Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
June 2016
71-76/81-86 GHz
PACKET RADIO SYSTEM
iPASOLINK EX
Advanced
INSTRUCTION MANUAL
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
GENERAL -1-
iPASOLINK EX Advanced
SAFETY INFORMATION
The Safety Information provides precautions and directions to install, operate and
maintain the iPASOLINK EX Advanced (hereinafter iPASOLINK EX/A) safely. To
prevent the equipment from being damaged or causing bodily harm, please
familiarize yourself with the contents here in this document and in the instruction
manuals before installing/operating the equipment.
GENERAL
LABELS
Marks of Cautions and Warnings printed on the equipment are shown below. In case
that these labels are out of sight due to the installed condition, please contact NEC.:
Non-Ionizing Radiation
Caution that the non-ionizing radiation from the equipment may affect
your health.
WEEE
Waste Electrical and Electronic Equipment — The electrical and
electronic products with this mark are the subjects to follow WEEE.
Disposal of NEC equipment or any part of NEC equipment with this
mark should comply with regulations implemented by the local
authorities or the agreement with NEC.
China RoHS
Equipment with this mark is the subject to compliance with China RoHS
in terms of the environmental protection applied to the electrical and
electronic equipment.
WARNING
WARNING
WARNING
Do not enter the area in front of the antenna while
transmitter is activating. Power density of microwave or
millimeter-wave is high along the antenna beam. For
details, refer to the NOTICE and SAFETY GUIDELINE in this
document.
WARNING
In a system using optical modules, do not stare at the laser
beams directly when using the optical instruments. or it
may cause damages to eyes and skin.
CAUTION
CAUTION: HEAVY
Use Caution when Lifting: This equipment is heavier
than you expect. Ensure not to hurt yourself or the
equipment when lifting or transporting it.
CAUTION
Take care not to drop the equipment, parts and/or tools
when working in a high place. Even a small part could
be a weapon (sometimes deadly), if it is fallen from the
high place. Ensure to take adequate measures, such as
restricting the area, to prevent an accident before
starting the high-place work.
CAUTION
Use the Safety Extra Low Voltage (SELV) to supply the
–48 VDC power to the equipment.
CAUTION
Place iPASOLINK EX/A within the area protected by
lightning rod. To avoid surge current caused by lightning,
from circulating within the equipment earth system, the
equipment earth system should be connected to the
ground of the lightning rod at the ground level.
CAUTION
While the equipment is powered on, do not even attempt
to disconnect/reconnect the power supply plug, or the
equipment and DC-DC CONV may be damaged.
CAUTION
iPASOLINK EX/A requires a circuit breaker or shut-off
function externally. The equipment does not provide a
power on/off switch. Place the equipment and a power
injector in position to shut the power of iPASOLINK EX/
A off safely just in case of emergency.
CAUTION
When iPASOLINK EX/A is powered via the PoE
Terminal, ensure not to disconnect the LAN Cable while
in service, or the equipment may be damaged.
CAUTION
iPASOLINK EX/A provides PoE (Power over Ethernet)
Port, which can enable either –48 VDC Power Port or
PoE Port but not both at a time. See NOTICE (POWER
SUPPLY AND CIRCUIT BREAKER) also.
CAUTION
Use STP (Shielded Twisted Pair) cables for LAN
connections. Using UTP (Unshielded Twisted Pair) cables
may result in damage to the equipment, causing the
failure. To enable the shielding effect for the radio
equipment and devices to which it is connected, ground
the equipment and connecting cables securely and
properly.
CAUTION
Do not use cables that are charged with static electricity.
If the charged cables are used for connecting to the
equipment, it may result in damage to the equipment.
Make sure that the cables are not charged with static
electricity before connecting them to the equipment.
CAUTION
In case of emergency, such as detecting unusual odor,
burning smells, smokes, or strange sounds, quit
operating the equipment immediately, and power it off. If
the equipment keeps operating in such condition, the
equipment may get damaged, generating an electric
shock, which should not be fixed or repaired by
customers.
CAUTION
Do not attempt to disassemble, modify, overhaul, or
repair the equipment by yourself, or it may damage the
equipment or may result in giving an electric shock.
(c) GROUNDING
Ground Terminal should be connected to the station earth point. For
details, refer to the Grounding the Frame section in the Installation
manual.
EX/A EX/A
DC –48V DC –48V
POWER CABLE
(2-Core Shielded Cable of
POWER CABLE 14 to 16 AWG)
(2-Core Shielded Cable of AC POWER
14 to 16 AWG) MODULE
AC POWER CABLE
AC 100 V to 240 V
EX/A
PoE
LAN CABLE
POWER
INJECTOR
EXTERNAL
CIRCUIT
BREAKER
The cable should be shielded to keep operating in conformity with EMC standards.
Power density in front of the antenna turns high along the antenna beam. Ensure not
to allow yourself radiated by beams anytime.
Y
Calculation Example 1 ANTENNA
Calculation Example 2
SAFETY DISTANCE: Y m
The power density and field strength level can be obtained by the following
calculation formula:
P’ + G – 30
P 10 10
Power Density : S = (W/m2) = (mW/cm2)
4R2 40R 2
Where
P = Output Power (W),
P’ = Output Power (dBm),
G = Antenna Gain (dBi),
(in condition of angle and range from antenna)
R = Distance between human being and antenna (m)
The safety distance that is obtained by the conditions above and is below the value
defined by COUNCIL RECOMMENDATIN (1999/519/EC) of 1 mW/cm² is:
Front Side of Antenna (X) 9.0 m
Rear Side of Antenna (Y) 0.004 m = 4.0 mm
iPASOLINK EX
Advanced
INSTALLATION
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
CONTENTS –i–
iPASOLINK EX/A
INSTALLATION
CONTENTS
1. OVERVIEW 1-1
2. COMPOSITIONS 2-1
1. OVERVIEW
The standard installation is summarized in this section. Following shows the typical
installation work flow and guides:
Connect Cables
(Section: 5. CONNECT CABLES)
Ground (Earth)
(Section: 6. GROUND iPASOLINK EX/A)
2. COMPOSITIONS
2.1 Overview
Following shows the list of contents; iPASOLINK EX/A and its parts required to set
up iPASOLINK EX/A. Confirm them before starting the installation.
EX/A
DC –48V
POWER CABLE
(2-Core Shielded Cable of
14 to 16 AWG)
EX/A
POWER CABLE
DC –48V (2-Core Shielded Cable of 14 to 16 AWG)
AC POWER
MODULE
EX/A
LAN CABLE
POWER
INJECTOR
LAN Cables (Electric) 1 For P1 Port; RJ-45; Double-shielded; with Waterproofing Cap.
[2.4.4, Figure 2-5]
LAN Cables (Optic) 1 or 2 For P2 and P3 Ports; LC; with Waterproofing Cap.
[2.4.5, Figure 2-6]]
(PORT-SIDE VIEW)
(FRONT VIEW)
(NWA-A00086)
(NWA-A00087)
ANTENNA
ANTENNA
ATTACHMENT
CAUTION MARK
TOP PAD
POLYETHYLENE SHEET
iPASOLINK EX/A
BOTTOM PAD
CONTAINER BOX
This section provides the installation procedures to mount iPASOLINK EX/A and its
Antenna onto a Pole. For the detailed descriptions for the Antenna Installation, see
the instruction manual attached to the Antenna.
TOOLS
Screwdriver
Torque Wrench
Accessing must be protected using a tool, locks, keys, and/or other means
of security, which should be managed by the authority who is responsible
for the installed site.
Antenna Bracket’s position to the pole differ depending on the use of the equipment.
V mark is found on the grip. Place this V mark on top. For the Vertical Polarization,
either side to the pole is available to be mounted (no restrictions):
H mark is found on the bottom left of the grip. To mount the equipment on left to the
pole, place the equipment showing its H mark on top. To mount the equipment on
right to the pole, place the equipment showing its H mark on bottom:
H
(to mount the equipment on left to the pole)
(to mount the equipment on right to the pole)
POLE
(50 ~ 115 mm; 2.0 ~ 4.5 inches)
ATTENTION!!
For the purpose of the use in iPASOLINK EX/A, it is recommended to use the SFPs
that are designated and supplied by NEC. NEC will not guarantee the
performances of iPASOLINK EX/A if other vendors’ SFP modules are installed.
1) Single Module Fiber (SMF): This SFP complies with 10GBASE-LR Ethernet
and 1000BASE-LX Ethernet. The SFP operates with the 1310 nm laser
transmitter and has a duplex LC connector.
2) Multi Mode Fiber (MMF): This SFP complies with 10GBASE-SR and
1000BASE-SX Ethernet interfaces. The SFP operates with the 850 nm laser
transmitter and has a duplex LC connector.
3) Electrical SFP (RJ-45): This SFP complies with 10/100/1000 BASE-T copper
interface.
The SFP Modules also accept LC Fiber Connectors with polished connector (LC-PC)
or ultra polished connector (LC-UPC).
5. CONNECT CABLES
5.1 Overview
This section provides the descriptions for connecting Traffic Cables and Power
Cable. This section also provides the assembly methods of the Grounding Cable and
Power cable for the purpose of preparing them on site if needed.
➀
➆
➁ ➂ ➃ ➄ ➅
Table 5-1 Terminals on iPASOLINK EX/A
➂ DCN (PoE) GbE; Power Supply by PoE (RJ-45); WebLCT or NMS Connecting Port
Detailed descriptions and routing methods are provided in the Section 6. GROUND
iPASOLINK EX/A.
Reference
gasket is
seen
HOUSING
(3) Move the housing till the plug is fit in the shell..
BARREL
HOUSING
BUSHING WITH RIB
GLAND NUT
BARREL
GAP
CAUTION: In case using the thin cable, the Gland Nut may not stop and be secured at
the appropriate position if tightening it by force. Ensure that the barrel end does not
stick out of the gap at the Gland Nut end.
A LAN Cable to connect with iPASOLINK EX/A requires the waterproof process on
its connection point. Following shows the connecting method of the LAN Cable
(Electric) and the waterproofing cap:
Reference
1. Uncover the protected port. Waterproofing cap can be off by turning it counter-
clockwise.
2. Verify the connector shape of the RJ45 Port, then insert the plug of LAN Cable
with waterproofing cap.
(front side)
RJ45 PORT
3. Place the housing over the RJ45 Connector, and engage it by turning it
clockwise:
no gap
gasket is seen
BARREL
BUSHING
WITH RIB
RIB
(GLAND NUT) Check that the bushing is fully inserted
within the barrel end.
5. Tighten the Gland Nut at the barrel end level, and secure them using the torque
wrench.
GLAND NUT
CAUTION: In case using the thin cable, the Gland Nut may not stop and be secured at
the appropriate position if tightening it by force. Ensure that the barrel end does not
stick out of the gap at the Gland Nut end.
Each LAN cable to connect with iPASOLINK EX/A should wear a waterproofing
cap. Following shows the connecting method of LAN Cable with SFP+ and
waterproofing cap:
Reference
1. Uncover the protected port. Waterproofing cap can be off by turning it counter-
clockwise.
HOUSING
BARREL
BUSHING
WITH RIB
RIB
(GLAND NUT)
5. Tighten the Gland Nut at the barrel end level, and secure them using the torque
wrench.
dia. 60 mm or greater
1. Tie cables.
tie cables
5.7.1 Summary
5.7.3 P1 Port
Indication: DC –48V
DC –48 V [4-Pin]
1 2
3 4
1 Positive
2 Positive
3 Negative
4 Negative
5.7.3 P1 Port
RJ-45
1 2 3 4 5 6 7 8
NOTE: Use 4-pair shielded cable of CAT5e or higher. The cable should be
shielded to keep operating in conformity with EMC standards.
Indication: P2, P3
SFP/SFP++
1 2
1 TX
2 RX
Parts Description
Crimping Tool ——
5.8.1.2 Procedure
1~2 mm
CABLE SHEATH
(RING TERMINAL)
Slide
4. Apply the Crimp Ring to the cable end, and fasten it using a crimping tool.
crimp
1~2 mm
(EXPOSED WIRE STRANDS)
RING TERMINAL
(side view)
crimp
INSULATION SLEEVE
Slide back
Parts Description
Contact(s) 172063-0311
Waterproofing Plug ——
Cover
5.8.2.3 Procedure
5.75 ±0.25 mm
• knife
Tools • cutter
• measuring tool, etc.
NOTE: The drawings below put the connector housing upside down for some
reasons. Be sure to verify the orientation of completed connector
when connecting it to the equipment.
POWER CONNECTOR
HOUSING (REAR SIDE)
#1
When mounting iPASOLINK EX/A, ground the equipment. Following shows the
method of grounding equipment.
LAN CABLE
GROUNDING
iPASOLINK EX/A
WIRE
GROUND LEVEL
(Grounding Resistance
should be less than 10 ohms)
Cautions
1. Ensure to install iPASOLINK EX/A within the area protected by lightning
rod.
2. To avoid surge currents caused by lightning circulating in the equipment
earth system, connect the equipment earth system to the ground of the
lightning rod at the ground level.
NOTES:
1. For grounding iPASOLINK EX/A, 5 mm square cable, which means
more than 2.5 mm diameter cable, of AWG #10 with an appropriate
crimping terminal should be used.
2. Screwing torque should be within 2.7 ± 0.3N•m.
iPASOLINK
EX/A GROUNDING WIRE
POWER CABLE
GROUNDING TERMINAL
(Grounding Resistance of
Tower should be less than
10 ohms.)
POWER CABLE
NOTES:
* NEC recommends that the equipment should be connected to earth line
as NEC’s standard installation.
EP Earth Ground Point of tower
CAUTIONS:
Equipment surface may be hot during the operation. Ensure not to
touch the equipment.
WARNING:
Once the equipment is powered on, wait at least 5 minutes before
turning its power off. Repeatedly turning the power on and off
within a short interval may cause the equipment failure.
1. Powering off the power unit or power injector shuts down iPASOLINK EX/
A.
WARNING:
Disconnecting LAN Cable from DCN (PoE) Port while the equipment
is powered on may cause the equipment failure.
When the installation is completed, adjust the equipment angle following steps
shown below.
8.1 Precautions
1. Required Tools
Digital Multimeter
Test Leads
WebLCT (PC)
click
CAUTION:
Surface of iPASOLINK EX/A may be hot during the operation.
Ensure not to touch the equipment by mistake.
(1) Remove a protective cap from RSL terminal on iPASOLINK EX/A, and
connect it to a digital multimeter using the lead between.
(2) Monitor levels at both the local and opposing site, and fix the reception
level to its maximum by turning iPASOLINK EX/As up and down and/or
left to right.
NOTES:
1. RSL monitor conforms to IEC61169-24.
2. When the checks are done, put the waterproofing cap on to the RSL
terminal to protect it.
RSL TERMINAL
iPASOLINK EX/A
DIGITAL MULTIMETER
Following shows the relationship between RX INPUT LEVEL and RSL (V).
4.5
3.5
3
RSL [V]
2.5
1.5
0.5
0
–80 –70 –60 –50 –40 –30 –20
RX INPUT LEVEL [dBm]
SECOND SIDE-LOBE
(if detected)
NULL
FIRST SIDE-LOBE
NULL
MAIN BEAM
(Target Voltage)
5°
Up/Down Adjustment
RX POWER LEVEL
Left/Right Adjustment
MAIN BEAM
(Target Voltage)
RX Level
Left/Right Adjustment
Left/Right Adjustment
5. Put the protective cap back in place on RSL terminal of each station. This
terminal must be covered by the protective cap for waterproofing.
6. At each station, secure the Antenna by re-tightening bolts that have been
loosen in Step 2.
The radiation levels of Microwave and Millimeter-Wave that iPASOLINK series deal
with are very low, and no health hazard has been reported for them so far. However,
advanced countries that care much about health hazard have started regulating the
radiation levels. For EU countries, it is specified by EN 62311 Annex A A.2. In order
to follow the regulation, operators should not work near the antenna if its transmitter
is activating. Especially, the radiation level of a specific area in front of antenna is
high.
See the following illustration and Calculation Examples 1 and 2:
Power density in front of the antenna turns high along the antenna beam. Ensure not
to allow yourself radiated by beams anytime.
Calculation Example 1 Y
ANTENNA
SAFETY DISTANCE: X m
–90 to +90
degrees
iPASOLINK EX/A
Calculation Example 2
SAFETY DISTANCE: Y m
The power density and field strength level can be obtained by the following
calculation formula:
P’ + G – 30
P 10 10
Power Density : S = (W/m2) = (mW/cm2)
4R2 40R2
Where
P = Output Power (W),
P’ = Output Power (dBm),
G = Antenna Gain (dBi),
(in condition of angle and range from antenna)
R = Distance between human being and antenna (m)
The safety distance that is obtained by the conditions above and is below the value
defined by COUNCIL RECOMMENDATIN (1999/519/EC) of 1 mW/cm² is:
Front Side of Antenna (X) 9.0 m
Rear Side of Antenna (Y) 0.004 m = 4.0 mm
iPASOLINK EX
Advanced
SET NETWORK AND
SYSTEM PROVISIONING
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
GGS-000547-01E
GGS-000547-01E
Printed in Japan
CONTENTS –i–
iPASOLINK EX Advanced
SET NETWORK AND SYSTEM PROVISIONING
CONTENTS
DOCUMENT WARRANTY i
6. PROVISIONING 6-1
GGS-000547-01E
DOCUMENT WARRANTY –i–
DOCUMENT WARRANTY
3. This document is provided on the assumption that the targeted users have skills and
knowledge of restrictions and precautions to operate the equivalent equipment. Refer
to the equipment manual for details.
1. OPERATE WebLCT
< item > A command variable to be entered, which requires < password >
the user’s choice or definition. Commonly used to
prompt the user to enter a password.
Initial Caps Indicates a keypad name using an uppercase for Press Enter key.
its first letter.
1.2.1 Communications
Since using the method of WEB browser, there is no application software to install.
However, to operate iPASOLINK via WebLCT, license keys that are prepared
according to the contract and equipment version should be installed.
DCN (PoE)
LAN CABLE
(10/100BASE-TX)
Connect the LAN Port on PC and DCN (PoE) Port on iPASOLINK EX/A using a
LAN Cable. Following are the specifications of LAN Port/Cable:
10/100BASE-TX
RJ45
Component Windows 7® (32 bits, 64 bits) Windows 8.1® (32 bits, 64 bits)
CPU Intel Core i5 2 cores 2.0 GHz or greater Intel Core i52 cores 2.0 GHz or greater
Item Requirement
NOTE: It is not recommended to use the Zoom function of these browsers while
operating the WebLCT. Using this function may affect the appearance of
WebLCT windows.
2. Click Tools on the menu bar or the command bar, and select Internet
Options. Following example is selecting Tools on the menu bar.
4. The Tabbed Browsing Settings option window appears. Select Always open
pop-ups in a new tab, then click the OK button.
1. Click Security tab to show the security options, and click Custom level
button.
2. Security Settings — Internet Zone option window appears. Select Enable for
Downloads — Automatic prompting for file downloads option.
3. The Options window appears. Select Always ask me where to save files,
then click the OK button.
However, if this message appears repeatedly, annoying you, proceed with the
following to stop displaying, instead of stop running the script:
2. Launch the Internet Explorer® newly, and go to the web site by following
URL: http://support.microsoft.com/kb/175500
(Example used here is English Version. Language used differs according to where you are.)
3. Scroll down the page to show the Fix it tool button, then click it.
4. Security Warning dialog box appears. Click the Run button in the dialog box,
and follow the steps in the Fix it wizard:
Following is the message dialog by the Firefox™ if any script takes too long to
respond, or a is getting out of control:
If the message above appears while the iPASOLINK process is in progress, proceed
with the following:
Continue button
1.8.1 Log In to NE
Users are registered by means of login names and their passwords. To protect the
network and network management system from unauthorized access or unauthorized
modifications, three levels with different privileges (refer to the table shown in
Section 2.2.2 User Access Levels) define users. The available functions to operate
depend on the user’s privilege level. Therefore, some of the functions may or may not
be carried out.
The highest or administrator level (Admin) has the full access to the network and
network management system.
Procedure 1-4
3. Click start, and select Programs Internet Explore. The Internet Explorer
window appears.
5. The Login window for WebLCT appears. Enter a user name and his/her
password into User Name and Password fields:
Following are the default user name and its password for iPASOLINK EX/A:
User Name: Admin
Password: 12345678
6. Click the OK button blow the Login fields. System Status indicator appears.
7. Click the OK button, or wait till the box automatically disappears. (The System
Status indicator disappears in a while without clicking the OK button if you
wait.)
Logout button
2. The Confirmation dialog box appears. Click the OK button to log out.
(1) NE Name
This field indicates a registered equipment name.
Check (click to leave a tick in) Auto Mode check box to enable refreshing the
window automatically.
(5) Hide NR
Check (click to leave a tick in) Hide NR check box to hide the lines of conditions that
are assigned to NR (Not Reported) from the Active Alarm list.
This drop-down list shows a list of NEs on the opposed sites. A user can select an NE
from the list to log in to.
(d) Provisioning
This item is to configure the detailed settings of the Equipment.
(h) Metering
Metering measures the real time TX power, RX level, Power Supply and BER,
etc.
(j) Inventory
Inventory retrieves the information regarding the equipment and software
license.
This part shows detailed information or a setting procedure under each menu.
NOTE: Procedures here use the Microsoft® Internet Explorer for the
browsing software as an example.
Procedure 2-1
2. In the MENU frame on the left, expand the S/W License Setup to select
Import License key. The Import License key window appears.
4. File selection window for Import License key appears. Click the button,
and select a target file:
5. Import License key option window displays the selected file name. Confirm
the file name, then click the OK button to proceed.
6. When the importing process ends, the Import License key window updates
the information.
2.2.1 Overview
2.2.1.1 Access Level
iPASOLINK provides three user access levels with different privilege as shown in the
table below. For details of each access level and its available operations, refer to
Table 2-3 User Access Privilege Levels.
Following describes the terms, such as upload and download mentioned in the table
above:
Upload is to copy a file from NE to an external storage, such as WebLCT PC.
Download is to copy a file from an external storage to the internal storage of
equipment.
Group Name Classification FTP SSHv2 SFTP HTTP HTTPS SNMP Access Level
OPERATOR Unchangeable ✔ ✔ ✔ ✔ ✔ ✔ Operator
Following shows the access level for each task. Remote means that a user makes an
access to the equipment remotely.
Meanings:
R/W: A user can both browse and modify settings.
O: The task is operational by a remote access but is restricted according to the access
level assigned to the user.
Current Status R R R O
Equipment Setup
Equipment Configuration R/W R R O
Provisioning
MODEM Function Setting MODEM Port Setting R/W R/W R O
TX Power Setting R/W R/W R O
ALM Mode Setting R/W R/W R O
ETH Function Setting Equipment Setting R/W R/W R O
ETH Port Setting R/W R/W R O
VLAN Setting R/W R/W R O
FDB Setting R/W R/W R O
ETH OAM Setting R/W R/W R O
RSTP/MSTP Setting R/W R/W R O
ERP Setting R/W R/W R O
Link Aggregation Setting R/W R/W R O
QoS/Classification Setting R/W R/W R O
Filter Setting R/W R/W R O
L2CP Transparent Setting R/W R/W R O
Mirroring Setting R/W R/W R O
Port Isolate Setting R/W R/W R O
LLF Setting R/W R/W R O
Broadcast Storm Control
R/W R/W R O
Setting
Maintenance Control
Loopback Control L2 Loopback Control R/W R/W R O
Maintenance Test
ETH OAM LB/LT/DM/LM Control R/W R/W R O
PMON/RMON Report
MODEM PMON Report R R R O
Metering
Current Metering R/W R/W R O
Equipment Utility
Export (NE -> Storage) Utility R/W R/W — O
Shipment R/W — — —
Inventory
Equipment Inventory Information R/W R/W R O
iPASOLINK provides three default user accounts with pre-defined access levels and
privileges. In addition to these default user accounts, up to 100 user accounts can be
added.
Config 87654321 In addition to the tasks available for a User, Config CONFIG
user is able to operate the radio management, base
band management, switching management for C-
Plane control
Admin 12345678 In addition to the tasks available for a Config user, ADMIN
Admin user is able to operate database
management, file management, user management
and time adjustment for M-Plane control.
This function allows users to view and confirm the registered user accounts.
Procedure 2-2
2. In the MENU frame on the left, expand Network Management Setting, and its
submenu User Account / Security Setting to select Login User List. The
Login User List appears.
Procedure 2-3
Menu Path:
Network Management Setting ➤ User Account / Security Setting
➤ Login User List
Figure 2-7 Select Login User Control in Login User List Window
2. Login User Control option window appears. Specify the maximum number
of users to allow logging in, then click the OK button.
NOTE: This operation is available only by users whose access level is Admin.
Authentication Setting
Determines and sets the authentication method to log in to iPASOLINK.
2. In the MENU frame on the left, expand Network Management Setting, and its
submenu User Account / Security Setting to select User Authentication
Configuration. The User Authentication Configuration window appears.
4. Authentication Setting option window appears. Select values, then click the
OK button.
Authentication NE -> RADIUS Server Login authentications are proceeded by the order from NE to
Sequence RADIUS Server. This option is available when the
Authentication Method is set to NE + RADIUS.
RADIUS Server -> NE Login authentications are proceeded by the order from RADIUS
Server to NE. This option is available when the Authentication
Method is set to NE + RADIUS.
Login Protection Enable Enables Account locking (Login Protection) that is the internal
authentication function using the registered account and their
passwords.
Procedure 2-5
Menu Path:
Network Management Setting ➤ User Account / Security Setting
➤ User Authentication Configuration
Privilege ID numbers
2. Privilege ID option window for the selected ID number appears. Select the
method to assign, then click the OK button.
ADMIN
Default Permission
This function allows users to add registrations of new user accounts, and to modify/
delete the registered user accounts.
NOTE: The operations regarding this function are available by the Admin-level user(s)
only.
NOTE: In addition to the three default accounts, up to 100 user accounts can be added.
NOTE: Security Level (Hash Algorithm / Priv (Privacy) Algorithm) is required to be set
to add new user accounts. Once a registration of a user is completed, the
security level of this user cannot be modified.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu User Account / Security Setting to select User Account
Management. The User Account Management window appears.
4. Enter the appropriate value to each parameter for the user to be added.
ii) Click Set Password tool button on the tool bar to open the Set Password option
window, enter the password within eight to 31 characters long, then click the
OK button.
iii) Select Group Name. See Table 2-2 User Group Profile for User Groups.
➂ Click Set Auth Key button on the tool bar to open the option window.
➃ Enter the Auth Key within eight to 16 digits, the click the OK button.
➂ Click Set Priv Key button on the tool bar to open the option window.
➃ Enter the Priv Key within eight to 16 digits, the click the OK button.
5. Click the OK button of the User Setting option window. The Information
dialog box appears.
7. The User Account Management window updates the information. Confirm the
registered user account information.
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu User Account / Security Setting to select User Account
Management. The User Account Management window appears.
4. The User Setting option window appears. Modify the registered value(s):
To modify the password, click Set Password button on the tool bar to open the Set
Password option window, enter the password within eight to 31 characters long,
and click the OK button of the Set Password option window.
To modify the Group Name, select an appropriate Group Name from the Group
Name drop-down list. See Table 2-2 User Group Profile for User Groups.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu User Account / Security Setting to select User Account
Management. The User Account Management window appears.
4. The User Setting option window appears. From User Name drop-down list,
select a user account to be removed, and click the OK button.
5. Confirmation dialog box appears. Confirm the user name to be removed, and
click the OK button.
7. The User Account Management window updates the information. Confirm that
the selected user account has been removed.
NOTE: In addition to the three default User Group Profiles, up to six User Group
Profiles can be registered.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu User Account / Security Setting to select User Group Profile
Configuration.
3. The User Group Profile Configuration window appears. Click Add Group tool
button on the tool bar.
OK button
SSHv2 Allow Select to use SSHv2 protocol for CLI accessing to the equipment.
Deny Not to use SSHv2 protocol for CLI accessing to the equipment.
HTTP Allow Select to use HTTP protocol for WebLCT accessing to the equipment.
HTTPS Allow Select to use HTTPS protocol for WebLCT accessing to the equipment.
Access Level Admin Specifies the user access level. See Table 2-3 User Access
Privilege Levels for each level’s description.
Config
Operator
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu User Account / Security Setting to select User Group Profile
Configuration. The User Group Profile Configuration window appears.
click
4. Modify parameters:
OK button
5. Click the OK button when completed. The Information dialog box appears.
NOTE: A User Group can be removed only when it has no assigned user account.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu User Account / Security Setting to select User Group Profile
Configuration. The User Group Profile Configuration window appears.
4. The Group Setting option window appears. Select a target Group Name to be
removed from the drop-down list, and click the OK button.
5. Confirmation dialog box appears. Confirm the selected Group Name, and click
the OK button to proceed.
3. SECURITY MANAGEMENT
3.1 Overview
iPASOLINK supports the following protocols and security management functions:
3.1.1 SNMPv1
Item Description
GetNextRequest Requests the subsequent instance value of specified instance value in the list.
3.1.2 SNMPv2c
SNMPv2c
RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management
Protocol (SNMP)
RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)
RFC 3428 Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP)
RFC 3584 Coexistence between Version 1, Version 2, and Version 3 of the Internet-
standard Network Management Framework
SMIv2
By default, iPASOLINK uses the port 161 to receive the SNMP request UDP. To use
other than the default port, change the settings via WebLCT.
Item Description
GetNextRequest Requests the subsequent instance value of specified instance value in the
list.
SNMPv2-Trap Informs the change of state and troubles. The format is different from
SNMP v1 trap.
3.1.3 SNMPv3
SNMPv3
RFC 3412 Message Processing and Dispatching for the Simple Network Management
Protocol (SNMP)
RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network
Management Protocol (SNMPv3)
RFC 3415 View-based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)
RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management
Protocol (SNMP)
RFC 3417 Trans port Mappings for the Simple Network Management Protocol (SNMP)
RFC 3418 Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP)
RFC 3584 Coexistence between Version 1, Version 2, and Version 3 of the Internet-
standard Network Management Framework
SMIv2
Item Description
GetNextRequest Requests the subsequent instance value of specified instance value in the list.
SNMPv2-Trap Informs the change of state and troubles. The format is different from SNMP
v1 trap.
Authentic method and authentic password are required when the security level is
authNoPriv or authPriv. Encryption algorithm and encrypted password are required
when the security level is authPriv.
User can also specify an SNMP Engine ID for each NE, which should be 16-byte
long and unique within the network.
3.1.4 NTP
NTP (Network Time Protocol) synchronizes the clocks of the server and associated
clients in a network, which is specified by the following RFCs:
RFC 2030 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OS
iPASOLINK can be set either as NTP Client or Server. Following shows the available
functions of NTP Client and Server:
When the multicast mode is selected on the NTP Client, the client will listen to the
broadcast of the time server and then adjusts the clock according to the first received
valid broadcast and ignores the broadcasts from remaining servers if exist.
If the NTP Client receives neither a response nor broadcasts, the synchronization
among the Server and Clients cannot be accomplished, which allows to use the
current time of the equipment.
When the multicast mode is selected, the Server will broadcast the current time
information of its own periodically.
3.1.5 FTP
FTP (File Transfer Protocol) transfers a file among NEs, and specified by the
following RFCs.
RFC 1123 The small FTP related section extends / clarifies RFC-959
RFC 2228 FTP security extensions (vsftpd implements the small subset needed to
support TLS / SSL connections)
Files and the directories accessed via FTP protocol are predetermined as well as the
file names and types, which will be downloaded.
The default setting of TCP Port 21 to listen and transfer a file on TCP port 20 can be
changed using WebLCT. When Passive Mode is selected, the port number is selected
by the equipment automatically.
If no command is issued by the Client for ninety seconds, the current TCP session
will be disconnected automatically.
3.1.6 SSHv2
SSHv2 (Secure Shell Version 2) is the protocol for transferring data between server
and client (CLI). The SSHv2 is based on the following RFC standards:
3.1.6.1 CLI
CLI operation via SSHv2 protocol is available
3.1.7 SFTP
SFTP (SSH File Transfer Protocol) securely transfers a file among NEs, using the
mechanism of SSHv2. iPASOLINK uses the SFTP Server to enable the following
functions:
If 90 seconds pass without any SFTP commands issued from the client, the session is
terminated by the SFTP Command Time Out.
If 90 seconds pass without any SFTP commands issued from the client, the session is
terminated by the SFTP Command Time Out.
Changing the SSH Connection Port # requires special attention since the Port # of
SSH Connection and that of SFTP connection are the same (cannot change either one
alone).
3.1.8 HTTP
HTTP (Hypertext Transfer Protocol) is the protocol for transferring data between
Web server and client (WebLCT).
3.1.8.1 WebLCT
WebLCT operation via HTTP protocol is available.
The default port number of HTTP Service is 80, which can be changed using
WebLCT.
3.1.9 HTTPS
HTTPS (Hypertext Transfer Protocol over SSL/TLS) is the protocol that the
encryption function by SSL is added to HTTP used by Web Servers and Clients (Web
Browser, etc.) for receiving/transmitting data.
Procedure 3-1
2. In the MENU frame on the left, expand Network Management Setting, and its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears:
Status Description
3.3 SNMP
Procedure 3-2
2. In the MENU frame on the left, expand Network Management, then its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
SNMP
UDP Port 1 to 65535 From 1 to 65535 are available for UDP Port No.
Procedure 3-3
2. In the MENU frame on the left, expand Network Management, then its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
4. The SNMP Community option window appears. Specify the appropriate value
to each parameter:
Community Name (text field) Specify an SNMP Community Name. Valid value: One to 31
characters long. A request with a different Community Name
will be rejected.
Access Level Admin Specify the user access level. Refer to Table 2-3 User Access
Privilege Levels for details.
Config
Operator
Access Control Enable Enables to restrict the access to the SNMP Manager(s).
Access Address xxx.xxx.xxx.xxx Specifies the valid IP address or network address of the SNMP
Manager(s).
5. Click the OK button when completed. The Information dialog box appears.
7. The Service Status Setting window updates the information. Confirm that the
newly added SNMP Community information is displayed.
Procedure 3-4
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
7. The Service Status Setting window updates the information. Confirm that the
selected SNMP Community information has been removed.
Procedure 3-5
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
3. Scroll down the main window till SNMP Trap option box appears.
4. Click SNMP Trap Entry No. of the SNMP Trap Entry field.
Community Name (text field) Enter Community Name of the Trap within 1 to 31 characters long.
This Community Name must be the same on both SNMP Server
and Agent.
Security Level NoAuthNoPriv Allows a user to log in without authentication and encryption.
SNMP Engine ID (text field) Assign a 16 byte value for SNMPv3 Local Engine ID, which must
be unique within the same managed network.
Auth Algorithm MD5 MD5 (Message-Digest algorithm 5) is one of the Hash Algorithm
for authentication and digital signature. In order to detect the falsifi-
cation of original data while transmitting, the Hash is generated
using the original data, which is compared at both ends of commu-
nication path.
SHA SHA (Secure Hash Algorithm) is one of the Hash Algorithm for
authentication and digital signature. In order to detect the falsifica-
tion of original data while transmitting, the 160-bit Hash is gener-
ated using the original data that is less than 2 64 bits which is
compared at both ends of communication paths.
Auth Key (read only) Valid value: Eight to 16 digits of MD5 or SHA1 public key. To enter
the Authentication Key, click Set Auth Key button on the tool bar.
Priv Algorithm DES DES (Data Encryption Standard) uses a 56-bit encryption key.
The block size is 64 bits.
Priv Key (read only) Valid value: Eight to 16 digits. To enter the Privacy Key, click Set
Priv Key button on the tool bar.
NOTE: Security Level and SNMP Engine ID are the only required parameters to set for
registering SNMPv3 (inform).
The Service Status Setting window updates the information. Confirm that the
newly added SNMP Trap Entry information is displayed.
Procedure 3-6
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
3. Click Delete SNMP Trap Entry tool button on the tool bar.
4. The Delete SNMP Trap Entry option window appears. From the drop-down list,
select the No. of SNMP Trap Entry to be removed, and click the OK button.
The Service Status Setting window updates the information. Confirm that the
selected SNMP Trap Entry information has been removed from the display.
3.6 NTP
Procedure 3-7
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
3. Scroll down the main window until the NTP option appears.
NTP
Disable
Unicast
Disabled
Unicast
Disabled
Multicast Auth Key Not Used To assign the Auth Key Index, select the index number
Index from the drop-down list. Otherwise, select Not Used.
(available Auth Key Index #)
Multicast Port Bridge01 to Bridege06 Select a port to output the Multicast Time information.
This parameter is enabled when NTP Server Mode
selects Multicast.
8. The Service Status Setting window updates the information. Confirm the
displayed NTP configuration.
Clicking the NTP Client Status link opens the NTP Client Status window:
Procedure 3-8
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
3. Click the No. of the target NTP Server listed in NTP Server Address.
Poll Time 64 to 131072 Set the interval (64 × 2n) for polling NTP
Server. [unit: second; default: 64 sec]
Auth Key Index Not Used Not to use the authentication key.
7. Confirm that the newly added NTP Server Address information is displayed.
Procedure 3-9
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
4. From No. drop-down list, select the number of target NTP Server Address,
and the click the OK button:
7. The Service Status Setting window updates the information. Confirm that the
selected NTP Server Address information has been removed.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
3. Scroll down the main window until NTP Auth Key Setting option appears.
Figure 3-41 Service Status Setting Window (NTP Auth Key Setting)
Auth Key Index (read only) Indicates the selected Auth Key Index number.
Auth Key (8 characters Clicking the Set Auth Key tool button opens the Auth Key
long or more) Password Setting option window. Specify the password, then
click the OK button:
8. The Service Status Setting window updates the information. Confirm the
displayed NTP Auth Key Setting information.
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
4. Clear NTP Auth Key option window appears. Select an index number of
Authentication Key to be removed.
6. When the process is completed, Information dialog box appears. Click the OK
button to proceed.
7. The Service Status Setting window updates the information. Confirm that the
Auth Key registration of selected index number is removed.
Figure 3-50 Service Status Setting Window (NTP Auth Key Setting)
3.9 FTP
Procedure 3-10
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
FTP
TCP Port 1 to 65535 Set TCP Port of FTP Server (for incoming 21
(Command) commands). [default: 21]
TCP Port 1 to 65535 Set TCP Port of FTP Server (for outgoing 20
(Data) commands) [default: 20]
3.10 SSHv2
Procedure 3-11
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
click
Enable
Always Enable
Disable
3.11 SFTP
Procedure 3-12
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
click
Disable
Disable
3.12 HTTP
Procedure 3-13
2. In the MENU frame on the left, expand Network Management Setting, then
its submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
HTTP
TCP Port 1 to 65535 Set TCP Port of HTTP Server. [default: 80]
3.13 HTTPS
Procedure 3-14
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select Service Status Setting. The
Service Status Setting window appears.
HTTPS
TCP Port 1 to 65535 Set TCP Port of HTTPS Server. [default: 443]
RADIUS Setting
Specifies the method of authentications at login.
Procedure 3-15
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select RADIUS Setting. The RADIUS
Setting window appears.
click
ADMIN
Deny Login
Procedure 3-16
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select RADIUS Setting. The RADIUS
Setting window appears.
click
RADIUS Server Setting option window for the selected Server appears.
6. The Set Secret Key option window appears. Enter the password as the
authentication key to RADIUS:
Port No. 1 to 65535 Enter the number of Port connecting for authentication.
Encryption User Communication with a shared key for the authentication by the external server.
Method (RADIUS)
CHAP MD5 with a shared key for the authentication by the external server (RADIUS).
Secret Key (read only) Indicates the authentication key to RADIUS that is specified by the Set Secret
Key option.
9. The RADIUS Setting window updates the information. Verify the displayed
information.
Procedure 3-17
2. In the MENU frame on the left, expand Network Management Setting, then its
submenu Security Management to select RADIUS Setting. The RADIUS
Setting window appears.
4. Clear RADIUS Server option window appears. Select the target RADIUS
Server number from the No. drop-down list, then click the OK button.
7. The RADIUS Setting window updates the formation. Verify the displayed
information.
4. EQUIPMENT SETUP
4.1 Overview
The Equipment Setup allows more detailed settings than those done by the Easy
Setup Wizard. Some parameters are included in the Easy Setup Wizard.
Equipment Configuration
Specifies NE Name.
Radio Configuration
Specifies Channel Spacing, Mode, RF Frequency for Radio.
AMBR Configuration
Specifies the mode type and range for AMBR.
Procedure 4-1
2. In the MENU frame on the left, expand Equipment Setup to select Equipment
Configuration.
3. The Equipment Configuration window appears. Click Setup tool button on the
tool bar.
OK button
NOTE: The display on the left shows the current setup, while that on the right is for a
user to edit the configuration.
5. When the process is completed, Information dialog box appears. Click the OK
button to proceed.
Procedure 4-2
2. In the MENU frame on the left, expand Equipment Setup to select Radio
Configuration.
Next button
5. When completed, click the Next button. Radio Configuration >> Step2 Setting
Confirmation Screen window appears.
6. Confirm that the fields of setup parameters change to blue, then click the OK button.
OK button
ii) In the MENU frame on the left, expand Equipment Setup to select AMBR
Configuration. The Equipment Setup — AMBR Configuration window
appears.
New Setting
Next button
AMBR Operation Non Operation Disables AMBR (Adaptive Modulation and Bandwidth
Radio) function.
AMR Mode Enables AMR (Adaptive Modulation Radio) function.
AMBR Mode Enables AMBR function.
4. Confirm that the fields of modified parameters change to blue, and then click the OK
button.
5. NETWORK MANAGEMENT
5.1 Overview
This menu allows a user to check and configure the network management parameters
of NEs to be managed by the network management system.
Port/VLAN Setting
This option determines the use of Ethernet Port, MODEM Port and Inband
Management VLAN, which enables or disables the connection to the NMS.
Bridge Setting
This option specifies the IP Address of NE Branch (Ethernet Port, MODEM Port,
Inband Management VLAN).
LLDP Setting
This option configures the Link Layer Discovery Protocol (LLDP).
Routing Setting
This option configures the static route information.
ARP Setting
This option configures the static ARP Information.
Procedure 5-1
2. In the MENU frame on the left, expand Network Management Setting to select
Port/VLAN Setting. The Port/VLAN Setting window appears.
Item DCN ——
Management Port
(NMS)
Port Usage Used Set to use or not to use the Port for NMS/NE1.
Not Used
The Ethernet Port Setting option box in the Port/VLAN Setting window
updates the information.
Procedure 5-2
2. In the MENU frame on the left, expand Network Management Setting to select
Port/VLAN Setting. The Port/VLAN Setting window appears.
ITEM MODEM ——
Port Usage Used Set to use or not to use the MODEM Port.
Not Used
Bandwidth Limitation Enable Set to limit or not to limit the M-Plane bandwidth.
Disable
Bandwidth 500 to 2000 Set the limitation of M-Plane bandwidth. [unit: kbps]
M-Plane Priority
Highest
The MODEM Port Setting option box in the Port/VLAN Setting window
updates the information.
The procedure to set Inband Management VLAN differs according to the use of
VLAN mode on the user interfaces.
Procedure 5-3
2. In the MENU frame on the left, expand Network Management Setting to select
Port/VLAN Setting. The Port/VLAN Setting window appears.
Not Used
VLAN Tag Type C-Tag Enables the use of C-Tag to the Inband Management VLAN.
The Inband Management VLAN Setting option box in the Port/VLAN Setting
window updates the information.
Procedure 5-4
2. In the MENU frame on the left, expand Network Management Setting to select
Port/VLAN Setting. The Port/VLAN Setting window appears.
4. Specify parameters:
Figure 5-16 Inband Management VLAN Setting Option Window
Not Used
VLAN Tag Type C-Tag Enables the use of C-Tag to the Inband Management VLAN.
The Inband Management VLAN Setting option box in the Port/VLAN Setting
window updates the information.
Clicking the VLAN Setting link moves to the 8.4 VLAN Setting window under
the category of ETH Function Setting in Provisioning.
2. In the MENU frame on the left, expand Network Management Setting to select
Bridge Setting. The Bridge Setting window appears.
Primary IP Address (check box) Tick a box to select a Bridge to assign the Primary IP Address.
NMS (check box) Tick a box to select a port to be accommodate in the Bridge.
Management VLAN Used Set to use or not to use the Management VLAN. Selecting
Usage Used enables the Management VLAN ID option below.
Not Used
STP Auto Configuration Auto Select an option to configure STP automatically or manually.
Manual
Not Used
Procedure 5-6
2. In the MENU frame on the left, expand Network Management Setting to select
LLDP Setting. The Bridge Setting window appears.
LLDP Usage Used Select to set Use or Not to Use the Link Layer Discovery Protocol.
Selecting Used enables the LLDP Mode option below.
Unused
Proprietary MAC Enables to run NEC proprietary LLDP MAC. This option is helpful
to locate an iPASOLINK where an L2SW discarding standard
LLDP frames is in between two iPASOLINKs’ management ports.
7. LLDP Setting window updates the information. Verify the displayed information.
Procedure 5-7
2. In the MENU frame on the left, expand Network Management Setting to select
Routing Setting. The Routing Setting window appears.
click
6. The Routing Setting window updates the information. Confirm that the newly
added route information is displayed.
Procedure 5-8
2. In the MENU frame on the left, expand Network Management Setting to select
Routing Setting. The Routing Setting window appears.
4. Enter the IP Address, Subnet Mask Address, and Gateway Address, then click the
OK button.
6. The Routing Setting window updates the information. Confirm that the newly
added route information is displayed.
Procedure 5-9
6. The Routing Setting window updates the information. Confirm the display for
the modified information.
Procedure 5-10
2. In the MENU frame on the left, expand Network Management Setting to select
Routing Setting. The Routing Setting window appears.
4. Enter the target address into the IP Address field, then click the OK button.
6. The Routing Setting option window updates the information. Confirm that the
selected network address has been removed.
Procedure 5-11
3. In the Input Filter List tabbed page, click the Add Entry tool button on the tool
bar.
NOTE: Filter entries are applied to whole DCN traffic except LCT port. The traffic via
LCT is controlled by LCT Port Setting that is in the General Setting (Detail) of
Network Management Configuration menu. For in-band interface, filter entries
are applied to the traffic that is toward the CPU where the traffic is sent to the
next hop.
Procedure 5-12
3. In the Input Filter List tabbed page, click the Entry No. of the target.
Entry Number(s)
Procedure 5-13
3. In the Input Filter List tabbed page, click the Delete Entry tool button on the tool
bar.
4. The Input Filter Entry (Delete) option window appears. Enter the target Entry
No., then click the OK button.
7. The IP Access Control Setting window updates the information. Confirm that
the selected filter information has been removed.
Procedure 5-14
3. In the Input Filter List tabbed page, click the Modify Rule tool button on the tool
bar.
4. The Input Filter Rule option window appears. Set the filter conditions:
Default Action Permit Forwards an IP packet that does not meet the configured
conditions.
7. The IP Access Control Setting window updates the information. Confirm that
the modified filter information is displayed
Procedure 5-15
3. In the Forwarding Filter List tabbed page, click the Add Entry tool button on the
tool bar.
Bridge01 to Bridge06
Bridge01 to Bridge06
Source Subnet x.x.x.x Specify the Subnet Mask of the Source IP Address for
Mask output packets.
Other
Source Port Any (check box) Check (leave a tick in) the check box to set no specific
port for the source.
Destination Port Any (check box) Check (leave a tick in) the check box to set no specific
port for the destination.
Procedure 5-16
2. In the MENU frame on the left, expand Equipment Setup, then expand Network
Management to select IP Access Control Setting. The IP Access Control
Setting window appears.
3. In the Forwarding Filter List tabbed page, click the Entry No. of the target:
Bridge01 to Bridge06
Bridge01 to Bridge06
Source Subnet Mask x.x.x.x Specify the Subnet Mask of the Source IP Address
for output packets.
Destination Subnet Mask x.x.x.x Specify the Subnet Mask of the Destination IP
Address for the output packets.
Other
Source Port Any (check box) Check (leave a tick in) the check box to set no
specific port for the source.
Destination Port Any (check box) Check (leave a tick in) the check box to set no
specific port for the destination.
Procedure 5-17
3. In the Forwarding Filter List tabbed page, click the Delete Entry tool button on
the tool bar.
4. Forwarding Filter Entry (Delete) option window appears. Enter the Entry No. of
the target, then click the OK button.
3. In the Forwarding Filter List tabbed page, click the Modify Rule tool button on
the tool bar.
4. Forwarding Filter Rule option window appears. Modify the filter condition:
Default Action Permit Forwards an IP packet that does not meet the
configured conditions.
7. The IP Access Control Setting window updates the information. Confirm the
display for the modified filter information.
Procedure 5-19
2. In the MENU frame on the left, expand Network Management to select ARP
Setting. The ARP Setting window appears.
3. Click the ARP Cache tab. The ARP Cache data appears.
Procedure 5-20
2. In the MENU frame on the left, expand Network Management to select ARP
Setting. The ARP Setting window appears.
3. In the Static ARP tabbed page, click the Add tool button on the tool bar.
4. ARP Setting (Add) option window appears. Enter the IP Address and MAC
Address to assign ARP configuration.
7. The ARP Setting window updates the information. Confirm the display for the
added ARP information.
Procedure 5-21
2. In the MENU frame on the left, expand Network Management to select ARP
Setting. The ARP Setting window appears.
3. In the Static ARP tabbed page, click the IP Address link of target Static ARP.
7. The ARP Setting window updates the information. Confirm the display for the
modified ARP information.
Procedure 5-22
2. In the MENU frame on the left, expand Network Management to select ARP
Setting. The ARP Setting window appears.
3. In the Static ARP tabbed page, click the Delete tool button.
4. Tick a box of target address to remove. Ticking a box on top selects all the
registered addresses.
Procedure 5-23
2. In the MENU frame on the left, expand Network Management to select DHCP
Server/Relay Setting.
DHCP number
4. Select DHCP Server from the Server/Relay drop-down list, and specify the
remaining options:
Bridge No. (IP (available No and Registered and available Bridge numbers (IP addresses) is/are
Address) IP addresses) listed to be selected.
DHCP Server Address —— This option is enabled when the choice is DHCP Relay.
IP Address Range 192.168.xxx.xxx Specify the starting address of the range of Class C Private IP
(Start) Address.
IP Address Range 192.168.yyy.yyy Specify the ending address of the range of Class C Private IP
(End) Address.
Exception (Start) ***.***.***.*** Specify the starting address of the exceptional IP Address
range.
Exception (End) ***.***.***.*** Specify the ending address of the exculpation IP Address
range,
Only Registered Allows only clients that have the registered MAC Addresses to
lease IP address.
6. DHCP Server Detail Setting option window appears. Specify the parameters:
7. When completed, click the OK button to close the DHCP Server Detail Setting
option window.
8. Click the OK button to close the DHCP Server/Relay Setting option window.
10. The DHCP Server/Relay Setting window updates the information. Confirm the
display for the modified filter information.
2. In the MENU frame on the left, expand Network Management to select DHCP
Server/Relay Setting.
DHCP number
4. Select DHCP Relay from the Server/Relay drop-down list, and specify the
remaining options:
Bridge No. (IP Address) (available No and Registered and available Bridge numbers (IP addresses)
IP addresses) is/are listed to be selected.
DHCP Server Address 192.168.xxx.xxx This option is enabled when the choice is DHCP Relay.
IP Address Range (Start) —— These options are disabled for DHCP Relay setting.
Exception (Start) ——
Exception (End) ——
Security ——
7. The DHCP Server/Relay Setting window updates the information. Confirm the
displayed information.
Procedure 5-25
2. The DHCP Server/Relay Setting window appears. Click Add MAC Address
tool button.
Procedure 5-26
2. The DHCP Server/Relay Setting window appears. Click the number of target
MAC Address to modify.
click
Procedure 5-27
2. The DHCP Server/Relay Setting window appears. Click the Delete MAC
Address tool button.
3. Tick a box of the target MAC Address to remove. Ticking a box on top selects all
the registered MAC Addresses.
7. The DHCP Server/Relay Setting window updates the information. Confirm the
display for the removed MAC Address(es).
Procedure 5-28
3. Tick a box of the target IP Address to release its assignment. Ticking a box on top
selects all the registered addresses.
7. The DHCP Server/Relay Setting window updates the information. Confirm the
display for the released IP Address.
1. In the MENU frame on the left, expand the Network Management Setting to
select Date/Time Setting. The Date/Time Setting window appears.
3. Date/Time Setting dialog box appears. Enter the appropriate values. See Table
5-22 also:
Data Description
Time Zone Set the Time Zone by adding/reducing hours to/from GMT.
Range: Hours [+15 to –15] and Minutes [00 to 59].
Display PC Time Tick this box to synchronize the clock of WebLCT and that of
local PC.
6. PROVISIONING
6.1 Overview
The setup procedures provided here are for furthering the system’s fundamental
configuration upon completion of the equipment setup. The setting items are listed as
follows:
Users can configure the port, radio switch, ATPC/MTPC power, etc., for MODEM:
TX Power Setting
Specifies the threshold of TX power and RX power in MTPC/ATPC configuration.
Procedure 7-1
2. In the MENU frame on the left, expand Provisioning, then its submenu MODEM
Function Setting to select MODEM Port Setting. The MODEM Port Setting
window appears.
click
Port Name (text field) Specify a Port Name. Valid value: 0 to 32 characters long.
7. The MODEM Port Setting window updates the information. Confirm the
displayed information.
Figure 7-4 MODEM Port Setting Window (1/2: on the left)
Figure 7-5 MODEM Port Setting Window (2/2: scroll to the right)
Procedure 7-2
2. In the MENU frame on the left, expand Provisioning, then its submenu MODEM
Function Setting to select TX Power Setting. The TX Power Setting window
appears.
click
4. TX Power Setting option window appears. Assign the appropriate value to each
parameter:
Figure 7-7 TX Power Setting Option Window
ATPC Range (MAX) Sets the maximum level of TX Power for ATPC
(Range of values depends Mode. [unit: dBm]
ATPC Range (MIN) on the modulating method.) Sets the minimum level of TX Power for ATPC
Mode. [unit: dBm]
RX Threshold –90 to –30 Set the input threshold level for when the
destination end is in ATPC Mode.
7. The TX Power Setting window updates the information. Verify the displayed
parameters.
Figure 7-9 TX Power Setting Window
Procedure 7-3
2. In the MENU frame on the left, expand Provisioning, then its submenu MODEM
Function Setting to select TX Power Setting. The TX Power Setting window
appears.
4. TX Power Setting option window appears. Assign the appropriate value to each
parameter:
Figure 7-11 TX Power Setting Option Window
MTPC TX Power (Range of values depends Set the TX Power level in MTPC Mode.
on the modulating
method.)
RX Threshold –90 to –30 Set the input threshold level for when the
destination end is in ATPC Mode.
Procedure 7-4
2. In the MENU frame on the left, expand Provisioning, then its submenu MODEM
Function Setting to select ALM Mode Setting. The ALM Mode Setting window
appears.
click
4. ALM Mode Setting option window appears. Assign the appropriate value to each
parameter:
Figure 7-15 ALM Mode Setting Option Window
ATPC Power Mode MAX Increases the TX Power to the maximum value.
NOTE: When the MTPC Mode is selected, ATPC Power Mode option is disabled.
7. The ALM Mode Setting window updates the information. Verify the displayed
parameters.
Figure 7-17 ALM Mode Setting Window
8.1 Overview
The ETH Function Setting provides the following options:
Equipment Setting
Equipment Setting provides the Bridge Setting, Max Frame Size Setting, and FDB
Aging Time (under the Other Setting option). Bridge function is also known as the
switching function, which enables the device in the multiple network segments can
communicate with each other. User can configure the FDB (forward database)
aging time, default VLAN ID and VLAN mode here.
VLAN Setting
VLAN (Virtual Local Area Network) enables multiple devices that are separated
physically can communicate as they are located in a same broadcast domain and
also protect the data from sending to other domain even they may connect
physically.
This function provides the abilities of creating, configuring and deleting the VLAN.
FDB Setting
iPASOLINK can learn the MAC address of the Ethernet frame dynamically and
save the port — MAC address mapping information into FDB (Forwarding
DataBase) based on 802.1d for each VLAN. User can also add the static mapping
information manually by this function.
Users can set the priority of the bridge; specify the role of the Ethernet port and
other parameters.
ERP Setting
High-speed protection switch and load balancing are realized by G.8032 Ethernet
Ring Protection. The maintenance can be done with minimum service affecting by
the administrative operation, such as manual/forced switching.
Load balancing works under the normal operation, and the higher priority traffic
can be secured by QoS management.
Fast Switch-over (<50ms) with 3.3ms period, hardware based ETH-CC.
Administrative operation:
– Forced switching
– Manual switching
– Multi-Ring
– Revertive / Non-revertive
The combination of logical ring set-up and load balancing achieves double capacity
transmission.
Link Aggregation
Link Aggregation achieves high capacity and resiliency transport with bundling
several radio links. The distribution algorithm distributes the packet according to:
L2 based: Source & Destination MAC, VLAN ID, Ethernet type, Physical Port
ID.
L3&L4 based: Source & Destination IP, Source & Destination TCP/UDP Port
Number
MPLS label based: Tunnel Label & VC Label
Also, ETH Ports support Both of LACP and Non-LACP operation with carrier class
1:1 LACP Protection.
QoS/Classification Setting
iPASOLINK supports QoS control function that provides different priority to
different applications, users, or data flow or to guarantee a certain level of
performance to a data flow. User can configure Class Classification, Ingress
Policer, Egress QoS and SP, TDM E1 QoS on MODEM to realize differential
service strategy.
Filter Settings
This function provides layer2 filtering parameter database based user-plane
discarding filter for solving security issue.
Parameters: multiple combination of MAC DA/SA, CoS, Ether Type, VLAN ID
with "any" or "wildcard" description
Filter profile based easy to use configuration
Mirroring Setting
Port Mirroring enables to monitor the traffic at another (mirrored) port without
traffic of source port interruption. Ingress, egress or both direction of the port to be
mirrored to the destination port can be specified.
VLAN port. Also, broadcast traffic is not transmitted. This function can protect the
user traffic from the attacks such as being executed from inside own network (same
subnet).
LLF Setting
LLF (Link Loss Forwarding) is the function that mandatory shuts down the port on
the destination NE if local NE detects unidirectional link problem.
Procedure 8-1
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Equipment Setting. The Equipment Setting
window appears.
Bridge Setting
VLAN Mode 802.1q Allows the port for different VLANs to communicate with
each other through a Layer-3 network device.
Default VID 1 to 4094 Enter the default VID of the equipment. [default: 1]
Default VLAN TPID (C-Tag) 0x Specifies the TPID (Tag Protocol Identifier) value of VLAN.
8100 to FFFF [default: 8100 (in mode 802.1q)]
Default VLAN TPID (S-Tag) Specifies the TPID (Tag Protocol Identifier) value of VLAN.
[default: 88a8 (in mode802.1ad)]
7. The Equipment Setting window updates the information. Verify the displayed
parameters.
Figure 8-4 Equipment Setting Window
Procedure 8-2
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Equipment Setting. The Equipment Setting
window appears.
3. Click the Max Frame Size Setting link on the option box.
Figure 8-5 Equipment Setting Window
NOTE: For the system using the 802.1ad mode, the S-Tag size plus 4
bytes should be added to the value to be set.
Figure 8-6 Max Frame Size Setting Option Window
10GbE/GbE MAX 64 to 9600 Specifies the maximum frame size for a 10GbE/
Frame Size GbE (Giga-bit Ethernet) port. [unit: byte]
FE MAX Frame Size 64 to 2000 Specifies the maximum frame size for an FE (Fast
Ethernet) port. [unit: byte]
7. The Equipment Setting window updates the information. Verify the displayed
parameters.
Figure 8-8 Bridge Setting Window
Procedure 8-3
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Equipment Setting. The Equipment Setting
window appears.
Other Setting
FDB Aging Time 5 to 163680 Specifies the aging time period when the Aging
function is enabled. [unit: second]
7. The Equipment Setting window updates the information. Verify the displayed
parameters.
Figure 8-12 Equipment Setting Window
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH Port Setting. The ETH Port Setting window
appears.
Port No.
Port Name (text field) Enter the Ethernet Port name. Valid value is zero to 32 characters long.
10GbE Usage Enable Specifies to use the port as 10 Gbit/s Ethernet interface.
Media Type Electrical Specifies the SFP Port to the Electrical use
Speed AUTO Sets Autonegotiation to select the speed at establishing each link.
Selecting AUTO disables Duplex and MDI and MDIX options below.
MDI and MDIX MDI Specifies the port media type. This option is disabled when the Speed
option selects AUTO.
MDIX
Disable NOTE: When the RJ45 port supporting the 1Gbit/s enables Sync ETH,
specifying this port to the Equipment Clock Reference forcibly assigns
and fixes this port to Slave. In this circumstance, if the opposing site
has the same settings as well, the Ethernet link will not be able to get
established.
Proprietary Enable to run NEC proprietary LLDP MAC. This option is helpful to
MAC locate an iPASOLINK where L2SW discarding standard LLDP frames is
in between two iPASOLINKs’ management ports.
ALS Usage Enable Sets to enable/disable the Automatic Laser Shutdown function. This
option is available for optical ports only.
Disable
ALS Interval 60 [s] Sets the delay time to release the port from the ALS state when the
alarm is cleared. [unit: second, default: 60 seconds]
180 [s[
300 [s]
7. The ETH Port Setting window updates the information. Verify the displayed
parameters.
Figure 8-16 ETH Port Setting Window (1/2: scroll to the left)
Figure 8-17 ETH Port Setting Window (2/2: scroll to the right)
Procedure 8-5
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select VLAN Setting. The VLAN Setting window appears.
3. In the VLAN List tabbed page, click the Add VLAN ID button on the tool bar.
Figure 8-18 VLAN Setting Window — VLAN List Tab (example: 802.1q)
4. Specify VLAN ID (for 802.1q) or S-VLAN ID (for 802.1ad) and VLAN Service
Name:
VLAN Service Name (text field) Enter VLAN Service Name. Valid value is 1 to 32
characters long.
NOTE: Multiple VLAN IDs can be entered using comma(s) and/or hyphen as
shown below:
VLAN ID:1,2,3,1000-4094
VLAN Service Name:(VLAN Name)
i) By the example above, VLAN IDs of 1, 2, 3, and 1000 to 4094, that is, 3098
IDs in total are registered. The order of entering IDs has no special rule, which
means that entering in the order of 1000-4094,1,3,2 is available as well.
ii) The VLAN ID entry field in the Filter option box indicates 1–20 by default,
which is only to limit the number of VLAN IDs to display in the beginning.
Entering a specific number or a range (e.g., 4000–4094 for VLAN IDs 4000 to
4094) retrieves VLAN IDs as entered. To display all, remove the entry to leave
the field blank, and click the Search button.
iii) When registering multiple VLAN IDs, -xxxx (xxxx: 0001 to 4094) is
automatically added to each VLAN Service Name. The maximum number of
characters for a VLAN Service Name is 27.
iv) If (an) automatically generated VLAN Service Name(s) within the multiple
VLAN IDs to be registered already exist(s), that/those VLAN ID(s) will be
registered without VLAN Service Name(s).
However, for a single entry, the entered VLAN Service Name will be registered
as it is though the name has already been registered.
If (a) VLAN ID(s) within the multiple VLAN IDs to be registered already
exist(s), that/those VLAN ID(s) is/are ignored (in other words, not to overwrite
the existing IDs), but the remaining VLAN IDs will be registered.
7. The VLAN Setting window updates the information. Verify the displayed
parameters.
Figure 8-21 VLAN Setting Window— VLAN List Tab (example: 802.1q)
Procedure 8-6
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select VLAN Setting. The VLAN Setting window appears.
3. In the VLAN List tabbed page, select the target object by clicking the VLAN
Service Name.
4. Enter the modified/new name into the VLAN Service Name text box, then click
the OK button.
Figure 8-23 Modify VLAN Service Name Option Window (example: 802.1q)
6. The VLAN Setting window updates the information. Verify the displayed
parameters.
Figure 8-25 VLAN Setting Window (example: 802.1q)
Procedure 8-7
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select VLAN Setting. The VLAN Setting window appears.
3. In the VLAN List tabbed page, click the Delete VLAN ID tool button on the tool
bar.
Figure 8-26 VLAN Setting Window — VLAN List Tab (example: 802.1q)
8. The VLAN Setting window updates the information. Verify the displayed
parameters.
Figure 8-31 VLAN Setting Window — VLAN List Tab (example: 802.1q)
Procedure 8-8
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select VLAN Setting. The VLAN Setting window appears.
3. In the VLAN Setting tabbed page, click a port number (listed under the Port) to
register VLAN settings.
Figure 8-32 VLAN Setting Window — VLAN Setting Tab
4. From the Port Type drop-down list, select a Port Type, Access, Tunnel or
Trunk, and specify the required parameters according to the selected port type:
Figure 8-33 VLAN Setting Option Window
Click a radio button of the target VLAN ID under the Untag Frame Assignment
(Access Port) for an access port.
The untagged frames pass through the ports selected here.
Incoming tagged frames, except for those with matching VLAN IDs, are
discarded at the ports selected here.
Tick the check box of the VLAN that is to configure the port type: Tunnel.
At the ports selected here, any frame types, either untagged or tagged with any
VLAN ID, are unconditionally tagged (Outer tag) with the VLAN ID, which is
checked in the list.
When the port is configured as Tunnel, all the check boxes in L2CP Transparency
windows are enabled.
Tick the check boxes of the VLANs that are to configure the port type: Trunk.
At the ports selected here, tagged frames with the VLAN IDs that are checked in
the list are allowed to pass through.
An untagged frame will be assigned with the VLAN ID of the selected VLAN in
Untag Frame Assignment column.
Other types of frames are discarded.
VLAN Assignment
VLAN Mode 802.1Q Indicates the VLAN Mode of the selected port.
Port Type Access Allows untagged frames and tagged frames with matching
VLAN IDs to pass through.
X VLAN Assignment (button) Clicking here removes ticks from all check boxes.
Clear
Enable (check box) Tick the check box to select a VLAN to assign the selected
port type configuration.
Untag Frame Assignment (radio button) Clicking the radio button assigns a VLAN ID to the untagged
(Access Port) frame.
Swap Enable (check box) Tick the check box to enable the swap mode on the selected
VLAN, which enables the External Used VLAN filed below.
External Used VLAN (see below) Specifies VLAN ID to swap to. See Figure 8-37 below.
➀ ➁
5. When completed, click the OK button of the VLAN Setting option window.
Figure 8-38 VLAN Setting Option Window (Trunk)
Procedure 8-9
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select VLAN Setting. The VLAN Setting window appears.
3. In the VLAN Setting tabbed page, click a port number (listed under the Port) to
register VLAN settings.
Figure 8-40 VLAN Setting Window — VLAN Setting Tab
4. Select a Port Type, and specify the required parameters according to the selected
port type:
Figure 8-41 VLAN Setting Option Window
Port Type
NOTE: When the target port is MODEM Port, S-Trunk is the only choice to
select.
VLAN Assignment
VLAN Mode 802.1ad Indicates the VLAN Mode of the selected port.
Port Type C-Access Allows untagged frames, C-Tagged frames and frames with
matching S-VLAN ID to pass through.
X VLAN Assignment Clear (button) Clicking here removes ticks from all check boxes.
C-Tag Frame Assignment (radio button) Clicking the radio button selects a VLAN ID to the untagged
(C-Access Port) frame.
Tick the check boxes of the VLANs that are to configure the port type: S-Trunk.
At the ports selected here,
– Tagged frames with S-VLAN ID that are checked in the list are forwarded.
– For untagged frames, S-VLAN of the selected VLAN in the Untag Frame
Assignment column will be assigned, then be forwarded.
– Other types of frames are discarded.
Table 8-8 VLAN Setting Parameters — S-Trunk
VLAN Assignment
VLAN Mode 802.1ad Indicates the VLAN Mode of the selected port.
Port Type S-Trunk Allows selected tagged frames and untagged frames to pass
through. For an untagged frame, the specified S-VLAN ID is
applied.
X VLAN Assignment Clear (button) Clicking here removes ticks from all check boxes.
Enable (check box) Tick the check box to select a VLAN to assign the selected
port type configuration.
C-Tag Frame Assignment (radio button) Clicking the radio button selects a VLAN ID to the untagged
(C-Access Port) frame.
Tick the check boxes of the VLANs that are to configure the port type: C-Bridge.
At the ports selected here, tagged frames with S-VLAN ID that are checked in the
list will be allowed to pass through.
The C-Tagged frames will be assigned with an S-VLAN ID of the selected
VLAN in C-tagFrame Assignment column.
The other frames will be discarded.
Figure 8-45 Modify C-VLAN ID Option Window
VLAN Assignment
VLAN Mode 802.1ad Indicates the VLAN Mode of the selected port.
Port Type C-Bridge Allows the selected tagged frames to pass through. Untagged
frames are discarded. For an outer tag with matching C-VLAN
ID, S-Tag corresponding to the C-Tag will be applied, then pass
through.
X VLAN Assignment Clear —— Removes (a) tick(s) in check box(es) below (cancels
selections).
Enable (check box) Tick the check box to select a VLAN to assign the selected port
type configuration.
C-Tag Frame Assignment (radio button) Clicking the radio button selects a VLAN ID to the untagged
(C-Access Port) frame.
1 to 40
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select FDB Setting. The FDB Setting window appears.
Equipment link
Learning MAX Size 1 to 32384 Specify the maximum size or the learning MAC
Address entries.
Learning Limit Mode Forwarding If the incoming frame that is from a new MAC
Address exceeds the maximum size of FDB, the
frame without learning this source MAC Address will
be forwarded.
Learning Limit Trap Enable Enables the equipment to send a trap if the Learning
MAC Address reaches the specified MAX size.
Procedure 8-11
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select FDB Setting. The FDB Setting window appears.
3. In the FDB Setting tabbed page, select Service tab, then click on the desired
VLAN ID number to configure.
Figure 8-53 FDB Setting Window — FDB Setting Tab
4. Specify the maximum size and mode for learning MAC Address:
Figure 8-54 FDB Setting Option Window
Learning MAX Size 0 to 32512 Specify the maximum size or the learning MAC
Address entries.
Learning Limit Mode Forwarding If the incoming frame that is from a new MAC
Address exceeds the maximum size of FDB, the
frame without learning this source MAC Address
will be forwarded.
Procedure 8-12
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select FDB Setting. The FDB Setting window appears.
3. In the FDB Setting tabbed page, select Port tab, then click on the desired Port
number to configure.
Port tab
Port Number
4. Specify the maximum size and mode for learning MAC Address:
Figure 8-58 FDB Setting Option Window
Learning MAX Size (Port) 0 to 32384 Specify the maximum size or the learning
MAC Address entries.
Procedure 8-13
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select FDB Setting. The FDB Setting window appears.
3. In the Static Entry tabbed page, click the Add tool button.
Figure 8-61 FDD Setting Window — Static Entry Tab
Enable (radio button) Tick the check box to assign the port to
the specified VLAN.
Procedure 8-14
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select FDB Setting. The FDB Setting window appears.
3. Select the Static Entry tab, then click the Entry No. of the target to modify.
Figure 8-65 FDB Setting Window — Static Entry Tab
Entry No.
Static Entry (Static Entry No. xxx) option window for the selected object
appears.
6. The FDB Setting window updates the information. Verify the displayed
information.
Figure 8-68 FDB Setting Window — Static Entry Tab
Procedure 8-15
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select FDB Setting. The FDB Setting window appears.
3. Select the Static Entry tab, then click the Delete tool button.
Figure 8-69 Static Entry Setting Window
Static Entry (Delete) option window for the selected object appears.
4. Tick the check box of the target object, then click the OK button. Ticking the
check box on the title bar selects all.
Figure 8-70 Static Entry Option Window
7. The FDB Setting window updates the information. Verify the displayed
information.
Figure 8-73 FDB Setting Window — Static Entry Tab
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MEG tabbed page, click the Add MEG tool button.
Figure 8-74 ETH OAM Setting Window — OAM MEG Tab
Maintenance Domain Name (text field) Maximum length in total of Maintenance Domain
Name and Short MA Name is 43 characters long.
Short MA Name (text field)
ETH-CC Period 3.3 [ms] Set the period of ETH-CC (Continuity Check)
Message.
10 [ms]
100 [ms]
1 [s]
10 [s]
60 [s]
Procedure 8-17
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MEG tabbed page, click the MEG Index number.
Figure 8-78 ETH OAM Setting Window — OAM MEG Tab
ETH-CC Period 3.3 [ms] Set the period of ETH-CC (Continuity Check)
Message.
10 [ms]
100 [ms]
1 [s]
10 [s]
60 [s]
Procedure 8-18
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select ETH OAM Setting. The ETH OAM Setting window appears.
3. Select the OAM MEG tab, then click the Delete MEG tool button.
Figure 8-82 ETH OAM Setting Window — OAM MEG Tab
4. Enter the MEG Index number of the target to be removed, then click the OK
button.
Figure 8-83 OAM MEG Setting (Delete) Option Window
7. The ETH OAM Setting window updates the information. Confirm that the target
OAM MEG has been removed.
Figure 8-86 ETH OAM Setting Window — OAM MEG Tab
Procedure 8-19
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MEP tabbed page, click the Add MEP button.
Figure 8-87 ETH OAM Setting Window — OAM MEP Tab
i) From the list in the MEG Configuration option box, click the Enable radio
button of the target to select.
ii) Click Add Peer MEP button in the Peer MEP Configuration option box. The
Peer MEP Add option window appears.
iv) Click the OK button. The Peer MEP Configuration option box updates the
entries.
5. Specify the remaining parameters in the OAM MEP Setting (Add) option
window:
Figure 8-90 OAM MEP Setting (Add) Option Window
MEP Configuration
MEG Configuration
Add Peer MEP (button) Click to open the Peer MEP Add option window.
Enable / Peer MEP ID (check box, list) This field lists the Peer MEP ID(s) registered by MEG
Configuration.
NOTE: Under the following conditions, the MEP Index cannot be modified:
MEP ID is modified to the value that is currently registered to Peer MEP ID.
Peer MEP ID is modified to the value that is currently registered to MEP ID.
When the modifications such as ones above are needed, delete the MEP
Index that contains the target ID, then newly register the MEP Index with the
desired values.
Procedure 8-20
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select ETH OAM Setting. The ETH OAM Setting window appears.
3. In the OAM MEP tabbed page, click the MEP Index number of the target to be
modified.
Figure 8-94 ETH OAM Setting Window — OAM MEP Tab
MEP Index
MEG Configuration
Enable (radio button) Click to associate an MEP with an MEG Configuration.
Procedure 8-21
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MEP tabbed page, click the Delete MEP button of the target to be
removed.
Figure 8-99 ETH OAM Setting Window — OAM MEP Tab
8. Confirm that the target OAM MEP Index has been removed.
Figure 8-103 ETH OAM Setting Window — OAM MEP Tab
Procedure 8-22
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MIP tabbed page, click the Add MIP tool button.
Figure 8-104 ETH OAM Setting Window — OAM MIP Tab
Add MIP tool button
OAM MIP tab
MIP Configuration
Enable (check box) Tick (click to leave a tick in) a check box to associate
an MEP with a VLAN.
6. ETH OAM Setting window updates the information. Verify the displayed
information.
Figure 8-107 ETH OAM Setting Window — OAM MIP Tab
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MIP tabbed page, click on the MIP Index number of the target.
Figure 8-108 ETH OAM Setting Window — OAM MIP Tab
MIP Configuration
7. The ETH OAM Setting window updates the information. Confirm that the
information of modified parameter(s) is displayed.
Procedure 8-24
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting. The ETH OAM Setting window
appears.
3. In the OAM MIP tabbed page, click on the Delete MIP tool button.
Figure 8-112 ETH OAM Setting Window — OAM MIP Tab
4. OAM MIP Setting (Delete) option window appears. Select the MIP Index number
of the target, then click the OK button.
Figure 8-113 OAM MIP Setting (Delete) Option Window
7. The ETH OAM Setting window updates the information. Confirm that the target
OAM MIP Index has been removed.
Figure 8-116 ETH OAM Setting Window — OAM MIP Tab
Procedure 8-25
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ETH OAM Setting.
3. The ETH OAM Setting window appears. In the Link OAM tabbed page, click the
port number of the target.
Figure 8-117 ETH OAM Setting Window — Link OAM Tab
Disable
Link OAM Mode Active Uses active Link OAM (indicates the discovery process).
Passive Uses passive Link OAM (does not initiates discovery process).
Disable
Disable
Unidirectional (read only) Indicates the DTE information of the destination equipment.
7. The ETH OAM Setting window updates the information. Verify the displayed
information.
Figure 8-120 ETH OAM Setting Window — Link OAM Tab
The setting windows for RSTP Mode and MSTP Mode differ. Select the appropriate
window for the mode using the following steps before starting the setting procedures.
Procedure 8-26
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select RSTP/MSTP Setting. The RSTP/MSTP Setting
window appears.
4. The STP Mode Setting option window appears. Select RSTP or MSTP from the
STP Mode drop-down list.
Figure 8-124 RSTP / MSTP Setting Window (example: for RSTP Mode)
Procedure 8-27
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select RSTP/MSTP Setting. The RSTP/MSTP Setting
window appears.
3. Check if the indicating mode is RSTP, then click Modify STP Port tool button.
If the indicated STP Mode is not RSTP, change the mode using procedure in
8.7.1 Select STP Mode for Setting Procedure.
Figure 8-125 RSTP / MSTP Setting Window (for RSTP Mode)
Indicates RSTP
Modify STP Port tool button
The STP Port Setting option window (for RSTP mode) appears.
Procedure 8-28
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select RSTP / MSTP Setting. The RSTP / MSTP Setting
window appears.
3. Check if the indicating mode is RSTP, then click Modify Detail STP Parameter
tool button.
If the indicated STP Mode is not RSTP, change the mode using procedure in
8.7.1 Select STP Mode for Setting Procedure.
Figure 8-129 RSTP / MSTP Setting Window (for RSTP Mode)
Bridge Priority (RSTP) 0 to 61440 Sets STP Priority of the bridge. [granularity: 4096]
STP Bridge MAX Age 6 to 40 Sets the period to store the BPDU Configuration.
Bridge acknowledges that a topology change has
occurred when the MAX Age passes putting the
BPDU aged out. [unit: second]
STP Bridge Hello Time 1 Sets the period for sending the BPDU Configuration
from Root Bridge. [unit: second]
2
STP Bridge Forward Delay 4 to 30 Sets the delay period to execute the change from the
Listening Port to Learning Port.
The value of this option should be greater than that
of the STP Bridge MAX Age.
[unit: second]
STP TX Hold Count 1 to 10 Sets the number of BPDUs that can be sent per
second.
7. The RSTP / MSTP Setting window updates the information. Verify the displayed
information:
Figure 8-132 RSTP Setting Window
Updated Information
NOTES:
1. MSTP and ERP do not operate simultaneously on the same system. (To
enable MSTP, ERP should be disabled.)
2. All VLANs belong to IST by default.
3. In the IEEE 802.1ad mode, MSTP operation is disabled on ports that are
assigned to C-Access or C-Bridge.
4. Default values for Timers and Hops are recommended to use. [Default
values for timers are compliant with the recommendations.]
5. VLANS that are assigned to instances and that are to ports are not
interdependent. VLANs should be assigned to all ports that are associated
with the MSTP equipment. If not, signals may not be transmitted through the
path though it is concluded by the protocol.
Procedure 8-29
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select RSTP/MSTP Setting. The RSTP/MSTP Setting
window appears.
3. Check if the indicating mode is MSTP, then click Modify STP Port tool button.
If the indicated STP Mode is not MSTP, change the mode using procedure in
8.7.1 Select STP Mode for Setting Procedure.
Figure 8-133 RSTP / MSTP Setting Window (for MSTP Mode)
Indicates MSTP
Modify STP Port button
4. The STP Port Setting option window appears. Assign the appropriate value to
each parameter:
Figure 8-134 MSTP Port Setting Option Window (Selecting IST Tab)
Figure 8-135 MSTP Port Setting Option Window (Selecting MSTI Tab)
(example: MSTI1)
Region Name (text field) Enter the Region Name. Valid value is 1 to 32
characters long.
BPDU Guard Timer Usage Use Select to use or not to use the BPDU. Selecting Use
enables BPDU Guard Timer option below.
Not Use
BPDU Guard Timer 10 to 1000000 Set BPDU Guard Timer. [unit: second]
IST tab
CIST Regional Root (read only) Indicates the CIST Regional Root Bridge Priority and
Bridge Priority / ID ID of the selected port.
Member VLAN (read only) Indicates the member VLAN IDs of the selected port.
Enable (check box) Tick the check box to select the target object.
STP Port Path Cost Auto Enables the function to automatically calculate the
path costs.
STP Port Path Cost 1 to 200000000 This filed is enabled by setting STP Port Path Cost
(Value) to Manual. Enter the cost manually.
Disable Removes the Edge Port setting from the target port.
Disable
Disable
MSTI Regional Root (read only) Indicates the Regional Root Bridge Priority and ID of
Bridge Priority / ID the selected port.
Member VLAN (read only) Indicates the member VLAN IDs of the selected port.
Enable (check box) Tick the check box to select the target object.
STP Port Path Cost Auto Enables the function to automatically calculate the
path costs.
STP Port Path Cost 1 to 200000000 This filed is enabled by setting STP Port Path Cost
(Value) to Manual. Enter the cost manually.
Procedure 8-30
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select RSTP/MSTP Setting. The RSTP/MSTP Setting
window appears.
3. Check if the indicating mode is MSTP, then click Modify Detail STP Parameter
button.
If the indicated STP Mode is not MSTP, change the mode using procedure in
8.7.1 Select STP Mode for Setting Procedure.
Figure 8-139 RSTP / MSTP Setting Window (for MSTP Mode)
STP Bridge MAX Age 6 to 40 Sets the period to store the BPDU Configuration.
Bridge acknowledges that a topology change has
occurred when the MAX Age passes putting the
BPDU aged out. [unit: second]
STP Bridge Hello Time 2 A period for sending the BPDU Configuration from
Root Bridge. The value is fixed to 2 seconds.
STP Bridge Forward Delay 4 to 30 Sets the delay period to execute the change from the
Listening Port to Learning Port.
The value of this option should be greater than a
half of the STP Bridge MAX Age values plus 1.
[unit: second]
STP TX Hold Count 1 to 10 Sets the number of BPDUs that can be sent per
second.
7. The RSTP / MSTP Setting window updates the information.Verify the displayed
information:
Figure 8-142 MSTP Setting Window
Updated Information
Procedure 8-31
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ERP Setting. The ERP Setting window appears.
4. ERP Mode Setting option window appears. Select Enable by clicking its radio
button, then click the OK button.
Figure 8-144 ERP Mode Setting Option Window
6. The ERP Setting window enables the Add ERP tool button. Click the Add ERP
tool button.
Figure 8-146 ERP Setting Window
indicates Enable
Add ERP tool button
Ring Name (text field) Enter the Ring name to apply. Valid value is 1 to 32 characters long.
Sub-Ring See Figure 8-148 Definition of Ring Types for reference to select a
valid ring-type.
Upper Ring 01 to 16 Specify an ID of Upper Ring to which the Sub-Ring connects. This
ID option is enabled when the Ring Type is Sub-Ring (Interconnection
Node). Assignment with Ring Port0 must be unique in the Sub-
Ring.
Ring Port0
Port (Available ports) An assignment to the same Sub-Ring using the same port can be
made one time only. (No multi-instance Sub-Ring.)
Port Name (read only)
Ring Port1 [This option is not editable for a Sub-Ring (Interconnection Node).]
RPL Owner Enable The RPL Owner node is an ETH Ring node adjacent to the RPL that
is responsible for blocking its end of the RPL under normal
Disable conditions. Only one RPL Owner node should exist in the Ring.
RPL Port Port0 Specify the RPL Port. This option is enabled when the RPL Owner
setting is enabled.
Port1
Revertive Revertive Revertive mode switches the Active port back to the original port
Mode when recovered. Non Revertive mode does not. This option is
Non Revertive enabled when the RPL Owner setting is enabled.
WTR Timer 1 [min] to 12 [min] A period to wait before restoring back when the system recovered
from the failure. This option is enabled when the RPL Owner setting
is enabled. [default: 5 min]
Guard Time 10 to 2000 [ms] The Guard Timer is active whenever an ETH Ring node receives an
indication that a local switching request has cleared. [unit:
millisecond; default: 500 ms]
Virtual Enable Enable or Disable the usage of Virtual Channels within the Sub-
Channel Ring. The value of this option must be the same at all nodes that
Disable configure the Sub-Ring or Sub-Ring (Interconnection Node).
Flush Event Enable This option is available for a Sub-Ring (Interconnection Node)
only. Enabling this option allows the Major Ring to carry out the FDB
Disable Flush if any event causing a ring switch occurs within the Sub-Ring.
This option must be enabled in the configuration by the specific
topologies as shown in <Arial_9XRi>Figure 8-149, however, it is
recommended to enable the option anyway unless any strong
reason to disable the option exists.
Major Ring
Ring ID = 1 Sub-Ring 1
Ring ID = 2
Sub-Ring 2
Ring ID = 3
Major Ring
Sub-Ring
Sub-Ring
Sub-Ring (Interconnection Node)
Upper Ring ID = 1
Sub-Ring (Interconnection Node)
Upper Ring ID = 1
i) A failure that causes a ring switch occurs within the Sub-Ring, where the Major
Ring has a blockage on the link shared with the Sub-Ring.
ii) A failure that causes a ring switch occurs within the Sub-Ring, where (a)
Node(s) exist(s) on the shared link.
8. When completed, click the Next button. Step 2 ERP VLAN Setting option
window appears.
Control VLAN ID 1 to 4094 A VLAN ID is used for R-APS transmission. Control VLAN ID
for each Ring must be unique. To use Virtual Channels within
the Sub-Ring, this Control VLAN ID must be registered for
the Traffic VLAN ID of the Upper Ring.
Control MAC Address 01 to FF Specify the last two digits of the address.
Traffic VLAN ID
Enable (check box) Tick the check box to enable the use of Traffic VLAN ID
10. Step 3 ERP LOC Detection MEP Index Setting option window appears. Assign
the appropriate values, then click the Next button.
Figure 8-151 Step 3 ERP LOC Detection MEP Index Setting Option Window
Table 8-28 Step 3 ERP LOC Detection MEP Index Setting Parameters
LOC Detection Enable Enables to detect failures for switching the Ring using
ETH-CC. To carry out the switching under 50 ms, this
setting is required with 3.3 ms ETH-CC setting.
Ring Port0
LOC Detection (radio button) Click (select) to enable the use of MEP Index.
MEP Index
Ring Port1
LOC Detection (radio button) Click (select) to enable the use of MEP Index. This
MEP Index option does not need to be set for Sub-Ring
(Interconnection Node).
11. Step 4 Setting Confirmation Screen window appears to show the specified
information. Verify the displayed information, then click the OK button.
Figure 8-152 Step 4 Setting Confirmation Screen
13. The ERP Setting window updates the information. Verify the displayed
information.
Figure 8-154 ERP Setting Window
Procedure 8-32
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ERP Setting. The ERP Setting window appears.
click Ring ID
Go to 8.8.1 Configure ERP, and proceed with the procedure from Step 7. to
Step 13.
Procedure 8-33
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select ERP Setting. The ERP Setting window appears.
4. From the Ring ID drop-down list, select the Ring ID to be deleted, then click the
OK button.
7. ERP Setting window updates the information. Verify the displayed information.
Figure 8-160 ERP Setting Window
NOTE: For the Radio System, LAG should be assigned by the Radio Traffic
Aggregation that is provided in the Radio Configuration. See the subsection
4.3 Radio Configuration for details.
Procedure 8-34
1. Launch and log in to WebLCT.
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select Link Aggregation Setting. The Link Aggregation Setting
window appears.
3. Click the Add LAG tool button.
Figure 8-161 Link Aggregation Setting Window
LAG Name (text field) Enter the Link Aggregation Group name to apply. Valid value is 0 to
32 characters long.
Mode LACP-Active Outputs frames along the configured links regardless of settings on
the other side. Selecting this value enables the TX Interval option.
[This option is for ETH
GRP only.] LACP-Passive Outputs or not to output depending on the settings on the other side;
outputs frames if the other side’s control value is Active.Selecting
this value enables the TX Interval option.
Static Static operation mode using no LACP. Selecting this value enables
Revertive option.
TX Interval Short Sets the an output interval of LACPDUs mode for one second.
[For LACP Mode only.]
Long Selects an output interval of LACPDUs mode for 30 seconds.
Revertive Revertive Switches the active port back to the original port when recovered.
[For Static Mode only.]
Non Revertive Does not switch the active port back even if recovered.
Distribution L2 Base Distribution is based on the Source & Destination MAC, VLAN ID,
Rule Ethernet Type and Physical Port ID.
L3 Base Distribution is based on the Source & Destination IP, Source &
Destination TCP/UDP Port number.
ETH GRP
Port Role Active Specify each port to Active/Standby. At least one port must be the
Active.
Standby
Parameters that can be modified are LAG Name and Distribution Rule only.
Procedure 8-35
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select Link Aggregation Setting. The Link Aggregation Setting
window appears.
4. Modify parameters:
Figure 8-166 Link Aggregation Setting Option Window
select LAG
i) Select the target LAG (Link Aggregation Group) from the LAG drop-down list.
Procedure 8-36
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select Link Aggregation Setting. The Link Aggregation Setting
window appears.
4. Tick a check box of the LAG to be removed, then click the OK button. Ticking
the check box on the title bar selects all.
Figure 8-170 Delete LAG Option Window
check box
Procedure 8-37
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting. The QoS/
Classification Setting window appears.
Classification Mode
Classification Mode Equipment Based QoS Mode QoS classification policies are determined by per-
equipment basis. One classification profile is
activated, and up to three profiles are stored on the
equipment configuration. In this mode, most outer
QoS field of the packet can be specified for the
classification policy.
Port Based QoS Mode QoS classification policies are determined by per-port
basis. In this mode, inner QoS field of the packet can
be specified for the classification policy.
VLAN ID Based QoS Mode QoS classification policies are determined by per-
VLAN ID basis. In this mode, VLAN ID field of the
packet can be specified for the classification policy.
7. The Classification Setting window updates the information. Verify that the
selected mode is indicated.
Procedure 8-38
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting. The QoS/
Classification Setting window appears.
3. Verify that the Classification Mode indicates Equipment Based QoS Mode.
To change the mode, proceed with 8.10.1 Classify Setting Tab.
Procedure 8-39
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting. The QoS/
Classification Setting window appears.
3. Verify that the Classification Mode indicates Equipment Based QoS Mode.
To change the mode, proceed with 8.10.1 Classify Setting Tab.
Mapping Mode Transparent Uses the CoS as the equipment internal priority.
Priority Overwrite (check box) Tick a box to enable the overwrite settings, which
allows the equipment internal priority following the
Classification to overwrite the QoS value of the output
frame.
Procedure 8-40
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting. The QoS/
Classification Setting window appears.
3. Verify that the Classification Mode indicates Port Based QoS Mode.
To change the mode, proceed with 8.10.1 Classify Setting Tab.
click
Mapping Mode Transparent Uses the CoS as the equipment internal priority.
Priority Overwrite (check box) Tick a box to enable the overwrite settings, which
allows the equipment internal priority following the
Classification to overwrite the QoS value of the output
frame.
Procedure 8-41
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting. The QoS/
Classification Setting window appears.
3. Verify that the Classification Mode indicates VLAN ID Based QoS Mode.
To change the mode, proceed with 8.10.1 Classify Setting Tab.
click
Mapping Mode Transparent Uses the CoS as the equipment internal priority.
Priority Overwrite (check box) Tick a box to enable the overwrite settings, which
allows the equipment internal priority following the
Classification to overwrite the QoS value of the output
frame.
Procedure 8-42
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
Item (part/LAG providing Select the item providing the target port.
available port)
Policer Profile No. 1 to 64 Select a number to assign the Policer Profile No.
VLAN Service Name (read only) Indicates the VLAN Service Names of the registered
VLAN.
Parameters of CoS, Policer Profile No., VLAN ID and Policer Profile Detail
Setting (EIR, CIR, EBS, CBS) can be modified.
Procedure 8-43
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
click
Item (read only) Indicates the port type assigned to the selected index.
Port (read only) Indicates the port number assigned to the selected index.
Policer Profile No. 1 to 64 Select a number to modify the Policer Profile No.
VLAN Service Name (read only) Indicates the VLAN Service Names of the registered VLAN.
Procedure 8-44
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
4. Enter the Policer Index number to delete, then click the OK button.
Figure 8-201 Delete Policer Index Option Window
6. When the process is completed, another Information dialog box appears. Click
the OK button to proceed.
Figure 8-203 Information Dialog Box
Procedure 8-45
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
5. Policer Profile Detail Setting option window appears. Edit the values, then click
the OK button.
Figure 8-207 Policer Profile Detail Setting Window
7. Policer Profile Setting option window updates the information. Click the Close
button.
Procedure 8-46
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
Number of Queue 4 Classes QoS Specifies that the number of Shaper Classes is four, which enables
eight Shaper Groups including the Remaining Groups.
8 Classes QoS Specifies that the number of Shaper Classes is eight, which enables
four Shaper Groups including the Remaining Group. [default]
7 7 3
6 6 3
5 5 2
4 4 2
3 3 1
2 2 1
1 1 0
0 0 0
Procedure 8-47
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
Profile Name (text field) Enter the profile name within 0 to 32 characters long
Drop Mode WTD Specifies Weighted Tail Drop (WTD) for the method to discard frames.
MAX Rate 1 to 10000 Enter the maximum bandwidths guaranteed rate. It is recommended to
set 3 or greater when changing the Queue Length from the default value.
[unit: Mbit/s; default: 1000]
Scheduling Mode SP Specifies Strict Priority (SP) for Scheduler setting, which gives prior frame
process to target Shaper than that of DWRR specified Shaper Group.
[default]
DWRR Specifies the Deficit Weighted Round Robin (DWRR) for Scheduler
setting. The frame process is carried out according to the weight rate
specified by the DWRR Weight value.
Selecting DWRR enables the DWRR Weight parameter on the right.
DWRR Weight 1 to 127 Set the priority for DWRR Scheduling Mode. This parameter is disabled
when the Scheduling Mode selects SP.
Queue Length 16 to 65536 Specifies the Egress Queue size for the Service Class. [unit: k byte;
default: 64]
The default value is recommended for GbE Port.
The value 128 or greater is recommended for 10GbE Port.
The available value range differs depending on the state:
Table 8-42
2 16 to 1024
16 16 to 16384
64 16 to 165536
When the external packet buffer is disabled, the value greater than 1024
cannot be specified.
WTD Yellow TH 10 to 100 Specifies the WTD (Weighted Tail Drop) threshold value to the color
yellow. [unit: %; default: 100]
WRED Yellow TH 10 to 100 Specifies the WRED (Weighted Random Early Detection) threshold value
to the color yellow. [unit: %; default: 70]
WRED Green TH 10 to 100 Specifies the WRED (Weighted Random Early Detection) threshold value
to the color green. [unit: %; default: 70]
Class3
Class2
Procedure 8-48
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
Egress Shaper Rate 1 to 10000 Specify the egress shaper rate. [unit: Mbit/s]
Procedure 8-49
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
Priority Queue (available profile #) Select a Priority Queue Profile number to modify.
Profile
Scheduling Mode SP Specifies Strict Priority (SP) for Scheduler setting, which gives
prior frame process to target Shaper than that of DWRR
specified Shaper Group. [default]
DWRR Weight 1 to 127 Set the priority for DWRR Scheduling Mode. This parameter is
disabled when the Scheduling Mode selects SP.
Procedure 8-50
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select QoS/Classification Setting.
click
5. The Edit Shaper Group Member option window appears. Specify the
parameters, then click the OK button.
Figure 8-229 Select Queue Profile Option Window
7. Click the Close button of the Shaper Group Member List option window. The
QoS/Classification Setting window returns.
Procedure 8-51
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Filter Setting. The Filter Setting window appears.
3. In the Filter List tabbed page, click the Add tool button:
Figure 8-232 Filter Setting Window — Filter List Tab
Filtering Rule
Destination MAC Any Selecting Any specifies no particular destination MAC address to filter.
Address
(text field) Unticking (removing a tick from) the Any check box enables the text field
below. Enter the Destination MAC Address (xx:xx:xx:xx:xx:xx) to filter.
0 to 7 Unticking (removing a tick from) the Any check box enables the text field
below. Enter the CoS value to filter.
1 to 4094 Unticking (removing a tick from) the Any check box enables the text field
below. Enter the VLAN ID to filter.
Ethernet Type Any Selecting Any specifies no particular Ethernet Type to filter.
0x0000 to Unticking (removing a tick from) the Any check box enables the text field
0xFFFF below. Enter the Destination MAC Address to filter.
Procedure 8-52
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Filter Setting. The Filter Setting window appears.
3. In the Filter List tabbed page, click the Entry Index number of the target filter:
Figure 8-236 Filter Setting Window — Filter List Tab
4. Modify the filter conditions. See Table 8-46 Add Filter Entry Parameters for
descriptions regarding the parameters.
Figure 8-237 Modify Filter Entry Option Window
The Filter Setting window (Filter List tab) updates the information.
Procedure 8-53
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Filter Setting. The Filter Setting window appears.
3. In the Filter List tabbed page, click the Delete tool button.
Figure 8-240 Filter Setting — Filter List Tab
4. Tick a check box of the target filter, then click the OK button. Ticking a box on
top selects all.
Figure 8-241 Delete Filter Entry Option Window
The Filter Setting window (Filter List tab) updates the information.
Procedure 8-54
2. In the MENU frame on the left, expand Provisioning, then its submenu expand
ETH Function Setting to select Filter Setting. The Filter Setting window
appears.
3. In the Profile List tabbed page, click the Add tool button:
Figure 8-245 Filter Setting Window — Profile List Tab
4. Tick (leave a tick in a) Select check box(es) of the profile(s) to add, and specify
Filter Profile Name and Filtering Mode.
Figure 8-246 Add Filter Profile Option Window
Permit
The Filter Setting window (Profile List tab) updates the information.
Procedure 8-55
2. In the MENU frame on the left, expand Provisioning, then its submenu expand
ETH Function Setting to select Filter Setting. The Filter Setting window
appears.
3. In the Profile List tabbed page, click the Profile Index number of the target
profile.
Figure 8-249 Filter Setting Window — Profile List Tab
click
Profile List tab
The Filter Setting window (Profile List tab) updates the information.
Procedure 8-56
2. In the MENU frame on the left, expand Provisioning, then expand ETH Function
Setting to select Filter Setting. The Filter Setting window appears.
3. Click the Profile List tab, then click the Delete tool button.
Figure 8-253 Filter Setting Window — Profile List Tab
4. Tick (click to leave a tick in) a check box of the target filter, then click the OK
button. Ticking a box on top selects all.
Figure 8-254 Delete Filter Entry Option Window
The Filter Setting window (Filter List tab) updates the information.
Procedure 8-57
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Filter Setting. The Filter Setting window appears.
3. In the Port Filter Setting List tabbed page, click the Port number of the target
port.
Figure 8-258 Filter Setting Window — Port Filter Setting List Tab
NOTE: In the Profile Index drop-down list, the listed items excluding
Not Used have been created at the procedure earlier in the
Filter Settings.
6. The Filter Setting window (Port Filter Setting List tab) updates the information.
Verify the displayed information.
Figure 8-261 Filter Setting Window — Profile List Tab
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select L2CP Transparent Setting. The L2CP Transparent
Setting window appears.
click
L2 Protocol Transparency
NOTE: The available frame size to operate the mirroring function is the maximum
frame size minus 16 bytes. See 8.2.2 Max Frame Size Setting for the
specified maximum frame size.
Procedure 8-59
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Mirroring Setting. The Mirroring Setting window
appears.
2. In the MENU frame on the left, expand Provisioning, then submenu ETH
Function Setting to select Port Isolate Setting. The Port Isolate Setting
window appears.
Port number
6. The Port Isolate Setting window updates the information. Verify the displayed
information.
Figure 8-273 Port Isolate Setting Window
Procedure 8-61
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select LLF Setting. The LLF Setting window appears.
4. Assign the appropriate value to each parameter, then click the OK button.
Figure 8-275 LLF Setting (Add) Option Window
—— (check box) Tick the check box to set the port as Edge Port.
OAM Send Port Setting OAM Send Port Setting option is added for the operation regarding IEEE802.3ah
(LINK OAM), which is currently not supported by iPASOLINK EX/A. All check
boxes must be unticked. If checked, LLF function does not operate properly, e.g.,
LLF will not shut down an Ethernet Port by detecting a Trunk Port failure.
Procedure 8-62
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select LLF Setting. The LLF Setting window appears.
3. Click an LLF GRP ID number of the target LLF. The LLF Setting (Modify)
option window appears.
Figure 8-279 LLF Setting Window
LLF GRP ID (read only) Indicates the selected LLF GRP ID number.
—— (check box) Tick the check box to set the port as Edge Port.
OAM Send Port Setting OAM Send Port Setting option is added for the operation regarding IEEE802.3ah
(LINK OAM), which is currently not supported by iPASOLINK EX/A. All check boxes
must be unchecked. If checked, LLF function does not operate properly, e.g., LLF
will not shut down an Ethernet Port by detecting a Trunk Port failure.
Procedure 8-63
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select LLF Setting. The LLF Setting window appears.
4. Select the LLF GRP ID number of the target to be removed, then click the OK
button:
Figure 8-284 LLF Setting (Modify) Option Window
7. The LLF Setting window updates the information. Verify the displayed
information.
Figure 8-287 LLF Setting Window
Following procedure sets the input rate for the broadcast storm control, and enables/
disable the Broadcast Storm Control per Ethernet port (including MODEM port).
Procedure 8-64
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Broadcast Storm Control Setting. The Broadcast
Storm Control Setting window appears.
4. Specify the input rate of the target frames for Broadcast Storm Control, then click
the OK button:
Figure 8-289 Broadcast Storm Control Rate Option Window
Broadcast Storm Control Rate 1 to 1000 Mbps Sets the input rate of the frame for the
Broadcast Storm Control.
[unit: Mbps]
6. The Broadcast Storm Control Setting window, updates the Broadcast Storm
Control Rate value.
Figure 8-291 Broadcast Storm Control Setting Window
Procedure 8-65
2. In the MENU frame on the left, expand Provisioning, then its submenu ETH
Function Setting to select Broadcast Storm Control Setting. The Broadcast
Storm Control Setting window appears.
Port number
4. Set Enable or Disable the Broadcast Storm Control by clicking its radio button,
then click the OK button:
Figure 8-293 Broadcast Storm Control Option Window
6. The Broadcast Storm Control Setting window updates the information. Verify
the displayed information.
Figure 8-295 Broadcast Storm Control Setting Window
The procedures here sets the Internal/External Clock, and the Timing Source
Selection. This operation menu provides the following:
Procedure 9-1
2. In the MENU frame on the left, expand Provisioning, then its submenu
Equipment Clock/Synchronization Setting to select Equipment Clock
Setting. The Equipment Clock Setting window appears.
4. Assign the appropriate value to each parameter, then click the OK button.
Figure 9-2 Equipment Clock Setting Option Window
Equipment CLK Sync The mode is for the network synchronization. When
Mode the radio synchronization is required, use this mode.
Clock Source QL Mode Sets to select the clock source by its quality level
Selective Mode (SSM). If the quality values are the same, priority
values are used to compare.
Port (available port #) Select a Port number of the target that can extract the
clock information.
Forced SSM Value QL-PRC Selects the Primary Reference Clock. Required when
QL-SSU-A the Line SSM Usage is set to Not Used:
QL-SSU-B
QL-SEC
Overwrite
Quality Level Quality
SSM Code
QL-SSU-A : 0100
QL-SSU-B : 1000
WTR Timer 0 [s] Sets the Wait to Restore time that is a period to wait
for enabling the timing source when recovered.
10 [s]
20 [s]
30 [s]
1 [min] to 15 [min]
(by a minute)
5. Warning dialog box appears. Click the OK button of the dialog box.
Figure 9-3 Warning Dialog Box
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 9-4 Information Dialog Box
(left end)
(right end)
Procedure 9-2
2. In the MENU frame on the left, expand Provisioning, then its submenu
Equipment Clock/Synchronization Setting to select PTP Mode Setting. The
PTP Mode Setting window appears.
PTP ModeNOTE Boundary Clock (BC) Enables the PTP Mode (Boundary Clock mode) settings..
PTP Profile IEEE 1588v2 Sets the PTP Profile to IEEE 1588v2.
Transport Mode PTP over Ethernet Transport Mode is fixed to PTP over Ethernet, which
operates in the mode according to the IEEE1588-2008
Annex F.
Multicast Type Non Forwardable Select the Multicast Destination Address to use, which
should be associated with that of the opposing site
Forwardable equipment.
NOTE: PTP function (TC mode and BC mode) is supported for 1Gbps or
10Gbps transmission.
6. Warning dialog box appears. Click the OK button of the dialog box to proceed.
Domain Number 0 to 127 Specify PTP Domain Number that should be associated with
that of the opposing site equipment.
(24 to 43)
When PTP Profile selects G.8275.1, the available
numbers are limited to 43 from 24 in compliance with
G.8275.1.
PTP Priority Priority 1 Value 0 to 255 Specifies the priority to PTP packet, which should be associ-
ated with that of opposing site equipment.
PTP Hold Off Time 1 to 86400 Specifies the value of Holdoff Timer, which is a period to
release the Holdover state when the PTP function recovers
from the locked state. [unit: second]
8. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 9-10 Information Dialog Box
9. The PTP Mode Setting window updates the PTP Parameters information.Verify
the displayed information.
Figure 9-11 PTP Mode Setting Window
NOTE: The maximum number of the Logical Interfaces to register differ depending
on the specified PTP Message Rate value. Contact NEC for the further
information.
Procedure 9-3
2. In the MENU frame on the left, expand Provisioning, then its submenu
Equipment Clock/Synchronization Setting to select PTP Mode Setting. The
PTP Mode Setting window appears.
3. Click the reference number in the PTP Logical Interface option box:
Figure 9-12 PTP Mode Setting Window
click
PTP Logical Interface Setting option window of the selected number appears.
Subnet Mask x.x.x.x Enter the Subnet Mask address. This option is voided
when Transport Mode selects PTP over Ethernet.
VLAN ID
Physical Port
Used (radio button) (available Port items.) Select a n ETH Port number to use.
Sync Message 1, 2, 4, 8, 16, 32, 64, 128 [unit: fps] When the PTP Profile selects
G.8275.1, the values for these
Delay_Req Message 1, 2, 4, 8, 16, 32, 64, 128 [unit: fps] options are fixed; not user-
changeable.
Announce Message 0.5, 1, 2, 4 [unit: fps]
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 9-14 Information Dialog Box
7. The PTP Mode Setting window updates the PTP Logical Interface information.
Verify the displayed information.
Figure 9-15 PTP Mode Setting Window
(left end)
(right end)
Procedure 9-4
2. In the MENU frame on the left, expand Provisioning, then its submenu
Equipment Clock/Synchronization Setting to select PTP Mode Setting. The
PTP Mode Setting window appears.
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 9-19 Information Dialog Box
7. The PTP Mode Setting window updates the PTP Logical Interface information.
Verify the displayed information.
Figure 9-20 PTP Mode Setting Window
Use the following procedures to configure the alarm severity, colors, and the relevant
settings of AIS events.
Correlation Settings
Users can modify the conditions to mask alarms (if displaying/clearing alarms on
LCT or LED).
2. In the MENU frame on the left, expand Provisioning, then its submenu Alarm/
AIS Setting to select Correlation Setting. The Correlation Setting window
appears.
7. The Correlation Setting window updates the information. Verify the displayed
information.
Figure 10-4 Correlation Setting Window
Procedure 10-2
2. In the MENU frame on the left, expand Provisioning, then expand Alarm/AIS
Setting to select Alarm Severity Setting. The Alarm Severity Setting window
appears.
3. Click the target object tab to select, and click the Modify tool button:
Figure 10-5 Alarm Severity Setting Window — RF Tab
4. Assign the severity level by selecting the level from the Alarm Status drop-down
list:
TX Power Major
RX Level Major
LOF Major
Frame ID Major
RDI Warning
UAE Warning
Module Major
Module - BB Major
Temperature Major
LTI Major
Unusable Major
RF OFS Minor
RF BBE Minor
RF ES Minor
RF SES Minor
RF SEP Minor
RF UAS Minor
RX Fragments Minor
TX Collisions Minor
See the Maintenance manual also for alarms that iPASOLINK can report, and their
meanings.
Procedure 10-3
2. In the MENU frame on the left, expand Provisioning, then expand Alarm/AIS
Setting to select BER Threshold Setting. The BER Threshold Setting window
appears.
1E-4
1E-5
1E-7
1E-8
1E-9
5. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 10-11 Information Dialog Box
6. The BER Threshold Setting window updates the information. Verify the
displayed information.
Figure 10-12 BER Threshold Setting Window
Use the following procedures to set the relevant configuration of PMON (except
Ethernet port) and RMON (Ethernet port), including threshold values.
Procedure 11-1
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select PMON Threshold Setting. The PMON Threshold
Setting window appears.
RF BBE 15min Occur 0 to 696074000 Specifies the threshold value to detect an RF BBE
condition for a 15-Minute period.
Range of the values depends on the modulation
method.
Recover 0 to 696074000 Specifies the threshold value to clear the RF BBE for a
15-minute period.
Range of the values depends on the modulation
method.
RF SES 15min Occur 0 to 900 Specifies the threshold value to detect an RF SES
condition for a 15-Minute period.
Recover 0 to 900 Specifies the threshold value to clear the RF SES for a
15-minute period.
RF SEP 15min Occur 0 to 900 Specifies the threshold value to detect an RF SEP
condition for a 15-Minute period.
Recover 0 to 900 Specifies the threshold value to clear the RF SEP for a
15-minute period.
RF UAS 15min Occur 0 to 900 Specifies the threshold value to detect an RF UAS
condition for a 15-Minute period.
Recover 0 to 900 Specifies the threshold value to clear the RF UAS for a
15-minute period.
RF OFS 15mintes Occur 0 to 900 Specifies the threshold value to detect an RF OFS
condition for a 15-Minute period.
Recover 0 to 900 Specifies the threshold value to clear the RF OFS for a
15-minute period.
5. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-3 Information Dialog Box
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select RMON Threshold Setting. The RMON Threshold
Setting window appears.
RX Drop Events 15 minutes 0 to 133929000 Specifies the threshold value to detect an RX Drop
Event condition for a 15-minute period.
RX CRC Alignment 15 minutes 0 to 133929000 Specifies the threshold value to detect an RX CRC
Errors Alignment Error for a 15-minute period.
5. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-7 Information Dialog Box
6. The RMON Threshold Setting window updates the information. Verify the
displayed information.
Figure 11-8 RMON Threshold Setting Window
Procedure 11-3
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select Other Threshold Setting. The Other Threshold
Setting window appears.
click
RX Level TCN Threshold –99 to –30 Specifies the threshold value to generate TCN
RX Level alarm. [unit: dBm]
5. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-11 Information Dialog Box
6. The PMON Threshold Setting window updates the information. Verify the
displayed information.
Figure 11-12 Other Threshold Setting Window
Procedure 11-4
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select Other Threshold Setting. The Other Threshold
Setting window appears.
click
SFP TX Power TCN –40 to 8.1 Specifies the threshold value to generate TCN
Threshold SFP TX Power alarm. [unit: dBm]
SFP RX Power TCN –40 to 8.1 Specifies the threshold value to generate TCN
Threshold SFP RX Power alarm. [unit: dBm]
5. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-15 Information Dialog Box
6. The PMON Threshold Setting window updates the information. Verify the
displayed information.
Figure 11-16 Other Threshold Setting Window
Procedure 11-5
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select VLAN Counter Setting. The VLAN Counter Setting
window appears.
3. In the VLAN Counter Select tabbed page, click Add Counter tool button:
Figure 11-17 VLAN Counter Setting Window — VLAN Counter Select Tab
VLAN Counter Setting — VLAN Counter Select (Add) option window appears.
Enable (radio button) Clicking the radio button enables to count the frames that
pass through the selected VLAN.
5. Information dialog box appears. Click OK button of the dialog box to proceed.
Figure 11-19 Information Dialog Box
Procedure 11-6
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select VLAN Counter Setting. The VLAN Counter Setting
window appears.
3. In the VLAN Counter Select tabbed page, click the reference number of the
target VLAN Counter:
Figure 11-21 VLAN Counter Setting Window — VLAN Counter Select Tab
click
Enable (radio button) Clicking the radio button enables to count the frames that
pass through the selected VLAN.
5. Information dialog box appears. Click OK button of the dialog box to proceed.
Figure 11-23 Information Dialog Box
Procedure 11-7
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select VLAN Counter Setting. The VLAN Counter Setting
window appears.
3. In the VLAN Counter Select tabbed page, click the Delete Counter tool button:
Figure 11-25 VLAN Counter Setting Window
4. The Delete VLAN Counter option window appears. Select a VLAN Counter No.
to be removed, then click the OK button:
Figure 11-26 Delete VLAN Counter Option Window
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-28 Information Dialog Box
7. The VLAN Counter Setting window updates the information. Verify the
displayed information.
Figure 11-29 VLAN Counter Setting Window
Procedure 11-8
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select VLAN Counter Setting. The VLAN Counter Setting
window appears.
3. In the Shaper Group Counter Select tabbed page, click Add Counter tool
button:
Figure 11-30 VLAN Counter Setting Window — Shaper Group Counter Select
Tab
VLAN Counter Setting — Shaper Group Counter Select (Add) option window
appears.
Enable (radio button) Clicking the radio button enables to count the frames that
pass through the selected VLAN.
5. Information dialog box appears. Click OK button of the dialog box to proceed.
Figure 11-32 Information Dialog Box
6. The VLAN Counter Setting window updates the information. Verify the
displayed information.
Figure 11-33 VLAN Counter Setting Window
Procedure 11-9
2. In the MENU frame on the left, expand Provisioning, then its submenu PMON/
RMON Setting to select VLAN Counter Setting. The VLAN Counter Setting
window appears.
3. In the Shaper Group Counter Select tabbed page, click the Delete Counter
tool button:
Figure 11-34 VLAN Counter Setting Window — Shaper Group Counter Select
Tab
4. The Delete Shaper Group Counter option window appears. Select a VLAN
Counter No. to be removed, then click the OK button:
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 11-37 Information Dialog Box
7. The VLAN Counter Setting window updates the information. Verify the
displayed information.
Figure 11-38 VLAN Counter Setting Window
iPASOLINK EX
Advanced
OPERATION &
MAINTENANCE
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
GGS-000548-01E
GGS-000548-01E
Printed in Japan
CONTENTS –i–
iPASOLINK EX Advanced
OPERATION & MAINTENANCE
CONTENTS
1. GENERAL 1-1
2. PRECAUTION 2-1
1. GENERAL
This chapter provides information regarding the routine and corrective maintenance
for the iPASOLINK EX Advanced (hereinafter iPASOLINK EX/A) of the 71-76 / 81-
86 GHz Packet Digital Radio System.
The information includes the following with their instructions and procedures:
2. PRECAUTION
The maintenance personnel should report his/her arrival and departure from a station
to the relevant station. Following precautions must be carefully observed during
maintenance.
Warning
1. Once the equipment is powered on, wait at least 5 minutes before turning its
power off. Repeatedly turning the power on and off within a short interval may
cause the equipment damaged.
2. Contact NEC before downloading programs using WebLCT. Equipment may not
function correctly if the download takes place improperly.
Caution
1. Before starting the maintenance work, the equipment should be set into the
Maintenance Mode through WebLCT.
2. Information on the maintenance and the control such as Mute, CW, LB, etc. is
released if the power is turned off.
4. After the equipment starts up, allow the equipment to warm up for at least 30
minutes.
3. ROUTINE MAINTENANCE
3.1 Overview
Following procedures are provided for the routine maintenance and checks, which
ensures the equipment to operate properly, and prevents the equipment and system
from being damaged.
Item Description
2. In the MENU frame on the left, expand Metering to select Current Metering.
click
4. Click the Normal Speed / High Speed radio button provided for the Refresh
Cycle option to specify the period of retrieving data:
Refresh Cycle Normal Speed (10sec) Refreshes measured value every 10 seconds.
NOTES:
1. If a parameter indicates the abnormal value, check the Current Status and the
performance monitor (Current/History PMON/RMON Report), and operate the
loopback test to isolate the alarmed sections from the normal sections.
2. RX LEVEL varies depending on the received RF signal level.
3. Power Supply voltage varies depending on the length of cable.
2. In the MENU frame on the left, expand PMON/RMON Report to select the
desired object. Example below selects MODEM PMON Report.
3.3.2.1 PM Items
Table 3-2 PM Items for MODEM
RF BBE Background Block Error The sum of the background block error. ITU-T G.826
RF ES Errored Second The cumulative time in which more than ITU-T G.826
one block error per second was detected.
RF SES Severely Errored Second The cumulative time in which the BER of a ITU-T G.826
one second period exceeded a set
percentage (30%).
RF SEP Severely Errored Period The cumulative time in which the BER of a ITU-T G.826
one second period exceeded 10E-3.
RF UAS Unavailable Second The cumulative time in which the unit ITU-T G.826
remained inoperative.
RF OFS Out of Frame Second The total number of seconds of Out of ITU-T G.826
Frame condition, which is generated in 15
minute-blocks. (OFS is applied to the Total
only).
1 2
Near-End
1 2
Near-End
RF RX Level (MAX)
1 1
RX Level (MIN)
1 2
Near-End
RF TX Power (MAX)
2 2
TX Power (MIN)
1 2
Near-End
RF TX Modulation 2 2
RX Modulation 1 1
3.3.3.1 PM Items
Table 3-3 PM Items for Ethernet Interface (Sheet 1 of 2)
TX Octs The total number of octets transmitted out of the interface, RFC1757
including framing characters.
RX Undersize Pkts A count of packets received that were less than 64 octets RFC1757
long and were otherwise well formed
RX Fragments A count of error frames of less than 64 octets in received data RFC1757
length.
RX 65 to 127Octs A count of received packets that were between 65 and 127 RFC1757
octets in length (including error packets)
RX128 to 255Octs A count of received packets that were between 128 and 255 RFC1757
octets in length (including error packets).
TX128 to 255Octs Number of transmitted packets that were between 128 and RFC1757
255 octets in length (including error packets).
RX 256 to 511Octs A count of received packets that were between 256 and 511 RFC1757
octets in length (including error packets).
TX 256 to 511Octs A count of transmitted packets that were between 256 and RFC1757
511 octets in length (including error packets).
RX 512 to 1023Octs A count of received packets that were between 512 and 1023 RFC1757
octets in length (including error packets).
TX 512 to 1023Octs A count of transmitted packets that were between 512 and RFC1757
1023 octets in length (including error packets).
RX 1024 to 1518Octs A count of received packets that were between 1023 and RFC1757
1518 octets in length (including error packets).
TX 1024 to 1518Octs A count of transmitted packets that were between 1024 and RFC1757
1518 octets in length (including error packets).
RX CRC Alignment Errors A count of reception alignments of FCS error frames. RFC1757
TX Oversize Pkts A count of frames transmitted that exceeds the maximum RFC1757
data length (1519 octets).
RX Jabbers A count of error frames bigger than 1519 octets in receive RFC1757
data length.
TX Multicast Pkts The total number of packets that higher-level protocols RFC1757
requested to be transmitted to a multicast address.
TX Broadcast Pkts The total number of packets that are higher-level protocols RFC1757
requested to be transmitted to a broadcast address.
RX MAC Limit A count of frames discarded due to exceeding MAC learning RFC1757
Limit.
(leftmost filed)
(rightmost filed)
3.3.4.1 PM Items
Table 3-4 PM Items for Ethernet Interface
VLAN RX QoS The total number of received VLAN frames that have been
Discard Frame discarded by the policing function per VLAN.
PORT 1 PORT 2
INGRESS EGRESS
(leftmost field)
(rightmost field)
3.3.5.1 PM Items
Table 3-5 PM Items for Ethernet Interface
TX Queue # Discard Frame The total number of QoS discarded frames that are leveled to ——
Queue # per VLAN.
[# denotes the queue level 0 to 7]
RF ES 0 to 900 0 to 86400
RF BBE Values depend on the radio setting (CS and Values depend on the radio settings (CS
Modulation). and Modulation).
RX LEV –99 to –30 Values depend on the radio –99 to –30 Values depend on the radio
setting (CS and Modulation). setting (CS and Modulation).
256QAM — — — — — —
4. CONTROL ITEMS
4.1 Overview
Following lists the control items available by the WebLCT, which is operational in
the Maintenance mode only. Note that operating these control items may cause a
traffic interruption if the system is in service.
4.5.3 CW Control
Current Metering
Export (NE –> Storage) Utility 4.9.1 Backup Database [Export (NE --> Storage) Utility]
Update (Storage –> NE) Utility 4.9.2 Update Database [Update (Storage --> NE) Utility]
Software License Setup See 2.1 Setup Software License in the Set Network and
System Provisioning manual.
Procedure 4-1
1. Launch the WebLCT. See the Operation manual for detailed steps.
Maintenance button
MAINT indication
3. Confirm that the MAINT indication on the upper side of WebLCT window
turns orange. This step ends the procedure.
Important:
To operate the Loopback Control, the system must be set into the Maintenance
mode.
This operation carries out the loopbacks for Layer 2 level. Incoming Layer 2 frames
are looped to the source direction with MAC Destination and Source Address Swap.
iPASOLINK EX/A provides two modes for L2 Loopback Control:
Loopback 1 Mode: Loops frames back at the near side of L2SW.
Loopback 2 Mode: Loops frames back at the far side of L2SW. The selected
ports must be operative. In this mode, the available frame size to operate L2
loopback is the maximum frame size minus 16 bytes. The maximum frame size is
specified by the 8.2.2 Max Frame Size Setting in the Set Network and
System Provisioning manual.
Procedure 4-2
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control, then its
submenu Loopback Control to select L2 Loopback Control.
The L2 Loopback Control window appears.
click
4. Select a port to execute the Loopback operation, then click the OK button.
Figure 4-3 L2 Loopback Control >> Step 1 Option Window
9. When the loopback test ends, click Maintenance tool button on the WebLCT
tool bar to exit from the Maintenance Mode.
10. Confirm that the MAINT color turns from orange to white.
To operate the Link OAM Loopback, the Link OAM Mode must be enabled and be
active. Check or enable the Link OAM function referring to the Set Network and
System Provisioning manual, 8.6.4 LINK OAM Setting.
LOOPBACK
Procedure 4-3
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control, then its
submenu Loopback Control to select Link OAM Loopback Control.
The Link OAM Loopback Control window appears.
click
4. Link OAM Loopback Control option window appears. Click On radio button,
then click the OK button.
6. The Link OAM Loopback Control window updates the information. Check that
the status of the selected port indicates On (Active).
7. Click the linked On (Active). The Link OAM Loopback Control option window
appears.
10. The Link OAM Loopback Control window updates the information. Confirm
that the selected port indicates Off now.
11. When completed, click the Maintenance tool button on the WebLCT tool bar
to exit from the Maintenance Mode.
12. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
Important:
While operating the Switching Control Operation, the system must be set into the
Maintenance mode.
RSTP/MSTP Control
ERP Control
This option clears the current STP information, and newly gets the protocol.
Procedure 4-4
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select RSTP/MSTP Control. The RSTP/MSTP
Control window appears.
6. Information dialog box appears. Click the OK button of the dialog box to
proceed.
7. The RSTP Control window updates the information. Verify the displayed
information:
Proceed with the following to carry out the ERP Manual/Forced Switching
Operation.
Procedure 4-5
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select ERP Control. The ERP Control
window appears.
Ring ID
Select the operation type from the Manual Control drop-down list.
Assign a blocking port.
Ring Port 1
8. Information dialog box appears. Click the OK button of the dialog box to
proceed.
Figure 4-23 Information Dialog Box
9. The ERP Control window updates the information. Verify the displayed
information.
(leftmost field)
(rightmost filed)
10. Exit the Maintenance Mode by clicking the Maintenance button on the
window.
11. Check that the MAINT indication turns from orange to white.
This step ends the procedure.
Procedure 4-6
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select ERP Control. The ERP Control
window appears.
5. Tick a check box of the target Ring, then click the OK button. Clicking the
check box on top selects all.
check boxes
6. The system starts checking the loop on the selected Ring. When completed,
Information dialog box appears.
10. Check that the MAINT indication turns from orange to white.
This option is used to put the original Active ETH Port back in service manually
when recovered from the failure.
Procedure 4-7
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select LAG Revert Control. The LAG Revert
Control window appears.
OK button
7. When completed, Information dialog box appears. Click the OK button to end
the procedure.
Procedure 4-8
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select Timing Source Switch Control. The
Timing Source Switch Control window appears.
4. If the target facility is locked (Lock Out indicates On), click the link. If it is not
locked (Lock Out indicates Off), go to 4.4.5.2 Switch Timing Sources
click
6. Warning dialog box appears. Click the OK button of the dialog box.
7. Information dialog box appears. Click the OK button of the dialog box to
proceed.
8. The Timing Source Switch Control window updates the information. Verify that
the Lock Out status of the target object indicates Off now.
ii) Check that the MAINT indication turns from orange to white. This step ends the
procedure.
Procedure 4-9
2. Click the Maintenance button on the top of the WebLCT window to switch the
state to the maintenance mode. See 4.2.1 Change to Maintenance Mode (for
WebLCT Operation) for operating steps.
3. In the MENU frame on the left, expand Maintenance Control, then its
submenu Protection Control to select Timing Source Switch Control. The
Timing Source Switch Control window appears.
click
7. Information dialog box appears. Click the OK button of the dialog box to
proceed.
8. The Timing Source Switch Control window updates the information. Verify that
the selected switch control is indicated for the target object.
10. Check that the MAINT indication turns from orange to white.
This step ends the procedure.
There are several maintenance control items that can be set during Maintenance
Mode.
The function of each control is as follows; These windows are not enabled if the
system is not in the Maintenance mode.
TX Mute Control
Despite the equipment configuration setting, forcing the TX Mute Control to ON will
stop the transmit power of the RF.
NOTES:
1. If Mute Control is set to off and Mute OFF does not work due to uncontrollable
factors, Mute status will remain on.
2. In case of 1+1 HS configuration, the Mute OFF control does not mute both lines.
Moreover, when forced Mute is controlled in No.1/No.2, Maintenance Mode cannot set
to OFF.
3. When TX Mute is remotely controlled, the setting of the automatic restoration time is
possible. Therefore, TX Mute Release Time should be set.
4. TX Mute Release Time is set together with TX Mute Control by the item that becomes
effective only when TX Mute Control is done from a higher-level device.
CW Control
CW (no transmission modulation) is controlled.
It is used when the frequency is measured with a frequency counter and when
spurious one is checked.
If you perform the CW control over a pre-made Mute ON, execute CW ON/OFF after
Mute OFF. At this time, when there is a factor that the CW control is not turned ON it
becomes CW control error.
In addition, in case of remote connection and operated Control CW, it may not be
able to recover again. CW Control will restore automatically according to the TX
Mute Release Time parameter.
The modulation method can be set according to the target device regardless of the
AMR Range setting.
When the TX Modulation Manual Control setting is returned from Manual to Auto,
the fixed modulation method is returned to QPSK.
Performing this function (Manual Control) sets the Maintenance Mode to ON.
However, in case of Auto setting and if Maintenance Mode is set to OFF, it will
cancel the "auto setting."
Procedure 4-10
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
MODEM Maintenance Control. The MODEM Maintenance Control window
appears.
click
Off
ATPC Manual Power –1.0 to 10.0 Set the transmit power value. [unit: dBm]
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
Procedure 4-11
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
MODEM Maintenance Control. The MODEM Maintenance Control window
appears.
click
Release Time No Limit No limitation to auto recovery. This option is not editable.
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Procedure 4-12
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
MODEM Maintenance Control. The MODEM Maintenance Control window
appears.
click
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
4.5.3 CW Control
Procedure 4-13
NOTE: This function is not operative by the remote session.
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
MODEM Maintenance Control. The MODEM Maintenance Control window
appears.
3. Select Off in the CW Control option.
click
Release Time No Limit Specifies no limitation to auto recovery. (Not recommended.) NOTE: These
values are not
90 [s] Provides 90 seconds before executing the auto-recovery. available for
the local
180 [s] Provides 180 seconds before executing the auto-recovery.
connection.
300 [s] Provides 300 seconds before executing the auto-recovery.
7. The MODEM Maintenance Control window updates the information. Verify the
displayed parameters.
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
Procedure 4-14
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
MODEM Maintenance Control. The MODEM Maintenance Control window
appears.
3. Select Off in the Carrier Search option.
click
4. Set the appropriate values according to your system, then click the Search
button.
Figure 4-64 Carrier Search Option Window
125 MHz
250 MHz
500 MHz
750 MHz
1000 MHz
2000 MHz
TX mute (Opposite Site) Off Disables the Mute Setting at the opposing site.
On (Release Time: 90 [s]) Enables the Mute Setting at the opposing site.
8. Click the Maintenance tool button on the WebLCT tool bar to exit from the
Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Procedure 4-15
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
Laser Shutdown Control. The Laser Shutdown Control window appears.
4. Laser Shutdown Control option window appears. Set On or Off by clicking its
radio button, then click the OK button.
Figure 4-68 Laser Shutdown Control Option Window
7. The Laser Shutdown Control window updates the information. Verify the
displayed parameters.
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Procedure 4-16
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control to select
Laser Shutdown Control. The Laser Shutdown Control window appears.
click
4. Laser Shutdown Control option window appears. Select a proper value for the
ALS Restart parameter, then click the OK button.
ALS Restart 2s Forcibly issues the optical output for 2 seconds where the
ALS (Automatic Laser Shutdown) is executed.
90s Forcibly issues the optical output for 90 seconds where the
ALS (Automatic Laser Shutdown) is executed.
7. The Laser Shutdown Control window updates the information. Verify the
displayed parameters.
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white. This step ends the procedure.
Reset control is available only when the system is set in the Maintenance mode. If it
is not in the Maintenance mode, executing the reset control will result in the error
response. Following are the objects that are available to be reset, and some
precautions:
Module Description
H/W Reset Control Equipment Reset Resets the equipment hardware. Main
Ethernet signal will be interrupted during
the resetting process.
F/W Reset Control CPU Reset (RF) Resets CPU (Radio Frequency block FW).
Main signal will be interrupted during the
resetting process.
Procedure 4-17
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control, then expand
H/W F/W Reset Control to select H/W Reset Control.
The H/W Reset Control window appears.
click
H/W Reset Control option window for the selected object appears.
8. When the system is ready, launch the WebLCT, then log in to the system.
9. Open the H/W Reset Control window, and verify the information.
Figure 4-82 H/W Reset Control Window
Procedure 4-18
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control, then expand
H/W_F/W Reset Control to select F/W Reset Control.
3. The F/W Reset Control window appears. Click BB link in the Item field.
Figure 4-83 F/W Reset Control Window
click
4. F/W Reset Control (BB) option window appears. Confirm the information
then click OK button.
Figure 4-84 F/W Reset Control (BB) Option Window
7. When the iPASOLINK EX/A restarts, launch the WebLCT and log in to the
iPASOLINK EX/A again.
9. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
10. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
Procedure 4-19
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Control, then expand
H/W_F/W Reset Control to select F/W Reset Control. The F/W Reset Control
window appears.
4. F/W Reset Control option window appears. Confirm the information then
click the OK button.
Figure 4-89 F/W Reset Control (RF) Option Window
7. When the RF is prepared, verify the information displayed in the F/W Reset
Control window.
Figure 4-92 F/W Reset Control Window
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
NOTES: When performing this Maintenance Test for ETH OAM DM/LM, proceed
with the followings (1 and 2) prior to starting the test:
1. Verify the connectivity in both directions between the equipment to carry out
the test and the target equipment to measure Delay/Loss using the ETH-CC
frames.
2. Execute the Loss Measurement and Delay Measurement with the
Transmission Count value 1 at the equipment to measure Delay/Loss
against the equipment to carry out the test.
Procedure 4-20
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Maintenance Test to select ETH
OAM LB/LT/DM/LM Control. The ETH OAM LB/LT/DM/LM Control window
appears.
3. Click the Modify Test Type tool button, or select the desired Test No.
4. Assign a proper value for each parameter, then click the OK button:
Clicking the Modify Detail Test Parameter tool button opens its detailed
option window. Provided detailed parameters are:
Transmission Count
Transmission Period
PDU Size
Priority.
click
MEP Index 1 to 128 When started from Modify tool button, enter the MEP
Index number. When started from selecting the item
number, this filed indicates the selected number.
Transmission Count 1 to 127 Specifies the transmission count for the test.
Transmission Period 1 to 10 Specifies the transmission period for the test. Must be
the positive integer. [unit: second]
PDU Size 64 to 9600 Specifies the PDU size for the test. This option is for
LB mode only.
Transmission Count 1 to 127 Specifies the transmission count for the test.
6. To save the History Information or Test Result in the local PC, operate the
following:
History Information
To save the History Information, click the Export CSV File tool button on the tool bar
of the ETH OAM LB/LT/DM/LM Control window.
Test Result
To save the test result, click the Export CSV File tool button on each result window.
Figure 4-97 Test Result Window (example: LB Result Window)
8. Save As option window appears. Select the proper folder of local PC and
then click the Save button.
Default file name:
History Information: HistoryInformationExport _YYYYMMDDhhmmss.csv
Test Result:
TestResultExport-LB(or LT)_YYYYMMDDhhmmss.csv
10. Confirm that the CSV file is saved in the selected folder.
Shipment
This function deletes the user defined Provisioning data, which restores the factory
default. This function also can delete all the stored data except the Software keys by
choice.
Procedure 4-21
1. In the MENU frame on the left, expand the Equipment Utility to select Export
(NE->Storage) Utility. The Export (NE->Storage) Utility window appears.
2. Select the Config Data and a storage tool (Local PC or USB Memory) by
clicking their radio buttons, then click the Execute tool button.
4. Select/Specify a directory to save the data, and click the Save button.
5. When data saving process is completed, following message to inform that the
download has completed. Click the View folder button.
This function uploads the iPASOLINK EX/A software, firmware (Program File
(*.bin)/FPGA), and equipment configuration files (*.cfg) from the local storage
(local PC or USB memory device NOTE) to NE.
NOTE: Connect USB memory device to the USB port at the iPASOLINK EX/A front
when the data is stored on the USB.
Following lists the operations that are available using Update (Storage -> NE)
Utility:
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility. The Update (Storage -> NE) Utility window appears.
3. Select the Program File radio button and then click the Execute tool button.
Program File
4. Program File option window to select an object appears. Select the BB from
drop-down list and then click Next button.
5. Program File window for selecting the destination appears. In the Import File
option box, select the media (Local PC or USB Memory) from which the file is
transferred, and then click the file icon button ( ) of the selected storage.
6. Select the firmware for BB (see below for the file name), and then click the
Open (or OK) button.
7. The Program File option window displays the selected directory. Click the OK
button.
11. Information dialog box appears. Click the OK button. The WebLCT will shut
down to restart automatically.
Figure 4-115 Information Box
12. When the iPASOLINK EX/A is restarted and prepared, log in to iPASOLINK
EX/A again.
14. The Equipment Inventory Information window appears. Verify the Current
version (the version of newly running program) of BB.
Figure 4-116 Equipment Inventory Information Window
Procedure 4-23 RF
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility. The Update (Storage -> NE) Utility window appears.
3. Select Program File by clicking its radio button, then click the Execute tool
button.
Program File
4. Select the object type (RF) from drop-down list, and then click the Next
button.
Figure 4-118 Program File Option Window
5. The Program File option window for selecting a source. In the Import File
option box, select the media (Local PC or USB Memory) from which the file is
transferred, and then click the file icon button ( ).
6. Select the RF firmware file (see below for the file name), and click the Open
(or OK) button.
7. The Program File option window displays the selected directory. Click the OK
button.
Figure 4-122 Program File Option Window
File downloading starts. During the downloading process, the progress bar
shows up.
11. The Equipment Inventory Information window appears. Verify the current
version (version of newly running program).
12. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
13. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
NOTE: Proceeding through the following restarts the equipment, which terminates
the WebLCT connection.
Important:
1. Ensure that the data file of FPGA from NEC has already been on the site.
2. Check the F/W versions using the Equipment Inventory Information window.
3. To operate the FPGA data download, the system must be set into the
Maintenance mode; Do not cancel the Maintenance mode while the download
process is in progress.
Procedure 4-24
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility. The Update (Storage -> NE) Utility window appears.
3. Select FPGA Data by clicking its radio button, and then click the Execute tool
button.
4. The FPGA Data option window for selecting a source appears. In the Import File
option box, select the media (Local PC or USB Memory) from which the file is
transferred, and then click the file icon button ( ).
5. An option window for selecting a file appears. Select the FPGA Data file (see
below for the file name), and click the Open (or OK) button.
6. The Program File option window displays the selected directory. Click the OK
button.
File downloading starts. During the downloading process, the progress bar
shows up.
8. When completed, the Update Complete! message dialog box appears. Click
the OK button to execute the auto-revert process.
Figure 4-132 Update Complete! Dialog Box
ii) Select the Inventory Equipment Inventory Information from the WebLCT
menu.
11. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
When the target object is MC-MV, the Maintenance mode has been already
released. This step ends the procedure.
12. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
NOTES:
1. Do not store the data to be downloaded and the existing Configuration Data
File in the same folder. Keep the data separate so that the data can be
compared.
2. To download the Configuration Data, the system must be set into the
Maintenance mode; Do not cancel the Maintenance mode while the
process is in progress.
Procedure 4-25
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility.
The Update (Storage -> NE) Utility window appears.
3. Select the Config Data by clicking its radio button, then click the Execute tool
button.
4. The Config Data window for selecting source appears. Select the data type
(Network Config, Equipment Config, User Config) from the Select Config
Data Type drop-down list.
5. In the Import File option box, select the media (Local PC or USB Memory)
from which the file is transferred, and then click the file icon button ( ). An
option window for selecting a file appears.
7. Click the Open (or OK) button.The Config Data option window displays the
selected directory.
File downloading starts. During the downloading process, the progress bar
shows up.
10. Information dialog box appears. Click OK button. The WebLCT will shut down
automatically.
Figure 4-141 Information Dialog Box
11. When the iPASOLINK EX/A restarts, log in to the iPASOLINK EX/A again.
12. Upload the Configuration Data File again, then acquire the Configuration
Data.
13. Check the Configuration Data by comparing the latest Configuration Data
with the previous data.
14. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
NOTE: Proceeding through the following restarts the equipment, which terminates
the WebLCT connection.
Important:
1. Ensure that the data file of Controller Data has already been on the site.
2. Check the F/W versions using the Equipment Inventory Information window.
3. To operate the Controller data, the system must be set into the Maintenance
mode; Do not cancel the Maintenance mode while the download process is in
progress.
Procedure 4-26
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility.
3. The Update (Storage -> NE) Utility window appears. Select Controller Data
by clicking its radio button, and then click the Execute tool button.
Figure 4-142 Update (Storage -> NE) Utility Window
4. The Controller Data option window for selecting a source appears. In the
Import File option box, select the media (Local PC or USB Memory) from
which the file is transferred, and then click the file icon button ( ).
Figure 4-143 Controller Data Option Window
Import File option box file icon
5. An option window for selecting a file appears. Select the Controller Data file
(see below for the file name), and click the Open (or OK) button.
File Name: BBCKT-EV-CONT_NWA-A01929-001_v**.cont
6. The Program File option window displays the selected directory. Click the OK
button.
File downloading starts. During the downloading process, the progress bar
shows up.
ii) Select the Inventory Equipment Inventory Information from the WebLCT
menu.
11. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
When the target object is MC-MV, the Maintenance mode has been already
released. This step ends the procedure.
12. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Important:
1. Ensure that the Parameter File to update MODEM that was from NEC has
already been on the site.
2. Check that the prepared Parameter File is for MODEM.
3. To operate the MODEM Parameter download, the system must be set into
the Maintenance mode; Do not cancel the Maintenance mode while the
download process is in progress.
Procedure 4-27
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility.
3. Select MODEM Parameter by clicking its radio button, and then click the
Execute tool button.
Figure 4-151 Update (Storage -> NE) Utility Window
4. The MODEM Parameter option window for selecting source appears. In the
Import File option box, select the media (Local PC or USB Memory) from
which the file is transferred, and then click the file icon button ( ).
5. An option window for selecting a file appears. Select the MODEM Parameter
file (see below for the file name), and then click the Open (or OK) button.
MODEM Parameter file name: MDxxxxxx.mdp
File downloading starts. During the downloading process, the progress bar
shows up.
10. From the WebLCT menu, select the Inventory Equipment Inventory
Information from the WebLCT menu. The Equipment Inventory Information
window appears.
11. Check the latest MODEM Parameter Data running by comparing the
confirmed parameter of specified MODEM.
(scroll)
12. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
13. Confirm that the MAINT indicator on the tool bar changes from orange to
white. This step ends the procedure.
Procedure 4-28
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select Update
(Storage -> NE) Utility. The Update (Storage -> NE) Utility window appears.
3. Select SSL Server Certificate by clicking its radio button, and then click the
Execute tool button.
Figure 4-159 Update (Storage -> NE) Utility Window
Execute tool button SSL Server Certificate
4. SSL Server Certificate option window appears. In the Import File option box,
select the media (Local PC or USB Memory) from which the file is transferred,
then click the folder tool button ( ) to locate the certificate file.
Figure 4-160 SSL Server Certificate Option Window
5. Select the file, and click the Open button. The valid file is compressed by the
zip application.
6. SSL Server Certificate option window indicates the selected file. Click the OK
button to proceed.
OK button
Important:
To operate the Program ROM Switching, the system must be set into the
Maintenance mode; Do not cancel the Maintenance mode while controlling
the switching operation.
Procedure 4-29
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select
Program ROM Switching. The Program ROM Switching window appears.
5. Warning message dialog box appears. Click the OK button to execute the
auto-revert process.
Figure 4-168 Warning Message Dialog Box
6. Information dialog box appears. Click the OK button. The WebLCT will shut
down automatically.
Figure 4-169 Information Box
7. When the iPASOLINK EX/A restarts, launch the WebLCT and log in to the
iPASOLINK EX/A again.
8. Select the Equipment Utility Program ROM Switching from the WebLCT
menu. The Program ROM Switching window appears.
9. Verify the current version of the BB Firmware:
Figure 4-170 Program ROM Switching Window
10. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
11. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Procedure 4-30
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select
Program ROM Switching.
The Program ROM Switching window appears.
click RF
5. Warning message dialog box appears. Click the OK button to execute the
auto-revert process.
Figure 4-173 Warning Box
7. The Program ROM Switching window updates the information. Verify the
current version of the RF Firmware.
Figure 4-175 Program ROM Switching Window
8. When confirmed, click the Maintenance tool button on the WebLCT tool bar to
exit from the Maintenance Mode.
9. Confirm that the MAINT indicator on the tool bar changes from orange to
white.
This step ends the procedure.
Procedure 4-31
1. In the MENU frame on the left, expand the Equipment Utility to select USB
Memory Utility. The USB Memory Utility window appears.
Event Logs, PMON Logs, and RMON Logs that are no longer necessary can be
removed from the system storage.
Procedure 4-32
1. In the MENU frame on the left, expand the Equipment Utility to select Log
Clear Function. The Log Clear Function window appears.
2. Select the log type (Event Log or PMON/RMON Log) by clicking its radio
button.
Figure 4-177 USB Memory Utility Window
Procedure 4-33
1. Click the Maintenance tool button on the tool bar of the WebLCT to put the
system into the Maintenance Mode. The MAINT indicator on the tool bar
changes to orange.
2. In the MENU frame on the left, expand the Equipment Utility to select
Shipment. The Shipment window appears.
(leftmost)
(rightmost)
4. Select the operation from the drop-down list, and click the OK button.
All Clear w/o Software Key Restore all the data except Software Key.
6. Another Information dialog box appears. Click the OK button. The WebLCT will
shut down automatically.
7. When the iPASOLINK EX/A restarts, launch the WebLCT and log in to the
iPASOLINK EX/A again.
4.10 Inventory
The Inventory retrieves and displays the information of hardware, firmware,
network, and software license keys for the equipment.
Procedure 4-34
1. In the MENU frame on the left, expand the Inventory to select Equipment
Inventory Information. The Equipment Inventory Information window
appears.
See Figure 4-185 Equipment Inventory Information for the overall view.
Figure 4-186
Parameter Description
Hardware Information Code No. (NEC Identification Number), Name, Serial No., Manufactured date
and Hardware Version.
Firmware Information Name, Current Version and Uncurrent Version.
FPGA Information Code No. (NEC Identification Number), Name and Version.
Controller Information Current Version
Parameter Information Current Version
SFP/SFP+ Information Port (registered port), Type (Ethernet category), Wavelength (nm) and Color.
See Figure 4-186 and Table 4-14 also.
MAC Address Information Port and MAC Address.
M-Plane/U-Plane
Frequency Information RF running status (Sub-Band usage) that includes: TX Start/Stop Frequency,
RX Start/Stop Frequency, Frequency Step, Shift Frequency, Higher or Lower
Band, and TX/RX Phase.
Parameter Description
SFP/SFP+ Detail Information Port (registered port), Vendor Name, Part No., Vendor Serial No., Revision,
and Manufactured Date.
3. The File Download option window appears. Click the Save button.
5. Confirm that the Inventory Information file is saved in the selected folder.
Following describes how to confirm and export the Software License Key of the
equipment.
Procedure 4-35
1. In the MENU frame on the left, expand the Inventory to select S/W License
Information. The S/W License Information window appears.
2. To save the Inventory Information, click the Export S/W License Information
tool button, if required.
5. Confirm that the License Information file is saved in the selected folder.
This step ends the procedure.
Characters to enter here are restricted. Following is the list of the available characters:
b3-b0 0 1 2 3 4 5 6 7
0 Space
0 — — 0 @ P ‘ p
(NOTE 2)
1 1 — — ! 1 A Q a q
10 2 — — " 2 B R b r
11 3 — — # 3 C S c s
100 4 — — $ 4 D T d t
101 5 — — % 5 E U e u
110 6 — — & 6 F V f v
111 7 — — ’ 7 G W g w
1000 8 — — ( 8 H X h x
1001 9 — — ) 9 I Y i y
1010 A — — * : J Z j z
1011 B — — + ; K [ k {
1100 C — — , < L \ l |
1101 D — — - = M ] m }
1110 E — — . > N ^ n ~
1111 F — — / ? O _ o —
NOTE: Spaces can be used between other available characters only, not at the
head or tail end.
Procedure 4-36
1. In the MENU frame on the left, expand the Inventory to select User
Description. The User Description window appears.
3. When completed, click the OK button. Clicking the OK button of each option
window displays the Information dialog box.
5. CORRECTIVE MAINTENANCE
ID [Indeterminate]:
ID indicates that the detected condition cannot be determined to classify the severity
level.
CR [Critical]:2
CR indicates for the Critical Alarm that causes a service affecting failure, which
requires an immediate corrective action. If this level of condition is reported, the
managed object could totally go out of service, restoring its capability.
MJ [Major]:
MJ indicates for the Major Alarm that causes a service affecting failure which
requires an urgent corrective action. If this level of condition is reported, the
capability of the managed object could be severely degraded, restoring its full
capability.
MN [Minor]:
MN indicates for the Minor Alarm that detects the existence of a non-service affecting
condition, which requires the corrective action in order to prevent a more serious
(such as a service affecting) failure. This condition does not degrade the capacity of
the managed object.
WR [Warning]:
WR indicates for the detection of a potential or impending service affecting fault,
before any significant effects have been felt. Action should be taken to further
diagnose (if necessary) and correct the problem in order to prevent a more serious
failure, such as a service affecting fault.
5.2.1 Overview
Current Status window of the WebLCT displays the equipment status, event logs and
alarms detected by the equipment. The window displays the view-only information;
not editable.
Procedure 5-1
1. Launch and log in to WebLCT. The initial (main) window of the WebLCT
displays the Current Status information.
1. Click the Current Status on top of the MENU frame in the left. The main
window in the right shows the Current Status information.
The Current Status window provides the information on the following objects
separated by tabs on which their items are indicated:
Active Alarm
Event Log
Equipment
ETH
The Active Alarm tabbed window displays the list of current alarms that have been
detected by the equipment.
Procedure 5-1
click
The displayed information can be saved onto the storage area of WebLCT PC. To
save the information, click the Save button located within the Active Alarm list. See
5.2.3 Save the Displayed Information for an example.
NOTE: To save the alarm list, refer to the procedure provided in 5.2.3 Save the
Displayed Information.
The Event Log tabbed window displays the information of all the detected alarms
and status, including any changes made to the Lines and the equipment configuration.
The displayed information can be saved onto the storage area of WebLCT PC. To
save the information, click the Save button located within the Event Log list.
Save button
NOTE: To save the log list, refer to the procedure provided in 5.2.3 Save the Displayed
Information.
The Equipment tabbed window displays the information of status detected from
MODEM and by equipment.
Mute Status Status Indicates that the control status of the RF TX Power Output is set
to MUTE.
ATPC Power Mode Status Indicates that a failure of APTC control signal (for 90 seconds), or
a status of MAX Power (for 90 seconds) has been detected.
RX Modulation Status Indicates that the modulation system at the receiving side has
been changed.
Total FDB Full Status Dynamic Entry in L2Switch has reached the maximum number.
CLK Status Changed Status Indicates that a change has been made to Reference Clock.
PTP Radio Clock Status Status Indicates the PTP Radio Clock Status.
Maintenance Status Indicates that the system is set int the Maintenance mode.
Equipment Start-up Status Status Indicates that the equipment is started up, or rebooted, and
reports the cause.
Trap Suppression Status Status indicates the state of Trap Suppression function.
ETH-Ring Multi RPL Owner Status Indicates that the system detects the multiple settings of ETH-
Detect Ring RPL.
ETH-Ring Port0 Status Status Indicates that the state changes of the Port configuring ETH-
Ring.
ETH-Ring Port0 Loop Detect Status Indicates that the system detects loops in ETH-Ring traffic.
ETH-Ring Port0 R-APS Status Indicates that the time out for receiving R-APS message occurs
Timeout at the node that configures ETH-Ring and has no locked-out
ports.
ETH-Ring Port1 Status Status Indicates that the state changes of the Port configuring ETH-
Ring.
ETH-Ring Port1 Loop Detect Status Indicates that the system detects loops in ETH-Ring traffic.
ETH-Ring Port1 R-APS Status Indicates that the time out for receiving R-APS message occurs
Timeout at the node that configures ETH-Ring and has no locked-out
ports.
PTP Sync. Time Status Indicates the time of synchronizing with Master when using the
PTP function.
PTP Clock Quality Level Status Indicates the level of PTP Clock Quality.
Grandmaster / Port ID Status Indicates the Port ID of the opposing equipment that is connected
with the Grandmaster (Top-level Master) to which the target
equipment belongs.
Grandmaster / Clock Priority 1 Status Indicates the Clock Priority 1 of Grandmaster (Top-level Master)
to which the target equipment belongs.
Grandmaster / Clock Priority 2 Status Indicates the Clock Priority 2 of Grandmaster (Top-level Master)
to which the target equipment belongs.
Grandmaster / Clock Quality Status Indicates the Clock Quality Class of Grandmaster (Top-level
Class Master) to which the target equipment belongs.
Grandmaster / Clock Quality Status Indicates the Clock Quality Accuracy of Grandmaster (Top-level
Accuracy Master) to which the target equipment belongs.
PTP Source Status Status Indicates the selected (active) Master, when multiple Master
exist, to which the PTP-BC function synchronizes.
Current Status Status Indicates the current state of PTP logical ports.
Quality Level Status Indicates the quality level of the timing clock.
The ETH tabbed window displays the information of alarms and status detected from
GbE ports. Clicking the ETH tab adds another row of related tabs.
Flow Control Status Indicates Flow Control status of the indicated port. ——
LACP Status Status Indicates the current status of Link Aggregation Control
——
Protocol.
LAG Port Loop Detect Status Received LACP Frame has its own MAC Source
——
Address for its Source Address.
LAG Port Status Status Indicates the current status of LAG member ports; ACT
——
(Active) or SBY (Standby).
LLF Message Timeout Status Loss of a conditional signaling in which the LLF control
signal should be received continuously from the ——
opposite radio equipment.
LLF OAM Received Status Indicates that the LINKDOWN control request caused
by Link Loss Forwarding is issued at Dot3ah and LLF
enabled LAN ports on the opposing site.
Remote Errored Frame Status Received a message that Errored Frame has been
——
detected at the opposing site.
Remote Errored Frame Status Received a message that Errored Frame Period has
——
Period been detected at the opposing site.
Remote Errored Frame Status Received a message that Errored Frame Seconds
——
Seconds Summary Summary has been detected at the opposing site.
Remote Errored Frame Status Received a message that Errored Symbol Period has
——
Symbol Period been detected at the opposing site.
SFP Port Type Status Indicates an SFP Port type, optic or electric. ——
Speed & Duplex Status Indicates a specified LAN Port Setting on speed rate
——
and duplex mode.
ALS Status ALS has suspended the optical output at the indicated
GbE/10GbE Port.
Procedure 5-2
3. Specify the directory to save the information, then click the Save button:
Figure 5-9 Save As Option Window
A file name is specified by default using the name of information type and saving
date, e.g., an example above shows that the Active Alarm data is saved on
October 8th, 2010 at 12:59:34 pm. [ActiveAlarm_YYYYMMDDhhmmss.csv,
where YYYY indicates the year using four digits, MM indicates the month, DD
indicates the day, hh indicates the hour, mm indicates the minute, and ss
indicates the second.]
5. Check the specified directory for the data if they are properly saved.
SYSTEM LED lights up if an alarm is generated, and goes off when the condition is
cleared. Following show the locations of LEDs:
SYSTEM LED
5.4.1 BB Section
START
Are
NO
Status of other lines
Normal?
YES
Check associated DTE at local site.
Is
NO
Status of equipment
Normal?
YES
Are Status of NO
Module and Module-BB
Normal?
Are Status
NO
of LinkDown, LOS A
Normal?
YES
Check associated DTE and cable Check DTE and cable connetions.
connections on opposing site.
5.4.2 RX Section
Is
NO
Status of RX Level
Normal?
YES
Does
RX Level measured NO
by RLS Monitor vary at
random interval?
YES
Are
frequency values at NO
local and opposing sites
appropriate?
YES
Check the fading and/or Check antenna system Adjust the frequency to
Check TX Section. the interfaces. and/or replace equipment the appropriate value.
5.4.3 TX Section
Is
NO
Status of TX Power
Normal?
YES
Does
Reset RF CPU. TX Power change by NO
ATPC manual conttrol?
YES
Are
NO
Status of RF conditions
Normal?
YES
5.5.1 Overview
Descriptions and procedures for the trouble clearing are organized in the alphabetic
order of indication messages. Alarm indication messages and their procedures to
clear the conditions are provided as the following:
ETH-Ring Multi RPL Owner Detect —— ETH (Indicating the condition only.)
ALS
ETH
This condition is not an alarm. The message indicates that the ALS function has
suspended optical outputs at indicated GbE/10GbE optical port.
MODEM
This condition indicates that the range of RX AMBR Modulation and that of TX
AMBR Modulation do not match.
Procedure 5-1
MODEM
This condition is not an alarm. The message indicates that a failure of APTC control
signal (for 90 seconds), or a status of MAX Power (for 90 seconds) has been
detected.
CLK Drift
Equipment
This condition indicates that the reference clock frequency of the incoming signal of
the indicates facility is out of synchronized range. The problem of this condition
pertains to the far-end NE.
Procedure 5-2
1. Check if any alarm(s) occur(s) to the equipment in the other site, and clear it/
them.
2. Retrieve the Current Status, and check if the CLK Drift alarm is cleared.
CLK FAIL
Equipment
This condition indicates that the reference clock source failure is detected from the
incoming signal of the indicated facility. The problem of this condition pertains to the
optical fiber cable or electrical cable of the far-end NE.
Procedure 5-3
1. Check if any other alarm(s) is/are detected from/for the indicated facility or from
the other site.
2. Clear the alarm(s).
3. Retrieve the Current Status, and check if the CLK Fail alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
Equipment
This condition is not an alarm.The message indicates that a change has been made to
Reference Clock:
Clock Class
Equipment
This condition is not an alarm. The message indicates the clock class that the
opposing node uses.
Clock ID
Equipment
This condition is not an alarm. The message indicates the Clock ID that the opposing
node uses.
MODEM
This condition indicates that the Header Compression settings at two opposed sites
do not match, or an improper FPGA version that does not support the Header
Compression is set to enable these functions.
Procedure 5-4
1. Launch WebLCT.
2. Check and match the settings of VLAN Mode, Header Compression Mode, and
Payload Compression of alarmed MODEM and its opposed MODEM:
Current Status
Equipment
This condition is not an alarm. The message indicates the current state of PTP logical
ports.
Early Warning
MODEM
This condition indicates that the system detects degradation of radio signals. (Early
Warning threshold detection.)
Procedure 5-5
1. Launch the WebLCT.
Equipment
This condition is not an alarm. The system reports that the equipment starts up, and
the cause to start up or reboot.
ETH LF
ETH
This condition indicates that the 10G Ethernet Port on the local NE fails.
Procedure 5-6
1. Check that the Ethernet Cable connected to the target port is appropriately
connected.
2. Retrieve the Current Status, and check if the ETH LF alarm is cleared.
4. Retrieve the Current Status, and check if the ETH LF alarm is cleared.
YES: This step ends the procedure.
NO: Check the associated port of the opposing site as well, then proceed to
the next step.
5. Retrieve the Current Status, and check if the ETH LF alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH LOS
ETH
This condition indicates that the LOS (Loss of Signal) is detected from the incoming
signal on the indicated Ethernet facility. The problem of this condition pertains to the
optical fiber or to the far-end NE.
Procedure 5-7
1. Verify that the cable connections are all appropriate.
2. Check if any alarm(s) is/are issued to the far-end NE. If any exist(s), clear it/
them.
3. Retrieve the Current Status, and check if the ETH LOS alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH RF
ETH
This condition indicates that the 10G Ethernet Port on the remote NE fails.
Procedure 5-8
1. Check that the Ethernet Cables connected to the target port and its associated port
of both local NE and its opposing NE are appropriately connected.
2. Retrieve the Current Status, and check if the ETH RF alarm is cleared.
4. Retrieve the Current Status, and check if the ETH RF alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH TF
ETH
This condition indicates that a failure is detected in an installed SFP module. The
problem of this condition is likely to be caused by a defective SFP module.
Procedure 5-9
1. Replace the target SFP module.
2. Retrieve the Current Status, and check if the ETH TF alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH-OAM LOC
BB
This condition indicates that the LOC (Loss of Connectivity) is detected from the
indicated MEP. The problem of this condition pertains to the far-end NE or the MEG/
MEP Configuration Error in the WebLCT.
Procedure 5-10
1. Check if any alarm occurs to the far-end NE that is associated with the indicated
MEP, and clear the condition(s).
2. Retrieve the Current Status, and check if the ETH-OAM LOC alarm is cleared.
5. Retrieve the Current Status, and check if the ETH-OAM LOC alarm is cleared.
YES: This step ends the procedure.
NO: Go to Step 6.
8. Retrieve the Current Status, and check if the ETH-OAM LOC alarm is cleared. If
the alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH-OAM Mismerge
BB
This condition indicates that the received ETH-CC Frame matches to the MEP level,
but with an incorrect maintenance ID. This may be caused by receiving the
unexpected ETH-CC Frames from the far-end NE, or by the MEG/MEP
Configuration error in WebLCT.
Procedure 5-11
1. Check the MEG/MEP Configuration, and correct it if it has any error.
2. Retrieve the Current Status, and check if the ETH-OAM Mismerge alarm is
cleared.
3. Is the ETH-OAM Mismerge alarm cleared?
YES: This step ends the procedure.
NO: Check the MEG/MEP Configuration of the far-end NE, and then go to
Step 4.
4. Is MEG/MEP Configuration on the far-end site appropriate?
YES: Contact NEC.
NO: Correct them, and go to Step 5.
5. Retrieve the Current Status, and check if the ETH-OAM Mismerge alarm is
cleared. If the alarm is not cleared, contact NEC for the further maintenance
support.
This step ends the procedure.
ETH-OAM RDI
BB
This condition indicates that the RDI (Remote Defect Indication) is detected from the
received ETH-CC Frame on the indicated MEP. The problem of this condition
pertains to alarms (failure) at the peer MEP.
Procedure 5-12
1. Check if any alarm is issued to an MEG of a peer MEP that is associated with the
indicated MEP.
2. Is there any alarm occurring?
YES: Contact NEC.
NO: Clear it/them, and go to Step 3.
3. Retrieve the Current Status, and check if the ETH-OAM RDI alarm is cleared. If
the alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
BB
This condition indicates that a mismatch of ETH-CC transmit period is detected from
the indicated MEG. The problem is a mismatch between the MEG Configuration of
local NE and that of far-end NE in WebLCT.
Procedure 5-13
1. Check the MEG Configuration, and correct it if it has any error.
2. Retrieve the Current Status, and check if the ETH-OAM Unexpected MEP
alarm is cleared.
3. Is the ETH-OAM Unexpected MEP alarm cleared?
YES: This step ends the procedure.
NO: Check the MEG Configuration of the far-end NE, and go to Step 4.
4. Retrieve the Current Status, and check if the ETH-OAM Unexpected MEP
alarm is cleared. If the alarm is not cleared, contact NEC for the further
maintenance support.
This step ends the procedure.
ETH-Ring Cause
ETH
This condition is not an alarm. The message indicates the ETH-Ring State changes.
ETH
This condition is not an alarm. The message indicates that system detects the multiple
settings of ETH-Ring RPL.
ETH
This condition is not an alarm. The message indicates that system detects loops in the
indicated ETH-Ring traffic.
ETH
This condition is not an alarm. The message indicates that the time out for receiving
R-APS message occurs at the node that configures ETH-Ring where there are no
locked-out ports.
ETH
This condition is not an alarm. The message indicates the state changes of the port
that configures the ETH-Ring.
ETH
This condition is not an alarm. The message indicates that system detects loops in the
indicated ETH-Ring traffic.
ETH
This condition is not an alarm. The message indicates that the time out for receiving
R-APS message occurs at the node that configures ETH-Ring where there are no
locked-out ports.
ETH
This condition is not an alarm. The message indicates the state changes of the port
that configures the ETH-Ring.
ETH-Ring Status
ETH
This condition is not an alarm. The message indicates the state of the ETH-Ring.
FDB Full
BB
This condition is not an alarm. The message indicates that the FDB of the specified
VLAN is full.
Flow Control
ETH
This condition is not an alarm. The message indicates the status of indicates Ethernet
port regarding its flow control.
Frame ID
MODEM
This condition indicates that the Frame ID (route differentiation ID) and its expected
value do not match.
Procedure 5-14
1. Check if the Frame ID value specified at local and that specified at the opposing
site are identical.
2. If the specified Frame ID values are the same, replace the equipment.
Grandmaster / Clock ID
Equipment
This condition is not an alarm. The message indicates the PTP Clock of the
equipment.
Equipment
This condition is not an alarm. The message indicates the Clock Priority 1 of
Grandmaster (Top-level Master) to which the target equipment belongs.
Equipment
This condition is not an alarm. The message indicates the Clock Priority 2 of
Grandmaster (Top-level Master) to which the target equipment belongs.
Equipment
This condition is not an alarm. The message indicates the Clock Quality Accuracy of
Grandmaster (Top-level Master) to which the target equipment belongs.
Equipment
This condition is not an alarm. The message indicates the Clock Quality Class of
Grandmaster (Top-level Master) to which the target equipment belongs.
Grandmaster / Port ID
Equipment
This condition is not an alarm. The message indicates the Port ID of the opposing
equipment that is connected with the Grandmaster (Top-level Master) to which the
target equipment belongs.
High BER
MODEM
This condition indicates that the radio signals are significantly degraded, where the
threshold is IE-4 (default value).
Procedure 5-15
1. Launch the WebLCT.
LACP Status
ETH
This condition is not an alarm. The message indicates the current status of LACP
(Link Aggregation Control Protocol).
LAG LINK
BB
This condition indicates that all the member ports of Ethernet LAG (Link
Aggregation Group) have failed. The problem of this condition pertains to the optical
fiber cables or to the far-end NE.
Procedure 5-16
1. Check if any alarm(s) occur(s) in the opposing site, and clear it/them if exist(s).
2. Retrieve the Current Status, and check if the LAG LINK alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
BB
This condition is not an alarm. The message indicates the settings of Link
Aggregation Group - Link Loss Forwarding.
ETH
This condition is not an alarm. The message indicates that the received LACP Frame
has its own MAC Source Address for its Source Address.
ETH
This condition is not an alarm. The message indicates the Active/Standby status of
LAG member ports.
LAN Link
ETH
This condition indicates that the Link-Down is detected from the indicated Ethernet
port. The problem of this condition pertains to the optical fiber cables or to the far-
end NE.
Procedure 5-17
1. Check the connections of optical fiber cables.
Connect optical fiber cables properly.
Replace optical fiber cables if required.
2. Retrieve the Current Status, and check if the LAN LINK alarm is cleared.
4. Check if any alarm(s) occur(s) to the far-end NE, and clear it/them if any exist(s).
5. Retrieve the Current Status, and check if the LAN LINK alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
License Mismatch
BB
Procedure 5-18
1. Launch WebLCT to display the Shipment window.
◆ WebLCT Menu Path:
Equipment Utility ➜ Shipment
2. Remove the provisioning data. Refer to 4.9.6 Restore Factory Default Settings.
ETH
This condition indicates that the system detects Link OAM Keepalive Protocol
Timeout. The problem of this condition pertains to Ethernet Link, configuration of
Link OAM, hardware error, etc., of the far-end NE.
Procedure 5-19
1. Check if any error occurs to Link OAM Configuration, or to the equipment at the
opposing site, and clear them.
2. Retrieve the Current Status, and check if the Link OAM Down alarm is cleared.
If the alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
LLF
ETH
This condition is not an alarm. The message indicates the status of Link Loss
Forwarding.
ETH
This condition is not an alarm. The message indicates that the conditional signals for
LLF control have repeatedly been received from the opposing radio equipment.
ETH
This condition is not an alarm. The message indicates that the LINKDOWN Control
request caused by the Link Loss Forwarding is issued at Dot3ah and LLF enabled
LAN ports on the opposing site.
LOF
MODEM
This message indicates that the Loss of Frame is detected at the Radio side.
Procedure 5-20
1. Launch the WebLCT, and display the Current Metering to check RX Level:
If the value is appropriate, go to Step 4.
If the value is inappropriate, proceed with the flowchart: 5.4 Trouble
Shooting Flow.
2. Retrieve the Current Status, and check if the LOF alarm is cleared.
5. Retrieve the Current Status, and check if the LOF alarm is cleared. If the alarm
is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
Loss Announce
Equipment
This condition indicates that the PTP Announce Packets from the Master are not
received.
Procedure 5-21
1. Check the followings:
Cable connections to/from the Master are appropriate.
Ethernet Port Settings if it is enabled or disabled.
Settings of PTP LIF (selections of physical port, VLAN, Message Rate).
VLAN Settings (VID value)
Settings of PTP-BC function (Profile, Transport Mode, Multicast Type,
and/or Domain No.) are identical with those of the Master.
2. Retrieve the Current Status, and check if the Loss Announce alarm is cleared.
If the alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
Low BER
MODEM
This condition indicates that the radio signals are slightly degraded, where the
threshold is 1E-7 (default value).
Procedure 5-22
1. Launch the WebLCT.
LTI
Equipment
This condition indicates that the system detects LTI (Loss of Timing Inputs) where
the equipment does not synchronize with any reference sources. The problem of this
condition pertains to the optical fiber cables, electrical cables, or to the far-end NE.
Procedure 5-23
1. Check if any alarm regarding the reference clock occur. If any exist(s), clear it/
them.
2. Retrieve the Current Status, and check if the LTI alarm is cleared. If the alarm is
not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
Maintenance
Equipment
This condition is not an alarm. When the Maintenance indicates On, the system is
set into the Maintenance mode.
MDI/MDI-X
ETH
This condition is not an alarm. The message shows the operating type (MDI or MDI-
X) of the indicated Ethernet port currently running.
Module
MODEM
BB
RF
This condition indicates that the system detects the hardware error of the indicated
object.
Procedure 5-24
1. Replace the object.
2. Retrieve the Current Status, and check if the Module alarm is cleared. If the
alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
Module-BB
Equipment
This condition indicates that the system detects the equipment failure in the BB
section. If this alarm occurs, contact NEC for the further maintenance support.
Mute Status
RF
This condition is not an alarm. The message indicates if the RF TX Power Output is
set to Mute or not.
Own Clock ID
Equipment
This condition is not an alarm. The message shows the PTP Clock of the equipment.
Equipment
This condition is not an alarm. The message indicates the level of PTP Clock Quality.
MODEM
This condition indicates that the settings of PTP Mode at two opposing NEs do no
match.
Procedure 5-25
1. Check the settings of following:
.Check and adjust the PTP Mode settings of both local NE and its opposing
NE.
Check and adjust the Equipment Clock settings of both local NE and its
opposing NE
2. Retrieve the Current Status, and check if the PTP Mode Setting Mismatch
alarm is cleared. If the alarm is not cleared, contact NEC for the further
maintenance support.
This step ends the procedure.
Equipment
This condition is not an alarm. The message indicates the state of PTP Radio Clock.
Equipment
This condition is not an alarm. The message indicates the selected Master to which
the PTP-BC function synchronizes.
Equipment
This condition is not an alarm. The message indicates the time when synchronizing
with Master using the PTP function. The indicated time does not show the date or
time of Management.
Quality Level
Equipment
This condition is not an alarm. The message indicates the quality level of the Timing
Clock.
RDI
MODEM
This condition indicates that RDI (Remote Defect Indication) signal is detected.
Procedure 5-26
1. Check if any alarm(s) occur(s) in the far-end NE. If any exist(s), correct it/them.
2. Retrieve the Current Status, and check if the RDI alarm is cleared. If the alarm is
not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
ETH
This condition indicates that the hardware error is detected at the opposing site
equipment, which is reported via the Ethernet link. This is an alarm regarding
IEEE802.3ah, Link OAM.
Procedure 5-27
1. Replace the equipment at the opposing site.
2. Retrieve the Current Status, and check if the Remote Critical Event alarm is
cleared. If the alarm is not cleared, contact NEC for the further maintenance
support.
This step ends the procedure.
ETH
This condition indicates that the equipment on the opposing site is in the reboot
process. This is an alarm regarding the IEEE802.3ah, Link OAM.
Procedure 5-28
1. Check if any failures occur to the equipment on the opposing site, and if any
exist, clear them.
2. Retrieve the Current Status, and check if the Remote Dying Gasp alarm is
cleared. If the alarm is not cleared, contact NEC for the further maintenance
support.
This step ends the procedure.
ETH
This condition is not an alarm. The system detects that an Errored Frame message is
issued at the opposing site.
ETH
This condition is not an alarm. The system detects that an Errored Frame Period
message is issued at the opposing site.
ETH
This condition is not an alarm. The system detects that an Errored Frame Seconds
Summary message is issued at the opposing site.
ETH
This condition is not an alarm. The system detects that an Errored Symbol Period
message is issued at the opposing site.
ETH
This condition indicates that Ethernet link failure at the opposing site is detected via
the incoming port. This is an alarm regarding IEEE802.3ah, Link OAM.
Procedure 5-29
1. Check if any alarms occur to the equipment or cable connections at n the
opposing site, and if any exist, clear them.
2. Retrieve the Current Status, and check if the Remote Link Fault alarm is
cleared. If the alarm is not cleared, contact NEC for the further maintenance
support.
This step ends the procedure.
RX Level
RF
This condition indicates that the receiving level is lower than the threshold level
(between –72 to –94 dBm according to the modulation system and bit rates).
Procedure 5-30
Refer to 5.4 Trouble Shooting Flow for the procedure.
RX Modulation
MODEM
This condition is not an alarm. The message informs that the modulation system at
the receiving side has been changed.
ETH
This condition is not an alarm. The message indicates if the SFP Port is optical or
electrical.
SFP Removed
ETH
This condition indicates that the system cannot detect the SFP Module on the
indicated port. This condition is caused if the SFP is not properly plugged in, is not
mounted, or is defective.
Procedure 5-31
1. Check if the SFP on the indicated port is properly and securely plugged in.
If the indicated port is vacant, mount an SFP Module onto the appropriate
port.
If an SPF module is mounted on the indicated port, dismount and remount it
to ensure the mounted condition.
2. Retrieve the Current Status, and check if the SFP Removed alarm is cleared.
ETH
This condition indicates that the provided SFP Port type and the mounted SFP
Module do not match.
Procedure 5-32
1. Launch WebLCT, and display the Inventory window to check the port
configuration. Correct the setting(s) if any inappropriate setting is found.
2. Retrieve the Current Status, and check if the SFP Type Mismatch alarm is
cleared.
3. Is the SFP Type Mismatch alarm cleared?
YES: This step ends the procedure.
NO: Go to Step 4.
4. Check if the mounted SFP Module is the correct type for the port.
ETH
This condition is not an alarm. The message indicates that the current status of speed
and duplex mode of the indicated port.
SSM Fail
Equipment
This condition indicates that the received Sync Status Message is in the unstable
condition. The problem of this condition pertains to the input cable or to the external
timing source.
Temperature
Equipment
This condition indicates that the temperature within equipment exceeds the
operational limitation.
Procedure 5-33
1. Check the room temperature, and adjust it.
2. Retrieve the Current Status, and check if the Temperature alarm is cleared.
NOTE: Wait at least for an hour in the adjusted air before checking the
Current Status.
If the alarm is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
BB
This condition is not an alarm. The message informs that the Dynamic Entry in L2
Switch has reached the maximum number.
MODEM
This condition is not an alarm. The message indicates the state of Trap Suppression
function.
TX Modulation
MODEM
This condition is not an alarm. The message informs that the modulation system of
MODEM at the transmitting side has been changed.
TX Power
RF
This condition indicates that the transmitting power level of RF is lower than 3 dB.
Procedure 5-34
Refer to 5.4 Trouble Shooting Flow for the procedure(s).
UAE
MODEM
This condition indicates that the Unavailable Second Event is detected.
Procedure 5-35
1. Check the Current Alarms, and if any other alarms occur(s), clear it/them.
2. Retrieve the Current Status, and check if the UAE alarm is cleared. If the alarm
is not cleared, contact NEC for the further maintenance support.
This step ends the procedure.
iPASOLINK EX
Advanced
SPECIFICATION
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
GGS-000549-01E
GGS-000549-01E
Printed in Japan
CONTENTS –i–
iPASOLINK EX Advanced
SPECIFICATION
CONTENTS
1. INTERFACES 1-1
2. SPECIFICATION 2-1
1. INTERFACES
1 2 3 4 5 6 7
9 8
➂ DCN (PoE) GbE; Power Supply by PoE (RJ-45); WebLCT or NMS Connecting Port
➆ SYSTEM LED LED to indicate the system status using the colors of green or red
2. SPECIFICATION
RSL Interface 4mm Banana Plug Socket 1 port of monitoring Received Signal Levels
2.2.4 Synchronization
Functions Supported Items
2.3.1 1000BASE-X
ITEM SPECIFICATIONS
1000BASE-SX 1000BASE-LX
Others
2.3.2 10GBASE-R
ITEM SPECIFICATIONS
10GBASE-SR 10GBASE-LR
SMSR —— 30 dB
Others
Type of Fiber Cable MMF: Core/Clad (dia. 50/125 µm) SMF: Core/Clad (dia. 9/125 µm)
3. SYSTEM PERFORMANCES
Item DESCRIPTION
3.2.1 Temperature
Condition Requirements
3.2.2 Humidity
Condition Requirements
Transportation Up to 100%
Storage Up to 100%
3.3.1 DC IN
Condition Requirements
3.3.2 PoE
Condition Requirements
3.4 Others
Category Standards
iPASOLINK EX
Advanced
OPEN SOURCE SOFTWARE
SUMMARY
NEC Corporation
7-1, Shiba 5-Chome, Minato-Ku, Tokyo 108-8001, Japan
GGS-000552-01E
GGS-000552-01E
Printed in Japan
–i–
iPASOLINK EX Advanced
OPEN SOURCE SOFTWARE SUMMARY
iPASOLINK contains "Open Source Software" provided under its applicable license
terms.
FreeBSD License:
http://www.freebsd.org/copyright/freebsd-license.html
NET-SNMP License:
http://net-snmp.sourceforge.net/about/license.html
Ruby License:
http://www.ruby-lang.org/en/LICENSE.txt
OpenBSD License:
http://www.openbsd.org/policy.html