6479 RICi-4E1
6479 RICi-4E1
6479 RICi-4E1
RICi-4E1/T1, RICi-8E1/T1
Fast Ethernet over Four or Eight E1 or T1 NTUs
Version 2.0
RICi-4E1/T1, RICi-8E1/T1
Fast Ethernet over Four or Eight E1 or T1 NTUs
Version 2.0
International Headquarters RAD Data Communications Ltd. 24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel: 972-3-6458181 Fax: 972-3-6498250, 6474436 E-mail: [email protected]
North America Headquarters RAD Data Communications Inc. 900 Corporate Drive Mahwah, NJ 07430, USA Tel: (201) 5291100, Toll free: 1-800-4447234 Fax: (201) 5295777 E-mail: [email protected]
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the RICi-4E1/T1, RICi-8E1/T1 to be delivered hereunder shall be free of defects in material and workmanship under normal use and service for a period of twelve (12) months following the date of shipment to DISTRIBUTOR. If, during the warranty period, any component part of the equipment becomes defective by reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the event that RAD requests the return of equipment, each party shall pay one-way shipping costs. RAD shall be released from all obligations under its warranty in the event that the equipment has been subjected to misuse, neglect, accident or improper installation, or if repairs or modifications were made by persons other than RAD's own authorized service personnel, unless such repairs by others were made with the written consent of RAD. The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties which extend beyond the face hereof, including, but not limited to, warranties of merchantability and fitness for a particular purpose, and in no event shall RAD be liable for consequential damages. RAD shall not be liable to any person for any special or indirect damages, including, but not limited to, lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale, handling, repair, maintenance or use of the RICi-4E1/T1, RICi-8E1/T1, and in no event shall RAD's liability exceed the purchase price of the RICi-4E1/T1, RICi-8E1/T1. DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to RICi-4E1/T1, RICi-8E1/T1 and for ensuring that replacements and other adjustments required in connection with the said warranties are satisfactory. Software components in the RICi-4E1/T1, RICi-8E1/T1 are provided "as is" and without warranty of any kind. RAD disclaims all warranties including the implied warranties of merchantability and fitness for a particular purpose. RAD shall not be liable for any loss of use, interruption of business or indirect, special, incidental or consequential damages of any kind. In spite of the above RAD shall do its best to provide error-free software products and shall offer free Software updates during the warranty period under this Agreement. RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims, demands, or actions arising out of or relating to this Agreement and the RICi-4E1/T1, RICi-8E1/T1 shall not exceed the sum paid to RAD for the purchase of the RICi-4E1/T1, RICi8E1/T1. In no event shall RAD be liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been advised of the possibility of such damages. This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste equipment in protecting the environment, the owner of this RAD product is required to refrain from disposing of this product as unsorted municipal waste at the end of its life cycle. Upon termination of the units use, customers should provide for its collection for reuse, recycling or other form of environmentally conscientious disposal.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential safety hazards regarding product operation or maintenance to operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building protective ground bus.
Warning
Some products may be equipped with a laser diode. In such cases, a label with the laser class and other warnings as applicable will be attached near the optical transmitter. The laser warning symbol may be also attached. Please observe the following precautions: Before turning on the equipment, make sure that the fiber optic cable is intact and is connected to the transmitter. Do not attempt to adjust the laser drive current. Do not use broken or unterminated fiber-optic cables/connectors or look straight at the laser beam. The use of optical devices with the equipment will increase eye hazard.
Use of controls, adjustments or performing procedures other than those specified herein, may result in hazardous radiation exposure. ATTENTION: The laser beam may be invisible! In some cases, the users may insert their own SFP laser transceivers into the product. Users are alerted that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are used. In particular, users are warned to use only agency approved products that comply with the local laser safety regulations for Class 1 laser products. Always observe standard safety precautions during installation, operation and maintenance of this product. Only qualified and authorized service personnel should carry out adjustment, maintenance or repairs to this product. No installation, adjustment, maintenance or repairs should be performed by either the operator or the user.
Connecting AC Mains
Make sure that the electrical installation complies with local codes. Always connect the AC plug to a wall socket with a protective ground. The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Always connect the power cord first to the equipment and then to the wall socket. If a power switch is provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed in the building installation. In cases when the power distribution system is IT type, the switch must disconnect both poles simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference to the ground. Any single pole can be externally grounded. Due to the high current capability of DC power systems, care should be taken when connecting the DC supply to avoid short-circuits and fire hazards. DC units should be installed in a restricted access area, i.e. an area where access is authorized only to qualified service and maintenance personnel. Make sure that the DC power supply is electrically isolated from any AC source and that the installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate the circuit breaker of the panel board that services the equipment and switch it to the OFF position. When connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the positive pole and last the negative pole. Switch the circuit breaker back to the ON position. A readily accessible disconnect device that is suitably rated and approved should be incorporated in the building installation. If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports V.11, V.28, V.35, V.36, RS-530, X.21, 10 BaseT, 100 BaseT, Unbalanced E1, E2, E3, STM, DS-2, DS-3, S-Interface ISDN, Analog voice E&M xDSL (without feeding voltage), Balanced E1, T1, Sub E1/T1
Safety Status SELV Safety Extra Low Voltage: Ports which do not present a safety hazard. Usually up to 30 VAC or 60 VDC.
TNV-1 Telecommunication Network Voltage-1: Ports whose normal operating voltage is within the limits of SELV, on which overvoltages from telecommunications networks are possible. TNV-2 Telecommunication Network Voltage-2: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are not possible. These ports are not permitted to be directly connected to external telephone and data lines. TNV-3 Telecommunication Network Voltage-3: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are possible.
FXO (Foreign Exchange Office), xDSL (with feeding voltage), U-Interface ISDN
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a qualified safety engineer. Always make sure that the equipment is grounded before connecting telecommunication cables. Do not disconnect the ground connection before disconnecting all telecommunications cables. Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The grounding and bonding of the ground connections should comply with the local codes. The telecommunication wiring in the building may be damaged or present a fire hazard in case of contact between exposed external wires and the AC power lines. In order to reduce the risk, there are restrictions on the diameter of wires in the telecom cables, between the equipment and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line cords.
Attention
Pour rduire les risques sincendie, utiliser seulement des conducteurs de tlcommunications 26 AWG ou de section suprieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such cases, a notice will be given in the installation instructions. Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Avertissement
Achtung
Franais
Avertissement
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques potentiels de scurit pour l'oprateur ou le personnel de service, quant l'opration du produit ou sa maintenance.
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le produit est sous tension ou connect des lignes externes de tlcommunications.
Mise la terre de protection : la cosse ou la borne marque devrait tre connecte la prise de terre de protection du btiment.
Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre optique est intact et qu'il est connect au transmetteur. Ne tentez pas d'ajuster le courant de la commande laser. N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans terminaison et n'observez pas directement un rayon laser. L'usage de priphriques optiques avec l'quipement augmentera le risque pour les yeux.
L'usage de contrles, ajustages ou procdures autres que celles spcifies ici pourrait rsulter en une dangereuse exposition aux radiations. ATTENTION : Le rayon laser peut tre invisible !
Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par l'agence et conformes la rglementation locale de scurit laser pour les produits laser de classe 1. Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation, d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou l'utilisateur.
Franais
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant, sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut aussi tre joint. Avertissement Veuillez observer les prcautions suivantes :
Franais
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par rapport la mise la terre. Tout ple doit tre mis la terre en externe. A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques d'incendie. Les units CC devraient tre installes dans une zone accs restreint, une zone o l'accs n'est autoris qu'au personnel qualifi de service et de maintenance. Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que l'installation est conforme la rglementation locale. La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A. Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le ple ngatif. Remettez le coupe-circuit en position ON. Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du btiment. Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC est flottante.
Declaration of Conformity
Manufacturer's Name: Manufacturer's Address: declares that the product: Product Name:
RAD Data Communications Ltd. 24 Raoul Wallenberg St., Tel Aviv 69719, Israel
RICi-8E1, RICi-4E1
conforms to the following standard(s) or other normative document(s): EMC: EN 55022:1998 + A1:2000, A2:2003 EN 55024:1998 + A1:2001, A2:2003 Safety: Supplementary Information: The products herewith comply with the requirements of the EMC Directive 89/336/EEC, the Low Voltage Directive 73/23/EEC and the R&TTE Directive 99/5/EC for wired equipment. The products were tested in a typical configuration. Tel Aviv, 7 November 2006 EN 60950-1:2001 Information technology equipment Radio disturbance characteristics Limits and methods of measurement. Information technology equipment Immunity characteristics Limits and methods of measurement. Information technology equipment Safety Part 1: General requirements.
European Contact: RAD Data Communications GmbH, Otto-Hahn-Str. 28-30, 85521 Ottobrunn-Riemerling, Germany
Glossary
Address Agent Analog ANSI AWG Backhaul
A coded representation of the origin or destination of data. In SNMP, this refers to the managed system. A continuous wave or signal (such as human voice). American National Standards Institute. The American Wire Gauge System, which specifies wire width. Transporting traffic between distributed sites (typically access points) and more centralized points of presence. See Cellular Backhaul. A transmission line in which voltages on the two conductors are equal in magnitude, but opposite in polarity, with respect to ground. The range of frequencies passing through a given circuit. The greater the bandwidth, the more information can be sent through the circuit in a given amount of time. Unit of signaling speed equivalent to the number of discrete conditions or events per second. If each signal event represents only one bit condition, baud rate equals bps (bits per second). The smallest unit of information in a binary system. Represents either a one or zero (1 or 0). A measure of data transmission rate in serial transmission. A device interconnecting local area networks at the OSI data link layer, filtering and forwarding frames according to media access control (MAC) addresses. A storage device. Commonly used to compensate for differences in data rates or event timing when transmitting from one device to another. Also used to remove jitter. A transmission path or channel. A bus is typically an electrical connection with one or more conductors, where all attached devices receive all transmissions at the same time. A group of bits (normally 8 bits in length). A continuous signal at a fixed frequency that is capable of being modulated with a second (information carrying) signal.
Balanced
Bandwidth
Baud
Buffer
Bus
Byte Carrier
Cell
The 53-byte basic information unit within an ATM network. The user traffic is segmented into cells at the source and reassembled at the destination. An ATM cell consists of a 5-byte ATM header and a 48-byte ATM payload, which contains the user data. A path for electrical transmission between two or more points. Also called a link, line, circuit or facility. A term for the source(s) of timing signals used in synchronous transmission. Any of several techniques that reduce the number of bits required to represent information in data transmission or storage, thereby conserving bandwidth and/or memory. A state in which the network is overloaded and starts to discard user data (frames, cells or packets). Information represented in digital form, including voice, text, facsimile and video. Layer 2 of the OSI model. The entity, which establishes, maintains, and releases data-link connections between elements in a network. Layer 2 is concerned with the transmission of units of information, or frames, and associated error checking. The detection and isolation of a malfunction or mistake in a communications device, network or system. The binary (1 or 0) output of a computer or terminal. In data communications, an alternating, non-continuous (pulsating) signal. A 2.048 Mbps line, common in Europe, that supports thirty-two 64 kbps channels, each of which can transmit and receive data or digitized voice. The line uses framing and signaling to achieve synchronous and reliable transmission. The most common configurations for E1 lines are E1 PRI, and unchannelized E1. The European standard for high speed digital transmission, operating at 34 Mbps. Encapsulating data is a technique used by layered protocols in which a low level protocol accepts a message from a higher level protocol, then places it in the data portion of the lower-level frame. The logistics of encapsulation require that packets traveling over a physical network contain a sequence of headers. A device that compensates for distortion due to signal attenuation and propagation time with respect to frequency. It reduces the effects of amplitude, frequency and/or phase distortion. A local area network (LAN) technology which has extended into the wide area networks. Ethernet operates at many speeds, including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
E3 Encapsulation
Equalizer
Ethernet
Ethernet OAM
Ethernet operation, administration and maintenance (OAM) are a set of standardized protocols for measuring and controlling network performance. There are two layers of Ethernet OAM: Service OAM (provides end-to-end connectivity fault management per customer service instance, even in multi-operator networks) and Link or Segment OAM (detailed monitoring and troubleshooting of an individual physical or emulated link). A congestion control mechanism that results in an ATM system implementing flow control. A logical grouping of information sent as a link-layer unit over a transmission medium. The terms packet, datagram, segment, and message are also used to describe logical information groupings. At the physical and data link layers of the OSI model, bits are fit into units called frames. Frames contain source and destination information, flags to designate the start and end of the frame, plus information about the integrity of the frame. All other information, such as network protocols and the actual payload of data, is encapsulated in a packet, which is encapsulated in the frame. A circuit or device permitting transmission in two directions (sending and receiving) at the same time. A voice interface, emulating a PBX extension, as it appears to the CO (Central Office) for connecting a PBX extension to a multiplexer. A voice interface, emulating the extension interface of a PBX (or subscriber interface of a CO) for connecting a regular telephone set to a multiplexer. An ITU standard for the physical and electrical characteristics of various digital interfaces, including those at 64 kbps and 2.048 Mbps. Gateways are points of entrance and exit from a communications network. Viewed as a physical entity, a gateway is that node that translates between two otherwise incompatible networks or network segments. Gateways perform code and protocol conversion to facilitate traffic between data highways of differing architecture. A circuit or device capable of transmitting in two directions, but not at the same time. A shared boundary, defined by common physical interconnection characteristics, signal characteristics, and meanings of exchanged signals. Also known as an Internet address. A unique string of numbers that identifies a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers from 0 to 255, separated by periods (for example, 1.0.255.123).
Framing
Full Duplex FXO (Foreign Exchange Office) FXS (Foreign Exchange Subscriber) G.703
Gateway
IP Address
Jitter
The deviation of a transmission signal in time or phase. It can introduce errors and loss of synchronization in high speed synchronous communications. A device that transmits an extremely narrow and coherent beam of electromagnetic energy in the visible light spectrum. Used as a light source for fiber optic transmission (generally more expensive, shorter lived, single mode only, for greater distances than LED). The most commonly used method of signaling an off-hook condition between an analog phone set and a switch, where picking up the receiver closes a wire loop, allowing DC current to flow, which is detected by a PBX or local exchange and interpreted as a request for service. A type of diagnostic test in which the transmitted signal is returned to the sending device after passing through all or part of a communications link or network. An application that receives Simple Network Management Protocol (SNMP) information from an agent. An agent and manager share a database of information, called the Management Information Base (MIB). An agent can use a message called a traps-PDU to send unsolicited information to the manager. A manager that uses the RADview MIB can query the RAD device, set parameters, sound alarms when certain conditions appear, and perform other administrative tasks. The source of timing signals (or the signals themselves) that all network stations use for synchronization. At one end of a communications link, a device that combines several lower speed transmission channels into a single high speed channel. A multiplexer at the other end reverses the process. Sometimes called a mux. See Bit Interleaving/Multiplexing. (1) An interconnected group of nodes. (2) A series of points, nodes, or stations connected by communications channels; the collection of equipment through which connections are made between data stations. A point of interconnection to a network. A state that results when you lift a telephone receiver, producing a busy signal. An ordered group of data and control signals transmitted through a network, as a subset of a larger message. The 48-byte segment of the ATM cell containing user data. Any adaptation of user data via the AAL will take place within the payload. Layer 1 of the OSI model. The layer concerned with electrical, mechanical, and handshaking procedures over the interface connecting a device to the transmission medium.
Laser
Loop Start
Loopback
Manager
Network
Physical Layer
See Multidrop. The physical interface to a computer or multiplexer, for connection of terminals and modems. A formal set of conventions governing the formatting and relative timing of message exchange between two communicating systems. A common mode of transmission, where the character bits are sent sequentially one at a time instead of in parallel. Describing an optical wave-guide or fiber that is designed to propagate light of only a single wavelength (typically 5-10 microns in diameter). In telecommunications, the absence of a signal. Equivalent to a binary 0. See Synchronous Transmission. Transmission in which data bits are sent at a fixed rate, with the transmitter and receiver synchronized. A digital transmission link with a capacity of 1.544 Mbps used in North America. Typically channelized into 24 DS0s, each capable of carrying a single voice conversation or data stream. Uses two pairs of twisted pair wires. A digital transmission link with a capacity of 45 Mbps, or 28 T1 lines. The virtual terminal protocol in the Internet suite of protocols. It lets users on one host access another host and work as terminal users of that remote host. Instead of dialing into the computer, the user connects to it over the Internet using Telnet. When issuing a Telnet session, it connects to the Telnet host and logs in. The connection enables the user to work with the remote machine as though a terminal was connected to it. A device that is doing the Layer 2 bridging according to the VLAN tag in addition to the standard bridging parameters. A VLAN-aware device will not strip or add any VLAN header. A technique that lets carriers offer multiple virtual LANs over a single circuit. In essence, the carrier creates an Ethernet virtual private network to tunnel customer VLANs across its WAN; this helps avoid name conflicts among customers of service providers who connect to the carrier. Stacking works by assigning two VLAN IDs to each frame header. One is a "backbone" VLAN ID used by the service provider; the other one has up to 4,096 unique 802.1Q VLAN tags.
T3 Telnet
VLAN-Aware
VLAN Stacking
1.
2.
Configure RICi-4E1/T1, RICi-8E1/T1 to the desired operation mode via an ASCII terminal connected to the front panel CONTROL port. After configuring, you can manage the unit over Telnet, a PC running a Web browsing application, or SNMP via either the Ethernet or E1 port.
Note
Note
The default user name is su, and the default password is 1234.
To configure the bridge ports: From the Bridge Port menu (Configuration> Applications > Bridge > Bridge Port), select a bridge port and configure the necessary parameters.
To configure the VLAN memberships: From the VLAN Membership menu (Configuration > Applications > Bridge > VLAN Membership), create a new VLAN and define the egress tagged and untagged ports which are the VLAN members.
To assign priorities to the traffic queues: From the Priority Mapping menu (Main > Configuration > Applications > QoS), select Priority Mapping and assign priorities to the traffic queues according to the selected method.
Contents
Chapter 1. Introduction 1.1 Overview.................................................................................................................... 1-1 Product Options...................................................................................................... 1-1 Applications ............................................................................................................ 1-2 Features ................................................................................................................. 1-2 1.2 Physical Description ................................................................................................... 1-6 1.3 Functional Description................................................................................................ 1-7 Bridge..................................................................................................................... 1-7 Quality of Service.................................................................................................. 1-14 Management ........................................................................................................ 1-15 1.4 Technical Specifications............................................................................................ 1-16 General................................................................................................................. 1-16 Interfaces ............................................................................................................. 1-17 Chapter 2. Installation and Setup 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Introduction ............................................................................................................... 2-1 Site Requirements and Prerequisites .......................................................................... 2-1 Package Contents ...................................................................................................... 2-2 Required Equipment ................................................................................................... 2-2 Mounting the Unit ...................................................................................................... 2-3 Installing Fiber Optic SFP Modules .............................................................................. 2-3 Connecting to Ethernet Equipment ............................................................................. 2-4 Connecting to E1/T1 Equipment ................................................................................. 2-5 Connecting to Management Stations .......................................................................... 2-6 Connecting to an ASCII Terminal .............................................................................. 2-6 2.10 Connecting to Power .................................................................................................. 2-7 Connecting AC Power .............................................................................................. 2-7 Connecting DC Power.............................................................................................. 2-7 Chapter 3. Operation 3.1 3.2 3.3 3.4 Turning On the Unit ................................................................................................... 3-1 Indicators .................................................................................................................. 3-2 Default Settings ......................................................................................................... 3-4 Configuration and Management Alternatives .............................................................. 3-8 Working with an ASCII Terminal ............................................................................... 3-8 Working with Web Terminal................................................................................... 3-10 Working with RADview-Lite ................................................................................... 3-12 Menu Map ............................................................................................................ 3-13 3.5 Turning Off the Unit ................................................................................................. 3-14 Chapter 4. Configuration 4.1 Configuring for Management ...................................................................................... 4-1 Defining Host IP Parameters ................................................................................... 4-2 Entering Device Information .................................................................................... 4-4 Controlling Management Access .............................................................................. 4-4 Configuring User Access .......................................................................................... 4-5 Configuring Network Managers ............................................................................... 4-6
RICi-4E1/T1 and RICi-8E1/T1 Ver. 2.0 i
Table of Contents
Configuring Radius Client ........................................................................................ 4-7 Defining the Access Policy....................................................................................... 4-9 Configuring Control Port Parameters ..................................................................... 4-10 4.2 Configuring for Operation ........................................................................................ 4-10 Setting Device-Level Parameters ........................................................................... 4-10 Setting Physical Layer Parameters ......................................................................... 4-12 Setting Logical Layer Parameters ........................................................................... 4-17 Setting Application-Level Parameters .................................................................... 4-18 4.3 Additional Tasks ....................................................................................................... 4-34 Configuring Date and Time .................................................................................... 4-34 Configuring the Syslog Parameters ........................................................................ 4-35 Viewing Inventory ................................................................................................. 4-37 Transferring Software and Configuration Files ....................................................... 4-38 Resetting RICi-4E1/T1, RICi-8E1/T1 ........................................................................ 4-39 Chapter 5. Configuring a Typical Application 5.1 Application Requirements........................................................................................... 5-1 5.2 Configuring the Management Parameters ................................................................... 5-2 Defining the Host ................................................................................................... 5-2 Defining the Default Gateway ................................................................................. 5-2 Defining Managers .................................................................................................. 5-3 5.3 Configuring E1/T1 Physical Layer ................................................................................ 5-4 5.4 Configuring the Bridge ............................................................................................... 5-4 Defining the Bridge ................................................................................................. 5-4 Defining Bridge Ports .............................................................................................. 5-5 Defining VLAN Memberships ................................................................................... 5-5 Chapter 6. Troubleshooting and Diagnostics 6.1 Monitoring Performance ............................................................................................. 6-1 Viewing System Status Information ......................................................................... 6-1 Viewing Physical Layer Status .................................................................................. 6-2 Viewing Application-Level Status ............................................................................. 6-3 Viewing Interface Statistics ..................................................................................... 6-4 6.2 Handling Alarms and Traps ......................................................................................... 6-6 Displaying Events .................................................................................................... 6-6 Clearing Events ....................................................................................................... 6-7 Traps Generated by RICi-4E1/T1, RICi-8E1/T1 .......................................................... 6-8 6.3 Troubleshooting ......................................................................................................... 6-9 6.4 Testing the Unit ....................................................................................................... 6-10 Running a Ping Test .............................................................................................. 6-10 Tracing the Route ................................................................................................. 6-10 Performing a Loopback Test on E1/T1 Links .......................................................... 6-11 Performing Bit Error Rate Test (BERT).................................................................... 6-12 Running OAM Tests............................................................................................... 6-13 6.5 Technical Support .................................................................................................... 6-20 Appendix A. Connector Wiring Appendix B. Boot Sequence and Downloading Software
ii
Chapter 1 Introduction
1.1 Overview
RICi-4E1/T1, RICi-8E1/T1 is a Network Termination Unit (NTU) connecting Fast Ethernet LANs over four or eight E1 or T1 circuits. RICi-4E1/T1, RICi-8E1/T1 is part of RADs RICi product family. It enables service provisioning and backhaul applications over low- and high-speed SDH/SONET and PDH circuits, from fractional and full E1/T1 and E3/T3 over STM-1/OC-3 and STM-4/OC-12 to Ethernet networks. RICi-4E1/T1, RICi-8E1/T1 can bond four or eight E1 or T1 ports together using Multilink PPP (MLPPP), creating a large virtual pipe. RICi-4E1/T1, RICi-8E1/T1 provides Layer-2 switching (bridge) between the Ethernet ports and the E1/T1 port, including VLAN-unaware and VLAN-aware bridging modes supporting VLAN based Layer-2 VPNs. Depending on the hardware configuration, RICi-4E1/T1, RICi-8E1/T1 provides 4 x 10/100BaseT or 2 x 10/100BaseT and 2 x SFP-based 100BaseFx Fast Ethernet ports. In the 4 x 10/100BaseT configuration, you may use one Ethernet port for out-of-band management. In addition, RICi-4E1/T1, RICi-8E1/T1 collects data that allows monitoring the performance and troubleshooting. Serial data in RICi-4E1/T1 passes via the E1/T1 port and has priority over the LAN traffic. RICi-4E1/T1, RICi-8E1/T1 supports Telnet, Web terminal, and SNMP for inband configuration and management, as well as an ASCII terminal for out-of-band management. RICi-4E1/T1, RICi-8E1/T1 ships as a compact standalone enclosure (1U, 8.5 wide), with an optional 19 rack mounting kit.
Product Options
Uplink Options
The following uplink options are available: RICi-4E1 and RICi-4T1: Four E1/T1 ports RICi-8E1 and RICi-8T1: Eight E1/T1 ports.
Chapter 1 Introduction
4 x 10/100BaseT copper ports. The fourth port can be dedicated for out-of-band management. 2 x 10/100BaseT copper ports plus 2 x SFP-based 100BaseFx optical ports.
Applications
Typical applications include Ethernet VPN services over E1/T1 links, and aggregation of enterprise LANs over E1/T1.
Figure 1-1 illustrates a typical application, where a unit connects users in remote
LANs to the packet network over E1/T1 with an SDH/SONET connection.
Features
Ethernet Interfaces
The Fast Ethernet interfaces operate in full or half (10/100BaseT only) duplex, with flow control (pause frames). Ethernet and 802.3 standards are supported. Copper Ethernet physical interfaces are electrical 10/100BaseT and support autonegotiation. Optical Ethernet physical interfaces are SFP-based 100BaseFx. In 4 x 10/100BaseT configurations, you can dedicate the fourth port to out-of-band local management. The Ethernet ports can be configured to accept traffic only from the first MAC address(es) from which they receive traffic. You can configure how many MAC addresses should be protected in this way, for each Ethernet port.
WAN Interfaces
RICi-4E1/T1, RICi-8E1/T1 supports four or eight unframed E1 or eight framed T1 interfaces. The E1 ports support a data rate of 2.048 Mbps, unframed, and are G.703 compliant. The T1 ports support a data rate of 1.544 Mbps, with D4 or ESF framing. The ports are compliant with AT&T TR62411 and ANSI T1.403 standards.
MLPPP
The unit bonds four or eight E1/T1 ports utilizing the Multilink Point-to-Point Protocol (MLPPP), bridging the bandwidth gap between E1/T1 and E3/T3, and creating a large virtual pipe.
1-2
Overview
Chapter 1 Introduction
Bridge
RICi-4E1/T1, RICi-8E1/T1 provides a bridging mechanism between the following bridge ports: Fast Ethernet ports MLPPP bundle over E1/T1 ports (Ethernet over E1/T1) Internal host.
The internal bridge operates in VLAN-unaware or VLAN-aware modes. The VLAN-aware bridge mode allows the user to create a subgroup of bridge ports within the bridge. Each such subgroup is associated with a unique VID. Frames can be forwarded only between bridge ports that are members of the same VLAN, thus enabling a total separation between different VLAN users within the same bridge. In the VLAN-unaware Bridge mode the bridge ignores VLAN tags and forwards frames only according to the MAC addresses of their sources and destinations. Ethernet Type (TPID) is configurable per bridge port, therefore the RICi-4E1/T1, RICi-8E1/T1 unit can be used in networks utilizing Ethertypes other than the 802.1q Ethertype 0x8100. RICi-4E1/T1, RICi-8E1/T1 supports QoS mapping from Ethernet ports, Ethernet VLAN priority (802.1p), or DSCP to egress queue priority at E1/T1 level.
Ethernet OAM
RICi-4E1/T1, RICi-8E1/T1 provides Ethernet end-to-end OAM based on 802.1ag and Y.1731 to enable Ethernet service providers to monitor their services proactively, measure end-to-end performance, and guarantee that the customers receive the contracted SLA. Fault monitoring and performance measurement include Frame Delay, Frame Delay Variation, Frame Loss, and Frame Availability.
Management
Setup, control, and monitoring of status and diagnostics can be performed using the following methods: Inband or out-of-band management: Inband. Local and remote management via an Ethernet or E1/T1 port. Out-of-band. Management via a local ASCII terminal connected to the V.24 (RS-232) DCE control port. In devices with four electrical 10/100BaseT ports, the fourth Ethernet port can be configured as an out-of-band management port. The device can be managed via Telnet, Web browser, or SNMP (RADview-Lite). Web terminal. This tool is a user-friendly Web-based element management system for remote device configuration and maintenance. It is embedded in the units and is provided at no extra cost. The Web terminal application can be run from any standard Web browser.
Overview
1-3
Chapter 1 Introduction
RADview-Lite. RADs SNMP-based element management software, providing SNMP traps, status polling, and configuration download. Remote element management is available in RADview-Lite via Web-based application.
The following functionalities are available with the internal management software: Viewing system information Modifying configuration and mode of operation, including setting system default values and resetting the unit Monitoring performance Initiating connectivity tests Ping and Trace Route Remote software and configuration download/upload (TFTP) Upgrading software.
Security
The management applications are password protected. RICi-4E1/T1, RICi-8E1/T1 supports the following access authorization levels: Super-user mode for configuration and monitoring User mode for monitoring and configuration view only.
Note
You must re-enter the user name and the password if five minutes have elapsed without entering at least one character.
The units support the following security protocols, providing a high level of client server communication security. RADIUS authentication SSL for Web based management application SSH for Secure Shell communication session
Timing
RICi-4E1/T1, RICi-8E1/T1 has a single clock domain with master and fallback sources for timing. The clock source can be the internal oscillator or loopback timing (LBT) from an E1/T1 link.
1-4
Overview
Chapter 1 Introduction
Diagnostics
RICi-4E1/T1, RICi-8E1/T1 offers several types of diagnostic and troubleshooting procedures: Remote loopbacks on the E1/T1 ports, towards line Ping tests Trace Route Bit Error Rate Test (BERT) on the E1/T1 ports Events/Traps Traps can be masked, per manager IP address, upon user configuration.
Statistics
RICi-4E1/T1, RICi-8E1/T1 provides statistics and counter capabilities at the physical Ethernet and MLPPP level (logical layer), and frame statistics at the E1/T1 level.
Temperature-Hardened Version
A temperature-hardened version is available, significantly extending the permitted operating temperature range.
Compact Size
RICi-4E1/T1, RICi-8E1/T1 is compact, 1U high and half the width of a standard 19 rack. It can be mounted in a rack or used as a standalone unit.
Overview
1-5
Chapter 1 Introduction
1.2
Physical Description
RICi-4E1/T1, RICi-8E1/T1 is a 1U standalone or rack mountable unit. Figure 1-2 illustrates a three-dimensional view of RICi-4E1 and RICi-8E1 with Ethernet and E1 interfaces. The remaining versions within this range are similar with respect to corresponding numbers of E1 or T1 interfaces. Front panels are illustrated in Chapter 3.
1-6
Physical Description
Chapter 1 Introduction
1.3
Functional Description
This section lists and explains the key features of RICi-4E1/T1, RICi-8E1/T1.
Bridge
RICi-4E1/T1, RICi-8E1/T1 has multi-port bridging capability with up to six bridge ports. The bridge supports two modes of operation, VLAN-aware and VLANunaware. The mechanism of each mode can be described as five different processes: Ingress. Checks each frame entering the bridge to decide if and how this frame should be passed on to the forwarding process. Learning. Applies to MAC only or MAC VID pairs and learns new MAC table entries. Aging. Checks the forwarding MAC table periodically. Forwarding. Decides to which bridge port/ports to forward the frame. Transmission. Applies to the VLAN-aware mode only and selects the format of the transmitted frame at the output port: with VLAN ID (tagged) or without VLAN ID (untagged).
Bridge features and these five processes are described below for each mode.
Functional Description
1-7
Chapter 1 Introduction
VLAN-Aware Mode
This mode enables creation of sub-groups of bridge ports within the bridge. Each sub-group is defined per VLAN and is associated with a unique VLAN ID (VID). Frames containing a VID can be forwarded only between bridge ports that are members of this specific VLAN, thus enabling a total separation between different VLAN users within the same bridge. In addition, each bridge port is associated with Ethernet Type (TPID). The default is 0x8100 (801.1Q Ether Type), but any number may be configured, thus enhancing the bridge capability to cope with provider networks that utilize other Ether Types (e.g. 0x9100).
Bridge Features
Full VLAN-aware bridge, complying with 802.1Q Learning and forwarding according to MAC address and VID Learning of up to 2,048 MAC table entries (MAC + VID pairs) Configuration of the aging time MAC table viewing (learned MACs).
1-8
Functional Description
Chapter 1 Introduction
Ingress Process
The ingress process is composed of three steps: frame admission, ingress filtering and PVID assignment to untagged/priority-only tagged frames. Frame admission. Two modes of operation, configured per bridge: Admit all frames. All frames arriving from the port are admitted and proceed to the ingress filtering process. PVID is assigned to untagged or priority only tagged frames. Admit only VLAN tagged frames. Only VLAN tagged frames are admitted and allowed to proceed to the ingress filtering process. Untagged or priority-only tagged frames are discarded. Ingress filtering. One of the following modes, configured per bridge port: Enable. Perform ingress filtering according to VID. This means that only frames that share a VID assigned to this bridge port are admitted. Disable. All frames are forwarded. Only admitted frames that pass filtering are submitted to learning and forwarding processes. PVID assignment. Per bridge port configuration. In VLAN-aware mode, each received frame entering the bridge is associated with a single VID. If the received frame does not contain a VLAN ID (untagged or priority only tagged frames), a specific PVID is assigned to these frames before they pass to the forwarding process. This means that the untagged/priority tagged frames that have passed the admission/ingress filtering are tagged with PVID and proceed to the forwarding process. Tagged frames will be double-tagged with the PVID only if Tag Stacking is enabled. For untagged frames that were tagged during this process to VID=PVID, the priority tag is assigned at the VLAN priority field, according to the default priority configuration.
Functional Description
1-9
Chapter 1 Introduction
VLAN tagged frames with a VID (or PVID for untagged/priority tagged frames) that do not include the bridge port in their VLAN member set are dropped. All frames pass. VLAN tagged frames with a VID that do not include the bridge port in their member set are dropped. Untagged/priority-only tagged frames are dropped. All VLAN tagged frames pass. Untagged/priority-only tagged frames are dropped.
Disable
Frames that pass this stage are submitted to the forwarding process and to the learning process.
Learning Process
The learning process observes the source MAC address (SA) and the VID of the received frame, and updates the forwarding database with the MAC VID pair and with the bridge port that the frame was received from. The Forwarding Data Base (FDB) is also referred to as a MAC table. Entries in the MAC table can be dynamic (inserted by the learning process) or static (inserted by configuration). A dynamic entry has an aging time associated with it. The VLAN-aware bridge is an Independent VLAN Learning (IVL) bridge. The learning process inserts a new dynamic entry to the MAC table. This entry consists of a MAC-VID pair and bridge port. If the MAC-VID pair already exists for the same port, the aging time is updated. If the MAC-VID pair already exists but for a different bridge port (dynamic entry) the new entry overrides the existing one. If the MAC-VID pair already exists for a different bridge port (static entry) the static entry prevails.
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic entry-aging period that has exceeded the configured aging time limit is deleted. The aging period is the time since the last frame for this entry has entered the bridge. The periodic check of the MAC table (aging time intervals) results in actual aging time that can reach up to twice the value that was configured by the user.
1-10
Functional Description
Chapter 1 Introduction
Forwarding Process
The forwarding process is performed based on the frame destination MAC VID pair. The frame is forwarded to the bridge port specified in the MAC table for this MAC VID pair entry. Untagged frames are forwarded according to the PVID attached to that frame during the ingress process. Frames are forwarded, dropped or flooded as follows: Forwarded: If the bridge port of the pair entry (DA, VID) in the MAC table is both an active bridge port and a member of the VLAN the frame is forwarded to that bridge port only. Dropped: If the bridge port for the pair entry (DA, VID) in the MAC table is the port on which the frame was received, the frame is dropped. If there are no active ports associated with the frames VID, or if the VID is not defined at all, the frame is dropped. Flooded: If the pair (DA, VID) has not been learnt and does not exist in the MAC table, the frame is transmitted to all bridge ports associated with the frames VLAN ID. Multicasts and broadcasts are flooded only via the bridge ports whose VLAN IDs are identical to the frames VLAN ID.
Transmission Process
After the forwarding process identifies the destination bridge port/ports to which the frame should be transmitted, the transmission process transmits it with the appropriate format. For each VLAN and each port, the user can configure the frame format to be used: VLAN-tagged. Frames are transmitted as follows: VLAN-tagged frames are transmitted unchanged. Untagged frames are transmitted tagged with priority according to the default priority of the ingress bridge port, and VID=PVID of the port from which they have entered. Priority-tagged frames are transmitted tagged with original priority and VID = PVID. Untagged. All frames are transmitted untagged.
Functional Description
1-11
Chapter 1 Introduction
VLAN-Unaware Mode
In this mode the bridge forwarding ignores the VLAN ID of VLAN tagged frames. Each Ethernet packet received from each bridge port (Ethernet or E1s) is forwarded according to its destination MAC address.
Bridge Features
Learning and forwarding according to MAC address only Learning of up to 2048 MAC addresses Configuration of the aging time VLAN tagged frames transparency (forwarding according to MAC only) MAC table viewing (learned MACs).
Ingress Process
All frames are accepted in this mode: untagged, priority-tagged or VLAN-tagged. Learning and forwarding is based on the MAC addresses, with no regard to the VLAN. This mode is sometimes regarded to as transparent mode, due to tag transparency.
Learning Process
The learning process observes the source MAC address (SA) of the received frame and updates the forwarding database (FDB) with the MAC and the bridge port that the frame was received from. FDB is also referred to as MAC table. The learning process inserts a new entry into the MAC table. This entry consists of the MAC and the bridge port. If the MAC already exists for the same bridge port, the aging time will be updated. If the MAC already exists, but for a different bridge port, (dynamic entry) the new entry will override the existing one.
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic entry aging time period that has exceeded the configured Aging Time Limit is deleted. The aging time period is the period of time since the last frame for this entry has entered the bridge. The periodic check of the MAC table (aging time intervals), results in an actual aging time that can reach up to twice the value that was configured by the user.
1-12
Functional Description
Chapter 1 Introduction
Forwarding Process
The forwarding process is performed based on the frame MAC Destination Address (MDA). The frame is forwarded to the Bridge/port specified in the MAC table for this MAC. Frames are forwarded, dropped or flooded at this stage for the following reason: Forwarded: A frame will be forwarded according to its DA, to the bridge port where its DA was learned. Dropped: If the port for that DA entry in the MAC table is the port on which the frame was received, the frame will be dropped. Flooded: If there is no information regarding the DA in the MAC table, the frame is flooded to all ports. Frames with multicast or broadcast address are flooded to all ports.
Transmission Process
In this bridge mode (VLAN-unaware), the frames are transmitted unchanged: No tags are added or removed.
VLAN Stacking
VLAN stacking mode for a bridge port refers to the addition of a tag to an incoming frame either at ingress or egress (regardless of whether it already has an existing VLAN tag), and removal of a tag at ingress or egress when the frame leaves from this port. This setting is independent of the bridge activity.
Functional Description
1-13
Chapter 1 Introduction
Quality of Service
RICi-4E1/T1, RICi-8E1/T1 support QoS mapping to priority queues (3 PQ, strict priority, per bridge port) at the E1/T1 egress according to one of the following:
0 0 1 2 3 4 5 6 7 8 9
VERSION
IP HEADER
IHL TOTAL LENGTH TOS IDENTIFICATION FLAGS FRAGMENT OFFSET TIME TO LIVE PROTOCOL HEADER CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS OPTIONS PADDING
Bit 0 DS5
Bit 1 DS4
Bit 2 DS3
Bit 3 DS2
Bit 4 DS1
Bit 5 DS0
Bit 6 XX
Bit 7 XX
1-14
Functional Description
Chapter 1 Introduction
Management
The performance of RICi-4E1/T1, RICi-8E1/T1 can be locally monitored from an ASCII terminal, or from a remote site using Telnet, SNMP, Web terminal or RADview-Lite.
Inband Management
RICi-4E1/T1, RICi-8E1/T1 enable configuring, monitoring and following up on statistics via Telnet, SNMP and the Web.
Out-of-Band Management
RICi-4E1/T1, RICi-8E1/T1 allows full configuration and diagnostics via an ASCII terminal. The ASCII terminal is connected to the control port on the front panel.
Chapter 3 explains how to activate the ASCII terminal and provides general instructions on navigating to various system menus and windows and modifying data.
Units with 4 x 10/100BaseT configurations enable managing the respective unit via a dedicated Fast Ethernet port using a Telnet server, SNMP V1, or Web based tools such as Web terminal and RADview-Lite. Refer to Chapter 3 for additional information.
Management Access
The architecture allows access from every bridge port to both the host and the remote site devices. Depending on the configuration mode, you may dedicate a port to management traffic, thus separating management and user traffic. In this scenario, traffic coming from the remote CPE uses two VLANs, one for user traffic, for which the CPE may use tag stacking, and the other one for management traffic. All CPEs connected to RICi-4E1/T1, RICi-8E1/T1 share the same management VLAN. In VLAN-aware mode, RICi-4E1/T1, RICi-8E1/T1 forwards the management traffic to the Ethernet cloud network management station. Using a different VLAN maintains strict separation of user and management traffic.
Functional Description
1-15
Chapter 1 Introduction
1.4
Technical Specifications
General
Internal Bridge
Ports
Fast Ethernet (up to four) Local host (one) MLPPP (one port combining up to eight E1/T1 lines)
Up to 2,048 MAC addresses of which 30 are static VLAN-aware, VLAN-unaware Transparent or Filter
Control Port
RS-232/V.24 (DTE asynchronous) 9.6, 19.2, 115.2 kbps DB-9, female System and physical layer Alarms ETH or E1 frame counters Ethernet physical layer statistics and frame counters
Monitoring
Statistics
Indicators
PWR (green)
TST (green)
ALM (red)
LINK (green) for each Ethernet port ACT (yellow) for each Ethernet port
On: Ethernet link is active Off: Ethernet link is inactive Blinking: Ethernet frame received or sent within the last second Off: No frame received or sent within the last second
1-16
Technical Specifications
Chapter 1 Introduction
LOC (red) for each port (E1 only) REM (red) for each port (E1 only) RED (red) for each port (T1 only) YEL (yellow) for each port (T1 only)
On: Local sync loss Off: No loss On: Remote sync loss Off: No loss On: Local sync loss Off: No loss On: Remote sync loss Off: No loss 100240 VAC, 50/60 Hz 48/60 VDC nominal (4072 VDC) 9W
Power
Physical
43.7 mm (1.7 in) (1U) 215.0 mm (8.5 in) 300.0 mm (11.8 in) 2.2 kg (4.7 lb) Regular option: 0 to 50C (32 to 122F) Temperature-hardened option: -22 to 70C (7.6 to 158F)
Environment
Temperature
Humidity
Up to 90%, non-condensing
Interfaces
This section provides the technical specifications of the RICi-4E1/T1, RICi-8E1/T1 interfaces.
E1/T1 Interfaces
The user-traffic interfaces of RICi-4E1/T1, RICi-8E1/T1 are four or eight E1, or four or eight T1 connections.
Technical Specifications
1-17
Chapter 1 Introduction
1-18
Technical Specifications
Chapter 1 Introduction
Technical Specifications
1-19
Chapter 1 Introduction
1-20
Technical Specifications
2.1
Introduction
RICi-4E1/T1, RICi-8E1/T1 is shipped ready to use, with factory defaults set. The device is designed as a desktop units or for mounting in a 19-inch rack. For rack installation instructions, refer to the Rack Mounting Kit for 19-inch Racks guide that comes with the RM kit. After installing the unit, use an ASCII terminal connected to the CONTROL port to perform any configuration necessary. The configuration procedures are described in Chapter 3 and Chapter 4. In case of problems, refer to Chapter 6. No internal settings, adjustment, maintenance and repairs should be performed by either the operator or the user. Such activities must be performed only by skilled personnel who are aware of the hazards involved. Always observe standard safety precautions during installation, operation and maintenance of this product.
Warning
2.2
AC-powered units should be installed within 1.5 meters (5 feet) of an easily accessible grounded AC outlet, capable of supplying the required voltage in the range of 100 to 240 VAC at 50/60 Hz. DC-powered units require 48/60 VDC (4072 VDC)) Allow at least 90 cm (36 in) of free space in front of the unit to ensure easy operator access. For continuous product operation, allow at least 10 cm of free space at the front and at least 15 cm at the rear of the unit for cable connections and ventilation. For proper ventilation, keep at least 2.5 cm free space from the sides and the top of the unit. The ambient operating temperature is 0 to 50 C (32 to 122F), at a relative humidity of up to 90%, non-condensing.
2-1
2.3
Package Contents
The package contains the following items: One RICi-4E1, RICi-4T1, RICi-8E1, or RICi-8T1 unit AC power cord or DC adaptor connector RM-35 kit for mounting in a 19 rack (if ordered) WM-35 kit for mounting a unit on a wall (if ordered).
2.4
Required Equipment
RICi-4E1/T1, RICi-8E1/T1 does not require special tools for installation. You only need a screwdriver for mounting the unit in a 19-inch rack. RICi-4E1/T1, RICi-8E1/T1 is equipped with the appropriate power cable for the respective country or region. You connect the power socket on the rear panel to the mains. Refer to the following table to determine which cables and connectors are required for installation. Appendix A specifies all connector pinouts.
2-2
Required Equipment
2.5
RICi-4E1/T1, RICi-8E1/T1 is designed for installation as a desktop unit. It can also be mounted in a 19" rack. For rack mounting instructions, refer to the RM-34 installation kit manual. If RICi-4E1/T1, RICi-8E1/T1 is to be used as a desktop unit, place and secure the unit on a stable, non-movable surface.
2.6
Depending on the hardware configuration you purchased, RICi-4E1/T1, RICi-8E1/T1 may use SFP modules with LC fiber optic connectors. Third-party SFP optical transceivers must be agency-approved, complying with the local laser safety regulations for Class 1 laser equipment.
Warning
To install SFP modules: 1. Lock the wire latch of each SFP module by lifting it up until it clicks into place, as illustrated below.
Note
2-3
To remove the SFP module: 1. Disconnect the fiber optic cables from the SFP module. 2. Unlock the wire latch by lowering it downwards (as opposed to locking). 3. Hold the wire latch and pull the SFP module out of the Ethernet port.
2.7
RICi-4E1/T1, RICi-8E1/T1 is connected to the Fast Ethernet equipment via the fiber optic LC or 8-pin RJ-45 ports. Refer to Appendix A for the RJ-45 connector pinout.. To connect to Fast Ethernet equipment with fiber optic interface: Connect RICi-4E1/T1, RICi-8E1/T1 to the Ethernet equipment using a standard fiber optic cable terminated with an LC connector.
Figure 2-2. Front Panel - Two 10/100BaseT and two SFP-Based Optical Links
To connect to Fast Ethernet equipment with 10/100BaseT interface: Connect the LAN to an RJ-45 connector designated 10/100BaseT.
2-4
2.8
E1/T1 devices are connected to RICi-4E1/T1, RICi-8E1/T1 via 4 or eight balanced RJ-45 ports. An unbalanced E1 interface is provided via the CBL-RJ45/2BNC/E1/X RJ-45 to BNC adapter cable. Refer to Appendix A for the connector pinouts. To connect to E1 or T1: Connect an E1 or T1 line to an RJ-45 connector labeled E1 or T1 (14 or 8). For unbalanced E1 connections, use the RAD-supplied adaptor.
2-5
2.9
2-6
Warning
Connecting AC Power
AC power is supplied via a standard 3-prong inlet with an integral fuse holder. AC power should be supplied through the 1.5m (5 ft) standard power cord terminated by a 3-prong socket. This cord ships with the unit. To connect AC power: 1. Connect the power cord to the power connector on the rear panel of the RICi-4E1/T1, RICi-8E1/T1 unit. 2. Connect the power cord to mains outlet. The unit turns on automatically upon connection to the mains.
Connecting DC Power
The unit ships with a special IEC 60320 adapter to facilitate a -48/-60 VDC power connection. To connect DC power: Refer to the DC power supply connection supplement located on the Technical Documentation CD, or at the back of the hardcopy manual, for instructions how to wire the DC adapter. Refer to the Handling Energized Products section at the front of this manual for safety instructions.
Connecting to Power
2-7
2-8
Connecting to Power
Chapter 3 Operation
This section explains how to get started and operate the unit as follows: Explains how to turn the unit on and off Provides a detailed description of the front panel controls and indicators and their functions Provides instructions for using a terminal connected to the control port of the RICi-4E1/T1, RICi-8E1/T1 unit Describes how to navigate menus Defines the configuration alternatives.
3.1
To turn on RICi-4E1/T1, RICi-8E1/T1: Connect the power cord to the mains. The PWR indicator turns on and remains on as long as RICi-4E1/T1, RICi-8E1/T1 receives power. Once installed, RICi-4E1/T1, RICi-8E1/T1 does not require attention except for occasionally monitoring the front panel indicators. You only have to configure the unit in compliance with local requirements or when performing tests.
3-1
Chapter 3 Operation
3.2
Indicators
The unit's LEDs are located on the front panel. Table 3-1 lists the functions of the LED indicators. The figures below illustrate typical front panels.
Figure 3-2. RICI-4T1 - Two 10/100BaseT and Two SFP-Based Optical Links
Figure 3-4. RICI-8T1 - Two 10/100BaseT and Two SFP-Based Optical Links
3-2
Indicators
Chapter 3 Operation
Green
Green
ALM
Red
Red
Red
Red
Yellow
LINK for each Ethernet port ACT for each Ethernet port
Green
Yellow
Blinking: Ethernet frame received or sent within the last second Off: No frame received or sent within the last second
Indicators
3-3
Chapter 3 Operation
3.3
Default Settings
Some configuration parameters in RICi-4E1/T1, RICi-8E1/T1 may be set to the default values. Configuration parameters set to the default values belong to one of the two following categories: Set/configured defaults. These defaults are visible when entering the screen, for example the terminal bit rate, which is set to 115200 bps when started. Not set/configured defaults. These defaults are not visible when entering the screen and are presented by a blank field. They will show after selecting Save in the respective screen. For example, the default for Ingress Filtering appears once you saved changes in the Bridge Configuration screen.
Configuration parameters without default values assigned require values be assigned, otherwise you will be unable to save the settings.
Table 3-2 lists the default settings of the RICi-4E1/T1, RICi-8E1/T1 configuration parameters. Table 3-2. Default System Settings
Parameter Device Name Description Location Contact Person Host IP Address Host IP Mask Host Default Gateway Read Community Write Community Trap Community Host Tagging Security Definition Telnet/SSH Access SNMP Access Web Access Baud Rate Default Value RICi-4E1/RICi-4T1/RICi-8E1/ RICi-8T1 Fast Ethernet over Four/Eight E1/T1 NTU Location of the device Name of the contact person 0.0.0.0 255.255.255.0 0.0.0.0 Public Private Public Untagged All Enable Enable Enable 115.2 kbps
3-4
Default Settings
Chapter 3 Operation
Default Settings
3-5
3-6
Default Settings
RICi-4E1/T1, RICi-8E1/T1 Installation and Operation Manual Standard OAM EtherType MD Names MD Format 8902 String
Chapter 3 Operation
Protocol Type MA Format OAM Destination Address Type MD Level OAM Mode Continuity Verification Mode CC Interval
Standard String Multicast 3 Disabled Disabled 1 sec Disabled 0 1 1 1 or 1E-10 1 or 1E-10 None 1
Service
Performance Monitoring Priority Delay Objective Delay Variation Objective Rising Threshold Falling Threshold Event Reporting Type Sampling Interval
Default Settings
3-7
Chapter 3 Operation
3.4
You can locally configure and monitor RICi-4E1/T1, RICi-8E1/T1 from an ASCII terminal connected to the relevant units control port, or remotely using ConfiguRAD or RADview-Lite. If you choose the remote option, the relevant PC requires an SNMP agent and a Web browser.
Logging In
For read/write permissions: 1. Under User Name, enter su. 2. Under Password, enter 1234 (default password). For read-only permissions: 1. Under User Name, enter user. 2. Under Password, enter 1234 (default password).
Note
log in again.
3-8
Chapter 3 Operation
Choosing Options
To choose an option: 1. Type the number corresponding to the option, and press <Enter>. 2. If you change any parameter in the menu, the Save option appears as the last option in the menu.
Note
In the OAM menus, the Save option does not appear as the last option in the menu. You save changes in the OAM menus by typing S and pressing <Enter>.
3. To save changes, type the number associated with Save in the respective menu or type S if it is an OAM menu, and press <Enter>. RICi-4E1/T1, RICi-8E1/T1 updates its database with the new value or displays a new menu for the selected option. 4. If you press <ESC> to exit the menu without saving changes, the following message appears: Do you want to save changes (Y/N/C)? Type the appropriate letter to save or not save your changes (Yes/No/Cancel).
Note
If a parameter offers only two settings, typing the number associated with the relevant option and pressing <Enter> will toggle between the two available settings. Figure 3-5 illustrates a typical screen displaying main items.
Product title line (RICi-4E1) Short message 1. 2. 3. 4. 5. Sub Menu> Sub Menu> Parameter X [Range] (value) Parameter Y> (Select value from the list) Table Z []
prompt> Main>Configuration>System> Help line message Help line of keyboard shortcuts, such as Esc-prev for returning to the previous menu -----------Division screen line -----------------Scroll messages
3-9
Chapter 3 Operation
To navigate inside a table: To scroll left or right, press <Ctrl>+L or <Ctrl>+R respectively. To move to the left or the right, press the Left Arrow or Right Arrow keys. To move up or down, press the Up Arrow or Down Arrow keys. To move to the next editable cell, press <Tab>. To navigate to a specific cell, press G<row number>, <col number>.
To get help on navigating a table: Press <?>; a help screen appears displaying the shortcut keys as illustrated in
Figure 3-6.
Table Hot Keys 'L' 'd' 'a' 'm' 'c' TAB move left scroll down 'D' - move down add row 't' - remove row represent entry as menu clear table select next changeable cell
returns.
After ending a session, it is necessary to enter again a valid user name and password to start a new session.
3-10
Chapter 3 Operation
Before you start using a Web browser for remote management or monitoring: Enable scripts. Configure the firewall that might be installed on your PC to allow access to the destination IP address. Disable pop-up blocking software, such as Google Popup Blocker. You may also have to configure spyware and adware protecting software to accept traffic from/to the destination IP address. To prevent configuration errors, you must flush the browsers cache whenever you return to the same screen.
Logging In
To log in from a Web browser: 1. Connect the Ethernet port to the LAN. 2. Verify that an IP address has been assigned to the relevant unit, using an ASCII terminal. 3. Open the Web browser. 4. Disable any pop-up blocking software, such as Google Popup Blocker. 5. In the address field, enter the IP address of RICi-4E1/T1, RICi-8E1/T1 and then press <Enter>. The address line reads something like http://172.16.100.253. The Opening window appears. 6. Click LOGIN; you are asked for the user name and the password. 7. Enter your user name and the password. The default user name for read/write permission is su and the default password is 1234. The ConfiguRAD Main menu appears.
Notes
simultaneously: five network sessions (Telnet, ConfiguRAD, RADview-Lite) and one ASCII terminal session.
If no user input is detected for 5 minutes during a ConfiguRAD session,
3-11
Chapter 3 Operation
To choose an option: 1. In the Web terminal screen, click the desired link to display the next menu. 2. Once the target screen is displayed, select a value from the drop-down box or manually enter it into the field.
3-12
Chapter 3 Operation
Menu Map
Use the menu tree below as a reference when configuring and monitoring RICi-4E1/T1, RICi-8E1/T1. Chapter 4 illustrates menus and describes parameters.
Chapter 3 Operation
3.5
To turn RICi-4E1/T1, RICi-8E1/T1 off: Remove the power cord from the power source.
3-14
Chapter 4 Configuration
This chapter illustrates the configuration screens and explains their parameters. Examples are given from a terminal screen, but most of the menus are similar for Telnet and Web terminal. The menu tree of the management software is illustrated in Chapter 3.
4.1
The initial configuration of management parameters is performed via an ASCII terminal. Once the RICi-4E1/T1, RICi-8E1/T1 host IP parameters are set, it is possible to access them via Telnet or Web terminal to configure the units for operation. Perform the following steps in order to configure the devices for management: To configure RICi-4E1/T1, RICi-8E1/T1 for first use: Configuring Host IP Parameters. Entering Device Information. Configuring Users and Management Access Permissions. Configuring Terminal Parameters.
Note
Make sure that you save your settings at each configuration screen.
4-1
Chapter 4 Configuration
4-2
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Configuration > System > Management > Host IP > Encapsulation 1. Host tagging (Tagged) 2. Host VLAN ID [1-4094] (2) 3. Host Priority Tag [0-7] (0) 4. Security Definitions (All) 5. Save Please select item from 1 to 5 ESC-Previous menu; !-Main menu; &-Exit
Note
When Host Tagging is set to Tagged, two parameters are added to the menu, Host VLAN ID and Host Priority Tag.
5. Select Host VLAN ID, and then specify the Host VLAN ID (14094). 6. Select Host Priority Tag to specify the priority level for the Host VLAN (07). 7. Select Security Definitions to specify the management access as follows: ALL. The unit can be managed from all ports OOB Only. The unit defines Fast Ethernet Port 4 as the OOB management port. When this setting is specified, the device can only be managed using the out-of-band option and from the associated port. 8. Select Save to save your changes. 9. Return to the Host IP menu and select Save to save your changes.
4-3
Chapter 4 Configuration
4-4
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > System > Management > Management Access 1. 2. 3. 4. 5. 6. User Access Radius Parameters Telnet/SSH Access SNMP Access WEB Access Access Policy > > (Enable) (Enable) (Enable) >
4-5
Chapter 4 Configuration
To change the current user name and password: 1. Navigate to Main Menu > Configuration > System > Management > Management Access > User Access. The User Access menu appears as illustrated in Figure 4-5. 2. In the User Access menu, select User Name and enter a new user name, which may consist of up to eight characters. 3. Select Old Password, and enter the current password. The default is 1234. 4. Select New Password and assign a new password, which may consist of up to eight characters.
Note
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Configuration > System > Management > Management Access > User Access User Level: (User) 1. 2. 3. 4. 5. User Name Old Password New Password Confirm New Password Save (user) (********) (********) (********)
4-6
Chapter 4 Configuration
3. Move the cursor to the Manager IP cell you wish to modify by pressing <Tab>. The selected cell is highlighted and the value appears in the Change cell field. 4. Press <1>, press <Enter>, and then enter a new IP address for the selected network manager. 5. Move the cursor to the Manager IP Mask field and enter the subnet mask for the network manager IP address. 6. Move the cursor to the Trap field and toggle between Mask and Unmask to mask or unmask traps for the selected management station. RICi-4E1/T1, RICi-8E1/T1 Main Menu > Configuration > System > Management > Manager List Manager ID 1 2 3 4 5 Manager IP 1.1.1.1 2.2.2.2 3.3.3.3 4.4.4.4 5.5.5.5 Manager IP Mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Manager Trap Mask Unmask Unmask Mask Unmask Unmask
1. Change cell ... (1.1.1.1) > A-Add; R-Remove; C-Clear; x-Clear Table ESC-Previous menu; !-Main menu; &-Exit; ?-Help
1 user(s)
4-7
Chapter 4 Configuration
2. Specify the following parameters according to Table 4-1: Server Access. Enable or Disable Server IP Address. The Radius servers IP address Key String. Shared secret Number of Retries and Timeout. Access-attempt parameters Authentication Port. Port used for authentication. 3. To switch to additional Radius servers, type f or b to navigate forward or backward in the list of servers. RICi-4E1/T1, RICi-8E1/T1 Configuration > System > Management > Management Access > Radius Parameters Server Sequence Number Server Status Server Access Server IP Address Key String Number of Retries[0 - 10] Timeout (in seconds)[1 - 5] Authentication Port[1 - 65535] (1) (NOT_CONNECTED) (Disable) (0.0.0.0) () (2) (2) (1812)
1. 2. 3. 4. 5. 6.
Please select item <1 to 6> F - Forward; B - Backward ESC-prev.menu; !-main menu; &-exit
Server Access Server IP Address Key String Number of Retries Timeout Authentication Port
Enable or disable access to the Radius server IP address of the Radius server Shared secret between Radius server and user. It is used for encryption Max. number of access attempts Number of seconds before access attempt fails Authentication protocol port
4-8
Chapter 4 Configuration
Default: Local 2nd Level None Local None: RICi-4E1/T1, RICi-8E1/T1 is available via only the first level. Local: RICi-4E1/T1, RICi-8E1/T1 uses the locally-stored authentication database.
Default: Local
4-9
Chapter 4 Configuration
Note
4.2
The recommended operation configuration procedure includes the following stages: Setting device-level parameters Setting logical layer parameters Setting physical layer parameters.
4-10
Chapter 4 Configuration
Note
It is recommended to apply different settings to the master clock and the fallback clock, for example Rx Clock for the master clock and Internal for the fallback clock.
To select the clock sources: 1. Navigate to Main Menu > Configuration > System > Clock Source > Master Clock. The Master Clock Source menu appears. 2. Press <1> to toggle the first-priority clock options: Internal, if you want the master clock to be the units internal clock. Rx Clock, if you want the master clock to be the clock for a specific E1/T1 link. 3. If you have chosen Rx Clock, specify the port to be used, E1/T1 Port 1..4 or 8. 4. Select Save. The master clock source settings are saved. 5. Return to the Clock Source menu (Main Menu > Configuration > System > Clock Source) and select Fallback Clock. The Fallback Clock Source menu appears. 6. Press <1> to toggle the second-priority clock options: Internal, if you want the fallback clock to be the internal clock of the relevant unit. Rx Clock, if you want to set the fallback clock to refer to a specific E1/T1 link. 7. If you have chosen Rx Clock, specify the port to be used: E1/T1 Port 1..4 or 8. 8. Select Save.
4-11
Chapter 4 Configuration
To enable or disable fault propagation in a specific direction: 1. Navigate to Main Menu > Configuration > System > Fault Propagation. 2. Network - > User Fault Propagation. Toggle between Interface Deactivation or Disable. 3. User - > Network Fault Propagation. Toggle between Interface Deactivation, OAM Signaling or Disable. 4. Select Save. RICi-4E1/T1, RICi-8E1/T1 Configuration > System > Fault Propagation 1. Network - > User Fault Propagation 2. User - > Network Fault Propagation 3. Save ESC-Previous menu; !-Main menu; &-Exit (Disable) (Disable)
To configure the Fast Ethernet port: 1. Navigate to Main Menu > Configuration > Physical Ports. The Physical Ports menu appears.
4-12
Chapter 4 Configuration
2. Select Fast Ethernet. The Fast Ethernet menu appears as illustrated in Figure 4-12. 3. Configure the Fast Ethernet port parameters. Refer to Table 4-3 for additional information. To configure MAC port protection for the Fast Ethernet port: 1. In the Fast Ethernet menu select MAC Access Control. The MAC Access Control menu appears as illustrated in Figure 4-13. 2. Configure the MAC Access Control parameters. Refer to Table 4-4 for additional information. RICi-4E1/T1, RICi-8E1/T1 Main menu > Configuration > Physical ports > Fast Ethernet Port 1. 2. 3. 4. 5. 6. 7. Activation Description Auto Negotiation Flow Control Max Capability Advertised MDIX Cross Over MAC Access Control (1) (Up) (ETH 1) (Enable) (Enable) (100base TX Full Duplex) (Enable) >
f forward Please select item from 1 to 6 ESC-Previous menu; !-Main menu; &-Exit
Figure 4-12. Fast Ethernet Menu Table 4-3. Fast Ethernet Parameters
Parameter Port number Activation Auto-negotiation Flow Control Max Capability Advertised Possible Values 14 The default is 1 Up (default) Down Enable (1) Disable (2) Enable (default) Disable 10baseT Half Duplex 10baseT Full Duplex 100baseTX Half Duplex 100base TX Full Duplex (default) Enable (default) Disable Remarks Refers to the Fast Ethernet port number. This parameter is read-only. Activates the Fast Ethernet link. Enables autonegotiation signaling over the Ethernet. Configures the default administrative PAUSE mode for this interface. Specifies the set of capabilities advertised by the local auto-negotiation entity.
4-13
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Main menu > Configuration > Physical ports > Fast Ethernet > MAC Access Control Port ... Current Number of Protected Addresses ... 1. MAC Protection Administrative Status > 2. Maximum Number of Protected MAC Addresses > ESC-Previous menu; !-Main menu; &-Exit (1) (0) (Disable) (0)
Figure 4-13. MAC Access Control Menu Table 4-4. MAC Access Control Parameters
Parameter Port number Current Number of Protected Addresses MAC Protection Administrative Status Disable Enable The default is Disable Maximum Number of Protected MAC Addresses Possible Values 14 The default is 1 Remarks Refers to the Fast Ethernet port number. This parameter is read-only. Shows the current number of learned MAC Addresses being protected. This parameter is read-only. Indicates if MAC port protection is disabled or enabled for the port. If enabled, the port accepts traffic only from the first MAC address(es) from which it receives traffic. Specifies the maximum number of source MAC addresses from which the port is allowed to receive traffic.
Configuring E1 Interface
To configure the E1 ports: 1. Navigate to Main Menu > Configuration > Physical Ports menu > E1 The E1 menu appears as illustrated in Figure 4-14. 2. Configure E1 port parameters. Refer to Table 4-5 for additional information. Press <F> to change the E1 port number. 3. Select Save. 4. Repeat the above procedure for additional E1 ports in use.
4-14
Chapter 4 Configuration
RICi-4E1, RICi-8E1 Main menu > Configuration > Physical ports > E1 Port [1 8] Frame type > Activation Transmit clock source Line code Line type Rx Sensitivity Save (1-8) (Unframed) (Up) (LBT) (HDB3) > (Unbalanced)
1. 2. 3. 4. 5. 6.
Frame type Activation Transmit clock source Line Code Line Type Rx Sensitivity
Defines frame type. Sets the administrative status of the E1 port. Transmits the clock source of the E1 port.
Configuring T1 Interface
To configure the T1 ports: 1. Navigate to Main Menu > Configuration > Physical Ports. The Physical Ports menu appears. 2. From the Physical Ports menu, select T1. The T1 Port Configuration menu appears as illustrated in Figure 4-12. 3. Configure T1 port parameters. Additional information is available in Table 4-3. To switch to a different port, press <F> and configure the parameters respectively.
4-15
Chapter 4 Configuration
4. Select Save. 5. Repeat the above procedure for additional T1 ports in use. RICi-4T1, RICi-8T1 Main menu > Configuration > Physical ports > T1 Port (1) 1. Activation (Up) 2. Description ... (T1 Link 1) 3. Transmit clock source > (LBT) 4. Frame type > (Framed-ESF) 5. Line Code (B8ZS) 6. Line Mode (CSU) 7. Line BuildOut > (0 dB) 8. Sync (FAST) 9. Rx Sensitivity (-15 dB) > _ f - Forward ESC-Previous menu; !-Main menu; &-Exit
This parameter indicates which T1 Lines implement this type of circuit. The type of circuit affects the number of bits per second that the circuit can reasonably carry, as well as the interpretation of the usage and error statistics. Indicates the transmission line code. T1 interface type. Controls the link transmit signal.
B8ZS (default) AMI DSU CSU (default) 0 dB (default) -7.5 dB -15 dB -22.5 dB
4-16
Chapter 4 Configuration
Possible Values 0-133 ft (default) 134-266 ft 267-399 ft 400-533 ft 534-655 ft FAST (default) AT&T 62411 -15 dB -36 dB (default)
Sync
The restore time parameter is used to change the synchronization algorithms to reduce the time required for the port to return to normal operation after local loss of synchronization (LOF event). Controls the sensitivity of the receive equalizer.
Rx Sensitivity
Figure 4-16. Logical Layer Menu Table 4-7. Logical Layer Parameters
Parameter MLPPP Packet Order Possible Values Enable (default) Disable 80-1900 The default is 280 Remarks Logic Interface MLPPP, rearranges the order of packets sent, relative to the E1 port number. This may cause delays if packets of very different sizes are sent. Maximum Transmit Unit. This is the maximum fragment size that may be transmitted over the E1 lines.
MLPPP MTU
4-17
Chapter 4 Configuration
Remarks Indicates whether the BCP message is encapsulated in the MLPPP header, for the case of remote interfaces that require it to be encapsulated. If set to Enable, the BCP message is not encapsulated. If Disable, it is encapsulated.
Indicates whether to compress the Bridge Protocol field in the MLPPP header to one byte instead of two bytes. The field is compressed by removing the first byte, which contains zeros. Specifies the size of the queue towards the E1/T1 interface. Selecting a higher size allows you to handle large bursts although delays may be longer, while selecting a lower size causes fewer delays but limits the burst size. Provides a description of the link.
TX Queue Size
Description
4-18
Chapter 4 Configuration
Forwarding Mode
3004080
Figure 4-19.
4-19
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 MAC table handling 1. VLAN ID (1) 2. MAC Address (00-00-00-00-00-00) 3. Receive Bridge Port [1-6] (1) 4. Save Please select item from 1 to 4 ESC-Previous menu; !-Main menu; &-Exit; ?-Help
4-20
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > Bridge > Bridge Port 1. Bridge port [1 6] (2) 2. Bind 3. Activation (Enable) 4. Ingress Filtering (Disable) 5. Copy Original Priority (Disable) 6. Default Priority Tag [0 - 7] (4) 7. Egress Tag Handling (Stacking) 8. Ingress Tag Handling (Stripping) 9. TPID (Ether Type) [0 - ffff] (8100) 10. Save f-Forward ; b-Backward; g-Go To ; d-Delete ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Figure 4-20. Bridge Ports Menu Table 4-9. Bridge Port Parameters
Parameter Bridge Port Number Possible Values 16 Remarks Bridge port number. Bridge port 1 is reserved for the host bridge port. Press <F> to switch the port numbers. Activation Port VID / Stacking VID Copy Original Priority Enable (default) Disable 14094 The default is 2 Enable Disable Specifies if this port is active. This is the PVID, the VLAN ID assigned to untagged frames or priority-tagged frames received on this port. If stacking is enabled, this is the tag to be added. Enable: The priority tag of the original VLAN is copied if a frame arrives with a stacked VLAN tag, otherwise the default priority is used. Disable: The default priority is used. Default Priority Tag Egress Tag Handling 07 The default is 0 Stacking Stripping None (default) Stacking Stripping None (default) Default VLAN frame priority. Applies to untagged frames and when per-port priority is used. If stacking is enabled, this value is used for priority. Stacking. adds the PVID to every frame transmitted from the port. Stripping. removes the first VLAN tag from every transmitted frame, on the egress of the port. Stacking. adds the PVID to every frame received on the ingress of the port. Stripping. removes the first VLAN tag from every received frame, on the ingress of the port. The associated Ethernet type (TPID) is used in all bridging, stacking and stripping operations done on packets arriving or outgoing of this port.
0 - 0xFFFF
4-21
Chapter 4 Configuration
To bind a bridge port: 1. From the Bridge Ports menu, select a bridge port. 2. Select Bind to define a physical port to be bound to the current bridge port. The Bind menu appears.
Note
RICi-4E1/T1, RICi-8E1/T1 Configuration > Application > Bridge > Bridge port > Bind 1. Type (Fast) 2. Fast Ethernet [1-4] (1) 3. Save Please select item from 1 to 3 ESC-Previous menu; !-Main menu; &-Exit; ?-Help
4-22
Chapter 4 Configuration
Note
The bridge has six bridge ports (BP). BP1 is dedicated to the IP Host. BP2 through BP6 can be bound to Fast-Ethernet ports 14 or to the MLPPP bundle. Note that PPP/MLPPP does not synchronize unless a bridge port has been bound to the MLPPP bundle.
The classification method is chosen using the Priority Classification menu. Four traffic queues are supported, which can be assigned priorities using the Priority Mapping menu. To select a traffic classification method: 1. Navigate to Main Menu > Configuration > Applications > QoS > Priority Classification. The Priority Classification menu appears as illustrated in Figure 4-23.
4-23
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Configuration > Applications > QoS > Priority Classification 1. 802.1p 2. DSCP 3. Per Port ESC-Previous menu; !-Main menu; &-Exit;
Note
4-24
Chapter 4 Configuration
To assign priorities to traffic queues, for DSCP: 1. Navigate to Main Menu > Configuration > Applications > QoS > Priority Classification. Following the previous procedure, select DSCP as the desired traffic classification method. 2. Navigate to Main Menu > Configuration > Applications > QoS > Priority Mapping. The Priority Mapping (DSCP) menu appears as illustrated in Figure 4-25. The menu lists only those values that have been changed from their default values. RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > QoS > Priority Mapping(DSCP) 1. Tag Value 0 2. Tag Value 63 > > (Traffic Class 2) (Traffic Class 2)
Figure 4-26.
3. From the Priority Mapping menu, select the desired bridge port. 4. Select Traffic Class and enter the traffic queue number (0 3) to be assigned to the bridge port. Each traffic queue can be assigned to more than one port. 5. Repeat steps 1 4 for all active bridge ports. 6. Select Save.
4-25
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > QoS > Priority Mapping(Per Port) Bridge Port (1-6) (5) 1. Traffic Class > (Traffic Class 0) > f Forward; b Backward; g Go To ESC-Previous menu; !-Main menu; &-Exit
Configuring OAM
RICi-4E1/T1, RICi-8E1/T1 provides operation, administration, and maintenance (OAM) in packet-switched networks. To access the OAM menu: 1. From the OAM (Configuration > Applications > OAM) menu, select End-To-End. The OAM End-To-End menu appears. RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End-To-End 1. 2. 3. 4. MD Names Standard OAM MAC Address ... (0180C2000030) Standard OAM EtherType[0 - ffff] ... (8902) Flows
Figure 4-27. OAM End-To-End Menu Table 4-11. OAM End-To-End Parameters
Parameter MD Names Standard OAM MAC Address Standard OAM EtherType Flows 0 - ffff Possible Values Remarks Maintenance Entity Group IDs domain name. Specifies the MAC Address for Operation and Maintenance. Default: 0180C2000030 Specifies the Operation and Maintenance EtherType. Default: 8902 Ethernet Virtual Connections.
2. Modify the OAM MAC Address and/or the Standard OAM Ether Type as needed, according to application requirements. 3. Save your changes.
4-26
Chapter 4 Configuration
Please select item <1 to 2> A-Add New MD Name; F-Forward; B-Backward; D-Delete ESC-Previous menu; !-Main menu; &-Exit
Please select item <1 to 2> S-Save ESC-Previous menu; !-Main menu; &-Exit
4-27
Chapter 4 Configuration
A-Add New Flow ; F-Forward ; B-Backward ; D-Delete ESC-Previous menu; !-Main menu; &-Exit
4-28
Chapter 4 Configuration
3. Save your changes. RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End-To-End > Flows Flow[1 8] Flow Name SP VLAN[1 4094] Protocol Type MAID MEP ... (1) ... (Put your String here) ... (1) (Standard)
1. 2. 3. 4. 5.
Please select item <1 to 1> A-Add New Flow ; ESC-Previous menu; !-Main menu; &-Exit
Figure 4-31. Flows Menu, Adding Flow Table 4-13. OAM Flow Parameters
Parameter Flow Flow Name SP VLAN Protocol Type 1 4094 Proprietary Standard MAID MEP Possible Values 18 Remarks Flow ID Assign a name to the relevant flow. Specify the VLAN used to send the OAM for the specified Maintenance Entity Group (MEP). Proprietary refers to RADs proprietary OAM protocol. If you choose Proprietary, you only have to configure MEP. Default: Standard Refers to the Maintenance Association ID. This parameter only appears if Protocol Type is set to Standard. Refers to the Maintenance Entity Group End Point.
To configure the maintenance associations ID (MAID): 1. Select MAID. The MAID menu appears as illustrated in Figure 4-32. 2. Configure the MAID parameters as specified in Table 4-14. 3. Save your changes.
4-29
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End-To-End > Flows > MAID Flow ID 1. MD ID[1 8] MD Format MD Name 2. MA Format 3. MA Name ... (1) ... (1) > (None) (None) > (String) ... ()
To configure the maintenance entity groups end point (MEP) 1. Select MEP. The MEP menu appears as illustrated in Figure 4-33. 2. Configure the MEP parameters as specified in Table 4-15. 3. Select Save.
4-30
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End-To-End > Flows > MEP Flow ID 1. Local ID[0 8191] 2. OAM Destination Address Type 3. Remote ID 4. MD Level[0 - 7] 5. OAM Mode 6. Continuity Verification Mode 7. OAM Destination MAC Address 8. Default CC Priority 9. CC Interval 10. Services ... (1) ... (0) (Multicast) > (-) ... (3) > (Disable) > (CC Based) > (0120D2000103) > (0) > (1 Second)
MD Level
07
Note: This parameter is available in Initiate/React OAM mode and RAD Proprietary mode.
4-31
Chapter 4 Configuration
Remarks Determines the MAC address sent in OAM messages, configurable only for Unicast MAC Address. Default: 000000000000 in Unicast, 0120D2000100 + MD Level in Multicast RAD Proprietary, Standard OAM MAC Address + MD Level in Multicast Standard Sets the CC interval between messages. Default: 1 sec
CC Interval
The priority CFM message is sent if no service is defined for the flow. If a service is defined, the CC is performed at the highest priority service for the flow. Refer to Figure 4-34 and Table 4-16
To configure the flow services: 1. From the MEP menu (Configuration > Applications > OAM > End-To-End > Flows > MEP), select Services. The Services menu appears. 2. Configure the parameters as specified in Table 4-16. 3. Save your changes. RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End-To-End > Flows > MEP > Services Service Performance Monitoring Priority Delay Objective (msec) Delay Variation Objective (msec) Event Reporting Frame Loss Ratio Frames Above Delay Frames Above Delay Variation Unavailability Ratio ... ... ... ... ... (1) (Enabled) (0) (0) (0)
1. 2. 3. 4.
5. 6. 7. 8.
4-32
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Configuration > Applications > OAM > End To End > Flows > MEP > Services > Frames Above Delay 1. 2. 3. 4. Rising Threshold Falling Threshold Sampling Interval Event Reporting Type ... ... ... ... (0) (0) (0) (Trap and Log)
Figure 4-35. Event Reporting Menu Screen Table 4-17. MEP Services Event Reporting Parameters
Parameter Rising Threshold Possible Values 1 4294967296 For Unavailability Ratio / Frame Loss Ratio, the values are: 1E-3,1E-4,1E-5, 1E-6,1E-7,1E-8,1E-9,1E-10 Falling Threshold 1 4294967296 For Unavailability Ratio / Frame Loss Ratio, the values Remarks A value above this threshold within the sampling interval for the specified counter will be considered a rising event. Default: 1, or 1E-10 for Unavailability Ratio / Frame Loss Ratio A value above this threshold within the sampling interval for the specified counter will be considered a falling event.
4-33
Chapter 4 Configuration
Parameter
Remarks Default: 1, or 1E-10 for Unavailability Ratio / Frame Loss Ratio The interval in seconds above which the data is sampled and compared with the rising and falling thresholds.
Sampling Interval
1 4294967296
Note: This parameter is available only in the Frames Above Delay and Frames Above Delay Variation menus.
Event Reporting Type None Log SNMP Trap Trap and Log The Event type sent out after passing the threshold. Default: None
4.3
Additional Tasks
This section describes additional operations available supported by the RICi-4E1/T1, RICi-8E1/T1 management software, including the following: Configuring MAC port protection Setting the date and time Displaying inventory Transferring software and configuration files Resetting the unit.
4-34
Additional Tasks
Chapter 4 Configuration
The Date and Time menu appears. RICi-4E1/T1, RICi-8E1/T1 Configuration > System > Date and Time Date Time NTP Mode GMT NTP Server IP Address NTP Update Interval (sec) Send Initiated NTP Request (01-10-1949) (00:00:01) (Unicast Client) (0) (172.17.163.93) (5)
1. 2. 3. 4. 5.
Figure 4-36. Date and Time Screen Table 4-18. NTP Client Parameters
Parameter NTP Mode GMT NTP Server IP Address NTP Update Interval (sec) Send Initiated NTP Request Possible Value Unicast Client Disable (Default) -12 12 The default is 0 The default is 0.0.0.0 0 (disable), default 1 - 4294967295 Remarks NTP request sent to a specific IP address Offset from Greenwich Main Time The NTP servers IP address. The time in seconds between NTP update requests. Click to submit an NTP update request. Initiated update requests do not affect the specified update interval.
Additional Tasks
4-35
Chapter 4 Configuration
Configuration>System>Syslog 1. 2. 3. 4. 5. > ESC-Previous menu; !-Main menu; &-Exit Device Logging Status Device UDP port [1 65535] Facility Severity level Server Parameters > > > > > (Disable) (514) (Local 1) (Minor)
Facility
Local 1 (default) Local 7 Critical corresponds to the Emergency (0) severity level of Syslog Major corresponds to the Alert (1) and Critical (2) severity levels of Syslog Minor (default) corresponds to the Error (3) severity level of Syslog Warning corresponds to the Warning (4) severity level of Syslog Event corresponds to the Notice (5) severity level of Syslog Info corresponds to the Informational (6) severity level of Syslog Debug corresponds to the Debug (7) severity level of Syslog
Severity Level
To configure Syslog server parameters: 1. Navigate to the Syslog Server Parameters menu (Configuration > System > Syslog > Server Parameters). The Syslog Server Parameters menu appears. 2. Configure the parameters as described in Table 4-20.
4-36
Additional Tasks
Chapter 4 Configuration
Configuration>System>Syslog> Server Parameters Server Sequence Number 1. Server Access 2. Server IP Address 3. UDP Port[1 65535] > ESC-Previous menu; !-Main menu; &-Exit ... ... ... (1) > (Disable) (0.0.0.0) (514)
Figure 4-38. Syslog Server Parameters Menu Table 4-20. Syslog Server Parameters
Parameter Server Sequence Number Server Access Possible Values 15 Disable (default) Enable Server IP Address Server UDP Port 0.0.0.0 255.255.255.255 165535 Remarks Shows which Syslog server is being configured Controls the access to the Syslog server IP address of the Syslog server UDP Port of the Syslog server
Viewing Inventory
The RICi-4E1/T1, RICi-8E1/T1 inventory displays information on current software and hardware revisions of the unit. It also provides the RICi-4E1/T1, RICi-8E1/T1 interface description. To display the inventory: From the Main menu, select Inventory. The Inventory table appears. Figure 4-39 illustrates the first half of the inventory table. Use the arrow keys to navigate through the table. The inventory displays a description of the unit including its hardware revision and the power supply type in use.
Note
The inventory is a wide table with 132 characters. It is best viewed by setting your terminal to 132 character wide display.
Additional Tasks
4-37
Chapter 4 Configuration
RICi-4E1 Main Menu > Inventory ID 1001 4001 | 7001 v 7002 7003 7004 7005 7006 7007 7008 - > > Description RICi-4E1 Device Power Supply Fast Eth Port 1 Fast Eth Port 2 Fast Eth Port 3 Fast Eth Port 4 E1 Port 1 E1 Port 2 E1 Port 3 E1 Port 4 > Vendor type Class Chassis Power Supply Port Port Port Port Port Port Port Port Entity name RICi-4E1 PS FAST 1 FAST 2 FAST 3 FAST 4 E 1 E 2 E 3 E 4 HWRev 1.00
4-38
Additional Tasks
Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Utilities > File Transfer 1. Server IP Address (0.0.0.0) 2. Remote File Name () 3. File Type (Configuration) 4. Command > Please select item from 1 to 4 ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Additional Tasks
4-39
Chapter 4 Configuration
2. Press <Y> to confirm. The unit resets and all parameters revert to their default settings.
4-40
Additional Tasks
5.1
Application Requirements
Figure 5-1 illustrates a typical application, in which a unit connects Ethernet with
four E1 links.
Application Requirements
5-1
5.2
This part of the application configuration procedure consists of three major stages: Defining the host Defining the default gateway Defining managers.
5-2
Defining Managers
In this step you define the managers and specify which manager(s) will receive SNMP traps. Up to ten managers can be defined. Entering the IP address and corresponding subnet mask defines each management station. In addition, you can temporarily prevent a manager station from receiving traps, by masking the network manager. To access the manager list: Navigate to Main > Configuration > System > Management > Manager List The existing managers appear listed. To define new managers: 1. Press <a>. A form appears to enter the details for the new manager. An ID is automatically assigned to the new manager. 2. Specify an IP address for the new manager under Manager IP. 3. In the Trap field, specify Mask or Unmask to mask or unmask traps for the new management station. 4. Select Save All. 5. Repeat the previous steps for each network manager you wish to add. To update existing manager parameters: 1. In the Manager list, press <Tab> to move the cursor to the Manager IP cell you wish to modify by pressing. The selected cell is highlighted and the value is displayed in the Change cell field. 2. Press <1>, and press <Enter> to enter a new IP address for the selected network manager. 3. Move the cursor to the Trap field and toggle between Mask and Unmask to mask or unmask traps for the selected management station. 4. Repeat the previous three steps for each manager you wish to update. 5. Press <ESC> to return to the Management menu.
5-3
5.3
Defines the characteristics of the physical E1 or T1 ports. Set the clock parameters. To configure the E1/T1 physical layer: 1. Navigate to Main > Configuration > Physical layer > E1/T1. The E1 or T1 menu appears as appropriate. 2. Leave the parameters unchanged. Refer to Configuring Ports at the Physical Level for additional information on defining the parameters for each T1/E1 physical port. 3. Press <ESC> to return to the Physical Layer menu. 4. Press <ESC> to return to the Configuration menu.
5.4
This part of the application configuration procedure has four major stages: Defining the bridge Defining bridge ports and binding them to the relevant physical interfaces Defining VLANS and adding them the relevant bridge ports Configuring the E1/T1 physical layer.
5-4
5-5
5-6
6.1
Monitoring Performance
The software provides access to the following status information: System level MAC address, connection status, log file, and clock source Physical level Ethernet and E1 port status Application level MAC table.
Monitoring Performance
6-1
RICi-4E1 Main Menu>Monitoring>System>Interface Status Description Type Activation ETH 1 Fast Eth Up ETH 2 Fast Eth Up ETH 3 Fast Eth Up ETH 4 Fast Eth Up E1 PORT 1 BL E1 Up LOGICAL PORT MLPPP MLPPP Port Up LOGICAL PORT 1 Logical PPP Up Bridge Port 6 Bridge Port Up ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Operation Up Up Up Up Up Up Up Up
6-2
Monitoring Performance
The MAC Access Control Status screen appears as illustrated in Figure 6-3. It includes the following: Current Number of Protected Addresses. Shows the current number of learned MAC Addresses being protected Maximum Number of Protected MAC Addresses. Shows the maximum number of protected MAC addresses that can be learned. 2. Select Protected MAC Addresses to view the protected MAC addresses. RICi-4E1/T1, RICi-8E1/T1 Main menu > Monitoring > Physical ports > Fast Ethernet > MAC Access Control Port ... Current Number of Protected Addresses ... Maximum Number of Protected MAC Addresses 1. Protected MAC Addresses > ESC-Previous menu; !-Main menu; &-Exit (1) (0) (0) []
1 | 2 v 3 4
RICi-4E1/T1, RICi-8E1/T1 Main Menu>Monitoring>Physical Port>Fast Ethernet>Statistics Port (1) Rx Correct Frames (0) Rx Correct Octets (0) Rx FCS Errors (0) Tx Correct Frames (0) Tx Correct Octets (0) Tx Collision (0) Tx Congestion Dropped Frames (0) 1. Clear Port Statistics ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-4
Monitoring Performance
RICi-4E1, RICi-8E1 Main Menu>Monitoring>Physical Port>E1>E1 Statistics Rx Rx Rx Tx Tx Tx Tx Total Frames Total Octects Total Errors Total Frames Total Octects Total Errors Congestion Dropped Frames ( ( ( ( ( ( ( ) ) ) ) ) ) )
To clear Logical Layer statistics: In the Logical Layer Statistics menu, type <1> to clear the statistics.
RICi-4E1/T1, RICi-8E1/T1 Main Menu>Monitoring>Logical Layer Rx Total Frames Tx Total Frames Tx Congestion Dropped Frames 1. Clear Statistics ( ) ( ) ( )
Figure 6-7. Logical Layer Statistics Table 6-3. Logical Layer Statistics
Parameter Rx Total Frames Tx Total Frames Tx Congestion Dropped Frames Description The total number of frames received. The total number of frames transmitted. Total number of transmitted frames that are discarded due to a lack of buffer space
6.2
RICi-4E1/T1, RICi-8E1/T1 maintains a log file that can hold up to 1000 system messages. All events are time-stamped. Table 6-4 lists the event types that appear in the event log.
Displaying Events
To access the log file: RICi-4E1/T1, RICi-8E1/T1 has an integrated NTP client to enable receiving the date and the time from the network. If properly configured and an NTP server is available, all messages are recorded with time and date of occurrence, otherwise the date is 0000-00-00 and the time indicates the seconds that have elapsed since the system started. 1. Navigate to Main > Monitoring > System > Log File. The Log File screen appears as illustrated in Figure 6-8. 2. In the Log file screen, use the arrow keys to scroll the event list up and down, left and right.
6-6
RICi-4E1 Main Menu>Monitoring>System>Log File Source E1 Port 2 E1 Port 6 Eth Port 1 Description LINK_DOWN LINK_UP LINK_DOWN Information E1 port E1 port Eth port Severity Major Major Minor Date Time 00-00-0000 00:00:01 00-00-0000 00:00:02 00-00-0000 00:00:04
1 2 3
?-help
1 2 3
?-help
Clearing Events
To clear the log file In the Log File menu, type x.
6-7
Code 90
Event TELNET_ACCESS_DENIED
Description Access via Telnet was denied, either because the current IP address does not appear in the manager list, or because disabled Telnet access. Access via Web was denied, either because the current IP address does not appear in the manager list, or because a user disabled Web access. Access via SNMP was denied, either because the current IP address does not appear in the manager list, or because a user disabled SNMP access.
91
WEB_ACCESS_DENIED
92
SNMP_ACCESS_DENIED
Notes
A falling alarm trap is sent between two rising alarm events. A rising alarm trap is sent between two falling alarm events.
6-8
6.3
Troubleshooting
No Ethernet Link detected Ethernet port in switch and RICi-4E1/T1, RICi-8E1/T1 are not in the same rate or duplex mode
Troubleshooting
6-9
6.4
RICi-4E1/T1, RICi-8E1/T1 checks network integrity by running ping, trace route, or loopback tests.
Please select item from 1 to 4 ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-10
4. Select Display Trace Route to start tracing. RICi-4E1/T1, RICi-8E1/T1 starts tracing the route displaying the IP addresses of all hop nodes. 5. Select Stop Trace Route to stop the tracing. RICi-4E1/T1, RICi-8E1/T1 Main Menu>Diagnostics>Trace Route 1. Destination IP Address (0.0.0.0) 2. Display Trace Route 3. Stop Trace Route Please select item from 1 to 3 ESC-Previous menu; !-Main menu; &-Exit; ?-Help
5. Select Time To Start in seconds (0 loop starts immediately). 6. Select Duration in seconds. RICi-4E1 Main Menu>Diagnostics>Loopback Port 1. E1 Loopback State1 2. Time To Start (sec) [0-600] 3. Duration (sec) [0-3600] f-Forward ESC-Previous menu; !-Main menu; &-Exit
6-11
ESC-Previous menu; !-Main menu; &-Exit; ?-Help --------------------------------------------------------Inject Error Inject Error
6-12
Set to On to start the test Set to Off to stop the test. Select this to inject an error into the test.
Note
6-13
If you entered a Multicast MAC address: The Results screen appears as illustrated in Figure 6-17. The result parameters are described in Table 6-9. Select Replied Addresses to navigate to the Replied Addresses screen (see Figure 6-18). RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Loopback 1. Flow ID[1 - 8] Flow Name 2. Destination Type 3. Destination Address 4. Number of LBs to Send[0 - 50] 5. Send Loopbacks 6. Results ... (1) ... (Put your string here) (Destination Address) ... (00-11-B3-55-A6-77) ... (0) >
Please select item <1 to 4> F-Forward; B-Backward ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Figure 6-15. Loopback Menu Destination Address Table 6-8. Loopback Parameters Destination Address
Parameter Flow ID Flow Name Possible Values 18 Remarks The ID of the virtual Ethernet connection. The name of the virtual Ethernet connection you chose.
6-14
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Loopback > Results Local MEP ID[1 - 8] Flow Name Destination Address Messages Sent Replys In-Order Replys Out-of-Order Messages Lost/Timed out Messages Lost/Timed out % ... ... ... ... ... ... ... ... (1) (Put your string here) (00-11-B3-55-A6-77) (14) (14) (0) (0) (0)
Figure 6-18. Loopback Replied Addresses Menu, Multicast MAC Address Table 6-9. Loopback Result Parameters
Parameter Local MEP ID ID Flow Name Possible Values 18 Remarks The ID of the virtual Ethernet connection. The name of the virtual Ethernet connection you chose.
6-15
Parameter
Possible Values
Remarks
Result Parameters for Unicast MAC Address Replys In-Order How many replies were received that were in order.
How many replies were received that were out of order. The number of messages that were lost or timed out The percentage of messages that were lost or timed out
Result Parameters for Multicast MAC Address Replied MEPs MAC Address Known as Rem. Id How many MEPs replied to loopback MAC address that sent reply to loopback Remote MEP ID that corresponds to the replying MAC address
To verify OAM connectivity according to the Remote MEP IDs: 1. In the OAM Tests Loopback menu, set Destination Type to Remote MEP ID. Remote MEP parameters appear as illustrated in Figure 6-19.
Note
If the number of loopbacks to send is 0, the Send Loopbacks parameter does not appear in the screen.
2. Define the test parameters according to Table 6-10. 3. Select Send Loopbacks to send the specified number of loopbacks. The loopbacks are sent. 4. Select Results. The result parameters are described in Table 6-9. RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Loopback 1. Flow ID[1 - 8] Flow Name 2. Destination Type 3. Remote MEP ID[1 - 8191] Remote MEP Address 4. Number of LBs to Send[0 - 50] 5. Send Loopbacks 6. Results ... (1) ... (No such flow) (Remote MEP ID) ... (0) ... (00-00-00-00-00-00) ... (0) >
Please select item <1 to 4> F-Forward; B-Backward ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-16
Note: This parameter is read-only. It is automatically updated by the system when you enter a valid remote MEP ID.
Number of LBs to Send 0 50 The number of loopbacks to send. Default: 0
Note
If the target MAC address is all 0s, the Send Link Trace parameter does not appear in the screen.
3. Define the test parameters according to Table 6-11. 4. Select Send Link Trace to perform the link trace. 5. Select Results to view the results of the link trace, as illustrated in Figure 6-21.
6-17
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Link Trace 1. Flow ID[1 - 8] Flow Name 2. Destination Type 3. Target MAC Address 4. TTL[1 - 64] 5. Send Link Trace 6. Results ... (1) ... (Put your string here) (Target MAC Address) ... (00-00-00-00-00-00) ... (64) []
Please select item <1 to 4> F-Forward; B-Backward ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Figure 6-20. Link Trace Menu Target MAC Address Table 6-11. Link Trace Parameters Target MAC Address
Parameter Flow ID Flow Name Possible Values 18 Remarks The ID of the virtual Ethernet connection. The name of the virtual Ethernet connection you chose.
RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Link Trace > Results HOP 1 1 2 2 MAC Address 0020C0010203 0020C0010203 0020C0010608 0020C0010608 ING/EGR Action IngOK EgrOK IngOK EgrOK Port ID MLPPP 1 MLPPP 1 MLPPP 1 MLPPP 1 Relay Action RlyHit RlyHit RlyHit RlyHit
6-18
Note
If the target MEP address is all 0s, the Send Link Trace parameter does not appear in the screen.
2. Define the test parameters according to Table 6-12. 3. Select Send Link Trace to perform the link trace. 4. Select Results to view the result of the link trace, as illustrated in Figure 6-21. RICi-4E1/T1, RICi-8E1/T1 Main Menu > Diagnostics > OAM Tests > Link Trace 1. Flow ID[1 - 8] Flow Name 2. Destination Type 3. Target MEP ID[1 - 8191] Target MEP Address 4. TTL[1 - 64] 5. Send Link Trace 6. Results ... (1) ... (Put your string here) (Target MEP ID) ... (0) ... (00-00-00-00-00-00) ... (64) []
Please select item <1 to 5> F-Forward; B-Backward ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Figure 6-22. Link Trace Menu Target MEP ID Table 6-12. Link Trace Parameters Target MEP ID
Parameter Flow ID Flow Name Possible Values 18 Remarks The ID of the virtual Ethernet connection. The name of the virtual Ethernet connection you chose.
Note: This parameter is read-only. It is automatically updated by the system when you enter a valid target MEP ID.
TTL 164 This is used to limit the number of hops to 64. The first unit to initiate the trace sets this to 64, then each unit in the trace decrements it.. Default: 64
6-19
6.5
Technical Support
Technical support for this product can be obtained from the local distributor from whom it was purchased. For further information, please contact the RAD distributor nearest you or one of RAD's offices worldwide. This information can be found at www.rad.com. (Offices About RAD > Worldwide Offices; Distributors Where to Buy > End Users).
6-20
Technical Support
The 10/100BaseT Ethernet electrical interface is an 8-pin RJ-45 connector, wired in accordance with Table A-1.
Ethernet Connector
A-1
Appendix A
A.2
E1/T1 Connector
The E1 or T1 electrical interface is an 8-pin RJ-45 connector, wired in accordance with Table A-2.
Note
A.3
Control Connector
The control terminal interface terminates in a V.24/RS-232 9-pin D-type female DCE connector. Table A-3 lists the control connector pin assignments.
A-2
Control Connector
B.1
RICi-4E1/T1, RICi-8E1/T1 boots up automatically. After powering up, no user intervention is required, except when the user wants to access the file system to modify or update the software or the RICi-4E1/T1, RICi-8E1/T1 configuration.
B-1
Appendix Bl
RICi-4E1/T1, RICi-8E1/T1 Boot Version 1.00 (Jan 20 2005) Boot manager version 7.02 (Jan 20 2005) 0 - Exit Boot-Manager 1 - Dir 2 - Set Active Software Copy 3 - Delete Software Copy 4 - Download an Application by XMODEM 5 - Format flash 6 - Show basic hardware information 7 - Reset board 8 - System Configuration. 9 - Download an Application by TFTP Press the ESC key to return to the Main Menu. Select:
If you choose to exchange or delete a file, you are prompted for confirmation.
B-2
Appendix B
B.2
New software releases are distributed as separate files, which are downloaded to RICi-4E1/T1, RICi-8E1/T1 using the XMODEM protocol or TFTP from the Boot Manager menu. Alternatively, you can download a new software release via TFTP, when the RICi-4E1/T1, RICi-8E1/T1 management software is already running (Main menu > Utilities > File Transfer). The TFTP protocol can also be used for uploading configuration files that contain the RICi-4E1/T1, RICi-8E1/T1 databases to the management station. When RICi4E1/T1, RICi-8E1/T1 is running, administrators can use this capability to distribute verified configuration files to all other units that use the similar configuration.
B-3
Appendix Bl
B-4
C.1
Introduction
Currently RICi-4E1/T1, RICi-8E1/T1 support pre-standard implementation of Ethernet OAM based on Y.1731 and standard implementation based on Y.1731 and IEEE P802.1ag. The pre-standard implementation is used only for performance measurements when using two RAD units working opposite each other or when working opposite a RAD device with an older version of RAD Ethernet OAM. This appendix describes the pre-standard implementation. The standard implementation can be found in Y.1731 and IEEE P802.1ag. RICi-4E1/T1, RICi-8E1/T1 have the following capabilities for providing operation, administration, and maintenance (OAM) in packet-switched networks: Continuity check Non-intrusive loopback which used to detect loss of bidirectional continuity Performance measurements (per service).
Table C-1 lists the Ethernet OAM-related terms used in this appendix. Table C-1. Ethernet OAM Terminology
Term UNI Description User Network Interface. The physical demarcation point between the responsibility of the Service Provider and the responsibility of the Subscriber Customer side of a UNI link Network side of a UNI link An Ethernet frame transmitted across the UNI toward the Service Provider or an Ethernet frame transmitted across the UNI toward the Subscriber.
Introduction
C-1
Ethernet Virtual Connection : An association of two or more UNIs that limits the exchange of Service Frames to UNIs in the Ethernet Virtual Connection Flow connecting exactly two UNIs Flow connecting two or more UNIs A set of Service Frames that have a commitment from the Service Provider to receive a particular level of performance Service Frame delivery performance is specified for all Service Frames transported within a flow with a particular Class of Service instance. The Class of Service instance is identified by a Class of Service Identifier associated with each Service Frame (Class of service can be identified by more than one parameter/frame attribute) Proactive OAM reference point which is capable to initiate and terminate proactive OAM frames. MEP is also capable to initiate and react to diagnostics OAM frames. A provisioned OAM reference point which is capable to respond to diagnostics OAM frames initiated by the MEP. The receiver of OAM frames in each Service Instance The transmitter of OAM frames in each Service Instance
Point-to-point Flow Multipoint-to-Multipoint Flow Service Instance / Class of service (CoS) Service Instance Identifier (CoS ID)
MEP
C.2
Reference Architecture
C-2
Reference Architecture
C.3
OAM Entities
This section describes the OAM entities hierarchy. Figure C-2 illustrates the relationship between UNI, flow, and Service Instance (COS ID), when one or more service instances belong to one flow and one or more flows belong to a UNI. From the OAM perspective, the continuity messages and defects are activated per flow, and the PM is activated per service instance.
Note
A flow can belong only to one UNI in the same RICi-4E1/T1, RICi-8E1/T1.
Figure C-2. UNI, Flow, and Service Instance (COS ID) Figure C-3, Figure C-4, and Figure C-5 illustrate different combinations of UNIs,
flows, and service instances. Each UNI contains at least one flow, which contains at least one service instance.
OAM Entities
C-3
In case of one flow per UNI (Figure C-3), the PM and CC are transmitted once.
Figure C-5. One Flow and Multiple CoS (Service Instances) per UNI
C.4
OAM Flows
Figure C-6 illustrates a typical OAM traffic flow. The OAM message is transmitted
from the source MEP 1 to the destination MEP 2 and the reply is transmitted back The source is also a destination for messages from the other direction. The OAM interval is one second, so each NTU transmits one request and one reply and receives one request and one reply. A total of four messages are transmitted per second per service instance.
OAM Message Request MEP 1 OAM Message Reply MEP 2
Source
Destination
C-4
OAM Flows
Flow Association
When an OAM frame is associated with a flow, the following steps are performed: Request message reception When a request message is received, the VLAN is extracted to find the Flow ID. The Flow ID found at the receiver is compared against the Flow ID in the frame. If the IDs are equal, further service association is made. If it is not found, the Flow ID no match notification is returned in the reply message. Reply message reception When a reply message is received, the VLAN is extracted to find the Flow ID. The Flow ID found at the receiver is compared against the Flow ID in the frame. If the IDs are equal, further service association is made. If it is not found, the frame is discarded and connectivity alarm is issued.
Service Association
When an OAM frame is associated with a service, the following steps are performed: Request message reception The class of service characteristics are extracted from the frame and must be matched to an entry in the flows <-> services table at the receiver. If they are matched, the frame is processed. If not, the service ID is returned with the Not Found notification. Reply message reception The class of service characteristics are extracted from the frame and must be matched to an entry in the flow <-> services table at the receiver. If they are matched, the frame is processed. If not, the frame is discarded.
OAM Flows
C-5
The message is initiated by the local device and runs periodically making it suitable for fault detection. Unicast ETH-LB request message is sent from a MEP to a specific MEP (remote device). The DA of the request message is a unicast MAC address of destination device. Upon receipt of the request message, the MEP responds with unicast ETHLB reply message. The DA of the reply message is a unicast MAC address of requesting device, learned from request message.
The ETH-CC signal is generated by one MEP. Upon receipt of the first ETH-CC signal from a sending MEP, the receiving MEP detects continuity with sending MEP and expects to receive further periodic ETH-CC signals. Once the receiving MEP stops receiving periodic ETH-CC signals from sending MEP, it declares continuity failure. The MEP that detects the continuity failure notifies the operator by sending an alarm or a trap.
OAM Procedures
This section discusses the continuity check (CC) and the performance measurement (PM) procedures.
ETH-LB Method
The ETH-LB method includes the following elements: Unicast ETH-LB transmission Unicast ETH-LB request message is transmitted by a MEP (RICi-4E1/T1, RICi-8E1/T1) every second. The transmitted Transaction Identifier is retained for at least five seconds after the unicast ETH-LB signal is transmitted. The Transaction Identifier must be changed for every unicast ETH-LB message, and no Transaction Identifier from the same MEP is allowed to be repeated within 1 minute.
C-6 OAM Flows RICi-4E1/T1, RICi-8E1/T1 Ver. 2.0
Unicast ETH-LB reception and reply transmission Whenever a valid unicast ETH-LB request message is received by a MEP (RICi-4E1/T1, RICi-8E1/T1), a unicast ETH-LB reply message is generated and transmitted to the requesting MEP. Every field in the unicast ETH-LB request message is copied to the unicast ETH-LB reply message with the following exceptions: The source and destination MAC addresses are swapped The OpCode field is vendor-specific oxFE The Flow and MEP ID are processed as follows: if the Flow/MEP ID do not exist in the device, it changes them to No Match otherwise they are left intact.
Unicast ETH-LB reply receipt When a unicast ETH-LB reply message is received by a MEP (RICi-4E1/T1, RICi-8E1/T1) diagnostic flow termination function, it examines the TLVs returned in the unicast ETH-LB reply message. The signal is declared invalid if the TLVs do not match those sent in the corresponding unicast ETHLB request signal, including MEP ID and Flow ID.
Continuity declarations Loss of Continuity and Connectivity Mismatch states are declared by the ETH-LB mechanism. Loss of continuity declaration After the source device sends an ETH-LB message a timer is set with a 3.52 second timeout. If the destination device does send reply within the timeout, the source enters the loss of continuity state. Upon reply from the destination, the source resets the timer to 23.5 seconds. Regarding the continuity check message, the source checks only the Flow ID with the MEP ID. When the source enters the loss of continuity state, it adds 24 to Unavailable Seconds counter. The 23.5 second period is calculated as a sliding window. Loss of continuity state is cleared after 3.52 seconds with at least 21 reply messages from the destination. In this case the Unavailable Seconds counter is decremented by 24. Connectivity mismatch declaration If the source Flow ID is not equal to the destination Flow ID as recorded in the reply message for 10 consecutive times, the source enters in to misconnection state. Misconnection state is cleared after 10 consecutive reply messages with the correct flow name from the destination. The Unavailable counter is maintained by the service according to the number of PM messages that did not receive replies. If a mismatch notification is received to the LB request, the frame is dropped and reply message is not sent. This is why the service becomes unavailable (no reply) in case of mismatch and the unavailable counter is raised.
OAM Flows
C-7
ETH-CC Method
The ETH-CC method includes the following elements: ETH-CC transmission Unicast ETH-CC request message is transmitted by a MEP (RICi-4E1/T1, RICi8E1/T1) every 1 second. The transmitted Transaction Identifier is retained for at least 5 seconds after the unicast ETH-CC signal is transmitted. The Transaction Identifier must be changed for every Unicast ETH-CC message, and no Transaction Identifier from the same MEP is allowed to be repeated within 1 minute. Unicast ETH-CC reply receipt When a unicast ETH-CC message is received by a MEP (RICi-4E1/T1, RICi8E1/T1) diagnostic flow termination function, it examines the TLVs returned in the unicast ETH-CC message, and declares the signal invalid if the TLVs do not match those sent in the corresponding exiting MEP ID and Flow ID. Continuity declarations Loss of Continuity and Connectivity Mismatch states are declared by the ETH-CC mechanism. Loss of continuity declaration When the MEP receives the ETH-CC message a timer is set with a 3.5 seconds timeout. If the source does send another message during this period, the destination enters the loss of continuity state. Upon receipt of the ETH-CC message, the destination resets the timer to 3.5 seconds. Regarding the continuity check message, the destination check the Flow ID and the MEP ID. When the destination enters the loss of continuity state, it adds 4 to the Unavailable Seconds counter. The 3.5 second period is calculated as a sliding window. Loss of continuity state is cleared after 3.5 seconds with at least 2 messages from the source. In this case the Unavailable Seconds counter is decreased by 4. Connectivity mismatch declaration If the source Flow ID is not equal to the destination Flow ID for 10 consecutive times, the destination enters in to misconnection state. Misconnection state is cleared after 10 consecutive reply messages with the correct flow name from the source. The Unavailable counter is maintained by the service according to the number of PM messages that did not receive replies. If a mismatch notification is received to the LB request, the frame is dropped and reply message is not sent. This is why the service becomes unavailable (no reply) in case of mismatch and the unavailable counter is raised.
Performance Measurement
RICi-4E1/T1, RICi-8E1/T1 measure performance in 15-minute intervals. The units also store performance history data for the last 24 hours (96 intervals). Table C-2 lists the PM counters supported by RICi-4E1/T1, RICi-8E1/T1.
C-8
OAM Flows
C.5
RMON Statistics
In addition to the regular statistics collection, RICi-4E1/T1, RICi-8E1/T1 supports proactive SLA measurements per RICi-4E1/T1, RICi-8E1/T1 port, as per RMON-based RFC 2819. The device sends reports when one of the available counters (physical layer or OAM) rises above or drops below the set thresholds within the specified sampling period of time. These reports can be sent as SNMP traps to the defined network management stations or be written to the event log.
RMON Statistics
C-9
The following counters can be monitored: Dropped Frames Undersize Frames Oversize Frames Fragmented Frames Jabbers Frame Loss Ratio Frames Above Delay Frames Above Delay Variation Unavailability Ratio.
C-10
RMON Statistics
Supplement
To prepare the AD plug and connect it to the DC power supply cable: 1. Loosen the cover screw on the bottom of the AD plug to open it (see Figure 3). 2. Run your DC power supply cable through the removable cable guard and through the open cable clamp. 3. Place each DC wire lead into the appropriate AD plug wire terminal according to the voltage polarity mapping shown. Afterwards, tighten the terminal screws closely. 4. Fit the cable guard in its slot and then close the clamp over the cable. Tighten the clamp screws to secure the cable. 5. Reassemble the two halves of the AD plug and tighten the cover screw. 6. Connect the assembled power supply cable to the unit.
Note: You have to flip over the non-90-degree AD plug type by 180 degrees to insert it into the unit. After inserting it, verify that the blue (negative) wire is connected to the POWER and the brown (positive) wire is connected to the RETURN.
Reversing the wire voltage polarity will not cause damage to the unit, but the internal protection fuse will not function.
Warning
Always connect a ground wire to the AD plugs chassis (frame) ground terminal. Connecting the unit without a protective ground, or interrupting the grounding (for example, by using an extension power cord without a grounding conductor) can damage the unit or the equipment connected to it! The AD adapter is not intended for field wiring.
24 Raoul Wallenberg Street, Tel Aviv 69719, Israel Tel: +972-3-6458181, Fax +972-3-6483331, +972-3-6498250 E-mail: [email protected], Web site: http://www.rad.com
Excellent
Installation instructions Operating instructions Manual organization Illustrations The manual as a whole
Good
Fair
Poor
Very Poor
Error Report
Type of error(s) or problem(s): Incompatibility with product Difficulty in understanding text Regulatory information (Safety, Compliance, Warnings, etc.) Difficulty in finding needed information Missing information Illogical flow of information Style (spelling, grammar, references, etc.) Appearance Other Please list the exact page numbers with the error(s), detail the errors you found (information missing, unclear or inadequately explained, etc.) and attach the page to your fax, if necessary.
You are:
Who is your distributor? Your name and company: Job title: Address: Direct telephone number and extension: Fax number: E-mail:
International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail [email protected]
www.rad.com