33
GCC support on circuit packs
Table 2-33
GCC support on circuit packs (continued)
Table 2-33
GCC support on circuit packs (continued)
• WLAi FOTR X X
• WLAi FOTR w/OPS
Note 1: GCC2 is supported in the OTNCP domain. Supported on the OTU2 facilities on 40G MUX OCI
and 10x10G PKT/OTN I/F, OTU3 facilities on the 40G OCI and 40G OCLD/Wavelength-Selective 40G
OCLD, and OTU4 facilities on the 100G PKT/OTN XCIF. GCC2 is also supported in the ENCRYP
domain for OTM2 client facilities on 4x10G OTR (NTK530QE variant) when the encryption mode is
segregated.
Note 2: Supported on the line OTM2 facility of the circuit packs (port 1).
Note 3: GCC0 supported on line OTM2 port (port 1). GCC1 on client OTM2 port (port 2) are passed
through transparently.
Note 4: GCC0 can be provisioned and monitored on ports 1 to 4 when their facility type is OTM2.
Note 5: GCC1 can be provisioned and monitored on ports 2 and 4 when their facility is provisioned as
mapped non-OTM2. There is an OTM2 connection facility (facing the line side) that is auto-created
against port 2 (or port 4) when a mapped non-OTM2 is provisioned. It is this connection facing facility
that GCC1 is provisioned against. See “Rules for the 2x10G OTR circuit packs” section in the
“Equipment and facility provisioning” chapter in Part 1 of Configuration - Provisioning and Operating,
323-1851-310, for more information.
Note 6: OTM2 out of service (OOS) on the line port (1 or 3) will cause GCC1 loss on the associated
client port (2 or 4). However, GCC0 is still functional.
Note 7: GCC0 is supported on the OTM2 line facilities. GCC1 is supported on the OTM2 mapping layer
facilities. In the OTU2 regeneration configuration (applicable to the NTK530QM/QE variants), GCC0 is
also supported on the OTM2 client ports.
Note 8: With 10G and 10GE clients, GCC0 and GCC1 supported on the line OTM2 facility of the circuit
packs (port 1).
Note 9: With OTM2 clients, GCC0 supported on line OTM2 port (port 1). GCC1 on client OTM2 port
(port 2) is passed through transparently.GCC1 supported on the line OTM2 facility (port 1). GCC0
supported on the line and client OTM2 facility (port 1 and port 2).
Note 10: The GCC0/GCC1 system default does not apply to SuperMux.
Note 11: GCC1 and GCC0 supported on the OTM2 port (port 1) and GCC0 supported on the OTM1
client port (port 2 to port 5).
Note 12: GCC1 supported on the OTM3 mapping layer facility (port 100). GCC0 supported on the
OTM2 client facilities (ports 1 to 4). Cannot provision OTM3 GCC1 on 40G MUX OCI (NTK525CF
variant) if DM is enabled on port 100 OTM3 or TCMCTP, and vice versa.
Note 13: Limit of two total GCC ports shared between two OTM2-configured line ports.
Note 14: Supported on the OTM2 line facilities (port 1 and port 2).
Note 15: Supported on the OTM1 and OTM2 line facilities.
Table 2-33
GCC support on circuit packs (continued)
Note 16: GCC0 cannot be enabled for an OTU interface on port 41 or port 42 of the 2xCFP2 OTN Flex
MOTR circuit pack if there is a facility loopback active on the port. For details on releasing the loopback,
refer to the “Operating/releasing a loopback” procedure in Part 1of Configuration - Provisioning and
Operating, 323-1851-310.
Note 17: Supported on the OTM3 line facility (port 1).
Note 18: GCC1 supported on the OTM3 mapping layer facility (port 1). GCC0 supported on the OTM3
client facility (port 1) on the 40/43G OCI and 40G+ CFP OCI circuit packs.
Note 19: 2 x GCC0 and 2 x GCC1 are available on the OTM2 of the (2+8)xOC-n/STM-n OTN 20G.
Note 20: Supported on the line OTM4 facility (port 1).
Note 21: Supported on the line OTM4/OTMC2 or OTUTTP facility (port 1). When in BPSK mode, GCC0
is provisioned on the prime OTM4 or OTUTTP facility only.
Note 22: GCC0 supported between Broadband interfaces.
Note 23: GCC1 supported on the virtual aggregate OTM4 facility (port 100). GCC0 supported on the
OTM2 client facility on the 10x10G MUX OCI.
Note 24: GCC1 supported on the OTM3 mapping facility (port 104 or 108). GCC0 supported on the
OTM4 line facility and OTM2 client facilities.
Note 25: Supported on the OTM4 mapping facility.
Note 26: GCC0 supported on the OTM4 client facility. GCC1 supported on the OTM4 mapping facility.
Note 27: GCC0 is provisioned on OTUTTP.
Note 28: GCC1 is provisioned on ODUTTP or ODUCTP if network domain is MCN. The ODU facility
must exist before GCC1 can be provisioned. GCC1 is not supported on the eMOTR backplane
ODU2TTP.
Note 29: GCC1 is provisioned on OTUTTP (single card) or FTTP (dual card) if network domain is
OTNCP. The ODU facility does not need to exist before GCC1 is provisioned.
Note 30: GCC1 is supported on OTM3 facilities (all ports except port 3) and OTM4 facilities (port 100).
Note 31: GCC0 is supported on OTU4 line. GCC1 is supported on the OTM4 mapping layer facility
associated to the ETH100G client port.
Note 32: GCC0 supported on OTUTTP line port 1, OTUTTP client facility ports 2-5. GCC1 supported
on ODUTTP line port 1, ODUCTP facility on ports 2-5.
Table 2-34
Lower Layer DCC/GCC parameters
Parameter Options Description Addable/
Editable
Carrier • Section/RS Selects the carrier for the Section/ DCC, line DCC Yes
• Line/MS and GCC circuit.
Table 2-34
Lower Layer DCC/GCC parameters (continued)
LAN Port • COLAN-shelf-A Select the LAN port for the Wayside channel on the No
• COLAN-shelf-X ODUTTP facility (only applicable to Wayside
Channel).
• ILAN-shelf-IN
Note: COLAN-A on 14-slot shelves can only
• ILAN-shelf-OUT be provisioned for wayside use if SP
redundancy is not provisioned.
L2 Frame • 512 to 1492 (default Sets the LAPD frame size (only applicable to Yes for
Size 1304) for MCN LAPD). MCN
• 9000 for SONET/ CAUTION No for
SDH Control Plane Each end of the DCC circuit must be provisioned SONET/
and OTNCP with the same LAPD frame size. Defaults on SDH
different equipment types may be different. Control
Plane and
OTNCP
L2 Side Role Automatic Displays the LAPD link mode (only applicable to No
LAPD).
Operation L2 • Network Displays the availability of L2 side role when adding No
Side Role • User a DCC/GCC circuit (only applicable to LAPD).
• Disconnected
NDP parameters
The NDP option has a single table which displays the NDP provisioning
information. The administration state of the NDP feature is displayed in the
Admin State field above the table.
Use the Edit button to edit the Admin state to enable or disable the NDP
feature on the shelf. The Shelf IP must be provisioned before you can enable
the NDP feature on the shelf. Use the Add button to enable NDP on an OTMn,
ODUTTP, or OTUTTP facility. Use the Delete button to disable NDP on an
OTMn, ODUTTP, or OTUTTP facility.
Table 2-35
NDP parameters
Parameter Options Description Addable/
Editable
Admin State • Disabled (default) Displays the administration state of the NDP feature. Yes
• Enabled
Unit • OTMn-shelf-slot- Displays the OTMn, ODUTTP, or OTUTTP facility AID. Yes
port
• OTUTTP AID
• ODUTTP AID
PPP parameters
The PPP option has a single table which displays entries for the ports
configured for PPP. Use the Edit button to edit the PPP magic number support
parameter.
Table 2-36
PPP parameters
Unit • SERIAL-shelf-X, OC-n/ Displays the RS-232 serial ports and optical No
STM-n/STM0J/ ports available for PPP. SERIAL-shelf-15/41 is
• STM1J/STM4J/OTMn on the shelf processor.
ports
• OTUTTP/ODUTTP/
ODUCTP AID
Carrier • Section/RS Selects the carrier for the Section/RS DCC, Line/ Yes
• Line/MS MS DCC and GCC circuit, or GCC0 or GCC1.
Frame Size 64 to 4470 (default 1500) Displays the PPP frame size. No
Table 2-36
PPP parameters (continued)
Security Type Off (default), CHAP, PAP Displays the security used on the PPP circuit. No
Local Secret Up to 253 character string Displays the local secret when the Security type No
is CHAP or PAP.
Remote Up to 253 character string Displays the remote secret when the Security No
Secret type is CHAP or PAP.
Peer IP Standard dot notation Displays the IP address of the remote end No
Address device.
Serial/RS-232 parameters
The Serial/RS-232 option has a single table which displays information on the
serial ports. The table is read-only.
Table 2-37
Serial/RS-232 parameters
Parameter Options Description Addable/
Editable
Protocol • Auto (default) Displays the protocol for the serial port. No
• PPP
• VT100
Baud Rate • 9600 Displays the baud for the serial port. No
• 19200
• 38400
• 57600
• 115200
• Auto (default)
• 57600
• 115200
• Disconnected
Table 2-37
Serial/RS-232 parameters (continued)
Table 2-38
TL1 Gateway Connections parameters
Protocol • ISO Displays the protocol used by the TL1 gateway to access the No
• INET RNE.
• ISO – 7 layer OSI protocol
• INET – TCP/IP protocol
USB parameters
The USB option has a single table which displays status of the USB ports.
Use the:
• Unmount button to safety remove a USB external storage device from the
selected USB port.
• Mount button to mount a USB device on a specific USB port.
• Edit button to turn automount on/off for the selected USB port
.
Table 2-39
USB parameters
Unit/Name • USB-shelf-slot-1 Displays the USB port ID. The slot number is the SP2 No
• USB-shelf-slot-2 slot number.
Services tab
Database Replication Service
The Database Replication Service (DBRS) provides a service to replicate AR/
TR data between independent OSPF networks. It allows for the deployment
of smaller, less complex OSPF networks while maintaining 6500 applications
such as Topology.
Note 1: DBRS cannot be put across two OSPF networks that have the
same OSIDs. In this case, you must edit one of the OSIDs to ensure that
each network has a unique OSID.
Note 2: When reconfiguring from a DBRS configuration to an OSPF
configuration, you must wait 60 minutes after disabling DBRS
(Procedure 2-2, “Editing the communications settings”) before
provisioning the OSPF circuit (Procedure 2-6, “Adding a new entry in the
communications settings”).
Table 2-40
Database Replication Service parameters
DHCP parameters
The DHCP option has a single table with a single entry.
Table 2-41
DHCP parameters
• LAN-shelf-16
• LAN-shelf-42
IPv4 Server • Enabled (default) Sets the status of the DHCP IPv4 Yes
• Disabled server on the craft LAN port.
IPv6 Server • Enabled Sets the status of the DHCP IPv6 Yes
• Disabled (default) server on the craft LAN port.
Use the:
• Add button to add a DHCP Relay Agent server.
• Edit button to edit the DHCP Relay Agent mode.
• Delete button to delete the DHCP Relay Agent server.
• DHCP RA Stats button to open the DHCP RA server statistics window.
Table 2-42
DHCP Relay Agent parameters
Parameter Options Description Addable/
Editable
Mode • Off (default) Displays the DHCP RA mode. Yes (edit only)
• Manual If mode is set to Manual, DHCP RA
• Auto interfaces are set manually (refer to
“DHCP RA Interfaces parameters” on
page 2-95).
AID DHCPRASRVR-shelf-1 Displays the DHCP RA server AID. Yes (add only)
IP Address Standard dot notation Displays the IP address of the DHCP RA Yes (add only)
server.
Use the Add button to add a DHCP Relay Agent interface and the Delete
button to delete the DHCP Relay Agent interface. These actions are only
allowed when the DHCP RA mode is 'Manual'.
Table 2-43
DHCP RA Interfaces parameters
Circuit • COLAN-shelf-A (default) Displays the interface used for the Yes
• COLAN-shelf-X DHCP RA interface.
• ILAN-shelf-IN
• ILAN-shelf-OUT
• OSC-shelf-slot-port
Plain RA • ON Displays whether plain RA is on or off. Yes
• OFF (default)
FTP parameters
The FTP option has a single table with a single entry. Use the Edit button to
edit the FTP parameters.
Table 2-44
FTP parameters
Server • Disabled (default) Sets the status of the ftp server. Yes
• Enabled
Idle timeout 1 to 900 (default 180) Sets the time (in seconds) before an idle ftp Yes
(seconds) session is disconnected.
NETCONF parameters
The NETCONF option has a single table with a single entry. Use the Edit
button to edit the NETCONF parameter.
Table 2-45
NETCONF parameters
HTTP/HTTPS parameters
The HTTP/HTTPS option has a single table with a single entry. Use the Edit
button to edit the HTTP/HTTPS parameter.
Table 2-46
HTTP/HTTPS parameters
HTTP server • Enabled (default) Sets the status of the HTTP protocol access. Yes
• Disabled
HTTPS server • Enabled (default) Sets the status of the HTTPS protocol access. Yes
• Disabled
Use the Edit button to edit the IP Version Configuration parameters listed in
Table 2-47 on page 2-98. The editable IP Version Configuration parameters
may be configured per shelf.
The IPv6 version setting must be turned on before the corresponding IPv6
provisioning commands will be accepted. For example, to provision an IPv6
address (in the Site Manager or TL1), IPv6 must be turned on. Before
disabling IPv6, the IPv6 provisioning must be deleted. IPv6 is not supported
on CPL.
The IPv4 Version setting does not need to be turned on before the
corresponding IPv4 provisioning commands will be accepted. The IPv4
Version setting has an administrative enable/disable option. This setting only
determines if the IPv4 options are displayed/available in Site Manager. The
provisioned IPv4 settings do not need to be removed before administratively
disabling IPv4.
The following rules apply. For more information, refer to Chapter 1, “Data
communications planning”.
• IPv6 is supported on SP2 and SPAP2. IPv6 is not supported on SP1,
SPAP1, or any trib cards, including OTN/PKT/eMOTR.
• A 6500 NE with SP2 and SPAP2 supports dual stack and therefore IPv4
and IPv6 can be enabled simultaneously.
Table 2-47
IP Version Configuration parameters
IPv6 Hop Limit • 1-255 Sets the IPV6 hop limit. Yes
• Default is 90.
LinkLocal parameters
The LinkLocal option has a single table which displays the IPv6 Link Local
addresses for all interfaces. The table is read-only and only applicable for
IPv6.
Table 2-48
LinkLocal parameters
Parameter Options Description Addable/
Editable
Carrier • GCC0 Displays the overhead bytes that carry the DCC No
• GCC1 or G.709 GCC.
• GCC2
• LINE
• SECTION
Table 2-49
Zero Touch Provisioning parameters
Table 2-50
NAT Configuration parameters
Parameter Options Description Addable/
Editable
NAT Starting 1024 to 65535 Sets the base UDP/TCP port value dynamically Yes
Port allocated for connection flows managed by NAT
services. It applies to Redundant NAT and Private IP
GNEs.
Note: If not specified, the current value is not changed.
If never configured, the default is 50000.
NAT Number 256 to 1024 Specifies the number of UDP/TCP port values Yes
of Entries dynamically allocated for connection flows managed by
NAT services. It applies to Redundant NAT and Private
IP GNEs.
Note: If not specified, the current value is not changed.
If never configured, the default is 512.
SSH/Telnet parameters
The SSH/Telnet option has a single table with a single entry. Use the Edit
button to edit the SSH/Telnet parameters.
Table 2-51
SSH/Telnet parameters
SSH Server • Enabled (default) Sets the status of the SSH server. Yes
• Disabled Note: An SSH server cannot be disabled unless a
telnet server is enabled.
Telnet Server • Enabled (default) Sets the status of the telnet server. Yes
• Disabled Note: A telnet server cannot be disabled unless an
SSH server is enabled.
SSH Maximum 1 to 18 (default 3) Sets the maximum number of concurrent SSH sessions Yes
number of SSH that are allowed to the network element.
sessions Note 1: If both SSH and telnet servers are enabled, the
total maximum number of SSH and telnet sessions
cannot exceed 18. For example, if SSH is enabled with
16 maximum sessions, you cannot have more than two
enabled telnet sessions. To increase the maximum
number of telnet sessions, you must first reduce the
maximum number of SSH sessions.
Note 2: Within 18 maximum number of telnet and SSH
sessions, up to 16 TL1 sessions are supported on SP1
and up to 17 TL1 sessions are supported on SP2. Each
TL1 gateway session will count as one telnet session.
Telnet 1 to 18 (default 18) Sets the maximum number of concurrent Telnet Yes
Maximum sessions that are allowed to the network element.
number of Note 1: If both SSH and telnet servers are enabled, the
telnet sessions total maximum number of SSH and telnet sessions
cannot exceed 18. For example, if telnet is enabled with
16 maximum sessions, you cannot have more than two
enabled SSH sessions. To increase the maximum
number of SSH sessions, you must first reduce the
maximum number of telnet sessions.
Note 2: Within 18 maximum number of telnet and SSH
sessions, up to 16 TL1 sessions are supported on SP1
and up to 17 TL1 sessions are supported on SP2. Each
TL1 gateway session will count as one telnet session.
SSH Idle 0 to 99 (default 30) Sets the time (in minutes) before an idle SSH session Yes
timeout is disconnected. A value of 0 indicates infinite (no
(minutes) timeout).
Table 2-51
SSH/Telnet parameters (continued)
Telnet Idle 0 to 99 (default 30) Sets the time (in minutes) before an idle Telnet session Yes
timeout is disconnected. A value of 0 indicates infinite (no
(minutes) timeout).
SSH CIPHER • AES128CTR Select the check box(es) to enable the corresponding Yes
• AES128CBC secure shell (SSH) cipher(s).
• AES192CTR
• AES192CBC
• AES256CTR
• AES256CBC
• RIJNDAEL128CBC
• RIJNDAEL192CBC
• RIJNDAEL256CBC
• 3DESCBC
SSH HMAC • MD5 Select the check box(es) to enable the corresponding Yes
• MD596 secure shell (SSH) hash message authentication
codes (HMACs).
• SHA1
• SHA196
• SHA256
Host Key • DSA Select the check box(es) to enable the corresponding Yes
Algorithms • RSA host key algorithm(s).
Key Exchange • DH-GROUP1 Select the check box(es) to enable the corresponding Yes
Method • DH-GROUP14 key exchange method(s):
Table 2-51
SSH/Telnet parameters (continued)
SSH Client
Host Key • Yes Select whether host key validation is enabled (Yes) or Yes
Validation • No (default) disabled (No).
Host Key Validation enables the SFTP client to validate
a remote SFTP server's host key. If the remote SFTP
server's host key is not contained within the known host
key list, the connection is denied.
SSH Server
Server Auth • None (default) Select the SSH server authentication method. Yes
• Public Key Note: The 6500 always requires authentication in its
applications and this enforces additional authentication
at the SSH layer.
TEST-PING parameters
The TEST-PING option has a single table which displays information on the
ping results. Use the Ping button to perform a ping.
Table 2-52
TEST-PING parameters
IP Address Standard dot notation (IPv4) or Specifies the target IPv4 or IPv6. This Yes
eight groups of four hexadecimal parameter is mandatory.
digits (IPv6)
Packet Size 8-8182 (default is 8) Selects the packet data size. Yes
Traceroute parameters
The traceroute option has a single table which displays information on the
trace route results. Use the Traceroute button to trace a route.
Table 2-53
Traceroute parameters
IP Address Standard dot notation (IPv4) or Specifies the target IP. This parameter is Yes
eight groups of four hexadecimal mandatory.
digits (IPv6)
Hop Limit 1-30 (default is 10) Selects the hop limit. The limit includes Yes
both IPv4 and IPv6 sessions. Although
there is separation of the protocols, they
are a combined total in this case.
Probes 1-3 (default is 3) Selects the number of probes per hop. Yes
TimeOut 1-60 (default is 10) Selects the timeout period in seconds. Yes
Overview
This chapter provides procedures and parameter information related to the
6500 Packet-Optical Platform (6500) network data communications for
T-Series shelves.
ID Identifier
IP Internet protocol
IPv4 Internet protocol version 4
IPv6 Internet protocol version 6
IISIS Integrated ISIS
ISIS Intermediate system to intermediate system
LAN Local area network
LAPD Link access protocol on the D-channel
LLDCC Lower layer DCC
LSA Link state advertisement
MAC Media access control
MD5 Message digest 5 algorithm
MDIX Medium-dependent interface cross-over
MS Multiplex section
NAT Network Address Translation
NDP Neighbor discovery protocol (refers to Ciena topology feature),
Neighbor discovery (ND) proxy (refers to IPv6 protocol)
NET Network entity title
NSAP Network access service point
NSSA Not so stubby area
OAM Operations, administration, and maintenance
OCI Optical Channel Interface
OCLD Optical Channel and Laser Detector
OSC Optical service channel
OSI Open systems interconnect
OSPF Open shortest path first
OSPFv2 Open shortest path first, version 2 (refers to OSPF for IPv4)
OSPFv3 Open shortest path first, version 3 (refers to OSPF for IPv6)
OTM Optical transport module
OTN Optical transport network
OTU Optical channel transport unit
PAP Password authentication protocol
PC Personal computer
PPP Point-to-point protocol
RS Regenerator section
SDH Synchronous digital hierarchy
SDH-J Synchronous digital hierarchy-Japan
Opening window
Edit command
Comms Setting Procedure 3-2, “Editing the communications settings”
Management Procedure 3-3, “Editing the Site Level Data Distribution”
Procedure 3-4, “Migrating an MD5 key”
Add command
Comms Setting Procedure 3-5, “Adding a new entry in the communications settings”
Management
Delete command
Associated procedures
Some procedures require the user to perform procedures relating to other
topics. Before performing a procedure, if necessary ensure that the
information about the associated procedures is available.
All procedures assume that the user is logged in to the network element (see
Administration and Security, 323-1851-301).
In this release, some communications windows contain an IPV4 tab and IPV6
tab. The IPV6 tab is not supported for T-Series in this release and is grayed
out.
Procedure 3-1
Retrieving communications settings
Use this procedure to retrieve the provisioned parameters associated with the
data communication network.
Step Action
Procedure 3-2
Editing the communications settings
Use this procedure to edit the provisioned parameters associated with the
data communication network.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
8 Edit the parameters as required. See the following for editable parameters:
• Routers
— “OSPF Circuit parameters” on page 3-31
— “OSPF Router parameters” on page 3-35
• Interfaces
— “IP parameters” on page 3-52
— “LAN parameters” on page 3-54
— “Lower Layer DCC/GCC parameters” on page 3-56
— “NDP parameters” on page 3-61
— “PPP parameters” on page 3-62
• Services
— “DHCP parameters” on page 3-66
— “FTP parameters” on page 3-66
— “NETCONF parameters” on page 3-67
— “SSH/Telnet parameters” on page 3-67
— “HTTP/HTTPS parameters” on page 3-70
— “NAT Configuration parameters” on page 3-71
9 Click OK.
—end—
Procedure 3-3
Editing the Site Level Data Distribution
Use this procedure to edit the Site Level Data Distribution. For details, refer to
“Site Level Data Distribution (SLDD) parameters” on page 3-42. For more
information on these parameters and how they apply to the data
communication network, refer to Chapter 1, “Data communications planning”.
The P and/or G in suffix(es) displayed next to the shelf number denote(s) the
Primary shelf and/or a GNE.
Prerequisites
• To perform this procedure, you must use an account with a level 3 UPC or
higher.
• SLDD interface provisioning shall be blocked if an OSPF circuit with
Opaque = ON exists against the interface.
• A port and circuit must be provisioned for the SLDD interface to enter into
an active state.
Step Action
Step Action
9 At the SLDD Scope ID parameter, enter the scope ID. This parameter can be
edited only if the Configuration is Manual. Only shelves with the same Scope
ID will exchange information. It is recommended to consult with Ciena before
setting a manual Scope ID.
10 Click OK.
Adding an interface to the SLDD List
11 Select the required network element in the navigation tree.
12 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
13 Select the Routers tab.
14 Select SLDD from the Router Type drop-down list.
15 Select the required shelf from the Shelf drop-down list.
16 Click Add.
17 At the Name parameter, select the interface from the drop down list.
18 Click OK.
Deleting an item from the SLDD List
19 Select the required network element in the navigation tree.
20 Select Comms Setting Management from the Configuration drop-down
menu to open the Comms Setting Management application.
21 Select the Routers tab.
22 Select SLDD from the Router Type drop-down list.
23 Select the required shelf from the Shelf drop-down list.
24 Select the interface in the table you want to delete.
25 Click Delete.
—end—
Procedure 3-4
Migrating an MD5 key
Use this procedure to migrate an IPv4 OSPF adjacency from one MD5 key
(older) to another MD5 key (newer). It covers the OSPF circuits at both ends
of the adjacency.
This procedure applies to 6500 to 6500 OSPF adjacencies. Similar steps can
be followed for 6500 to third party adjacencies, taking into consideration the
specifics of the third party device.
Prerequisites
To perform this procedure
• the OSPF circuits must be provisioned with the MD5 authentication type.
• you must use an account with a level 3 UPC or higher.
Step Action
Procedure 3-5
Adding a new entry in the communications settings
Use this procedure to add a new entry (interface, circuit, router) in the
communications settings.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
• Interfaces
— “ARP/ND Proxy parameters” on page 3-49
— “GNE parameter” on page 3-51
— “GNE Port Filter parameters” on page 3-52
— “IP parameters” on page 3-52
— “LAN parameters” on page 3-54
— “Lower Layer DCC/GCC parameters” on page 3-56
— “NDP parameters” on page 3-61
For the Add IISIS Router Parameters and the Add OSPF Router Parameters
dialogs, you have the option of adding distribution lists. To add a distribution
list, use the Add button in the Redistribution section (lower section). A
maximum of 80 distribution lists can be added for each type of list. To delete
a distribution list, select the distribution list in the Redistribution section
(lower section) and select Delete.
8 If Then
the dialog allows more than one entry to be click Apply, go to step 7
added and you want to add another entry
otherwise go to step 9
9 Click OK.
After the manual area addresses are added/changed, perform a protection
switch of the CTM.
—end—
Procedure 3-6
Deleting an entry in the communications settings
Use this procedure to delete an entry (interface, circuit, router) in the
communications settings.
Prerequisites
To perform this procedure, you must use an account with a level 3 UPC or
higher.
Step Action
Step Action
• Interfaces
— “ARP/ND Proxy parameters” on page 3-49
— “GNE parameter” on page 3-51
— “GNE Port Filter parameters” on page 3-52
— “IP parameters” on page 3-52
— “LAN parameters” on page 3-54
— “Lower Layer DCC/GCC parameters” on page 3-56
— “NDP parameters” on page 3-61
8 Click Delete.
9 Click Yes to close the warning box.
—end—
Procedure 3-7
Using the 6500 CLI ping and trace commands
Use this procedure to test for network connectivity using IP and OSI ping and
trace commands. These commands are available in the 6500 command line
interface (CLI) when using Telnet or a terminal session.
Note: The user ID and password input in the command line interface is
not case-sensitive and is converted to uppercase unless enclosed by
double quotes ("). User IDs and passwords containing lowercase
characters can be entered by enclosing them in double quotes. The
challenge/response input is case-sensitive and does not require double
quotes.
Prerequisites
To perform this procedure, you must use an account with a level 1 UPC or
higher.
Step Action
When you use the CLI port number (10010 or 10020) or SSH port (20002) for
a Site Manager terminal session or Telnet access, you access the CLI directly.
2 At the login prompt, enter the user ID by entering:
<user ID>
See Note at the beginning of this procedure.
3 At the password prompt, enter the password by entering:
<password>
See Note at the beginning of this procedure.
Step Action
Step Action
Step Action
Step Action
Routers
IISIS Circuit Displays information about the IISIS circuits. See “IISIS Circuit Yes (Note 1) No
parameters” on page 3-24.
IISIS Router Displays information about the IISIS routing. See “IISIS Router Yes (Note 2) No
parameters” on page 3-26.
IP Static Route Displays information about the IP Static Route. See “IP Static Yes (Note 1) No
Route parameters” on page 3-27.
Reverse Port Display the information about mapping the TCP/UDP port of Yes (Note 1) No
NAT external requests to other internal port numbers and use a single
external IP address to access service in the internal network.
See “Reverse Port NAT parameters” on page 3-29.
OSPF Circuit Displays information about the OSPF circuits. See “OSPF Circuit Yes No
parameters” on page 3-31.
OSPF Router Displays information about the OSPF routers. Supported on all Yes (Note 2) No
Ethernet, GCC channels, and static tunnels but not the craft LAN
port on the CTM. See “OSPF Router parameters” on page 3-35.
Port Filter Displays information about the port filtering. It applies to IP Yes No
packets that are being forwarded from a private interface to a
public one, on the GNE. See “Port Filter parameters” on
page 3-37.
Upper Layer Displays information about the manual area addresses used in Yes No
DCC OSI addressing. See “Upper Layer DCC parameters” on
page 3-40.
SLDD Displays information about the Site Level Data Distribution Yes Yes
(SLDD). See “Site Level Data Distribution (SLDD) parameters”
on page 3-42.
Visible NE Displays the routing information. See “Visible NE Information No No
Information parameters” on page 3-44.
IISIS Routing Displays the routing table. See “IISIS Routing Table parameters” No No
Table on page 3-45.
Table 3-1
Comms Setting Management options (continued)
ARP/ND Proxy Displays information about the ARP Proxy IP address. See Yes (Note 1) No
“ARP/ND Proxy parameters” on page 3-49.
ARP/ND Table Displays information about the ARP table. See “ARP/ND Table No No
parameters” on page 3-49.
GNE Displays GNE information used for tunneling on all interfaces Yes (Note 1) No
“GNE parameter” on page 3-51.
GNE Port Filter Displays information about the GNE port filtering interface. See Yes (Note 1) No
“GNE Port Filter parameters” on page 3-52
IP Displays information about the IP on the LAN and RS-232 serial Yes Yes
ports. See “IP parameters” on page 3-52.
LAN Displays information about the six external LAN interfaces. “LAN Yes Yes
parameters” on page 3-54.
Lower Layer Displays information about the DCC/GCC communication. See Yes Yes
DCC/GCC “Lower Layer DCC/GCC parameters” on page 3-56.
NDP Displays the admin state of the NDP feature and the facilities with Yes Yes
NDP enabled. See “NDP parameters” on page 3-61.
Serial/RS-232 Displays information about the serial RS-232 ports. See “Serial/ No Yes
RS-232 parameters” on page 3-63.
TL1 Gateway Displays information about the TL1 Gateway Connections. See No No
Connections “TL1 Gateway Connections parameters” on page 3-64.
USB Displays the status of the USB ports. See “USB parameters” on No Yes
page 3-65.
Services
DHCP Displays information about the DHCP service used for local PC No Yes
access. See “DHCP parameters” on page 3-66.
FTP Displays information about the file transfer protocol (FTP) service No Yes
used for transferring files to/from the network element. See “FTP
parameters” on page 3-66.
Table 3-1
Comms Setting Management options (continued)
HTTP/HTTPS Displays information about the support secure HTTP service. No Yes
See “HTTP/HTTPS parameters” on page 3-70.
Note 1: Bulk deletion is supported for this Comms Setting Management option. Refer to Procedure 3-6,
“Deleting an entry in the communications settings” for more information on how to perform a bulk
deletion.
Note 2: Bulk deletion is supported for the redistribution section of this Comms Setting Management
option. Refer to Procedure 3-6, “Deleting an entry in the communications settings” for more information
on how to perform a bulk deletion.
Routers tab
IISIS Circuit parameters
IISIS is a routing protocol based on the OSI intra-domain routing protocol with
IP-specific extensions as specified in RFC1195. IISIS allows IP and OSI to
coexist in a single routing domain, allowing IP-only routers, OSI-only routers,
and dual IP/OSI routers to be effective in routing in a single network.
The IISIS Circuit option has a single table. Use the Add button to provision
new IISIS circuits and the Delete button to delete existing IISIS circuits. You
must create an IISIS circuit on each provisioned interface you want IISIS to
run on (except Auto-tunnels and the RS-232 ports).
For OTMn ports, a GCC0 or GCC1 PPP circuit (with IP address of 0.0.0.0) and
an associated IISIS circuit are automatically created when a PTP facility with
OTUn service type is provisioned if:
• the default auto GCC0 mode or GCC1 mode parameter is set to IISIS in
the System tab of the Node Information application and
• the Shelf IP has been provisioned on the NE.
When provisioning both GCC0 and GCC1 with default IISIS metrics on a shelf,
Comms over GCC1 is preferred as opposed to GCC0.
Table 3-2
IISIS Circuit parameters
Parameter Options Description Addable/
Editable
Unit • SHELF-shelf Displays the available ports for an IISIS circuit. Yes
• LAN-shelf-41 Only OTUTTP/ODUTTP AID with lower layer GCC0/
• LAN-shelf-42 GCC1/GCC2 provisioned are available for selection.
• COLAN-shelf-A
• COLAN-shelf-X
• ILAN-shelf-IN1
• ILAN-shelf-IN2
• ILAN-shelf-IN3
• ILAN-shelf-OUT1
• ILAN-shelf-OUT2
• ILAN-shelf-OUT3
• OTUTTP/ODUTTP
AID
Carrier • GCC0 Sets the carrier selected for the GCC (options Yes
• GCC1 available depend on circuit pack type and function).
Only applicable to Unit types with OTUTTP/ODUTTP
• GCC2 AID.
Circuit 1 to 63 Sets the circuit default metric used to calculate the Yes
Default best route. Default depends on type of interface as
Metric follows:
• SHELF, LAN-shelf-41, LAN-shelf-42, COLAN,
ILAN: 4
• OTUTTP/ODUTTP AID: 55
Select a higher value for a slower circuit.
Level 2 Only • On Sets the status of level 2 only routing on the IISIS No
• Off (default) circuit. Not supported in this release, On option is
always disabled.
Table 3-3
IISIS Router parameters
Router table
Router Level Level 1 Sets the IISIS router level. Level 2 not supported No
in this release, option is always disabled.
L1 Priority 1 to 127 (default 64) Sets the level 1 router priority. The L1 router Yes
assigned the highest priority becomes the L1
designated router for that LAN segment.
Route On (default), Off Sets whether routes (Off) or route summaries Yes
Summarization (On) are redistributed.
Redistribution table
Route • OSPF Distribution Sets the IISIS router distribution list entries for Yes
Redistribution/ • Static Distribution the selected IISIS router. The maximum is 80 for
List (default) each.
IP Subnet Standard dot notation Sets the IP subnet address of the distribution list Yes
entry for the selected IISIS router.
Table 3-3
IISIS Router parameters (continued)
Subnet Mask Standard dot notation Sets the subnet mask of the distribution list entry Yes
for the selected IISIS router.
Metric 1 to 63 Sets the metric (cost) of the distribution list entry Yes
for the selected IISIS router.
Metric Type External (default), Sets the metric type of the distribution list entry Yes
Internal for the selected IISIS router.
IP Subnet Standard dot notation Sets the destination IP subnet of the static route Yes
entry.
Subnet Mask Standard dot notation Sets the subnet mask of the table entries. Yes
Next Hop Standard dot notation Sets the IP address of the next hop. Yes
Note: The Next Hop IP for each IP Static Route must
be within the subnet of the Circuit ID IP (see “IP
parameters” on page 3-52).
Table 3-4
IPv4 Static Route parameters (continued)
Circuit ID • COLAN-shelf-A Sets the circuit identifier of the port used to get to the Yes
• COLAN-shelf-X next hop.
• ILAN-shelf-IN1 If the Next Hop is provisioned, the Circuit ID is
optional.
• ILAN-shelf-IN2
• ILAN-shelf-IN3
• ILAN-shelf-OUT1
• ILAN-shelf-OUT2
• ILAN-shelf-OUT3
• LAN-shelf-41
• LAN-shelf-42
• OTUTTP/ODUTTP
port
• OSC-shelf-slot-port
Carrier • GCC0 Sets the carrier selected for the GCC (options Yes
• GCC1 available depend on circuit pack type and function).
Only applicable to OTU service type facilities.
• GCC2
Description alphanumeric Sets the character string from 1-64 characters used Yes
to label the static route.
The Reverse Port NAT entry has a single table. Use the Add button to
provision a new Reverse Port NAT entry and the Delete button to delete an
existing Reverse Port NAT entry.
Table 3-5
Reverse Port NAT parameters
DCN IP Address Standard dot notation Displays the active public IP of the GNE. No
DCN Port (NATBASEPORT + 2050) to Sets the external port which is being Yes
(Note 1) (NATBASEPORT + 4099) mapped.
The default value of
NATBASEPORT is 50000.
Remote NE IP Standard dot notation Identifies the Private IP of the remote NE. Yes
Address
• FTP
• NETCONF
• NNCLI (Telnet)
• NNCLI (SSH)
• TL1 (Telnet)
• TL1 (SSH)
• SNMP
• Other
Table 3-5
Reverse Port NAT parameters (continued)
Remote NE Port 1 to 65535 Displays the internal port which is being Yes
(Note 2) mapped.
Note 1: NATBASEPORT can be modified in Site Manager under 'NAT configuration' in the Comms
Setting Management/Services tab. The default range of dynamic NAT ports that are opened on the NE
are 50000 to 50511. This range can be changed by editing the NAT configuration parameters.
Note 2: For a selected service in the Remote NE Service parameter, the remote NE port field is
populated with the port number for that service, except for the “Other” service. Only for the “Other”
service, the remote NE port field is provisionable.
Note 3: For the SNMP service, the Protocol is always UDP. For the rest of the Remote NE Service
options except “Other”, the Protocol is always TCP. Only for the “Other” service, the Protocol parameter
is provisionable. For Ciena support access to debug ports 8888, 8889, and 28888, choose TCP.
An OSPF circuit cannot be provisioned against a lower layer DCC with its
Protocol parameter set to LAPD.
Note 1: Do not add OSPF circuits to LAN ports provisioned with the
non-routing mode set to On.
Note 2: Do not create an OSPF circuit on the COLAN interfaces if the
interface is not connected to external DCN running OSPF.
The OSPF circuits will automatically create for IPv4 as follows: For IPv4, for
OTMn ports, a GCC0 or GCC1 PPP circuit (with IP address of 0.0.0.0) and an
associated OSPF circuit are automatically created when the OTM2 facility is
provisioned if the default auto GCC0 mode or GCC1 mode parameter is set to
OSPF in the System tab of the Node Information application and if the Shelf
IP has been provisioned on the NE.
Table 3-6
IPv4 OSPF Circuit parameters
Parameter Options Description Addable/
Editable
Carrier • GCC0 Sets the GCC carrier selected for the GCC Yes
• GCC1 (options available depend on circuit pack type
and function). Only applicable to Unit types
• GCC2 with OTUTTP/ODUTTP AID.
Network Area Standard dot notation Sets the network area (defaults to backbone Yes
area of 0.0.0.0). If there are multiple circuits on
an AID, you cannot edit the Network Area
parameter of any circuit on that AID.
Cost 1 to 65535 Sets the cost of the route (reflects speed of Yes
interface). Defaults are as follows:
• SHELF: 0 (read only)
• LAN-shelf-41, LAN-shelf-42, COLAN, ILAN:
10
• GCC0/1/2 on OTUTTP/ODUTTP: 75
Area Default 1 to 16777215 (default 1) Sets the cost of the route to the next area. No
Cost Note: It is not supported in this release.
Table 3-6
IPv4 OSPF Circuit parameters (continued)
Dead Interval 1 to 65535 Sets the interval (in seconds) at which hello Yes
(default 40) packets must not be seen before neighbors
declare the router down.
Hello Interval 1 to 65535 Sets the interval (in seconds) between the Yes
(default 10) hello packets that the router sends on the
interface.
Primary Area • On (default) Sets the primary area. The Primary Area Yes
• Off parameter for the first circuit on an AID has to
be set to ON (which is the default). All circuits
provisioned after that have to be set to Primary
Area OFF. The multi-area OSPF circuit feature
is applicable for T-Series IPv4 only.
Priority 0 to 255 (default 1) Sets the router priority value used in Yes
multi-access networks for the election of the
designated router (0 indicates that router is not
eligible to become designated router).
Area • Off (default) Sets whether the router is in a not so stubby Yes
• NSSA area (NSSA) or stub area. NSSA and Stub not
supported in this release.
• Stub
Table 3-6
IPv4 OSPF Circuit parameters (continued)
Authentication • Null (default) Sets the authentication type. Null means no Yes
Type • Simple authentication.
• MD5
MD5 Identifier 1 0 to 255 Sets the identifier for the first MD5 key. Must Yes
be unique on an OSPF interface.
MD5 Key 1 string of up to 16 Sets the password for the first MD5 key. Yes
characters
MD5 Identifier 2 0 to 255 Sets the identifier for the second MD5 key. Yes
Must be unique on an OSPF interface.
MD5 Key 2 string of up to 16 Sets the password for the second MD5 key. Yes
characters
Table 3-7
IPv4 OSPF Router parameters
Router
OSPF Router Standard dot Sets the router ID for the OSPFv2. Yes
Id notation It is recommended that the SHELF address (if
provisioned) is used as the OSPFv2 Router Id.
Route • On (default) Sets whether routes (off) or route summaries (On) are Yes
Summarization • Off redistributed.
Autonomous • On (default) Sets the autonomous system border router (ASBR). Yes
System Border • Off ASBR identifies whether an OSPFv2 router can
Router accept input (route redistribution) from another
autonomous system such as IISIS, or static routes.
Opaque Filter • All Disables the OSPF Opaque LSA Flooding Control Yes
• LAN (OOLFC), or enables for LAN, or enables for all.
Table 3-7
IPv4 OSPF Router parameters (continued)
ABR • RFC 3509 (default) Selects the Area Border Router. Yes
• RFC 2328
Compatible
Redistribution
Route • IISIS Distribution Sets the origin of the route(s) to be redistributed. Yes
Redistribution/ • Static Distribution
List (default)
IP Subnet Standard dot Sets the IP subnet address for redistribution. Yes
notation
Subnet Mask Standard dot Sets the subnet mask for redistribution. Yes
notation
Table 3-8
Port Filter parameters
Parameter Options Description Addable/
Editable
• LAN-shelf-41/42
Filtering Ingress Sets the location of the filter rule for the Yes
Location provisioned port.
Note: You are allowed the provisioning of the Port filtering on the GNE when it is configured in Private
IP mode.
Table 3-9
TCP ports/ranges open by default
Port Description
20, 21 FTP
22 SSH (TL1)
23 Telnet (TL1)
80 HTTP
830 NETCONF
Table 3-10
UDP ports/ranges open by default
Port Description
67-68 DHCP
123 SNTP
161-162 SNMP
1024 reserved
1812 RADIUS
4321 TEAS
4322 RAS
Use the Add button to add new manual area addresses to an unprovisioned
entry.
CAUTION
Loss of data communications
The deleting of existing manual addresses can cause a loss of
OSI data communications to the network element. IP based
data communications will be unaffected unless the network
element is being accessed through another OSI-based node.
To edit an existing manual area address, add a new manual area address to
an empty entry to support other equipment then delete existing manual area
address.
Note: If you are moving this network element to a new area, the manual
area address must be added to all network elements before you delete the
old manual area address.
When editing an address, you can either enter the complete address in the
Area address field or enter the individual components of the address in the
Area Address Components fields.
If you enter an Address Format ID (AFI) and Initial Domain ID (IDI) of 39840F
(either in the Area address field or the Address format ID and Initial domain ID
fields), it is recognized as the country code for the United States and the
Domain specific part (DSP) field is replaced with fields for the individual
components of the DSP. For other AFI and IDI entries in the AFI and IDI fields,
you must enter all components of the DSP in either the Area address field or
the Domain specific part (DSP) field.
Table 3-11
Upper Layer DCC parameters
Parameter Options Description Addable/
Editable
Manual Area 6 to 26 Sets the manual area addresses. When editing an address, Yes
Address hexadecimal the user can enter:
number • a free form manual area address or a manual area address.
The manual area address must be less than or equal to 26
hexadecimal characters. The number of characters must be
even.
• the individual components of the address in the Area
Address Components fields:
— Address format ID (2 hexadecimal characters)
— Initial domain ID (4 hexadecimal characters, pad with ‘F’
hexadecimal characters if less than four characters)
— Domain specific part (up to 20 hexadecimal characters)
— DSP format ID (2 hexadecimal characters, default value is
80)
— Organization ID (6 hexadecimal characters)
— Domain (4 hexadecimal characters)
— Area (4 hexadecimal characters).
The domain specific part field is replaced by the DSP format
ID, Organization ID, Domain, and Area fields if the Address
format ID and Initial domain ID fields are 39840F.
The SLDD option has a single table. Use the Edit button to change the SLDD
admin state (enable/disable). For the T-Series shelves, when the SLDD
feature is first enabled, only the ILAN-IN1 and ILAN-OUT1 interfaces are
added by default.
The configuration should, in most cases, be set to Auto (the default value).
This forces the Site-ID to be used as the SLDD Scope ID.
Use the Add and Delete buttons to add or delete interfaces to the list of
interfaces on which SLDD will be active. This will be determined by knowing
which interfaces are used for the physical intra-site connectivity in a given site.
ILAN interfaces are added to the list by default, but can be removed if
necessary. For the T-Series shelves, only the ILAN-IN1 and ILAN-OUT1
interfaces are added by default. COLAN interface(s) can also be added.
Interfaces can be added or deleted from the list regardless of the SLDD admin
state. Refer to Procedure 3-3, “Editing the Site Level Data Distribution” for the
procedure.
Table 3-12
Site Level Data Distribution parameters
Parameter Options Description Addable/
Editable
Configuration • Auto (default) Selects the configuration mode for the Scope ID. Yes
• Manual Note: Select Auto (the default value) for most
configurations. This will allow the Site-ID to be used
to scope SLDD data. In some special
circumstances, it may be necessary to override use
of the Site-ID to a manually set SLDD Scope ID. In
this case, choose Manual and set the SLDD Scope
ID parameter, below. The shelves will only
exchange data if they have the same SLDD Scope
ID. It is recommended to contact Ciena support
before using a manual SLDD Scope ID.
SLDD Scope integer Sets the Site Level Data Distribution Scope ID. This Yes
ID is only required, and can only be edited, if setting
Configuration to Manual (see above). The format is
0-65535. The default is 0. This parameter is
read-only when Configuration = Auto and defaults
to the Site-ID.
Each row lists the address information required to communicate with that
network element. The name column can be used to identify the network
element being queried.
Table 3-13
Visible NE Information parameters
Parameter Options Description Addable/
Editable
Name Character string (up Displays the system identifier (name) of the network No
to 20 characters) element.
Type Character string Displays the network element equipment type (for No
example, 6500).
The IISIS Routing Table supports a maximum of 150 nodes in a level 1 area.
A Routing Table Overflow alarm is raised if the 150 limit is exceeded.
Each row lists route information required to reach that network element. The
row with a cost of 0 and adjacency of 00:00:00:00:00:00 is the accessed
network element.
The IISIS Routing Table is a dynamic list that is updated each time a network
element or circuit is added in the network. Use the Refresh button each time
a change is made.
Table 3-14
IISIS Routing Table parameters
Adjacency 12-hexadecimal Displays the MAC address of the adjacent network element No
characters (00:00:00:00:00:00 is the accessed network element).
Cost 0 to 1023 Displays the OSI cost values (0 is the accessed network No
element).
The IP Routing Table is a dynamic list that is updated each time a network
element or circuit is added in the network. Use the Refresh button each time
a change is made.
Table 3-15
IP Routing Table parameters
Parameter Options Description Addable/
Editable
Subnet Mask Standard dot notation Displays the subnet mask of the table No
entries.
Next Hop Standard dot notation Displays the IP address of the next hop. No
Table 3-15
IP Routing Table parameters (continued)
Note: The metric (cost) that is advertised for an external route can be one or two types. Type 1 metrics
are comparable to the link state metric. The type 2 metrics are assumed to be larger than the cost of
any intra-AS path. In this case, the external cost value will be shown in the External Cost parameter
while the regular link state metric cost value will be shown in the Cost parameter.
The OSPF Neighbors table is a dynamic list that is updated each time
neighbor information is changed in the network. Use the Refresh button each
time a change is made.
Table 3-16
OSPF Neighbors parameters
Parameter Options Description Addable/
Editable
Neighbor Standard dot notation Displays the OSPF router ID of the neighbor. No
Router ID
Interfaces tab
ARP/ND Proxy parameters
The ARP/ND Proxy option contains two tabs: IPV4 and IPV6. The IPv6
options are not supported in this release.
The ARP/ND Proxy option has a single table. Use the Add button to provision
a new ARP Proxy IP address. Use the Delete button to delete an existing ARP
Proxy IP address.
Table 3-17
IPv4 ARP parameters
Parameter Options Description Addable/
Editable
Address range Address range, Single Determines if either an address range or a single Yes
or Single address address is added.
address
First address Standard dot notation Sets the first ARP Proxy IP address. Yes
Only applicable when Address range is selected.
Last address Standard dot notation Sets the last ARP Proxy IP address. Yes
Only applicable when Address range is selected.
Address Standard dot notation Enter the ARP Proxy IP address. Yes
Only applicable when Single address is selected.
The ARP Table option has a single table which displays the dynamic routing
information. This table is read-only. The read-only ARP Time Out field is
displayed above the dynamic routing information table.
Table 3-18
ARP Table parameters
Parameter Options Description Addable/
Editable
ARP time out 3600 Displays time in seconds before an inactive entry is No
removed from the table.
IP Address Standard dot notation Displays the IP address of the destination host. No
• ILAN-shelf-IN1
• ILAN-shelf-IN2
• ILAN-shelf-IN3
• ILAN-shelf-OUT1
• ILAN-shelf-OUT2
• ILAN-shelf-
OUT3LAN-shelf-41
• LAN-shelf-42
GNE parameter
The GNE option has a single table. The GNE pairs provide redundant DCN
comms access to remote nodes within the section. Use the Add button to
provision a new comms access and Delete button to delete an existing one.
Table 3-19
GNE parameters
Unit SHELF-shelf Displays the access identifier (AID) of the GNE. Yes
Group (Note 1 Integer value Specifies the redundancy group that the GNE Yes
and Note 2) between 1 and 255 belongs to for master/backup negotiation.
Primary • Yes Sets the GNE as being the preferred MASTER. Yes
(Note 2) • No (default)
GNE Subnet string of up to 36 Sets a unique name for the GNE. Yes
Name (Note 2) alphanumeric
characters
Table 3-20
GNE Port Filter parameters
IP parameters
The IP option has a single table which displays all the provisioned ports. Use
the:
• Add button to add an entry
• Delete button to delete an existing entry
• Edit button to edit the parameters of an existing entry
When deleting and then re-adding IP addresses on the COLAN and ILAN
ports, you must restart the network element by performing a cold restart on
the CTM before the new (added) IP addresses become active.
Note 1: Make sure the shelf IP address is different from the loopback
interface IP address configured through the SAOS CLI.
Note 2: The shelf must be restarted after changing the shelf IP address.
Note 3: Following an edit of the Control IP address on the primary shelf,
all member shelves of the TIDc must also be restarted. Otherwise, an
OSRP “Remote Node Unreachable” alarms can be raised against OSRP
links passing through these member shelves.
Table 3-21
IPv4 IP parameters
Parameter Options Description Addable/
Editable
Carrier • GCC0 Sets the GCC carrier used (options available depend Yes
• GCC1 on circuit pack type and function). Only applicable to
Unit types with OTUTTP/ODUTTP AID.
• GCC2
IP Address Standard dot notation Sets the IP address for the selected port. Yes
Broadcast Standard dot notation Displays the IP broadcast address derived from the IP No
Address address and the subnet mask. Read-only.
Netmask Standard dot notation Sets the subnet mask for the selected port. Yes
SHELF netmask must be 255.255.255.255.
For the LAN-shelf-41 and LAN-shelf-42 ports, the
netmask is restricted to 255.255.255.252.
For un-numbered ILAN, the netmask is restricted to
255.255.255.255.
Default 1 to 255 (default 90) Sets the number of hops before a packet is dropped. Yes
Time to Live (Note)
Table 3-21
IPv4 IP parameters (continued)
ARP Proxy • On Sets the support for proxy ARP on the interface. Yes
• Off (default) This parameter is only visible when the Unit (facility
AID) is COLAN-X.
Note: It is only editable for SHELF AID in Add and Edit dialog in this release. Not editable for other AID.
LAN parameters
The LAN option has a single table which displays all the provisioned LAN
ports. Use the:
• Add button to add an entry
• Edit button to edit the parameters of an existing entry
• Delete button to delete an existing entry
Table 3-22
LAN parameters
Parameter Options Description Addable/
Editable
Configuration • Automatic (default) Sets the port configuration for each provisioned Yes
(Note) • Full duplex 100BT LAN port. Full duplex 100BT is Full-Duplex
100 Mbit/s, Full duplex 1000BT is Full-Duplex
• Full duplex 1000BT 1000 Mbit/s and Automatic is auto-negotiation.
MAC Address 12-hexadecimal Displays the unique MAC address assigned to the No
characters LAN port.
Auto Neg • Auto (default) Sets the SyncE line timing mode. No
Control • Master Choose Master or Slave to request the LAN port
• Slave become a timing master or slave during negotiation.
Otherwise, leave at default value of Auto.
Valid only if Network Domain is set to PKT.
Table 3-22
LAN parameters (continued)
Network • MCN (default) Set to PKT if using port for SyncE. Otherwise, set to No
Domain • PKT MCN.
Note: If you set the LAN port configuration to Automatic (default), auto-negotiation is enabled.
Auto-negotiation automatically senses the speed/mode settings of the link. Use a straight-through cable
when connecting a PC to LAN-shelf-41 or LAN-shelf-42. Use a cross-over cable to connect 6500 NEs
together with ILAN. Use a straight-through cable when connecting COLAN port to the LAB LAN (It is
subject to change depending on what is connected to and what is configured).
For information on GCC support on the circuit packs, refer to Table 3-23 on
page 3-58.
Use the Add button to provision new DCC/GCC circuits and the Delete button
to delete existing DCC/GCC circuits. When adding a DCC/GCC circuit,
consider the following:
• Each end of the DCC/GCC circuit must be provisioned with the same
options.
• Once a new DCC/GCC circuit has been added, an IISIS or OSPF circuit
must be added for this port. See “IISIS Circuit parameters” on page 3-24
and “OSPF Circuit parameters” on page 3-31.
• You must delete the IISIS or OSPF circuit for the DCC/GCC circuit before
deleting the DCC/GCC circuit.
Table 3-23
GCC support on 6500 T-Series circuit packs
Circuit Packs GCC0 GCC1 GCC2
500G 2xUSS X X X
• MCN GCC0 on OTUTTP facility
• GCC1 on ODUTTP facility.
• SCN GCC1 and GCC2 on OTUTTP facility
The above GCC comms are supported on four different pluggables
or ports: WLAi module, 5xQSFP, 12xPSFP, and host ports.
Table 3-24
Lower Layer DCC/GCC parameters
Parameter Options Description Addable/
Editable
Carrier • GCC0 Sets the GCC carrier selected for the GCC (options Yes
• GCC1 available depend on circuit pack type and function).
Only applicable to Unit types with OTUTTP/
ODUTTP AID.
Protocol LAPD, NDP, PPP Select the LAPD, NDP, PPP, or Transparent radio Yes or No
(default), Transparent button to set the protocol of the DCC/GCC circuit. / depends
OTUTTP/ODUTTP/FTTP ports support PPP only, on facility
so 6500-T12 shelf and 6500-T24 shelf support PPP and carrier
only. NDP is only supported for inter-op between
6500 and 4200/CoreDirector (or older releases of
5400).
L2 Frame • 512 to 1492 (default Sets the LAPD frame size (only applicable to Yes for
Size 1304) for MCN LAPD). LAPD protocol is used internally in OTNCP MCN
• 9000 for OTNCP and this parameter cannot be changed. No for
CAUTION OTNCP
Each end of the DCC circuit must be provisioned
with the same LAPD frame size. Defaults on
different equipment types may be different.
L2 Side Role Automatic Displays the LAPD link mode (only applicable to No
LAPD).
Operation L2 • Network, User Displays the availability of L2 side role when adding No
Side Role • Disconnected a DCC/GCC circuit (only applicable to LAPD).
Table 3-24
Lower Layer DCC/GCC parameters (continued)
NDP parameters
The NDP option has a single table which displays the NDP provisioning
information. The administration state of the NDP feature is displayed in the
Admin State field above the table.
Use the Edit button to edit the Admin state to enable or disable the NDP
feature on the shelf. The Shelf IP must be provisioned before you can enable
the NDP feature on the shelf. Use the Add button to enable NDP on an
ODUTTP or OTUTTP facility. Use the Delete button to disable NDP on an
ODUTTP or OTUTTP facility.
Table 3-25
NDP parameters
Admin State • Disabled (default) Displays the administration state of the NDP feature. Yes
• Enabled
Unit OTUTTP AID Displays the ODUTTP or OTUTTP facility AID. Yes
ODUTTP AID
Carrier • GCC0 Displays the carrier selected for the GCC. Yes
• GCC1
PPP parameters
The PPP option has a single table which displays entries for the ports
configured for PPP. Use the Edit button to edit the PPP magic number support
parameter.
Table 3-26
PPP parameters
Parameter Options Description Addable/
Editable
Carrier • GCC0 Selects the carrier for the GCC circuit. Only Yes
• GCC1 applicable to OTUTTP/ODUTTP AID.
Preferred 16 bits (default), 32 bits, Displays the preferred frame checksum value. No
Frame Off
Checksum
Security Type • Off (default) Displays the security used on the PPP circuit. No
• CHAP
• PAP
Local Secret Up to 253 character string Displays the local secret when the Security type No
is CHAP or PAP.
Remote Up to 253 character string Displays the remote secret when the Security No
Secret type is CHAP or PAP.
IP Header • On Displays the IP header compression status. No
Compression • Off (default)
Peer IP Standard dot notation Displays the IP address of the remote end No
Address device.
Serial/RS-232 parameters
The Serial/RS-232 option has a single table which displays information on the
serial ports. The table is read-only.
Table 3-27
Serial/RS-232 parameters
Baud Rate • 9600 Displays the baud for the serial port. No
• 19200
• 38400
• 57600
• 115200
• Auto (default)
Negotiated • 9600 Displays the negotiated baud. For this release, No
Baud Rate • 19200 Disconnected is displayed irrespective of the
negotiated baud.
• 38400
• 57600
• 115200
• Disconnected
Table 3-27
Serial/RS-232 parameters (continued)
Table 3-28
TL1 Gateway Connections parameters
USB parameters
The USB option has a single table which displays status of the CTM USB
ports. The table is read-only. The USB port on the CTM is reserved for future
use.
Table 3-29
USB parameters
Unit/Name USB-shelf-slot-1 Displays the USB port ID. The slot number is the CTM No
USB-shelf-slot-2 slot number.
Services tab
DHCP parameters
The DHCP option has a single table with a single entry. Use the Edit button to
edit the DHCP parameters.
Table 3-30
DHCP parameters
Unit LAN-shelf-15 (or 41) Displays the LAN port available for the DHCP. No
LAN-shelf-16 (or 42)
IPv4 Server • On (default) Sets the status of the DHCP IPv4 server on the craft Yes
• Off LAN port.
FTP parameters
The FTP option has a single table with a single entry. Use the Edit button to
edit the FTP parameters.
Table 3-31
FTP parameters
Idle timeout 1 to 900 Sets the time (in seconds) before an idle ftp session is Yes
(seconds) (default is 180) disconnected.
NETCONF parameters
The NETCONF option has a single table with a single entry. Use the Edit
button to edit the NETCONF parameter.
Table 3-32
NETCONF parameters
State • Enabled Sets the status of the NETCONF protocol access. Yes
• Disabled (default)
SSH/Telnet parameters
The SSH/Telnet option has a single table with a single entry. Use the Edit
button to edit the SSH parameters.
Table 3-33
SSH/Telnet parameters
SSH Server • Enabled (default) Sets the status of the SSH server. Yes
• Disabled Note: An SSH server cannot be disabled unless a
telnet server is enabled.
Telnet Server • Enabled (default) Sets the status of the telnet server. Yes
• Disabled Note: A telnet server cannot be disabled unless an
SSH server is enabled.
Table 3-33
SSH/Telnet parameters (continued)
Telnet 1 to 18 (default 18) Sets the maximum number of concurrent SSH Yes
Maximum sessions that are allowed to the network element.
number of Note 1: If both SSH and Telnet servers are enabled,
telnet the total maximum number of SSH and Telnet sessions
sessions on the NE cannot exceed 31. For example, if SSH is
enabled with 20 maximum sessions, you cannot have
more than 11 enabled Telnet sessions. To increase the
maximum number of Telnet sessions, you must first
reduce the maximum number of SSH sessions.
Note 2: Within 31 maximum number of Telnet and
SSH sessions, up to 18 (Telnet & SSH combined) TL1
sessions are supported on each CTM; CTM-41/42.
Debug port has maximum of 5 sessions and each SSH
or Telnet connection consumes one session. Each TL1
gateway session, whether reaching GNE or RNE will
count as one SSH/Telnet session on the gateway NE.
SSH Idle 0 to 99 (default 30) Sets the time (in minutes) before an idle SSH session Yes
timeout is disconnected. A value of 0 indicates infinite (no
(minutes) timeout).
Telnet Idle 0 to 99 (default 30) Sets the time (in minutes) before an idle Telnet session Yes
timeout is disconnected. A value of 0 indicates infinite (no
(minutes) timeout).
SSH CIPHER • AES128CTR Select the check box(es) to enable the corresponding Yes
• AES128CBC secure shell (SSH) cipher(s).
• AES192CTR
• AES192CBC
• AES256CTR
• AES256CBC
• RIJNDAEL128CBC
• RIJNDAEL192CBC
• RIJNDAEL256CBC
• 3DESCBC
SSH HMAC • MD5 Select the check box(es) to enable the corresponding Yes
• MD596 secure shell (SSH) hash message authentication
codes (HMACs).
• SHA1
• SHA196
• SHA256
Table 3-33
SSH/Telnet parameters (continued)
Key • DH-GROUP1 Select the check box(es) to enable the corresponding Yes
Exchange • DH-GROUP14 key exchange method(s):
Method
• ECDH-SHA2-NISTP • DH-GROUP1 corresponds to Diffie-Hellman Group 1
256 key exchange.
SSH Client
Host Key • Yes Select whether host key validation is enabled (Yes) or Yes
Validation • No (default) disabled (No).
Host Key Validation enables the SFTP client to
validate a remote SFTP server's host key. If the remote
SFTP server's host key is not contained within the
known host key list, the connection is denied.
SSH Server
Server Auth • None (default) Select the SSH server authentication method. Yes
• Public Key Note: The 6500 always requires authentication in its
applications and this enforces additional
authentication at the SSH layer.
Table 3-33
SSH/Telnet parameters (continued)
HTTP/HTTPS parameters
The HTTP/HTTPS option has a single table with a single entry. Use the Edit
button to edit the HTTP/HTTPS parameter.
Table 3-34
HTTP/HTTPS parameters
HTTP server • Enabled (default) Sets the status of the HTTP protocol access. Yes
• Disabled
HTTPS server • Enabled (default) Sets the status of the HTTPS protocol access. Yes
• Disabled
Table 3-35
NAT Configuration parameters
NAT Starting 1024 to 65535 Sets the base UDP/TCP port value dynamically Yes
Port allocated for connection flows managed by NAT
services. It applies to Redundant NAT.
Note: If not specified, the current value is not changed.
If never configured, the default is 50000.
NAT Number 256 to 1024 Specifies the number of UDP/TCP port values Yes
of Entries dynamically allocated for connection flows managed by
NAT services. It applies to Redundant NAT.
Note: If not specified, the current value is not changed.
If never configured, the default is 512.
Release 12.6
Publication: 323-1851-101
Document status: Standard
Issue 1
Document release date: September 2019
CONTACT CIENA
For additional information, office locations, and phone numbers, please visit the Ciena
web site at www.ciena.com